Question

In: Computer Science

How computer Hardware is protected, Explain Dual-Mode Operation concept for Hardware protection?

How computer Hardware is protected, Explain Dual-Mode Operation concept for Hardware protection?

Solutions

Expert Solution

Answer:-

Computer hardware is protected in the following ways:-

1) Dual-Mode Operation

2) I/O Protection

3) Memory Protection

4) CPU Protection

Dual-Mode Operation

Sharing system resources requires the operating systems to ensure that an incorrect program cannot cause

other programs to execute incorrectly. Provide hardware support to differentiate between at least two

modes of operations.

   1. User mode – execution is done on behalf of a user.

   2. Monitor mode (also kernel mode or system mode) – execution is done on behalf of the operating system.

Mode bit added to computer hardware to indicate the current mode: monitor (0) or user (1).

When an interrupt or fault occurs hardware switches to monitor mode.

Privileged instructions can be issued only in monitor mode.

I/O Protection

All I/O instructions are privileged instructions. Must ensure that a user program could never gain control

of the computer in monitor mode (I.e., a user program that, as part of its execution, stores a new address in the interrupt vector).

Memory Protection

Must provide memory protection at least for the interrupt vector and the interrupt service routines. In order to have memory protection, add two registers that determine the range of legal addresses a program may access:

Base register – holds the smallest legal physical memory address.

Limit register – contains the size of the range Memory outside the defined range is protected.

Hardware Protection

When executing in monitor mode, the operating system has unrestricted access to both monitor and user’s memory. The load instructions for the base and limit registers are privileged instructions.

  

CPU Protection

1.Timer – interrupts computers after a specified period to ensure the operating system maintains control.

2.Timer has decremented every clock tick.

3.When timer reaches the value 0, an interrupt occurs.

Timer commonly used to implement time-sharing.

Time also used to compute the current time.

Load-timer is a privileged instruction.

Thanks, Hope this will help you .

Have a nice day.


Related Solutions

Explain the concept of dual sovereignty between the states and the federal government, and how powers...
Explain the concept of dual sovereignty between the states and the federal government, and how powers are divided between them.   Identify and explain a current issue where the laws of the federal government and the states are in conflict. Remember to cite your sources, and cite case law with each student reply.  
Explain Raeworth’s concept of dual feedback loops, and how it contrasts with the mechanical equilibrium model...
Explain Raeworth’s concept of dual feedback loops, and how it contrasts with the mechanical equilibrium model of neoclassical economics.
Explain and describe the concept of homogeneous matrix (projection) and how it is used in computer...
Explain and describe the concept of homogeneous matrix (projection) and how it is used in computer graphics
Research and summarize the concept of the Qauntum Computer and explain the concept of the Qubit...
Research and summarize the concept of the Qauntum Computer and explain the concept of the Qubit as opposed to the traditional bit. Assess the viability of actually building one of these contraptions and identify some of the main physical/engineering barriers that exist to actually building one of these devices.
Please thoroughly explain each answer. A manufacturer of computer chips has a computer hardware company as...
Please thoroughly explain each answer. A manufacturer of computer chips has a computer hardware company as its largest customer. The computer hardware company requires all of its chips to meet specifications of 1.2 cm. The vice-president of manufacturing, concerned about a possible loss of sales, assigns his production manager the task of ensuring that chips are produced to meet the specification of 1.2 cm. Based on the production run from last month, a 95% confidence interval was computed for the...
Topic: businesses recovery period after a recession, particularly related to consumer protection, how are consumers protected,...
Topic: businesses recovery period after a recession, particularly related to consumer protection, how are consumers protected, what programs are implemented to ensure a fast recovery period so that business returns back to normal and that as little of harm is done to consumer due to a recesssion. Variables: Related to your research topic, list 4 variables that might be measured. The 4 variables must include one from each of the following measurement scales: nominal, ordinal, interval, and ratio variable. If...
Q. An Operating system is an intermediary agent between the user and the computer hardware. Explain...
Q. An Operating system is an intermediary agent between the user and the computer hardware. Explain !
Explain the diagram of Computer System which includes (Hardware, OS, application program and users).
Explain the diagram of Computer System which includes (Hardware, OS, application program and users).
Explain how the skin contributes to immune protection, thermoregulation, and protection against damage caused by ultraviolet...
Explain how the skin contributes to immune protection, thermoregulation, and protection against damage caused by ultraviolet radiation. Be sure to clearly describe all the cells involved. This answer should contain at least 20 clearly stated anatomical facts
Explain how dual, cooperative, and centralized federalism differ in their basic concepts, and how the shift...
Explain how dual, cooperative, and centralized federalism differ in their basic concepts, and how the shift occurred from each type to the next over the course of American history
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT