Ch04CAO.ppt 1953KB Jun 23 2011 01:00:04 PM

(1)

Computer Architecture and

Organization

Miles Murdocca and Vincent Heuring

Chapter 4 – The

Instruction Set

Architecture


(2)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Chapter Contents

4.1 Hardware Components of the Instruction Set Architecture

4.2 ARC, A RISC Computer 4.3 Pseudo-Operations

4.4 Synthetic Instructions

4.5 Examples of Assembly Language Programs

4.6 Accessing Data in Memory—Addressing Modes 4.7 Subroutine Linkage and Stacks

4.8 Input and Output in Assembly Language 4.9 Case Study: The Java Virtual Machine ISA


(3)

The Instruction Set Architecture

• The Instruction Set Architecture (ISA) view of a machine corresponds to the machine and assembly language levels.

• A compiler translates a high level language, which is architecture independent, into assembly language, which is architecture

dependent.

• An assembler translates assembly language programs into executable binary codes.

• For fully compiled languages like C and Fortran, the binary codes are executed directly by the target machine. Java stops the

translation at the byte code level. The Java virtual machine, which is at the assembly language level, interprets the byte codes

(hardware implementations of the JVM also exist, in which Java byte codes are executed directly.)


(4)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

The System Bus Model of a Computer

System, Revisited

• A compiled program is copied from a hard disk to the memory. The CPU reads instructions and data from the memory, executes the instructions, and stores the results back into the memory.


(5)

Common Data Type Sizes

• A byte is composed of 8 bits. Two nibbles make up a byte.

• Halfwords, words, doublewords, and quadwords are composed of bytes as shown below:


(6)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Big-Endian and Little-Endian Formats

• In a byte-addressable machine, the smallest datum that can be referenced in memory is the byte. Multi-byte words are stored as a sequence of bytes, in which the address of the multi-byte word is the same as the byte of the word that has the lowest address.

• When multi-byte words are used, two choices for the order in which the bytes are stored in memory are: most significant byte at lowest address, referred to as big-endian, or least significant byte stored at lowest address, referred to as little-endian.


(7)

Memory Map for the ARC

• Memory locations are arranged linearly in consecutive order. Each numbered location corresponds to an ARC word. The unique number that identifies each word is referred to as its address.


(8)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Example of ARC Memory Layout

• The table illustrates both the distinction between an address and the data that is stored there, and the fact that ARC/SPARC is a big-endian machine. The table shows four bytes stored at consecutive addresses 00001000 to 00001003.

• Thus the byte address 0x00001003 contains the byte 0xDD. Since this is a big-endian machine (the big end is stored at the lowest


(9)

Abstract View of a CPU

• The CPU consists of a data section containing registers and an ALU, and a control section, which interprets instructions and effects register transfers. The data section is also known as the datapath.


(10)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

The Fetch-Execute Cycle

• The steps that the control unit carries out in executing a program are: (1) Fetch the next instruction to be executed from memory.

(2) Decode the opcode.

(3) Read operand(s) from main memory, if any. (4) Execute the instruction and store results, if any. (5) Go to step 1.


(11)

An Example Datapath

• The ARC datapath is made up of a collection of registers known as the


(12)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring


(13)

ARC Assembly Language Format

• The ARC assembly language format is the same as the SPARC assembly language format.

• This example shows the assembly language format for ARC (and SPARC) arithmetic and logic instructions.


(14)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

ARC Load / Store Format

• This example shows the assembly language format for ARC load and store instructions.


(15)

Simple Example: Add Two Numbers

• The figure shows a simple program fragment using our ld, st, and add instructions. This fragment is equivalent to the C statement:

z = x + y;

• Since ARC is a load-store machine, the code must first fetch the x and y operands from memory using ld instructions, and then perform the addition, and then store the result back into z using an st instruction.


(16)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

ARC Transfer of Control Sequence

• This example shows the assembly language format for ARC branch instructions.


(17)

ARC Fragment that Computes the

Absolute Value

• As an example of using the ARC instruction types we have seen so far, consider the absolute value function, abs:

abs(x) := if (x < 0) then x = -x; An ARC fragment to implement this is shown below:


(18)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

A Portion of the ARC ISA

• The ARC ISA is a subset of the SPARC ISA. A portion of the ARC ISA is shown here.


(19)

(20)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

ARC Data

Formats


(21)

ARC Pseudo-Ops

• Pseudo-ops are instructions to the assembler. They are not part of the ISA, but instruct the assembler to do an operation at assembly time.


(22)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Synthetic Instructions

• Many assemblers will accept synthetic instructions that are converted to actual machine-language instructions during assembly. The figure

below shows some commonly used synthetic instructions.

• Synthetic instructions are single instructions that replace single instructions, which are different from macros which are discussed later.


(23)

ARC Example Program


(24)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

A More

Complex

Example

Program

• An ARC program sums five integers.


(25)

One, Two, Three-Address Machines

• Consider how the C expression A = B*C + D might be evaluated by each of the one, two, and three-address instruction types.

• Assumptions: Addresses and data words are two bytes in size. Opcodes are 1 byte in size. Operands are moved to and from memory one word (two bytes) at a time.

• Three-Address Instructions: In a three-address instruction, the expression A = B*C + D might be coded as:

mult B, C, A add D, A, A

which means multiply B by C and store the result at A. (The mult and add operations are generic; they are not ARC instructions.) Then, add D to A and store the result at address A. The program size is 72 = 14


(26)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

One, Two, Three-Address Machines

• Two Address Instructions: In a two-address instruction, one of the

operands is overwritten by the result. Here, the code for the expression A = B*C + D is:

load B, A mult C, A add D, A

The program size is now 3(1+22) or 15 bytes. Memory traffic is 15 + 22 + 223 or 31 bytes.


(27)

One, Two, Three-Address Machines

• One Address (Accumulator) Instructions: A one-address instruction employs a single arithmetic register in the CPU, known as the

accumulator. The code for the expression A = B*C + D is now:

load B mult C add D store A

The load instruction loads B into the accumulator, mult multiplies C by

the accumulator and stores the result in the accumulator, and add does

the corresponding addition. The store instruction stores the

accumulator in A. The program size is now 34 or 12 bytes, and memory traffic is 12 + 42 or 20 bytes.


(28)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Addressing Modes

• Four ways of computing the address of a value in memory: (1) a

constant value known at assembly time, (2) the contents of a register, (3) the sum of two registers, (4) the sum of a register and a constant. The table gives names to these and other addressing modes.


(29)

Subroutine Linkage – Registers


(30)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Subroutine Linkage – Data Link Area

• Subroutine linkage with a data link area passes parameters in a separate area in memory. The address of the memory area is passed in a register (%r5 here).


(31)

Subroutine Linkage – Stack


(32)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Stack

Linkage

Example

• A C program

illustrates nested function calls.


(33)

Stack

Linkage

Example

(cont’)

• (a-f) Stack

behavior during execution of the program shown in previous slide.


(34)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Stack

Linkage

Example

(cont’)

• (g-k) Stack behavior during execution of the C program


(35)

Input and

Output for

the ISA

• Memory map for the ARC, showing memory mapped I/O.


(36)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Touchscreen I/O Device


(37)

Flowchart for I/O

Device

• Flowchart illustrating the control structure of a program that tracks a touchscreen.


(38)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring


(39)

Java

Pro-gram

and

Com-piled

Class


(40)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring


(41)

(42)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Byte Code for Java Program

• Disassembled byte code for previous Java program. Location Code Mnemonic Meaning

0x00e3 0x10 bipush Push next byte onto stack 0x00e4 0x0f 15 Argument to bipush

0x00e5 0x3c istore_1Pop stack to local variable 1 0x00e6 0x10 bipush Push next byte onto stack 0x00e7 0x09 9 Argument to bipush

0x00e8 0x3d istore_2Pop stack to local variable 2 0x00e9 0x03 iconst_0 Push 0 onto stack 0x00ea 0x3e istore_3Pop stack to local variable 3 0x00eb 0x1b iload_1 Push local variable 1 onto stack 0x00ec 0x1c iload_2 Push local variable 2 onto stack 0x00ed 0x60 iadd Add top two stack elements

0x00ee 0x3e istore_3Pop stack to local variable 3 0x00ef0xb1 return Return


(1)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Flowchart for I/O

Device

• Flowchart illustrating the control structure of a program that tracks a touchscreen.


(2)

(3)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

Java

Pro-gram

and

Com-piled

Class

File


(4)

(5)

Computer Architecture and Organization by M. Murdocca and V. Heuring © 2007 M. Murdocca and V. Heuring

A Java Class File (Cont’)


(6)

Byte Code for Java Program

• Disassembled byte code for previous Java program.

Location Code Mnemonic Meaning

0x00e3 0x10 bipush Push next byte onto stack

0x00e4 0x0f 15 Argument to bipush

0x00e5 0x3c istore_1Pop stack to local variable 1 0x00e6 0x10 bipush Push next byte onto stack

0x00e7 0x09 9 Argument to bipush

0x00e8 0x3d istore_2Pop stack to local variable 2 0x00e9 0x03 iconst_0 Push 0 onto stack 0x00ea 0x3e istore_3Pop stack to local variable 3 0x00eb 0x1b iload_1 Push local variable 1 onto stack


Dokumen yang terkait

ANALISIS FAKTOR YANGMEMPENGARUHI FERTILITAS PASANGAN USIA SUBUR DI DESA SEMBORO KECAMATAN SEMBORO KABUPATEN JEMBER TAHUN 2011

2 53 20

KONSTRUKSI MEDIA TENTANG KETERLIBATAN POLITISI PARTAI DEMOKRAT ANAS URBANINGRUM PADA KASUS KORUPSI PROYEK PEMBANGUNAN KOMPLEK OLAHRAGA DI BUKIT HAMBALANG (Analisis Wacana Koran Harian Pagi Surya edisi 9-12, 16, 18 dan 23 Februari 2013 )

64 565 20

FAKTOR – FAKTOR YANG MEMPENGARUHI PENYERAPAN TENAGA KERJA INDUSTRI PENGOLAHAN BESAR DAN MENENGAH PADA TINGKAT KABUPATEN / KOTA DI JAWA TIMUR TAHUN 2006 - 2011

1 35 26

A DISCOURSE ANALYSIS ON “SPA: REGAIN BALANCE OF YOUR INNER AND OUTER BEAUTY” IN THE JAKARTA POST ON 4 MARCH 2011

9 161 13

Pengaruh kualitas aktiva produktif dan non performing financing terhadap return on asset perbankan syariah (Studi Pada 3 Bank Umum Syariah Tahun 2011 – 2014)

6 101 0

Pengaruh pemahaman fiqh muamalat mahasiswa terhadap keputusan membeli produk fashion palsu (study pada mahasiswa angkatan 2011 & 2012 prodi muamalat fakultas syariah dan hukum UIN Syarif Hidayatullah Jakarta)

0 22 0

Perlindungan Hukum Terhadap Anak Jalanan Atas Eksploitasi Dan Tindak Kekerasan Dihubungkan Dengan Undang-Undang Nomor 39 Tahun 1999 Tentang Hak Asasi Manusia Jo Undang-Undang Nomor 23 Tahun 2002 Tentang Perlindungan Anak

1 15 79

Pendidikan Agama Islam Untuk Kelas 3 SD Kelas 3 Suyanto Suyoto 2011

4 108 178

PP 23 TAHUN 2010 TENTANG KEGIATAN USAHA

2 51 76

KOORDINASI OTORITAS JASA KEUANGAN (OJK) DENGAN LEMBAGA PENJAMIN SIMPANAN (LPS) DAN BANK INDONESIA (BI) DALAM UPAYA PENANGANAN BANK BERMASALAH BERDASARKAN UNDANG-UNDANG RI NOMOR 21 TAHUN 2011 TENTANG OTORITAS JASA KEUANGAN

3 32 52