Salient features of advanced microprocessors. RISC & CISC processors.
Review and evolution of advanced micro proc :8086,8088, 80186/286/386/486/Pentium
Introduction to 8086 processor: Register organization of 8086,
Architecture, signal description of 8086,minimum mode 8086 systems and timings and maximum mode 8086 systems and timings
This document provides information about IPv4 and IPv6 by comparing their key aspects. IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more available addresses. IPv4 addresses are represented in dotted decimal notation while IPv6 uses colon-separated hexadecimal. IPv6 was developed to address limitations in IPv4 such as address space exhaustion and lack of security features. The document outlines differences between the two protocols in areas like packet fragmentation, checksums, and address types.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
NETCONF and YANG provide improved systems management of IoT networks. NETCONF allows retrieving and manipulating configuration and state data on network devices over SSH. It addresses limitations of SNMP like distinguishing configuration from state data. YANG defines the data models for the configuration and state data exchanged between NETCONF clients and servers using XML. Together, NETCONF and YANG enable ease of use, separate handling of configuration and state, and configuration of entire networks.
The document discusses the Raspberry Pi, a credit card-sized computer originally designed for education. It provides details on the history and components of the Raspberry Pi. The Raspberry Pi was created in 2012 by the Raspberry Pi Foundation in the UK. Several models have been released since then with improvements like additional RAM, WiFi/Bluetooth capabilities, and more powerful processors. The Raspberry Pi runs Linux and can be used for tasks like web browsing, programming, and electronics projects. Examples of projects developed with Raspberry Pi include desktop computers, smart mirrors, gaming devices, robots, and IoT sensors.
This document provides instructions for setting up web and FTP servers on a single computer. It describes how to use the Internet Information Services (IIS) tool in Windows to create a web server and configure it with a website document folder. It then explains how to use IIS to similarly create an FTP server and specify its file path. Finally, it indicates how to verify the functionality of both servers from the local host computer. The steps provided configure basic file and web hosting on a single machine using IIS.
IPv6 is the next generation Internet Protocol that provides a vastly larger number of IP addresses compared to the current IPv4. It features 128-bit addressing which allows for trillions of devices to have unique IP addresses. IPv6 also aims to make networking more secure and allow for more efficient routing. The transition from IPv4 to IPv6 is underway, with most modern operating systems and network hardware now supporting IPv6, though applications support is still growing. IPv6's expanded addressing capabilities and additional features will help meet future demands on the Internet as more devices connect online.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
This document provides an overview of wireless technology. It discusses how wireless uses electromagnetic waves for communication and how early wireless transmitters used radiotelegraphy. It describes different types of wireless including fixed, mobile, portable, and infrared. Examples of common wireless technologies are given like cellular phones, GPS, and cordless peripherals. The document also discusses the history and development of wireless technology as well as comparisons to wired networks in terms of speed, installation, reliability, and cost. Finally, it outlines how wireless networks work and describes technologies like Wi-Fi and Bluetooth.
This document provides information about IPv4 and IPv6 by comparing their key aspects. IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more available addresses. IPv4 addresses are represented in dotted decimal notation while IPv6 uses colon-separated hexadecimal. IPv6 was developed to address limitations in IPv4 such as address space exhaustion and lack of security features. The document outlines differences between the two protocols in areas like packet fragmentation, checksums, and address types.
This document provides an introduction and overview of IPv6, including:
- IPv6 is the next generation internet protocol that will replace IPv4, providing a vastly larger address space and additional features.
- The key reasons for adopting IPv6 are that IPv4 addresses are running out due to the exponential growth of internet-connected devices, while IPv6 supports 128-bit addresses providing trillions of times more addresses.
- IPv6 addresses are 128-bit compared to 32-bit IPv4 addresses, written in hexadecimal format divided into eight groups, and features include improved security, mobility, and traffic routing capabilities.
NETCONF and YANG provide improved systems management of IoT networks. NETCONF allows retrieving and manipulating configuration and state data on network devices over SSH. It addresses limitations of SNMP like distinguishing configuration from state data. YANG defines the data models for the configuration and state data exchanged between NETCONF clients and servers using XML. Together, NETCONF and YANG enable ease of use, separate handling of configuration and state, and configuration of entire networks.
The document discusses the Raspberry Pi, a credit card-sized computer originally designed for education. It provides details on the history and components of the Raspberry Pi. The Raspberry Pi was created in 2012 by the Raspberry Pi Foundation in the UK. Several models have been released since then with improvements like additional RAM, WiFi/Bluetooth capabilities, and more powerful processors. The Raspberry Pi runs Linux and can be used for tasks like web browsing, programming, and electronics projects. Examples of projects developed with Raspberry Pi include desktop computers, smart mirrors, gaming devices, robots, and IoT sensors.
This document provides instructions for setting up web and FTP servers on a single computer. It describes how to use the Internet Information Services (IIS) tool in Windows to create a web server and configure it with a website document folder. It then explains how to use IIS to similarly create an FTP server and specify its file path. Finally, it indicates how to verify the functionality of both servers from the local host computer. The steps provided configure basic file and web hosting on a single machine using IIS.
IPv6 is the next generation Internet Protocol that provides a vastly larger number of IP addresses compared to the current IPv4. It features 128-bit addressing which allows for trillions of devices to have unique IP addresses. IPv6 also aims to make networking more secure and allow for more efficient routing. The transition from IPv4 to IPv6 is underway, with most modern operating systems and network hardware now supporting IPv6, though applications support is still growing. IPv6's expanded addressing capabilities and additional features will help meet future demands on the Internet as more devices connect online.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
This document provides an overview of wireless technology. It discusses how wireless uses electromagnetic waves for communication and how early wireless transmitters used radiotelegraphy. It describes different types of wireless including fixed, mobile, portable, and infrared. Examples of common wireless technologies are given like cellular phones, GPS, and cordless peripherals. The document also discusses the history and development of wireless technology as well as comparisons to wired networks in terms of speed, installation, reliability, and cost. Finally, it outlines how wireless networks work and describes technologies like Wi-Fi and Bluetooth.
Network devices like repeaters, hubs, bridges, switches and routers are used to extend and segment networks. Repeaters regenerate signals to increase cable length while hubs connect cables without regeneration. Bridges segment networks at the data link layer using MAC addresses. Switches increase performance by opening virtual circuits between devices. Routers connect multiple networks at the network layer using IP addresses and dynamic routing.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
This document discusses FiberHome's Smart ODN solution for optical distribution networks. It begins with an overview of the history and challenges of copper and optical cabling systems. It then describes FiberHome's Smart ODN solution, which uses electronic identification and radio frequency identification technologies to automatically collect device and port information. This allows for unified resource management, optimized service provisioning, and improved network operations and maintenance. The document provides examples of Smart ODN hardware and functions. It concludes with a case study showing the benefits realized by China Mobile in implementing FiberHome's Smart ODN solution, such as increased fiber resource utilization, faster service provisioning speeds, and reduced maintenance periods.
The document discusses the need for and features of IPv6, the next generation Internet Protocol. IPv4 is running out of addresses due to the exponential growth of Internet-connected devices. IPv6 provides a much larger 128-bit address space to accommodate this growth. Key features of IPv6 include stateless address autoconfiguration, improved security through mandatory encryption, simpler packet headers, and mobility support. IPv6 also supports new address types and aggregation to improve routing efficiency.
The document summarizes key aspects of the Wireless HART network architecture and security mechanism. It describes:
1) The Wireless HART network architecture includes field devices, routers, adapters, access points, and a gateway connected to a network manager.
2) The basic components of Wireless HART are the gateway, network manager, security manager, field devices, repeaters, and adapters. It supports up to 250 devices.
3) Wireless HART implements 128-bit AES encryption for security, using frequency hopping, encryption keys, and device authentication. The security manager generates and manages encryption keys.
This document outlines plans for a DIY smart home hub controller project. It discusses requirements like working without internet, visual/audio feedback, and low cost. The project will use an ESP32 microcontroller to control actuators and sensors via various protocols. Non-functional requirements around usability, security, reliability and more are also presented. The system architecture diagram shows key functions like OTA updates, GUI, communication protocols and more. Challenges addressed include driver conversion, temperature issues, enclosure design and memory optimizations. Future plans include upgrading the display and adding LoRa wireless support.
The document summarizes 6LoWPAN, an open IoT networking protocol specified by the IETF. 6LoWPAN allows IPv6 to be used over low-power wireless personal area networks (LoWPANs) by defining an adaptation layer that compresses IPv6 and UDP headers to accommodate the small packet sizes supported by IEEE 802.15.4 networks. It describes how 6LoWPAN uses header compression techniques like IPHC and NHC to reduce header overhead and enable IPv6 connectivity for constrained IoT devices. The document also provides an overview of the Linux-wpan project, which implements 6LoWPAN and IEEE 802.15.4 support in the Linux kernel.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
This document provides an overview of IPv6, including:
- The need for IPv6 due to the depletion of IPv4 addresses and limitations of IPv4's classful addressing.
- Techniques used to extend IPv4 like subnetting, CIDR, and NAT.
- Key features of IPv6 like its larger 128-bit address space, stateless autoconfiguration, and security improvements.
- Differences between IPv4 and IPv6 headers and IPv6's use of extension headers.
- The presentation concludes that IPv6 builds upon IPv4's foundations but addresses its limitations.
IPv6 is the next generation Internet protocol that replaces IPv4. It features a vastly larger 128-bit address space to avoid future address exhaustion. IPv6 addresses are written as eight groups of four hexadecimal digits separated by colons and supports stateless autoconfiguration of hosts and other improvements over IPv4.
This document provides an overview of Arduino programming concepts including:
- The Arduino programming language is based on C/C++ and includes libraries for interfacing with hardware.
- Examples are provided for basic blink programs, using variables, functions, control structures like if statements and loops, reading analog/digital pins, and using the serial monitor.
- Key concepts covered include variable scope, data types, naming conventions, pin modes, analog/digital reading and writing, functions, arrays, and different loop structures.
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
High level overview of CoAP or Constrained Application Protocol. CoAP is a HTTP like protocol suitable for constrained environment like IoT. CoAP uses HTTP like request response model, status code etc.
This document discusses sensors and actuators in Industry 4.0 and the Industrial Internet of Things. It defines sensors as devices that detect physical quantities and convert them into signals, and actuators as devices that convert energy signals into motion or force. It classifies sensors as passive or active, analog or digital, and scalar or vector. It also describes common sensor characteristics and classifications of actuators such as electric, fluid power, and manual linear and rotary actuators.
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....Marcin Bielak
- The document provides an overview of various Internet of Things (IoT) communication protocols including MQTT, HTTP/REST, and DDS.
- It discusses the key aspects of MQTT including its publish-subscribe model, use of a message broker, lightweight design, and quality of service levels. HTTP/REST is described as using a client-server model with status codes and uniform interfaces.
- The document also compares MQTT and HTTP/REST, noting MQTT is simpler, message-centric, and ideal for low-power IoT devices, while HTTP/REST is more complex, document-centric, and the standard web protocol.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
ccfghlm,,fghggjjghkgkjkjkjklhljhlkjhljhlhjl
bnjkhhkbkbn,mn,mn,mn,mn,mn,mn,m,mn,bn,bn,mbn,bj,bjbj,bjbj,bm, dvglksmndgopjpjmlkvmsodfgjhonjhlkmnlkmdvokji0fpqokdf[k[akfmcadokjvojisdlkmlkswopdvgopko;pmfasd f
\plvsf[prblpk[bnpk
The document lists and provides details on many early processors from Intel and other manufacturers in chronological order. It begins with the 4-bit Intel 4004 microprocessor from 1971 and discusses the related MCS-4 family. It then covers the early 8-bit processors like the 8008 and 8080, and later 8-bit processors like the 8085. The document also summarizes Intel's early microcontroller lines like the MCS-48 family based on the 8048 and the MCS-51 family based on the 8051. It concludes by briefly mentioning the 16-bit Intel 8086 processor and some of its variants like the 8088 and 80186.
Network devices like repeaters, hubs, bridges, switches and routers are used to extend and segment networks. Repeaters regenerate signals to increase cable length while hubs connect cables without regeneration. Bridges segment networks at the data link layer using MAC addresses. Switches increase performance by opening virtual circuits between devices. Routers connect multiple networks at the network layer using IP addresses and dynamic routing.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
This document discusses FiberHome's Smart ODN solution for optical distribution networks. It begins with an overview of the history and challenges of copper and optical cabling systems. It then describes FiberHome's Smart ODN solution, which uses electronic identification and radio frequency identification technologies to automatically collect device and port information. This allows for unified resource management, optimized service provisioning, and improved network operations and maintenance. The document provides examples of Smart ODN hardware and functions. It concludes with a case study showing the benefits realized by China Mobile in implementing FiberHome's Smart ODN solution, such as increased fiber resource utilization, faster service provisioning speeds, and reduced maintenance periods.
The document discusses the need for and features of IPv6, the next generation Internet Protocol. IPv4 is running out of addresses due to the exponential growth of Internet-connected devices. IPv6 provides a much larger 128-bit address space to accommodate this growth. Key features of IPv6 include stateless address autoconfiguration, improved security through mandatory encryption, simpler packet headers, and mobility support. IPv6 also supports new address types and aggregation to improve routing efficiency.
The document summarizes key aspects of the Wireless HART network architecture and security mechanism. It describes:
1) The Wireless HART network architecture includes field devices, routers, adapters, access points, and a gateway connected to a network manager.
2) The basic components of Wireless HART are the gateway, network manager, security manager, field devices, repeaters, and adapters. It supports up to 250 devices.
3) Wireless HART implements 128-bit AES encryption for security, using frequency hopping, encryption keys, and device authentication. The security manager generates and manages encryption keys.
This document outlines plans for a DIY smart home hub controller project. It discusses requirements like working without internet, visual/audio feedback, and low cost. The project will use an ESP32 microcontroller to control actuators and sensors via various protocols. Non-functional requirements around usability, security, reliability and more are also presented. The system architecture diagram shows key functions like OTA updates, GUI, communication protocols and more. Challenges addressed include driver conversion, temperature issues, enclosure design and memory optimizations. Future plans include upgrading the display and adding LoRa wireless support.
The document summarizes 6LoWPAN, an open IoT networking protocol specified by the IETF. 6LoWPAN allows IPv6 to be used over low-power wireless personal area networks (LoWPANs) by defining an adaptation layer that compresses IPv6 and UDP headers to accommodate the small packet sizes supported by IEEE 802.15.4 networks. It describes how 6LoWPAN uses header compression techniques like IPHC and NHC to reduce header overhead and enable IPv6 connectivity for constrained IoT devices. The document also provides an overview of the Linux-wpan project, which implements 6LoWPAN and IEEE 802.15.4 support in the Linux kernel.
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
Book include how we can execute practical in cisco packet tracer.There are around 18 experiment covered .It contains topology also information about basic elements hub router.how we established
connection using HTTP and FTP protocols Also transferring Gmail and VOIP (Voice over IP) experiment. DHCP experiment included. How we create subnetmask.
This document provides an overview of IPv6, including:
- The need for IPv6 due to the depletion of IPv4 addresses and limitations of IPv4's classful addressing.
- Techniques used to extend IPv4 like subnetting, CIDR, and NAT.
- Key features of IPv6 like its larger 128-bit address space, stateless autoconfiguration, and security improvements.
- Differences between IPv4 and IPv6 headers and IPv6's use of extension headers.
- The presentation concludes that IPv6 builds upon IPv4's foundations but addresses its limitations.
IPv6 is the next generation Internet protocol that replaces IPv4. It features a vastly larger 128-bit address space to avoid future address exhaustion. IPv6 addresses are written as eight groups of four hexadecimal digits separated by colons and supports stateless autoconfiguration of hosts and other improvements over IPv4.
This document provides an overview of Arduino programming concepts including:
- The Arduino programming language is based on C/C++ and includes libraries for interfacing with hardware.
- Examples are provided for basic blink programs, using variables, functions, control structures like if statements and loops, reading analog/digital pins, and using the serial monitor.
- Key concepts covered include variable scope, data types, naming conventions, pin modes, analog/digital reading and writing, functions, arrays, and different loop structures.
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
High level overview of CoAP or Constrained Application Protocol. CoAP is a HTTP like protocol suitable for constrained environment like IoT. CoAP uses HTTP like request response model, status code etc.
This document discusses sensors and actuators in Industry 4.0 and the Industrial Internet of Things. It defines sensors as devices that detect physical quantities and convert them into signals, and actuators as devices that convert energy signals into motion or force. It classifies sensors as passive or active, analog or digital, and scalar or vector. It also describes common sensor characteristics and classifications of actuators such as electric, fluid power, and manual linear and rotary actuators.
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....Marcin Bielak
- The document provides an overview of various Internet of Things (IoT) communication protocols including MQTT, HTTP/REST, and DDS.
- It discusses the key aspects of MQTT including its publish-subscribe model, use of a message broker, lightweight design, and quality of service levels. HTTP/REST is described as using a client-server model with status codes and uniform interfaces.
