0% found this document useful (0 votes)
54 views

01 - Course Introduction

V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

01 - Course Introduction

V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

EEAP 282

INTRODUCTION TO MICROPROCESSORS
COURSE OUTLINE

Topic Class notes Ford & Topp,


2nd Ed.
Informational (1 lecture)
a. Course syllabus 1-4
b. grading policies 5
c. CWRUnet ethics code 6-8
d class notes 9
e. CWRUnet 10
1. connecting via PPP
2. connecting to the Kern Lab
f. Where microprocessors came from 11
Number systems and computer math (3
lectures)
a. representing numbers in binary 12 16-17
b. decimal-binary conversion,flow charts 12-18 17-19,21-22
and pseudo code
c. binary fractions, hexadecimal 19,20 17-18
d. binary arithmetic, carrys, and overflow 21-23 24-25
e. fixed length binary numbers, 2’s 24-25 25-37
complement numbers
f. signed overflow, sign extension 26-32 37-45
g. representing characters in binary 33 45-47
h. logical functions 34-35 51-53
UNIX (1 lecture)
a. commands 37-38
b. file structure 39-43
c. help 44
d mail 45
e. news 46
f. vi editor 47-49
Basic computer architecture & operation (3
lectures) 53-54
a. fetch-execute cycle 55 59-61
b. CPU 56-57 61,64-65
c. memory 62 61-64
d. bus 66-68
e. program counter 60
f. instruction coding 61

-1-
Copyright 1997 F.Merat
the 68000 microprocessor architecture (2
lectures)
a. basic 68000 architecture 58 73-74
b. 68000 register set 59 75-78
c. memory organization 62 74-75
d. basic 68000 machine code 63-65 79-80
programming
e. MOVE, ADD, SUB instructions 66-68 80-83
f. disassembly of instructions 69-73 90-92
g. Programmer’s Reference Manual 74-77
h. extension words, machine cycles 79-83 87-90
Basic 68000 assembly language programming
(3 lectures)
a. the debugger 78
b. Example: simple program 102-104
c. 68000 programming syntax 104-107
d. assembler directives 90-95 107-112
e. the Status Register 84-89 149-153, 643-
646
f. how to run programs 96-97 112-118
g. Example: how to assemble, link and 98-110
debug a program
Advanced 68000 assembly language
programming (8 lectures)
a. addressing modes
1. direct, immediate, absolute 111-122 119-123
2. address register direct 123-126 123-126
3. address register indirect 127-135 126-128, 213-
216,223,228
b. Example: program w/labels 136-143
c. error messages 144-145,148 136-139
d. Examples: programs w/errors 149-151
e. Kern Lab i/o routines 152-154 129-133
f. simple branching 155-158 153-160
g. bit manipulation 157 196-197
h. structured programming 159 170-174
i. DBcc instruction 160-165 180-183
j. signed branching 166-167 164-170
k. unsigned branching 155-158 176-178
l. Example: parity program 168-170 197-199
m. Examples 171-177
n. Rotate and shift instructions 178-183 160-164
o. Examples: rotate & shift 184-194 188-189
p. Math Instructions 195-199 189-194

-2-
Copyright 1997 F.Merat
q. Examples: math instructions 200-205
Stacks and subroutines (7 lectures)
a. stack and stack operations 212-213 217-221
b. Example: backward echo 214-216
c. Example: RPN calculator 217-219 221-223
d. PC relative addressing 220 231-236
e. MOVEM instruction 221-222, 276-281
227,251-252
f. subroutines 223-225 269-276
g. passing parameters 253,226-235 287-291
h. recursion 237-238,255- 475-487
256
i. stack frames 239-243 291-296
j. Example: LINK/UNLK 244-247 296-300
k. C/Pascal subroutine calling conventions 248-250 465-472
l. jump tables
m. Example: display 68000 registers 254 455-465
257-260 300-302
Systems programming (7 lectures)
a. microprocessor states (NORMAL, 261-262 642-645
EXCEPTION and HALTED.)
b. user/supervisor mode, priviledged 262-263 645-648
instructions
c. exception processing 264-266 648-655
d. Example: trace exception 267-268 673-676
e. Examples: reset/startup exceptions 269-273 655-659
f. traps & error handling 274-278 660-664, 676-
686
g. Example: single step exception 279-283 689-694
h. Examples: 1010 and 1111 instruction 285-288 664-669
traps
Advanced Microcomputer Architectures
(7 lectures)
a. RISC and pipelined architectures
b. 40x/60x RISC processors
c. Intel Pentium
d. Texas Instruments TMS320

The total is 42 lectures with three reserved for in-class exams. This outline is
tentative. If more time is spent on certain topics, the time spent on the remaining
topics will be reduced.

-3-
Copyright 1997 F.Merat
Textbook:
MC68000 Assembly Language & Systems Programming for the
68000 Family, Second Edition
William Ford and William Topp
This textbook is available from the University Bookstore.

The following references will be available for purchase from the


CWRU Electronic stores (3rd floor of Glennan) shortly after school
starts:
M68000 Family Programmer's Reference Manual
M68000/AC Rev 2 Programmer's Reference Card

Office Hours:
Room 515 Glennan.
Monday & Wednesday 2:30- 3:15 10 minute meetings, Be prepared,
be concise. Other times by appointment.

Honor Code:
All students are expected to abide by the CWRU Computing Code of
Ethics and Student Code of Ethics. Sharing of ideas and comparison
of answers on homework is acceptable, but copied work will not be
accepted. In-class exams will be closed book and closed notes
unless specifically stated. All work must be your own. Any reasonable
suspicion of an honor violation will be reported to the Office of
Collegiate Affairs.

Grading Policies:
Homework assignments, quiz due dates, etc. will be assigned via
email and bulletin board. Failure to read your e-mail will not be an
acceptable excuse. Assignments will be due at 5PM on the specified
day. Late assignments will be penalized 10% per day late (weekends
and holidays will not be counted for penalty purposes). Solutions will
be posted on the Web. No student who fails to turn in two
programming assignments without supporting evidence (medical
excuse, etc.) will pass the course. Handing in an assignment late or
incomplete is better than not doing it. Appropriate exceptions will be
made for network and other computer failures.

-4-
Copyright 1997 F.Merat
Grade Changes:
A student requesting that the grade of an assignment or exam
problem be reconsidered must provide the instructor with the
following information in writing within two class periods after the
work is returned to the class:
1. The number of the problem(s) to be reconsidered;
2. A description of your mistakes made in the problem(s); and
3. The reason that you feel that you should receive additional points
for the problem(s), i.e. material the instructor did not see that was
on the exam or homework paper.
Note: The entire exam or homework may be reconsidered by the
instructor at this time.

Grading
This course uses outcome based grading. You are expected to show
a minimum competency in computer usage (including CWRUnet and
the Web), as well as competency in microprocessor architecture and
programming. Your grade will be based upon the following scale. A
modest number of extra credit assignments may be made throughout
the course of the semester.

Total points >90% A


Total points >80% B
Total points >70% C
Total points >60% D

Tentative Lab Assignments and due dates:


1. Learning to use the lab hardware/software September 12th*
2. 68000 instructions and the SR September 19th*
3. polled i/o October 6th*
4. packet construction October 17th*
5. floating point division routine October 31st*
6. exception driven time sharing kernel November 17th*
7. unimplemented instruction December 1st*

NOTE: These labs may be replaced with others at my discretion.

EXAMS

-5-
Copyright 1997 F.Merat
ALL regular exams will be closed book, closed notes. Students will
ONLY be allowed to use the 68000 Microprocessor Programmer's
Reference Manual and Programmers Reference Card during exams;
no other reference materials will be allowed.

