Browse Definitions :
Definition

conventional memory

DOS memory, sometimes referred to as conventional memory, refers to the memory -addressing scheme used in the original IBM and compatible PCs. These came with only one operating system , Disk Operating System , and this operating system had to be designed to work with the PC's microprocessor , the Intel 8088. Because of 8088 engineering limitations, storage or memory addresses were limited to a maximum of one megabyte . (Later, of course, PC's came with 2, 4, 8, and today's common 16 and 32 megabytes of RAM.) At the time, however, one megabyte was considered a rather large amount of memory to be able to access.

A certain amount of the random access memory was reserved as a place to load in the basic input/output system or initializing program, another space was reserved for buffer areas for display data, and another space for interrupt data, and so forth. The remaining 640 kilobyte s of memory could be used by the DOS operating system (which was relatively small) and application programs.

The reason that all of this is not academic is that, as new microprocessors and operating systems have been developed, many older programs written with the original memory addressing limitations need to continue running in the newer systems. This means that the newer systems have had to accommodate the older programs so that they can run in the original limited 640 kilobyte contiguous address range. A program that is run with this constraint is described as running in protected mode . (Programs running without this constraint are described as running in protected mode .)

With the successors to the 8088, the 80286 and 80386 microprocessors, available memory increased considerably, with up to 15 megabytes possible in a 286 and up to almost 4 gigabyte of RAM possible in a 386. This extra memory above the original one megabyte that DOS was designed to address is called extended memory . Being able to address extended memory means running in protected mode.

In general, DOS applications can only run in real mode since DOS itself requires the memory constraint. However, some programs have been developed called DOS extenders that can be compiled with the application and provide a built-in memory management capability. In order for multiple DOS programs with memory extenders to run concurrently, some common approach was required so that programs could share the extended memory effectively. Several standards developed to manage this sharing: XMS (Extended Memory Specification), VCPI (Virtual Control Program Interface), and DOS Protected Mode Interface (DOS protected mode interface).

This was last updated in June 2010
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close