Illustrate header section of a device driver, Computer Engineering

Assignment Help:

Q. Illustrate Header section of a device driver?

Header comprises information which allows DOS to identify the driver. It also comprises pointers which allow it to chain to other drivers loaded into the system.

Header section of a device driver is 18 bytes in length and comprises pointers and name of the driver.

Following structure of the header:

CHAIN DD -1    : link to next driver

ATTR DW 0    : driver attribute

STRT DW START: address of strategy

INTER DW INT: address if interrupt

DNAME DB 'MYDRIVER': driver name.

The first double word comprises a -1 which informs DOS this is the last driver in chain. If extra drivers are added DOS inserts a chain address in this double word as the segment and offset address. Chain address points to the subsequent driver in the chain. This enables additional drivers installed at any time.

The attribute word signifies the type of headers included for driver and the type of device the driver installs. It also signifies whether the driver control a character driver or a block device.


Related Discussions:- Illustrate header section of a device driver

Electrically erasable programmable read only memory- EEPROM, Electrically e...

Electrically erasable programmable read only memory (EEPROM) An EEPROM is a special type of PROM which can be erased by exposing it to an electrical charge. Like other kinds of

Data transmission and modems, Q. What is Data Transmission and Modems? ...

Q. What is Data Transmission and Modems? Data can be transferred between two stations in either serial or parallel transmission. Parallel data transmission, in which a group of

Describe language processing activities, Describe language processing activ...

Describe language processing activities? There are two different kinds of language processing activities: a. Program generation activities b. Program execution activities

Describe jmx concepts and architecture, MX is conceptually easy, yet bears ...

MX is conceptually easy, yet bears the fruit of years of domain experience and research. In a nutshell, JMX describes a standard means for applications to expose management functio

Secret-key encryption, Secret-key encryption is also called as Private ...

Secret-key encryption is also called as Private encryption.

Find out the correction to be applied in decimal adder, The correction to b...

The correction to be applied in decimal adder to the generated sum is ? Ans. 00110 is the generated sum when the correction to be applied in decimal adder. While the 4 bit su

Marked statement is implemented , Consider the ReadRear Java method (a)...

Consider the ReadRear Java method (a) Illustrate pictures that explain the data structure every time a checkpoint is reached for the problems of sizes one, two, three and four s

Advntages of parallel processing oversequential computation, Advntages of p...

Advntages of parallel processing oversequential computation Parallel computing has the following benefits over sequential computing: i)    Accumulate time ii)   Solves b

What do you mean by artificial intelligence, Q. What do you mean by artific...

Q. What do you mean by artificial intelligence? Show the artificial intelligence systems used widely in business. ANSWER: Artificial intelligence (AI) is the science of making

Parallel computing, explain different types of parallel processing mechani...

explain different types of parallel processing mechanism

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd