Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

For this first part of the project, yourMIPSsimprogram will accept a binary input fileinputfilenameand givenoperationdiswill output tooutputfilenamethe MIPS disassembly of the input file.

The disassembler output file will contain 4 columns of data with each column separated by onespacecharacter (' '):

  • The binary (e.g.,0's and1's) string representing the 32-bit data word at that location. For instructions you should split this into six groups of digits to represent different parts of the MIPS instruction word: a group of 6 bits, 4 groups of 5 bits, and a final group of 6 bits.
  • The address (in decimal) of that location.
  • The disassembled instructionopcode+other fields, or a signed decimal integer value, depending on whether the current location is after the BREAK instruction.
  • If you are displaying an instruction, the fourth column should contain the remaining part of the instruction, with each argument separated by a comma and then a space. (", ")

The instructions and instruction arguments should be in capital letters. Display all integer values in decimal. Immediate values should be proceeded by a "#" symbol. Be careful some instructions take signed immediate values while others take unsigned immediate values. You will have to make sure you properly display a signed or unsigned value depending on the context.

Because we will be using 'diff' to check your output versus ours, try to follow the exact output format.

Sample Data

Here is a sample program to test your disassembler with.

  • fibonacci_c: This contains the C source code for the test program. This is for your reference only.
  • fibonacci_mips: This is the compiled version of the C code in MIPS assembly. This is for your reference only.
  • fibonacci_bin:This is the assembled version of the above assembly code. It is the input to your program.
  • fibonacci_out:This is what your program should output given the above binary input file.
  • fibonacci_bin_txt: This is the txt version of the input binary file. You can use the following program to convert it to binary or use the binary file provided above.

Remember that we will also test your program with other data that you will not know of in advance. It is recommended that you construct your own sample input files with which to further test your disassembler. For your convenience we have provided a program to convert a text file of binary words into a binary file with which to test your disassembler.

  • txt2bin.cpp(click right to save) This program will convert a text file of binary words into a binary file. This program has been compiled and tested on CISE thundermachince. Because of Endian differences on different platforms, Please compile and run this program ONLY ON CISE thunder machine.
  • fibonacci_bin_txt:Running txt2bin on this file should produce the Assembler binary file for the sample data above.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9888035
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Engineering

What are the possible products when solutions of kbr and

What are the possible products when solutions of KBr and Sr(NO3)2 are mixed? And what is the identity of the precipitate.

Case study - social media research facilitytaskthis

Case study - Social Media Research facility Task This assignment follows from the case study used in Assessment . For the same case study, complete the following tasks by creating the following: WBS first using indented ...

These sctp data chunks have arrived carrying the following

These SCTP DATA chunks have arrived carrying the following information: TSN:20 SI:2 SSN:8 BE:11 TSN:21 SI:2 SSN:9 BE:10 TSN:12 SI:2 SSN:7 BE:11 TSN:18 SI:3 SSN:15 BE:01 TSN:15 SI:3 SSN:15 BE:00 TSN:24 SI:1 SSN:23 BE:10 I ...

Systems and networkscalculate the timeoutinterval for tcp

Systems and Networks Calculate the TimeOutInterval for TCP. Assume the observed SampleRTTs for the first three packets are 2 seconds, 5 seconds, and 8 seconds. The value of a=0.25 and the "safety margin" is 0.5 seconds. ...

Prove the sieve of eratosthenes algorithm has runtime

Prove the Sieve of Eratosthenes algorithm has runtime complexity ≤ O(n log log n). Sieve Input: an integer n > 1. Let A be an array of Boolean values, indexed by integers 2 to n, initially all set to true. for i = 2,3,4, ...

The national sporting goods association nsga conducted a

The National Sporting Goods Association (NSGA) conducted a survey of the ages of individuals that purchased skateboarding footwear. The ages of this survey are summarized in the following relative frequency distribution. ...

Roberto is the network administrator for an international

Roberto is the network administrator for an international law firm with offices and customers in North America, South America, Africa, and the Middle East. The lawyers frequently contact each other via e-mail, use the In ...

Regarding sorting lists an algorithm such as quicksort was

Regarding sorting lists, an algorithm such as QuickSort was preferred if the list was, for the most part, in random order, and that an algorithm such as Insertion Sort was preferred if the list was essentially in order. ...

Question we are running the insertion sort algorithm on the

Question : We are running the Insertion Sort algorithm on the array A = . a) Write the array A at the start of the iteration j=5 of the for loop. b) What is the value of i at the start of the iteration j=6 of the for loo ...

Suppose a machine has 16 registers and uses 24 bit memory

Suppose a machine has 16 registers and uses 24 bit memory addresses. The opcodes are 8 bits so that the instruction length is 32 bits. Register instructions can have two or three register operands (4 bits to name each re ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As