How can we write an interrupt servicing routine, Computer Engineering

Assignment Help:

Q. How can we write an Interrupt Servicing Routine?

The following are the fundamentalthough rigid sequence of steps:

1.  Save the system context (flags,registers etc. which will be modified by the ISR).

2. Disable the interrupts which may cause interference if allowed to take place during this ISR's processing 

3.  Enable those interrupts which may still be allowed to occur during this ISR processing.

4.  Determine cause of the interrupt.

5.  Take the suitable action for the interrupt like - receive and store data from serial port, set a flag to specify the completion of the disk sector transfer etc.

6.  Restore the system context.

7.  Re-enable any interrupt levels which were blocked during this ISR execution.

8.  Resume execution of the process which was interrupted on occurrence of the interrupt.

MS-DOS offers you facilities which enable you to install well-behaved interrupt handlers such that they won't interfere with the operating system function or other interrupt handlers. These functions are:

1676_How can we write an Interrupt Servicing Routine.png


Related Discussions:- How can we write an interrupt servicing routine

How optimization is achieved in dns, How optimization is achieved in DNS? ...

How optimization is achieved in DNS? Two primary optimizations used in DNS and they are: replication and caching. All root servers is replicated; various copies of the server

Show the importance of risc processors, Q. Show the Importance of RISC Proc...

Q. Show the Importance of RISC Processors? Reduced Instruction Set Computers recognize a comparatively limited number of instructions. One benefit of a reduced instruction set

Explain approaches to reuse free memory area in a heap, Discuss two main ap...

Discuss two main approaches to reuse free memory area in a heap. Two major approaches to reuse free memory area in a heap are: First-fit: Allocate the first hole which i

Determine the method for updating the main memory, The method for updating ...

The method for updating the main memory as soon as a word is removed from the Cache is known as  (A) Write-through                  (B) write-back   (C) protected write

Packet switching is used for which service, Packet switching is used for ...

Packet switching is used for (A)  Credit card verification (B)  Automated Teller Machine (C)  The internet and the World Wide Web (D)  All of the above  Ans

Change directory command, Your shell must accept a change directory command...

Your shell must accept a change directory command. This will be in the form: cd path  where cd is the change directory command and the path is what you will change the direct

Differentiate between protected and real modes of an intel, Differentiate b...

Differentiate between protected and real modes of an Intel microprocessor Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it

Perform subtraction in base 5 using r and r-1 complement, Q Write a menu dr...

Q Write a menu driven program to perform subtraction in base 5 using r and (r-1) complement with necessary validations.

How would you kill a process, How would you kill a process? The "kill" ...

How would you kill a process? The "kill" command takes the PID as one argument; this signifies which process to terminate. The PID of a process can be got using "ps" command

Difference between char a[] = "string", What is the difference between char...

What is the difference between char a[] = "string"; and char *p = "string";? Ans) In the first case 6 bytes are assigned to the variable a which is fixed, where as in the secon

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd