The above figure shows some of the building blocks of the architecture . " Data " and " COMM " are two of the primary examples of software subsystems that live in a protection ring between that of a user application and the Exec.
12.
When Intel introduced the Intel 80386 processor, in addition to expanding the iRMX RTOS to support 32-bit registers, iRMX III also included support for the four distinct protection rings ( named rings 0 through 3 ) which " describe " the protected-mode mechanism of the Intel 32-bit architecture.
13.
G . 841 ), " P-cycles " protection, next-generation SONET / SDH equipment that can handle multiple rings, or have the ability to not close the working or protection ring side, or to share protection capacity among rings ( e . g ., with Virtual Line Switched Ring ( VLSR ) ).