Assembly language - computer architecture, Computer Engineering

Assignment Help:

Assembly language:

An assembly program has a series of instructions--mnemonics that relate to a stream of executable instructions, when translated by an assembler that may be loaded into memory and then executed.

For an example, an x86/IA-32 processor may execute the following binary instruction as expressed in machine language (see x86 assembly language):

  • Binary: 10110000 01100001 (Hexadecimal: B0 61)

The equivalent assembly language representation is simpler to remember (example in the Intel synta x, more mnemonic):

  • MOV AL, 61h

Means of this instruction:

  • Move the value 61h (or 97 decimal; the h-suffix means hexadecimal; into the processor register named "AL".

The mnemonic "mov" represents the opcode 1011 which moves the value in the second operand into the register specified by the first operand. The mnemonic was selected by the instruction set designer to abbreviate "move", by making it easier for the programmer to remember.  A comma-separated list of parameters or arguments follows the opcode; it is a typical assembly language statement.

In practice many programmers drop the word mnemonic and which is technically incorrect, call "mov" an op code. When they do this they are referring to the underlying binary code which it represents. To put it as a way, a mnemonic such as "mov" is not an op code, but it symbolizes an op code, one can refer to "the op code mov" for instance when one intends to refer to the binary op code it symbolizes rather than to the symbol -- the mnemonic -- itself. As few modern programmers have required being attentive of actually what binary patterns are the op codes for specific instructions, the distinction has in practice become a bit blurred among programmers but not among processor designers.

An assembler transforms assembly language into machine language, and the reverse by disassemble. There is typically a one-to-one correspondence between assembly statements unlike in high-level languages, and the machine language instructions. But, in some cases, an assembler can provide pseudo instructions which expand into various machine language instructions to provide commonly required functionality. For instance, for a machine that lacks a "branch if greater or equal" instruction, an assembler can be used a pseudo instruction that expands to the machine's "branch if zero (on the result of the set instruction)"and "set if less than" and. All the full-featured assemblers also provide a rich macro language mostly (discussed below) which is used by programmers and vendors to generate more difficult code and data sequences.

Each processor architecture and computer architecture has its own machine language. On this level, each instruction is enough simple to be executed by using a relatively small number of electronic circuits. Computers differ by the type and number of operations they support. For instance, a new 64-bit machine would have different circuitry from a 32-bit machine. They can also have different sizes and numbers of registers and different representations of data types in storage. Whereas most general-purpose computers are able to carry out really the same functionality, the ways they do so differ; the equivalent assembly languages reflect these differences.

Multiple sets of assembly-language syntax or mnemonics may exist for a single instruction set, typically instantiated in different assembler programs. In these types of cases, the most popular one is usually that supplied by the manufacturer and used in its documentation.


Related Discussions:- Assembly language - computer architecture

Vector reduction instructions-vector processing, Vector reduction Instructi...

Vector reduction Instructions : When operations on vector are being deduced to scalar items as the result, then these are the vector reduction instructions. These instructions are

Describe the role of software developers, Describe the role of Software dev...

Describe the role of Software developers Software developers have wide experience of tackling such issues. Students who develop software project spending days and nights strug

Explain optimizing transformations, Explain optimizing transformations? ...

Explain optimizing transformations? Optimizing transformations: It is a rule for rewriting a segment of a program to enhance its execution efficiency without influencing i

Dma controllers - computer architecture, DMA controllers in computer system...

DMA controllers in computer system:   DMA Controller   Part of the I/O device interface   DMA Channels   Performs functions that in general would be performed by t

Applications of generic framework for electronic commerce, How are the appl...

How are the applications of generic framework for electronic commerce performed? To perform applications, this is essential to have Supporting Information and Organizational In

Explain hardwired control organization, Q. Explain Hardwired control organi...

Q. Explain Hardwired control organization? In the hardwired organization control unit is designed as a combinational circuit. The control unit is applied by gates, flip-flops,

Cache-only memory access model (coma), Cache-Only Memory Access Model (COMA...

Cache-Only Memory Access Model (COMA) As we have discussed previous, shared memory multiprocessor systems may use cache memories with each processor for deducting the execution

Security protocols used for e-commerce applications, Explain dissimilar sec...

Explain dissimilar security protocols used for e-commerce applications.   The e-commerce systems of today are composed of a number of components including: a commerce server, d

Incorporating javascript into a web page, As we already know, HTML (Hyperte...

As we already know, HTML (Hypertext Markup Language) is the language we use to create Web documents. Now we will read "Hello World!" As given below:

What are the largest UDP messages, What are the largest UDP messages that c...

What are the largest UDP messages that can fit into single Ethernet frame? UDP utilizes IP for delivery. As ICMP UDP packet is encapsulated in IP datagram. Therefore entire UDP

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd