SlideShare a Scribd company logo
1 of 23
COMPARISON OF PENTIUM PROCESSOR WITH
80386 AND 80486 PROCESSOR’S
LIMITATIONS OF 80286 THAT LEAD TO 80386
   80286 has only a 16 bit processor.

   Maximum segment size of 80286 is 64 KB.

   80286 cannot be easily switched between real mode and
    protected mode because resetting was required.

   The amount of memory addressable by the 80286 is 16M byte.

   To increase the over all system performance.
THE 80386 MICROPROCESSOR
   A 32-bit microprocessor introduced by Intel in 1985.

   The chip of 80386 contains 132 pins.

   It has total 129 instructions.

   It has 32 bit data bus 32 bit address bus.

   The execution of the instructions is highly pipelined and
    the processor is designed to operate in a multiuser and
    multitasking.

   Software written for the 8088,8086,80186 and 80286
    will also run on 386.
   The address bus is capable of addressing over 4
    gigabytes of physical memory.

   Virtual addressing pushing this over 64 terabytes of
    storage.

   80387 coprocessor is used.

   The processor can operate in two modes:
       In the real mode physical address space is 1Mbytes and
        maximum size of segment is 64KB.

       In the protected mode address space is 4G bytes and
        maximum size of segment is upto entire physical addressing
        space.
   80386 processor is available in 2 different versions.
       386DX

           32 bit address bus and 32 bit data bus.

           132 pins package.
       386SX

           24 bit address bus and 16 bit data bus.

           100 pin package.

           The lower cost package and ease of interfacing 8 bit and 16
            bit memory and peripherals.

           But the address range and memory transfer rate are lower
            than that of 386DX.
REGISTER SET-80386
   It included all eight general purpose registers plus the
    four segment registers.

   The general purpose registers were 16 bit wide in earlier
    machines, but in 386 these registers can be extended to
    32 bit.

   Their new names are EAX,EBX,ECX and so on.

   Two additional 16 bit segment are included FS and GS.
MEMORY SYSTEM OF THE 80386
The memory bank are accessed via four bank enable signals BE0,BE1,BE2
and BE3.

              Bank3     Bank 2      Bank1   Bank 0



              1G*8      1G*8        1G*8     1G*8



                               32 bit

           BE0,BE1,BE2 and BE3 are active low signals.
THE 80486 MICROPROCESSOR
   80486 is the next in Intel’s upward compatible 80x86
    architecture.

   Only few differences between the 80486 and 80386, but
    these differences created a significant performance
    improvement.

   32 bit microprocessor and same register set as 80386.

   Few additional instructions were added to its instruction set.

   4 gigabyte addressing space .
IMPROVEMENTS MADE IN 80486 OVER 80386

   80486 was powered with a 8KB cache memory.

   This improved the speed of 80486 processor to great extent.

   Some new 80486 instructions are included to maintain the
    cache.

   It uses four way set associative cache.

   80486 also uses a co-processor similar to 80387 used with
    80386.

   But this co-processor is integrated on the chip allows it to
    execute instructions 3 times faster as 386/387 combination.
   The new design of 80486 allows the instruction to
    execute with fewer clock cycles.

   486 is packed with 168 pin grid array package instead of
    the 132 pin used for 386 processor.

   This additional pin’s made room for the additional
    signals.

   This new design of 80486 allows the instruction to
    execute with fewer clock cycles.

   These small differences made 80486 more powerful
    processor.
THE PENTIUM PROCESSOR
WHY THE NAME PENTIUM ?????
   Intel wanted to prevent their competitors from branding
    their processors with similar names, as AMD had done
    with their Am486.

   The name Pentium is originally derived from
    the Greek word pente meaning 'five' as the series was
    Intel's 5th generation microarchitecture.
THE PENTIUM PROCESSOR
   Upward compatibility has been maintained.

   It can run all programs written for any 80x86 line, but
    does so at a double the speed of fastest 80486.

   Pentium is mixture of both CISC and RISC technologies.

   All the prior 80x86 processor are considered as CISC
    processor.

   The addition of RISC aspects lead to additional
    performance improvement.
 It uses 64 bit data bus to address memory organized in
  8 banks, each bank contains 512 MB of data.
 Each bank can store a byte of data.


    BE7    BE6    BE5    BE4        BE3      BE2   BE1   BE0



    B7     B6     B5      B4            B3   B2    B1    B0



                               64 bit

                  Memory System of Pentium

   All these bank enable signals are active low.
IMPROVEMENTS OF PENTIUM OVER 80X86

   Separate 8KB data and instruction cache memory.

