01 - Course Introduction
01 - Course Introduction
INTRODUCTION TO MICROPROCESSORS
COURSE OUTLINE
-1-
Copyright 1997 F.Merat
the 68000 microprocessor architecture (2
lectures)
a. basic 68000 architecture 58 73-74
b. 68000 register set 59 75-78
c. memory organization 62 74-75
d. basic 68000 machine code 63-65 79-80
programming
e. MOVE, ADD, SUB instructions 66-68 80-83
f. disassembly of instructions 69-73 90-92
g. Programmer’s Reference Manual 74-77
h. extension words, machine cycles 79-83 87-90
Basic 68000 assembly language programming
(3 lectures)
a. the debugger 78
b. Example: simple program 102-104
c. 68000 programming syntax 104-107
d. assembler directives 90-95 107-112
e. the Status Register 84-89 149-153, 643-
646
f. how to run programs 96-97 112-118
g. Example: how to assemble, link and 98-110
debug a program
Advanced 68000 assembly language
programming (8 lectures)
a. addressing modes
1. direct, immediate, absolute 111-122 119-123
2. address register direct 123-126 123-126
3. address register indirect 127-135 126-128, 213-
216,223,228
b. Example: program w/labels 136-143
c. error messages 144-145,148 136-139
d. Examples: programs w/errors 149-151
e. Kern Lab i/o routines 152-154 129-133
f. simple branching 155-158 153-160
g. bit manipulation 157 196-197
h. structured programming 159 170-174
i. DBcc instruction 160-165 180-183
j. signed branching 166-167 164-170
k. unsigned branching 155-158 176-178
l. Example: parity program 168-170 197-199
m. Examples 171-177
n. Rotate and shift instructions 178-183 160-164
o. Examples: rotate & shift 184-194 188-189
p. Math Instructions 195-199 189-194
-2-
Copyright 1997 F.Merat
q. Examples: math instructions 200-205
Stacks and subroutines (7 lectures)
a. stack and stack operations 212-213 217-221
b. Example: backward echo 214-216
c. Example: RPN calculator 217-219 221-223
d. PC relative addressing 220 231-236
e. MOVEM instruction 221-222, 276-281
227,251-252
f. subroutines 223-225 269-276
g. passing parameters 253,226-235 287-291
h. recursion 237-238,255- 475-487
256
i. stack frames 239-243 291-296
j. Example: LINK/UNLK 244-247 296-300
k. C/Pascal subroutine calling conventions 248-250 465-472
l. jump tables
m. Example: display 68000 registers 254 455-465
257-260 300-302
Systems programming (7 lectures)
a. microprocessor states (NORMAL, 261-262 642-645
EXCEPTION and HALTED.)
b. user/supervisor mode, priviledged 262-263 645-648
instructions
c. exception processing 264-266 648-655
d. Example: trace exception 267-268 673-676
e. Examples: reset/startup exceptions 269-273 655-659
f. traps & error handling 274-278 660-664, 676-
686
g. Example: single step exception 279-283 689-694
h. Examples: 1010 and 1111 instruction 285-288 664-669
traps
Advanced Microcomputer Architectures
(7 lectures)
a. RISC and pipelined architectures
b. 40x/60x RISC processors
c. Intel Pentium
d. Texas Instruments TMS320
The total is 42 lectures with three reserved for in-class exams. This outline is
tentative. If more time is spent on certain topics, the time spent on the remaining
topics will be reduced.
-3-
Copyright 1997 F.Merat
Textbook:
MC68000 Assembly Language & Systems Programming for the
68000 Family, Second Edition
William Ford and William Topp
This textbook is available from the University Bookstore.
Office Hours:
Room 515 Glennan.
Monday & Wednesday 2:30- 3:15 10 minute meetings, Be prepared,
be concise. Other times by appointment.
Honor Code:
All students are expected to abide by the CWRU Computing Code of
Ethics and Student Code of Ethics. Sharing of ideas and comparison
of answers on homework is acceptable, but copied work will not be
accepted. In-class exams will be closed book and closed notes
unless specifically stated. All work must be your own. Any reasonable
suspicion of an honor violation will be reported to the Office of
Collegiate Affairs.
Grading Policies:
Homework assignments, quiz due dates, etc. will be assigned via
email and bulletin board. Failure to read your e-mail will not be an
acceptable excuse. Assignments will be due at 5PM on the specified
day. Late assignments will be penalized 10% per day late (weekends
and holidays will not be counted for penalty purposes). Solutions will
be posted on the Web. No student who fails to turn in two
programming assignments without supporting evidence (medical
excuse, etc.) will pass the course. Handing in an assignment late or
incomplete is better than not doing it. Appropriate exceptions will be
made for network and other computer failures.
-4-
Copyright 1997 F.Merat
Grade Changes:
A student requesting that the grade of an assignment or exam
problem be reconsidered must provide the instructor with the
following information in writing within two class periods after the
work is returned to the class:
1. The number of the problem(s) to be reconsidered;
2. A description of your mistakes made in the problem(s); and
3. The reason that you feel that you should receive additional points
for the problem(s), i.e. material the instructor did not see that was
on the exam or homework paper.
Note: The entire exam or homework may be reconsidered by the
instructor at this time.
Grading
This course uses outcome based grading. You are expected to show
a minimum competency in computer usage (including CWRUnet and
the Web), as well as competency in microprocessor architecture and
programming. Your grade will be based upon the following scale. A
modest number of extra credit assignments may be made throughout
the course of the semester.
EXAMS
-5-
Copyright 1997 F.Merat
ALL regular exams will be closed book, closed notes. Students will
ONLY be allowed to use the 68000 Microprocessor Programmer's
Reference Manual and Programmers Reference Card during exams;
no other reference materials will be allowed.
-6-
Copyright 1997 F.Merat
GRADING POLICY
Exam #1 12% September 26th*
Exam #2 12% October 15th*
Exam #3 12% November 12th*
Exam #4 12% December 5th*
Programming assignments 30%
Computer Quizzes† 22%
†These are open book exams which will be adminstered and graded
over the Web. This is an experimental component of the class. We
plan to have the on-line quizzes ready shortly and will use the
tentative schedule for quizzes:
Quiz #1 September 10th
Quiz #2 September 15th
Quiz #3 September 22nd
Quiz #4 October 6th
Quiz #5 October 17th
Quiz #6 October 24th
Quiz #7 November 3rd
Quiz #8 November 10th
Quiz #9 November 21st
Wenhui Zhao
-7-
Copyright 1997 F.Merat
Information Services Ethics Policy
June 1996
General Principles
Access
Acceptable Use
Disciplinary Action
Those who do not abide by the policies and guidelines listed below should expect
at least suspension of CWRUnet network privileges and possible disciplinary
action in accordance with University rules for misconduct and existing judicial,
disciplinary, or personnel processes. Offenders may also be subject to criminal
prosecution under federal or state laws, and should expect the University to
pursue such action.
-8-
Copyright 1997 F.Merat
Notification of Possible Misconduct
Guidelines
Standards of Conduct
Property Rights
-9-
Copyright 1997 F.Merat
telephone services, television signals and service information as well as to
physical equipment.
Conduct which violates the University's property rights with respect to University
computers, network facilities, information services and resources is subject to
University disciplinary action. This conduct includes:
Confidentiality
The University seeks to protect the civil, personal, and property rights of those
actually using its computers, network facilities, information services and
resources and seeks to protect the confidentiality of University records stored on
its computer systems. The University also seeks similarly to protect those
computers, network facilities, information services and resources of other
institutions to whom University personnel have access via the University
computers, network facilities, information services and resources. Conduct which
involves the use of University computers, network facilities, information services
and resources to violate another's rights is subject to University disciplinary
action. This conduct includes:
-10-
Copyright 1997 F.Merat
• copying another user's information without the permission of the owner, even
if it is readily accessible by electronic means;
• knowingly accepting or using information which has been obtained by illegal
means;
• abusing or harassing another user using the University computers, network
facilities, information services and resources.
Accessibility/Use
Conduct in violation of the principles set forth above, with respect to the use of
University information services and facilities may be subject to criminal or civil
legal action in addition to University disciplinary action.
-11-
Copyright 1997 F.Merat
http://cnswww.cns.cwru.edu/phone/phonebook/IS-Ethics96.html
-12-
Copyright 1997 F.Merat
There are several ways to access course resources. All necessary
class resources can be found on the EEAP computer cluster located
in the Kern Computer Lab (Glennan 519A). All EEAP 282 students
will be provided accounts on these machines and will be given
physical access to this lab. Please note that computer accounts and
physical access will not typically be operational until the second week
of classes. Physical access is controlled through the magnetic
coding on your CWRU IDs.
-13-
Copyright 1997 F.Merat
The EEAP 282 home page is at:
http://dumbo.eeap.cwru.edu/dept/courses/282/eeap282.
html
-14-
Copyright 1997 F.Merat
The official EEAP 282 newsgroup is
cwru.academic.eeap.courses.eeap282.open
which you should use for all postings (except personal and grade
related questions).
-15-
Copyright 1997 F.Merat
Connecting to the Kern Computer Lab:
There are basically four means of accessing the Kern Computer Lab.
1. World Wide Web - this is the method for accessing class notes,
labs, announcements and various software. The URL is
http://dumbo.eeap.cwru.edu/eeapdept/courses/282/
2. CWRUnet from the dorms and other CWRU locations. You can
directly connect to the Kern Lab computers using either a telnet
connection (recommended for most students) or an X-windows
connection. Telnet software should have come with your
CWRUnet installed software or is available from the various
CWRUnet software sites. With this software you can log into the
Kern Lab using your EEAP 282 account. Accounts and passwords
will be provided to you. Note that only the machines “flounder”
and “scuttle” should be used for this class.
3. Many students want to connect to the Kern Lab from their homes
using either PPP or SLIP connections. CWRU currently supports
PPP sessions. Specific information can be obtained at
http://cnswww.cns.cwru.edu/net/software/ Telnet access is also
available through 368-8888.
4. Physical access to the Kern Lab. The Kern Lab computers will be
available 6am to 2am most days. Registered EEAP 282 students
will have electronic access to the Kern Lab and can physically use
the computers. These machines have 17” color monitors and
there is a local high-speed laser printer for your use. The EEAP
student lounge (with vending machines) is also located on the
same floor.
-16-
Copyright 1997 F.Merat
Connecting to CWRUnet via PPP and SLIP
http://cnswww.cns.cwru.edu/net/software/
Please select the operating system (kind of computer) you use, and how you
connect to CWRUnet. People with direct connections (Ethernet or ATM),
please pick "On-campus". If you use PPP over a modem, pick "PPP".
• Macintosh or MacOS
• On-campus
• PPP
• Microsoft Windows95
• On-campus
• PPP
• Microsoft Windows NT
• On-campus
• Microsoft Windows 3.1 and 3.11
• On-campus
• Microsoft Windows for Workgroups 3.1 and 3.11
• On-campus
• MS-DOS without Microsoft Windows (for old 286 & XT only)
• On-campus
• OS/2
For the Macintosh you will need to install PPP, available from the software
library.
Special classes on setting up this software will be held for EEAP 282 students on
an as needed basis. For remotely accessing the Web notes you will need a PPP
connection; however, for electronic mail and running the course software you will
only need a telnet session. Our experience has been that access to CWRUnet
through the TS-2 server has been highly reliable. To use this method simply use
a terminal program on your computer and dial 368-8888. You will be prompted
for your CWRUnet id and password. When this is completed you can simply type
dumbo and you will be connected to the Kern Lab computers where you will be
-17-
Copyright 1997 F.Merat
asked for your EEAP 282 account name and password. In general, these will be
the same although you may change your passwords.
-18-
Copyright 1997 F.Merat
READING ASSIGNMENT: F&T Chapters 1 & 2
HISTORY OF MICROPROCESSORS:
-19-
Copyright 1997 F.Merat