Preview

Applications of Microprocessor 8086 on Outer Peripherals

Better Essays
Open Document
Open Document
1660 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Applications of Microprocessor 8086 on Outer Peripherals
APPLICATIONS OF MICROPROCESSOR 8086 ON OUTER PERIPHERALS
Vishal Dahuja B.Tech. - CSE RC1701A’29’ Reg. No # 1050070024 vishaldahuja@gmail.com

1. INTRODUCTION The 8086 microprocessor is the 16 bit microprocessor which means that the arithmetic logic unit, its internal registers and also the data bus these entire have to work with 16 bit at a time. The microprocessor has 20 bit address bus and therefore 220 memory locations. The pin diagram of 8086 is as shown: The 8086 microprocessor is just like 8085 microprocessor but the difference between them is that the 8085 microprocessor is of 8 bits but that of the 8086 is the 16 bit microprocessor. Also the flags are more in case of the 8086 microprocessor as shown:

Figure 1.2

The flags are as described below:
Figure 1.1



Overflow Flag (OF) - Set if the result is too large positive number, or is too

small negative number to fit into destination operand.  Direction Flag (DF) - if set then string manipulation instructions will auto-decrement index registers. If cleared then the index registers will be auto-incremented. Interrupt-enable Flag (IF) - setting this bit enables mask-able interrupts. Single-step Flag (TF) - if set then single-step interrupt will occur after the next instruction. Sign Flag (SF) - set if the most significant bit of the result is set. Zero Flag (ZF) - set if the result is zero. Auxiliary carry Flag (AF) - set if there was a carry from or borrow to bits 0-3 in the AL register. Parity Flag (PF) - set if parity (the number of "1" bits) in the low-order byte of the result is even. Carry Flag (CF) - set if there was a carry from or borrow to the most significant bit during last result calculation.

    

Figure 2.1

Actually we know in order to give directions or data values to the users, many of the microprocessor-controlled instruments and machines need to display the letters of the alphabets and the numbers, if some large amount of the data is needed to be displayed there the CRT is used



References: [1]http://www.lavoisier.fr/notice/fr401019.htm [2] http://openpdf.com/ebook/the-8088-and8086-microprocessors-programminginterfacing-software-hardware-andapplications-pdf.html [3]http://www.freepatentsonline.com/4888680. html [4]http://www.infibeam.com/Books/info/triebel /8088-8086-microprocessors-programminginterfacing-software-hardwareapplications/9788177584813.html Figure 2.3.3 The figure shown below is the image taken from the book: Figure 2.3.4

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    While the 8008 had 14 bit PC and addressing, the 8080 had a 16 bit address bus and an 8 bit data bus. Internally it had seven 8 bit registers, a 16 bit stack pointer to memory which replaced the 8 level…

    • 812 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 5 PT1420

    • 959 Words
    • 7 Pages

    The AND operator would be the best to use to determine whether or not a number is within a given range.…

    • 959 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Sheet01

    • 1045 Words
    • 5 Pages

    4. What is the result of the following code and where is it kept? LDAA #$15 ADDA #$13 5. Which of the following instructions is (are) illegal? a- LDAA #500 b- LDAA #50 c- LDAA #00 d- LDAA #$255 e- LDAA #$25 f- LDAA #$F5 g- ADDA mybyte , #$25 6. Which of the following instructions is (are) illegal? a- ADDA #$300 b- ADDA #$50 c- ADDA #$500 d- ADDA #$255 e- ADDA #12 f- ADDA#$F5 g- ADDA #$25 7. 8. 9. 10. Show a simple code to load values 30H and 97H into locations 805H and 806H, respectively. Show a simple code to load value 55H into locations 300H and 308H. Show a simple code to load value 5FH into Port B. Which of the following is an invalid use of the immediate addressing mode? a- LDDA #$24 b- LDAA $30 c- LDAA #$60…

    • 1045 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Quiz 5

    • 708 Words
    • 3 Pages

    2. A value from memory is placed in this register by the FETCH sequence and DECODED as an instruction.…

    • 708 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    i) The 8086 has 4 16-bit general purpose registers labelled AX, BX, CX & DX. Each 16-bit general purpose register can be split into two 8-bit registers. The letters L & H specify the lower & higher bytes of a particular register. The letter X is used to specify the complete 16-bit register.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pc Structure

    • 510 Words
    • 3 Pages

    | * 1KB Main Memory * Data Bus width of 8086 is 16 bit and 8 bit for 8088 * 1 MB Main Memory * 400 nanoseconds clock cycle time * 6 byte instruction cache for 8086 and 4 byte for 8088 * In 1981 IBM decided to use 8088 in its personal computer…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    assembly language, logical expressions, extended precision arithmetic and logical operations, operating on different sized operands, machine and arithmetic idioms, and masking…

    • 3431 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Key Words in Java

    • 888 Words
    • 4 Pages

    double | Indicates that a value is a 64-bit number with one or more digits after the decimal point. |…

    • 888 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Communication Errors

    • 538 Words
    • 3 Pages

    In each case, we assign the value 1 or 0 to this new bit so that the entire resulting pattern has an odd number of 1s. Once our encoding system has been modified in this way, a pattern with an even number of 1s indicates that an error has occurred and that the pattern being manipulated is incorrect.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    complicated analysis

    • 1848 Words
    • 8 Pages

    • use directive • BYTE PTR, WORD PTR, DWORD PTR • INC WORD PTR [BX] • INC BYTE PTR[BX] • BX-1000H DS- 2000H 21000 21000 FF 00 21001 21001 00 00 01 Flags INC WORD PTR [BX] INC BYTE PTR[BX] • OF – 0 • OF – 0 • SF – 0 • SF – 0 • ZF - 0 • ZF -1 • PF – 1(follows only low byte) • PF -1…

    • 1848 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    corlang

    • 386 Words
    • 2 Pages

    Instructions perform the same operation; they shift the bits in the destination operand to the left (toward more significant bit locations). For each shift count, the most significant bit of the destination operand is shifted into the CF flag, and the least significant bit is cleared.…

    • 386 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Alu Design

    • 1534 Words
    • 7 Pages

    Status flag Overflow Sign Zero Carry Detection XOR of carry into and out of the sign bit Copy of the sign bit NOR of all result bits Carry into the sign bit…

    • 1534 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Question 2 (5 Marks) Consider the following program segment LDAA #$05 LDAB #$04 INCB SBA WAI After executing the program, the condition code register flags (N,V,Z,C) will be: N V Z C…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab2_SimpleALU

    • 278 Words
    • 2 Pages

    The Carryout and Overflow flags are very important for Addition and Subtraction. The Carryout flag is set if an unsigned overflow occurs. The Overflow flag is set if a signed overflow occurs.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays