PPT Slide
Each virtual component has it’s own rules:
- Figure 1.4: Virtual Processor (continued)
- Separation of instruction privileges decided (hopefully!) by hardware states: system and user
- Protected instructions are those which allow indiscriminate access to the hardware (address all of memory, access any I/O device, etc.)
- Figure 1.5: Virtual Primary Memory
- Create illusion that each program has it’s own private memory starting at address 0
- Figure 1.6: Virtual I/O
- Create illusion that each program has it’s own set of hardware devices