COA Module2
COA Module2
Course Code:18EC35
Semester: 3rd ,B.E
Department: Electronics and Communication
Name and designation of the faculty:Mangala S Jolad,Asst Prof
1
MODULE 2
Machine instructions and
programs
2
ADDRESSING MODES
The different ways in which the location of an operand is specified in an
instruction are referred to as Addressing Modes
3
Register Mode
The operand is the contents of a register.
The name (or address) of the register is given in the instruction.
Registers are used as temporary storage locations where the data in a register
are accessed. For example, the instruction
Move R1, R2 ;Copy content of register R1 into register R2.
Indirect Mode
Instruction does not give the operand or its address explicitly.
Instead, the instruction provides information from which the new address of
the operand can be determined.
This address is called Effective Address (EA) of the operand.
5
Indirect Mode contd…
The EA of the operand is the contents of a register(or memory-location).
The register (or memory-location) that contains the address of an operand is
called a Pointer.
We denote the indirection by
→ name of the register or
→ new address given in the instruction.
E.g: Add (R1),R0 ;The operand is in memory. Register R1 gives the effective-
address (B) of the operand. The data is read from location B and added to
contents of register R0.
6
Indirect Mode contd…
E.g: Add (R1),R0 ;The operand is in memory. Register R1 gives
the effective-address (B) of the operand. The data is read from
location B and added to contents of register R0.
7
To execute the Add instruction in fig(a)
8
Indirect addressing through a memory-
location is also possible as shown in fig (b).
9
Program Explanation
Register R2 is used as a pointer to the numbers in the list, and the operands are accessed
indirectly through R2.
The initialization-section of the program loads the counter-value n from memory-location N into
R1
uses the immediate addressing-mode to place the address value NUM1, which is the address of
the first number in the list, into R2.
Then it clears R0 to 0.
The first two instructions in the loop implement the unspecified instruction block starting at
LOOP.
The first time through the loop, the instruction Add (R2), R0 fetches the operand at location
NUM1 and adds it to R0.
The second Add instruction adds 4 to the contents of the pointer R2, so that it will contain the
address value NUM2 when the above instruction is executed in the second pass through the loop. 10
INDEXING AND ARRAYS
A different kind of flexibility for accessing operands is useful in dealing with
lists and arrays.
Index mode
The operation is indicated as X(Ri)
where X=the constant value contained in the instruction .
Ri=the name of the index register.
The effective-address of the operand is given by EA=X+[Ri]
The contents of the index-register are not changed in the process of
generating the effective- address.
The constant X may be given either
→ as an explicit number or
→ as a symbolic-name representing a numerical value.
11
In fig(a), the index register, R1, contains the address of a memory-location.
Value X defines an offset(also called a displacement) from this address to the
location where the operand is found.
To find EA of operand: Eg: Add 20(R1), R2
EA=>1000+20=1020
Here, in fig(b)(An alternative use) the constant X corresponds to a memory
address.
The contents of the index register define the offset to the operand.
In either case, the effective-address is the sum of two values; one is given
explicitly in the instruction, and the other is stored in a register. 12
In fig(a), the index register, R1, contains the address of a memory-location.
Value X defines an offset(also called a displacement) from this address to the
location where the operand is found.
To find EA of operand: Eg: Add 20(R1), R2
EA=>1000+20=1020
Here, in fig(b)(An alternative use) the constant X corresponds to a memory
address.
The contents of the index register define the offset to the operand.
In either case, the effective-address is the sum of two values; one is given
explicitly in the instruction, and the other is stored in a register. 13
Base with Index Mode
Another version of the Index mode uses 2 registers which can be denoted as
(Ri, Rj)
Here, a second register may be used to contain the offset X.
The second register is usually called the base register.
The effective-address of the operand is given by EA=[Ri]+[Rj]
This form of indexed addressing provides more flexibility in accessing
operands because both components of the effective-address can be changed.
14
RELATIVE MODE
17
ASSEMBLY LANGUAGE
We generally use symbolic-names to write a program.
A complete set of symbolic-names and rules for their use constitute an Assembly
Language.
The set of rules for using the mnemonics in the specification of complete instructions
and programs is called the Syntax of the language.
Programs written in an assembly language can be automatically translated into a
sequence of machine instructions by a program called an Assembler.
The user program in its original alphanumeric text format is called a Source Program,
and the assembled machine language program is called an Object Program.
For example: MOVE R0,SUM ;The term MOVE represents OPCODE for operation
performed by instruction.
ADD #5,R3 ;Adds number 5 to contents of register R3 & puts the result
back into registerR3.
18
ASSEMBLER DIRECTIVES
Directives are the assembler commands to the assembler concerning the program
being assembled.
These commands are not translated into machine OPCODE in the object-program.
EQU informs the assembler about the value of an identifier.
Ex: SUM EQU 200 ;Informs assembler that the name SUM should be replaced
by the value 200.
ORIGIN tells the assembler about the starting-address of memory-area to place the
data block.
Ex: ORIGIN 204 ;Instructs assembler to initiate data-block at memory-
locations starting from 204.
DATAWORD directive tells the assembler to load a value into the location.
Ex: N DATAWORD 100 ;Informs the assembler to load data 100 into the
memory-location N(204).
RESERVE directive is used to reserve a block of memory.
Ex: NUM1 RESERVE 400 ;declares a memory-block of 400 bytes is to be
reserved for data.
END directive tells the assembler that this is the end of the source-program text.
RETURN directive identifies the point at which execution of the program should be
terminated. 19
Any statement that makes instructions or data being placed in a memory-location may
be given a
label. The label(say N or NUM1) is assigned a value equal to the address of that
20
GENERAL FORMAT OF A STATEMENT
Most assembly languages require statements in a source program to be written in the
form:
Label Operation Operands Comment
Label is an optional name associated with the memory-address where the machine
language instruction produced from the statement will be loaded.
Operand Field contains addressing information for accessing one or more operands,
depending on the type of instruction.
21
ASSEMBLY AND EXECUTION OF PROGRAMS
Assembler Program
→ replaces all symbols denoting operations & addressing-modes with binary-codes
used in machine instructions.
→ replaces all names and labels with their actual values.
→ assigns addresses to instructions & data blocks, starting at address given in ORIGIN
directive
→ inserts constants that may be given in DATAWORD directives.
→ reserves memory-space as requested by RESERVE directives.
22
Two Pass Assembler has 2 passes:
First Pass: Work out all the addresses of labels.
As the assembler scans through a source-program, it keeps track of all
names of numerical- values that correspond to them in a symbol-table.
Second Pass: Generate machine code, substituting values for the labels.
When a name appears a second time in the source-program, it is replaced
with its value from the table.
The assembler stores the object-program on a magnetic-disk. The object-
program must be loaded into the memory of the computer before it is
executed. For this, a Loader Program is used.
23
Debugger Program is used to help the user find the programming errors.
Debugger program enables the user
→ to stop execution of the object-program at some points of interest &
→ to examine the contents of various processor-registers and memory-
location.
This simple way of performing such (I/O) tasks is known as program controlled I/O
The rate of output transfers from the computer to the display device is several
thousand characters per second.
One block of instructions in the I/O program transfers the character into the
processor.
Another block of instructions in the I/O program causes the character to be displayed.
25
BASIC INPUT/OUTPUT OPERATIONS
Consider the problem of moving a character-code from the keyboard to the processor
as in below fig. For this transfer, buffer-register DATAIN & a status control flags(SIN)
are used.
28
STACKS AND QUEUES
STACKS
A stack is a special type of data structure
where elements are inserted from one end and
elements are deleted from the same end.
This end is called the top of the stack as
shown
The various operations performed on stack:
Insert: An element is inserted from top end.
Insertion operation is called push operation.
Delete: An element is deleted from top end.
Deletion operation is called pop operation.
A processor-register is used to keep track of
the address of the element of the stack that is
at the top at any given time.
This register is called the Stack Pointer (SP).
29
STACKS AND QUEUES
STACKS
If we assume a byte-addressable memory with a
32-bit word length,
The push operation can be implemented as
Subtract #4, SP
Move NEWITEM, (SP)
The pop operation can be implemented as
Move (SP), ITEM
Add #4, SP
30
STACKS AND QUEUES contd…
QUEUE
Data are stored in and retrieved from a queue on a FIFO basis.
Difference between stack and queue?
One end of the stack is fixed while the other end rises and falls as
data are pushed and popped.
In stack, a single pointer is needed to keep track of top of the stack
at any given time.
In queue, two pointers are needed to keep track of both the front
and end for removal and insertion respectively.
Without further control, a queue would continuously move through
the memory of a computer in the direction of higher addresses.
One way to limit the queue to a fixed region in memory is to use a
circular buffer.
31
STACKS AND QUEUES
32
SUBROUTINES
33
SUBROUTINES
The Call Instruction is a special branch instruction that performs the following
operations:
→ Store the contents of PC into link-register.
→ Branch to the target-address specified by the instruction.
The Return Instruction is a special branch instruction that performs the operation:
→ Branch to the address contained in the link-register.
34
SUBROUTINE NESTING AND THE PROCESSOR STACK
Calling one subroutine in another subroutine is called subroutine nesting.
→ The return address of the second call is also stored in the link register,
destroying its previous contents.
→ The last subroutine called completes its computations and returns to the
subroutine that called it.
→ The return address needed for this first return is the last one generated in
the nested call sequence.
→ Later, the subroutine returns other parameters, in this case, the results of
the computation.
LOGIC INSTRUCTIONS
Logic operations such as AND, OR, and NOT applied to individual bits.
This is also useful to be able to perform logic operations is software, which is done
using instructions that apply these operations to all bits of a word or byte
independently and in parallel.
eg. Not dst
37
ADDITIONAL INSTRUCTIONS CONTD…
There are many applications that require the bits of an operand to be shifted right or
left some specified number of bit positions.
The details of how the shifts are performed depend on whether the operand is a
signed number or some more general binary-coded information.
For general operands, we use a logical shift.
For a number, we use an arithmetic shift, which preserves the sign of the number.
LOGICAL SHIFTS
Two logical shift instructions are
Shifting left (LShiftL) &
Shifting right (LShiftR).
These instructions shift an operand over a number of bit positions specified in a count
operand contained in the instruction.
38
ADDITIONAL INSTRUCTIONS CONTD…
39
ADDITIONAL INSTRUCTIONS CONTD…
ROTATE OPERATIONS
In shift operations, the bits shifted out of the operand are lost, except for the last bit
shifted out which is retained in the Carry-flag C.
To preserve all bits, a set of rotate instructions can be used.
They move the bits that are shifted out of one end of the operand back into the other
end.
Two versions of both the left and right rotate instructions are usually provided. In one
version, the bits of the operand is simply rotated.
In the other version, the rotation includes the C flag.
40
ADDITIONAL INSTRUCTIONS CONTD…
41
ADDITIONAL INSTRUCTIONS CONTD…
The machine instruction format for multiplication and division are same as Add
instruction.
Multiply Ri,Rj; Rj <- [Ri] X [Rj]
The product of two n-bit numbers can be large as 2n bits ,
lower byte result stores in Rj
higher byte result stores in R(j+1).
42