-6-
Copyright 1997 F.Merat
GRADING POLICY
Exam #1 12% September 26th*
Exam #2 12% October 15th*
Exam #3 12% November 12th*
Exam #4 12% December 5th*
Programming assignments 30%
Computer Quizzes† 22%

†These are open book exams which will be adminstered and graded
over the Web. This is an experimental component of the class. We
plan to have the on-line quizzes ready shortly and will use the
tentative schedule for quizzes:
Quiz #1 September 10th
Quiz #2 September 15th
Quiz #3 September 22nd
Quiz #4 October 6th
Quiz #5 October 17th
Quiz #6 October 24th
Quiz #7 November 3rd
Quiz #8 November 10th
Quiz #9 November 21st

* All dates are tentative and subject to change.

The teaching assistants are:


Kapil Sharma [email protected]

Michael Bristow [email protected]

Wenhui Zhao

-7-
Copyright 1997 F.Merat
Information Services Ethics Policy

CWRU Information Services Ethics Policy

June 1996

General Principles

Access

Access to computers, network facilities, information services and resources


owned and operated by Case Western Reserve University imposes certain
responsibilities and obligations and is granted subject to University policies, and
local, state, and federal statutes. Access to the University's computers, network
facilities, information services and resources is granted solely to Case Western
Reserve University faculty, staff, registered students, and individuals outside the
University who are authorized to use services that have been made available
through Case Western Reserve University. The University reserves the right to
limit, restrict, or extend access privileges to its computers, network facilities,
information services and resources.

Acceptable Use

The University's computers, network facilities, information services can provide


access to resources both on and off campus. Such open access is a privilege
and requires that individual users act in a responsible and acceptable manner.
Acceptable use always is ethical, reflects academic honesty, and shows restraint
in the consumption of shared resources. Acceptable use demonstrates respect
for intellectual property, truth in communication, ownership of data, system
security mechanisms, and individuals' right to privacy and freedom from
intimidation, harassment, and unwanted annoyance. The University considers
any violation of acceptable use principles or guidelines to be a serious offense
and reserves the right to test and monitor security, and copy and examine any
files or information resident on University systems allegedly related to
unacceptable use.

Disciplinary Action
Those who do not abide by the policies and guidelines listed below should expect
at least suspension of CWRUnet network privileges and possible disciplinary
action in accordance with University rules for misconduct and existing judicial,
disciplinary, or personnel processes. Offenders may also be subject to criminal
prosecution under federal or state laws, and should expect the University to
pursue such action.

-8-
Copyright 1997 F.Merat
Notification of Possible Misconduct

CWRUnet Services should be notified about violations of Information Services


Ethics Policy, laws, as well as potential loopholes in the security of the
University's computers, network facilities, information services and resources.
The user community is expected to cooperate with CWRUnet Services in its
operation of the University's computers, network facilities, information services
and resources as well as in the investigation of misuse or abuse.

Guidelines

Standards of Conduct

The general standards of conduct expected of members of the Case Western


Reserve University community also apply to the use of the University computers,
network facilities, information services and resources. These facilities and
resources include:

• wiring or infrastructure used for communications;


• electronics, digital switches and communication equipment used for
processing or communications;
• programs, programming languages, instructions, or routines which are used
to perform work on a computer;
• digital information such as records, images, sounds, video or textual material
stored on or accessible through a computer;
• computers used for automation or the administration of information services;
• information such as CWRUnet IDs, authorization codes, account numbers,
usage and billing records, or textual material stored on or accessible through
the network or other communication lines.

Property Rights

University computers, network facilities, information services and resources are


made available to individuals to assist in the pursuit of educational goals. In order
to promote the most effective use of these, it is expected that users will
cooperate with each other and respect the privacy of information even though it
may be in electronic form rather than printed form. Individuals and organizations
will be held no less accountable for their actions in situations involving University
computers, network facilities, information services and resources than they would
be in dealing with other media.

Though some of them are intangible, these University computers, network


facilities, information services and resources are the property of the University.
Rules prohibiting theft or vandalism apply to authorization codes, long distance

-9-
Copyright 1997 F.Merat
telephone services, television signals and service information as well as to
physical equipment.

Conduct which violates the University's property rights with respect to University
computers, network facilities, information services and resources is subject to
University disciplinary action. This conduct includes:

• using University computers, network facilities, information services and


resources for purposes other than those intended by the University body
granting access to those resources (especially using them for personal
financial gain or allowing access to them by unauthorized persons even if they
are members of the University community);
• using any portion of University computers, network facilities, information
services and resources for the purpose of:
• copying University-owned or licensed information to another computer
system for personal or external use without prior written approval;
• attempting to modify University-owned or licensed information (including
software and data) without prior approval;
• attempting to damage or disrupt the operation of computer equipment,
communications equipment, or communications lines;
• knowingly accepting or using University owned or licensed information
(including software and data) which has been obtained by illegal means;
• from a single CWRUnet faceplate, receiving more than one set of television
signals or distributing these signals to multiple receivers;
• knowingly accepting or using television signals which has been obtained by
illegal means.

Confidentiality

The University seeks to protect the civil, personal, and property rights of those
actually using its computers, network facilities, information services and
resources and seeks to protect the confidentiality of University records stored on
its computer systems. The University also seeks similarly to protect those
computers, network facilities, information services and resources of other
institutions to whom University personnel have access via the University
computers, network facilities, information services and resources. Conduct which
involves the use of University computers, network facilities, information services
and resources to violate another's rights is subject to University disciplinary
action. This conduct includes:

• invading the privacy of an individual by using electronic means to ascertain


confidential information, even if an individual or department inadvertently
allows access to information;

-10-
Copyright 1997 F.Merat
• copying another user's information without the permission of the owner, even
if it is readily accessible by electronic means;
• knowingly accepting or using information which has been obtained by illegal
means;
• abusing or harassing another user using the University computers, network
facilities, information services and resources.

Accessibility/Use

Some of the University computers, network facilities, information services and


resources require that each user have a unique identity (i.e. CWRUnet ID,
telephone long distance authorization code). The identity is used to represent a
user in various University computers, network facilities, information services and
resources activities; to provide access to certain University computers, network
facilities, information services and resources based on his/her credibility and
purpose for requiring such access; and to associate his/her own service use and
information with his/her identity. As such, this identity is another instrument of
identification and its misuse constitutes forgery or misrepresentation.

Conduct which involves inappropriate access or misuse of University computers,


network facilities, information services or resources and service identities is
subject to University disciplinary action. This conduct includes:

• allowing another individual to use ones unique identity;


• using another individual's identity, even if the individual has neglected to
safeguard it.
• using the University computers, network facilities, information services or
resources in the commission of a crime;
• gaining access to non-public computers, network facilities, information
services and resources.

Case Western Reserve University's computers, network facilities, information


services and resources are networked on the CWRU campus and to other
locations. Information on the University's networks and communication lines is
considered to be private. Tapping the University's network or communication
lines for the purpose of examining or using information other than that destined
for the intended user is considered unacceptable conduct and is subject to
disciplinary action.

State and National Laws

Conduct in violation of the principles set forth above, with respect to the use of
University information services and facilities may be subject to criminal or civil
legal action in addition to University disciplinary action.

-11-
Copyright 1997 F.Merat
http://cnswww.cns.cwru.edu/phone/phonebook/IS-Ethics96.html

-12-
Copyright 1997 F.Merat
There are several ways to access course resources. All necessary
class resources can be found on the EEAP computer cluster located
in the Kern Computer Lab (Glennan 519A). All EEAP 282 students
will be provided accounts on these machines and will be given
physical access to this lab. Please note that computer accounts and
physical access will not typically be operational until the second week
of classes. Physical access is controlled through the magnetic
coding on your CWRU IDs.

Class notes and materials can be found using an Internet browser at


http://dumbo.eeap.cwru.edu. Because the Kern computer lab is in
the process of being upgraded there will be some changes in where
notes are found and where class resources can be accessed or
downloaded. These changes will be announced in class and posted
on the course Web pages as they occur.

For people using a Web reader such as Netscape or Mosaic the


CWRU home page is at:
http://www.cwru.edu/

The EEAP Department home page is at:


http://dumbo.eeap.cwru.edu/dept/

-13-
Copyright 1997 F.Merat
The EEAP 282 home page is at:

http://dumbo.eeap.cwru.edu/dept/courses/282/eeap282.
html

The EEAP 282 notes are at:


http://dumbo.eeap.cwru.edu/dept/courses/282/00_eeap282_note
s.html

You will need to get a web browser such as Mosaic or Netscape


working immediately. You will also need a network newsreader such
as tin or NewsWatcher.

-14-
Copyright 1997 F.Merat
The official EEAP 282 newsgroup is
cwru.academic.eeap.courses.eeap282.open
which you should use for all postings (except personal and grade
related questions).

-15-
Copyright 1997 F.Merat
Connecting to the Kern Computer Lab:

There are basically four means of accessing the Kern Computer Lab.

1. World Wide Web - this is the method for accessing class notes,
labs, announcements and various software. The URL is
http://dumbo.eeap.cwru.edu/eeapdept/courses/282/

2. CWRUnet from the dorms and other CWRU locations. You can
directly connect to the Kern Lab computers using either a telnet
connection (recommended for most students) or an X-windows
connection. Telnet software should have come with your
CWRUnet installed software or is available from the various
CWRUnet software sites. With this software you can log into the
Kern Lab using your EEAP 282 account. Accounts and passwords
will be provided to you. Note that only the machines “flounder”
and “scuttle” should be used for this class.

3. Many students want to connect to the Kern Lab from their homes
using either PPP or SLIP connections. CWRU currently supports
PPP sessions. Specific information can be obtained at
http://cnswww.cns.cwru.edu/net/software/ Telnet access is also
available through 368-8888.

4. Physical access to the Kern Lab. The Kern Lab computers will be
available 6am to 2am most days. Registered EEAP 282 students
will have electronic access to the Kern Lab and can physically use
the computers. These machines have 17” color monitors and
there is a local high-speed laser printer for your use. The EEAP
student lounge (with vending machines) is also located on the
same floor.

-16-
Copyright 1997 F.Merat
Connecting to CWRUnet via PPP and SLIP

http://cnswww.cns.cwru.edu/net/software/

Please select the operating system (kind of computer) you use, and how you
connect to CWRUnet. People with direct connections (Ethernet or ATM),
please pick "On-campus". If you use PPP over a modem, pick "PPP".
• Macintosh or MacOS
• On-campus
• PPP
• Microsoft Windows95
• On-campus
• PPP
• Microsoft Windows NT
• On-campus
• Microsoft Windows 3.1 and 3.11
• On-campus
• Microsoft Windows for Workgroups 3.1 and 3.11
• On-campus
• MS-DOS without Microsoft Windows (for old 286 & XT only)
• On-campus
• OS/2

For the Macintosh you will need to install PPP, available from the software
library.

Special classes on setting up this software will be held for EEAP 282 students on
an as needed basis. For remotely accessing the Web notes you will need a PPP
connection; however, for electronic mail and running the course software you will
only need a telnet session. Our experience has been that access to CWRUnet
through the TS-2 server has been highly reliable. To use this method simply use
a terminal program on your computer and dial 368-8888. You will be prompted
for your CWRUnet id and password. When this is completed you can simply type
dumbo and you will be connected to the Kern Lab computers where you will be

-17-
Copyright 1997 F.Merat
asked for your EEAP 282 account name and password. In general, these will be
the same although you may change your passwords.

You may also

-18-
Copyright 1997 F.Merat
READING ASSIGNMENT: F&T Chapters 1 & 2

HISTORY OF MICROPROCESSORS:

In 1969 Datapoint Corp. (which made terminals) designed a very


simple programmable controller to operate their terminals and
contracted Texas Instruments and Intel to make it for them. The
Texas Instruments version never worked. The Intel version worked
but ran 10 times slower than Datapoint could use.

Datapoint canceled both contracts. Intel, however, was a small


company and wanted to get something out of their effort so they
made a few changes to their processor, called it the 4004 (the
immediate predecessor of the 8008), and sold it as a programmable
logic device. The rest is history.

-19-
Copyright 1997 F.Merat

You might also like