Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Part A:  Bitwise Logical and Shift Operations

Create a SPARC assembly language program that extracts a bit-field from the contents of register %l0. The position of the rightmost bit of the field is indicated in register %l1, and the number of bits in the field is indicated in register %l2. The extracted field should be put into register %l3, right-shifted so that field starts at bit 0; any bits outside of the extracted field should be set to 0. Structure your program so that it operates on 3 separate inputs, each with different input data, field positions, and field widths. Your TA will provide the inputs to work with. Do not hard code any bit masks; your program should create them using the appropriate bitwise operations. Optimize your program, eliminating nop instructions where possible. Do not use m4.

Use printf() to display in hexadecimal the contents of registers %l0, %l1, %l2 before each extraction, and %l3 afterwards. Also run your program in gdb, displaying the contents of registers %l0, %l1, %l2 before each extraction, and %l3 afterwards. Capture the gdb session using script. On a separate piece of paper, show the bit pattern for each hexadecimal number for the registers %l0 and %l3, circling the extracted field.

Part B:  Integer Multiplication using Add and Shift Operations

prepare a SPARC assembly language program that implements the following integer multiplication algorithm:

negative = multiplier >= 0 ? 0 : 1;
product = 0;
for (i = 0; i < 32; i++) {
    if (multiplier & 1)
        product += multiplicand;
    (product and multiplier registers combined as a unit) >> 1;
}
if (negative)
    product -= multiplicand;


Structure your program so that it shows 3 different multiplications: the first should multiply two positive numbers together, the second should multiply a positive number by a negative number, and the third should multiply two negative numbers together. Your TA will provide the input data to work with. Since we don’t yet know how to create subroutines, you can simply cut and paste the multiplication code to do each multiplication.

Use printf() to display in hexadecimal the contents of the product, multiplier and multiplicand registers before and after each multiplication. Optimize your program, eliminating nop instructions where possible. Do not use m4. Also run the program in gdb, displaying the contents of key registers as the program executes; you should show that the algorithm is working as expected. Capture the gdb session using script. On a separate piece of paper, show the bit pattern (binary number) for each hexadecimal number, and its decimal equivalent (in other words, show the binary and decimal values of the multiplier, multiplicand, and product).

Other Requirements
:

Make sure your code is properly formatted into columns, is readable and fully documented, and includes identifying information at the top of each file. You must comment each line of assembly code. Your code should also be well designed: make sure it is well organized, clear, and concise. Your TA will specify the inputs to use for the above two programs.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91804

Have any Question? 


Related Questions in Computer Engineering

Predict two 2 trends that are likely to impact public

Predict two (2) trends that are likely to impact public service in the future. Next, choose two (2) skills that public personnel managers may seek in response to these trends. Provide a rationale and support your positio ...

A company develops a new security product using the extreme

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, then add more code, then test, and continue this iteration. Every day, they test the ...

In ssltls protocol what kind of authentication is supported

In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server? A) Only server authentication (optional). B) Server authentication (mandatory) and client a ...

Assume the http client in the previous problem closes the

Assume the HTTP client in the previous problem closes the connection and, at the same time, acknowledges the bytes received in the response from the server. After receiving the FIN segment from the client, the server als ...

Course conclusionnbspnbspplease respond to the followingyou

"Course Conclusion"   Please respond to the following: You have just completed 10 weeks of an introduction to networking course. Imagine you have been asked to create a one-day training course that highlights the importa ...

Accountingjeffersoncountyairport handles several daily

ACCOUNTING JeffersonCountyAirport handles several daily commuter flights and many private flights. The county budget officer has compiled the following data regarding airport costs and activity over the past year. Requir ...

1 define and discuss software as a service saas

1. Define and discuss Software as a service (SaaS), Infrastructure as a service (IaaS), and storage as a service. 2. Describe the seven business models of software. 3. Discuss the services that make up/describe cloud com ...

1 the models in this chapter do not discuss availability

1. The models in this chapter do not discuss availability. What unstated assumptions about that service are they making? 2. A physician who is addicted to a pain-killing medicine can prescribe the medication for herself. ...

1 when the ivc for the ah protocol is computed why are

1. When the IVC for the AH protocol is computed, why are mutable fields set to 0 rather than omitted? 2. Section 11.4.4 discusses the use of SSL to provide confidentiality, authentication, and integrity security services ...

Design a serial 2s complementer with a shift register and a

Design a serial 2s complementer with a shift register and a flip-flop

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro