Browse Definitions:
Definition

DOS Protected Mode Interface (DPMI)

Contributor(s): Alain Steffes

DPMI (DOS Protected Mode Interface) is a program interface that allows an application program running under the Disk Operating System (DOS) to take advantage of a DOS extender , which lets the program address a larger range of random access memory ( RAM ) than the 640 kilobytes to which PC programs are basically constrained. To use the extender, the program must be in "protected mode," a mode that ensures that program requests are not allowed to access certain portions of "protected" memory. (Programs running in the alternative "real mode" have access to all portions of memory, including system data.)

The first widely-distributed operating system for personal computers, DOS was designed to run on the Intel 8088 microprocessor . The 8088 provided a megabyte of RAM that could be addressed by a program instruction (that is, the total span of storage for storing and getting data back and forth between the microprocessor and RAM was a million bytes). Because certain space had to be reserved for "system" use (keeping track of applications, system status, and so forth), only 640 kilobytes was available for an application program. These bytes were contiguous in storage (that is, continuously adjacent to each other and not divided into different parts of RAM) and application programs were required to run and keep their data within this 640 kilobyte space. In fact, an instruction that violated the 640 kilobyte space would not be executed (thus protecting the system space in RAM). A program that ran in "real mode" could address the entire 1 megabyte of RAM including system data, but at the risk of writing data to the wrong place.

As new microprocessors such as the 80286 followed the 8088, DOS continued to preserve the 640 kilobyte addressing limitation so that newly-written application programs could continue to run on both the old as well as new microprocessors. The DOS extender program allowed application programs written for DOS to be freed from the 640K constraint by inserting memory management code into the application. Microsoft developed the DPMI for use on Windows 3.0 (which was itself a DOS application) and later gave the standard to an industry organization, the DPMI Committee.

Today's personal computers, using microprocessors that succeeded the 8088, typically contain eight or more megabytes of RAM. Today's operating systems (including the latest DOS versions) come with extended memory management that frees the programmer from the original addressing constraints.

Besides the DPMI standard interface, two other standard extended memory management interfaces exist. Extended Memory Specification (XMS) is a program added to more recent versions of DOS and Windows when the system is loaded. It's called HIMEM.SYS. Another extended memory manager is the Virtual Control Program Interface (VCPI).

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close