Presentation is loading. Please wait.

Presentation is loading. Please wait.

Memory Addresses.

Similar presentations


Presentation on theme: "Memory Addresses."— Presentation transcript:

1 Memory Addresses

2 How Memory Addresses Are Used

3 How Memory Addresses Are Used
Applies to DOS and Windows 9x only Windows NT and Windows 2000 use a different memory-mapping design

4

5 Memory Addresses Are assigned during the boot process
BIOS or real-mode device drivers may only work if given a specific group of addresses (usually in the upper memory range between 640K and 1024K) Shadowing ROM (aka shadow RAM) ROM programming code copied into RAM to speed up system operation because of faster access speed of RAM

6 Input/Output Addresses
Numbers used by devices and the CPU to manage communication between them Also called port addresses or ports

7 Input/Output Addresses

8 Interrupt Request Numbers and I/O Addresses for Devices
continued

9 Interrupt Request Numbers and I/O Addresses for Devices

10 Direct Memory Access (DMA) Channels
A shortcut method whereby an I/O device can send data directly to memory, bypassing the CPU

11 Direct Memory Access (DMA) Channels

12 Tying It All Together To allocate system resources and use them to manage hardware devices, at startup a hardware device is assigned: An IRQ by which it can signal the CPU that it needs attention Some I/O addresses by which the CPU and the device can communicate Some memory addresses that indicate where the program to manage the device can be stored Perhaps a DMA channel to speed up sending its data to memory

13

14

15 Configuration Data and How It Is Stored
Also called setup information Information about the computer’s hardware Stored in one of these devices: DIP switches CMOS setup chip Jumpers

16 Setup Data Stored by DIP Switches

17 Setup Data Stored on a CMOS Chip

18 Setup Data Stored by Jumpers

19 Passwords Stored on CMOS
Startup password Required by computer during boot process to gain access to the PC Also called power-on password

20 Protecting Data, Software, and Hardware
Saving and restoring setup information in CMOS Keeping OS rescue disks Backing up the hard drive Documentation Damage from electricity

21 Saving and Restoring Setup Information in CMOS
Two common utility software programs for backing up setup information to a disk to be used to recover lost setup information Nuts & Bolts Norton Utilities

22 Saving Setup Information Using Nuts & Bolts

23 Saving Setup Information Using Nuts & Bolts

24 Saving Setup Information Using Norton Utilities

25 Saving Setup Information Using Norton Utilities

26 Saving Setup Information Using Norton Utilities

27 Keeping OS Rescue Disks
Allows you to boot a computer Essential for every computer

28 Backing Up Your Hard Drive
Backup An extra copy of a file or files made to a different location or storage media Backup policy depends on what you are backing up

29 Documentation Keep hardware and software documentation well labeled in a safe place

30 Damage from Electricity
Computers and data can be destroyed by two kinds of electricity Static electricity (ESD or electrostatic discharge) Power spikes, including lightning Practical protection against damage Never touch the inside of a computer when it is turned on Be grounded when computer is on Use devices for protection against electrical surges and lightning

31 Chapter Summary How individual computer components work together to perform tasks


Download ppt "Memory Addresses."

Similar presentations


Ads by Google