How is I/O performed via isolated and memory-mapped I/O, and how is I/O protection achieved under each?
a) Isolated I/O uses separate address spaces for I/O and memory, while memory-mapped I/O shares the same address space. In isolated I/O, protection is achieved through access control mechanisms, and in memory-mapped I/O, protection is achieved through memory management units.
b) Both isolated and memory-mapped I/O use separate address spaces, and protection is achieved through encryption algorithms.
c) Isolated I/O and memory-mapped I/O both share the same address space, and protection is achieved through hardware interrupts.
d) Isolated I/O uses the same address space, while memory-mapped I/O uses separate address spaces. Protection is achieved through software-based firewalls.