SlideShare a Scribd company logo
Project 2 MARIE Start code at bottom of document1.
Introduction
The objective of this project is to reinforce your understanding
of computer organization, instruction set architectures, and
assembly language. You will accomplish this by writing,
analyzing, and debugging an assembly language program for the
MARIE processor.
You must: (i) design and write an assembly language program
for the MARIE processor that inputs, transforms, stores, and
then outputs a sequence of characters from the set A-Z; (ii)
debug and test your program by simulating it using the MARIE
simulator; (iii) document your work in a short report; and (iv)
submit the report file (*.pdf), assembler source file (*.mas),
assembler listing file (*.lst), and assembler executable file
(*.mex).
2. The MARIE Simulator
The MARIE simulator is provided as a zip file containing Java
archives (*.jar) files, documentation, and example source files.
Unzip the file to a directory for use. Do the following to
become familiar with the MARIE simulator
3. Design Specification
You are to design, write, test, and debug a MARIE assembly
language program that inputs a sequence of characters from the
set A-Z (capital letters only), stores each character in memory
after it is transformed by the trivial ROT13 cipher, and then,
after character input completes, outputs the transformed
characters.
A template source code file (Project-2_Start.mas) is provided
with this assignment. Edit this file to create a program that
meets the program specifications. Note that the template
includes instructions to initialize some working values that your
program can use. The template also defines memory locations.
You may add data memory locations. The program can be
designed without additional data locations, but it may be
necessary to do so for your design.
For full credit, your solution must perform the functions and
satisfy the requirements specified below.
a) The first instruction of the program must be placed at
location (address) 0x100 (100 hexadecimal) in MARIE’s
memory. This is accomplished by following the program
template that is provided.
b) The constant data values (One, ChA, ChZ, ChPer, Val13,
Start) should not be changed by the program. The program can
load from these memory locations, but should not store to them.
c) Transformed input characters must be stored in successive
memory locations beginning at location 0x200 (200
hexadecimal) as indicated in the program template. The program
should store all transformed input characters before any
characters are output.
d) The program should always initialize the values for Ptr in the
working data memory and not rely on the values for these
locations that are defined in the assembly source file. This
initialization is done by the provided template file.
e) The program should work for any inputs ‘A’ through ‘Z’ and
‘.’ (a period terminates input). In the interest of keeping the
program simple, the program does not need to validate inputs.
f) When transformed characters are stored and when
transformed characters are output, the program must use a loop
and indirect addressing to access the values in the array of
words. Note that variable Ptr is initialized in the template code
and should be used in the loop. You may also define a Count
variable to count the number of characters, but there are also
correct designs that do not require a Count variable.
g) The program should operate as follows. Input Phase:
1. A character (A-Z or ‘.’) is input.
MarieSim allows the user to input a single character that is read
into the accumulator (AC) with an Input instruction.
2. If character ‘.’ (period) is input, then the input phase ends
and the output phase begins (step 5 below). (The period may be
stored in memory to mark the
end of the characters or the characters can be counted to
determine how many transformed characters to output during
the output phase.)
3. The character that is input is transformed using the trivial
ROT13 cipher (see Section 5.1).
4. The transformed character is stored in the next location in the
block of memory beginning at location Start. (Variable Ptr
must be updated and indirect memory addressing must be used.)
Output Phase:
5. All transformed characters are output, beginning with the
first character that was transformed. The ‘.’ character is not to
be output. (This will require a loop using variable Ptr and
indirect addressing. Note that the number of characters to
output will vary and the program must know when to stop the
output by relying on a ‘.’ or other special character in memory,
counting the number of input characters during the input phase,
or some other method.)
6. After all characters are output, the program halts by
executing the HALT
instruction.4. Testing
Test and debug the program using the MARIE simulator
(MarieSim.jar). Debug the program using the “Step” and
“Breakpoint” features of the simulator. You must test your
program with the following two test cases.
Test 1: Input the eight-character sequence “VIRGINIA”
followed by a ‘.’ to terminate the input. Note that you need to
input one character at a time into MarieSim’s ASCII Input area,
with each character followed by pressing the “Enter” key. The
ROT13 value of each character (“IVETVAVN”) should be
displayed after the ‘.’ character is input.
Test 2: Reload the program in MarieSim, without reassembling,
input the four-character sequence “GRPU” followed by a ‘.’ To
terminate the input. Note the output.
When you create your source file within MarieSim (using the
File > Edit menu pick), use file name
lastname_firstname_P2.mas, where “lastname” is your last or
family name and “firstname” is your first or given name. You
can assemble your source file in the editor program. The
assembly process creates a listing file
(lastname_firstname_P2.lst) and an executable file
(lastname_firstname_P2.mex). Load the executables file into the
simulator for execution.
5. Design Notes5.1. he ROT13 Cipher
The ROT13 cipher (see http://en.wikipedia.org/wiki/ROT13) is
an old, but trivial cipher that simply rotates the characters by 13
positions. For example, ‘A’ is transformed to ‘N’ and ‘Z’ is
transformed to ‘M’.
The Project-2_Start.mas source file includes a ROT13
subroutine that almost performs this transformation. You need
to fix one bug in the subroutine.
/ *****
/ This is starting code for Project 2 for ECE 5484, Fall 2016
/ Remove this header and identify your project name and your
name.
/ *****
ORG
100
/ Start the program at location 100 hexadecimal
/ -----
/ Input characters, transform, and store in memory until '.' is
input
/ -----
Load
Start
/ Initialize character pointer to start of block
Store
Ptr
/>>>>> Add code to accomplish the input and output phases.
<<<<<
Input
InVal
/>>>>> Here's an example of how subroutine ROT13 is called.
<<<<<
/>>>>> We'll just transform 'A' in this example then halt.
<<<<<
Load
ChA
/ Put 'A' in AC
Store
InVal
/ Store value to be transformed into InVal
Jns
ROT13
/ Jump to the ROT13 subroutine
/ Upon return, the transformed character is in AC
Halt
/ -----
/ Rotate-13 subroutine: Apply ROT13 to input character in
location InVal and return in AC
/ -----
/>>>>> WARNING: This subroutine *almost* works. You
need to fix a bug.
ROT13,
HEX
0
Load
InVal
/ Get character
Add
Val13
/ Add 13
Store
Hold
/ Save it
Subt
ChZ
/ Check if modulo adjust is needed (past 'Z')
Skipcond
800
/ No adjust needed if past 'Z'
Jump
NoAdj
Add
ChA
/ Add 'A' back to difference to perform modulo
Jump
Done
/ Result is in AC
NoAdj,
Load
Hold
/ No adjust needed, get result
Done,
JumpI
ROT13
/ Return with result in AC
/ -----
/ Constants (the program should not write to these locations)
/ -----
ChA,
HEX
0041
/ Constant value 'A' for modulo adjust in subroutine
ChZ,
HEX
005A
/ Constant value 'Z' for modulo check in subroutine
ChPe,
HEX
2E
/ Constant period character that marks end of input
Val13,
DEC
13
/ Constant rotate value of 13 for subroutine
One,
HEX
1
/ Constant value 1
Start,
HEX
200
/ Constant address for start of character block
/ -----
/ Data area (these locations are for reading and writing)
/ -----
InVal,
HEX
0
/ Reserved for subroutine input value
Hold,
HEX
0
/ Reserved for temporary variable for subroutine
Ptr,
HEX
0
/ Reserved for character pointer

More Related Content

What's hot

What's hot (20)

Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
6 Switch Fabric
6 Switch Fabric6 Switch Fabric
6 Switch Fabric
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Gsm, gprs, edge presentation
Gsm, gprs, edge presentationGsm, gprs, edge presentation
Gsm, gprs, edge presentation
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Software Contract and Liability
Software Contract and LiabilitySoftware Contract and Liability
Software Contract and Liability
 
Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
ITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdfITB-I Unit-1 PPT.pdf
ITB-I Unit-1 PPT.pdf
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
Computer Information Systems
Computer Information SystemsComputer Information Systems
Computer Information Systems
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Wireless network (cellular network architecture and http.)
Wireless network (cellular network architecture and http.)Wireless network (cellular network architecture and http.)
Wireless network (cellular network architecture and http.)
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 

Similar to Project 2 MARIE Start code at bottom of document1. IntroductionT.docx

CS 23001 Computer Science II Data Structures & AbstractionPro.docx
CS 23001 Computer Science II Data Structures & AbstractionPro.docxCS 23001 Computer Science II Data Structures & AbstractionPro.docx
CS 23001 Computer Science II Data Structures & AbstractionPro.docx
faithxdunce63732
 
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
RSathyaPriyaCSEKIOT
 
data.txtInternational Business Management l2 Cons.docx
data.txtInternational Business Management       l2        Cons.docxdata.txtInternational Business Management       l2        Cons.docx
data.txtInternational Business Management l2 Cons.docx
theodorelove43763
 
The ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdfThe ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdf
federaleyecare
 

Similar to Project 2 MARIE Start code at bottom of document1. IntroductionT.docx (20)

UNIT-II CP DOC.docx
UNIT-II CP DOC.docxUNIT-II CP DOC.docx
UNIT-II CP DOC.docx
 
Mp lab manual
Mp lab manualMp lab manual
Mp lab manual
 
Complete C programming Language Course
Complete C programming Language CourseComplete C programming Language Course
Complete C programming Language Course
 
C programming language tutorial
C programming language tutorial C programming language tutorial
C programming language tutorial
 
keyword
keywordkeyword
keyword
 
keyword
keywordkeyword
keyword
 
Microprocessor chapter 9 - assembly language programming
Microprocessor  chapter 9 - assembly language programmingMicroprocessor  chapter 9 - assembly language programming
Microprocessor chapter 9 - assembly language programming
 
C notes.pdf
C notes.pdfC notes.pdf
C notes.pdf
 
CS 23001 Computer Science II Data Structures & AbstractionPro.docx
CS 23001 Computer Science II Data Structures & AbstractionPro.docxCS 23001 Computer Science II Data Structures & AbstractionPro.docx
CS 23001 Computer Science II Data Structures & AbstractionPro.docx
 
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
UNIT-1 notes(Data Types – Variables – Operations – Expressions and Statements...
 
Intro To C++ - Class 3 - Sample Program
Intro To C++ - Class 3 - Sample ProgramIntro To C++ - Class 3 - Sample Program
Intro To C++ - Class 3 - Sample Program
 
Intro To C++ - Class 03 - An Introduction To C++ Programming, Part II
Intro To C++ - Class 03 - An Introduction To C++ Programming, Part IIIntro To C++ - Class 03 - An Introduction To C++ Programming, Part II
Intro To C++ - Class 03 - An Introduction To C++ Programming, Part II
 
C Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpointC Programming Language Tutorial for beginners - JavaTpoint
C Programming Language Tutorial for beginners - JavaTpoint
 
data.txtInternational Business Management l2 Cons.docx
data.txtInternational Business Management       l2        Cons.docxdata.txtInternational Business Management       l2        Cons.docx
data.txtInternational Business Management l2 Cons.docx
 
C programming
C programmingC programming
C programming
 
C++ programming language basic to advance level
C++ programming language basic to advance levelC++ programming language basic to advance level
C++ programming language basic to advance level
 
CP Handout#2
CP Handout#2CP Handout#2
CP Handout#2
 
The ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdfThe ProblemUsing C programming language write a program that simul.pdf
The ProblemUsing C programming language write a program that simul.pdf
 
Complete c programming presentation
Complete c programming presentationComplete c programming presentation
Complete c programming presentation
 
Embedded C programming session10
Embedded C programming  session10Embedded C programming  session10
Embedded C programming session10
 

More from briancrawford30935

You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
briancrawford30935
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docx
briancrawford30935
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docx
briancrawford30935
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docx
briancrawford30935
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docx
briancrawford30935
 
You have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docxYou have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docx
briancrawford30935
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
briancrawford30935
 

More from briancrawford30935 (20)

You have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docxYou have collected the following documents (unstructured) and pl.docx
You have collected the following documents (unstructured) and pl.docx
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
 
You have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docxYou have chosen to join WHO. They are particularly interested in.docx
You have chosen to join WHO. They are particularly interested in.docx
 
You have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docxYou have been tasked to present at a town hall meeting in your local.docx
You have been tasked to present at a town hall meeting in your local.docx
 
You have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docxYou have been tasked as the health care administrator of a major hos.docx
You have been tasked as the health care administrator of a major hos.docx
 
You have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docxYou have been tasked to devise a program to address the needs of.docx
You have been tasked to devise a program to address the needs of.docx
 
You have been successful in your application for the position be.docx
You have been successful in your application for the position be.docxYou have been successful in your application for the position be.docx
You have been successful in your application for the position be.docx
 
You have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docxYou have been hired as a project management consultant by compan.docx
You have been hired as a project management consultant by compan.docx
 
You have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docxYou have been hired to manage a particular aspect of the new ad.docx
You have been hired to manage a particular aspect of the new ad.docx
 
You have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docxYou have been hired by Red Didgeridoo Technologies. They know th.docx
You have been hired by Red Didgeridoo Technologies. They know th.docx
 
You have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docxYou have been hired by TMI to design an application using shell scri.docx
You have been hired by TMI to design an application using shell scri.docx
 
You have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docxYou have been hired as the CSO (Chief Security Officer) for an org.docx
You have been hired as the CSO (Chief Security Officer) for an org.docx
 
You have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docxYou have been hired to evaluate the volcanic hazards associated .docx
You have been hired to evaluate the volcanic hazards associated .docx
 
You have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docxYou have been hired as an assistant to the public health officer for.docx
You have been hired as an assistant to the public health officer for.docx
 
You have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docxYou have been engaged to develop a special calculator program. T.docx
You have been engaged to develop a special calculator program. T.docx
 
You have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docxYou have now delivered the project to your customer ahead of schedul.docx
You have now delivered the project to your customer ahead of schedul.docx
 
You have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docxYou have now delivered the project to your customer. The project was.docx
You have now delivered the project to your customer. The project was.docx
 
You have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docxYou have now experienced the work of various scholars, artists and m.docx
You have now experienced the work of various scholars, artists and m.docx
 
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docxYou have learned that Mr. Moore does not drink alcohol in the mornin.docx
You have learned that Mr. Moore does not drink alcohol in the mornin.docx
 
You have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docxYou have been hired by a large hospitality firm (e.g., Marriot.docx
You have been hired by a large hospitality firm (e.g., Marriot.docx
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Project 2 MARIE Start code at bottom of document1. IntroductionT.docx

  • 1. Project 2 MARIE Start code at bottom of document1. Introduction The objective of this project is to reinforce your understanding of computer organization, instruction set architectures, and assembly language. You will accomplish this by writing, analyzing, and debugging an assembly language program for the MARIE processor. You must: (i) design and write an assembly language program for the MARIE processor that inputs, transforms, stores, and then outputs a sequence of characters from the set A-Z; (ii) debug and test your program by simulating it using the MARIE simulator; (iii) document your work in a short report; and (iv) submit the report file (*.pdf), assembler source file (*.mas), assembler listing file (*.lst), and assembler executable file (*.mex). 2. The MARIE Simulator The MARIE simulator is provided as a zip file containing Java archives (*.jar) files, documentation, and example source files. Unzip the file to a directory for use. Do the following to become familiar with the MARIE simulator 3. Design Specification You are to design, write, test, and debug a MARIE assembly language program that inputs a sequence of characters from the set A-Z (capital letters only), stores each character in memory after it is transformed by the trivial ROT13 cipher, and then, after character input completes, outputs the transformed characters. A template source code file (Project-2_Start.mas) is provided with this assignment. Edit this file to create a program that meets the program specifications. Note that the template includes instructions to initialize some working values that your program can use. The template also defines memory locations. You may add data memory locations. The program can be
  • 2. designed without additional data locations, but it may be necessary to do so for your design. For full credit, your solution must perform the functions and satisfy the requirements specified below. a) The first instruction of the program must be placed at location (address) 0x100 (100 hexadecimal) in MARIE’s memory. This is accomplished by following the program template that is provided. b) The constant data values (One, ChA, ChZ, ChPer, Val13, Start) should not be changed by the program. The program can load from these memory locations, but should not store to them. c) Transformed input characters must be stored in successive memory locations beginning at location 0x200 (200 hexadecimal) as indicated in the program template. The program should store all transformed input characters before any characters are output. d) The program should always initialize the values for Ptr in the working data memory and not rely on the values for these locations that are defined in the assembly source file. This initialization is done by the provided template file. e) The program should work for any inputs ‘A’ through ‘Z’ and ‘.’ (a period terminates input). In the interest of keeping the program simple, the program does not need to validate inputs. f) When transformed characters are stored and when transformed characters are output, the program must use a loop and indirect addressing to access the values in the array of words. Note that variable Ptr is initialized in the template code and should be used in the loop. You may also define a Count variable to count the number of characters, but there are also correct designs that do not require a Count variable.
  • 3. g) The program should operate as follows. Input Phase: 1. A character (A-Z or ‘.’) is input. MarieSim allows the user to input a single character that is read into the accumulator (AC) with an Input instruction. 2. If character ‘.’ (period) is input, then the input phase ends and the output phase begins (step 5 below). (The period may be stored in memory to mark the end of the characters or the characters can be counted to determine how many transformed characters to output during the output phase.) 3. The character that is input is transformed using the trivial ROT13 cipher (see Section 5.1). 4. The transformed character is stored in the next location in the block of memory beginning at location Start. (Variable Ptr must be updated and indirect memory addressing must be used.) Output Phase: 5. All transformed characters are output, beginning with the first character that was transformed. The ‘.’ character is not to be output. (This will require a loop using variable Ptr and indirect addressing. Note that the number of characters to output will vary and the program must know when to stop the output by relying on a ‘.’ or other special character in memory, counting the number of input characters during the input phase, or some other method.) 6. After all characters are output, the program halts by executing the HALT instruction.4. Testing Test and debug the program using the MARIE simulator (MarieSim.jar). Debug the program using the “Step” and “Breakpoint” features of the simulator. You must test your
  • 4. program with the following two test cases. Test 1: Input the eight-character sequence “VIRGINIA” followed by a ‘.’ to terminate the input. Note that you need to input one character at a time into MarieSim’s ASCII Input area, with each character followed by pressing the “Enter” key. The ROT13 value of each character (“IVETVAVN”) should be displayed after the ‘.’ character is input. Test 2: Reload the program in MarieSim, without reassembling, input the four-character sequence “GRPU” followed by a ‘.’ To terminate the input. Note the output. When you create your source file within MarieSim (using the File > Edit menu pick), use file name lastname_firstname_P2.mas, where “lastname” is your last or family name and “firstname” is your first or given name. You can assemble your source file in the editor program. The assembly process creates a listing file (lastname_firstname_P2.lst) and an executable file (lastname_firstname_P2.mex). Load the executables file into the simulator for execution. 5. Design Notes5.1. he ROT13 Cipher The ROT13 cipher (see http://en.wikipedia.org/wiki/ROT13) is an old, but trivial cipher that simply rotates the characters by 13 positions. For example, ‘A’ is transformed to ‘N’ and ‘Z’ is transformed to ‘M’. The Project-2_Start.mas source file includes a ROT13 subroutine that almost performs this transformation. You need to fix one bug in the subroutine. / ***** / This is starting code for Project 2 for ECE 5484, Fall 2016 / Remove this header and identify your project name and your name.
  • 5. / ***** ORG 100 / Start the program at location 100 hexadecimal / ----- / Input characters, transform, and store in memory until '.' is input / ----- Load Start / Initialize character pointer to start of block Store Ptr />>>>> Add code to accomplish the input and output phases. <<<<< Input InVal
  • 6. />>>>> Here's an example of how subroutine ROT13 is called. <<<<< />>>>> We'll just transform 'A' in this example then halt. <<<<< Load ChA / Put 'A' in AC Store InVal / Store value to be transformed into InVal Jns ROT13 / Jump to the ROT13 subroutine / Upon return, the transformed character is in AC
  • 7. Halt / ----- / Rotate-13 subroutine: Apply ROT13 to input character in location InVal and return in AC / ----- />>>>> WARNING: This subroutine *almost* works. You need to fix a bug. ROT13, HEX 0 Load InVal / Get character Add Val13 / Add 13 Store Hold
  • 8. / Save it Subt ChZ / Check if modulo adjust is needed (past 'Z') Skipcond 800 / No adjust needed if past 'Z' Jump NoAdj Add ChA / Add 'A' back to difference to perform modulo Jump Done / Result is in AC NoAdj, Load
  • 9. Hold / No adjust needed, get result Done, JumpI ROT13 / Return with result in AC / ----- / Constants (the program should not write to these locations) / ----- ChA, HEX 0041 / Constant value 'A' for modulo adjust in subroutine ChZ, HEX 005A / Constant value 'Z' for modulo check in subroutine ChPe, HEX 2E
  • 10. / Constant period character that marks end of input Val13, DEC 13 / Constant rotate value of 13 for subroutine One, HEX 1 / Constant value 1 Start, HEX 200 / Constant address for start of character block / ----- / Data area (these locations are for reading and writing) / ----- InVal, HEX 0 / Reserved for subroutine input value
  • 11. Hold, HEX 0 / Reserved for temporary variable for subroutine Ptr, HEX 0 / Reserved for character pointer