tag:blogger.com,1999:blog-37805415478681876802024-03-13T21:53:57.115-07:00MDU sample papersdimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-3780541547868187680.post-60279895444428364782009-07-04T03:31:00.000-07:002009-07-04T03:35:58.162-07:008 semester advanced java - AJAVA1. explain the concept of array in java with suitable program.also explain inheritance and exception handling<br /><br />2. explain mail server<br /><br />3. explain<br />a. metadata<br />b. Ldap<br /><br /><br />4. explain SOAP<br /><br />5. explain styled text components and usage of tables<br /><br />6. how images and shapes are manipulated in AWT. Implement drag and drop in AWT<br /><br />7. explain bean writing process. explain building an application with beans<br /><br />8. what are clas loaders?explain encryption techniques and digital signaturedimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-68476412857292307312009-07-03T08:06:00.000-07:002009-07-03T08:17:47.618-07:008 semester CSE NSM-network security and management<span style="font-weight: bold;"> NSM-network security and management<br /><br />1.<br />a. what is denial of service attack<br />b. what is trojan horse?Explain its principle.<br /><br />2.<br />a. what are block cipher design principles and their modes of operation?<br />b. what is public key cryptography?Explain RSA algorithm with example<br /><br />3.Explain with example-<br />a. Substitution cipher<br />b. transposition cipher<br /><br />4.how speech signal can be encrypted?describe analog and digital systems of speech encryption.<br /><br />5.<br />a. what is the purpose and principle of digital signature?explain.<br />b. describe-<br />i) pretty good service<br />ii) ip sec<br />iii) firewalls<br /><br />6.<br />a. what do you mean by network management?Explain with the help of NM functional flow chart.<br />b. give a system overview of snmpV1 network management architecture<br /><br />7.<br />a. compare rmon1 and rmon2<br />b. what are security threats?how they are handled in snmpV3?<br /><br />8.explain-<br />i) ATM network management<br />ii) TMN<br />iii) data compression techniques<br /><br /><br /></span>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-51788333321186745112009-05-25T08:00:00.000-07:002009-05-25T08:07:53.073-07:00previous year papers<span style="font-size:180%;"><br />This blog provides you with </span><span style="font-weight: bold;font-size:180%;" >previous year papers</span><span style="font-size:180%;"> from<br /><br /> </span><span style="font-weight: bold;font-size:180%;" >Maharshi Dayanand University(MDU)</span><span style="font-size:180%;"> and </span><span style="font-weight: bold;font-size:180%;" >Punjab<br /><br /> Technical University(PTU)</span><span style="font-size:180%;">.</span>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-81453619274931927302009-05-25T07:43:00.000-07:002009-05-25T07:59:00.570-07:008th semester sample paper<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYw4vYyvSHQQR0sLc9GjVeisaQBZXaZn5BPly0vXimSQBJkSBCZcaBBIxq_6yyf3Ac_mhCA4XMOQOAq_WPxWLV6R0NZLBjx0qsVc-qHuG3Yx2zZXolf4SPxlJzmAFVpKObcImPCQsIsg/s1600-h/scan0003.jpg"><img style="cursor: pointer; width: 291px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYw4vYyvSHQQR0sLc9GjVeisaQBZXaZn5BPly0vXimSQBJkSBCZcaBBIxq_6yyf3Ac_mhCA4XMOQOAq_WPxWLV6R0NZLBjx0qsVc-qHuG3Yx2zZXolf4SPxlJzmAFVpKObcImPCQsIsg/s400/scan0003.jpg" alt="" id="BLOGGER_PHOTO_ID_5339773929950391746" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHtZe3mzw8-nR0zoQyjzRx3EdmmRUd3_rUx-FMXXcegVRpbHhjZiM5IPvLCl1QkJhqj3U28S80CFCeVtohhvtPod-TjDkyFTkQAt4jWq_N7Fdc5dUWg7ycZR54rMk0Seg6sMsnKeiTQg/s1600-h/scan0002.jpg"><img style="cursor: pointer; width: 291px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHtZe3mzw8-nR0zoQyjzRx3EdmmRUd3_rUx-FMXXcegVRpbHhjZiM5IPvLCl1QkJhqj3U28S80CFCeVtohhvtPod-TjDkyFTkQAt4jWq_N7Fdc5dUWg7ycZR54rMk0Seg6sMsnKeiTQg/s400/scan0002.jpg" alt="" id="BLOGGER_PHOTO_ID_5339773921066893090" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCzBbPE548OKiwH8OXbBI9Yrq3U8xhEqCMVueBg3emMGzTtVvxVmrWWG7vWmufJ6uViOaw6zC72kxWiUHgStufwnpR6DkIsJMSNwzBRKEfR9ikwrANXtKd6uDRVOb9cPgZ7h02v7dng/s1600-h/scan0001.jpg"><img style="cursor: pointer; width: 291px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCzBbPE548OKiwH8OXbBI9Yrq3U8xhEqCMVueBg3emMGzTtVvxVmrWWG7vWmufJ6uViOaw6zC72kxWiUHgStufwnpR6DkIsJMSNwzBRKEfR9ikwrANXtKd6uDRVOb9cPgZ7h02v7dng/s400/scan0001.jpg" alt="" id="BLOGGER_PHOTO_ID_5339773919368796018" border="0" /></a>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-39803293921351845812008-12-18T23:19:00.000-08:002009-05-25T08:11:15.667-07:00Business Communication<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg_-qvvKu2lYfvV4wSdUUFXC7mM1hIiO-n79wcicRW-i2jZe6U4-1mJC7n9n_jw9od-cNr0-cJ381JmYGTB0HHbm2GtqLFZkCJLUB8IaSGUyej38TU0Jcs2NCz8qibdVoBMQKprE7Vjg/s1600-h/IMG_5920.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg_-qvvKu2lYfvV4wSdUUFXC7mM1hIiO-n79wcicRW-i2jZe6U4-1mJC7n9n_jw9od-cNr0-cJ381JmYGTB0HHbm2GtqLFZkCJLUB8IaSGUyej38TU0Jcs2NCz8qibdVoBMQKprE7Vjg/s320/IMG_5920.JPG" alt="" id="BLOGGER_PHOTO_ID_5281399085785375954" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-3C34DR4Sqok1k95W-SSjfcGo-pQYaNOcO-LjYpzlmXW81HI416BVtVA7Z9iQxe36uoxI8cPsz3pWgARWWYc6to-dyna_Vua10k1sfkedwXzGts-Dyt87p8qwydXyZ6eC-RTJf3AnRQ/s1600-h/IMG_5919.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-3C34DR4Sqok1k95W-SSjfcGo-pQYaNOcO-LjYpzlmXW81HI416BVtVA7Z9iQxe36uoxI8cPsz3pWgARWWYc6to-dyna_Vua10k1sfkedwXzGts-Dyt87p8qwydXyZ6eC-RTJf3AnRQ/s320/IMG_5919.JPG" alt="" id="BLOGGER_PHOTO_ID_5281399076851311698" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-YhtHsoehz-6oefMAtI5ACFewX-9xaDydgPOXftSx8jy8Ik8oBBUeFebsn8W0MwnmX48nbW9PHdXuW-ozt4fRqbdHso0eiGdA9-CpNcOivPdekUWNgwQnUx3uKd4hzdeLCqN8BRgWg/s1600-h/IMG_5918.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3-YhtHsoehz-6oefMAtI5ACFewX-9xaDydgPOXftSx8jy8Ik8oBBUeFebsn8W0MwnmX48nbW9PHdXuW-ozt4fRqbdHso0eiGdA9-CpNcOivPdekUWNgwQnUx3uKd4hzdeLCqN8BRgWg/s320/IMG_5918.JPG" alt="" id="BLOGGER_PHOTO_ID_5281399071802402290" border="0" /></a>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-24743450199744767062008-12-18T23:10:00.001-08:002009-05-25T08:13:48.157-07:00Business Communication<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4p5WuLMqzZaIXUgiLmdo6r0KHDAH3IqhKMc_81eSiu1Yc-13pS-UsNEBLzHqnTTMxVgdRdFs5hMC8lLRYoS0XIrK0_w5TtAxxokdwB5xR_s6DAYN2DXMvt6F4njJyGyNr38WfHkrSFA/s1600-h/IMG_5917.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4p5WuLMqzZaIXUgiLmdo6r0KHDAH3IqhKMc_81eSiu1Yc-13pS-UsNEBLzHqnTTMxVgdRdFs5hMC8lLRYoS0XIrK0_w5TtAxxokdwB5xR_s6DAYN2DXMvt6F4njJyGyNr38WfHkrSFA/s320/IMG_5917.JPG" alt="" id="BLOGGER_PHOTO_ID_5281396880463773890" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFMH__tQjLPWTZM-ybq7ESRXRo0joWzidBGrAxASJQFf83fUf08TCm9jlh49DT7y2ShoIYxER7Ru934twj0QszAo4qyZE8eA7YZ42nZ0jCyD1a9Ctt-sUoGiaFS1OufWvCh1Cid4Yy_g/s1600-h/IMG_5916.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFMH__tQjLPWTZM-ybq7ESRXRo0joWzidBGrAxASJQFf83fUf08TCm9jlh49DT7y2ShoIYxER7Ru934twj0QszAo4qyZE8eA7YZ42nZ0jCyD1a9Ctt-sUoGiaFS1OufWvCh1Cid4Yy_g/s320/IMG_5916.JPG" alt="" id="BLOGGER_PHOTO_ID_5281396874095859314" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgUEumWs1hx2ushZ3_WEVDnVB9NRc9KwgqtzMbJIHTvd7Wk17dpoxGveHuwQewwyxKtsNprLlW32tA7aLIA4x-96WxvgRmEIlf0wEx9jj2_rbBawCOD_cCL3iYU5Cdik1Bx9Mm8iTveQ/s1600-h/IMG_5915.JPG"><img style="cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgUEumWs1hx2ushZ3_WEVDnVB9NRc9KwgqtzMbJIHTvd7Wk17dpoxGveHuwQewwyxKtsNprLlW32tA7aLIA4x-96WxvgRmEIlf0wEx9jj2_rbBawCOD_cCL3iYU5Cdik1Bx9Mm8iTveQ/s320/IMG_5915.JPG" alt="" id="BLOGGER_PHOTO_ID_5281396870898779762" border="0" /></a>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-72320552749368123642008-09-19T22:12:00.000-07:002009-05-25T08:14:20.551-07:002007 Punjab Technical University B.Tech chemistry Question paper<span style="font-weight: bold;">CHM-101 Chemistry (B.Tech., 1st and 2nd Semester, 2122)<br />Maximum Marks : 60</span><br /><br />1 (a) Explain the difference between Soft Water and Demi9neralised Water.<br /><br />(b) Corrosion of water filled with steel tanks occus below the waterline. Give reasons.<br /><br />(c) A copper equipment should not possess a small steel bolt. Give reasons.<br /><br />(d) What is meant by Conjugate Asid-Base pair? Give one example.<br /><br />(e) The electrode potential of Zn is assigned a nagative value whereas that of Cu is assigned a<br />positive value. Give reasons.<br /><br />(f) State Phase Rule.<br /><br />(g) Discuss the significance of Tripple Point.<br /><br />(h) Explain what is meant by optical density of a material.<br /><br />(i) List the factors that determine the suityability of a nucleus for investigation by NMR spectroscopy.<br /><br />(j) Why does molecular spectroscopy utilise Absorption spectra and not Emission spectra?<br /><br /><span style="font-weight: bold;">Section - A Marks : 8 Each</span><br /><br />2. (a) Write a short note on Reverse Osmosis for Desalination of water.<br /><br />(b) Calculate the amount of Lime and soda needed for softening a water sample cantaining 36 ppm Mg2+, 20 ppm Ca2+ and 183 ppm HCO3-.<br /><br />3. Write short notes on:<br /><br />(a) Atmosphere corresion.<br />(b) Cathodic proctection against corrosion.<br /><br />4. (a) With the help of suitable examples, discuss the effects of solvent on the strength of an acid and a base.<br /><br />(b) Calculate the degree of Hydrolysis of a 0.01 M solution of ammonium chloride, Kb = 1.8 X 10-5, Kw = 1 X 10-14.<br /><br />(c) The solubility of silver chloride in water at 25 C is 0.0179 g/l.<br /><br />Calculate its solubility product at 25 C.<br /><br />5. (a)For the Daniell cell involving the cell reaction:<br /><br />Zn (s) + Cu2+ (aq) = Zn2+ (aq) + Cu (s), the standard free energies of formation for<br />Cu2+ (aq) and Zn2+ (aq) are 15.66 kcal mol-1 and -35.14 kcal mol-1, respectively.<br />Calculate E not of the cell.<br /><br />(b) Calculate the EMF of the Zn-Ag cell at 25 C when [Zn2+] = 0.01 M and [Ag+] = 10 M.<br /><br />(c) Write a short note on Colomel Electrode.<br /><br /><span style="font-weight: bold;">Section B Marks : 8 Each</span><br /><br />6. (a) Write a short note on MASERS.<br /><br />(b) In an absorption cell, the transmittance of a 0.1 M solution of a substance X is 80% and that of 0.1 M solution of another substance Y is 60 % at agven wavelength. Whta is the transmittance of a solution that is simultaneously 0.1 M in X and 0.1 M in Y.<br /><br />(c) For the photochemical formation of ethylene from di-n-propyl ketone using a radiation of wavelength 313 nm, the quantum yields is 0.21. Calculate the number of moles of ethylene formed when the sample is irradiated with 50 watt of this radiation assuming thatall tha radiation is absorbed by the sample.<br /><br />7. (a) Define the term Phase. Explin with suitable examples.<br /><br />(b) Daw the phase diagram of KI-water system and discuss the concept of freezinf mixtures, with suitable examples.<br /><br />8. Draw the block diagram of a typical instrument for making UV/Visible absorption measurement. Briefly describe the various components of the instrument.<br /><br />9. Explin the following in respect of NMR spectroscopy :<br /><br />(a) Chemical shift.<br />(b) Shelding and Deshielding of protons.<br />(c) Spin-spin interaction.dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0tag:blogger.com,1999:blog-3780541547868187680.post-34045287991128451972008-08-05T09:08:00.000-07:002008-08-13T20:58:57.850-07:00MICROPROCESSER AND INTERFACING<div align="justify"><span style="font-size:130%;"><span style="FONT-WEIGHT: bold">B. E.</span></span><br /><br /><span style="FONT-WEIGHT: bold">Fifth Sefnester Examination, May-2007 MICROPROCESSeRAND INTERFACING</span><br /><br />Note ~ Attempt any five questions. All questions qmy equal marks. All questions' <;:arry equal marks. All questions carry equal marks. <span style="font-size:+0;">Q. 1. (a) </span><span style="FONT-WEIGHT: bold">Give vector interrlJptsystem of8()86. '</span><br />\ , ,<br /><span style="FONT-WEIGHT: bold">Ans.</span>lnterrupt Pointer (dr Ve,ctor): I K bytes of memory from 00000 to 003FF (hex) is set aside to store the starting addresses of inte'rrupt service subroutineS in an 8086 based system. To store the starting address of each ISS, four bytes of memory space is required: two bytes to store the values for CS and two bytes for IP .<br />values. Thus lK bytes of memory space can store the starting addresses of256 -lSS. The starting address of an ISS stored in the 1 KB memory space is called interrupt pointer or interrupt vector. The I KB memory space acts as a table to store the starting addresses ofISS. This table is called the interrupt pointer table.,<br /><br />The 256 interrupt pointers have been numbered from 0 to 255. The number assigned to an interrupt pointer is called the type of the corresponding interrupt. For example, type 0 interrupt, type 1 interrupt, type 2 interrupt,...., and so on. Th~ starting address of the iss for type 0 interrupt is 00000 hex, for type 1 Interrupt is 00004 hex, for type 2 interrupt is 00008, and so on. Figure 2.7 shows the interrupt pointers forJa'ble for 8086. The first five pointers are dedicated interrupt pointers for specific interrupts. They are for divide-by-zero, single-step control, nonmaskable interrupt NMI, breakpoint, andpverflow intetrupt. The Intel has kept reserved the next 27 interrupts, trom type 5 to type 31, for other advanced microprocessors or they can be used for some spe\,:ial interrupts' in an 8086 based system. The system designer can used these interrupt pointers. The in,icroproces- .<br />, SOl' will respond accordingly. The upper 224 interrupts, from type 32 to type 255, are available to users for hardware and software interrupts. '1C<br />", ..<br />When an interrupt occurs, the 8086 pushes the flag register on the stack, TF and IF are cleared which , disable the single-step and INTR interrupt, and the contents ofCS and IP are pushed on the stack. Thereafter, the program jumps automatically to the starting address of the ISS: In .case of a hardware interrupt, the interrupting device or interrupt controlIe~ gives the type of the interrupt· in response to the<br /><br />. INT A Signals sentto the I/O device or interrupt controller. In case of so~are interrupt, the type depends onthe instruction usedfor the purpose. At the end of an ISS, IRET instruc,tion is used. When IRET is ~xecuted, i,t pops the contents of IP and then CS, Finally it pops flags into flag register from the stack. When flags are , restored, IF and TF are restored to the previous values (i.e. before the interrupt occurred). Suppose IF and TF \ ,were enabled before interrupt occurred, they-will be enabled again after return to the main program from ISS. . During the execution of the main progra~ from ISS. Duringthe execution ofISS, IF and TF are cleated resulting in disl,ibling ofINTR and single step interrupt. ' ' ,<br /><br /><span style="FONT-WEIGHT: bold"><span style="font-size:130%;">Q. 1. (b)</span> Write an assembly language program (8085) to stimulate a flashing yellow light with 750,ms</span><br /><br /><span style="FONT-WEIGHT: bold">on time. Use D7 to controHhe light.</span><br /><br /><span style="FONT-WEIGHT: bold"><span style="font-size:130%;">2. </span>(Ii) Which flags will be affected, after the execution offollowing instructions. '</span><br /><br /><span style="FONT-WEIGHT: bold">(i) MOVA,B</span><br /><br /><span style="FONT-WEIGHT: bold">(fi)ORA B</span><br /><br /><br />~,-<br /><br />104<br /><br /><span style="FONT-WEIGHT: bold">B. E. Fifth Semester Solyed' Papers, Dec~-2006</span><br /><br />bus:<br /><br />DO - D7 -Bidirectional data bus. Control, status and interrupt vector informatio~ .is transferred via this<br /><br />CASo - CAS7 -slave program/enable buffer~<br /><br />INT -Interrupt. It is used to interrupt CPU.<br /><br />INT k-Interrupt acknowledge. 0<br /><br />IRo - IR7 ~Address line. I! acts in conjunction with RD, WR and CS. The intel 8259 uses iHo<br /><br />interpret command words the CPU writes and status the.CPU w~nis to read.<br /><br /><span style="FONT-WEIGHT: bold">(b) DMA Process:</span> It is a process of comrimnication or data transfer controlled by an external peripheral.<br />In situations in which the rriicroprocessor controlled data transfer is too slow, the D!V1A is generally used, e.g.<br />dat<1 style="FONT-WEIGHT: bold">B. E. Fifth Semester Solved Paper:;, May-2007</span><br /><br />(Hi) CMP R (iv)XRAA (v)HLT (vi)DCXD Ans. (i) Mov A,B : No flags are affected , (ii) ORAB : Z,S, P are modified to reflect the results Of the operation.-AC & CY are reset.<br />(iii) CMPR : S, P, Ac are also modified in addition to Z & tY to reflect the results of the operation" (iv) XRAA : Z, S, P are altered to reflectthe results of operation, CY & AC are reset.<br />(v) HLT : No flags are affected, (vi) DCXO : No flags are affected, ' Q. 2.(b) Explain block diagram of 8086. Also explain how demultiplexing of address & data bus is carried out. ,<br /><br />~ ~:-: - -.~ .,.. - -: - - -: ,- -: '- -:- - -. -----: .:-,... -: -: - - - - - - - :... - - - - - -I<br /><br />G- BUS ' 'J .', I .<br />, ,<br />I I I I"STRUCTIONI ±-l ST.RE/\.M :<br />L. RYrE 1 ~QVl::V£ I<br />1--, ,<br /><br />_..:_____'-_J<br />I r I 1 ,I<br />,<br />I 1 1 ' I I I I I r I 'I I I<br />I ' ' :; " , '-I -,' v <i><br />t., ,SI '.. , ; . ','<br />I' DI; . ' I<br /><br />: . , ' U ,:<br /><br />1_ _ _..J _ __.~:''"''!'!.~'''''''!'''~~.~:- ~_~ _'~ _ _ -::_ ~._ "'!'" _;-_ __ ...~.__::" ~ ,_'" ~ '.,; _ _ _ _ ___ __'.<br /><br />8086' internal block di'agnim<br /><br />, .<br /><br /><span style="FONT-WEIGHT: bold">Ans.</span> 8086 Internal Architecture:<br /><br />Es . Cs 55 Ds' r<br /><br />,---------------.,..<br />I i I I I<br />- _''':'__._'..,,_-,_ - - __I<br /><br />A-BUS<br /><br />lEU I<br /><br />AH<br />~<br />en DH,<br /><br />'AI. Bl, abL,<br /><br /><br />'~ ."--,--,:"<br /><br />Microprocessor and Interfacing<br /><br />107<br /><br />8086 CPU is decided into two il)dependent'functional parts, (i) The Bus interface unit'(BIU) (2) Execution unit. (EU)<br /><br />Dividing. the word between t~ese two units speds of processing.<br /><br />81U: Sends out fetches instructions;from memory reads data from pat1S and memo!)', and writer qata to parts and memory. . '<br /><br />The BIU handles all transfers of data' and address~s on the buses for the execution unit.<br /><br />The DIU contains:<br /><br />(i) Queue: BIU fetches up to si~ instruction bytes for the instructions, which are not executed by the execution unit.<br /><br />The B[U stores these perfected bytes in a first in first out register set called a queue.<br /><br />The lJ1akes the processing faster than any other processor.<br /><br />(2) ~egment Registers': The four ~eparate register in the BIU are. used to hold the upper] 6 bits of the starting addresses of four memory segments that the 8086 is working with at the particular time. The four.<br />segment register are the code segment (CS) register, stack segment register (SS), the extra. segment register (ES), data segment register (OS).<br /><br />.<br /><br />The four segments can be operlapped also.<br /><br />The 8086 eccesses memory; the BIU produ{;es the required 20-bit physical addr~ss by adderingan offset to a segment base value· represnted by the content of of1$: of the segment register. .<br /><br />(3). Instruction Pointer: (IP) register: [t holds the 16-bit addresses, or offset of the next instruction byte is to be fetche.d from.<br /><br />The Execution (EU): Tells the BIU where to fetch instructions or data from, address instructions, and . excludes instructions.<br /><br />T!1e E.U contains circuity which directs ~nternal operations.<br /><br />. " ,". -'.<br />A decoder translates instructions (etched from memory into a 'seves of actions which the EV carries out.<br />EU has a 16-bit ALU which can add, subtract, AND, OR, XOR, increment, decrement, complement as shift binary nos.<br /><br />. FL~G Regi~ter : A flag is a flip flop which indicates some condition produced by the execution of an instruction or controls certain operation of the EU. .<br /><br />..A l6-bit flag register in EU contail)s nine active flags; the are six conditional flag ~nd three control flags,<br /><br /><br /></div></I'>dimplehttp://www.blogger.com/profile/08498156810777962547noreply@blogger.com0