COSC121: Computer Systems: Review

Similar documents
COSC121: Computer Systems: Review

Chapter 5 The LC-3. ACKNOWLEDGEMENT: This lecture uses slides prepared by Gregory T. Byrd, North Carolina State University 5-2

Introduction to Computer Engineering. CS/ECE 252, Fall 2016 Prof. Guri Sohi Computer Sciences Department University of Wisconsin Madison

Computing Layers. Chapter 5 The LC-3

Introduction to Computer Engineering. Chapter 5 The LC-3. Instruction Set Architecture

EEL 5722C Field-Programmable Gate Array Design

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Computing Layers

Instruction Set Architecture

Introduction to Computer Engineering. CS/ECE 252, Spring 2017 Rahul Nayar Computer Sciences Department University of Wisconsin Madison

Introduction to Computer. Chapter 5 The LC-3. Instruction Set Architecture

CS 2461: Computer Architecture I

Load -- read data from memory to register. Store -- write data from register to memory. Load effective address -- compute address, save in register

Chapter 5 - ISA. 1.The Von Neumann Model. The Stored Program Computer. Von Neumann Model. Memory

Register Files. Single Bus Architecture. Register Files. Single Bus Processor. Term Project: using VHDL. Accumulator based architecture

Ch. 5: The LC-3. PC-Relative Addressing Mode. Data Movement Instructions. James Goodman!

20/08/14. Computer Systems 1. Instruction Processing: FETCH. Instruction Processing: DECODE

LC-3 Instruction Set Architecture. Textbook Chapter 5

LC-3 Instruction Set Architecture

LC-3 Instruction Processing. (Textbook s Chapter 4)

LC-3 Instruction Processing

LC-3 ISA - II. Lecture Topics. Lecture materials. Homework. Machine problem. Announcements. ECE 190 Lecture 10 February 17, 2011

The LC-3 Instruction Set Architecture. ISA Overview Operate instructions Data Movement instructions Control Instructions LC-3 data path

10/31/2016. The LC-3 ISA Has Three Kinds of Opcodes. ECE 120: Introduction to Computing. ADD and AND Have Two Addressing Modes

Special Microarchitecture based on a lecture by Sanjay Rajopadhye modified by Yashwant Malaiya

Midterm 2 Review Chapters 4-16 LC-3

Chapter 6 Programming the LC-3

11/28/2016. ECE 120: Introduction to Computing. Register Loads Control Updates to Register Values. We Consider Five Groups of LC-3 Control Signals

Chapter 4 The Von Neumann Model

Binghamton University. CS-120 Summer LC3 Memory. Text: Introduction to Computer Systems : Sections 5.1.1, 5.3

appendix a The LC-3 ISA A.1 Overview

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON. Instructor: Rahul Nayar TAs: Annie Lin, Mohit Verma

Chapter 4 The Von Neumann Model

Chapter 4 The Von Neumann Model

Intro. to Computer Architecture Homework 4 CSE 240 Autumn 2005 DUE: Mon. 10 October 2005

ECE 206, Fall 2001: Lab 3

Introduction to Computer Engineering. CS/ECE 252 Prof. Mark D. Hill Computer Sciences Department University of Wisconsin Madison

Trap Vector Table. Interrupt Vector Table. Operating System and Supervisor Stack. Available for User Programs. Device Register Addresses

LC3DataPath ECE2893. Lecture 9a. ECE2893 LC3DataPath Spring / 14

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Computing Layers

11/10/2016. Review the Problem to Be Solved. ECE 120: Introduction to Computing. What Shall We Keep in the Registers? Where Are the Pieces in Memory?

The von Neumann Model

Introduction to Computer Engineering. CS/ECE 252, Spring 2017 Rahul Nayar Computer Sciences Department University of Wisconsin Madison

LC-3 Architecture. (Ch4 ish material)

( input = α output = λ move = L )

Logistics. IIT CS 350 S '17 - Hale

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

Fortunately not. In LC-3, there are a variety of addressing modes that deal with these concerns.

UNIVERSITY OF WISCONSIN MADISON

CS 135: Computer Architecture I

LC-3. 3 bits for condition codes (more later) Fixed-length instructions, with 4-bit opcodes. IIT CS 350 S 18- Hale

Chapter 9 TRAP Routines and Subroutines

Introduction to Computer Engineering. CS/ECE 252, Fall 2016 Prof. Guri Sohi Computer Sciences Department University of Wisconsin Madison

Chapter 8 Input/Output

Review Topics. Midterm Exam Review Slides

C Functions and Pointers. C Pointers. CS270 - Fall Colorado State University. CS270 - Fall Colorado State University

Chapter 9 TRAP Routines and Subroutines

COMP2121: Microprocessors and Interfacing. Instruction Set Architecture (ISA)

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

Review Topics. Midterm Exam Review Slides

Announcements HW1 is due on this Friday (Sept 12th) Appendix A is very helpful to HW1. Check out system calls

ADD R3, R4, #5 LDR R3, R4, #5

CS 270 Fall 2013 Mock Final

Subroutines & Traps. Announcements. New due date for assignment 2 5pm Wednesday, 5May

Computer Architecture. Lecture 5: Multi-Cycle and Microprogrammed Microarchitectures

Department of Electrical and Computer Engineering The University of Texas at Austin

TRAPs and Subroutines. University of Texas at Austin CS310H - Computer Organization Spring 2010 Don Fussell

System Calls. Chapter 9 TRAP Routines and Subroutines

Major and Minor States

Computer System. Hiroaki Kobayashi 7/25/2011. Agenda. Von Neumann Model Stored-program instructions and data are stored on memory

The Assembly Language of the Boz 5

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

Memory Usage in Programs

The MARIE Architecture

CISC 662 Graduate Computer Architecture. Lecture 4 - ISA MIPS ISA. In a CPU. (vonneumann) Processor Organization

16.1. Unit 16. Computer Organization Design of a Simple Processor

ECE/CS 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CISC 662 Graduate Computer Architecture. Lecture 4 - ISA

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.

Chapter 7 Assembly Language. ACKNOWLEDGEMENT: This lecture uses slides prepared by Gregory T. Byrd, North Carolina State University

Microcontroller Systems

Computer Organization MIPS ISA

Chapter 10 And, Finally... The Stack. ACKNOWLEDGEMENT: This lecture uses slides prepared by Gregory T. Byrd, North Carolina State University

Assembly Language. University of Texas at Austin CS310H - Computer Organization Spring 2010 Don Fussell

Microprogrammed Control. ECE 238L μseq 2006 Page 1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Review Topics

Department of Electrical and Computer Engineering The University of Texas at Austin

10/30/2016. How Do We Write Instructions? ECE 120: Introduction to Computing. Put Bits into Memory, Then Execute the Bits

Computing Layers. Chapter 7 Assembly Language

COSC121: Computer Systems: Runtime Stack

Transfer of Control. Lecture 10 JMP. JMP Formats. Jump Loop Homework 3 Outputting prompts Reading single characters

Implementing Functions at the Machine Level

CPE 323 MSP430 INSTRUCTION SET ARCHITECTURE (ISA)

11/6/2016. Let s Solve a Problem. ECE 120: Introduction to Computing. Overview of Our Task. Programs are Finite State Machines

Chapter 7 Assembly Language


ECE/CS 252: INTRODUCTION TO COMPUTER ENGINEERING UNIVERSITY OF WISCONSIN MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING COMPUTER SCIENCES DEPARTMENT UNIVERSITY OF WISCONSIN-MADISON

CS/ECE 252: INTRODUCTION TO COMPUTER ENGINEERING COMPUTER SCIENCES DEPARTMENT UNIVERSITY OF WISCONSIN-MADISON

Memory General R0 Registers R1 R2. Input Register 1. Input Register 2. Program Counter. Instruction Register

Transcription:

COSC121: Computer Systems: Review Jeremy Bolton, PhD Assistant Teaching Professor Constructed using materials: - Patt and Patel Introduction to Computing Systems (2nd) - Patterson and Hennessy Computer Organization and Design (4th) **A special thanks to Rich Squier

Notes A good understanding of Digital Logic and Digital Design is a prerequisite. Please refresh as needed. Review the von Neumann Design, Basic Data Path, and LC-3 Implementation Read Patt and Patel CHs 4-5 (PP.4-PP.5) Complete HW#1 + HW#2

Outline Von Neumann Model Main components and bottleneck Instruction processing and data path LC-3 ISA Operations and codes Addressing Modes Major components of implementation Example program

This week our journey takes us COSC 121: Computer Systems Software Hardware Application (Browser) Operating System Compiler (Win, Linux) Assembler Processor Memory Drivers Datapath & Control Digital Design Circuit Design transistors I/O system COSC 255: Operating Systems Instruction Set Architecture COSC 120: Computer Hardware

Chapter 5 The LC-3

Instruction Set Architecture ISA = All of the programmer-visible components and operations of the computer memory organization address space -- how may locations can be addressed? addressibility -- how many bits per location? register set how many? what size? how are they used? instruction set opcodes data types addressing modes ISA provides all information needed for someone that wants to write a program in machine language (or translate from a high-level language to machine language). 5-6

LC-3 Overview: Memory and Registers Memory address space: 2 16 locations (16-bit addresses) addressability: 16 bits 5-7 Registers temporary storage, accessed in a single machine cycle accessing memory generally takes longer than a single cycle eight general-purpose registers: R0 - R7 each 16 bits wide how many bits to uniquely identify a register? other registers not directly addressable, but used by (and affected by) instructions PC (program counter), condition codes

LC-3 Overview: Instruction Set 5-8 Opcodes 15 opcodes Operate instructions: ADD, AND, NOT Data movement instructions: LD, LDI, LDR, LEA, ST, STR, STI Control instructions: BR, JSR/JSRR, JMP, RTI, TRAP some opcodes set/clear condition codes, based on result: N = negative, Z = zero, P = positive (> 0) Data Types 16-bit 2 s complement integer Addressing Modes How is the location of an operand specified? non-memory addresses: immediate, register memory addresses: PC-relative, indirect, base+offset

Operate Instructions Only three operations: ADD, AND, NOT Source and destination operands are registers These instructions do not reference memory. ADD and AND can use immediate mode, where one operand is hard-wired into the instruction. In the following we will show a dataflow diagram with each instruction. illustrates when and where data moves to accomplish the desired operation 5-9

NOT (Register) 5-10 Note: Src and Dst could be the same register.

5-11 ADD/AND (Register) this zero means register mode

ADD/AND (Immediate) this one means immediate mode Note: Immediate field is sign-extended. 5-12

Using Operate Instructions Things to ponder LC3 is quite limited with only ADD, AND, NOT How do we subtract? How do we OR? How do we copy from one register to another? How do we initialize a register to zero? 5-13

Data Movement Instructions Load -- read data from memory to register LD: PC-relative mode LDR: base+offset mode LDI: indirect mode Store -- write data from register to memory ST: PC-relative mode STR: base+offset mode STI: indirect mode Load effective address -- compute address, save in register LEA: immediate mode does not access memory 5-14

PC-Relative Addressing Mode Want to specify address directly in the instruction But an address is 16 bits, and so is an instruction! After subtracting 4 bits for opcode and 3 bits for register, we have 9 bits available for address. Solution: Use the 9 bits as a signed offset from the current PC. 9 bits: 256 offset 255 Can form any address X, such that: PC 256 X PC 255 Remember that PC is incremented as part of the FETCH phase; This is done before the EVALUATE ADDRESS stage. 5-15

5-16 LD (PC-Relative)

5-17 ST (PC-Relative)

Indirect Addressing Mode With PC-relative mode, can only address data within 256 words of the instruction. What about the rest of memory? Solution #1: Read address from memory location, then load/store to that address. First address is generated from PC and IR (just like PC-relative addressing), then content of that address is used as target for load/store. 5-18

5-19 LDI (Indirect)

5-20 STI (Indirect)

Base + Offset Addressing Mode With PC-relative mode, can only address data within 256 words of the instruction. What about the rest of memory? Solution #2: Use a register to generate a full 16-bit address. 4 bits for opcode, 3 for src/dest register, 3 bits for base register -- remaining 6 bits are used as a signed offset. Offset is sign-extended before adding to base register. 5-21

5-22 LDR (Base+Offset)

5-23 STR (Base+Offset)

Load Effective Address Computes address like PC-relative (PC plus signed offset) and stores the result into a register. Note: The address is stored in the register, not the contents of the memory location. 5-24

5-25 LEA (Immediate)

Example: Different addressing methods Address Instruction Comments x30f6 1 1 1 0 0 0 1 1 1 1 1 1 1 1 0 1 R1 PC 3 = x30f4 x30f7 0 0 0 1 0 1 0 0 0 1 1 0 1 1 1 0 R2 R1 + 14 = x3102 x30f8 0 0 1 1 0 1 0 1 1 1 1 1 1 0 1 1 M[PC - 5] R2 M[x30F4] x3102 Load Immediate Store PC - relativ x30f9 0 1 0 1 0 1 0 0 1 0 1 0 0 0 0 0 R2 0 x30fa 0 0 0 1 0 1 0 0 1 0 1 0 0 1 0 1 R2 R2 + 5 = 5 Store - register x30fb 0 1 1 1 0 1 0 0 0 1 0 0 1 1 1 0 x30fc 1 0 1 0 0 1 1 1 1 1 1 1 0 1 1 1 M[R1+14] R2 M[x3102] 5 R3 M[M[x30F4]] R3 M[x3102] R3 5 Load indirect 5-26 opcode

Control Instructions Used to alter the sequence of instructions (by changing the Program Counter) Conditional Branch branch is taken if a specified condition is true signed offset is added to PC to yield new PC else, the branch is not taken PC is not changed, points to the next sequential instruction Unconditional Branch (or Jump) always changes the PC 5-27 TRAP changes PC to the address of an OS service routine routine will return control to the next instruction (after TRAP)

Condition Codes LC-3 has three condition code registers: N -- negative Z -- zero P -- positive (greater than zero) Set by any instruction that writes a value to a register (ADD, AND, NOT, LD, LDR, LDI, LEA) Exactly one will be set at all times Based on the last instruction that altered a register 5-28

Branch Instruction Branch specifies one or more condition codes. If the set bit is specified, the branch is taken. PC-relative addressing: target address is made by adding signed offset (IR[8:0]) to current PC. Note: PC has already been incremented by FETCH stage. Note: Target must be within 256 words of BR instruction. If the branch is not taken, the next sequential instruction is executed. 5-29

BR (PC-Relative) 5-30 What happens if bits [11:9] are all zero? All one?

Using Branch Instructions Compute sum of 12 integers. Numbers start at location x3100. Program starts at location x3000. R1 x3100 R3 0 R2 12 YES R2=0? NO R4 M[R1] R3 R3+R4 R1 R1+1 R2 R2-1 5-31

Sample Program Address Instruction Comments x3000 1 1 1 0 0 0 1 0 1 1 1 1 1 1 1 1 R1 x3100 (PC+0xFF) x3001 0 1 0 1 0 1 1 0 1 1 1 0 0 0 0 0 R3 0 x3002 0 1 0 1 0 1 0 0 1 0 1 0 0 0 0 0 R2 0 x3003 0 0 0 1 0 1 0 0 1 0 1 0 1 1 0 0 R2 12 x3004 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 If Z, goto x300a (PC+5) x3005 0 1 1 0 1 0 0 0 0 1 0 0 0 0 0 0 Load next value to R4 x3006 0 0 0 1 0 1 1 0 1 1 0 0 0 0 0 1 Add to R3 x3007 0 0 0 1 0 0 1 0 0 1 1 0 0 0 0 1 Increment R1 (pointer) X3008 0 0 0 1 0 1 0 0 1 0 1 1 1 1 1 1 Decrement R2 (counter) x3009 0 0 0 0 1 1 1 1 1 1 1 1 1 0 1 0 Goto x3004 (PC-6) 5-32

JMP (Register) Jump is an unconditional branch -- always taken. Target address is the contents of a register. Allows any target address. 5-33

TRAP Calls a service routine, identified by 8-bit trap vector. vector x23 x21 x25 routine input a character from the keyboard output a character to the monitor halt the program 5-34 When routine is done, PC is set to the instruction following TRAP. (We ll talk about how this works later.)

Summary: LC-3 Implementation LC-3 Data Path Revisited Filled arrow = info to be processed. Unfilled arrow = control signal. 5-35

Summary: Data Path Components Global bus special set of wires that carry a 16-bit signal to many components inputs to the bus are tri-state devices, that only place a signal on the bus when they are enabled only one (16-bit) signal should be enabled at any time control unit decides which signal drives the bus any number of components can read the bus register only captures bus data if it is write-enabled by the control unit Memory Control and data registers for memory and I/O devices memory: MAR, MDR (also control signal for read/write) 5-36

Summary: Data Path Components ALU Accepts inputs from register file and from sign-extended bits from IR (immediate field). Output goes to bus. used by condition code logic, register file, memory Register File Two read addresses (SR1, SR2), one write address (DR) Input from bus result of ALU operation or memory read Two 16-bit outputs used by ALU, PC, memory address data for store instructions passes through ALU 5-37

Summary: Data Path Components PC and PCMUX Three inputs to PC, controlled by PCMUX 1. PC+1 FETCH stage 2. Address adder BR, JMP 3. bus TRAP (discussed later) MAR and MARMUX Two inputs to MAR, controlled by MARMUX 1. Address adder LD/ST, LDR/STR 2. Zero-extended IR[7:0] -- TRAP (discussed later) 5-38

Summary: Data Path Components Condition Code Logic Looks at value on bus and generates N, Z, P signals Registers set only when control unit enables them (LD.CC) only certain instructions set the codes (ADD, AND, NOT, LD, LDI, LDR, LEA) 5-39 Control Unit Finite State Machine On each machine cycle, changes control signals for next phase of instruction processing who drives the bus? (GatePC, GateALU, ) which registers are write enabled? (LD.IR, LD.REG, ) which operation should ALU perform? (ALUK) Logic includes decoder for opcode, etc.

Appendix Jeremy Bolton, PhD Assistant Teaching Professor Constructed using materials: - Patt and Patel Introduction to Computing Systems (2nd) - Patterson and Hennessy Computer Organization and Design (4th) **A special thanks to Rich Squier

Prgramming Example Count the occurrences of a character in a file Program begins at location x3000 Read character from keyboard Load each character from a file File is a sequence of memory locations Starting address of file is stored in the memory location immediately after the program If file character equals input character, increment counter End of file is indicated by a special ASCII value: EOT (x04) At the end, print the number of characters and halt (assume there will be less than 10 occurrences of the character) 5-41 A special character used to indicate the end of a sequence is often called a sentinel. Useful when you don t know ahead of time how many times to execute a loop.

Flow Chart Count = 0 (R2 = 0) Done? (R1?= EOT) YES Convert count to ASCII character (R0 = x30, R0 = R2 + R0) Ptr = 1st file character (R3 = M[x3012]) NO Input char from keybd (TRAP x23) YES Match? (R1?= R0) NO Print count (TRAP x21) Load char from file (R1 = M[R3]) Incr Count (R2 = R2 + 1) HALT (TRAP x25) Load next char from file (R3 = R3 + 1, R1 = M[R3]) 5-42

Program (1 of 2) Address Instruction Comments x3000 0 1 0 1 0 1 0 0 1 0 1 0 0 0 0 0 R2 0 (counter) x3001 0 0 1 0 0 1 1 0 0 0 0 1 0 0 0 0 R3 M[x3102] (ptr) x3002 1 1 1 1 0 0 0 0 0 0 1 0 0 0 1 1 Input to R0 (TRAP x23) x3003 0 1 1 0 0 0 1 0 1 1 0 0 0 0 0 0 R1 M[R3] x3004 0 0 0 1 1 0 0 0 0 1 1 1 1 1 0 0 R4 R1 4 (EOT) x3005 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 If Z, goto x300e x3006 1 0 0 1 0 0 1 0 0 1 1 1 1 1 1 1 R1 NOT R1 x3007 0 0 0 1 0 0 1 0 0 1 1 0 0 0 0 1 R1 R1 + 1 X3008 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 R1 R1 + R0 x3009 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 If N or P, goto x300b 5-43

Program (2 of 2) Address Instruction Comments x300a 0 0 0 1 0 1 0 0 1 0 1 0 0 0 0 1 R2 R2 + 1 x300b 0 0 0 1 0 1 1 0 1 1 1 0 0 0 0 1 R3 R3 + 1 x300c 0 1 1 0 0 0 1 0 1 1 0 0 0 0 0 0 R1 M[R3] x300d 0 0 0 0 1 1 1 1 1 1 1 1 0 1 1 0 Goto x3004 x300e 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 R0 M[x3013] x300f 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 R0 R0 + R2 x3010 1 1 1 1 0 0 0 0 0 0 1 0 0 0 0 1 Print R0 (TRAP x21) x3011 1 1 1 1 0 0 0 0 0 0 1 0 0 1 0 1 HALT (TRAP x25) X3012 Starting Address of File x3013 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 ASCII x30 ( 0 ) 5-44