0% found this document useful (0 votes)
47 views10 pages

COAL. Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views10 pages

COAL. Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CONTENTS

Pin Diagram of 8085 Microprocessor…………………..…………………..…(2)


Definition………………………………..……………………………………………..……(2)
Pin Diagram……….………….………………………………………………………..…..(2)

Real Mode and Protected Mode Memory Addressing………..……….(7)


Real Mode……………………..…………….…………………………………..………...(7)
Protected Mode………………….……………………………………………….………(7)

RAM and It’s Types…………….………………………………………………………..(8)


What is RAM?..…………………..……….…………………………………..…..……..(8)
Types of RAM………………..….…..…………………………………………………....(8)

ROM and It’s Types………….…………..……………………………………………..(9)


What is ROM?.……….……..………….…………….…………………….…………....(9)
Types of ROM…………..….……………………..………………….……….…………..(9)

1
Pint Diagram of 8085 Microprocessor
Introduction:
The 8085 microprocessor was introduced by Intel in 1976. It is a better or
upgraded version of the 8080 microprocessor. The 8085 microprocessor has a
set of registers that are used to store data and addresses. The most important
registers are the accumulator (A), the program counter (PC), the stack pointer
(SP), and the flags register. The accumulator is used to perform arithmetic and
logical operations, and the program counter is used to store the address of the
next instruction to be executed. The stack pointer is used to manage the stack,
and the flags register stores various flags that indicate the status of the
microprocessor after an operation. In this section, we will discuss the Pin
diagram of the 8085 microprocessor.

Pin Diagram:
Intel 8085 microprocessor
The Intel 8085 microprocessor is an 8-bit microprocessor that contains 40 pins
and operates on a power supply of +5V. These pins can be categorized into six
groups.

Address Bus
Data Bus
Control Signals
Power Supply
I/O ports
External Signals

2
Explanation of Pins :

1. Pin number 01,02 (X1,X2) :-


8085 microprocessor works on the frequency of 3MHz but the minimum
supply possible from outside is 5MHz so to overcome this situation two circuits
are used either RC or LC circuit to break down the frequency. Hence X1 and X2
break the 6MHz frequency in half and make it usable to the system.

2. Pin number 03(Reset OUT):-


This signal shows that the microprocessor is reset now and is used to reset
other devices also which are connected to the microprocessor.

3. Pin number 04,05 (SOD,SID) :-


The 8085 has 2 signals to implement the serial input-output transmission – (i.)
SID(Serial Input Data) and (ii.) SOD(Serial Output Data). In serial transmission,
data bits are sent over a single line i.e. only one bit is used at a time either for
input or output such as the transmission over the telephone lines.

4. Pin number 07,08,09(RST 7.5, RST 6.5, RST 5.5) :-


RST(Restart), these pins are used as restart interrupts. These are also known as
vectored interrupts because they transfer the program control to specific
locations. In priority order, they are above the INTR(interrupt) signals.

5. Interrupt :
Intel 8085 microprocessor has 5 interrupt signals that can be used to interrupt
a program execution. These are external signals. The various interrupts are as
follows :
(a.) Pin Number 06 (TRAP):
This is an active-high input signal and a non-maskable interrupt with the
highest priority. When the TRAP pin goes high, the microprocessor goes to an
interruption state. Call location of TRAP interrupt is 0024H.

3
(b.) Pin Number 10 (INTR) Interrupt request :
This is used by the programmer as a general purpose interrupt .
(c.) Pin number 11 (INTA):
INTA(Interrupt Acknowledge) is an output signal. It is generated by
microprocessor to acknowledge and interrupt.
6. Pin Number 12 to 19 (AD0-AD7) (Multiplexed Address/Data Bus) and Pin
Number 21-28 (A8-A15) (Address Bus) :-
8085 microprocessor has 16 pins used as signal lines that are used as address
bus; These 16 lines are split into two equal segments :

(a.) A8-A15: These are unidirectional pins and used for the MSB(Most
Significant Bits) which is the higher-order address of a 16-bit address.
(b.) AD0-AD7: These are dual-purpose signal lines i.e. they are used for both
the data bus as well as the lower order address bus. However, the lower-order
address bus can be separated from these signals by using a latch.
7. Pin number 20(Vss) :
It is the ground reference for 8085 microprocessor.

8. Pin number 31(WR – Write) :


This is an active low write control signal. When the data on the data bus is to
be written into a selected memory the WR signal is in active condition.

9. Pin number 32(RD – Read) :


This is an active low read control signal. When the data is available in the data
bus or the selected I/O or memory devices are reading the data the RD is in
active condition.

4
10. Pin number 36(RESET IN) :
When the signal in on RESET PIN goes low, the PC register (Program Counter) is
set to zero, the buses are in tristate and the microprocessor unit is reset.

11. Pin number 37( CLK OUT : Clock Output ) :


CLK OUT is used as the system clock for another connected devices.

12. Pin number 38 (HLDA : Hold Acknowledge) :


It responds to the HOLD request. This pin is used in data transfer through
direct memory access. When the microprocessor receives a HOLD signal from
the external device this active high output signal will send a request to the
device and receives the request and gives control of buses to the external
device.

13. Pin Number 39 (HOLD) :


When the HOLD pin is activated by an external device or signal generated by
HLDA, the microprocessor withdraws the control of address and data buses
and gives access to the external device.

14. Pin number 40 (Vcc):


It gives power supply of +5V to the microprocessor.

15. Pin number 30 (ALE) :


When the ALE signal shows high, this indicates that the address bits(A8-A15)
are in use and when the ALE signal shows low, this indicates that the data bits
(AD0-AD7) are in use.

5
16. Pin number 35 (Ready) :
This pin is used to synchronize slower peripherals of the microprocessor and it
actually delays the microprocessor’s RD or WR signals until a slow responding
peripheral is ready to accept the data. The Microprocessor enters into the wait
state when READY signal is low.

17. Pin numbers 33, 29 (S1 and S0) :


These are known as the status signals in 8085 microprocessor. They can
identify various operations but are rarely used.

18. Pin number 34 (IO/M) :This status signal differentiates between the
memory operations and the input/output data. It combined with RD & WR to
generate input/output and memory control signals.

6
Real Mode and Protected Mode Memory Addressing

Real Mode:
Real mode is a simple addressing mode that is used by the early x86
processors, such as the 8086 and 8088. In real mode, the memory is divided
into segments, each of which is up to 64KB in size. The processor uses a
segment register to specify which segment of memory it wants to access, and
an offset to specify the specific location within the segment. The physical
address is then formed by combining the segment and offset values. This
means that the maximum amount of memory that can be addressed in real
mode is 2^20 (1MB).
One important characteristic of real mode is that there is no memory
protection. Any program can access any part of memory, which can lead to
stability and security issues. Real mode is mainly used for running old software
or for bootstrapping an operating system, as it provides a simple and direct
way to access hardware and memory.
Protected mode, on the other hand, is a more advanced mode of operation
that was introduced with the 80286 processor. In protected mode, the
memory is divided into pages, each of which is up to 4KB in size. The processor
uses page tables to map virtual addresses used by programs to physical
addresses in memory. This allows for memory protection, where different
programs cannot access each other's memory and cannot overwrite critical
parts of the operating system.

Protected Mode:
Protected mode also provides more advanced features, such as support for
multitasking, virtual memory, and more efficient memory management.
However, it is also more complex and requires more sophisticated software to
manage and maintain. Modern operating systems, such as Windows, Linux,
and macOS, all use protected mode to provide a more stable and secure
environment for running programs. In summary, real mode is a simple mode of
operation that provides direct memory access, while protected mode is a more
advanced mode that provides memory protection and other features.
Protected mode is the standard mode of operation for modern operating
systems, while real mode is mainly used for running legacy software.

7
RAM and It’s Types

What is RAM?
RAM is a storage memory that loses its contents if the device or
computer loses its power. RAM is volatile high-speed memory.

When applications for software, records, and files are opened, they are
copied from secondary storage into RAM. They remain in RAM until we
close the files or applications.

The operating system is copied from the secondary storage to the RAM
when a computer boots up.

This is the reason you lose something that hasn’t been saved if your
computer crashes or restarts while you work on a program.

Non-volatile memory is a memory that holds its contents even though


control is lost.

Types of RAM:
Random Access Memory (RAM) is classified into two types. They are

DRAM (Dynamic Random Access Memory)


DRAM Is commonly used as the main memory for the computer.

Inside an integrated circuit, each DRAM memory cell consists of a


transistor and a capacitor, and a data bit is stored in the capacitor.

Because transistors often leak a small amount, the condensers gradually


discharge, allowing the information stored in it to drain thus, DRAM has
to be refreshed every few milliseconds (given a new electronic charge) to
maintain data.

8
SRAM (Static Random Access Memory)
SRAM is composed of 4 to 6 transistors. It holds data in the memory as
long as power is supplied to the device, unlike DRAM, which needs to be
regularly refreshed.

As such, SRAM is more costly but quicker, making DRAM the more
widespread memory in computer systems.

What is ROM?
ROM stands for Read-Only memory. It is a permanent memory, where
programs are stored while a computer is being created.

Unable to modify and erase stored programs in this memory, they can
only be read. Therefore, this memory is called read-only memory.

Also after the device is turned off, the data contained in ROM will not be
destructed. Hence, ROM is also called non-volatile memory.

Types of ROM:
Read-Only Memory has three types in it. They are:-

PROM–PROM or programmable ROM


It is a computer memory chip that can be programmed once it is created.
When the PROM is programmed, the written information is permanent
and cannot be removed or erased.

EPROM–Erasable Programmable Read-Only Memory


EPROM is a non-volatile memory chip, developed in 1971 by Dov
Frohman

When exposed to ultraviolet light, an EPROM can be reprogrammed if


necessary, but otherwise, no new data would be accepted or saved.

Computer manufacturers use EPROM when it might be necessary to


modify the data stored on the EPROM.

9
EPROM chips are not commonly used in computers and have been
replaced by EEPROM chips.

EEPROM (Electrically Erasable Programmable Read-only


Memory)
The EEPROM is an electrically erasable programmable read-only
memory that can be erased and reprogrammed using an electrical
charge.

George Perlegos developed EEPROM while at Intel in 1978, and unlike


most of the memory inside a computer, this memory remembers data
when the power is switched off.

EEPROM was a substitute for the PROM and EPROM chips and is used
for the BIOS of later computers designed after 1994.

Using an EEPROM machine helps a computer user to update the BIOS


on their device without the need to open the computer or remove chips.

10

You might also like