Solved

Expanded & Extended Memory

Posted on 2000-04-09
3
221 Views
Last Modified: 2012-05-04
I would like to know how it was used & how the momory was addressed.  I would really like the details of how this worked as much as possible.  Please help me. Thank you
0
Comment
Question by:Citt
3 Comments
 
LVL 2

Expert Comment

by:fremsley
ID: 2699721
Under DOS all memory beyond 1MB is called 'Extended Memory' as the 80x86 CPU can not normally access it in real mode (with an exception for the first 64KB, also called 'high memory'). Usually it is accessed using a protected mode driver (XMS) by copying to and fro the lower conventional memory. 'Expanded Memory' (EMS) uses a different approach: there is a memory window (usually 64KB) in convetional addressing space below 1MB where pages from the extended memory can be mapped.

If you would like to learn more about how to program using XMS or EMS, I recommend Ralph Brown's Interrupt List:

  http://www.cs.cmu.edu/afs/cs.cmu.edu/user/ralf/pub/WWW/files.html

which contains information about almost anything concerning DOS and its drivers. However be warned: it's quite technical stuff.

0
 

Accepted Solution

by:
coolcoder earned 200 total points
ID: 2742390
Thes is a list of the Memory Usage of Dos

Physik Adress            inlay
00000 hex      Interruptvektoren
00400 hex      BIOS - DATA            konventional
00500 hex      DOS - DATA            
00700 hex      DOS - Kernel            RAM
            Driver and Buffer
            COMMAND.COM (resident)
xxxxx hex      TPA-Transistent Programm Area  640 kb
A0000 hex      Video - RAM            reserved
C0000 hex      Video - Bios            area
C8000 hex      Free Workmemory                        
F0000 hex      BIOS                  384 kb
100000 hex      Extendet Memory
0
 

Author Comment

by:Citt
ID: 2763830
THANK YOU!! I have no idea where you found this info, but it is great!! Thanks a lot!!
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As the title indicates, I have done this before. It chills me everytime I update the OS on my phone, (http://www.experts-exchange.com/articles/18084/Upgrading-to-Android-5-0-Lollipop.html) because one time I did this and I essentially had a bricked …
In this article we will discuss all things related to StageFright bug, the most vulnerable bug of android devices.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question