Assembly language - computer architecture, Computer Engineering

Assignment Help:

Assembly language:

An assembly program has a series of instructions--mnemonics that relate to a stream of executable instructions, when translated by an assembler that may be loaded into memory and then executed.

For an example, an x86/IA-32 processor may execute the following binary instruction as expressed in machine language (see x86 assembly language):

  • Binary: 10110000 01100001 (Hexadecimal: B0 61)

The equivalent assembly language representation is simpler to remember (example in the Intel synta x, more mnemonic):

  • MOV AL, 61h

Means of this instruction:

  • Move the value 61h (or 97 decimal; the h-suffix means hexadecimal; into the processor register named "AL".

The mnemonic "mov" represents the opcode 1011 which moves the value in the second operand into the register specified by the first operand. The mnemonic was selected by the instruction set designer to abbreviate "move", by making it easier for the programmer to remember.  A comma-separated list of parameters or arguments follows the opcode; it is a typical assembly language statement.

In practice many programmers drop the word mnemonic and which is technically incorrect, call "mov" an op code. When they do this they are referring to the underlying binary code which it represents. To put it as a way, a mnemonic such as "mov" is not an op code, but it symbolizes an op code, one can refer to "the op code mov" for instance when one intends to refer to the binary op code it symbolizes rather than to the symbol -- the mnemonic -- itself. As few modern programmers have required being attentive of actually what binary patterns are the op codes for specific instructions, the distinction has in practice become a bit blurred among programmers but not among processor designers.

An assembler transforms assembly language into machine language, and the reverse by disassemble. There is typically a one-to-one correspondence between assembly statements unlike in high-level languages, and the machine language instructions. But, in some cases, an assembler can provide pseudo instructions which expand into various machine language instructions to provide commonly required functionality. For instance, for a machine that lacks a "branch if greater or equal" instruction, an assembler can be used a pseudo instruction that expands to the machine's "branch if zero (on the result of the set instruction)"and "set if less than" and. All the full-featured assemblers also provide a rich macro language mostly (discussed below) which is used by programmers and vendors to generate more difficult code and data sequences.

Each processor architecture and computer architecture has its own machine language. On this level, each instruction is enough simple to be executed by using a relatively small number of electronic circuits. Computers differ by the type and number of operations they support. For instance, a new 64-bit machine would have different circuitry from a 32-bit machine. They can also have different sizes and numbers of registers and different representations of data types in storage. Whereas most general-purpose computers are able to carry out really the same functionality, the ways they do so differ; the equivalent assembly languages reflect these differences.

Multiple sets of assembly-language syntax or mnemonics may exist for a single instruction set, typically instantiated in different assembler programs. In these types of cases, the most popular one is usually that supplied by the manufacturer and used in its documentation.


Related Discussions:- Assembly language - computer architecture

Evaluation functions, Evaluation Functions: Evaluation functions calcu...

Evaluation Functions: Evaluation functions calculate approximately the score which can be prove of guaranteed if a particular world state is reached. Same like in chess, evalu

Multi tasking environment, Q. Explain about Multi tasking environment? ...

Q. Explain about Multi tasking environment? Multi tasking uses parallelism by: 1) Pipelining functional units are pipe line mutually 2) Simultaneously employing multiple

Asynchronous and Synchronous types of serial communication, Differentiate b...

Differentiate between asynchronous and synchronous types of serial communication. Serial data communication uses two fundamental types, asynchronous andsynchronous. With synchr

Differentiate between exception and validation testing, Differentiate betwe...

Differentiate between exception and validation testing. - Validation testing is done to test the software in conformance to the needs specified. It aims to demonstrate that the

Flynn’s classification, Flynn's Classification Flynn's classification i...

Flynn's Classification Flynn's classification is based on multiplicity of data streams and instruction streams observed by the CPU during program execution. Let Ds and Is  are

Select-options and parameters statement , The fields specified by select-op...

The fields specified by select-options and parameters statement cannot be grouped together in the selection screen. No, the fields specified by select-options and parameters s

Drawback of indirect addressing, Q. Drawback of indirect addressing? • ...

Q. Drawback of indirect addressing? • Drawback of this scheme is that it needs two memory references to fetch actual operand. First memory reference is to fetch the actual addr

Describe in brief about the internet, Describe in brief about The internet ...

Describe in brief about The internet Web sites need to be set up to maximise information supplied to customers and to ensure they are as self-contained and helpful as possible.

Function name or connective symbol, Function name or connective symbol: ...

Function name or connective symbol: Whether if we write op(x) to signify the symbol of the compound operator then predicate name and function name or connective symbol are the

Wireless Networking, Suppose you work in a network security company, and yo...

Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wire

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd