Free Essay

80386 Microprocessor

In:

Submitted By barkha18
Words 4779
Pages 20
80386 MICROPROCESSOR It is a 32-bit microprocessor. It has 32 bit data bus and 32 bit address bus, so it can address up to 232 = 4GB of RAM.
Features -Multitasking -Memory management -Software protection -Segmentation and paging -Large memory system(64Tbytes in virtual mode)
Operating modes -Real mode -Protected mode -Virtual mode
Internal architecture: There are 6 parallel functional units:
-The bus unit: The bus interface unit provides a 32-bit data bus, a 32-bit address bus and control signals. 8-bit (byte), 16-bit (word) and 32-bit (double word) data transfers are supported. It has separate pins for its address and data bus lines. This processing unit contains the latches and drivers for the address bus, transceivers for the data bus, and control logic for signaling whether a memory input/output, or interrupt acknowledgement bus cycle is to be performed. -The prefetch unit: The prefetch unit performs a mechanism known as an instruction stream queue. This queue permits a prefetch up to 16 bytes (8 memory words) of instruction code which is used by the instruction decoder. Whenever bytes are loaded into the queue they are automatically shifted up through the FIFO to the empty location near the output. -The decode unit: It reads the machine-code instructions from the output side of the prefetch queue and decodes them into microcode instruction format. The instruction queue, a part of the decode unit permits three fully decoded instructions to be held waiting for use by the execution unit. -The execution unit: The execution unit involves the arithmetic/logic unit-ALU, registers, special multiply, divide, and shift hardware, and a control ROM. The control ROM contains the microcode sequences. The execution unit reads the decoded instructions from the instruction queue and performs the operations that are specified. During the execution of an instruction, it requests the segment and page units to generate operand addresses and the bus interface unit to perform read or write bus cycles to access data in memory or I/O devices.

-The segment unit: It produces a translated linear address which the paging unit translates into the physical address. The instructions requiring memory reference send their request to the segmentation unit for logical unit computation and translation and segment protection violation checking. -The page unit: It translates the linear address generated by prefetch unit to physical address before the prefetch bus cycle request is send to the bus interface unit. It also checks for paging violation.
Pin structure of 80386 MICROPROCESSOR: 80386DX microprocessor is a 132-pin pin grid array. The functions of the 80386 pins are as follows: 1) A31-A2: These are the Address Bus connections used to address any of the 1G*32 memory locations found in the memory system. 2) D31-D0: These are the data bus connections used for the transfer of data between the microprocessor and its memory and the I/O systems. 3): These are the Bank Enable signals used to access a byte, word or a double word data from any of the 4 memory banks. These signals are generated internally by the microprocessor with the help of the least two significant lines of the address bus i.e. A1 and A0.
4) M/: This is a memory or IO status signal. When this is 1, a memory device is selected for memory operation and when it is 0, an IO device is selected for IO operation.
5) W/ : This is write/read control signal. When it is 0, it indicates that the read operation is to be performed and when it is 1, it indicates that write operation is to be performed.
6) : This is the Address Data Strobe signal. It becomes active when a valid IO or memory address is issued by the microprocessor.
7) RESET: This is the Reset signal. When this becomes active, the microprocessor is reset to the real mode causing it to begin execution from the memory location FFFFFFF0 H.
8) CLK2: This is the clock signal. It is driven by a clock signal that is two times the operating frequency of the 80386 microprocessor.
9): This is the READY signal. It controls the number of wait states that are inserted into the timing to control memory access in case of slower peripheral devices.
10) : Lock becomes 0 when an instruction is prefixed by the LOCK prefix. This is mostly used in DMA access.
11) D/ -Data/Control: When this pin is at logic 1, it indicates that the data bus of the microprocessor contains data for or from the memory or IO device. When it is at logic 0, it indicates that the microprocessor is currently halted or executing an interrupt acknowledge.
12) - Bus size 16: When this pin is at logic 1, it selects a 32 bit data bus and when it is at logic 0, it selects a 16 bit data bus.
13) -Next Address: This pin causes the microprocessor to output the address of the next instruction data in the current bus cycle. This pin is used at the time of pipe-lining.
14) HOLD: This signal requests a DMA action.
15) HLDA – Hold Acknowledge: It indicates that 80386 is currently in the hold state.
16) - Coprocessor request: This signal asks the 80386 microprocessor to release the control and is a direct connection to the 80387 arithmetic coprocessor.
17) : This is an input signal that is used by the WAIT and FWAIT instructions that wait for the coprocessor to become not busy. This is also a direct connection to the 80387 arithmetic coprocessor from 80386 microprocessor.
18) : This pin indicates to the microprocessor that an error has been detected by the coprocessor.
19) INTR – Interrupt request : This pin is used by the external circuitry to request an interrupt.
20) NMI –Non-Maskable Interrupt: This pin requests a non-maskable interrupt.

ADDRESSING MODES: The data addressing modes of 80386 microprocessor are as follows: 1) Register Addressing: The operands in the instructions are registers or memory locations. These registers may be 16-bit or 32-bit. Eg: MOV CX, DX – This instruction transfers a word from source register DX to destination register CX. 2) Immediate Addressing: The operand is an immediate byte or word of data. The data may also be a double-word.
Eg: MOV EAX, FFFFFFFFH – This instruction transfers the double-word immediate data FFFFFFFFH to the 32-bit wide register EAX. 3) Direct Addressing: The operand is a memory address that is in the data segment. This memory location may be word-sized or double word-sized. Eg: MOV EAX, LOC – This instruction copies the double word contents of memory address LOC in the data segment into EAX. 4) Register Indirect Addressing : A memory location is addressed by an index or base register. These index and base registers are BP,BX,DI,SI and their extended versions. Eg: If the contents of the register BX are 1234H,then the instruction MOV AX,[BX] copies the contents the data segment memory offset address 1234H into the register AX. 5) Base-Plus-Index Addressing: The operand is a memory location that is addressed by a base register plus an index register. The base register may be like BP or BX and the index register may be like SI,DI and their extended versions. Eg: MOV CL,[EDX+EDI] –This instruction copies the byte contents of the memory location addressed by EDX plus EDI into register CL. 6) Register Relative Addressing: The operand is a memory location that is addressed by an index or base register plus displacement. 7) Eg: The instruction MOV AX,[DI+100H] copies the word contents of the data segment memory location that is addressed by DI plus 100H into register AX. 8) Base Relative-Plus-Plus-Index Addressing: The operand is a memory location that is addressed by a base and an index register plus displacement. 9) Eg: The instruction MOV AX,[BX+DI+4] copies a word of data from a memory location addressed by the sum of BX,DI and 4 into the register AX. 10) Scaled-Index Addressing: Here, the operand memory address is generated by the second register multiplied by a scaling factor. This kind of addressing uses two 2-bit registers. Eg: MOV AL,[EAX+4*EBX] instruction copies byte-sized contents of the data segment memory location that is addressed by EAX plus 4 times EBX into the register AL.The scaling factor may be 2,4,8 to access a word, a double-word or a quad-word memory array data.

Register Structure:

1)General purpose registers: -EAX(Accumulator) [AX, AH, AL]: It holds the temporary results after an arithmetic and logic operation. -EBX(Base Register)[BX, BH, BL]: It holds the offset address of a location in memory system. - ECX(Count)[CX,CH,CL]: It holds the counts for the various instructions and can also hold the offset address of a memory data. Used in repeated string instructions, shift, rotate, loop. -EDX(Data)[DX, DH, DL]: It holds the part of the result from a multiplication or a part of the dividend before a division. -EBP(Base Pointer)[BP]: It points to the 16 bit or 32 bit memory location. -EDI(Destination Index)[DI] : Addresses the string destination data for string instructions. -ESI(Source Index)[SI]: It addresses the source string data for string instructions.
2)Special Purpose Registers: -EIP(Instruction pointer)[IP]: The instruction pointer points to the next instruction in the program located within the code segment. -ESP(Stack Pointer)[SP]: It addresses an area of memory called the stack. The stack memory stores the data using this pointer. -EFLAGS(Flag register)[FLAGS]: -C(Carry Flag): This holds the carry after addition or borrow after subtraction. It also indicates the error condition dictated by some programs and procedures. -P(Parity Flag): P=0 for odd parity and P=1 for even parity. -A(Auxiliary Carry): it holds the carry after addition or borrow after subraction between bits 3 and 4 of the result. -Z(Zero Flag): Z=1 if the result is zero and Z=0 otherwise after the arithmetic or logic operations. -S(Sign flag): If S=1 the sign bit is set or negative. If S=0 the sign bit is cleared or positive after the execution of arithmetic and logic instructions. -T(Trap): The trap flag enables the trapping through an on-chip debugging feature. If T=0 the trap is disabled. -I(Interrupt): If I=1 the INTR pin is enabled. If I=0 the INTR pin is disabled. -D(Direction): If D=1 the registers are automatically decremented. If D=0 the registers are automatically incremented. -O(Overflow): O=1 indicates that an overflow has occurred when signed numbers are added or subtracted. For unsigned operations, the overflow flag is ignored. -IOPL(I/O Privilege level): it is used in protected mode operation to select the privilege level for I/O devices.00 is the highest or most trusted and 11 is the lowest or least trusted. -NT(Nested task): It indicates that the current task is nested within another task in protected mode of operation. -RF(resume): This flag is used with debugging to control the resumption of execution after the next instruction. -VM(Virtual Mode): This flag bit selects the virtual mode operation in protected mode system.
3)Segment registers: -CS(Code): In real mode operation, it defines the start of 64KB memory. In protected mode,it selects a descriptor that describes the starting address and length of a section of memory holding code. -DS(Data): The data segment is a section of the memory that contains most data used by a program which can be accessed by an offset address. -ES(Extra): This is an additional data segment used by some of the string instructions to hold destination data. -SS(Stack): The stack segment defines the area of memory used for the stack. The location of the most accessible element is determined by the stack pointer register and the BP register. -FS and GS: The FS and GS segments are the supplemental segment registers available in 80386. They allow 2 additional memory segments for acces by programs.
4)Control Registers: There are three Control registers CR0,CR2 & CR3.

(CR1 is left undefined by Intel). (I)CR0: (MSW- Machine Status Word) 0. PE: (Protection Enable) If PE=1-protected mode, PE=0 real-address mode. 1. MP: (Math Present): If set assumes that the arithmetic coprocessor is attached.
2. EM: (Emulate Co-processor) this bit is set to cause a type 7 interrupt for each ESC instruction
3. TS: (Task Switched): It indicates 80386 has switched tasks in protected mode.
4. ET: (Extension type) ET indicates the type of coprocessor present in the system (80287 if ET=0 or 80387 if ET=1).
5 .PG: (Paging) When set enables paging and if reset disables paging in MMU.
(II)CR2: It holds the linear page address of the last page accessed before a page fault interrupt. (III)CR3: It holds the base address of the page directory.
5) Debug and Test Registers:
There are 8 debug registers for hardware debugging. Out of these DR0 to DR7, two registers DR4 and DR5 are Intel reserved.DR0 to DR3 store four program controllable breakpoint addresses. DR6 and DR7 respectively hold breakpoint status and breakpoint control information. There are two test registers TR6 and TR7.The test registers are used to perform confidence checking on the paging MMU’s translation look aside buffer (TLB).By writing into this register one can initiate write directly into 80386 TLB or perform a mock TLB lookup. TR6 is test command register and TR7 is test data register.

Software models of 80386:
1) Real mode: After reset, the 80386 starts from memory location FFFFFFF0H under the real address mode. In real mode, the default operand size is 16 bits but 32- bit operands and addressing modes may be used with the help of override prefixes. Real mode Operation allows microprocessor to address only first 1M of memory using address lines A0-A19.The segment size in real mode is 64k, hence the 32-bit effective addressing must be less than 0000FFFFFH. Segments and offset: A combination of a segment address and an offset access a memory location in the real mode. The segment address is located within one of the segment registers which defines the beginning address. The offset address selects any location within 64Kbyte Memory segment. If segment register contains 1000H, but the starting address of the segment is taken as 10000H. In real mode each segment is internally appended with 0H on its rightmost end. This forms a 20 bit memory address. Because of internally appending 0 real mode segments can only begin at a 16-byte boundary in the memory system, this 16-byte boundary is called paragraph.

The segments in 80386 real mode may be overlapped or non-overlapped. The interrupt vector table of 80386 has been allocated 1Kbyte space starting from 00000H to 003FFH.

2)Protected mode: Protected mode memory addressing allows access to data and program located above the first 1M byte as well as within the first 1M byte of memory. No segment address is present in protected mode as it was in the real mode, instead the segment register contains a selector that selects a descriptor from the descriptor table. The descriptor table describes the memory segment’s location, length and access rights. The paging unit is a memory management unit enabled only in protected mode. The paging mechanism allows handling of large segments of memory in terms of pages of 4Kbyte size. -Selectors and descriptors: The selector is located in segment register which selects one of the 8192 descriptors from one of two tables of descriptors. There are two descriptor tables used with the segment registers: one contains global descriptors and other contains local descriptors. The global descriptors contain the segment definition that applies to all programs while the local descriptors are usually unique to an application. Each descriptor table contains 8192 descriptors, so total 16,384 descriptors are available to an application at a time. -Descriptor Tables: There are 3 types of the 80386 descriptor tables are listed as follows: •Global Descriptor Table (GDT) •Local Descriptor Table (LDT) •Interrupt Descriptor Table (IDT) -Descriptors: The 80386 descriptors have a 20-bit segment limit and 32-bit segment address. The descriptors of 80386 are 8-byte quantities having access rights or attribute bits along with the base and limit of the segments. -Base (B31-B0): It defines the starting 32 bit address of the segment within the 4GB physical address space. -Limit (L19-L0): It defines the limit of the segment in units of bytes, if G=0 else in units of 4KB if G=1. -Access Rights: it determines the privilege level and other information about the segment. -Descriptor Attribute Bits: -The D bit specifies the code segment operation size. If D=1, the segment is a 32-bit operand segment, else, it is a 16-bit operand segment. -The G (granularity): If G=0, the limit specifies the segment limit of 1 to 1 Mbyte in length as the limit is 20 bit long. If G=1, the limit is appended by 000H. This allows the segment length to be of 4 Kbytes to 4GB. -The AVL (available) bit specifies whether the descriptor is available for user (AVL=1) or not (AVL=0).
The 80386 has five types of descriptors listed as follows:
1. Code or Data Segment Descriptors.
2. System Descriptors.
3. Local descriptors.
4. TSS (Task State Segment) Descriptors.
5. GATE Descriptors.
The 80386 provides a four level protection mechanism exactly in the same way as the
80286 does.

PAGING OPERATION:
Paging is one of the memory management techniques used for virtual memory multitasking operating system. The segmentation scheme may divide the physical memory into a variable size segments but the paging divides the memory into a fixed size pages. The segments are supposed to be the logical segments of the program, but the pages do not have any logical relation with the program. The pages are just fixed size portions of the program module or data. The advantage of paging scheme is that the complete segment of a task need not be in the physical memory at any time. Only a few pages of the segments, which are required currently for the execution, need to be available in the physical memory. Thus the memory requirement of the task is substantially reduced, relinquishing the available memory for other tasks. Whenever the other pages of task are required for execution, they may be fetched from the secondary storage. The previous page which is executed need not be available in the memory, and hence the space occupied by them may be relinquished for other tasks. Thus paging mechanism provides an effective technique to manage the physical memory for multitasking systems.
-Paging Unit: The paging unit of 80386 uses a two level table mechanism to convert a linear address provided by segmentation unit into physical addresses.

