answersLogoWhite

0

Interrupts are essential to the operation of a computer because they allow it to process service requests. Interrupts tell the computer to stop whatever it is doing and start some other task, such as handing the keyboard or mouse movement. When the task is complete, the interrupt finishes and the computer resumes whatever it was doing previously. Interrupt vectors allow for compatibility, since interrupt numbers can be standardized, and different interrupt code installed for similar devices from different vendors.

An interrupt vector table separates a hardware device that has events from the code that will process that event. A device (i.e. network card, keyboard, mouse, etc) generates an event and that event needs to trigger a message into some software application. That message might ultimately be ignored, but the responsibility of the hardware is to get that event into the computer. Hardware devices simply change state when events happen which then causes a memory mapped location for the hardware to change.

This change then triggers the OS to perform a simple look-up in the interrupt vector table and jump at the machine level to the machine code that will handle the interrupt. The machine code to handle the interrupt is known as the device driver or interrupt handler. That code will read any memory mapped locations related to the event and pass that information on to higher level software routines.

The simplicity of the interrupt vector table allows a complete separation between hardware devices and software OS. This is what allows a USB mouse to be used on different OS on a single machine or across different hardware architectures (i.e. Mac, Intel PC, etc).

The necessary evil of this scheme is that you can't use a device with an OS if there is no device driver for that OS. This is particularly frustrating to users who have a device that has a driver with one version of an OS "X", upgrades the OS to the next version "X+1", and finds that the driver philosophy has changed in "X+1" and the device can no longer be used.

User Avatar

Wiki User

11y ago

Still curious? Ask our experts.

Chat with our AI personalities

BlakeBlake
As your older brother, I've been where you are—maybe not exactly, but close enough.
Chat with Blake
ReneRene
Change my mind. I dare you.
Chat with Rene
LaoLao
The path is yours to walk; I am only here to hold up a mirror.
Chat with Lao
More answers

the memory address of an interrupt handler or an index into an array is called interrupt vector table. interrupt vector table contain the memory adress of interrupt handler.

User Avatar

Wiki User

12y ago
User Avatar

Add your answer:

Earn +20 pts
Q: What is mean by interrupt vector table?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Trending Questions
In the nine-phase approach to the SDLC defining functional and technical requirements reviewing the list and getting approval is completed during the phase of the SDLC? Myriam is very detail-oriented. Within the first month of her new job as a network support specialist she became very good at diagnosing and fixing problems with the network. Myriam's motivation to im? What is alenka search engine? How do you make a round smiley face on the computer? Can a packet sniffer assume your identity? Differentciate between Standard application software and customise application softeware? What is a single point in an electronic image? What does it mean to become computer literate? Advantages of fpga over dsp and asic? What do you do when a kid locks your computer? What are the front panel connections for a HP DC5100? What is a global system of interconnected computer network? I have a wireless router, what else do i need to get wireless internet? What is the eligibility criteria for admission in IIT and NIT for M Tech in Computer Science? If the display creates an image by passing light through a medium what display technology is it using? How can a context-free grammar (CFG) be converted into a regular expression? Are numpy arrays mutable, meaning can their values be changed after they are created? Why would it be important to activate WPA on your network? Is the security guard that stands between your home computer and the Internet an ACL? What is inter-arrival time in computer networks?