   Dual Integer pipelines are present but only single
    integer pipeline is present in 80486.

   Branch Prediction Logic.
CACHE MEMORY
   The Pentium contains two 8K-byte cache.

   An 8 byte instruction cache, which stores the instruction.

   An 8 byte data cache, stores the data used by the
    instructions.

   In the 80486 with unified cache, a program that was data
    intensive quickly fills the cache, allowing less room for
    instructions.

   In Pentium this cannot occur because of the separate
    instruction cache.
PIPELINING

   It is a technique used to enable one instruction to complete with
    each clock cycle.

   In Pentium there are two instruction pipelines, the U pipeline
    and V pipeline.

   These pipelines     are   responsible   for   executing   80x86
    instructions.

   During Execution the U and V pipelines are capable of
    executing two integer instructions at the same time and one
    floating point instructions.
PIPELINING
        F        D             E    F    D          E        F    D    E

     I1          I1        I1       I2   I2        I2        I3   I3   I3


Clock
Cycle 1          2         3        4    5         6         7     8       9


 F          I1        I2           I3        I4         I5



 D                    I1           I2        I3         I4



                                   I1         I2        I3
 E
Clock
Cycle       1              2        3         4         5
   On a non pipelined machine 9 clock cycles are needed for the
    individual fetch, decode and execute cycle.

   On a pipelined machine fetch, decode and execute operations
    are performed in parallel only 5 cycles are needed to execute
    the same three instructions.

   The First instructions needed 3 cycles to complete.

   Additional instructions complete at rate of 1 per cycle.
   The Instruction pipelines are five-stage pipelines and capable
    of independent operations.

   The Five-Stages are,
               PF – PreFetch
               D1 – Instruction Decode
               D2 – Address Generate
               EX - Execute Cache and ALU Access.
               WB – Write Back

   The U pipeline can execute any processor instruction where as
    V pipeline only execute Simple Instruction.
BRANCH PREDICTION LOGIC

   The purpose of branch prediction logic is to reduce the
    time required for a branch caused by internal delays.

   The microprocessor begins pre-fetch instruction at the
    branch address.

   The instructions are loaded into the instruction cache.

   When the branch occurs, the instruction are present and
    allow the branch to execute in one clock period.

   If the branch prediction logic errs, the branch requires an
    extra three clock cycles.
SPEED OF PROCESSORS
 The 80286 - 25 MHz
 The 80386 - 40MHz

 The 80486 - 60 MHz

 The Pentium -90 MHz
THANK YOU

More Related Content

What's hot

What's hot (20)

8086 in minimum mode
8086 in minimum mode8086 in minimum mode
8086 in minimum mode
 
80486 microprocessor
80486 microprocessor80486 microprocessor
80486 microprocessor
 
Microprocessor Presentation
Microprocessor PresentationMicroprocessor Presentation
Microprocessor Presentation
 
Timing diagram 8085 microprocessor
Timing diagram 8085 microprocessorTiming diagram 8085 microprocessor
Timing diagram 8085 microprocessor
 
8086 modes
8086 modes8086 modes
8086 modes
 
80386 processor
80386 processor80386 processor
80386 processor
 
Ethernet
EthernetEthernet
Ethernet
 
Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor  Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor
 
80386 & 80486
80386 & 8048680386 & 80486
80386 & 80486
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 
8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller8259 Programmable Interrupt Controller
8259 Programmable Interrupt Controller
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentation
 
System bus timing 8086
System bus timing 8086System bus timing 8086
System bus timing 8086
 
DMA operation
DMA operationDMA operation
DMA operation
 
Memory Segmentation of 8086
Memory Segmentation of 8086Memory Segmentation of 8086
Memory Segmentation of 8086
 
Interrupts of 8086
Interrupts of 8086Interrupts of 8086
Interrupts of 8086
 
80386 Architecture
80386 Architecture80386 Architecture
80386 Architecture
 
8259 Operating Modes.pptx
8259 Operating Modes.pptx8259 Operating Modes.pptx
8259 Operating Modes.pptx
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 
8085 microproceesor ppt
8085 microproceesor ppt8085 microproceesor ppt
8085 microproceesor ppt
 

Viewers also liked

Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386aviban
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386PDFSHARE
 
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawarePentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawareProf. Swapnil V. Kaware
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Ritwik MG
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorRaunaq Sahni
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessorAvin Mathew
 
The x86 Family
The x86 FamilyThe x86 Family
The x86 FamilyMotaz Saad
 
T-states in microprocessor 8085
T-states in microprocessor 8085T-states in microprocessor 8085
T-states in microprocessor 8085yedles
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processorshome
 
INTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORINTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORGurudev joshi
 
Mp 2 jenis-mikroprosesor
Mp 2 jenis-mikroprosesorMp 2 jenis-mikroprosesor
Mp 2 jenis-mikroprosesorOlbers Letfaar
 
Object type casting
Object type castingObject type casting
Object type castingTech_MX
 

Viewers also liked (20)

Intel 80486 Microprocessor
Intel 80486 MicroprocessorIntel 80486 Microprocessor
Intel 80486 Microprocessor
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
 
Pentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil KawarePentium (80586) Microprocessor By Er. Swapnil Kaware
Pentium (80586) Microprocessor By Er. Swapnil Kaware
 
Pentium
PentiumPentium
Pentium
 
Architecture of pentium family
Architecture of pentium familyArchitecture of pentium family
Architecture of pentium family
 
Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.Evolution of microprocessors and 80486 Microprocessor.
Evolution of microprocessors and 80486 Microprocessor.
 
Pin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX MicroprocessorPin Description Of Intel 80386 DX Microprocessor
Pin Description Of Intel 80386 DX Microprocessor
 
80286 microprocessor
80286 microprocessor80286 microprocessor
80286 microprocessor
 
Protection 80386
Protection 80386Protection 80386
Protection 80386
 
Protection mode
Protection modeProtection mode
Protection mode
 
The x86 Family
The x86 FamilyThe x86 Family
The x86 Family
 
T-states in microprocessor 8085
T-states in microprocessor 8085T-states in microprocessor 8085
T-states in microprocessor 8085
 
Intel Processors
Intel ProcessorsIntel Processors
Intel Processors
 
INTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSORINTERRUPTS OF 8086 MICROPROCESSOR
INTERRUPTS OF 8086 MICROPROCESSOR
 
Mp 2 jenis-mikroprosesor
Mp 2 jenis-mikroprosesorMp 2 jenis-mikroprosesor
Mp 2 jenis-mikroprosesor
 
Celeron
CeleronCeleron
Celeron
 
Object type casting
Object type castingObject type casting
Object type casting
 

Similar to Comparison of pentium processor with 80386 and 80486

Similar to Comparison of pentium processor with 80386 and 80486 (20)

Processoer 80486
Processoer 80486Processoer 80486
Processoer 80486
 
Micropro
MicroproMicropro
Micropro
 
8085
80858085
8085
 
8085
80858085
8085
 
80286 microprocessors
80286 microprocessors80286 microprocessors
80286 microprocessors
 
Pentium
PentiumPentium
Pentium
 
Lec 04e microprocessor_generations_w03
Lec 04e microprocessor_generations_w03Lec 04e microprocessor_generations_w03
Lec 04e microprocessor_generations_w03
 
Evolution Of Microprocessors
Evolution Of MicroprocessorsEvolution Of Microprocessors
Evolution Of Microprocessors
 
Evolution of microprocessors
Evolution of microprocessorsEvolution of microprocessors
Evolution of microprocessors
 
8085 manual NCIT SAROZ BISTA SIR
8085 manual NCIT SAROZ BISTA SIR8085 manual NCIT SAROZ BISTA SIR
8085 manual NCIT SAROZ BISTA SIR
 
80486 and pentium
80486 and pentium80486 and pentium
80486 and pentium
 
evolutionofmicroprocessors-100820113907-phpapp02.pptx
evolutionofmicroprocessors-100820113907-phpapp02.pptxevolutionofmicroprocessors-100820113907-phpapp02.pptx
evolutionofmicroprocessors-100820113907-phpapp02.pptx
 
Microprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackholeMicroprocessor & Assembly language by team blackhole
Microprocessor & Assembly language by team blackhole
 
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptxPENTIUM - PRO MICROPROCESSORS MP SY.pptx
PENTIUM - PRO MICROPROCESSORS MP SY.pptx
 
AT89 S52
AT89 S52AT89 S52
AT89 S52
 
Microprocessor lecture 2
Microprocessor lecture   2Microprocessor lecture   2
Microprocessor lecture 2
 
Mpmc
MpmcMpmc
Mpmc
 
Genesis & Progression of Processors in CPU
Genesis & Progression of Processors in CPUGenesis & Progression of Processors in CPU
Genesis & Progression of Processors in CPU
 
MICROPROCESSORS BASICS
MICROPROCESSORS BASICS MICROPROCESSORS BASICS
MICROPROCESSORS BASICS
 
Intel 8086 microprocessor
Intel 8086 microprocessorIntel 8086 microprocessor
Intel 8086 microprocessor
 

More from Tech_MX

Virtual base class
Virtual base classVirtual base class
Virtual base classTech_MX
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimationTech_MX
 
Templates in C++
Templates in C++Templates in C++
Templates in C++Tech_MX
 
String & its application
String & its applicationString & its application
String & its applicationTech_MX
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2Tech_MX
 
Stack data structure
Stack data structureStack data structure
Stack data structureTech_MX
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application Tech_MX
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applicationsTech_MX
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Set data structure
Set data structure Set data structure
Set data structure Tech_MX
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Tech_MX
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pcTech_MX
 
More on Lex
More on LexMore on Lex
More on LexTech_MX
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbmsTech_MX
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)Tech_MX
 
Memory dbms
Memory dbmsMemory dbms
Memory dbmsTech_MX
 

More from Tech_MX (20)

Virtual base class
Virtual base classVirtual base class
Virtual base class
 
Uid
UidUid
Uid
 
Theory of estimation
Theory of estimationTheory of estimation
Theory of estimation
 
Templates in C++
Templates in C++Templates in C++
Templates in C++
 
String & its application
String & its applicationString & its application
String & its application
 
Statistical quality__control_2
Statistical  quality__control_2Statistical  quality__control_2
Statistical quality__control_2
 
Stack data structure
Stack data structureStack data structure
Stack data structure
 
Stack Data Structure & It's Application
Stack Data Structure & It's Application Stack Data Structure & It's Application
Stack Data Structure & It's Application
 
Spss
SpssSpss
Spss
 
Spanning trees & applications
Spanning trees & applicationsSpanning trees & applications
Spanning trees & applications
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Set data structure
Set data structure Set data structure
Set data structure
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Parsing
ParsingParsing
Parsing
 
Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)Mouse interrupts (Assembly Language & C)
Mouse interrupts (Assembly Language & C)
 
Motherboard of a pc
Motherboard of a pcMotherboard of a pc
Motherboard of a pc
 
More on Lex
More on LexMore on Lex
More on Lex
 
MultiMedia dbms
MultiMedia dbmsMultiMedia dbms
MultiMedia dbms
 
Merging files (Data Structure)
Merging files (Data Structure)Merging files (Data Structure)
Merging files (Data Structure)
 
Memory dbms
Memory dbmsMemory dbms
Memory dbms
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Comparison of pentium processor with 80386 and 80486

  • 1. COMPARISON OF PENTIUM PROCESSOR WITH 80386 AND 80486 PROCESSOR’S
  • 2. LIMITATIONS OF 80286 THAT LEAD TO 80386  80286 has only a 16 bit processor.  Maximum segment size of 80286 is 64 KB.  80286 cannot be easily switched between real mode and protected mode because resetting was required.  The amount of memory addressable by the 80286 is 16M byte.  To increase the over all system performance.
  • 3. THE 80386 MICROPROCESSOR  A 32-bit microprocessor introduced by Intel in 1985.  The chip of 80386 contains 132 pins.  It has total 129 instructions.  It has 32 bit data bus 32 bit address bus.  The execution of the instructions is highly pipelined and the processor is designed to operate in a multiuser and multitasking.  Software written for the 8088,8086,80186 and 80286 will also run on 386.
  • 4. The address bus is capable of addressing over 4 gigabytes of physical memory.  Virtual addressing pushing this over 64 terabytes of storage.  80387 coprocessor is used.  The processor can operate in two modes:  In the real mode physical address space is 1Mbytes and maximum size of segment is 64KB.  In the protected mode address space is 4G bytes and maximum size of segment is upto entire physical addressing space.
  • 5. 80386 processor is available in 2 different versions.  386DX  32 bit address bus and 32 bit data bus.  132 pins package.  386SX  24 bit address bus and 16 bit data bus.  100 pin package.  The lower cost package and ease of interfacing 8 bit and 16 bit memory and peripherals.  But the address range and memory transfer rate are lower than that of 386DX.
  • 6. REGISTER SET-80386  It included all eight general purpose registers plus the four segment registers.  The general purpose registers were 16 bit wide in earlier machines, but in 386 these registers can be extended to 32 bit.  Their new names are EAX,EBX,ECX and so on.  Two additional 16 bit segment are included FS and GS.
  • 7. MEMORY SYSTEM OF THE 80386 The memory bank are accessed via four bank enable signals BE0,BE1,BE2 and BE3. Bank3 Bank 2 Bank1 Bank 0 1G*8 1G*8 1G*8 1G*8 32 bit BE0,BE1,BE2 and BE3 are active low signals.
  • 8. THE 80486 MICROPROCESSOR  80486 is the next in Intel’s upward compatible 80x86 architecture.  Only few differences between the 80486 and 80386, but these differences created a significant performance improvement.  32 bit microprocessor and same register set as 80386.  Few additional instructions were added to its instruction set.  4 gigabyte addressing space .
  • 9. IMPROVEMENTS MADE IN 80486 OVER 80386  80486 was powered with a 8KB cache memory.  This improved the speed of 80486 processor to great extent.  Some new 80486 instructions are included to maintain the cache.  It uses four way set associative cache.  80486 also uses a co-processor similar to 80387 used with 80386.  But this co-processor is integrated on the chip allows it to execute instructions 3 times faster as 386/387 combination.
  • 10. The new design of 80486 allows the instruction to execute with fewer clock cycles.  486 is packed with 168 pin grid array package instead of the 132 pin used for 386 processor.  This additional pin’s made room for the additional signals.  This new design of 80486 allows the instruction to execute with fewer clock cycles.  These small differences made 80486 more powerful processor.
  • 12. WHY THE NAME PENTIUM ?????  Intel wanted to prevent their competitors from branding their processors with similar names, as AMD had done with their Am486.  The name Pentium is originally derived from the Greek word pente meaning 'five' as the series was Intel's 5th generation microarchitecture.
  • 13. THE PENTIUM PROCESSOR  Upward compatibility has been maintained.  It can run all programs written for any 80x86 line, but does so at a double the speed of fastest 80486.  Pentium is mixture of both CISC and RISC technologies.  All the prior 80x86 processor are considered as CISC processor.  The addition of RISC aspects lead to additional performance improvement.
  • 14.  It uses 64 bit data bus to address memory organized in 8 banks, each bank contains 512 MB of data.  Each bank can store a byte of data. BE7 BE6 BE5 BE4 BE3 BE2 BE1 BE0 B7 B6 B5 B4 B3 B2 B1 B0 64 bit Memory System of Pentium  All these bank enable signals are active low.
  • 15. IMPROVEMENTS OF PENTIUM OVER 80X86  Separate 8KB data and instruction cache memory.  Dual Integer pipelines are present but only single integer pipeline is present in 80486.  Branch Prediction Logic.
  • 16. CACHE MEMORY  The Pentium contains two 8K-byte cache.  An 8 byte instruction cache, which stores the instruction.  An 8 byte data cache, stores the data used by the instructions.  In the 80486 with unified cache, a program that was data intensive quickly fills the cache, allowing less room for instructions.  In Pentium this cannot occur because of the separate instruction cache.
  • 17. PIPELINING  It is a technique used to enable one instruction to complete with each clock cycle.  In Pentium there are two instruction pipelines, the U pipeline and V pipeline.  These pipelines are responsible for executing 80x86 instructions.  During Execution the U and V pipelines are capable of executing two integer instructions at the same time and one floating point instructions.
  • 18. PIPELINING F D E F D E F D E I1 I1 I1 I2 I2 I2 I3 I3 I3 Clock Cycle 1 2 3 4 5 6 7 8 9 F I1 I2 I3 I4 I5 D I1 I2 I3 I4 I1 I2 I3 E Clock Cycle 1 2 3 4 5
  • 19. On a non pipelined machine 9 clock cycles are needed for the individual fetch, decode and execute cycle.  On a pipelined machine fetch, decode and execute operations are performed in parallel only 5 cycles are needed to execute the same three instructions.  The First instructions needed 3 cycles to complete.  Additional instructions complete at rate of 1 per cycle.
  • 20. The Instruction pipelines are five-stage pipelines and capable of independent operations.  The Five-Stages are, PF – PreFetch D1 – Instruction Decode D2 – Address Generate EX - Execute Cache and ALU Access. WB – Write Back  The U pipeline can execute any processor instruction where as V pipeline only execute Simple Instruction.
  • 21. BRANCH PREDICTION LOGIC  The purpose of branch prediction logic is to reduce the time required for a branch caused by internal delays.  The microprocessor begins pre-fetch instruction at the branch address.  The instructions are loaded into the instruction cache.  When the branch occurs, the instruction are present and allow the branch to execute in one clock period.  If the branch prediction logic errs, the branch requires an extra three clock cycles.
  • 22. SPEED OF PROCESSORS  The 80286 - 25 MHz  The 80386 - 40MHz  The 80486 - 60 MHz  The Pentium -90 MHz