The paging unit converts the complete map of a task into pages, each of size 4K. The task is further handled in terms of its page, rather than segments. The paging unit handles every task in terms of three components namely page directory, page tables and page itself.
-Paging Descriptor Base Register: The CR3 is used as page directory physical base address register, to store the physical starting address of the page directory. The lower 12 bits of the CR3 are always zero to ensure the page size aligned directory. A move operation to CR3 automatically loads the page table entry caches and a task switch operation, to load CR0 suitably.
-Page Directory: This is at the most 4Kbytes in size. Each directory entry is of 4 bytes, thus a total of 1024 entries are allowed in a directory. The upper 10 bits of the linear address are used as an index to the corresponding page directory entry. The page directory entries point to page tables.
-Page Tables: Each page table is of 4Kbytes in size and many contain a maximum of
1024 entries. The page table entries contain the starting address of the page and the statistical information about the page. The upper 20 bit page frame address is combined with the lower 12 bit of the linear address. The address bits A12- A21 are used to select the 1024 page table entries. The page table can be shared between the tasks.
•The P bit of the above entries indicates if the entry can be used in address translation.
•If P=1, the entry can be used in address translation, otherwise it cannot be used.
•The P bit of the currently executed page is always high.
•The accessed bit A is set by 80386 before any access to the page. If A=1, the page is accessed, else unaccessed.
•The D bit (Dirty bit) is set before a write operation to the page is carried out. The D-bit is undefined for page director entries.
•The OS reserved bits are defined by the operating system software.
•The User / Supervisor (U/S) bit and read/write bit are used to provide protection. These bits are decoded to provide protection under the 4 level protection model.
•The level 0 is supposed to have the highest privilege, while the level 3 is supposed to have the least privilege.
•This protection provide by the paging unit is transparent to the segmentation unit.

Virtual Mode
In its protected mode of operation, 80386DX provides a virtual 8086 operating environment to execute the 8086 programs. The real mode can also used to execute the 8086 programs along with the capabilities of 80386, like protection and a few additional instructions.
Once the 80386 enters the protected mode from the real mode, it cannot return back to the real mode without a reset operation. Thus, the virtual 8086 mode of operation of 80386, offers an advantage of executing 8086 programs while in protected mode. The address forming mechanism in virtual 8086 mode is exactly identical with that of 8086 real mode. In virtual mode, 8086 can address 1Mbytes of physical memory that may be anywhere in the 4Gbytes address space of the protected mode of 80386.Like 80386 real mode, the addresses in virtual 8086 mode lie within 1Mbytes of memory. In virtual mode, the paging mechanism and protection capabilities are available at the service of the programmers. The 80386 supports multiprogramming, hence more than one programmer may use the CPU at a time. Paging unit may not be necessarily enable in virtual mode, but may be needed to run the 8086 programs which require more than 1Mbyts of memory for memory management function. In virtual mode, the paging unit allows only 256 pages, each of 4Kbytes size. Each of the pages may be located anywhere in the maximum 4Gbytes physical memory. The virtual mode allows the multiprogramming of 8086 applications. The virtual 8086 mode executes all the programs at privilege level 3.Any of the other programmes may deny access to the virtual mode programs or data. However, the real mode programs are executed at the highest privilege level, i.e. level 0. The virtual mode may be entered using an IRET instruction at CPL=0 or a task switch at any CPL, executing any task whose TSS is having a flag image with VM flag set to 1. The IRET instruction may be used to set the VM flag and consequently enter the virtual mode. The PUSHF and POPF instructions are unable to read or set the VM bit, as they do not access it. Even in the virtual mode, all the interrupts and exceptions are handled by the protected mode interrupt handler. To return to the protected mode from the virtual mode, any interrupt or execution may be used. As a part of interrupt service routine, the VM bit may be reset to zero to pull back the 80386 into protected mode. Instruction Set: 1) Data movement instructions | mov reg, reg1mov mem/reg, regmov reg, memmov mem/reg, datamov ax/al, memmov mem, ax/almov segreg, mem16/ reg16 mov mem16/reg16, segreg | Moves (copies) data of source (2nd argument) to the destination (1st argument). No memory to memory move operation. | | xchg op1, op2 | The xchg (exchange) instruction swaps two values | | LxS dest, sourcelds/les/lfs/lgs/lss reg16, mem32 | Load 32 bit double word at the address specified by mem32 into reg16 and the ds, es, fs, gs, or ss registers. general purpose register=L.O. wordsegment register =H.O. word | | lea dest, sourcelea reg16, memlea reg32, mem | Loads the specified 16 or 32 bit general purpose register with the effective address of the specified memory location. The effective address is the final memory address obtained after all addressing mode computations. | | push reg16/reg32pop reg16/reg32 push segregpop segreg (except CS)push/pop memorypushad popad pushf popfpushfd popfd | The push instructions move data onto the hardware stack and the pop instructions move data from the stack to memory or to a register. Pushf and pushfd push the flags onto the stack. | | sahflah | lahf - load ah from flagssahf -store ah into flags | 2) Conversions | movzx dest, srcmovsx dest, srccbw cwdcwde cdqbswap reg32xlat | These instructions sign or zeroextend values, the last two convert between storage formats and translate values via alookup table | 3) Arithmetic instructions | add dest, srcadc dest, src SUB dest, src sbb dest, src mul src imul src acc= acc*srcimul dest, src1, imm_src imul dest, imm_src div src cmp dest, src neg dest inc dest dec dest xadd dest, srccmpxchg operand1, operand2 cmpxchg8ax, operand aaa aadaam aasdaa das | Add: dest := dest + srcAdc: dest := dest + src + CSub: dest := dest – srcSbb: dest := dest - src - CMul: acc := acc * srcImul: dest := src1 * imm_src dest := dest * imm_srcdiv: acc := xacc /-mod srccmp: dest - src (and set flags)neg: dest := - destinc: dest := dest + 1dec: dest := dest – 1aaa -ASCII adjust after additiondaa - decimal adjust for addition | 4)Logical operations | and dest, source or dest, source xor dest, source not dest | And: dest := dest and sourceOr: dest := dest or sourceXor: dest := dest xor sourceNot: dest := not dest | 5)The Shift Instructions | Shl/sal/shr/sar dest, countshld dest, source, count | shl (shift left) sal (shift arithmetic left) shr (shift right)sar (shift arithmetic right) | 6)The Rotate Instructions | Rcl/rol/rcr/ror dest, count | rcl (rotate through carry left)rcr (rotate through carry right)rol (rotate left)ror (rotate right). | 7) The Bit Operations | test dest, sourcebt/btc/btr/bts source, indexbsf/bsr dest, source | there are instructions to test bitswithin an operand, to test and set, clear, or invert specific bits in an operand, and to searchfor set bits | 8)I/O operations | in eax/ax/al, port/dxout port/dx, eax/ax/al | In: Read portOut: Write data in reg to port. | 9) String Instructions | movs {b,w,d} lods {b,w,d} stos {b,w,d} scas {b,w,d}cmps {b,w,d} ins {b,w,d} outs{b,w,d} rep{b,w,d} repz{b,w,d} repe{b,w,d} repnz{b,w,d} repne {b,w,d} | Movs: Move stringLods: Load string element into the accumulatorStos: Store accumulator into string elementScas: Scan string and check for match against the value in the accumulatorCmps: compare two stringsIns: input a string from an I/O portOuts: output a string to an I/O portRep: repeat a string operationRepz: repeat while zeroRepe: repeat while equalRepnz: repeat while not zeroRepne: repeat while not equal | 10)The CALL and RET Instructions | call disp16/adrs32/mem16/ reg16/mem32ret retn retf ret disp retn disp retf disp | The call and ret instructions handle subroutine calls and returns. | 11)Miscellaneous Instructions | clc | Clears the carry flag | | stc | Sets the carry flag | | cmc | Complements the carry flag | | cld | Clears the direction flag | | std | Sets the direction flag | | cli | Clears the interrupt enable/disable flag | | sti | Sets the interrupt enable/disable flag |

SET AND CONDITIONAL JUMP Instructions Instruction | Description | Condition | SETC/JC | Set/jump if carry | Carry = 1 | SETNC/JNC | Set/jump if no carry | Carry = 0 | SETZ/JZ | Set/jump if zero | Zero = 1 | SETNZ/JNZ | Set/jump if not zero | Zero = 0 | SETS/JS | Set/jump if sign | Sign = 1 | SETNS/JNS | Set/jump if no sign | Sign = 0 | SETO/JO | Set/jump if overflow | Ovrflw=1 | SETNO/JNO | Set/jump if no overflow | Ovrflw=0 | SETP/JP | Set/jump if parity | Parity = 1 | SETPE/JPE | Set/jump if parity even | Parity = 1 | SETNP/JNP | Set/jump if no parity | Parity = 0 | SETPO/JPO | Set/jump if parity odd | Parity = 0 |

Similar Documents

Free Essay

Computer Processors

...processors that handled 16- bit operations to true 32-bit chips. [pic] [pic] P4 (486) Processor - Although fourth-generation processors were more about refinement than redesign, the Intel 80486 was another major leap forward in the race for speed. The additional power available in the 486 fueled tremendous growths in the software industry. [pic][pic] P5 (586) Processor - After the fourth-generation chips such as the 486, Intel and other chip manufacturers went back to the drawing board to come up with new architectures and features that they would later incorporate into what they called fifth-generation chips. On October 19, 1992, Intel announced that the fifth generation of its compatible microprocessor line (code- named P5) would be named the Pentium processor. [pic] [pic] P6 (686) processors represent a new generation with...

Words: 758 - Pages: 4

Free Essay

Intel and the Microprocessor

...Term Paper: History of Intel and its microprocessors The microprocessor is a chip made of silicon that holds a central processing unit. Both the term’s central processing unit or CPU and microprocessor can be used and mean the same thing. The human brain has been compared to a microprocessor. Microprocessors are ultra fast calculators and what makes a microprocessor appear intelligent is the speed at which it can process data. The electronics industry names, microprocessors first by makers name and then model family name or number. A recent example, are the Intel Core i7 and AMD FX 8 Core Black Edition. Microprocessors provides scientist, engineers, architects, graphic designers, researchers, and other professionals with the processing power users to perform all the many functions needed to do their jobs and make new discoveries and explore what before could not have been even imagined. The history of microprocessors will be covered; this includes the history of Intel Corporation, important highlights in the development of the microprocessor. All digital computers use electronic switches. These switches represent binary digits or bits. The first computers used vacuum tubes as switches to represent on-or-off binary data, but vacuum tubes had many problems. Without the invention of the transistor, microprocessors and the modern computer would not be possible. Bell Laboratory engineers John Bardeen and Walter Brattain invented the transistor in 1947 (transistor). Transistors...

Words: 1753 - Pages: 8

Free Essay

Hardware

...architecture and 8086 microprocessor specifically. 1. What is a Microprocessor? - Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and executes the instructions. Most Micro Processor are single- chip devices. 2. Give examples for 8 / 16 / 32 bit Microprocessor? - 8-bit Processor - 8085 / Z80 / 6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486. 3. Why 8085 processor is called an 8 bit processor? - Because 8085 processor has 8 bit ALU (Arithmetic Logic Review). Similarly 8086 processor has 16 bit ALU. 4. What is 1st / 2nd / 3rd / 4th generation processor? - The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits. 5. Define HCMOS? - High-density n- type Complimentary Metal Oxide Silicon field effect transistor. 6. What does microprocessor speed depend on? - The processing speed depends on DATA BUS WIDTH. 7. Is the address bus unidirectional? - The address bus is unidirectional because the address information is always given by the Micro Processor to address a memory location of an input / output devices. 8. Is the data bus is Bi-directional? - The data bus is Bi-directional because the same bus is used for transfer of data between Micro Processor and memory or input / output devices in both the direction. 9. What is the disadvantage of microprocessor? - It has limitations...

Words: 926 - Pages: 4

Free Essay

Nasa

...A History of Microprocessor Transistor Count 1971 to 2013 Source: Wikipedia, August 29, 2013 Processor Intel 4004 Intel 8008 MOS Technology 6502 Motorola 6800 Intel 8080 RCA 1802 Intel 8085 Zilog Z80 Motorola 6809 ARM 1 ARM 2 Intel 8086 Intel 8088 ARM 6 Intel 80186 Motorola 68000 Intel 80286 Intel 80386 ARM 3 ARM 7 Intel 80486 R4000 Pentium AMD K5 Pentium Pro Pentium II AMD K6 Pentium III Transistor count 2,300 3,500 Date of introduction 1971 1972 3,510[citation needed] 4,100 4,500 5,000 6,500 8,500 9,000 25,000[1] 25,000 29,000 29,000 30,000 55,000 68,000 134,000 275,000 300,000[2] 578977[3] 1,180,235 1,350,000 3,100,000 4,300,000 5,500,000[4] 7,500,000 8,800,000 9,500,000 Manufacturer Process Area Intel Intel 10 µm 10 µm 12 mm² 14 mm² 1975 MOS Technology 8 μm 21 mm² 1974 1974 1974 1976 1976 1978 1985 1986 1978 1979 1991 1982 1979 1982 1985 1989 1994 1989 1991 1993 1996 1995 1997 1997 1999 Motorola Intel RCA Intel Zilog Motorola Acorn Acorn Intel Intel ARM Intel Motorola Intel Intel Acorn ARM Intel MIPS Intel AMD Intel Intel AMD Intel 6 μm 6 μm 5 μm 3 μm 4 μm 5 μm 16 mm² 20 mm² 27 mm² 20 mm² 18 mm² 21 mm² 3 μm 3 μm 33 mm² 33 mm² 3 μm 4 μm 44 mm² 1.5 µm 49 mm² 1.5 µm 104 mm² 68.51 mm² 1 µm 173 mm² 1.0 µm 213 mm² 0.8 µm 294 mm² 0.5 µm 251 mm² 0.5 µm 307 mm² 0.35 µm 195 mm² 0.35 µm...

Words: 813 - Pages: 4

Free Essay

Tikle

...CPU Alternately referred to as a processor, central processor, or microprocessor, the CPU is the Central Processing Unit of the computer. The CPU handles all instructions it receives from hardware and software running on the computer. The CPU chip is usually in the shape of a square or rectangle and has one notched corner to help place the chip properly into the CPU socket. On the bottom of the chip are hundreds of connector pins that plug into each of the corresponding holes in the socket. Today, with slot processors that were much larger and slid into a slot on the motherboard. Also, over the years, there have been dozens of different types of sockets on motherboards. Each socket only supports specific types of processors and each has its own pin layout. The CPU was first developed at Intel with the help of Ted Hoff and others in the early 1970's. The first processor released by Intel was the 4004 processor. In the past, computer processors used numbers to identify the processor and help identify faster processors. For example, the Intel 80486 processor is faster than the 80386 processor. After the introduction of the Intel Pentium processor, all computer processors started using names like Athlon, Duron, Pentium, and Celeron. in addition to the different names of computer processors, there are different architectures 32-bit and 64-bit, speeds, and capabilities. Cpu is an electronic circuit within a computer that carries out the instructions of a computer program by performing...

Words: 361 - Pages: 2

Free Essay

Business and Management

...9-797-137 REV. MAY 22, 2008 DAVID COLLIS GARY PISANO Intel Corporation: 1968-1997 By January 1997, Intel, a Silicon Valley start-up, had attained a stock market valuation of $113 billion that ranked it among the top five American companies. Much of Intel’s success had been due to microprocessors, a product it invented in 1971 and in which it continued to set the pace. Despite the company’s illustrious history and enviable success, its Chairman and CEO, Andy Grove, worried about the challenges ahead: Business success contains the seeds of its own destruction. The more successful you are, the more people want a chunk of your business and then another chunk and then another until there is nothing left. I believe that the prime responsibility of a manager is to guard constantly against other people’s attacks.1 This case begins by describing Intel’s origins as a semiconductor company before turning to its evolution into the leading manufacturer of microprocessors. Intel: The Early Years Intel was founded in 1968 by Robert Noyce (one of the co-inventors of the integrated circuit) and Gordon Moore, both of whom had been senior executives at Fairchild Semiconductors. They, in turn, recruited Andy Grove, who was then Assistant Director of Research at Fairchild. From the beginning, this trio was the driving force behind Intel. The company’s initial strategy was to develop semiconductor memory chips for mainframe computers and minicomputers. Andy Grove recalled that after receiving...

Words: 11311 - Pages: 46

Free Essay

Integrated Circuit Tech

...A History of Microprocessor Transistor Count 1971 to 2013 Source: Wikipedia, August 29, 2013 Processor Intel 4004 Intel 8008 MOS Technology 6502 Motorola 6800 Intel 8080 RCA 1802 Intel 8085 Zilog Z80 Motorola 6809 ARM 1 ARM 2 Intel 8086 Intel 8088 ARM 6 Intel 80186 Motorola 68000 Intel 80286 Intel 80386 ARM 3 ARM 7 Intel 80486 R4000 Pentium AMD K5 Pentium Pro Pentium II AMD K6 Pentium III Transistor count 2,300 3,500 Date of introduction 1971 1972 3,510[citation needed] 4,100 4,500 5,000 6,500 8,500 9,000 25,000[1] 25,000 29,000 29,000 30,000 55,000 68,000 134,000 275,000 300,000[2] 578977[3] 1,180,235 1,350,000 3,100,000 4,300,000 5,500,000[4] 7,500,000 8,800,000 9,500,000 Manufacturer Process Area Intel Intel 10 µm 10 µm 12 mm² 14 mm² 1975 MOS Technology 8 μm 21 mm² 1974 1974 1974 1976 1976 1978 1985 1986 1978 1979 1991 1982 1979 1982 1985 1989 1994 1989 1991 1993 1996 1995 1997 1997 1999 Motorola Intel RCA Intel Zilog Motorola Acorn Acorn Intel Intel ARM Intel Motorola Intel Intel Acorn ARM Intel MIPS Intel AMD Intel Intel AMD Intel 6 μm 6 μm 5 μm 3 μm 4 μm 5 μm 16 mm² 20 mm² 27 mm² 20 mm² 18 mm² 21 mm² 3 μm 3 μm 33 mm² 33 mm² 3 μm 4 μm 44 mm² 1.5 µm 49 mm² 1.5 µm 104 mm² 68.51 mm² 1 µm 173 mm² 1.0 µm 213 mm² 0.8 µm 294 mm² 0.5 µm 251 mm² 0.5 µm 307 mm² 0.35 µm 195 mm² 0.35 µm...

Words: 813 - Pages: 4

Premium Essay

Information System

...1 Civilization advances by extending the number of important operations which we can perform without thinking about them. Alfred North Whitehead, An Introduction to Mathematics, 1911 Computer Abstractions and Technology 1.1 Introduction 3 1.2 Eight Great Ideas in Computer Architecture 11 1.3 Below Your Program 13 1.4 Under the Covers 16 1.5 Technologies for Building Processors and Memory 24 1.6 Performance 28 1.7 The Power Wall 40 1.8 The Sea Change: The Switch from Uniprocessors to Multiprocessors 43 1.9 Real Stuff: Benchmarking the Intel Core i7 46 1.10 Fallacies and Pitfalls 49 1.11 Concluding Remarks 52 1.12 Historical Perspective and Further Reading 54 1.13 Exercises 54 1.1 Introduction Welcome to this book! We’re delighted to have this opportunity to convey the excitement of the world of computer systems. This is not a dry and dreary field, where progress is glacial and where new ideas atrophy from neglect. No! Computers are the product of the incredibly vibrant information technology industry, all aspects of which are responsible for almost 10% of the gross national product of the United States, and whose economy has become dependent in part on the rapid improvements in information technology promised by Moore’s Law. This unusual industry embraces innovation at a breath-taking rate. In the last 30 years, there have been a number of new computers whose introduction...

Words: 24107 - Pages: 97

Premium Essay

Computer Organization and Architecture Designing for Performance 8th Edition

...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...

Words: 239771 - Pages: 960

Premium Essay

Heuy2Kj4

...the essentials of Linda Null and Julia Lobur JONES AND BARTLETT COMPUTER SCIENCE the essentials of Linda Null Pennsylvania State University Julia Lobur Pennsylvania State University World Headquarters Jones and Bartlett Publishers 40 Tall Pine Drive Sudbury, MA 01776 978-443-5000 info@jbpub.com www.jbpub.com Jones and Bartlett Publishers Canada 2406 Nikanna Road Mississauga, ON L5C 2W6 CANADA Jones and Bartlett Publishers International Barb House, Barb Mews London W6 7PA UK Copyright © 2003 by Jones and Bartlett Publishers, Inc. Cover image © David Buffington / Getty Images Illustrations based upon and drawn from art provided by Julia Lobur Library of Congress Cataloging-in-Publication Data Null, Linda. The essentials of computer organization and architecture / Linda Null, Julia Lobur. p. cm. ISBN 0-7637-0444-X 1. Computer organization. 2. Computer architecture. I. Lobur, Julia. II. Title. QA76.9.C643 N85 2003 004.2’2—dc21 2002040576 All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or any information storage or retrieval system, without written permission from the copyright owner. Chief Executive Officer: Clayton Jones Chief Operating Officer: Don W. Jones, Jr. Executive V.P. and Publisher: Robert W. Holland, Jr. V.P., Design and Production: Anne Spencer V.P., Manufacturing and...

