SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
1
Chapter 2
8085 Microprocessor Architecture and
Microcomputer Systems
2
Microprocessor Architecture
• The microprocessor can be programmed to
perform functions on given data by writing
specific instructions into its memory.
– The microprocessor reads one instruction at a
time, matches it with its instruction set, and
performs the data manipulation specified.
– The result is either stored back into memory or
displayed on an output device.
3
The 8085 Architecture
• The 8085 uses three separate busses to perform
its operations
– The address bus.
– The data bus.
– The control bus.
4
The Address Bus
– 16 bits wide (A0 A1…A15)
• Therefore, the 8085 can access locations with numbers
from 0 to 65,536. Or, the 8085 can access a total of 64K
addresses.
– “Unidirectional”.
• Information flows out of the microprocessor and into the
memory or peripherals.
– When the 8085 wants to access a peripheral or a
memory location, it places the 16-bit address on
the address bus and then sends the appropriate
control signals.
5
The Data Bus
– 8 bits wide (D0 D1…D7)
– “Bi-directional”.
• Information flows both ways between the microprocessor
and memory or I/O.
– The 8085 uses the data bus to transfer the binary
information.
– Since the data bus has 8-bits only, then the 8085
can manipulate data 8 bits at-a-time only.
6
The Control Bus
– There is no real control bus. Instead, the control
bus is made up of a number of single bit control
signals.
7
Operation Types in a Microprocessor
• All of the operations of the microprocessor can
be classified into one of three types:
- Microprocessor Initiated Operations
- Internal Operations
- Peripheral Initiated Operations
8
Microprocessor Initiated Operations
• These are operations that the microprocessor
itself starts.
• These are usually one of 4 operations:
– Memory Read
– Memory Write
– I/O Read (Get data from an input device)
– I/O write (Send data to an output device)
9
Microprocessor Initiated Operations
• It is important to note that the microprocessor
treats memory and I/O devices the same way.
– Input and output devices simply look like memory
locations to the microprocessor.
• For example, the keyboard may look like memory
address A3F2H. To get what key is being pressed, the
microprocessor simply reads the data at location A3F2H.
– The communication process between the
microprocessor and peripheral devices consist of
the following three steps:
– Identify the address.
– Transfer the binary information.
– Provide the right timing signals.
10
The Read Operation
– To read the contents of a memory location, the
following steps take place:
• The microprocessor places the 16-bit address of the
memory location on the address bus.
• The microprocessor activates a control signal called
“memory read” which enables the memory chip.
• The memory decodes the address and identifies the right
location.
• The memory places the contents on the data bus.
• The microprocessor reads the value of the data bus after
a certain amount of time.
11
Internal Data Operations
• The 8085 can perform a number of internal
operations. Such as: storing data, Arithmetic &
Logic operations, Testing for condition, etc.
– To perform these operations, the microprocessor
needs an internal architecture similar to the
following:
Accumulator Flags
B C
D E
H L
Program Counter
Stack Pointer
DataAddress 816
12
8085 Internal Registers
13
8086 Internal Registers
14
The Internal Architecture
• We have already discussed the general purpose
registers, the Accumulator, and the flags.
• The Program Counter (PC)
– This is a register that is used to control the
sequencing of the execution of instructions.
– This register always holds the address of the next
instruction.
– Since it holds an address, it must be 16 bits wide.
15
The Internal Architecture
• The Stack pointer
– The stack pointer is also a 16-bit register that is
used to point into memory.
– The memory this register points to is a special
area called the stack.
– The stack is an area of memory used to hold data
that will be retreived soon.
– The stack is usually accessed in a Last In First
Out (LIFO) fashion.
16
Externally Initiated Operations
• External devices can initiate (start) one of the 4
following operations:
– Reset
• All operations are stopped and the program counter is
reset to 0000.
– Interrupt
• The microprocessor’s operations are interrupted and the
microprocessor executes what is called a “service
routine”.
• This routine “handles” the interrupt, (perform the
necessary operations). Then the microprocessor returns
to its previous operations and continues.
17
Externally Initiated Operations
– Ready
• The 8085 has a pin called RDY. This pin is used by
external devices to stop the 8085 until they catch up.
• As long as the RDY pin is low, the 8085 will be in a wait
state.
– Hold
• The 8085 has a pin called HOLD. This pin is used by
external devices to gain control of the busses.
• When the HOLD signal is activated by an external
device, the 8085 stops executing instructions and stops
using the busses.
• This would allow external devices to control the
information on the busses. Example DMA.
18
The Design and Operation of Memory
• Memory in a microprocessor system is where
information (data and instructions) is kept. It can
be classified into two main types:
• Main memory (RAM and ROM)
• Storage memory (Disks , CD ROMs, etc.)
– The simple view of RAM is that it is made up of
registers that are made up of flip-flops (or memory
elements).
• The number of flip-flops in a “memory register”
determines the size of the memory word.
– ROM on the other hand uses diodes instead of the
flip-flops to permanently hold the information.
19
Accessing Information in Memory
• For the microprocessor to access (Read or Write)
information in memory (RAM or ROM), it needs
to do the following:
– Select the right memory chip (using part of the
address bus).
– Identify the memory location (using the rest of the
address bus).
– Access the data (using the data bus).
2
0
Instruction Fetch
21
Tri-State Buffers
• An important circuit element that is used
extensively in memory.
• This buffer is a logic circuit that has three states:
– Logic 0, logic1, and high impedance.
– When this circuit is in high impedance mode it
looks as if it is disconnected from the output
completely.
The Output is Low The Output is High High Impedance
2
2
The Tri-State Buffer
• This circuit has two inputs and one output.
– The first input behaves like the normal input for
the circuit.
– The second input is an “enable”.
• If it is set high, the output follows the proper circuit
behavior.
• If it is set low, the output looks like a wire connected to
nothing.
Input Output
Enable
Input Output
Enable
OR
2
3
The Basic Memory Element
• The basic memory element is similar to a D latch.
• This latch has an input where the data comes in.
It has an enable input and an output on which
data comes out.
QD
EN
Data Input Data Output
Enable
2
4
The Basic Memory Element
• However, this is not safe.
– Data is always present on the input and the output
is always set to the contents of the latch.
– To avoid this, tri-state buffers are added at the
input and output of the latch.
QD
EN
Data Input Data Output
Enable
WR RD
2
5
The Basic Memory Element
• The WR signal controls the input buffer.
– The bar over WR means that this is an active low
signal.
– So, if WR is 0 the input data reaches the latch
input.
– If WR is 1 the input of the latch looks like a wire
connected to nothing.
• The RD signal controls the output in a similar
manner.
2
6
A Memory “Register”
• If we take four of these latches and connect them
together, we would have a 4-bit memory register
WR
RD
EN
Q
D
EN
Q
D
EN
Q
D
EN
Q
D
EN
I0 I1 I2 I3
O0 O1 O2 O3
2
7
A group of memory registers
– Expanding on this
scheme to add more
memory registers we get
the diagram to the right.
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D
EN
Q D
EN
Q D
EN
Q D
EN
Q
D0 D1 D2 D3
D0 D1 D2 D3
oooo
oooo
WR
RD
2
8
A group of Memory Registers
– If we represent each memory location (Register)
as a block we get the following
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
EN0
EN1
EN2
EN3
RD
2
9
The Design of a Memory Chip
• Using the RD and WR controls we can determine
the direction of flow either into or out of memory.
Then using the appropriate Enable input we
enable an individual memory register.
• What we have just designed is a memory with 4
locations and each location has 4 elements (bits).
This memory would be called 4 X 4 [Number of
location X number of bits per location].
3
0
The Enable Inputs
• How do we produce these enable line?
– Since we can never have more than one of these
enables active at the same time, we can have
them encoded to reduce the number of lines
coming into the chip.
– These encoded lines are the address lines for
memory.
31
The Design of a Memory Chip
– So, the previous diagram would now look like the
following:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
I0 I1 I2 I3
O0 O1 O2 O3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
3
2
The Design of a Memory Chip
• Since we have tri-state buffers on both the inputs
and outputs of the flip flops, we can actually use
one set of pins only.
– The chip would now look like this:
Input Buffers
Output Buffers
Memory Reg. 0
Memory Reg. 1
Memory Reg. 2
Memory Reg. 3
WR
RD
A
d
d
r
e
s
s
D
e
c
o
d
e
r
A1
A0
D0
D1
D2
D3
D0
D1
D2
D3
A1
A0
RD WR
3
3
The steps of writing into Memory
• What happens when the programmer issues the
STA instruction?
– The microprocessor would turn on the WR control
(WR = 0) and turn off the RD control (RD = 1).
– The address is applied to the address decoder
which generates a single Enable signal to turn on
only one of the memory registers.
– The data is then applied on the data lines and it is
stored into the enabled register.
3
4
Dimensions of Memory
• Memory is usually measured by two numbers: its
length and its width (Length X Width).
• The length is the total number of locations.
• The width is the number of bits in each location.
– The length (total number of locations) is a function
of the number of address lines.
# of memory locations = 2( # of address lines)
• So, a memory chip with 10 address lines would have
210 = 1024 locations (1K)
• Looking at it from the other side, a memory chip with 4K
locations would need
Log2 4096=12 address lines
3
5
The 8085 and Memory
• The 8085 has 16 address lines. That means it
can address
216 = 64K memory locations.
– Then it will need 1 memory chip with 64 k
locations, or 2 chips with 32 K in each, or 4 with
16 K each or 16 of the 4 K chips, etc.
• how would we use these address lines to control
the multiple chips?
3
6
Chip Select
• Usually, each memory chip has a CS (Chip
Select) input. The chip will only work if an active
signal is applied on that input.
• To allow the use of multiple chips in the make up
of memory, we need to use a number of the
address lines for the purpose of “chip selection”.
– These address lines are decoded to generate the
2n necessary CS inputs for the memory chips to
be used.
3
7
Chip Selection Example
– Assume that we need to build a memory system
made up of 4 of the 4 X 4 memory chips we
designed earlier.
– We will need to use 2 inputs and a decoder to
identify which chip will be used at what time.
– The resulting design would now look like the one
on the following slide.
3
8
Chip Selection Example
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
CS
RD WR
A0
A1
2 X4
DecoderA3
A2
A1
A0
RD
WR
D1
D0
3
9
Memory Map and Addresses
• The memory map is a picture representation of
the address range and shows where the different
memory chips are located within the address
range.
0000
FFFF
AddressRange
RAM 1
RAM 2
RAM 3
RAM 4
EPROM
0000
3FFF
4400
5FFF
6000
8FFF
9000
A3FF
A400
F7FF
Address Range of EPROM Chip
Address Range of 1st RAM Chip
Address Range of 2nd RAM Chip
Address Range of 3rd RAM Chip
Address Range of 4th RAM Chip
4
0
Address Range of a Memory Chip
• The address range of a particular chip is the list
of all addresses that are mapped to the chip.
– An example for the address range and its
relationship to the memory chips would be the
Post Office Boxes in the post office.
– Each box has its unique number that is assigned
sequentially. (memory locations)
– The boxes are grouped into groups. (memory chips)
– The first box in a group has the number immediately after
the last box in the previous group.
41
Address Range of a Memory Chip
– The above example can be modified slightly to
make it closer to our discussion on memory.
– Let’s say that this post office has only 1000 boxes.
– Let’s also say that these are grouped into 10 groups of 100
boxes each. Boxes 0000 to 0099 are in group 0, boxes
0100 to 0199 are in group 1 and so on.
– We can look at the box number as if it is made up
of two pieces:
– The group number and the box’s index within the group.
– So, box number 436 is the 36th box in the 4th group.
The upper digit of the box number identifies the group and the
lower two digits identify the box within the group.
4
2
The 8085 and Address Ranges
• The 8085 has 16 address lines. So, it can
address a total of 64K memory locations.
– If we use memory chips with 1K locations each,
then we will need 64 such chips.
– The 1K memory chip needs 10 address lines to
uniquely identify the 1K locations. (log2
1024 = 10)
– That leaves 6 address lines which is the exact
number needed for selecting between the 64
different chips (log2
64 = 6).
4
3
The 8085 and Address Ranges
• Now, we can break up the 16-bit address of the
8085 into two pieces:
A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0
– Depending on the combination on the address lines
A15 - A10 , the address range of the specified chip is
determined.
Location Selection within the ChipChip Selection
4
4
Chip Select Example
• A chip that uses the combination A15 - A10 =
001000 would have addresses that range from
2000H to 23FFH.
– Keep in mind that the 10 address lines on the chip gives a range of
00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the
chips.
– The memory chip in this example would require the following circuit
on its chip select input:
CS
A10
A11
A12
A13
A14
A15
4
5
Chip Select Example
• If we change the above combination to the
following:
– Now the chip would have addresses ranging from:
2400 to 27FF.
– Changing the combination of the address bits
connected to the chip select changes the address
range for the memory chip.
CS
A10
A11
A12
A13
A14
A15
4
6
Chip Select Example
– To illustrate this with a picture:
• in the first case, the memory chip occupies the piece of
the memory map identified as before.
• In the second case, it occupies the piece identified as
after.
0000
2000
23FF
FFFF
0000
2400
27FF
FFFF
Before After
4
7
High-Order vs. Low-Order Address Lines
• The address lines from a microprocessor can be
classified into two types:
– High-Order
• Used for memory chip selection
– Low-Order
• Used for location selection within a memory chip.
– This classification is highly dependent on the
memory system design.
4
8
Data Lines
• All of the above discussion has been regarding
memory length. Lets look at memory width.
• We said that the width is the number of bits in
each memory word.
– We have been assuming so far that our memory
chips have the right width.
– What if they don’t?
• It is very common to find memory chips that have only 4
bits per location. How would you design a byte wide
memory system using these chips?
• We use two chips for the same address range. One chip
will supply 4 of the data bits per address and the other
chip supply the other 4 data bits for the same address.
4
9
Data Lines
CS
A0
…
A9
CS CS
D0
…
D3
D4
…
D7

Weitere ähnliche Inhalte

Was ist angesagt?

Part I:Introduction to assembly language
Part I:Introduction to assembly languagePart I:Introduction to assembly language
Part I:Introduction to assembly languageAhmed M. Abed
 
Chapter 1 microprocessor introduction
Chapter 1 microprocessor introductionChapter 1 microprocessor introduction
Chapter 1 microprocessor introductionShubham Singh
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkarSAQUIB AHMAD
 
Register Organisation of 8086 Microprocessor
Register Organisation of 8086 MicroprocessorRegister Organisation of 8086 Microprocessor
Register Organisation of 8086 MicroprocessorNikhil Kumar
 
Fetch decode-execute presentation
Fetch decode-execute presentationFetch decode-execute presentation
Fetch decode-execute presentationchantellemallia
 
Instruction cycle presentation
Instruction   cycle presentationInstruction   cycle presentation
Instruction cycle presentationMoniba Irfan
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organizationBadrinath Kadam
 
8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controllerabhikalmegh
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257MdFazleRabbi18
 
Input output accessing
Input output accessingInput output accessing
Input output accessingankitraosingh
 
Computer organisation -morris mano
Computer organisation  -morris manoComputer organisation  -morris mano
Computer organisation -morris manovishnu murthy
 
Computer registers
Computer registersComputer registers
Computer registersJatin Grover
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Ritwik MG
 
Stack and its usage in assembly language
Stack and its usage in assembly language Stack and its usage in assembly language
Stack and its usage in assembly language Usman Bin Saad
 
Computer organization
Computer organizationComputer organization
Computer organizationishapadhy
 

Was ist angesagt? (20)

Part I:Introduction to assembly language
Part I:Introduction to assembly languagePart I:Introduction to assembly language
Part I:Introduction to assembly language
 
Chapter 1 microprocessor introduction
Chapter 1 microprocessor introductionChapter 1 microprocessor introduction
Chapter 1 microprocessor introduction
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkar
 
Register Organisation of 8086 Microprocessor
Register Organisation of 8086 MicroprocessorRegister Organisation of 8086 Microprocessor
Register Organisation of 8086 Microprocessor
 
Fetch decode-execute presentation
Fetch decode-execute presentationFetch decode-execute presentation
Fetch decode-execute presentation
 
Basic Computer Organization and Design
Basic  Computer  Organization  and  DesignBasic  Computer  Organization  and  Design
Basic Computer Organization and Design
 
Instruction cycle presentation
Instruction   cycle presentationInstruction   cycle presentation
Instruction cycle presentation
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organization
 
8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257
 
Input output accessing
Input output accessingInput output accessing
Input output accessing
 
Interrupt 8085
Interrupt 8085Interrupt 8085
Interrupt 8085
 
Computer organisation -morris mano
Computer organisation  -morris manoComputer organisation  -morris mano
Computer organisation -morris mano
 
Computer registers
Computer registersComputer registers
Computer registers
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 
Stack and its usage in assembly language
Stack and its usage in assembly language Stack and its usage in assembly language
Stack and its usage in assembly language
 
Introduction to 8085svv
Introduction to 8085svvIntroduction to 8085svv
Introduction to 8085svv
 
Computer organization
Computer organizationComputer organization
Computer organization
 
Memory mapping
Memory mappingMemory mapping
Memory mapping
 

Ähnlich wie Chapter 2-8085 Microprocessor Architecture and Microcomputer Systems

8085 Microprocessor Architecture
8085 Microprocessor Architecture8085 Microprocessor Architecture
8085 Microprocessor Architecturedeval patel
 
Microprocessor Architecture
Microprocessor ArchitectureMicroprocessor Architecture
Microprocessor ArchitectureAvijeet Negel
 
1.microprocessor
1.microprocessor1.microprocessor
1.microprocessorraja p
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.pptjeronimored
 
Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Rishikesh Bhavsar
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)ufaq kk
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptxCharunnath S V
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfAbhishekkumar397974
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacingdeval patel
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxDrVaibhavMeshram
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptxsruti009988
 
8085 Architecture
8085 Architecture8085 Architecture
8085 Architecturedeval patel
 
8085 microprocessor architecture
8085 microprocessor architecture8085 microprocessor architecture
8085 microprocessor architectureArashdeepkaur16
 

Ähnlich wie Chapter 2-8085 Microprocessor Architecture and Microcomputer Systems (20)

8085 Microprocessor Architecture
8085 Microprocessor Architecture8085 Microprocessor Architecture
8085 Microprocessor Architecture
 
Microprocessor Architecture
Microprocessor ArchitectureMicroprocessor Architecture
Microprocessor Architecture
 
1.microprocessor
1.microprocessor1.microprocessor
1.microprocessor
 
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
8085microprocessorarchitectureppt-121013115356-phpapp02_2.ppt
 
architect.ppt
architect.pptarchitect.ppt
architect.ppt
 
Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3Microprocessor 8085 Chapter 3
Microprocessor 8085 Chapter 3
 
Unit 2.ppt
Unit 2.pptUnit 2.ppt
Unit 2.ppt
 
Microprocessor and Application (8085)
Microprocessor and Application (8085)Microprocessor and Application (8085)
Microprocessor and Application (8085)
 
12 mt06ped001
12 mt06ped001 12 mt06ped001
12 mt06ped001
 
Unit 2 - Microprocessor & Microcontroller.pptx
Unit 2 -  Microprocessor & Microcontroller.pptxUnit 2 -  Microprocessor & Microcontroller.pptx
Unit 2 - Microprocessor & Microcontroller.pptx
 
MP_MC.pdf
MP_MC.pdfMP_MC.pdf
MP_MC.pdf
 
Mp 8085
Mp 8085Mp 8085
Mp 8085
 
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdfPart of UNIT2 Memory mapped IOjkl;'lk.pdf
Part of UNIT2 Memory mapped IOjkl;'lk.pdf
 
Memory & I/O interfacing
Memory & I/O  interfacingMemory & I/O  interfacing
Memory & I/O interfacing
 
Module -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptxModule -4_microprocessor (1).pptx
Module -4_microprocessor (1).pptx
 
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
8085 Microprocessor - Ramesh Gaonkar.pdf-27 (1).pptx
 
8085 Architecture
8085 Architecture8085 Architecture
8085 Architecture
 
8085 microprocessor architecture
8085 microprocessor architecture8085 microprocessor architecture
8085 microprocessor architecture
 
Microprocessor history1
Microprocessor history1Microprocessor history1
Microprocessor history1
 
Microprocessor history1
Microprocessor history1Microprocessor history1
Microprocessor history1
 

Mehr von cmkandemir

Temel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım ÖrnekleriTemel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım Örneklericmkandemir
 
Yapay Zeka Nedir?
Yapay Zeka Nedir?Yapay Zeka Nedir?
Yapay Zeka Nedir?cmkandemir
 
Zekayı Anlamak
Zekayı AnlamakZekayı Anlamak
Zekayı Anlamakcmkandemir
 
PHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesiPHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesicmkandemir
 
Chapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional InstructionsChapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional Instructionscmkandemir
 
Chapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 InstructionsChapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 Instructionscmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2cmkandemir
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1cmkandemir
 
Matching Game In Java
Matching Game In JavaMatching Game In Java
Matching Game In Javacmkandemir
 
impress.js Framework
impress.js Frameworkimpress.js Framework
impress.js Frameworkcmkandemir
 
openCV and Java - Face Detection
openCV and Java - Face DetectionopenCV and Java - Face Detection
openCV and Java - Face Detectioncmkandemir
 
PHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemlerPHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemlercmkandemir
 
CSS Uygulamaları 1
CSS Uygulamaları 1CSS Uygulamaları 1
CSS Uygulamaları 1cmkandemir
 
CSS - Sunum Bileşenleri
CSS - Sunum BileşenleriCSS - Sunum Bileşenleri
CSS - Sunum Bileşenlericmkandemir
 
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, FonksiyonlarKod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, Fonksiyonlarcmkandemir
 
Web Sitesi Geliştirme Adımları
Web Sitesi Geliştirme AdımlarıWeb Sitesi Geliştirme Adımları
Web Sitesi Geliştirme Adımlarıcmkandemir
 
CSS - Genel Bakış
CSS - Genel BakışCSS - Genel Bakış
CSS - Genel Bakışcmkandemir
 
Threads and Game Programming In Java
Threads and Game Programming In JavaThreads and Game Programming In Java
Threads and Game Programming In Javacmkandemir
 
JDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and ConfigurationJDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and Configurationcmkandemir
 
Temel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, FormTemel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, Formcmkandemir
 

Mehr von cmkandemir (20)

Temel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım ÖrnekleriTemel HTML Etiketleri ve Kullanım Örnekleri
Temel HTML Etiketleri ve Kullanım Örnekleri
 
Yapay Zeka Nedir?
Yapay Zeka Nedir?Yapay Zeka Nedir?
Yapay Zeka Nedir?
 
Zekayı Anlamak
Zekayı AnlamakZekayı Anlamak
Zekayı Anlamak
 
PHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesiPHP - Kullanıcı Girişlerinin İşlenmesi
PHP - Kullanıcı Girişlerinin İşlenmesi
 
Chapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional InstructionsChapter 7 - Programming Techniques with Additional Instructions
Chapter 7 - Programming Techniques with Additional Instructions
 
Chapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 InstructionsChapter 6 - Introduction to 8085 Instructions
Chapter 6 - Introduction to 8085 Instructions
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 2
 
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
Canvas Öğrenme Yönetim Sistemi Kullanım Kılavuzu Bölüm 1
 
Matching Game In Java
Matching Game In JavaMatching Game In Java
Matching Game In Java
 
impress.js Framework
impress.js Frameworkimpress.js Framework
impress.js Framework
 
openCV and Java - Face Detection
openCV and Java - Face DetectionopenCV and Java - Face Detection
openCV and Java - Face Detection
 
PHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemlerPHP ve MySQL Bağlantısı - Temel İşlemler
PHP ve MySQL Bağlantısı - Temel İşlemler
 
CSS Uygulamaları 1
CSS Uygulamaları 1CSS Uygulamaları 1
CSS Uygulamaları 1
 
CSS - Sunum Bileşenleri
CSS - Sunum BileşenleriCSS - Sunum Bileşenleri
CSS - Sunum Bileşenleri
 
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, FonksiyonlarKod Akış Kontrolü - Döngüler, Fonksiyonlar
Kod Akış Kontrolü - Döngüler, Fonksiyonlar
 
Web Sitesi Geliştirme Adımları
Web Sitesi Geliştirme AdımlarıWeb Sitesi Geliştirme Adımları
Web Sitesi Geliştirme Adımları
 
CSS - Genel Bakış
CSS - Genel BakışCSS - Genel Bakış
CSS - Genel Bakış
 
Threads and Game Programming In Java
Threads and Game Programming In JavaThreads and Game Programming In Java
Threads and Game Programming In Java
 
JDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and ConfigurationJDK and Eclipse Installation and Configuration
JDK and Eclipse Installation and Configuration
 
Temel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, FormTemel HTML Etiketleri - Tablo, Form
Temel HTML Etiketleri - Tablo, Form
 

Kürzlich hochgeladen

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Chapter 2-8085 Microprocessor Architecture and Microcomputer Systems

  • 1. 1 Chapter 2 8085 Microprocessor Architecture and Microcomputer Systems
  • 2. 2 Microprocessor Architecture • The microprocessor can be programmed to perform functions on given data by writing specific instructions into its memory. – The microprocessor reads one instruction at a time, matches it with its instruction set, and performs the data manipulation specified. – The result is either stored back into memory or displayed on an output device.
  • 3. 3 The 8085 Architecture • The 8085 uses three separate busses to perform its operations – The address bus. – The data bus. – The control bus.
  • 4. 4 The Address Bus – 16 bits wide (A0 A1…A15) • Therefore, the 8085 can access locations with numbers from 0 to 65,536. Or, the 8085 can access a total of 64K addresses. – “Unidirectional”. • Information flows out of the microprocessor and into the memory or peripherals. – When the 8085 wants to access a peripheral or a memory location, it places the 16-bit address on the address bus and then sends the appropriate control signals.
  • 5. 5 The Data Bus – 8 bits wide (D0 D1…D7) – “Bi-directional”. • Information flows both ways between the microprocessor and memory or I/O. – The 8085 uses the data bus to transfer the binary information. – Since the data bus has 8-bits only, then the 8085 can manipulate data 8 bits at-a-time only.
  • 6. 6 The Control Bus – There is no real control bus. Instead, the control bus is made up of a number of single bit control signals.
  • 7. 7 Operation Types in a Microprocessor • All of the operations of the microprocessor can be classified into one of three types: - Microprocessor Initiated Operations - Internal Operations - Peripheral Initiated Operations
  • 8. 8 Microprocessor Initiated Operations • These are operations that the microprocessor itself starts. • These are usually one of 4 operations: – Memory Read – Memory Write – I/O Read (Get data from an input device) – I/O write (Send data to an output device)
  • 9. 9 Microprocessor Initiated Operations • It is important to note that the microprocessor treats memory and I/O devices the same way. – Input and output devices simply look like memory locations to the microprocessor. • For example, the keyboard may look like memory address A3F2H. To get what key is being pressed, the microprocessor simply reads the data at location A3F2H. – The communication process between the microprocessor and peripheral devices consist of the following three steps: – Identify the address. – Transfer the binary information. – Provide the right timing signals.
  • 10. 10 The Read Operation – To read the contents of a memory location, the following steps take place: • The microprocessor places the 16-bit address of the memory location on the address bus. • The microprocessor activates a control signal called “memory read” which enables the memory chip. • The memory decodes the address and identifies the right location. • The memory places the contents on the data bus. • The microprocessor reads the value of the data bus after a certain amount of time.
  • 11. 11 Internal Data Operations • The 8085 can perform a number of internal operations. Such as: storing data, Arithmetic & Logic operations, Testing for condition, etc. – To perform these operations, the microprocessor needs an internal architecture similar to the following: Accumulator Flags B C D E H L Program Counter Stack Pointer DataAddress 816
  • 14. 14 The Internal Architecture • We have already discussed the general purpose registers, the Accumulator, and the flags. • The Program Counter (PC) – This is a register that is used to control the sequencing of the execution of instructions. – This register always holds the address of the next instruction. – Since it holds an address, it must be 16 bits wide.
  • 15. 15 The Internal Architecture • The Stack pointer – The stack pointer is also a 16-bit register that is used to point into memory. – The memory this register points to is a special area called the stack. – The stack is an area of memory used to hold data that will be retreived soon. – The stack is usually accessed in a Last In First Out (LIFO) fashion.
  • 16. 16 Externally Initiated Operations • External devices can initiate (start) one of the 4 following operations: – Reset • All operations are stopped and the program counter is reset to 0000. – Interrupt • The microprocessor’s operations are interrupted and the microprocessor executes what is called a “service routine”. • This routine “handles” the interrupt, (perform the necessary operations). Then the microprocessor returns to its previous operations and continues.
  • 17. 17 Externally Initiated Operations – Ready • The 8085 has a pin called RDY. This pin is used by external devices to stop the 8085 until they catch up. • As long as the RDY pin is low, the 8085 will be in a wait state. – Hold • The 8085 has a pin called HOLD. This pin is used by external devices to gain control of the busses. • When the HOLD signal is activated by an external device, the 8085 stops executing instructions and stops using the busses. • This would allow external devices to control the information on the busses. Example DMA.
  • 18. 18 The Design and Operation of Memory • Memory in a microprocessor system is where information (data and instructions) is kept. It can be classified into two main types: • Main memory (RAM and ROM) • Storage memory (Disks , CD ROMs, etc.) – The simple view of RAM is that it is made up of registers that are made up of flip-flops (or memory elements). • The number of flip-flops in a “memory register” determines the size of the memory word. – ROM on the other hand uses diodes instead of the flip-flops to permanently hold the information.
  • 19. 19 Accessing Information in Memory • For the microprocessor to access (Read or Write) information in memory (RAM or ROM), it needs to do the following: – Select the right memory chip (using part of the address bus). – Identify the memory location (using the rest of the address bus). – Access the data (using the data bus).
  • 21. 21 Tri-State Buffers • An important circuit element that is used extensively in memory. • This buffer is a logic circuit that has three states: – Logic 0, logic1, and high impedance. – When this circuit is in high impedance mode it looks as if it is disconnected from the output completely. The Output is Low The Output is High High Impedance
  • 22. 2 2 The Tri-State Buffer • This circuit has two inputs and one output. – The first input behaves like the normal input for the circuit. – The second input is an “enable”. • If it is set high, the output follows the proper circuit behavior. • If it is set low, the output looks like a wire connected to nothing. Input Output Enable Input Output Enable OR
  • 23. 2 3 The Basic Memory Element • The basic memory element is similar to a D latch. • This latch has an input where the data comes in. It has an enable input and an output on which data comes out. QD EN Data Input Data Output Enable
  • 24. 2 4 The Basic Memory Element • However, this is not safe. – Data is always present on the input and the output is always set to the contents of the latch. – To avoid this, tri-state buffers are added at the input and output of the latch. QD EN Data Input Data Output Enable WR RD
  • 25. 2 5 The Basic Memory Element • The WR signal controls the input buffer. – The bar over WR means that this is an active low signal. – So, if WR is 0 the input data reaches the latch input. – If WR is 1 the input of the latch looks like a wire connected to nothing. • The RD signal controls the output in a similar manner.
  • 26. 2 6 A Memory “Register” • If we take four of these latches and connect them together, we would have a 4-bit memory register WR RD EN Q D EN Q D EN Q D EN Q D EN I0 I1 I2 I3 O0 O1 O2 O3
  • 27. 2 7 A group of memory registers – Expanding on this scheme to add more memory registers we get the diagram to the right. D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D0 D1 D2 D3 D0 D1 D2 D3 oooo oooo WR RD
  • 28. 2 8 A group of Memory Registers – If we represent each memory location (Register) as a block we get the following Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR EN0 EN1 EN2 EN3 RD
  • 29. 2 9 The Design of a Memory Chip • Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the appropriate Enable input we enable an individual memory register. • What we have just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 [Number of location X number of bits per location].
  • 30. 3 0 The Enable Inputs • How do we produce these enable line? – Since we can never have more than one of these enables active at the same time, we can have them encoded to reduce the number of lines coming into the chip. – These encoded lines are the address lines for memory.
  • 31. 31 The Design of a Memory Chip – So, the previous diagram would now look like the following: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 I0 I1 I2 I3 O0 O1 O2 O3 WR RD A d d r e s s D e c o d e r A1 A0
  • 32. 3 2 The Design of a Memory Chip • Since we have tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. – The chip would now look like this: Input Buffers Output Buffers Memory Reg. 0 Memory Reg. 1 Memory Reg. 2 Memory Reg. 3 WR RD A d d r e s s D e c o d e r A1 A0 D0 D1 D2 D3 D0 D1 D2 D3 A1 A0 RD WR
  • 33. 3 3 The steps of writing into Memory • What happens when the programmer issues the STA instruction? – The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). – The address is applied to the address decoder which generates a single Enable signal to turn on only one of the memory registers. – The data is then applied on the data lines and it is stored into the enabled register.
  • 34. 3 4 Dimensions of Memory • Memory is usually measured by two numbers: its length and its width (Length X Width). • The length is the total number of locations. • The width is the number of bits in each location. – The length (total number of locations) is a function of the number of address lines. # of memory locations = 2( # of address lines) • So, a memory chip with 10 address lines would have 210 = 1024 locations (1K) • Looking at it from the other side, a memory chip with 4K locations would need Log2 4096=12 address lines
  • 35. 3 5 The 8085 and Memory • The 8085 has 16 address lines. That means it can address 216 = 64K memory locations. – Then it will need 1 memory chip with 64 k locations, or 2 chips with 32 K in each, or 4 with 16 K each or 16 of the 4 K chips, etc. • how would we use these address lines to control the multiple chips?
  • 36. 3 6 Chip Select • Usually, each memory chip has a CS (Chip Select) input. The chip will only work if an active signal is applied on that input. • To allow the use of multiple chips in the make up of memory, we need to use a number of the address lines for the purpose of “chip selection”. – These address lines are decoded to generate the 2n necessary CS inputs for the memory chips to be used.
  • 37. 3 7 Chip Selection Example – Assume that we need to build a memory system made up of 4 of the 4 X 4 memory chips we designed earlier. – We will need to use 2 inputs and a decoder to identify which chip will be used at what time. – The resulting design would now look like the one on the following slide.
  • 38. 3 8 Chip Selection Example CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 2 X4 DecoderA3 A2 A1 A0 RD WR D1 D0
  • 39. 3 9 Memory Map and Addresses • The memory map is a picture representation of the address range and shows where the different memory chips are located within the address range. 0000 FFFF AddressRange RAM 1 RAM 2 RAM 3 RAM 4 EPROM 0000 3FFF 4400 5FFF 6000 8FFF 9000 A3FF A400 F7FF Address Range of EPROM Chip Address Range of 1st RAM Chip Address Range of 2nd RAM Chip Address Range of 3rd RAM Chip Address Range of 4th RAM Chip
  • 40. 4 0 Address Range of a Memory Chip • The address range of a particular chip is the list of all addresses that are mapped to the chip. – An example for the address range and its relationship to the memory chips would be the Post Office Boxes in the post office. – Each box has its unique number that is assigned sequentially. (memory locations) – The boxes are grouped into groups. (memory chips) – The first box in a group has the number immediately after the last box in the previous group.
  • 41. 41 Address Range of a Memory Chip – The above example can be modified slightly to make it closer to our discussion on memory. – Let’s say that this post office has only 1000 boxes. – Let’s also say that these are grouped into 10 groups of 100 boxes each. Boxes 0000 to 0099 are in group 0, boxes 0100 to 0199 are in group 1 and so on. – We can look at the box number as if it is made up of two pieces: – The group number and the box’s index within the group. – So, box number 436 is the 36th box in the 4th group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group.
  • 42. 4 2 The 8085 and Address Ranges • The 8085 has 16 address lines. So, it can address a total of 64K memory locations. – If we use memory chips with 1K locations each, then we will need 64 such chips. – The 1K memory chip needs 10 address lines to uniquely identify the 1K locations. (log2 1024 = 10) – That leaves 6 address lines which is the exact number needed for selecting between the 64 different chips (log2 64 = 6).
  • 43. 4 3 The 8085 and Address Ranges • Now, we can break up the 16-bit address of the 8085 into two pieces: A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 – Depending on the combination on the address lines A15 - A10 , the address range of the specified chip is determined. Location Selection within the ChipChip Selection
  • 44. 4 4 Chip Select Example • A chip that uses the combination A15 - A10 = 001000 would have addresses that range from 2000H to 23FFH. – Keep in mind that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. – The memory chip in this example would require the following circuit on its chip select input: CS A10 A11 A12 A13 A14 A15
  • 45. 4 5 Chip Select Example • If we change the above combination to the following: – Now the chip would have addresses ranging from: 2400 to 27FF. – Changing the combination of the address bits connected to the chip select changes the address range for the memory chip. CS A10 A11 A12 A13 A14 A15
  • 46. 4 6 Chip Select Example – To illustrate this with a picture: • in the first case, the memory chip occupies the piece of the memory map identified as before. • In the second case, it occupies the piece identified as after. 0000 2000 23FF FFFF 0000 2400 27FF FFFF Before After
  • 47. 4 7 High-Order vs. Low-Order Address Lines • The address lines from a microprocessor can be classified into two types: – High-Order • Used for memory chip selection – Low-Order • Used for location selection within a memory chip. – This classification is highly dependent on the memory system design.
  • 48. 4 8 Data Lines • All of the above discussion has been regarding memory length. Lets look at memory width. • We said that the width is the number of bits in each memory word. – We have been assuming so far that our memory chips have the right width. – What if they don’t? • It is very common to find memory chips that have only 4 bits per location. How would you design a byte wide memory system using these chips? • We use two chips for the same address range. One chip will supply 4 of the data bits per address and the other chip supply the other 4 data bits for the same address.