Other ISAs Next, we’ll first we look at a longer example program, starting with some C code and translating it into our assembly language. Then we discuss.

Slides:



Advertisements
Similar presentations
Instruction Set Design
Advertisements

INSTRUCTION SET ARCHITECTURES
Chapter 10- Instruction set architectures
There are two types of addressing schemes:
ITCS 3181 Logic and Computer Systems 2015 B. Wilkinson slides3.ppt Modification date: March 16, Addressing Modes The methods used in machine instructions.
Instruction Set Architecture
TK 2633 Microprocessor & Interfacing Lecture 3: Introduction to 8085 Assembly Language Programming (2) 1 Prepared By: Associate Prof. Dr Masri Ayob.
Room: E-3-31 Phone: Dr Masri Ayob TK 2633 Microprocessor & Interfacing Lecture 1: Introduction to 8085 Assembly Language.
Code Generation CS 480. Can be complex To do a good job of teaching about code generation I could easily spend ten weeks But, don’t have ten weeks, so.
Lecture 18 Last Lecture Today’s Topic Instruction formats
Machine Instruction Characteristics
IT253: Computer Organization Lecture 4: Instruction Set Architecture Tonga Institute of Higher Education.
December 8, 2003Other ISA's1 Other ISAs Next, we discuss some alternative instruction set designs. – Different ways of specifying memory addresses – Different.
CSC 3210 Computer Organization and Programming Chapter 1 THE COMPUTER D.M. Rasanjalee Himali.
Chapter 5 A Closer Look at Instruction Set Architectures.
Execution of an instruction
Instruction Sets: Addressing modes and Formats Group #4  Eloy Reyes  Rafael Arevalo  Julio Hernandez  Humood Aljassar Computer Design EEL 4709c Prof:
Lecture 5 A Closer Look at Instruction Set Architectures Lecture Duration: 2 Hours.
Computer Organization Instructions Language of The Computer (MIPS) 2.
Control units In the last lecture, we introduced the basic structure of a control unit, and translated our assembly instructions into a binary representation.
F453 Module 8: Low Level Languages 8.1: Use of Computer Architecture.
Computer Architecture
Computer Architecture. Instruction Set “The collection of different instructions that the processor can execute it”. Usually represented by assembly codes,
Displacement (Indexed) Stack
Overview of Instruction Set Architectures
CS2100 Computer Organisation
Architecture Review Instruction Set Architecture
Alvaro Mauricio Peña Dariusz Niworowski Frank Rodriguez
A Closer Look at Instruction Set Architectures
A Closer Look at Instruction Set Architectures: Expanding Opcodes
William Stallings Computer Organization and Architecture 8th Edition
Computer Organization and Design
Computer Organization and Assembly Language (COAL)
Chapter 5 The LC-3.
EECE-276 Fall 2003 Microprocessors & Microcontrollers II
Instruction set architectures
BIC 10503: COMPUTER ARCHITECTURE
Instructions - Type and Format
CS170 Computer Organization and Architecture I
CSCI206 - Computer Organization & Programming
Today: Control Unit: A bit of review
Instruction set architectures
The all-important ALU The main job of a central processing unit is to “process,” or to perform computations....remember the ALU from way back when? We’ll.
CSCE Fall 2013 Prof. Jennifer L. Welch.
Datapaths For the rest of the semester, we’ll focus on computer architecture: how to assemble the combinational and sequential components we’ve studied.
CENTRAL PROCESSING UNIT
Chapter 8 Central Processing Unit
ECEG-3202 Computer Architecture and Organization
Instruction encoding We’ve already seen some important aspects of processor design. A datapath contains an ALU, registers and memory. Programmers and compilers.
Two questions Four registers isn’t a lot. What if we need more storage? Who exactly decides which registers are read and written and which ALU function.
ECEG-3202 Computer Architecture and Organization
Instruction set architectures
Computer Architecture
A Closer Look at Instruction Set Architectures Chapter 5
Other ISAs Next, we’ll first we look at a longer example program, starting with some C code and translating it into our assembly language. Then we discuss.
Data manipulation instructions
Branch instructions We’ll implement branch instructions for the eight different conditions shown here. Bits 11-9 of the opcode field will indicate the.
ECEG-3202 Computer Architecture and Organization
CSCE Fall 2012 Prof. Jennifer L. Welch.
COMS 361 Computer Organization
Instruction encoding We’ve already seen some important aspects of processor design. A datapath contains an ALU, registers and memory. Programmers and compilers.
Control units In the last lecture, we introduced the basic structure of a control unit, and translated our assembly instructions into a binary representation.
ECE 352 Digital System Fundamentals
Addressing mode summary
Instruct Set Architecture Variations
Today: a look to the future
Review: The whole processor
William Stallings Computer Organization and Architecture 8 th Edition Chapter 11 Instruction Sets: Addressing Modes and Formats.
Computer Organization
Chapter 10 Instruction Sets: Characteristics and Functions
Presentation transcript:

Other ISAs Next, we’ll first we look at a longer example program, starting with some C code and translating it into our assembly language. Then we discuss some alternative instruction set designs. Different ways of specifying memory addresses Different numbers and types of operands in ALU instructions July 29, 2002 ©2000-2002 Howard Huang

String manipulation example A C-style string is represented as a special kind of array. Each element is a single byte, containing an ASCII code that represents one letter of the string. The last element of the array is a 0, or a “null” character. For example, The Godfather would be a 14-byte array: We’ll write a program to convert a string to all uppercase characters: Lowercase letters in ASCII range from 97 to 122 (‘a’ to ‘z’). Uppercase letters range from 65 to 90 (‘A’ to ‘Z’). A lowercase letter can be converted to uppercase by subtracting 32 from its ASCII code (e.g., 97 - 32 = 65). 2/18/2019 Instruction encoding

Two versions in C Assume that variable R0 contains the address of the string, or its starting location in memory. Both of these loop through a string, subtracting 32 from lowercase letters, until they reach the terminating 0. The first one accesses letters by indexing the array R0, and incrementing the index on each loop iteration. The second one uses a pointer which is dereferenced to produce a letter. The pointer is incremented once per iteration. int i = 0; while (R0[i] != 0) { if (R0[i] >= 97 && R0[i] <= 122) R0[i] = R0[i] - 32; i++; } while (*R0 != 0) { if (*R0 >= 97 && *R0 <= 122) *R0 = *R0 - 32; R0++; 2/18/2019 Instruction encoding

Array version Here is a direct translation of the array version. R0 contains the string address. R1 contains the loop index, i. R3 contains R0[i]. We also need the address of R0[i] to load the data; this is stored in R2. LD R1, #0 // Use R1 as index i LOOP: ADD R2, R1, R0 // R2 = &R0[i] LD R3, (R2) // R3 = R0[i] BEQ R3, #0, EXIT // Exit if R3 = 0 BLT R3, #97, NEXT // R3 < 97? BGT R3, #122, NEXT // R3 > 122? SUB R3, R3, #32 // Convert R3 and put ST (R2), R3 // it back in RAM NEXT: ADD R1, R1, #1 // i++ JMP LOOP // Loop EXIT: ... 2/18/2019 Instruction encoding

Pointer version Here is the pointer-based version of the same program. R0 contains the string address. R3 contains *R0. This version is a little shorter. We increment R0 once, instead of incrementing an index i and then adding i to the string’s base address. This saves one addition per iteration, and R2 isn’t needed anymore. LOOP: LD R3, (R0) // R3 = *R0 BEQ R3, #0, EXIT // Exit if R3 = 0 BLT R3, #97, NEXT // R3 < 97? BGT R3, #122, NEXT // R3 > 122? SUB R3, R3, #32 // Convert R3 and ST (R0), R3 // store back to RAM NEXT: ADD R0, R0, #1 // R0++ JMP LOOP EXIT: ... 2/18/2019 Instruction encoding

Addressing modes The first instruction set design issue we’ll see are addressing modes, which let you specify memory addresses in various ways. Each mode has its own assembly language notation. Different modes may be useful in different situations. The location that is actually used is called the effective address. The addressing modes that are available will depend on the datapath. Our simple datapath only supports two forms of addressing. Older processors like the 8086 have zillions of addressing modes. We’ll introduce some of the more common ones. 2/18/2019 Instruction encoding

Immediate addressing One of the simplest modes is immediate addressing, where the operand itself is accessed. LD R1, #1999 R1  1999 This mode is a good way to specify initial values for registers. We’ve already used immediate addressing several times. We introduced it on Monday with some short examples. It appears in the string conversion program you just saw. 2/18/2019 Instruction encoding

Direct addressing Another possible mode is direct addressing, where the operand is a constant that represents a memory address. LD R1, 500 R1  M[500] Here the effective address is 500, the same as the operand. This is useful for working with pointers. You can think of the constant as a pointer. The register gets loaded with the data at that address. 2/18/2019 Instruction encoding

Register indirect addressing We already saw register indirect mode, where the operand is a register that contains a memory address. LD R1, (R0) R1  M[R0] The effective address would be the value in R0. This is also useful for working with pointers. In the example above, R0 is a pointer, and R1 is loaded with the data at that address. This is similar to R1 = *R0 in C or C++. So what’s the difference between direct mode and this one? In direct mode, the address is a constant that is hard-coded into the program and cannot be changed. Here the contents of R0, and hence the address being accessed, can easily be changed. 2/18/2019 Instruction encoding

Stepping through arrays Register indirect mode makes it easy to access contiguous locations in memory, such as elements of an array. If R0 is the address of the first element in an array, we can easily access the second element too: LD R1, (R0) // R1 contains the first element ADD R0, R0, #1 LD R2, (R0) // R2 contains the second element This is so common that some instruction sets can automatically increment the register for you: LD R1, (R0)+ // R1 contains the first element LD R2, (R0)+ // R2 contains the second element Such instructions can be used within loops to access an entire array. 2/18/2019 Instruction encoding

Indexed addressing Operands with indexed addressing include a constant and a register. LD R1, 500(R0) R1  M[R0 + 500] The effective address is the register data plus the constant. For instance, if R0 = 25, the effective address here would be 525. We can use this addressing mode to access arrays also. The constant is the array address, while the register contains an index into the array. The example instruction above might be used to load the 25th element of an array that starts at memory location 500. It’s possible to use negative constants too, which would let you index arrays backwards. 2/18/2019 Instruction encoding

PC-relative addressing We’ve seen PC-relative addressing already. The operand is a constant that is added to the program counter to produce the effective memory address. 200: LD R1, $30 R1  M[201 + 30] The PC usually points to the address of the next instruction, so the effective address here is 231 (assuming the LD instruction itself uses one word of memory). This is similar to indexed addressing, except the PC is used instead of a regular register. Relative addressing is often used in jump and branch instructions. For instance, JMP $30 lets you skip the next 30 instructions. A negative constant lets you jump backwards, which is common in writing loops. 2/18/2019 Instruction encoding

Indirect addressing The most complicated mode that we’ll look at is indirect addressing. LD R1, [360] R1  M[M[360]] The operand is a constant that specifies a memory location which refers to another location, whose contents are then accessed. The effective address here is M[360]. Indirect addressing is useful for working with multi-level pointers, or “handles.” The constant represents a pointer to a pointer. In C, we might write something like R1 = **ptr. 2/18/2019 Instruction encoding

Addressing mode summary 2/18/2019 Instruction encoding

Number of operands Another way to classify instruction sets is according to the number of operands that each data manipulation instruction can have. Our example instruction set had three-address instructions, because each one had up to three operands—two sources and one destination. This provides the most flexibility, but it’s also possible to have fewer than three operands. ADD R0, R1, R2 operation destination sources operands R0  R1 + R2 Register transfer instruction: 2/18/2019 Instruction encoding

Two-address instructions In a two-address instruction, the first operand serves as both the destination and one of the source registers. Some other examples and the corresponding C code: ADD R3, #1 R3  R3 + 1 R3++; MUL R1, #5 R1  R1 * 5 R1 *= 5; NOT R1 R1  R1’ R1 = ~R1; ADD R0, R1 operation destination and source 1 source 2 operands R0  R0 + R1 Register transfer instruction: 2/18/2019 Instruction encoding

One-address instructions Some computers, like this old Apple II, have one-address instructions. The CPU has a special register called an accumulator, which implicitly serves as the destination and one of the sources. Here is an example sequence which increments M[R0]: LD (R0) ACC  M[R0] ADD #1 ACC  ACC + 1 ST (R0) M[R0]  ACC ADD R0 operation source ACC  ACC + R0 Register transfer instruction: 2/18/2019 Instruction encoding

The ultimate: zero addresses If the destination and sources are all implicit, then you don’t have to specify any operands at all! This is possible with processors that use a stack architecture. HP calculators and their “reverse Polish notation” use a stack. The Java Virtual Machine is also stack-based. How can you do calculations with a stack? Operands are pushed onto a stack. The most recently pushed element is at the “top” of the stack (TOS). Operations use the topmost stack elements as their operands. Those values are then replaced with the operation’s result. 2/18/2019 Instruction encoding

Stack architecture example From left to right, here are three stack instructions, and what the stack looks like after each example instruction is executed. This sequence of stack operations corresponds to one register transfer instruction: TOS  R1 + R2 PUSH R1 PUSH R2 ADD (Top) (Bottom) 2/18/2019 Instruction encoding

Data movement instructions Finally, the types of operands allowed in data manipulation instructions is another way of characterizing instruction sets. So far, we’ve assumed that ALU operations can have only register and constant operands. Many real instruction sets allow memory-based operands as well. We’ll use the book’s example and illustrate how the following operation can be translated into some different assembly languages. X = (A + B)(C + D) Assume that A, B, C, D and X are really memory addresses. 2/18/2019 Instruction encoding

Register-to-register architectures Our programs so far assume a register-to-register, or load/store, architecture, which matches our datapath from last week nicely. Operands in data manipulation instructions must be registers. Other instructions are needed to move data between memory and the register file. With a register-to-register, three-address instruction set, we might translate X = (A + B)(C + D) into: LD R1, A R1  M[A] // Use direct addressing LD R2, B R2  M[B] ADD R3, R1, R2 R3  R1 + R2 // R3 = M[A] + M[B] LD R1, C R1  M[C] LD R2, D R2  M[D] ADD R1, R1, R2 R1  R1 + R2 // R1 = M[C] + M[D] MUL R1, R1, R3 R1  R1 * R3 // R1 has the result ST X, R1 M[X]  R1 // Store that into M[X] 2/18/2019 Instruction encoding

Memory-to-memory architectures In memory-to-memory architectures, all data manipulation instructions use memory addresses as operands. With a memory-to-memory, three-address instruction set, we might translate X = (A + B)(C + D) into simply: How about with a two-address instruction set? ADD X, A, B M[X]  M[A] + M[B] ADD T, C, D M[T]  M[C] + M[D] // T is temporary storage MUL X, X, T M[X]  M[X] * M[T] MOVE X, A M[X]  M[A] // Copy M[A] to M[X] first ADD X, B M[X]  M[X] + M[B] // Add M[B] MOVE T, C M[T]  M[C] // Copy M[C] to M[T] ADD T, D M[T]  M[T] + M[D] // Add M[D] MUL X, T M[X]  M[X] * M[T] // Multiply 2/18/2019 Instruction encoding

Register-to-memory architectures Finally, register-to-memory architectures let the data manipulation instructions access both registers and memory. With two-address instructions, we might do the following: LD R1, A R1  M[A] // Load M[A] into R1 first ADD R1, B R1  R1 + M[B] // Add M[B] LD R2, C R2  M[C] // Load M[C] into R2 ADD R2, D R2  R2 + M[D] // Add M[D] MUL R1, R2 R1  R1 * R2 // Multiply ST X, R1 M[X]  R1 // Store 2/18/2019 Instruction encoding

Size and speed There are lots of tradeoffs in deciding how many and what kind of operands and addressing modes to support in a processor. These decisions can affect the size of machine language programs. Memory addresses are long compared to register file addresses, so instructions with memory-based operands are typically longer than those with register operands. Permitting more operands also leads to longer instructions. There is also an impact on the speed of the program. Memory accesses are much slower than register accesses. Longer programs require more memory accesses, just for loading the instructions! Most newer processors use register-to-register designs. Reading from registers is faster than reading from RAM. Using register operands also leads to shorter instructions. 2/18/2019 Instruction encoding

Summary Instruction sets can be classified along several lines. Addressing modes let instructions access memory in various ways. Data manipulation instructions can have from 0 to 3 operands. Those operands may be registers, memory addresses, or both. Instruction set design is intimately tied to processor datapath design. “The Godfather” is a 14-character C string. 2/18/2019 Instruction encoding