The document discusses concepts related to instruction addressing and execution in computer architecture. It explains that programs are loaded into separate code, data, and stack segments in memory. When an *.exe file is loaded, it places the program after a 256-byte Program Segment Prefix on a paragraph boundary, and loads the segment registers with the starting addresses of code, data, and stack. It then provides examples of instruction fetching and decoding, showing how the segment and instruction pointers are used to determine memory addresses for instruction execution.
The e-book covers some of the really cool ways on how to go about using Linux from Terminal making your daily work much more efficient, less time consuming and of course geeky.
The e-book covers some of the really cool ways on how to go about using Linux from Terminal making your daily work much more efficient, less time consuming and of course geeky.
An assembly (or assembler) language, often abbreviated asm, is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture's machine code instructions.
This presentation covers very basics of assembly language with some computer organization concept. I took this session as part of on going series on assembly at NULL Hyderabad meets. PART II will cover instruction sets and more in detail.
Chapter 1
Syllabus
Catalog Description: Computer structure, machine representation of data,
addressing and indexing, computation and control instructions, assembly
language and assemblers; procedures (subroutines) and data segments,
linkages and subroutine calling conventions, loaders; practical use of an
assembly language for computer implementation of illustrative examples.
Course Goals
0 Knowledge of the basic structure of microcomputers - registers, mem-
ory, addressing I/O devices, etc.
1 Knowledge of most non-privileged hardware instructions for the Ar-
chitecture being studied.
2 Ability to write small programs in assembly language
3 Knowledge of computer representations of data, and how to do simple
arithmetic in binary & hexadecimal, including conversions
4 Being able to implementing a moderately complicated algorithm in
assembler, with emphasis on efficiency.
5 Knowledge of procedure calling conventions and interfacing with high-
level languages.
Optional Text: Kip Irvine, Assembly Language for the IBM PC, Prentice
Hall, 4th or 5th edition
1
Additional References: Intel and DOS API documentation as presented
in Intel publications and online at www.x86.org; lecture notes (to be sup-
plied as we go).
Prerequisites by Topic. Working knowledge of some programming lan-
guage (102/103: C/C++); Minimal programming experience
Major Topics Covered in the Course:
1 Low-level and high-level languages; why learn assembler?
2 How does one study a new computer: the CPU, memory, addressing
modes, operation modes.
3 History of the Intel family of microprocessors.
4-5 Registers; simple arithmetic instructions; byte order; Arithmetic and
logical operations.
6 Implementing longer integer type support; carry and overflow.
7 Shifts, multiplication and division.
8 Memory layout.
9 Direct video memory access; discussion of the first project.
10 Assembler syntax; how to use the tools.
11-13 Conditional & unconditional jumps; loops; emulating high-level lan-
guage constructions; Stack; call and return; procedures
14-15 String instructions: effcient memory-to-memory operations.
16 Interrupts overview: interrupt table; how do interrupts work; classif-
cation.
17 Summary of the most important interrupts.
18-20 DOS interrupt; File I/O functions; file-copy program; discussion of
the second project
21 Interrupt handlers; keyboard drivers; timer-driven processes; viruses
and virus-protection software.
2
22 Debug interrupts; how do debuggers and profilers work.
23-24 (Optional).interfacing with high level languages; Protected mode fun-
damentals
Grading The grading is based on two projects, midterm project is 49%
and the final is 51%. Please note that the projects are individual, submitting
projects that are similar to submissions of others and/or are essentially
downloads from the Web would result in a fail.
Office Hours My hours this term for CSc 210 will be 3:45 ¶Ł 4:45 on
Mondays.
Zoom links:
11am https://ccny.zoom.us/j/8 ...
Similar to Instruction addressing and execution (20)
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
4. Recalling main concepts
• Segment: special areas defined to contain CODE,
DATA and STACK
• Paragraph boundary: location evenly divisible by 16
or 10H
6. Types of programs
• *.COM and *.EXE files
• *.COM: consists of one segment containing code, data
and stack
• *.exe: separate code, data and stack segments
7. Loading *.exe program
• Access *.exe from disk
• 256-byte Program Segment Prefix (PSP) on a
paragraph boundary
• Store the program immediately following the PSP
• Load address of PSP in the DS & ES
• Load code segment in CS, set IP
• Load address of the stack to SS, set SP
• Transfer control to the program for execution
8. .model small,
.stack
.data
message db "Hello everybody! I am learning assembly
language!","$"
.code
main proc
mov ax, seg message
mov ds,ax
mov ah,09
lea dx,message
int 21h
mov ax,4c00h
int 21h
main endp
end main
Assembly
directive to
define
memory
model to use
in the
program
9. Real and Protected mode
Real Mode
16-bit
Protected
Mode
32-bit Protected
Mode
Segment base
address
20-bit
24-bit,
from
descriptor
32-bit,
from descriptor
Segment size
(limit)
16-bit, 64K
bytes (fixed)
16-bit, 1-64K
bytes
20-bit, 1-1M bytes or
4K-4G bytes
Segment
protection
no yes yes
Segment
register
segment base
address / 16
selector selector
10. Protected mode
-Is a type of memory utilization, available on
Intel 80286 and later
-Support:
protection: each program is protected
from interference from other programs.
extended memory : Enables a single
program to access more than 640K of memory.
virtual memory : Expands the address
space to over 1GB.
Multitasking:
11. Booting process
What is booting?
• The process of starting or restarting a computer
cold boot
Process of turning on
a computer after it
has been powered off
completely
warm boot
Process of
restarting a
computer that is
already powered on
Also called a warm
start
12. Booting process
How does a personal computer boot up?
processor
BIOS
hard disk
CD-ROM drive
(RAM) memory
modules
CMOS
floppy disk drive
Step 6
expansion cards
13. BIOS Boot process
BIOS routineFFFF0H
Interrupt
Vector
Table
BIOS Data
Areas
Access
the bootstrap
loader
Check ports
Initialize
devices
14. .model small,
.stack
.data
message db "Hello everybody! I am learning assembly
language!","$"
.code
main proc
mov ax, seg message
mov ds,ax
mov ah,09
lea dx,message
int 21h
mov ax,4c00h
int 21h
main endp
end main
Assembly
directive to
define stack
to use in the
program
15. STACK
• The word is from data structure
• Last In, First Out (LIFO) mechanism
• STACK in OS has three main functions:
• Contains return address
• Data
• Content of present registers
16. STACK
• PUSH
• Decrease SP by 2 and store a value there
• POP
• Return a value from stack and increase SP by 2
17. Lesson plan
• Review loading an *.exe file
• Concept of execution of instructions
• Practice:
• Execution of instructions
18. Access *.exe from disk
256-byte Program Segment Prefix (PSP)
on a paragraph boundary
Store the program immediately
following the PSP
Load address of PSP in the DS & ES
Load code segment in CS, set IP
Load address of the stack to SS, set SP
Transfer control to the program for
execution
Loading *.exe file
19. Loading *.exe file
• The sequence of segments (code, data, and stack)
is given
• SS: contains the address of the beginning of the
stack
• CS: contains the address of the beginning of the
code segment
• DS: contains the address of the beginning of the
data segment
• SP: contains the size of stack
24. Instruction Execution and Addressing
• Executing an instruction include
• Fetch the next instruction, put to a queue (QUEUE: FIFO
vs. STACK LIFO)
• Decode the instruction
• Execute the instruction
29. Practice
• Viewing memory location using DEBUG
At DOS prompt, type: DEBUG
• Checking Serial and parallel port:
D 40:00
• Checking system equipment
D 40:10
30. Practice
• Viewing memory location using DEBUG
At DOS prompt, type: DEBUG
• Checking Serial and parallel port:
D 40:00
• Checking system equipment
D 40:10
31. Practice
• Viewing memory location using DEBUG
At DOS prompt, type: DEBUG
• Checking Serial and parallel port:
D 40:00
• Checking system equipment
22 C8 C822
reverse
Number of parallel printer ports=11(binary)=3 (15,14)
Number of serial ports=100(binary)=4 (11-9)
Number of diskette devices=00(binary)=1 (7,6)
Initial video mode =10 (5,4) (80x25 color)
Coprocessor present: 1 (1)
Diskette drive is present: 0 (0)
32. Practice (cont.)
• Checking the keyboard status
• D 40:17 (With Numlock and Caplock)
• Checking video status
• D 40:49
• D 40:84
COM is small, (small utility program or can be a resident program). We will focus on EXE program in this course.
There are several types of memory: Memory model TINY , SMALL , COMPACT , MEDIUM , LARGE , HUGE , or FLAT . Determines size of code and data pointers. This field is required. The model does, however, control segment defaults and determine whether data and code are near or far by default, as indicated in the following table. The model does not control the type of instructions that we can use.
Interest part: father of Ctrl-Alt-Del: david Bradley, long time employee of IBM, who also has a Ph.D in EE from Purdue in Indiana
How does a personal computer boot up? Step 1: The power supply sends a signal to components in the system unit. Step 2: The processor looks for the BIOS (Basic Input/Output system) Step 3: The BIOS performs the POST, which checks components such as the mouse, keyboard connectors, and expansion cards. (Power On Self Test) Step 4: The results of the POST are compared with data in the CMOS chip. (battery power) Step 5: The BIOS looks for the system files in drive A (floppy disk drive) and then drive C (hard disk). Step 6: The boot program loads the kernel of the operating system into RAM from storage (hard disk). The operating system in memory takes control of the computer. Step 7: The operating system loads configuration information and displays the desktop on the screen. The operating system executes programs in the StartUp folder Registry - Several files that contain the system configuration information Registry is constantly accessed during the computer's operation StartUp folder - Contains a list of programs that open automatically when you boot the computer
Internally, processor enters the reset state, clear all memory location to zero, perform a parity check of a memory, set CS to FFFFH, IP to zero. The first address to execute is FFFF0H (entry point of BIOS in ROM) Identify & Initialized devices. Established the tables: IVT (Interrupt Vector Table) and BIOS data area (status of attached devices) -Determine if the disk containing the system file is available.