Words: 118595 - Pages: 475

Premium Essay

Intel Pentium Microprocessor Flaw

...Pentium Microprocessor Flaw NT1110 19 October, 2013 Pentium Microprocessor Flaw Pentium microprocessor flaw was in the floating-point math subsection. The flaw was found where the division result returned by the Pentium microprocessor was off by approximately sixty-one parts per million. Once Intel pinpointed the flaw, their solution was to keep the information within the company and not disclose the information to the public. Regardless of the fact that the flaw did not affect all microprocessors, it actually only affected a very small number of customers, Intel should have openly acknowledged the problem. When customers would call into Intel with issues concerning the flaw, Intel would input a certain code into it in order to verify that was in fact the problem. Once the problem was identified, Intel then would implement a solution. However, if Intel had openly accepted and informed the clients about the issue, it most likely would have saved them not only money but also their reputation between the company and their existing clients. Needless to say, their decision resulted in some very unhappy customers. If this same type of flaw was to be found in a new CPU today, the company would surely fail. With a problem in the floating-point math subsection with an error of approximately sixty-one parts per million, this would cause too many problems for the clients today. Especially considering that Intel declined the opportunity to inform their customers and supply a solution...

Words: 275 - Pages: 2

Premium Essay

Google Glass

...ACKNOWLEDGEMENT [pic] We would like to thank Asst. Prof., Ila Parmar for her guidance, her support and the opportunity to work on this project and H.O.D., Mr. Lokhandvala for his support and the encouragement. We would also like to thank our families for their constant support, encouragement and motivation without which the accomplishment of this project would not be possible. We would also like to thank our friends and all the people who directly or indirectly played a role in this project. ABSTRACT [pic] Mankind has always strived to give life like qualities to it’s artifacts in an attempt to find substitutes for himself to carry out his orders and also to work in a hostile environment. The popular concept of a robot is of a machine that looks like a human being. Cleaning of floors of rooms and corridor usually involves lot of effort and labour on the part of the person doing it. It causes much trouble, waste of time and energy on the part of humans. Moreover, it also proves to be expensive if a person is hired for doing it. It also makes the employer dependent on the person hired for getting the job done. Thus it bounds people in a way and renders them helpless. What if this process is made automatic and independent of any apparent human role. This can be done with the help of embedded technology and automation. That is the job we as future EC engineers have undertaken. The process of cleaning can be...

Words: 658 - Pages: 3

Free Essay

Ibm Power6 Microprocessor (64 Bit)

...IBM POWER6 Microprocessor (64 bit) Term Paper: ECE312 Rahul Sihag Section: K2103, Roll no: B26 B Tech CSE Lovely Professional University Phagwara, Punjab, India rahulsihagg@gmail.com Abstract— This term paper is about IBM POWER6 Microprocessors. It covers Introduction, Core chapters including definition, description, history, design etc. It also includes their Applications, Future perspective and Conclusion etc. Index Terms— Introduction, Core chapters, Applications & Future perspective, Conclusion. I. INTRODUCTION A. Microprocessors A silicon chip that contains a CPU. In the world of personal computers, the terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and most workstations sits a microprocessor. Microprocessors also control the logic of almost all digital devices, from clock radios to fuel-injection systems for automobiles. It is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output. Intel introduced its first 4-bit microprocessor 4004 in 1971 and its 8-bit microprocessor 8008 in 1972. B. IBM POWER6 Microprocessors The POWER6 is a microprocessor developed by IBM that implemented the Power ISA v.2.03. When it became available in systems in 2007, it succeeded the POWER5+ as IBM's flagship Power microprocessor. The POWER6 processor is the latest generation in the POWER line of PowerPC processors...

Words: 3085 - Pages: 13

Free Essay

Digital Divide

..."A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the Internet, and people who do not have the resources and access to the technology. The term also describes the discrepancy between those who have the skills, knowledge and abilities to use the technologies and those who do not. The digital divide can exist between those living in rural areas and those living in urban areas, between the educated and uneducated, between economic classes, and on a global scale between more and less industrially developed nations (webopedia.com) ." I guess from my opinion I am still stuck on the digital divide process also. In the area that I live it is very low income and at least 90 percent of the parents are using the government to pay their child care. This speaks volume for the need of computers in this town. I talk with many parents on where to go on the internet to find a job and almost all of them tell me that they don’t have a computer. Then I suggest they go to the library and now I learned that the library only have four computers. When I look around this town I see why most people have not progress to better living. Since you and I know that it takes a computer most of the time to find a job, because no one want to use paper application anymore. The web is the maximum advancement of knowledge in my lifetime the of destroyer applications for the computer. Believe it or not there...

Words: 850 - Pages: 4

Premium Essay

History of Computers

...that this was to consider to be the first remote access computing using a teletype connected via special telephone lines through this timeline.( 2006 Computer History Museum) it will show that from the moment Computers was thought of and how the build went through a concept of steps before fully calling a (PC) an Personal Computer a lot of what I have read and seen through the timeline of the history of are computers for every new year a new chapter starts in building a fully functional computer but over time is where it took for where it all began as different components that different Engineers build. To get or build a fully functional computer from the components that make it you will start with a Case, Power Supply, Motherboard, Microprocessor, Memory, Drive Controllers, Hard disk drive(s), CD-ROM drives(s), Floppy disk drive, Monitor, Keyboard, Mouse and other possible file storage devices include DVD devices and Tape backup devices these are the components that make up a basic computer in today’s world where through are timeline and history a lot of these components was not put into one computer at one time a lot of are beginning (PC) was not really call Computers...

Words: 1191 - Pages: 5