SlideShare a Scribd company logo
Computer Architecture
MOHAMMAD NAZIR
Agenda
CISC : MC68000
Name
CISC
(Complex Instruction Set Computer)
In CS Field we always believe that
Complexity ∞ Functionalities
CISC
• Majority of the processors used in desktop machines are CISC processors.
• Now the question is that:
What is Desktop Machine?
A desktop machine is a computer that is designed to stay in a single location. It
may be a tower ( also known as a system unit ) or in all-in-one machine , such
as an iMac.
Name(Continued)
What is Microprocessor?
A microprocessor , sometimes called a logic chip,
The microprocessor contain all , or most of the functions of CPU.
Microprocessor is the engine that goes into motion when you turn your
computer on,
A microprocessor is designed to perform arithmetic and logic operations
History
• This processor is formed in 1979 by development team of Motorola
When we hear about named Motorola the very next thing in our mind comes
out its an organization which makes mobile but the reality is that this
organization actually knows for there processor more as compared to their
mobility work.
Reason Of Manufacturing
This processor is formed for house hold usage means this processor helps to
personal computer to provide some better functionalities.
The most well known face of or usage of MC68000 is in the game of SEGA
organization all of the games launched by this development team are based on
this processor.
Reason(Continued)
The major reason of this processor is to compete with their traditional rivalries
intel.
This processor is formed to compete with Intel 8086 and there is a big
competition is saw between of them but no doubt they make a new era of
gaming at home.
Macintosh
Agenda
Architecture Of CISC : MC68000
External Architecture
It contains 64 pins and with help of this we embed this
microprocessor on the systems and this processor perform
communication with other parts of a system with these
pins. Not only that these are connected with some register
inside the processor.
Internal Architecture
1st Segment
Data Registers
• This segment contain 8 registers D0-D7.
• This segment has the size of 32 bit.
• The major work done in this segment is data Manipulation and we can
manipulate data using different operations.
Internal Architecture(Continued)
2nd Segment
Address Register
• This segment contain 8 registers A0-A7, while A7 is divided into 2 parts.
• The address registers are used to store addresses of locations in main
memory. In other words, address registers are pointers to locations in
memory.
• These registers are used as addressing mode in MC68000
Address Register(Continued)
• In this segment we use actually nine register as you seen in previous picture
we have two parts of A7 register.
• This register contain stack pointers. And there is two stack pointers due to
its privilege state.
What is Privilege State?
One of the best specification of MC68000 is that this processor can be
supervised by system or user.
Privilege state describes that is it the control in the hands of user or system,
both of them has their own stacks and their own pointers which can’t be used
at the same time therefore it lie in the same register.
Internal Architecture(Continued)
3rd Segment
• It contains the detail about which instruction to be send to process in processor.
• Its 1st 24 bits are used in initial implementation while remaining 8 can be manipulated.
Internal Architecture(Continued)
4th Segment
• This segment is often named as Condition Code Register or Status Register.
• In this we have number of flags used to perform some simple operations.
Data Manipulation
MC 68000 support limited data types and manipulate only that data which has
following data types:
• Integer (ADD, SUBTRACT, MULTIPLY, DIVIDE,' NEGATE, COMPARE)
• Logical (AND, OR, EXCLUSIVE OR COMPLEMENT, COMPARE)
• Boolean (AND, OR, EXCLUSIVE OR, COMPLEMENT)
• Bit (SET, CLEAR, CHANGE)
• String (STRING MOVE, STRING SEARCH)
8086 vs 68000
8086 68000
• Contains 14 (16 bit) registers . contains 18 (32 bit) & 1 (16 bit) registers.
• Four of which can be used as 8 (32 bit) data registers named D0 to D7.
two eight-bit registers. Seven (32 bit) address registers, names as A0 to
• Four “general purpose” registers A7.
Called AX , BX , CX, DX. Has (32 bit) pc.
There two halves can be referenced Two (32 bit) stack pointers USP or A7 used in
As (8 bit) AH, AL, BH, BL, CH, CL, DH user mode & SSP or A7 used in Supervisor mode.
DL.
Continued
8086 68000
Has four (16 bit) index registers called (16 bit) status register (flag)
called SP, BP, SI, DI.
(16 bit) PC registers .
Four Segment registers called CS, DS, SS
ES.
(16 bit) status register (flag)
continued
8086 68000
Addressing mode Addressing mode
Have 12 general ways 8 general ways.
Instruction sets Instruction sets
SBB (subtract) SUBX(subtract).
MOV MOVE
continued
8086 68000
address space 220 address space 224
little Endian Big Endian
Not privilege Privilege
one mode two modes

More Related Content

What's hot

Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386yash sawarkar
 
mano.ppt
mano.pptmano.ppt
mano.ppt
prathamgunj
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)
Siddhi Viradiya
 
Register Organization of 80386
Register Organization of 80386Register Organization of 80386
Unit 2 assembly language programming
Unit 2   assembly language programmingUnit 2   assembly language programming
Unit 2 assembly language programming
Kartik Sharma
 
8086
80868086
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODEPRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
Arijit Chakraborty
 
Lecture-2(2): Number System & Conversion
Lecture-2(2): Number System & ConversionLecture-2(2): Number System & Conversion
Lecture-2(2): Number System & Conversion
Mubashir Ali
 
Direct Memory Access
Direct Memory AccessDirect Memory Access
Direct Memory Access
Tuqa Rmahi
 
Math coprocessor 8087
Math coprocessor 8087Math coprocessor 8087
Math coprocessor 8087
Fazla Rabbi Mashrur
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly languageMir Majid
 
Motorola microprocessor
Motorola microprocessorMotorola microprocessor
Motorola microprocessor
Iffat Anjum
 
Advanced microprocessor
Advanced microprocessorAdvanced microprocessor
Advanced microprocessor
Shehrevar Davierwala
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
karthiga selvaraju
 
8086 ppt
8086 ppt8086 ppt
8086 ppt
Mohansonale1
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentation
Sridari Iyer
 
Intel Microprocessor
Intel MicroprocessorIntel Microprocessor
Intel Microprocessor
Home
 
The Basic Organization of Computers
The Basic Organization of ComputersThe Basic Organization of Computers
The Basic Organization of Computers
Tallat Satti
 
Logical instructions (and, or, xor, not, test)
Logical instructions (and, or, xor, not, test)Logical instructions (and, or, xor, not, test)
Logical instructions (and, or, xor, not, test)
Irfan Anjum
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
Dr. AISHWARYA N
 

What's hot (20)

Microprocessor 80386
Microprocessor 80386Microprocessor 80386
Microprocessor 80386
 
mano.ppt
mano.pptmano.ppt
mano.ppt
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)
 
Register Organization of 80386
Register Organization of 80386Register Organization of 80386
Register Organization of 80386
 
Unit 2 assembly language programming
Unit 2   assembly language programmingUnit 2   assembly language programming
Unit 2 assembly language programming
 
8086
80868086
8086
 
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODEPRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
PRESENTATION ON REAL ADDRESSING MODE AND VIRTUAL ADDRESSING MODE
 
Lecture-2(2): Number System & Conversion
Lecture-2(2): Number System & ConversionLecture-2(2): Number System & Conversion
Lecture-2(2): Number System & Conversion
 
Direct Memory Access
Direct Memory AccessDirect Memory Access
Direct Memory Access
 
Math coprocessor 8087
Math coprocessor 8087Math coprocessor 8087
Math coprocessor 8087
 
8086 assembly language
8086 assembly language8086 assembly language
8086 assembly language
 
Motorola microprocessor
Motorola microprocessorMotorola microprocessor
Motorola microprocessor
 
Advanced microprocessor
Advanced microprocessorAdvanced microprocessor
Advanced microprocessor
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
8086 ppt
8086 ppt8086 ppt
8086 ppt
 
8086 memory segmentation
8086 memory segmentation8086 memory segmentation
8086 memory segmentation
 
Intel Microprocessor
Intel MicroprocessorIntel Microprocessor
Intel Microprocessor
 
The Basic Organization of Computers
The Basic Organization of ComputersThe Basic Organization of Computers
The Basic Organization of Computers
 
Logical instructions (and, or, xor, not, test)
Logical instructions (and, or, xor, not, test)Logical instructions (and, or, xor, not, test)
Logical instructions (and, or, xor, not, test)
 
Addressing modes of 8086
Addressing modes of 8086Addressing modes of 8086
Addressing modes of 8086
 

Similar to Cisc mc68000

TMS320C6X Architecture
TMS320C6X ArchitectureTMS320C6X Architecture
TMS320C6X Architecture
Shweta Tripathi
 
Week 2 Course Material.pdf
Week 2 Course Material.pdfWeek 2 Course Material.pdf
Week 2 Course Material.pdf
ssuser0f6a72
 
Embedded System basic and classifications
Embedded System basic and classificationsEmbedded System basic and classifications
Embedded System basic and classifications
rajkciitr
 
Basic concepts of microprocessors jahid
Basic concepts of microprocessors jahidBasic concepts of microprocessors jahid
Basic concepts of microprocessors jahid
Self-employed
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
NaganarasaiahGoud
 
Microprocessor (1)
Microprocessor (1)Microprocessor (1)
Microprocessor (1)Muhd Azlan
 
Unit 1 Basic structureCOA.pdf
Unit 1 Basic structureCOA.pdfUnit 1 Basic structureCOA.pdf
Unit 1 Basic structureCOA.pdf
SujanTimalsina5
 
3. Coprocessor.ppt
3. Coprocessor.ppt3. Coprocessor.ppt
3. Coprocessor.ppt
MDTahsinAmin3
 
Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes
Dr.YNM
 
Embedded System Basics
Embedded System BasicsEmbedded System Basics
Embedded System Basics
Dr M Muruganandam Masilamani
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
SangeetaShekhawatTri
 
8085 notes g scheme
8085 notes g scheme8085 notes g scheme
8085 notes g scheme
HarshitParkar6677
 
8085 notes g scheme
8085 notes g scheme8085 notes g scheme
8085 notes g scheme
HarshitParkar6677
 
8085 notes g scheme 2016
8085 notes g scheme 20168085 notes g scheme 2016
8085 notes g scheme 2016
HarshitParkar6677
 
Introduction to 8085 Microprocessor
Introduction to 8085 MicroprocessorIntroduction to 8085 Microprocessor
Introduction to 8085 Microprocessor
Er. Kowar M. K. BTech, MTech, MBA
 
8085 notes g scheme 2016
8085 notes g scheme 20168085 notes g scheme 2016
8085 notes g scheme 2016
HarshitParkar6677
 
8085 notes g scheme 2016 (2)
8085 notes g scheme 2016 (2)8085 notes g scheme 2016 (2)
8085 notes g scheme 2016 (2)
HarshitParkar6677
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkar
SAQUIB AHMAD
 
Robotics & Embedded IoT System Design [Day-3]
Robotics & Embedded IoT System Design [Day-3]Robotics & Embedded IoT System Design [Day-3]
Robotics & Embedded IoT System Design [Day-3]
Deepam Dubey
 

Similar to Cisc mc68000 (20)

Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
TMS320C6X Architecture
TMS320C6X ArchitectureTMS320C6X Architecture
TMS320C6X Architecture
 
Week 2 Course Material.pdf
Week 2 Course Material.pdfWeek 2 Course Material.pdf
Week 2 Course Material.pdf
 
Embedded System basic and classifications
Embedded System basic and classificationsEmbedded System basic and classifications
Embedded System basic and classifications
 
Basic concepts of microprocessors jahid
Basic concepts of microprocessors jahidBasic concepts of microprocessors jahid
Basic concepts of microprocessors jahid
 
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.pptADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
ADVANCED MICROPROCESSORS featuers, block diagram and register organization.ppt
 
Microprocessor (1)
Microprocessor (1)Microprocessor (1)
Microprocessor (1)
 
Unit 1 Basic structureCOA.pdf
Unit 1 Basic structureCOA.pdfUnit 1 Basic structureCOA.pdf
Unit 1 Basic structureCOA.pdf
 
3. Coprocessor.ppt
3. Coprocessor.ppt3. Coprocessor.ppt
3. Coprocessor.ppt
 
Embedded systems class notes
Embedded systems  class notes Embedded systems  class notes
Embedded systems class notes
 
Embedded System Basics
Embedded System BasicsEmbedded System Basics
Embedded System Basics
 
U I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptxU I - 4. 80386 Real mode.pptx
U I - 4. 80386 Real mode.pptx
 
8085 notes g scheme
8085 notes g scheme8085 notes g scheme
8085 notes g scheme
 
8085 notes g scheme
8085 notes g scheme8085 notes g scheme
8085 notes g scheme
 
8085 notes g scheme 2016
8085 notes g scheme 20168085 notes g scheme 2016
8085 notes g scheme 2016
 
Introduction to 8085 Microprocessor
Introduction to 8085 MicroprocessorIntroduction to 8085 Microprocessor
Introduction to 8085 Microprocessor
 
8085 notes g scheme 2016
8085 notes g scheme 20168085 notes g scheme 2016
8085 notes g scheme 2016
 
8085 notes g scheme 2016 (2)
8085 notes g scheme 2016 (2)8085 notes g scheme 2016 (2)
8085 notes g scheme 2016 (2)
 
8085 microprocessor ramesh gaonkar
8085 microprocessor   ramesh gaonkar8085 microprocessor   ramesh gaonkar
8085 microprocessor ramesh gaonkar
 
Robotics & Embedded IoT System Design [Day-3]
Robotics & Embedded IoT System Design [Day-3]Robotics & Embedded IoT System Design [Day-3]
Robotics & Embedded IoT System Design [Day-3]
 

More from Nazir Ahmed

Data structures final lecture 1
Data structures final  lecture 1Data structures final  lecture 1
Data structures final lecture 1
Nazir Ahmed
 
Data structures lecture 04
Data structures  lecture 04Data structures  lecture 04
Data structures lecture 04
Nazir Ahmed
 
Data structure
Data structureData structure
Data structure
Nazir Ahmed
 
Cover letter
Cover letterCover letter
Cover letter
Nazir Ahmed
 
Control unit design(1)
Control unit design(1)Control unit design(1)
Control unit design(1)
Nazir Ahmed
 
Computer architecture mcq (2)
Computer architecture mcq (2)Computer architecture mcq (2)
Computer architecture mcq (2)
Nazir Ahmed
 
Complete binary tree and heap
Complete binary tree and heapComplete binary tree and heap
Complete binary tree and heap
Nazir Ahmed
 
Clamper clipper(10)
Clamper clipper(10)Clamper clipper(10)
Clamper clipper(10)
Nazir Ahmed
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
Nazir Ahmed
 
Chapter 07 ddl_sql
Chapter 07 ddl_sqlChapter 07 ddl_sql
Chapter 07 ddl_sql
Nazir Ahmed
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Nazir Ahmed
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
Nazir Ahmed
 
Chapter # 12 er modeling
Chapter # 12 er modelingChapter # 12 er modeling
Chapter # 12 er modeling
Nazir Ahmed
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
Nazir Ahmed
 
Ch7 1 v1
Ch7 1 v1Ch7 1 v1
Ch7 1 v1
Nazir Ahmed
 
Ch07 deadlocks
Ch07 deadlocksCh07 deadlocks
Ch07 deadlocks
Nazir Ahmed
 
Ch05 cpu-scheduling
Ch05 cpu-schedulingCh05 cpu-scheduling
Ch05 cpu-scheduling
Nazir Ahmed
 
Ch04 threads
Ch04 threadsCh04 threads
Ch04 threads
Nazir Ahmed
 
Ch03 processes
Ch03 processesCh03 processes
Ch03 processes
Nazir Ahmed
 
Ch1 v1
Ch1 v1Ch1 v1
Ch1 v1
Nazir Ahmed
 

More from Nazir Ahmed (20)

Data structures final lecture 1
Data structures final  lecture 1Data structures final  lecture 1
Data structures final lecture 1
 
Data structures lecture 04
Data structures  lecture 04Data structures  lecture 04
Data structures lecture 04
 
Data structure
Data structureData structure
Data structure
 
Cover letter
Cover letterCover letter
Cover letter
 
Control unit design(1)
Control unit design(1)Control unit design(1)
Control unit design(1)
 
Computer architecture mcq (2)
Computer architecture mcq (2)Computer architecture mcq (2)
Computer architecture mcq (2)
 
Complete binary tree and heap
Complete binary tree and heapComplete binary tree and heap
Complete binary tree and heap
 
Clamper clipper(10)
Clamper clipper(10)Clamper clipper(10)
Clamper clipper(10)
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07 ddl_sql
Chapter 07 ddl_sqlChapter 07 ddl_sql
Chapter 07 ddl_sql
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter # 12 er modeling
Chapter # 12 er modelingChapter # 12 er modeling
Chapter # 12 er modeling
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Ch7 1 v1
Ch7 1 v1Ch7 1 v1
Ch7 1 v1
 
Ch07 deadlocks
Ch07 deadlocksCh07 deadlocks
Ch07 deadlocks
 
Ch05 cpu-scheduling
Ch05 cpu-schedulingCh05 cpu-scheduling
Ch05 cpu-scheduling
 
Ch04 threads
Ch04 threadsCh04 threads
Ch04 threads
 
Ch03 processes
Ch03 processesCh03 processes
Ch03 processes
 
Ch1 v1
Ch1 v1Ch1 v1
Ch1 v1
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Cisc mc68000

  • 4. Name CISC (Complex Instruction Set Computer) In CS Field we always believe that Complexity ∞ Functionalities
  • 5. CISC • Majority of the processors used in desktop machines are CISC processors. • Now the question is that: What is Desktop Machine? A desktop machine is a computer that is designed to stay in a single location. It may be a tower ( also known as a system unit ) or in all-in-one machine , such as an iMac.
  • 6. Name(Continued) What is Microprocessor? A microprocessor , sometimes called a logic chip, The microprocessor contain all , or most of the functions of CPU. Microprocessor is the engine that goes into motion when you turn your computer on, A microprocessor is designed to perform arithmetic and logic operations
  • 7. History • This processor is formed in 1979 by development team of Motorola When we hear about named Motorola the very next thing in our mind comes out its an organization which makes mobile but the reality is that this organization actually knows for there processor more as compared to their mobility work.
  • 8. Reason Of Manufacturing This processor is formed for house hold usage means this processor helps to personal computer to provide some better functionalities. The most well known face of or usage of MC68000 is in the game of SEGA organization all of the games launched by this development team are based on this processor.
  • 9. Reason(Continued) The major reason of this processor is to compete with their traditional rivalries intel. This processor is formed to compete with Intel 8086 and there is a big competition is saw between of them but no doubt they make a new era of gaming at home.
  • 12. External Architecture It contains 64 pins and with help of this we embed this microprocessor on the systems and this processor perform communication with other parts of a system with these pins. Not only that these are connected with some register inside the processor.
  • 14. Data Registers • This segment contain 8 registers D0-D7. • This segment has the size of 32 bit. • The major work done in this segment is data Manipulation and we can manipulate data using different operations.
  • 16. Address Register • This segment contain 8 registers A0-A7, while A7 is divided into 2 parts. • The address registers are used to store addresses of locations in main memory. In other words, address registers are pointers to locations in memory. • These registers are used as addressing mode in MC68000
  • 17. Address Register(Continued) • In this segment we use actually nine register as you seen in previous picture we have two parts of A7 register. • This register contain stack pointers. And there is two stack pointers due to its privilege state.
  • 18. What is Privilege State? One of the best specification of MC68000 is that this processor can be supervised by system or user. Privilege state describes that is it the control in the hands of user or system, both of them has their own stacks and their own pointers which can’t be used at the same time therefore it lie in the same register.
  • 19. Internal Architecture(Continued) 3rd Segment • It contains the detail about which instruction to be send to process in processor. • Its 1st 24 bits are used in initial implementation while remaining 8 can be manipulated.
  • 20. Internal Architecture(Continued) 4th Segment • This segment is often named as Condition Code Register or Status Register. • In this we have number of flags used to perform some simple operations.
  • 21. Data Manipulation MC 68000 support limited data types and manipulate only that data which has following data types: • Integer (ADD, SUBTRACT, MULTIPLY, DIVIDE,' NEGATE, COMPARE) • Logical (AND, OR, EXCLUSIVE OR COMPLEMENT, COMPARE) • Boolean (AND, OR, EXCLUSIVE OR, COMPLEMENT) • Bit (SET, CLEAR, CHANGE) • String (STRING MOVE, STRING SEARCH)
  • 22. 8086 vs 68000 8086 68000 • Contains 14 (16 bit) registers . contains 18 (32 bit) & 1 (16 bit) registers. • Four of which can be used as 8 (32 bit) data registers named D0 to D7. two eight-bit registers. Seven (32 bit) address registers, names as A0 to • Four “general purpose” registers A7. Called AX , BX , CX, DX. Has (32 bit) pc. There two halves can be referenced Two (32 bit) stack pointers USP or A7 used in As (8 bit) AH, AL, BH, BL, CH, CL, DH user mode & SSP or A7 used in Supervisor mode. DL.
  • 23. Continued 8086 68000 Has four (16 bit) index registers called (16 bit) status register (flag) called SP, BP, SI, DI. (16 bit) PC registers . Four Segment registers called CS, DS, SS ES. (16 bit) status register (flag)
  • 24. continued 8086 68000 Addressing mode Addressing mode Have 12 general ways 8 general ways. Instruction sets Instruction sets SBB (subtract) SUBX(subtract). MOV MOVE
  • 25. continued 8086 68000 address space 220 address space 224 little Endian Big Endian Not privilege Privilege one mode two modes

Editor's Notes

  1. Addressing Mode (An Addressing Mode defines how a machine language Instruction in any computer architecture identify the operands of each instruction)
  2. Bit 0, known as the C bit, is the carry bit. (It is set (to 1) whenever the result of an operation generates a carry) Bit 1, known as the V bit, is the overflow bit. (It is set if an operation results in arithmetic overflow in terms of two's complement arithmetic) Bit 2, known as the Z bit, is the zero bit. (It is set when the result of an operation is zero) Bit 3, known as the N bit, is the negative bit. (It is set when the result of an operation is negative) Bit 4, known as the X bit, is the extend bit. (It often has the same value as the C bit.)