- The document also compares MQTT and HTTP/REST, noting MQTT is simpler, message-centric, and ideal for low-power IoT devices, while HTTP/REST is more complex, document-centric, and the standard web protocol.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
ccfghlm,,fghggjjghkgkjkjkjklhljhlkjhljhlhjl
bnjkhhkbkbn,mn,mn,mn,mn,mn,mn,m,mn,bn,bn,mbn,bj,bjbj,bjbj,bm, dvglksmndgopjpjmlkvmsodfgjhonjhlkmnlkmdvokji0fpqokdf[k[akfmcadokjvojisdlkmlkswopdvgopko;pmfasd f
\plvsf[prblpk[bnpk
The document lists and provides details on many early processors from Intel and other manufacturers in chronological order. It begins with the 4-bit Intel 4004 microprocessor from 1971 and discusses the related MCS-4 family. It then covers the early 8-bit processors like the 8008 and 8080, and later 8-bit processors like the 8085. The document also summarizes Intel's early microcontroller lines like the MCS-48 family based on the 8048 and the MCS-51 family based on the 8051. It concludes by briefly mentioning the 16-bit Intel 8086 processor and some of its variants like the 8088 and 80186.
The document discusses the Intel 80286 microprocessor. It introduces the 80286 as a 16-bit microprocessor introduced in 1982 with separate address and data buses. It had approximately 134,000 transistors and clock speeds up to 12.5 MHz. The 80286 supported both real and protected virtual addressing modes, advanced memory management, and was compatible with the 8086 instruction set. It had features like 4-level memory protection and could address up to 16MB of physical memory or 1GB of virtual memory.
The 8086 microprocessor is Intel's first 16-bit microprocessor. It has a 16-bit data bus and 20-bit address bus, allowing it to access up to 1MB of memory. The 8086 uses segmented memory architecture, dividing memory into segments of up to 64KB addressed through segment registers. It has on-chip registers for code, data, stack, and one extra segment. The 8086's execution and bus interface units operate in parallel via an instruction queue, enabling pipelined processing.
The 8086 microprocessor is Intel's first 16-bit microprocessor. It has a 16-bit data bus and 20-bit address bus, allowing it to access up to 1MB of memory. The 8086 uses segmented memory architecture, dividing memory into segments of up to 64KB addressed through segment registers. It has on-chip registers for code, data, stack, and one extra segment. The 8086's execution and bus interface units operate in parallel via an instruction queue, enabling pipelined processing.
Microprocessors and microcontrollers both have CPUs and are used for real-time applications, but they differ in key ways. Microprocessors are standalone chips that require external memory and I/O devices, have higher clock speeds, and are more versatile. Microcontrollers integrate CPU, memory, and I/O on a single chip, have lower clock speeds, and are cheaper and used for embedded systems. The 8085 was an early 8-bit microprocessor from Intel that had 40 pins, accessed 64KB of memory, and was used in early PCs and instruments.
The 8086 microprocessor was Intel's first 16-bit microprocessor released in 1978. It had several improvements over previous processors including being 16-bit instead of 8-bit, having an instruction queue to improve performance, and supporting segmented memory addressing to access more than 64KB of memory. The 8086 had a 16-bit external data bus, 20-bit address bus, and could address up to 1MB of memory. It operated at clock speeds between 5-10MHz and had around 29,000 transistors.
This chapter provides an overview of microprocessors and computer history. It discusses the evolution of computers from mechanical to electronic devices. Key developments include the stored program concept, transistor-based computers, integrated circuits, and the invention of the microprocessor. The chapter describes the Intel family of microprocessors from the 4004 to the Pentium 4. It provides a block diagram of a basic computer system and explains the function of the microprocessor, memory, and I/O components. It also discusses how data is represented and stored in memory.
This document provides an overview of Intel microprocessors from the 4004 in 1971 to the Pentium processors of the 1990s. It discusses the history of computing from mechanical calculators to early mainframes and microprocessors. The key Intel processors are described, including the 8086/8088, 80286, 80386, 80486 and Pentium families. The document outlines the evolution of features like integrated circuits, memory addressing, and instruction sets across processor generations. It provides context on the development of computer architecture and programming languages.
The document provides information about a microprocessor and microcontroller course. It includes details about the 8086 microprocessor such as its architecture, registers, buses, instruction set, and flag register. It discusses the 8086's internal architecture which consists of a bus interface unit and execution unit. The execution unit decodes and executes instructions, and contains components like the ALU, general purpose registers, and flag register. The document also provides a brief history of microprocessor development from early 4-bit and 8-bit processors to modern 64-bit processors.
The third generation of microprocessors were introduced in 1978 and represented by Intel's 8086 and Zilog Z8000 processors. These were 16-bit processors that offered mini-computer like performance. All major workstation manufacturers also began developing their own RISC-based microprocessor architectures during this time. Key features of the 8086 included a 16-bit architecture, support for up to 1MB of memory, and segmented memory addressing. The 8086 established itself as the processor standard and was further developed into the 80186 and 80286 processors.
This document provides an overview of the Intel 8086 microprocessor. It discusses the software architecture, including memory segmentation, registers, stack, and I/O space. The hardware architecture is also covered, such as the pin details, minimum/maximum mode, and address generation. Programming the 8086 using assembly language is mentioned as well.
Here are the key components of a motherboard:
- CPU - The central processing unit, usually located in a CPU socket. Processes instructions and performs calculations.
- RAM slots - Slots to insert RAM modules to provide short-term storage for programs and data being actively worked on.
- Expansion slots - Slots that accept add-on cards like graphics cards, sound cards, network cards, etc. Common types include PCI, PCIe, AGP.
- BIOS chip - Basic Input/Output System firmware that controls bootup and provides an interface to hardware.
- Chipset - Integrated circuits that connect the CPU and RAM to peripherals and expansion slots. Northbridge and southbridge
CSE2006 – Microprocessor and Interfacing Lab.pptxTarun710971
This document provides information about microprocessors and the 8086 microprocessor. It defines a microprocessor and how it differs from a microcontroller. It then gives a brief history of microprocessors from 1971 to 2010. Specific details are provided about the 8086 microprocessor, including its features, registers, and programming using MASM assembler.
The document provides information about the 8086 microprocessor, including:
- It was Intel's first 16-bit microprocessor, released in 1978 using HMOS technology.
- It had 20 address lines allowing it to access up to 1MB of memory, and used a separate 16-bit address for I/O devices.
- It had various registers including general purpose registers AX, BX, CX, DX and pointer/index registers like SI, DI. It also had status and control flags.
The document discusses the evolution of microprocessors from the Intel 4004 to the Intel Pentium IV. It begins with the first microprocessor, the Intel 4004 from 1971, and progresses through early 4-bit and 8-bit processors like the 8008, 8080, and 8085. It then covers the introduction of 16-bit processors like the 8086 and 32-bit processors such as the 80386, 80486, and various Pentium models. The document also includes block diagrams and descriptions of the architecture and features of the 8085 microprocessor.
The document discusses the evolution of microprocessors from the Intel 4004 to the Intel Pentium IV. It begins with the first microprocessor, the Intel 4004 from 1971, and progresses through early 4-bit and 8-bit microprocessors like the 8008, 8080, and 8085. It then covers the introduction of 16-bit microprocessors like the 8086 and 32-bit processors such as the 80386, 80486, and various Pentium models. The document also includes block diagrams and descriptions of the architecture and features of the 8085 microprocessor.
The 8086 microprocessor is a 16-bit processor released by Intel in 1978. It has a 16-bit external data bus and a 20-bit address bus. The 8086 uses segmented memory architecture and can access 1MB of physical memory using segment registers. It has a separate Bus Interface Unit and Execution Unit. The BIU handles fetching instructions and data from memory using segment registers and the IP register. The EU decodes and executes instructions using general purpose registers like AX, BX, CX, DX and flag register.
The 8086 microprocessor is a 16-bit processor released by Intel in 1978. It has a 16-bit external data bus and a 20-bit address bus. The 8086 uses segmented memory architecture and can access 1MB of physical memory using segment registers and a 20-bit address generated by combining the segment register and offset register contents. It has a 16-bit execution unit with four general purpose registers (AX, BX, CX, DX), index registers (SI, DI), pointer registers (SP, BP) and instruction pointer (IP) register. It also contains segment registers (CS, DS, SS, ES) and a flag register.
This document provides information about the EEET 323 Microprocessor and Microcontroller course. It outlines the course topics which include fundamentals of microprocessors and microcontrollers, instruction sets of the 8085 and 8051, interfacing, architecture, and Intel processor families. It also defines key microprocessor concepts like the microcomputer, microprocessor, and microcontroller. It describes the hardware and software components of computers. Additionally, it explains tri-state logic, microprocessor buses including address, data, and control buses, and the I/O pins and signals of the 8085 microprocessor.
Post init hook in the odoo 17 ERP ModuleCeline George
In Odoo, hooks are functions that are presented as a string in the __init__ file of a module. They are the functions that can execute before and after the existing code.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Creativity for Innovation and SpeechmakingMattVassar1
Tapping into the creative side of your brain to come up with truly innovative approaches. These strategies are based on original research from Stanford University lecturer Matt Vassar, where he discusses how you can use them to come up with truly innovative solutions, regardless of whether you're using to come up with a creative and memorable angle for a business pitch--or if you're coming up with business or technical innovations.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
Opportunity scholarships and the schools that receive them
Microprocessor 8086 Cover Unit I
1. EC501 MICROPROCESSOR AND
ITS APPLICATIONS
Prof. Ashish Verma
Asst. Professor
Electronics & Communication Department
Mahakal Institute of Technology
2. Reference and text Books
Advance microprocessor and peripheral –A.K. Ray
and K. M. Bhurchandi, Tata Mcgraw Hill
Microprocessor and Interfacing – D.V.Hall,
McGraw Hill.
• Microprocessor and microcontroller- U. S Shah
• Microprocessor, microcontroller and Embedded
system.
The 8051 microcontroller and embedded
systems-M.A. Mazidi, Janice Gillispie Mazidi,
Pearson Prentice Hall
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 2
3. Unit 1
• Salient features of advanced microprocessors.
RISC & CISC processors.
• Review and evolution of advanced micro proc
:8086,8088, 80186/286/386/486/Pentium
• Introduction to 8086 processor: Register
organization of 8086,
• Architecture, signal description of 8086,minimum
mode 8086 systems and timings and maximum
mode 8086 systems and timings
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 3
4. Introduction
• A microprocessor is an
integrated circuit (IC) which
contain all functions of a
computer's central processing
unit (CPU).
• A microprocessor is a
multipurpose,
programmable, clock-driven,
register-based electronic
device that reads binary
instructions from a storage
device called memory and
input output.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 4
5. Question in mind?
• Why this IC name is microprocessor?
Ans :This device comprises of transistors which are
small in size (micro-meter).
• What is difference between microprocessor and
microcontroller?
Ans: Although there is a lot of difference between
them but the basic difference is there is no RAM, ROM,
input-output units, timers and other peripherals on the
chip in the microprocessor all are externally interfaced,
but the microcontroller has all these things on chip.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 5
8. Evolution of microprocessor
• First microprocessor was invented by
INTEL(INTegrated ELectronics).
Size of microprocessor – 4 bit
Name
Year of
Invention
Clock speed
Number of
transistors
Inst. per sec
INTEL
4004/4040
1971 by Ted
Hoff and
Stanley
Mazor
740 KHz 2300 60,000
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 8
9. Name
Year of
Invention
Clock speed
Number of
transistors
Inst. per sec
8008 1972 500 KHz 3500 50,000
8080 1974 2 MHz 60,000
10 times faster
than 8008
8085
1976 (16 bit
address bus)
3 MHz 6500 769230
Size of microprocessor – 8 bit
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 9
10. Size of microprocessor – 16 bit
Name Year of Invention
Clock
speed
Numbe
r of
transist
ors
Inst. per sec
8086
1978 (multiply and divide
instruction, 16 bit data bus
and 20 bit address bus)
4.77
MHz, 8
MHz, 10
MHz
29000 2.5 Million
8088
1979 (cheaper version of
8086 and 8 bit external bus)
2.5 Million
80186/801
88
1982 (80188 cheaper
version of 80186, and
addtional components like
interuppt controller, clock
generator, local bus
controller,counters)
6 MHz
80286
1982 (data bus 16bit and
address bus 24 bit)
8 MHz 134000 4 Million
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 10
11. Name Year of Invention Clock speed
Number of
transistors
Inst. per sec
INTEL
80386
1986 (other versions
80386DX, 80386SX,
80386SL and data bus
32 bit address bus 32
bit)
16 MHz – 33
MHz
275000
INTEL
80486
1986 (other versions
80486DX, 80486SX,
80486DX2, 80486DX4)
16 MHz –
100 MHz
1.2 Million
transistors
8 KB of cache
memory
PENTIUM 1993 66 MHz
Cache memory
8 bit for
instructions 8
bit for data
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 11
12. Salient features of advanced microprocessors
• Single +5V power supply
• Clock speed range of 5-10MHz
• capable of executing about 0.33 MIPS (Millions
instructions per second)
• It is 16-bit processor having 16-bit ALU, 16-bit registers,
internal data bus, and 16-bit external data bus resulting
in faster processing.
• It uses two stages of pipelining(begins executing a
second instruction before the first has been
completed), i.e. Fetch Stage and Execute Stage, which
improves performance.
• Fetch stage can prefetch up to 6 bytes of instructions
and stores them in the queue.
• It has 256 interrupts.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 12
13. RISC Processor
• It is known as Reduced Instruction Set
Computer. It is a type of microprocessor that
has a limited number of instructions. They can
execute their instructions very fast because
instructions are very small and simple.
• RISC chips require fewer transistors which
make them cheaper to design and produce.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 13
14. Characteristic of RISC –
• Simpler instruction, hence simple instruction
decoding.
• Instruction come under size of one word.
• Instruction take single clock cycle to get executed.
• More number of general purpose register.
• Simple Addressing Modes.
• Less Data types.
• Pipeling can be achieved.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 14
15. CISC Processor
• The term CISC stands for ‘’Complex Instruction
Set Computer’’. It is a CPU design plan based
on single commands, which are skilled in
executing multi-step operations.
• CISC computers have small programs. It has a
huge number of compound instructions,
which takes a long time to perform
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 15
16. Characteristic of CISC –
• Complex instruction, hence complex instruction
decoding.
• Instruction are larger than one word size.
• Instruction may take more than single clock cycle
to get executed.
• Less number of general purpose register as
operation get performed in memory itself.
• Complex Addressing Modes.
• More Data types.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 16
18. Difference Between CISC and RISC
Architectural
Characterstics
Complex Instruction Set
Computer(CISC)
Reduced Instruction Set
Computer(RISC)
Instruction size and
format
Large set of instructions with
variable formats (16-64 bits per
instruction).
Small set of instructions
with fixed format (32 bit).
Data transfer Memory to memory. Register to register.
CPU control
Most micro coded using control
memory (ROM) but modern
CISC use hardwired control.
Mostly hardwired without
control memory.
Instruction type Not register based instructions. Register based instructions.
Memory access More memory access. Less memory access.
Clocks Includes multi-clocks. Includes single clock.
Instruction nature Instructions are complex.
Instructions are reduced
and simple.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 18
19. 8086 and 8088 and above
• 8086 (16-bit) & 8088 (8-bit)
• 20-bit addresses
• Two processors which consisted of: Bus
Interface Unit and Execution Unit
• Segmented Memory.
• 80286
Two modes
• 8086 Real Address Mode
• Protected Virtual Address Mode
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 19
21. 80286 vs. 80386
Attributes 80286 80386
Date 1982 1986
Transistors 134,000 275,000
Word Size 16-bit 32-bit
Address Size 24-bit 32-bit
Addressable Memory 16 MB 4 GB
Max Frequency 12 MHz 33 MHz
Virtual Memory 1 GB 4 GB
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 21
22. Introduction to 80486
• Increased speed (2 x 80386)
• 80386 with an internal math coprocessor
• Upgradeable (Compatibility)
• Utilize new technology (RISC, cache)
• Segmentation and Paging
• Real Mode vs. Protected Mode
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 22
23. Intel Pentium
• Released in 1993
• 60/66 MHz Bus Speed
• Two Instruction Pipeline
• Floating Point Calculation
• Floating Point Bug
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 23
24. 8086 Microprocessor
• It is a 16 bit µp.
• Powerful instruction set.
• Capable of multiplication and division
operation.
• 8086 has a 20 bit address bus can access upto
220 memory locations ( 1 MB) .
• 8086 is designed to operate in two modes,
Minimum and Maximum.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 24
25. Contd..
• Instruction queue (6 bytes) capability.
• It can support upto 64K I/O ports.
• It provides 16-bit registers.
• It has multiplexed address and data bus AD 0-
AD15 and A16 – A19
• 16 bit address line for I/O
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 25
26. Register organization of 8086
• 8086 has powerful set of registers
General purpose
Special purpose
• General purpose can use 8 bit or 16bit.
– Used for hold data and result temporary.
– Store the offset address or counter.
• Special purpose register,
– Segment registers
– Pointer and index registers.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 26
27. Categorized in four group
• General data registers.
• Segment registers.
• Pointer and index registers.
• Flag register.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 27
28. General data registers
• General purpose registers are used to store
temporary data within the microprocessor.
• The four general purpose registers are the AX, BX,
CX, and DX registers.
AX - accumulator, and preferred for most operations.
BX - base register, typically used to hold the address of
a procedure or variable.
CX - count register, typically used for looping.
DX - data register, typically used for multiplication and
division.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 28
29. Contd…
• All of the general purpose registers can be
treated as a 16 bit quantity or as two 8 bit
quantities. The high byte is referenced by
replacing the X with H. The low byte is
referenced by replacing the X with L:
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 29
30. Segment Registers
• Four Segment registers. All are 16 bit registers.
CS - points at the segment containing the current
program. Addressing CS memory
DS - generally points at segment where variables
are defined.
ES - extra segment register, it's up to a coder to
define its usage.
SS - points at the segment containing the stack.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 30
31. Contd..
• 8086 address 1M byte segmented memory
which is divided into 16 logical segment.
• Each segment Contains 64k bytes of memory.
• 1 MB= 1048576 and 2^16= 65536.
• Segment register hold the upper 16 bits of
starting address of four memory segment.
• 20 bits add.of RAM = Segment reg. add + 4bit
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 31
33. Index registers
• SI - source index register:
– Can be used for pointer addressing of data
– Used as source in some string processing instructions
– Offset address relative to DS
•
• DI - destination index register:
– Can be used for pointer addressing of data
– Used as destination in some string processing instructions
– Offset address relative to ES
• BP - base pointer:
– Primarily used to access parameters passed via the stack
– Offset address relative to SS
• SP - stack pointer:
– Always points to top item on the stack
– Offset address relative to SS
– Always points to word (byte at even address)
– An empty stack will had SP = FFFEh
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 33
34. – The pointer register IP contains offset within the code
segment.
– The pointer register BP contains offset within the data
segment.
– He pointer register SP contains offset within the stack
segment.
– The register SI is used to store the offset of source
data in data segment.
– The register DI is used to store the offset of
destination in data or extra segment.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 34
35. Flag register
• Flags Register - determines the current state of
the processor.
• Flags Register is modified automatically by CPU
after mathematical operations. This allows to
determine the type of the result.
• Generally you cannot access these registers
directly.
• The FLAGS register is the status
register in Intel x86 microprocessors that contains
the current state of the processor.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 35
36. • There are total 9 flags in 8086 and the flag register is divided
into two types:
• (a) Status Flags – S,Z,AC,CF,PF,O
• (b)Control Flag – DF,IF,TF
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 36
37. • Carry Flag (CF) - this flag is set to 1 when there is
an unsigned overflow. For example when you add
bytes 255 + 1 (result is not in range 0...255). When
there is no overflow this flag is set to 0.
• Parity Flag (PF) - this flag is set to 1 when there is
even number of one bits in result, and to 0 when there
is odd number of one bits. Even if result is a word
only 8 low bits are analyzed!
• Auxiliary Flag (AF) - set to 1 when there is
an unsigned overflow for low nibble (4 bits).
• Zero Flag (ZF) - set to 1 when result is zero. For
none zero result this flag is set to 0.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 37
38. • Sign Flag (SF) - set to 1 when result is negative. When result
is positive it is set to 0. Actually this flag take the value of the
most significant bit.
• Trap Flag (TF) - Used for on-chip debugging. An interrupt,
also known as a trap, can occur whenever an invalid operation
occurs within a processor, be it an illegal memory access, wrong
opcode, division by zero, overflow etc.
• Interrupt enable Flag (IF) - when this flag is set to 1 CPU
reacts to interrupts from external devices.
• Direction Flag (DF) - this flag is used by some instructions to
process data chains, when this flag is set to 0 - the processing is
done forward, when this flag is set to 1 the processing is done
backward.
• Overflow Flag (OF) - set to 1 when there is a signed overflow.
For example, when you add bytes 100 + 50 (result is not in
range -128...127).
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 38
39. Architecture of 8086
• The Bus Interface Unit(BIU): It provides the
interface of 8086 to external memory and I/O
devices via the System Bus.
• The Execution Unit (EU): Execution unit gives
instructions to BIU stating from where to fetch
the data and then decode and execute those
instructions.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 39
41. BIU performs the following functions-
• It generates the 20 bit physical address for
memory access.
• It fetches instructions from the memory.
• It transfers data to and from the memory and I/O.
• Maintains the 6 byte pre fetch instruction
queue(supports pipelining).
• Instruction Pointer (IP): It is a 16 bit register. It
holds offset of the next instructions in the Code
Segment.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 41
42. • Code segment Register CS holds the segment
address which is 4569 H
Instruction pointer IP holds the offset address
which is 10A0 H
The physical 20-bit address is calculated as
follows.
• Segment address : 45690 H
Offset address :+ 10A0 H
Physical address : 46730 H
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 42
43. EU performs the following functions-
• Fetches instructions from the Queue in BIU,
decodes and executes arithmetic and logic
operations using the ALU.
• Sends control signals for internal data transfer
operations within the microprocessor.
• Sends request signals to the BIU to access the
external module.
• It operates with respect to T-states (clock
cycles) and not machine cycles.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 43
44. 8086 pin diagram
• 8086 was the first 16-bit microprocessor available
in 40-pin DIP (Dual Inline Package) chip.
• Dual in-line pin package is an electronic
component package with a rectangular housing
and two parallel rows of electrical connecting
pins.
• Intel 8086 is a 16-bit HMOS microprocessor.
• The 16-low order address bus lines have been
multiplexed with data and 4 high-order address
bus lines have been multiplexed with status
signals.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 44
46. • Power supply: It uses 5V DC supply at VCC pin 40, and uses
ground at VSS pin 1 and 20 for its operation.
• Clock signal: Clock signal is provided through Pin-19. It
provides timing to the processor for operations. Its frequency
is different for different versions, i.e. 5MHz, 8MHz and
10MHz.
• AD0-AD15 : Address/Data bus. These are low order address
bus. They are multiplexed with data. AD0-AD7 carries low
order byte data and AD8-AD15 carries higher order byte
data. During the first clock cycle, it carries 16-bit address and
after that it carries 16-bit data.
• Address/status bus: A16-A19/S3-S6 These are the 4
address/status buses. During the first clock cycle, it carries 4-
bit address and later it carries status signals.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 46
47. • S2, S1, S0 Status pins:
S2 S1 S0 CHARACTERISTICS
0 0 0
Interrupt
acknowledge
0 0 1 Read I/O port
0 1 0 Write I/O port
0 1 1 Halt
1 0 0 Code access
1 0 1 Read memory
1 1 0 Write memory
1 1 1 Passive state
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 47
48. • A16/S3, A17/S4, A18/S5, A19/S6 : The
specified address lines are multiplexed with
corresponding status signals.
A17/S4 A16/S3 FUNCTION
0 0 Extra segment access
0 1 Stack segment access
1 0 Code segment access
1 1 Data segment access
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 48
49. • BHE’/S7 : Bus High Enable/Status. During T1 it is
low. It is used to enable data onto the most significant
half of data bus, D8-D15. 8-bit device connected to
upper half of the data bus use BHE (Active Low)
signal. It is multiplexed with status signal S7. S7 signal
is available during T2, T3 & T4.
• RD’: It is available at pin 32 and is used to read signal
for Read operation. It is an output signal. Active low.
• READY : This is the acknowledgement from the
memory or slow device that they have completed the
data transfer. It is an active high signal. When it is high,
it indicates that the device is ready to transfer data.
When it is low, it indicates wait state.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 49
50. • RESET: It is available at pin 21 and is used to
restart the execution. It causes the processor to
immediately terminate its present activity. This
signal is active high for the first 4 clock cycles to
RESET the microprocessor.
• INTER: It is available at pin 18. It is an interrupt
request signal, which is sampled during the last
clock cycle of each instruction to determine if the
processor considered this as an interrupt or not.
• NMI: It stands for non-maskable interrupt and is
available at pin 17. It is an edge triggered input,
which causes an interrupt request to the
microprocessor.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 50
51. • TEST: This signal is like wait state and is available
at pin 23. When this signal is high, then the
processor has to wait for IDLE state, else the
execution continues.
• MN/MX’: It stands for Minimum/Maximum and
is available at pin 33. It indicates what mode the
processor is to operate in; when it is high, it
works in the minimum mode and vice-versa.
• INTA: It is an interrupt acknowledgement signal
and is available at pin 24. When the
microprocessor receives this signal, it
acknowledges the interrupt.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 51
52. ALE
• It stands for address enable latch and is available at pin 25. A
positive pulse is generated each time the processor begins
any operation. This signal indicates the availability of a valid
address on the address/data lines.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 52
53. • DEN: It stands for Data Enable and is available at
pin 26. It is used to enable Transreceiver 8286.
The transreceiver is a device used to separate
data from the address/data bus.
• DT/R: It stands for Data Transmit/Receive signal
and is available at pin 27. It decides the direction
of data flow through the transreceiver. When it is
high, data is transmitted out and vice-a-versa.
• IO/M’: This signal is used to distinguish between
memory and I/O operations. When it is high, it
indicates I/O operation and when it is low
indicates the memory operation. It is available at
pin 28.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 53
54. • WR: It stands for write signal and is available at pin 29.
It is used to write the data into the memory or the
output device depending on the status of M/IO signal.
• HLDA: It stands for Hold Acknowledgement signal and
is available at pin 30. This signal acknowledges the
HOLD signal.
• HOLD: This signal indicates to the processor that
external devices are requesting to access the
address/data buses. It is available at pin 31.
• LOCK: Its an active low pin. It indicates that other
system bus masters have not been allowed to gain
control of the system bus while LOCK’ is active low(0).
The LOCK signal will be active until the completion of
the next instruction and is available at pin 29.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 54
55. • RQ/GT1 and RQ/GT0: These are the Request/Grant
signals used by the other processors requesting the CPU
to release the system bus. When the signal is received by
CPU, then it sends acknowledgment. RQ/GT0 has a
higher priority than RQ/GT1.
• QS1 and QS0: These are queue status signals and are
available at pin 24 and 25. These signals provide the
status of instruction queue. Their conditions are shown
in the following table −
QS0 QS1 Status
0 0 No operation
0 1 First byte of opcode from the queue
1 0 Empty the queue
1 1 Subsequent byte from the queue
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 55
65. • Machine Cycle:
– It is the time required to complete one operation of accessing
memory/ I/o, either Memory write, Memory Read, I/o read or
I/O write
– The time required by the microprocessor to complete an
operation of accessing memory or input/output devices is
called machine cycle.
• T state:
– It is defined as the one subdivision of operation performed in one
clock period.
– One time period of frequency of microprocessor is called t-state.
– A t-state is measured from the falling edge of one clock pulse to
the falling edge of the next clock pulse. Fetch cycle takes four t-
states and execution cycle takes three t-states.
• Instruction Cycle:
– The Steps required by CPU to fetch and execute an Instruction is
called a Instruction Cycle. It consist of fetch and Execute Cycle.
8/28/2020 Prof.ASHISH VERMA MIT ECE DEPT. 65