Differentiate between protected and real modes of an intel, Computer Engineering

Differentiate between protected and real modes of an Intel microprocessor

Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it determines whether an interrupt is active by checking (1) instruction execution, (2) single -step (3) NMI (4) co-processor segment overrun (5) INTR and (6) INT instruction in the order presented. If one ormore of these interrupt conditions are present, following sequence of events takes place:

1.  The contents of flag register are pushed onto the stack

2.  Both the trap (TF) and interrupt (IF) flags are cleared. This disables INTR pin and trap or single-step feature.

3.  Contents of the code segment register (CS) are pushed onto the stack.

4.  Contents of the instruction pointer (IP) are pushed onto the stack.

5.  The interrupt vector contents are fetched and then placed into both CS and IP so that next instruction executes at the interrupt service procedure addressed by the vector.

 

Posted Date: 8/20/2013 2:52:51 AM | Location : United States







Related Discussions:- Differentiate between protected and real modes of an intel, Assignment Help, Ask Question on Differentiate between protected and real modes of an intel, Get Answer, Expert's Help, Differentiate between protected and real modes of an intel Discussions

Write discussion on Differentiate between protected and real modes of an intel
Your posts are moderated
Related Questions
The first part of the address in electronic mailbox identifies? The first part of address in E-Mail identifies the user's mail box.

Q. Explain Disk Cartridges ? Disk Cartridges: Removable disk cartridges are an option to hard disk units as a form of secondary storage. Cartridge generally comprises one or

what is batch system?how the disadvantage of batch system are overcome in multi-programming operating system?also describe how multi-programmed operating system is milestone in dev

What is a resource-allocation graph? Deadlocks can be described more precisely in terms of a directed graph known as a system resource allocation graph. This graph having of a

A PCM system uses 8 bits per sample and the analog signal is limited to 4.3 kHz. The PCM data is transmitted using (a) BFSK and (b) ASK. Determine the bandwidth required for transm

Chains of Inference: Now we have to look at how to get an agent to prove a given theorem using various search strategies? Thus we have noted in previous lectures that, there i

Assembly language: An assembly program has a series of instructions--mnemonics that relate to a stream of executable instructions, when translated by an assembler that may be

What is SAP LUW or Update Transaction? Update transaction (or "SAP LUW") This is a set of updates terminated by an ABAP/4 commit.  A SAP LUW may last much longer than a data

Q. Advantages and Disadvantage of Message Passage Programming? Advantages of Message Passage Programming     Portable It is less error prone Offers excellent

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow