Demonstration of a micro controller system, Computer Engineering

Assignment Help:

Within the Microelectronics centre we support the following microcontrollers 68HC11, 80C51 and the PIC16C5xx series; we have a set of software tools and emulators to help debug high and low level software /hardware designs. Within the demonstration we shall see a elementary program to chase lights on a parallel port (The knight rider car). The code is available in machine code and C as shown later. You will see the use of the compiler and assembler (IAR program) on a 68HC11 target machine.
         
C code Program
 
void main()
 
{
/* Author Mr James Mc Carren 
      Date :  1 st March 1996
   Fuctions used : delay
   Purpose : To Chase lights on port A 
   Target : 68HC11 microcontroller
   Version : 1.0
   Modifications : None 
*/
  unsigned char *Paddr,*Padr;
  unsigned char data;
  int x,i,del;
/* Declare the port a pointers */
 
  Padr = (unsigned char *)0x0;
  Paddr = (unsigned char *)0x1;
/* Port A all outputs */
 
  *Paddr =0xff;
  for(;;)
  {
    data = 0x1;
    for (i=0;i<=7;i++) /* Shift  8 times */
    {
    for (del = 0;del<=0x3fff;del++); /* Very long delay */
    *Padr = data<    }
  }  
}


Related Discussions:- Demonstration of a micro controller system

What is public, * Public, protected and private are 3 access specifier in C...

* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb

Multi-layer network architectures, Multi-Layer Network Architectures: ...

Multi-Layer Network Architectures: As we considered we saw in the previous lecture that perceptrons have limited scope in the type of concepts that they can learn - but they c

Explain difference between security and protection, Explain difference betw...

Explain difference between Security and Protection? Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a

Collision free network, Hello Sir/Mam, Actually i am trying to implement th...

Hello Sir/Mam, Actually i am trying to implement the concept of MAC layer protocols in NS2..... But unfortunately i am not able to do that.... and not even able to get the code fo

PADOVAN STRING, write a program that counts the number of occurrences of th...

write a program that counts the number of occurrences of the string in the n-th Padovan string P(n)

Data structure in which an element is added, A data structure in which an e...

A data structure in which an element is added and detached only from one end, is known as Stack

What is function overloading, a. Describe function declaration, function de...

a. Describe function declaration, function definition and function cell using a suitable example. Explain the function prototype? b. What is function overloading? When do we use

Define polling, Define Polling. A Polling process is used to recognize...

Define Polling. A Polling process is used to recognize the highest priority source by software means. In this process there is one common branch address for all interrupts.

Find the simplified function, Q. F' (A, B, C, D) = (A + B + D')(A + C' + D'...

Q. F' (A, B, C, D) = (A + B + D')(A + C' + D')(A + B' + C')        D' (A, B, C, D) = (A + B' + C + D')(A' + C' + D')(A' + B + D)        Find the simplified function F and imple

Explain control word, What is control word? A control word is a word wh...

What is control word? A control word is a word whose individual bits show the various control signals.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd