|
|
DataMuseum.dkPresents historical artifacts from the history of: CP/M |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about CP/M Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - download
Length: 187904 (0x2de00)
Types: TextFile
Names: »D52«
└─⟦1e8064b49⟧ Bits:30005867/disk07.imd Dokumenter (RCSL m.m.)
└─⟦this⟧ »D52«
TIMEFORBRUG
800530 BE 4.30 timer Justering, kontrol, udskrift m.m.
800602 BE 6.00 - do.
800603 BE 5.30 - do.
800604 BE 6.00 - do.
800609 BE 1.00 - rettelser + udskrift
FORBEHOLDT SKRIVESTUEN, UDSKRIFT INSTRUKTION:
S_k_a_l_ _u_d_s_k_r_i_v_e_s_ _m_e_d_ _f_r_i_c_t_i_o_n_-_f_e_e_d_ _*_*_*_b_ø_r_ _i_k_k_e_ _o_m_b_r_y_d_e_s_ _u_d_e_n_
s_p_e_c_i_e_l_ _a_t_t_e_n_t_i_o_n_*_*_*_ _a_f_s_t_a_n_d_ _m_e_l_l_e_m_ _r_a_d_i_x_:_ _3_ _e_n_h_e_d_e_r_
Specieltegn skal tegnes på siderne 108, 109, 114, 115 og 116
KH
BE
\f
RC3803 CPU
Programmer>s Reference Manual
August 1980
A/S Regnecentralen af 1979 RCSL 42-i 1008 \f
Author: Knud Henningsen
Technical Editor: Knud Erik Hansen
KEY WORDS: RC3803, CPU 720, Revision 0.
ABSTRACT: This paper describes the logical structure of the
RC3803 Central Processor Unit.
Reservation
Copyright A/S Regnecentralen af 1979
Printed by A/S Regnecentralen af 1979, Copenhagen \f
i
T_A_B_L_E_ _O_F_ _C_O_N_T_E_N_T_S_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_
1. RC3803 SPECIFICATIONS ................................ 1
1.1 Central Processor Unit .......................... 1
1.2 Memory .......................................... 1
1.3 Input/Output .................................... 2
1.4 Interrupt Capability ............................ 2
1.5 Data Channel .................................... 3
1.6 Power Fail/Auto Restart ......................... 3
1.7 Real Time Clock ................................. 3
1.8 Diagnostic Front Panel .......................... 4
2. INTERNAL CONFIGURATION ............................... 5
2.1 Introduction .................................... 5
2.2 Program Structure ............................... 5
2.2.1 Program Execution ........................ 5
2.2.2 Program Flow Alteration .................. 6
2.2.3 Program Size ............................. 8
2.2.4 Program Flow Interruption ................ 8
2.3 Information Formats ............................. 9
2.3.1 Fundamental Concepts ..................... 10
2.3.2 Bit Numbering ............................ 10
2.3.3 Binary Representation .................... 11
2.3.4 Octal Representation ..................... 13
2.3.5 Hexadecimal Notation ..................... 14
2.4 Numerical Quantities ............................ 14
2.4.1 Integers ................................. 14
2.4.2 Logical Quantities ....................... 17
2.5 Addressing ...................................... 17
2.5.1 Word Addressing .......................... 17
2.5.2 Byte Addressing .......................... 21
3. INSTRUCTIONS ......................................... 23
3.1 Introduction .................................... 23
3.2 Instruction Formats ............................. 23
3.3 Mnemonic Description ............................ 23 \f
ii
T_A_B_L_E_ _O_F_ _C_O_N_T_E_N_T_S_ _(_c_o_n_t_i_n_u_e_d_)_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_
3.4 Program Flow Control ............................ 24
3.4.1 JUMP ..................................... 25
3.4.2 JUMP TO SUBROUTINE ....................... 26
3.4.3 INCREMENT AND SKIP IF ZERO ............... 27
3.4.4 DECREMENT AND SKIP IF ZERO ............... 27
3.5 Data Transfer Operation ......................... 28
3.5.1 LOAD ACCUMULATOR ......................... 29
3.5.2 STORE ACCUMULATOR ........................ 29
3.6 Integer Arithmetic and Logical Operations ....... 30
3.6.1 ADD ...................................... 36
3.6.2 SUBTRACT ................................. 37
3.6.3 NEGATE ................................... 38
3.6.4 ADD COMPLEMENT ........................... 39
3.6.5 MOVE ..................................... 39
3.6.6 INCREMENT ................................ 40
3.6.7 COMPLEMENT ............................... 40
3.6.8 AND ...................................... 41
3.6.9 Examples ................................. 41
4. INPUT/OUTPUT ......................................... 45
4.1 Introduction .................................... 45
4.2 Operation of I/O Devices ........................ 46
4.3 Interrupt System ................................ 46
4.4 Priority Interrupts ............................. 48
4.5 Direct Memory Access Data Channel ............... 50
4.6 I/O Instructions ................................ 51
4.6.1 DATA IN A ................................ 52
4.6.2 DATA IN B ................................ 53
4.6.3 DATA IN C ................................ 53
4.6.4 DATA OUT A ............................... 54
4.6.5 DATA OUT B ............................... 54
4.6.6 DATA OUT C ............................... 55
4.6.7 I/O SKIP ................................. 55
4.6.8 NO I/O TRANSFER .......................... 56 \f
iii
T_A_B_L_E_ _O_F_ _C_O_N_T_E_N_T_S_ _(_c_o_n_t_i_n_u_e_d_)_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_
4.7 Central Processor Functions ..................... 56
4.7.1 INTERRUPT ENABLE ......................... 58
4.7.2 INTERRUPT DISABLE ........................ 58
4.7.3 READ SWITCHES ............................ 59
4.7.4 INTERRUPT ACKNOWLEDGE .................... 59
4.7.5 MASK OUT ................................. 60
4.7.6 I/O RESET ................................ 60
4.7.7 HALT ..................................... 61
4.7.8 CPU SKIP ................................. 61
5. PROCESSOR FEATURES ................................... 62
5.1 Introduction .................................... 62
5.2 Power Fail ...................................... 63
5.3 MEMORY EXTENSION ................................ 64
5.4 CPU IDENTIFY .................................... 65
5.5 Byte Manipulation ............................... 65
5.5.1 LOAD BYTE ................................ 66
5.5.2 STORE BYTE ............................... 67
5.6 BYTE MOVE ....................................... 68
5.7 WORD MOVE ....................................... 69
5.8 SEARCH ITEM ..................................... 70
5.9 SEARCH FREE ..................................... 73
5.10 PROCESS LINK .................................... 74
5.11 PROCESS REMOVE .................................. 76
5.12 PROCESS LINK PRIORITY ........................... 78
5.13 INSTRUCTION FETCH (MUSIL) ....................... 81
5.14 TAKE ADDRESS (MUSIL) ............................ 82
5.15 TAKEVALUE (MUSIL) ............................... 84
5.16 COMPARE Byte Strings ............................ 86
6. PROCESSOR OPTIONS .................................... 88
6.1 Real Time Clock ................................. 88
6.2 Teletype Controller ............................. 89
6.2.1 Instructions ............................. 89
6.2.2 Programming .............................. 92
6.2.3 Programming Examples ..................... 93
\f
iv
T_A_B_L_E_ _O_F_ _C_O_N_T_E_N_T_S_ _(_c_o_n_t_i_n_u_e_d_)_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _P_A_G_E_
7. PROGRAM LOADING ...................................... 97
7.1 Introduction .................................... 97
7.2 Automatic Loading ............................... 98
8. SWITCHES AND INDICATORS .............................. 103
8.1 Switches ........................................ 103
8.1.1 ENABLE TCP ............................... 103
8.1.2 AUTOLOAD DEVICE SELECT ................... 104
8.1.3 PARITY ERROR ............................. 104
8.1.4 MEMORY EXTENSION SELECT .................. 105
8.2 Indicators ...................................... 106
8.2.1 PARITY ERROR ............................. 106
8.2.2 CPU-STATUS ............................... 106
A_P_P_E_N_D_I_C_E_S_:
A. I/O DEVICE CODES AND MNEMONIC ........................ 108
B. ASCII CHARACTER CODES ................................ 111
C. DOUBLE PRECISION ARITHMETIC .......................... 117
D. INSTRUCTION USE, EXAMPLES ............................ 119
E. INSTRUCTION EXECUTION TIMES .......................... 126
\f
1_._ _ _ _ _ _ _ _ _R_C_3_8_0_3_ _S_P_E_C_I_F_I_C_A_T_I_O_N_S_ 1.
1_._1_ _ _ _ _ _ _ _C_e_n_t_r_a_l_ _P_r_o_c_e_s_s_o_r_ _U_n_i_t_ 1.1
The RC3803 Central Processor Unit is a micro-programmed, general
purpose stored-program computer with four accumulators. The CPU
works on the basis of a unit of information called a word which
consists of 16 bits. Arithmetic and logical operations are per-
formed on operands held in the accumulators, which consequently
also are 16 bits in length. Two of the accumulators can be used
as index registers for addressing purposes.
1_._2_ _ _ _ _ _ _ _M_e_m_o_r_y_ 1.2
The main memory is available in two alternative modules:
RC3608 is a core memory with a capacity of 32K words and a cycle
time of 750 ns.
RC3609 is a core memory with a capacity of 16K words and a cycle
time of 650 ns.
The CPU can directly address 32K words of core memory and
provides for base page, relative, indexed and multi-level
indirect addressing modes. By the use of a special instruction
the CPU can be switched to a mode which will allow it to work
with up to 64K words of core memory.
Word length in memory is 16 + 2 = 18 bits. The two extra bits are
parity check bits. They are generated during each memory write
cycle and are checked during each memory read cycle. The detect-
ion of a parity error can affect the operation of the CPU in two
alternative ways: the error can be indicated on the front frame
of the CPU board while processing continues uninterrupted or pro-
cessing can be brought to a halt. The selection of either possi-
bility is left to the operator>s choice by means of a switch also
located on the CPU frame.
\f
1_._3_ _ _ _ _ _ _ _I_n_p_u_t_/_O_u_t_p_u_t_ 1.3
All peripheral devices are connected to the CPU through the
Input/Output bus. This consists of a six-line device selection
network, interrupt circuitry, command circuitry, and sixteen data
transmission lines. Each individual Input/Output device has a
unique six-bit device code and will only respond to commands if
its own device code is transmitted through the device selection
network of the Input/Output bus.
The six bits in the device code allows for 64 separate codes. A
number of these codes are reserved for specific uses, but the re-
maining codes make it possible to obtain an extremely flexible
handling of Input/Output devices.
1_._4_ _ _ _ _ _ _ _I_n_t_e_r_r_u_p_t_ _C_a_p_a_b_i_l_i_t_y_ 1.4
The interrupt circuitry included in the Input/Output bus provides
the capability for any peripheral device to interrupt normal pro-
gram execution whenever the device is in need of attention. When
a peripheral device has requested an interrupt the processor will
transfer control of operations to the main interrupt service rou-
tine, which will handle the servicing of the device. The inter-
rupt service routine will establish the source of the interrupt
either by polling all Input/Output devices connected to the CPU
or it can use a special instruction to identify the device in
question.
The interrupt system also provides the capability of implementing
up to sixteen levels of priority in connection with interrupts,
so that each individual peripheral device is associated with a
specific priority level. A standard priority assignment is imple-
mented by Regnecentralen, but the programmer can change these as-
signments according to his own choice.
\f
1_._5_ _ _ _ _ _ _ _D_a_t_a_ _C_h_a_n_n_e_l_ 1.5
Data transfers between peripheral devices and main memory under
program control occupy processor time and retard the rate of in-
formation transfer.
To avoid this restriction the Input/Output bus contains cir-
cuitry allowing high-speed access direct to memory through the
data channel, this permits a peripheral device to transfer data
directly into/out of memory using a minimum of processor time. At
the maximum transfer rate the data channel effectively stops the
processor, but at lower rates processing continues while the data
transfer takes place.
1_._6_ _ _ _ _ _ _ _P_o_w_e_r_ _F_a_i_l_/_A_u_t_o_ _R_e_s_t_a_r_t_ 1.6
The RC3803 computer incorporates a feature providing for auto-
matic restart in the event of an unexpected power loss. The delay
between the initial decrease of voltage and the actual automatic
shut-down of the processor is utilized to bring the interrupt
service routine into action. This routine will under these cir-
cumstances use the available interval of time to store the con-
tents of accumulators, the program restart address and other in-
formation that will be necessary for restart and continued opera-
tion when the power supply again has been restored.
The Power Fail feature is entirely automatic and will restart
operations on its own whenever power is again available.
1_._7_ _ _ _ _ _ _ _R_e_a_l_ _T_i_m_e_ _C_l_o_c_k_ 1.7
A Real Time Clock can optionally be included in the RC3803 com-
puter. This clock will generate a train of pulses independently
of processor timing, this will allow the interrupt system to be
activated at precisely spaced intervals of time. The pulse train
frequency can be selected by the programmer among the following
four possibilities: 10 Hz, 50 Hz, 100 Hz, and 1000 Hz. \f
1_._8_ _ _ _ _ _ _ _D_i_a_g_n_o_s_t_i_c_ _F_r_o_n_t_ _P_a_n_e_l_ 1.8
A Diagnostic Front Panel can be connected to the CPU even during
program execution. This will allow external, manual control of
the CPU and will thus facilitate error detection and correction.
The Diagnostic Front Panel is not described in detail in this
manual, for further information concerning this consult the
Reference Manual for the Diagnostic Front Panel - RCSL 52-AA542.
\f
2_._ _ _ _ _ _ _ _ _I_N_T_E_R_N_A_L_ _C_O_N_F_I_G_U_R_A_T_I_O_N_ 2.
2_._1_ _ _ _ _ _ _ _I_n_t_r_o_d_u_c_t_i_o_n_ 2.1
This chapter and the following deal in some detail with the basic
concepts underlying the actual modus operandi of the RC3803 CPU.
A more intimate knowledge of this subject is not strictly neces-
sesary for ordinary everyday use of the computer, because the
high-level programming languages available are designed to allow
symbolic programs to be written without reference to the more
specific information contained in this manual. Thus the intention
is not to establish guidelines for actual programming, for which
purpose separate manuals are available, but to provide a source
of background information for the programmer and/or operator.
2_._2_ _ _ _ _ _ _ _P_r_o_g_r_a_m_ _S_t_r_u_c_t_u_r_e_ 2.2
Information about the type of operation - arithmetical or other
- which the computer at any particular time must perform, is
given to the CPU in the shape of an "instruction". The CPU will
carry out successive instructions in strict sequence according
to the order in which the instructions have been specified. The
complete set of instructions is called a "program" and this must
at the time of execution reside in main memory in order to be
accessible to the CPU.
2_._2_._1_ _ _ _ _ _P_r_o_g_r_a_m_ _E_x_e_c_u_t_i_o_n_ 2.2.1
Each individual instruction occupies a space in memory called a
"word" and although these words will usually occupy adjacent
physical locations in memory, the program may incorporate in-
structions with the specific purpose of altering the sequence in
which the instructions should be carried out. \f
Thus the CPU must be able to locate the correct word at the cor-
rect point in the sequence in order to execute the program
properly. The actual physical location of a word is called its
"address" and consequently the establishing of location is called
"addressing".
Addressing the instructions is arranged by incorporating a count-
ing circuit called the "program counter". The program counter
contains one integer number, which always indicates the memory
address of the instruction currently being carried out. When the
operation specified by that particular instruction has been com-
pleted, the number in the program counter is incremented by one
and the CPU will then retrieve the next instruction to be carried
out from the memory location now being indicated by the number in
the program counter. Succeeding addresses will thus form a
strictly ascending numerical sequence and this method of oper-
ation is consequently called "sequential operation".
2_._2_._2_ _ _ _ _ _P_r_o_g_r_a_m_ _F_l_o_w_ _A_l_t_e_r_a_t_i_o_n_ 2.2.2
The programmer can however purposely arrange to deviate from the
strict sequential operation. This is done by using the appropri-
ate program flow control instructions which will make it possible
to achieve two distinctly different types of program flow varia-
tion.
The "jump" type instruction will cause an arbitrary new number -
either larger or smaller than the current one - to be inserted
in the program counter. Thus when the jump instruction has been
executed, the next instruction to be located can have any of all
the possible addresses.
\f
The "conditional skip" type instruction will first determine
whether a specified test condition is true or not. If true, it
will then cause the program counter to be increased by one, if
false, nothing further will be done. When the conditional skip
instruction has been executed, the program counter will be in-
creased by one as in the usual sequential operation and thus the
next instruction to be located will have either of the two fol-
lowing addresses depending on the outcome of the test. Normal
sequential operation will be resumed after the completion of
either type of instruction - using the updated value of the pro-
gram counter - and will continue until the next program flow
alteration occurs. An illustration showing the two types of pro-
gram flow alteration appears in fig. 2.2.2.
SEQUENTIAL
PROGRAM
FLOW
INCREASING
ADDRESSES
I JUMP
N PROGRAM
S FLOW
T
R
U
C
T
I SKIP
O PROGRAM
N FLOW
S
Figur 2.2.2
\f
2_._2_._3_ _ _ _ _ _P_r_o_g_r_a_m_ _S_i_z_e_ 2.2.3
The integer number contained in the program counter will have a
magnitude between 0 and 32, 767 (both included) and will thus
make it possible to address 32,768 separate memory locations
which is then the maximum program size. The program need not
necessarily start in memory location 0, but if the program
counter reaches the value 32,767 the next incrementation will
produce the value 0 and sequential operation will then continue
from here as previously explained. Notice should be taken of the
fact, that no indication whatsoever of this particular situation
will be given.
N_O_T_E_: The proceeding outlined above will change if Memory
Extension has been selected (cf. Section 5.3).
2_._2_._4_ _ _ _ _ _P_r_o_g_r_a_m_ _F_l_o_w_ _I_n_t_e_r_r_u_p_t_i_o_n_ 2.2.4
During the normal running of a program a variety of situations
may arise which will make it necessary to interrupt the normal
program flow, i.e. to stop ordinary processing temporarily. This
may be due to either quite normal occurrences - for instance the
necessity of performing an Input/Output operation - or it may be
due to exceptional occurrences - external or internal faults or
malfunctions.
In both cases the address of the next sequential instruction is
saved by the CPU while the interrupt condition lasts. On ter-
mination of the interrupt condition the address saved by the CPU
is placed in the program counter anew and the interrupted program
resumes operation at the correct point in the sequence.
\f
An illustration showing this variation in program flow appears in
fig. 2.2.4.
SEQUENTIAL
PROGRAM
FLOW
INCREASING I/O
ADDRESSES INTERRUPT
I OCCURS
N
S
T JUMP
R
U
C
T SKIP
I
O
N CONTINUED
S PROGRAM RETURN
FLOW
Figur 2.2.4
2_._3_ _ _ _ _ _ _ _I_n_f_o_r_m_a_t_i_o_n_ _F_o_r_m_a_t_s_ 2.3
In any computer information is basically represented by some
physical quantity - usually electric current or magnetism. The
actual nature of this quantity as well as its magnitude carries
no importance with respect to use of the computer; the important
property is that the relevant quantity can either be present or
not present.
\f
2_._3_._1_ _ _ _ _ _F_u_n_d_a_m_e_n_t_a_l_ _C_o_n_c_e_p_t_s_ 2.3.1
The two possible - but mutually exclusive - states as mentioned
above form the basis for all considerations of information pro-
cessing. The two states are normally indicated by the numerals 0
(zero) and 1 (one) and the nucleus of information thus represented
is called a "binary digit" - usually shortened to "bit".
In the RC3603 computer the standard unit of information is how-
ever the "word", which is a string of 16 individual bits. As each
bit can attain either of two different states, the string of 16
bits can represent 2UU16DD = 65,536 different pieces of information,
for instance the integer numbers from 0 up to 65,535. It should
here be noted, that although the wellknown mathematical symbolism
- i.e. numbers - is often used to describe the information con-
tent of a word (or a part of a word), this is in reality only a
matter of convenience and does not restrict the actual meaning of
the information to this particular subject; nor does it restrict
the use to which it may be put. Although the word is the standard
unit of information handled by the RC3803 computer it can at
times be convenient to subdivide a word into two parts of 8 bits
each. Such a half-word is called a "byte" and is capable of re-
presenting 2UU8DD = 256 different pieces of information.
2_._3_._2_ _ _ _ _ _B_i_t_ _N_u_m_b_e_r_i_n_g_ 2.3.2
When considering the information contained in bytes or words it
is convenient to establish a definite method of referencing the
individual bits of the byte or word. This is done simply by ordi-
nary numbering of the bits within the word or byte.
The numbering always proceeds from left to right, i.e. the left-
most bit in a word is bit 0 while the rightmost bit in a word is
bit 15. Similarly the leftmost bit in a byte is bit 0 while the
rightmost bit in a byte is bit 7. Notice that the numbering al-
ways starts with bit 0.
\f
The convention adopted here is illustrated in fig. 2.3.2.
WORD WORD
BYTE BYTE BYTE BYTE
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Figur 2.3.2
It should also be noted that the adoption of this convention
means, that if for instance the word contains a number then the
highest-order digit will have the lowest bit number while the
lowest-order digit will have the highest bit number.
2_._3_._3_ _ _ _ _ _B_i_n_a_r_y_ _R_e_p_r_e_s_e_n_t_a_t_i_o_n_ 2.3.3
If the conventional mathematical notation is adopted by using
the numerical values 0 and 1 to indicate the two possible states
of the bit, then a word will be read simply as an ordinary 16-
digit number - although the number will be written in somewhat
unusual manner which in mathematics is called "binary notation".
From our everyday lives we are accustomed to use of numbers in
very many contexts; take for instance an arbitrary number like
315. The important feature of a number like this is that the
actual value of the individual digit depends on its p_o_s_i_t_i_o_n_ in
the written number. In effect the way the number is written is
just a convenient short-hand way of indicating the magnitude:
3 x 100 + 1 x 10 + 5 x 1 = 3 x 10uU2dD + 1 x 10uU1dD + 5 x 10uU0dD.
This is called "decimal notation" or "base 10" representation
because successive digit positions in the number form a sequence
of increasing powers of 10.
\f
To indicate that a number is written in base 10 representation a
subscript is used whenever there exists a possibility of confu-
sion:
315dD10uU.
It is obvious that decimal notation will require ten different
symbols to indicate the possible values of the individual digits,
namely the symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9.
Binary notation - or base 2 representation - is in exactly the
same way a positional system, the only difference being that in
this case successive positions in the number form a sequence of
powers of 2. Whereas base 10 representation required ten different
symbols for the individual digits base 2 representation will only
require two different symbols, namely 0 and 1; this is of course
the reason for its dominant position in all aspects of computer
technology.
A binary number can of course be used to indicate any magnitude
just as well as a decimal number; consequently a binary number can
always be converted to the equivalent decimal number and vice
versa. Thus:
100111011dD2uU =
1 x 2UU8DD + 0 x 2UU7DD + 0 x 2UU6DD + 1 x 2UU5DD + 1 x 2UU4DD + 1 x 2UU3DD +
0 x 2UU2DD + 1 x 2UU1DD + 1 x 2UU0DD =
1 x 256dD10uU + 0 x 128dD10uU + 0 x 64dD10uU + 1 x 32Dd10uU + 1 x 16dD10uU +
1 x 8dD10uU + 0 x 4dD10uU + 1 x 2dD10uU + 1 x 1dD10uU =
256dD10uU + 32dD10uU + 16dD10uU + 8dD10uU + 2dD10uU + 1dD10uU =
315dD10uU.
\f
2_._3_._4_ _ _ _ _ _O_c_t_a_l_ _R_e_p_r_e_s_e_n_t_a_t_i_o_n_ 2.3.4
Internally the CPU will only recognize information given in base
2 representation, but from the example given above it will be
clear that the simplicity of binary numbers, owing to the limited
number of different symbols used, is counteracted by the neces-
sity of using more digit positions to indicate any given magni-
tude, i.e. binary numbers tend to become rather long and un-
wieldy.
Extensive application of binary notation in a manual like this can
therefore be somewhat awkward and might even lead to confusion. It
cannot be completely avoided, but very often numerical representa-
tion to yet another base is used instead.
Noting that a three-digit binary number can represent numerical
values from 000dD2uU = 0dD10uU to 111dD2uU = 7Dd10uU it is easily realised,
that each group of three bits can be uniquely represented by the
eight digits 0, 1, 2,....6 and 7. Therefore the use of a repre-
sentation to base 8 - so-called octal notation - will retain the
basic structure of the binary format, but it will on the other
hand only require one third of the positional places needed in
pure binary notation.
Expressing the example used on the preceding page in octal
notation will yield:
315dD10uU = 100111011dD2uU = 473dD8uU.
Thus by dividing any string of bits into groups of three and
using octal notation a fairly compact and convenient represen-
tation is achieved. The subdivision of the string alway starts
with the rightmost group of three bits and proceeds towards the
left. If the number of places in the binary number is not divis-
ible by three the leftmost group will contain only one or two
bits. This is however of no particular consequence: conversion to
octal notation will take place as outlined above on the addition-
al assumption that the leftmost group is filled-up to three
digits by prefixing the necessary one or two zeroes.
\f
2_._3_._5_ _ _ _ _ _H_e_x_a_d_e_c_i_m_a_l_ _N_o_t_a_t_i_o_n_ 2.3.5
In some cases still another base is used to represent binary in-
formation, namely base 16 - also called hexadecimal notation
("hex"). Just as in the case of octal notation the binary number
is formed into groups, but each group will consist of four bits.
These four bits can express the numerical values from 0000Dd2uU = 0Dd10uU
to 1111dD2uU = 15dD10uU, and in "hex" it will consequently be necessary
to use sixteen individually different symbols for the digits. The
numerals from 0 to 9 are of course still used to represent their
usual values, whereas the values from 10dD10uU to 15dD10uU will be repre-
sented by the initial six letters of the alphabet: A to F. The
example previously used will then yield:
315Dd10Uu = 100111011dD2uU = 473dD8uU = 13BdD16uU.
2_._4_ _ _ _ _ _ _ _N_u_m_e_r_i_c_a_l_ _Q_u_a_n_t_i_t_i_e_s_ 2.4
The CPU does not intrinsically recognize one type of information
as being different from another, but it is quite obvious that in
terms of application of the computer numerical quantities do ap-
pear in the majority of situations. Numerical quantities basical-
ly accepted by the CPU can be either integers or logical quanti-
ties.
2_._4_._1_ _ _ _ _I_n_t_e_g_e_r_s_ 2.4.1
Operations on integer quantities can be performed on signed or un-
signed binary numbers, which may be carried by the CPU in either
single or multiple precision. Single precision integers are two
bytes long (16 bits), while multiple precision integers are four
or more bytes long.
\f
Unsigned integers use all available bits to represent the magni-
tude of the number; thus an unsigned, single precision integer can
range in value from 0dD10uU to 65,535Dd10uU (2UU16DD - 1) corresponding to
the sixteen bits available. Similarly two words taken together as
an unsigned, double precision integer can range in value from
0dD10uU to 4,294,967,295dD10uU (2uU32dD - 1) corresponding to the thirtytwo
bits available.
Signed integers use bits 1 to 15 to represent the magnitude of the
number while bit 0 is reserved for use as sign bit. The aforesaid
assumes single precision; if multiple precision is employed the
first (leftmost) word will be structured in this same way while
the following word(s) will use all available bits to represent
numerical information.
For positive numbers the sign bit is 0 and the remaining bits re-
present the magnitude of the number in standard binary notation as
explained above.
For negative numbers the sign bit is 1 and the remaining bits re-
present the magnitude of the number in complemented binary nota-
tion (also called two>s complement form).
Complementing a number - whether in decimal, binary, or any other
notation - simply means writing the negative number as the sum of
two numbers: a large negative number which is a power of the base
plus that positive number which will yield the original number
when added to the large negative one. For instance in decimal
notation:
- 315 = - 1,000,000,000 + 999,999,685.
The advantage of this form is that when working within a set num-
ber of digit positions, the large negative number will "vanish" -
leaving simply a row of zeroes.
To produce the complement - "mechanically" speaking - of a decimal
number just subtract the individual digit from 9 to give the digit
value of the complement - and then finally add 1 to the last digit.
\f
Thus:
315DD10UU = 0 000 000 100 111 011
1 111 111 011 000 100 - complementation
+______________________1_
- 315DD10UU = 1 111 111 011 000 101
Note that the complementation of a negative number will of
course produce the positive of that number.
Complementing zero will produce a carry out of the leftmost bit
and leave the number again as zero:
0 000 000 000 000 000 - zero
1 111 111 111 111 111 - complementation
+_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _1_
0 000 000 000 000 000 - zero
Note that zero is a positive number!
As shown above complementation of zero will again produce zero
and there will thus always be one more negative number than there
are non-negative numbers within the given range of digit posi-
tions. The numerically largest negative number is a number with
the sign bit 1 and all remaining bits 0. The positive value of
this number cannot be represented in the same number of digit
positions as used to represent the negative number.
Thus a single precision signed integer can lie in the range from
- 32,768 to + 32,767 while a double precision signed integer can
lie in the range from - 2,147,483,648 to + 2,147,483,647.
Note that addition and subtraction of signed numbers in two>s
complement form is identical to the same operations on unsigned
numbers; the CPU just treats the sign bit as the most significant
(highest-order) magnitude bit.
\f
2_._4_._2_ _ _ _ _ _L_o_g_i_c_a_l_ _Q_u_a_n_t_i_t_i_e_s_ 2.4.2
Operations on logical quantities can be performed on individual
bits, bytes, or words. In all cases the quantities operated on
are treated as simple un-structured binary quantities. The logi-
cal value "true" is represented by 1 while the logical value
"false" is represented by 0. Two logical quantities are identical
if and only if they have identical values in corresponding bit
positions
The number of bits, bytes, or words operated on will depend on
the instruction actually being used.
2_._5_ _ _ _ _ _ _ _A_d_d_r_e_s_s_i_n_g_ 2.5
It has already been mentioned in the section "Program Execution"
(section 2.2.1) that the CPU must be able to locate the instruc-
tions stored in main memory. Similarly the CPU must be able to
locate the data involved in the operation to be performed - the
address of which data will usually be indicated in the instruc-
tion.
2_._5_._1_ _ _ _ _ _W_o_r_d_ _A_d_d_r_e_s_s_i_n_g_ 2.5.1
Main memory is subdivided into a number of words - the actual
magnitude of which depends on the CPU configuration actually
being employed. Every single word in memory has a definite ad-
dress, which is given as a number: the first word in memory has
the address 0, the next word has the address 1, the next word has
the address 2, and so on. It will be recalled that the address of
the instruction currently in effect is held in the one-word
program counter during the execution of a program. The
instruction itself must contain information about the address of
data to be used during the execution of that particular
instruction.
\f
In contrast to the address held in the program counter the ad-
dress information contained in the instruction will not always
directly specify the necessary address but may form the basis for
a calculation whose result will be the desired address. This cal-
culation is called "effective address calculation" and the result
of this is the "effective address".
The six instructions which directly reference memory in this way
use eleven bits of the word containing the instruction for ef-
fective address calculation. The format of these six instructions
is shown below:
IN-
@ DEX DISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
The eleven bits concerned are bits 5 to 15; of these bit 5 is
called the indirect bit, bits 6 and 7 are called the index bits
and the remaining eight bits (bits 8 to 15) are called the dis-
placement bits.
There are four essentially different modes of effective
address calculation available:
Page zero addressing
Relative addressing
Index Register addressing
Indirect addressing
2_._5_._1_._1_ _ _P_a_g_e_ _Z_e_r_o_ _A_d_d_r_e_s_s_i_n_g_ 2.5.1.1
Page zero addressing is indicated by the index bits being 00.
Then the displacement bits are taken as an ordinary unsigned in-
teger number indicating directly the effective address. An 8-bit
number will lie in the range from 0 to 255dD10uU; this first block
of 256dD10uU words in memory, which can be addressed directly in
this way way, is known as page zero.
\f
2_._5_._1_._2_ _ _ _R_e_l_a_t_i_v_e_ _A_d_d_r_e_s_s_i_n_g_ 2.5.1.2
Relative addressing is signified by the index bits being 01. In
this case the displacement bits are taken as a signed, two>s
complement integer number. This number is added to the address -
contained in the program counter - of the instruction currently
in effect; the result of the addition is the effective address.
By this means the effective address can be any address in memory
accessible to the program as it is defined relative to the ad-
dress of the instruction. A signed 8-bit number will lie in the
range from -128dD10uU to +127dD10uU relative addressing therefore gives
access to a block of 256Dd10uU words distributed evenly on either
side of the instruction.
2_._5_._1_._3_ _ _ _I_n_d_e_x_ _R_e_g_i_s_t_e_r_ _A_d_d_r_e_s_s_i_n_g_ 2.5.1.3
Index register addressing is signified by the index bits being
either 10 or 11. If they are 10 then accumulator 2 is used as an
index register; if they are 11 then accumulator 3 is similarly
used.
In both cases the displacement bits are taken as a signed, two>s
complement integer number; this number is added to the number
contained in the accumulator indicated by the choice of index
bits. The result of the addition is the effective address.
N_O_T_E_: The addition performed in relative and index register
addressing is clipped to 15 bits, i.e. the high-order
bit (bit 0) of the resulting address is set to 0. For
example:
if the displacement bits are 01 001 111 and (in rela-
tive addressing) the program counter stands at 111 111
110 101 011, then the addition should produce the re-
sult: 1 000 000 000 011 010, but bit 0 will be set to 0
so that the result reads:
0 000 000 000 011010.
If however Memory Extension has been selected the procedure out-
lined in this note will not apply (for further details see sec-
tion 5.3).
\f
When index register addressing is used the addition of the dis-
placement to the number contained in the accumulator does not
change the value contained in the accumulator.
2_._5_._1_._4_ _ _ _I_n_d_i_r_e_c_t_ _A_d_d_r_e_s_s_i_n_g_ 2.5.1.4
While discussing the three addressing modes hitherto covered it
has been tacitly assumed, that the indirect bit (bit 5) of the
instruction was 0, since only then will the result of the address
calculation be the effective address.
If the indirect bit is 1 then the word addressed by either of
the three previously mentioned address calculations is expected
in itself to contain an address (level 1 indirection). The word
concerned will of course contain the usual 16 bits of which now
bit 0 will be the indirect bit and bits 1 to 15 will contain the
address proper.
If now the indirect bit in the level 1 indirection address is 0
then the address contained in bits 1 to 15 is assumed to be the
effective address, but if the indirect bit is 1 then the level 1
indirection address is again expected to contain a further ad-
dress (level 2 indirection). This procedure will then be repeated
until an address is eventually retrieved where bit 0 is 0 and
bits 1 to 15 consequently will be taken to be the effective ad-
dress.
It should be noted that there is no limit to the levels of in-
direction accepted by the CPU. Neither is there any indication if
the chain of indirect addresses due to an error should form a
closed loop thus continuing indefinitely.
N_O_T_E_: Multi-level indirect addressing mode is disabled
if Memory Extension has been selected (section 5.3).
\f
r2_._5_._1_._5_ _ _ _A_u_t_o_ _L_o_c_a_t_i_o_n_s_ 2.5.1.5
Two areas of main memory are reserved for special addressing
purposes.
Locations in the range from 20dD8uU to 27dD8uU are autoincrement loca-
tions, which means that if an indirect addressing chain refer-
ences an address in this range then the word in that location
will be retrieved, the number contained in the word will be in-
cremented by one and this will then be written back into the lo-
cation. The updated value is then used to continue the chain of
indirect addresses.
Locations in the range from 30Dd8uU to 37dD8uU are autodecrement loca-
tions. Exactly the same procedure as outlined above applies here
except that the contents of the location will be decremented
instead of incremented.
N_O_T_E_: When autoincrement or autodecrement locations are ref-
erenced in an indirection chain the state of bit 0
b_e_f_o_r_e_ the incrementation or decrementation will be the
condition determining the continuation of the chain.
For example:
if an autoincrement location containing the number
177777dD8uU is referenced during an indirection chain
then the next address in the chain will be location
000000Dd8uU - and it will be assumed that this location
in itself will contain an address due to the fact, that
the original word contained in the autoincrement location
(177777dD8uU) had a 1 bit in bit 0.
2_._5_._2_ _ _ _ _ _B_y_t_e_ _A_d_d_r_e_s_s_i_n_g_ 2.5.2
Although the ordinary addressing routines will only allow addres-
sing of complete 16-bit words in memory a convenient programming
method is available which will allow handling of individual by-
tes.
\f
This method involves the use of a "byte pointer" which is a word
containing in bits 0 to 14 the address of a normal two-byte word
in memory and where bit 15 is the "byte indicator". If the byte
indicator is 0 the referenced byte will be the leftmost byte
(containing bits 0 to 7) of the word whose address is given in
bits 0 to 14 of the byte pointer; if the byte indicator is 1 the
referenced byte will correspondingly be the rightmost byte (con-
taining bits 8 to 15).
Programming routines to handle individual bytes in this way are
listed in Appendix D of this manual.
Byte addressing cannot be used when locations in the extended
memory area are manipulated.
\f
F_3_._ _ _ _ _ _ _ _ _I_N_S_T_R_U_C_T_I_O_N_S_ 3.
3_._1_ _ _ _ _ _ _ _I_n_t_r_o_d_u_c_t_i_o_n_ 3.1
The complete set of operation instructions available for RC3803
CPU is divided into four subsets. These are instruction sets for
program flow control, data transfer operations, integer arithme-
tic, and logical operations and a special subset for programming
the processor functions plus the optional features: Real Time
Clock, Power Fail/Auto-restart, and Memory Extension.
3_._2_ _ _ _ _ _ _ _I_n_s_t_r_u_c_t_i_o_n_ _F_o_r_m_a_t_s_ 3.2
All instructions in the set are one 16-bit word in length but the
lay-out will differ depending on the type of operation to be per-
formed; more specifically this will bear on the number of accumu-
lators employed in the execution of the instruction. In the fol-
lowing description of the different subsets a discussion of the
general format in each separate case will appear initially fol-
lowed by a description of the individual instructions which make
up that particular subset.
3_._3_ _ _ _ _ _ _ _M_n_e_m_o_n_i_c_ _D_e_s_c_r_i_p_t_i_o_n_ 3.3
In the description of individual instructions the specific form
of the instruction is given in the following generalized format:
MNEMONIC <optional mnemonic' OPERAND STRING <optional operands'
The main mnemonic is a group of letter symbols which must be used
to initiate the operation concerned in the instruction. To this
may in some cases be appended the optional mnemonics, which will
cause a modification of the execution of the instruction.
The operand string consists of the actual operands necessary to
the execution of the instruction. To this may likewise be appen-
ded optional operands.
\f
The symbols <' and == are used as an aid in defining the
specific form of each individual instruction:
< ' indicates optional mnemonics or operands
==== used as underlining to identify where definite substi-
tution is required, i.e. where the actual identifica-
tion of accumulator, address, name, number, or mnemonic
must be inserted in the instruction string.
The following abbreviations are used throughout this manual:
AC Accumulator
ACD Destination accumulator
ACS Source accumulator.
3_._4_ _ _ _ _ _ _ _P_r_o_g_r_a_m_ _F_l_o_w_ _C_o_n_t_r_o_l_ 3.4
Program flow control operations are handled by way of the program
counter - as outlined in section 2.2.1 - and thus do not explicit-
ly utilize any of the available accumulators. The instruction
lay-out in this subset is as follows:
OP In-
0 0 0 Code @ dex DISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
In this format bits 0, 1, and 2 are 000, bits 3 and 4 contain the
operation code and bits 5 to 15 contain the memory address as de-
scribed in section 2.5.1.
The symbol @ - placed anywhere in the effective address operand
string - will set the indirect bit (bit 5) to 1.
\f
The index bits (bit 6 and 7) are set by a comma followed by one
of the digits 0 to 3 as the last operand of the operand string.
If no index is coded, the index bits are automatically set to
00. The index bits can be set to 01 by using the character
"period" (.) at the beginning of the effective address operand
string. When the period is used, it is followed by either a plus
or a minus sign and the appropriate displacement, e.g. ".+7" or
".-2".
The subset contains the following four instructions: JUMP, JUMP
TO SUBROUTINE, INCREMENT AND SKIP IF ZERO, and DECREMENT AND SKIP
IF ZERO.
3_._4_._1_ _ _ _ _ _J_U_M_P_ 3.4.1
JMP <@' displacement < ,index'
=================
In-
0 0 0 0 0 @ dex DISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
The instruction will cause the effective address to be computed
and subsequently placed in the program counter. Sequential op-
eration will then continue with the word addressed by this new
value of the program counter.
\f
3_._4_._2_ _ _ _ _ _J_U_M_P_ _T_O_ _S_U_B_R_O_U_T_I_N_E_ 3.4.2
JSR <@' displacement < ,index '
=================
In-
0 0 0 0 1 @ dexDISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
The instruction will cause the effective address to be computed.
The current value of the program counter is incremented by one
and this number is placed in AC3, whereupon the previously cal-
culated effective address is placed in the program counter and
sequential operation then continues with the word addressed by
this new value of the program counter.
N_O_T_E_: The computation of the effective address is completed
before the incremented value in the program counter is
written into AC3. This means that if the effective ad-
dress calculation involves AC3 as an index register,
the original value contained in this register will be
used in the calculation before it is overwritten with
the incremented program counter.
As this instruction saves the incremented value of the program
counter in AC3 the use of this instruction for subroutine calls
makes the return to the proper point in the main program extreme-
ly simple necessitating only the instruction JMP 0,3.
\f
3_._4_._3_ _ _ _ _ _I_N_C_R_E_M_E_N_T_ _A_N_D_ _S_K_I_P_ _I_F_ _Z_E_R_O_ 3.4.3
ISZ <@' displacement <,index'
=================
In-
0 0 0 1 0 @ dex DISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will cause the effective address to be computed.
The word in this location is incremented by one and the result is
written back into the original location. If the result of the
incrementation is zero then the next sequential instruction is
skipped.
3_._4_._4_ _ _ _ _ _D_E_C_R_E_M_E_N_T_ _A_N_D_ _S_K_I_P_ _I_F_ _Z_E_R_O_ 3.4.4
DSZ <@' displacement <,index'
=================
In-
0 0 0 1 1 @ dexDISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will cause the effective address to be computed.
The word in this location is decremented by one and the result is
written back into the location. If the result of the decrementation
is zero then the next sequential instruction will be skipped.
\f
3_._5_ _ _ _ _ _ _ _D_a_t_a_ _T_r_a_n_s_f_e_r_ _O_p_e_r_a_t_i_o_n_ 3.5
Data transfer operations always involve one of the available ac-
cumulators as terminal point for the operation (except when the
Direct Memory Access feature is utilized, see section 4.5). There
are however slight differences in the instruction format depen-
ding on whether the data transfer is internal (between main memo-
ry and accumulator) or external (between peripheral device and
accumulator). This section will only describe the instructions
pertaining to internal data transfers, while external transfer
will be dealt with in chapter 4: Input/Output.
Internal data transfer instructions use the following lay-out:
OP In-
0 codeAC @dexDISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
In this format bit 0 is 0, bits 1 and 2 contain the operation
code, bits 3 and 4 specify the accumulator to be used in the ope-
ration, and bits 5 to 15 contain the memory address as outlined
in section 2.5.1.
The symbol @ - placed anywhere in the effective address operand
string - will set the indirect bit to 1.
The index bits (bits 6 and 7) are set by a comma followed by one
of the digits 0 to 3 as the last operand of the operand string.
If no index is coded, the index bits are automatically set to 00.
The index bits can be set to 01 by using the character "period"
(.) at the beginning of the effective address operand string.
When the period is used it is followed by either a plus or a
minus sign and the appropriate displacement, e.g. ".+7" or ".-2".
The internal data transfer subset comprises the following two
instructions: LOAD ACCUMULATOR and STORE ACCUMULATOR.
\f
3_._5_._1_ _ _ _ _ _L_O_A_D_ _A_C_C_U_M_U_L_A_T_O_R_ 3.5.1
LDA ac,<@'displacement <,index'
== =================
In-
0 0 1 AC @ dexDISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will cause the effective address to be computed
and the word contained in this location will then be retrieved
and subsequently written into the accumulator specified. The pre-
vious contents of that accumulator will be lost; the contents of
the location addressed will remain unchanged.
3_._5_._2_ _ _ _ _ _S_T_O_R_E_ _A_C_C_U_M_U_L_A_T_O_R_ 3.5.2
STA ac,<@'displacement <,index'
== ====================
In-
0 1 0 AC @ dexDISPLACEMENT
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will cause the effective address to be computed
and the word presently located in the accumulator specified will
be retrieved and subsequently written into the main memory loca-
tion indicated by the result of the effective address calcula-
tion. The previous contents of this location will be lost; the
contents of the accumulator will remain unchanged.
\f
3_._6_ _ _ _ _ _ _ _I_n_t_e_g_e_r_ _A_r_i_t_h_m_e_t_i_c_ _a_n_d_ _L_o_g_i_c_a_l_ _O_p_e_r_a_t_i_o_n_s_ 3.6
Arithmetical and logical operations always use two of the avail-
able accumulators - usually designated "source accumulator" and
"destination accumulator" - to hold the operands involved. In-
structions in this subset have the following lay-out:
OP
1 ACS ACD Code SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
In this format bit 0 is 1, bits 1 and 2 specify the source accu-
mulator, bits 3 and 4 specify the destination accumulator, bits 5
to 7 contain the operation code, bits 8 and 9 specify the action
of the shifter, see fig. 3.6, bits 10 and 11 specify the initi-
alizing value of the carry, bit 12 indicates whether the result
of the operation must be loaded into the destination accumulator
or not, and finally bits 13 to 15 specify the skip test.
All operations initiated by instructions in this subset are per-
formed by way of an arithmetic unit whose logical organisation is
illustrated in fig. 3.6:
\f
ORGANIZATION OF ARITHMETIC UNIT
17 BITS
FUNCTIONSHIFTER
GENERATOR
17 BITS
1 BIT ACS ACD
16 16SKIP SENSOR
CARRY BITSBITS
Initializer
CARRY Accumulators
1 ACD17
BIT 16 BITS BITS
LOAD NO LOAD
Figur 3.6
The instruction specifies two accumulators containing the two
operands which will have to be supplied to the function generator.
This then performs the desired function as specified in bits 5 to
7 of the instruction. In addition to the actual function result
the function generator will produce a carry bit, whose value de-
pends on three quantities: an initial value specified by the in-
struction, the input operands themselves and the function actual-
ly performed.
The initial value of the carry bit may be derived from a previous
value of same or a completely independent value may be specified
via the instruction.
The 17-bit output from the function generator - made up of the
carry bit and the 16-bit function result - is then placed in the
shifter. Here the 17-bit result can be shifted one place either
to the right or to the left; alternatively the two 8-bit halves
of the function result can be swapped without affecting the car-
ry bit. The output from the shifter can then be tested for a
skip. The skip sensor will test whether the carry bit or the
function result itself is equal to zero or not.
\f
After the skip test the output may be loaded into the carry bit
and the destination accumulator respectively. Note however that
loading is not an absolute necessity.
The diagrams below illustrate the possible actions taken by the
shifter:
Optional Shifter
Mnemonic Operation
L All bits are moved one position to the left.
Hereby bit 0 is shifted into the carry position
while the carry bit is shifted into bit 15.
C 0-15
R All bits are moved one position to the right.
Hereby bit 15 is shifted into the carry position
while the carry bit is shifted into bit 0.
C 0-15
S The two halves of the 16-bit function result
change places bit by bit. The carry bit is not
affected by this operation.
C 0-7 8-15
C 0-7 8-15
\f
The following table lists the various options available for use
with the instruction format embodying the two-accumulator
multiple operation. The characters in the column headed "Class
Abbreviation" refer to the specific fields of the instruction
format as given at the beginning of this section. The characters
in the column headed "Optional Mnemonics" are those which may
optionally by appended to the main mnemonic. The binary numbers
in the column headed "Bit Settings" show the actual bits which
will appear in the appropriate field of the instruction word.
The comments in the column headed "Operation" describe the re-
sultant action of the option in question.
\f
Class Optional Bit
A_b_b_r_e_v_i_a_t_i_o_n_ _ _ _M_n_e_m_o_n_i_c_ _ _ _S_e_t_t_i_n_g_s_ _ _ _ _ _ _ _ _ _O_p_e_r_a_t_i_o_n_ ____________
C 00 Do not initialize the carry
(Carry bit.
Preset) Z 01 Initialize the carry bit to
0.
O 10 Initialize the carry bit to
1.
C 11 Initialize the carry bit to
the complement of its
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _p_r_e_s_e_n_t_ _v_a_l_u_e_._ _ _ ___________
SH 00 Leave the result of the
(Shifter) arithmetic or logical
operation unaffected.
L 01 Combine the carry and the
16-bit result into a 17-bit
number and shift it one bit
to the left.
R 10 Combine the carry and the
16-bit result into a 17-bit
number and shift it one bit
to the right.
S 11 Exchange the two 8-bit
halves of the 16-bit result
without affecting the carry
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _b_i_t_._ _______________________
# 0 Load the result of the
(Load) shift operation into ACD.
# 1 Do not load the result of
the shift operation into
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _A_C_D_._ _______________________\f
SKIP 000 Never skip.
SKP 001 Always skip.
SZC 010 Skip if carry equal to
zero.
SNC 011 Skif if carry not equal to
zero.
SZR 100 Skip if result equal to
zero.
SNR 101 Skip if result not equal to
zero.
SEZ 110 Skip if either carry or
result equal to zero.
SBN 111 Skip if both carry and
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _r_e_s_u_l_t_ _n_o_t_ _e_q_u_a_l_ _t_o_ _z_e_r_o_._
The instruction subset pertaining to integer arithmetic and logi-
cal operations include the following instructions: ADD, SUBTRACT,
NEGATE, ADD COMPLEMENT, INCREMENT, and MOVE, all of which refer
to arithmetical operations, and the logical operations COMPLEMENT
and AND.
Integer arithmetic is performed in fixed point mode on 16-bit,
signed or unsigned operands in the accumulators. Logical opera-
tions are performed on 16-bit unstructured binary operands in the
accumulators.
\f
3_._6_._1_ _ _ _ _ _A_D_D_ 3.6.1
ADD<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACS 1 1 0 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the number in ACS is added to the number in
ACD and the result is placed in the shifter. If the addition pro-
duces a carry = 1 out of the high-order bit (bit 0) the carry bit
will be complemented, i.e. this will happen if the sum of the two
numbers being added is greater than 65,535dD10uU.
The specified shift operation is then performed and the result of
this is placed in ACD provided that the load bit of the instruc-
tion has been set to 0. If the skip test demanded results in the
condition being true the next sequential instruction will be
skipped.
\f
3_._6_._2_ _ _ _ _ _S_U_B_T_R_A_C_T_ 3.6.2
SUB<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACS 1 0 1 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the
specified value. Then the number in ACS is subtracted from the
number in ACD (the actual operation being performed by first
forming the two>s complement of the number in ACS and then adding
this to the number in ACD) and the result of the subtraction pla-
ced in the shifter. If the operation produces a carry = 1 out of
the high-order bit (bit 0) the carry bit will be complemented,
i.e. this will happen if the number in ACS is less than or equal
to the number in ACD. The specified shift operation is performed
and the result of this is placed in ACD provided that the load
bit of the instruction has been set to 0. If the skip test de-
manded results in the condition being true the next sequential
instruction will be skipped.
\f
3_._6_._3_ _ _ _ _ _N_E_G_A_T_E_ 3.6.3
NEG<c'<sh'<#'acs,acd<,skip,
= == === === ====
1 ACS ACD 0 0 1 SH C #SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the two>s complement of the number in ACS will
be formed and placed in the shifter. If the complementation pro-
duces a carry out of the high-order bit (bit 0) the carry bit
will be complemented, i.e. this happens if the number in ACS is
zero. The specified shift operation is performed and the result
of this is placed in ACD provided that the load bit of the in-
struction has been set to 0. If the skip test demanded results in
the condition being true the next sequential instruction will be
skipped.
\f
3_._6_._4_ _ _ _ _ _A_D_D_ _C_O_M_P_L_E_M_E_N_T_ 3.6.4
ADC<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACD 1 0 0 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the logical complement of the number in ACS is
added to the number in ACD and the result is placed in the shift-
er. If the addition produces a carry out of the highorder bit
(bit 0) the carry bit will be complemented, i.e. this happens if
the number in ACS is less than the number in ACD. The specified
shift operation is performed and the result is placed in ACD pro-
vided that the load bit of the instruction has been set to 0. If
the skip test demanded results in the condition being true the
next sequential instruction will be skipped.
3_._6_._5_ _ _ _ _ _M_O_V_E_ 3.6.5
MOV<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACD 0 1 0 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the number in ACS is placed in the shifter,
the specified shift operation is performed and the result of this
is placed in ACD provided that the load bit of the instruction
has been set to 0. If the skip test demanded results in the test
condition being true the next sequential instruction will be
skipped.
\f
3_._6_._6_ _ _ _ _ _I_N_C_R_E_M_E_N_T_ 3.6.6
INC<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACD 0 1 1 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the number in ACS is incremented by one and
the result is placed in the shifter. If the incrementation pro-
duces a carry out of the high-order bit (bit 0) the carry bit
will be complemented, i.e. this will happen if the number in ACS
is 177777dD8uU. The specified shift operation is performed and the
result of this placed in ACD provides that the load bit of the
instruction has been set to 0. If the skip test demanded results
in the test condition being true the next sequential instruction
will be skipped.
3_._6_._7_ _ _ _ _ _C_O_M_P_L_E_M_E_N_T_ 3.6.7
COM<c'<sh'<#z,cs,acd<,skip'
= == === === ====
1 ACS ACD 0 0 0 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. The logical complement of the binary quantity in
ACS is formed and placed in the shifter. The specified shift
operation is performed and the result of this is placed in ACD
provided that the load bit of the instruction has been set to 0.
If the skip test demanded results in the test condition being
true the next sequential instruction will be skipped.
\f
3_._6_._8_ _ _ _ _ _A_N_D_ 3.6.8
AND<c'<sh'<#'acs,acd<,skip'
= == === === ====
1 ACS ACD 1 1 1 SH C # SKIP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will first initialize the carry bit to the spe-
cified value. Then the logical "and" of the two binary quantities
in ACS and ACD is formed and placed in the shifter. Each bit pla-
ced in the shifter is 1 if and only if the two corresponding bits
in ACS and ACD respectively are both 1; in all other cases the
result bit placed in the shifter will be 0. The specified shift
operation is performed and the result of this is placed in ACD
provided that the load bit of the instruction has been set to 0.
If the skip test demanded results in the test condition being
true the next sequential instruction will be skipped.
3_._6_._9_ _ _ _ _ _E_x_a_m_p_l_e_s_ 3.6.9
To show how these different instructions may be used under vari-
ous circumstances consider the following examples:
3_._6_._9_._1_ _ _ _D_e_c_i_d_i_n_g_ _t_h_e_ _S_i_g_n_ _o_f_ _a_ _N_u_m_b_e_r_ 3.6.9.1
To determine whether an integer contained in an accumulator is
positive or negative can be done in several ways, but the most
efficient will be to use the MOVE instruction and thus the in-
herent power of the two-accumulator multiple-operation format.
\f
Assume that the number in question is contained in AC3. Use of
the instruction:
MOVL#3,3,SZC
will place the number in the shifter and shift the number one
place to the left. This will place the original sign bit in the
carry bit position and the skip test can then be used to deter-
mine whether this bit is 0 or 1. The two following instructions
in the program must of course be chosen in such a way that the
appropriate action is taken in either case.
Note that by using the optional mnemonic # the load bit is set
to 1; thus the output from the shifter will not be loaded back
into AC3 and the original number contained herein will therefore
be retained for further use.
3_._6_._9_._2_ _ _ _D_i_v_i_d_i_n_g_ _a_ _N_u_m_b_e_r_ _b_y_ _a_ _P_o_w_e_r_ _o_f_ _T_w_o_ 3.6.9.2
To divide a binary number by 2 is simply equivalent to shifting
all digits one position to the right (compare with decimal nota-
tion where division with 10 - i.e. the base - is readily acknow-
ledged to be produced by this expedient). The fact that the
rightmost bit of the original number will be discarded after the
shift means that the result of the division will be rounded down
to the nearest integer.
The division can be performed simply and efficiently by employing
the MOVE instruction as follows:
MOVL# 2,2,SZC
MOVOR 2,2,SKP
MOVZR 2,2,SKP
MOVOR 2,2,SKP
MOVOR 2,2
\f
The number being divided is supposed to be placed in AC2. The
first instruction is simply a repetition of the previous example
of deciding the sign of the number. If the number is positive the
second instruction will be skipped and operations will continue
with the third instruction. This will shift the number one place
to the right thus resulting in the division by 2, while at the
same time initializing the carry bit to 0, so that when this bit
is shifted into the sign bit position the number will remain po-
sitive. Note that after division the number is now loaded into AC2
so that this accumulator now holds the result of the division.
Finally the fourth instruction is skipped and the fifth repeats
the division once more - following which there is no further skip.
The repetition means that the end effect will be that the original
number has been divided by four. If the number is negative exactly
the same sequence of operations are performed with the appropriate
alterations to cope with the negative sign - the instructions now
in force being the second and fourth.
\f
3_._6_._9_._3_ _ _ _C_h_a_n_g_i_n_g_ _L_o_c_a_t_i_o_n_s_ _S_i_m_u_l_t_a_n_e_o_u_s_l_y_ _I_n_v_e_r_t_i_n_g_ _t_h_e_ _O_r_d_e_r_ 3.6.9.3
Assume that a block of 30dD10uU words, which at present occupy
locations 2000dD8uU to 2035dD8uU, must be moved to locations 5150dD8uU
to 5205Dd8uU in such a way that the order of the individual words
in the block will be inverted.
To do this a section of a program is set up which will autoin-
crement through one set of locations, autodecrement through the
other set and decrement a control count to determine, when the
block transfer has been completed. The program section listed
below wil accomplish this:
LDA 0,CNT ;comment: set up
STA 0,21 ; autoincrement location
LDA 0,CNT + 1 ; set up
STA 0,35 ; autodecrement location
LOOP: LDA 0, @ 21 ; get a word
STA 0, @ 35 ; store it
DSZ CNT + 2 ; count down word count
JMP LOOP ; jumb back for next word,
skip to here when count
is zero
.
.
.
CNT: 001777 ; 1 before source block
+ 1: 005206 ; 1 after destinationblock
+ 2: 36 ; word count
\f
4_._ _ _ _ _ _ _ _ _I_N_P_U_T_/_O_U_T_P_U_T_ 4.
4_._1_ _ _ _ _ _ _ _I_n_t_r_o_d_u_c_t_i_o_n_ 4.1
All useful information processing to be performed by the computer
depends on the existence of some means of communication between
the CPU and the outside world. For this purpose the CPU is con-
nected to a number of peripheral or Input/Output devices the ac-
tual type, size, and number of which is completely independent of
the internal logical structure of CPU.
The program must of course contain instructions designed to
handle the external data transfer operations; these are all nor-
mally termed Input/Output - usually shortened to I/O - operations
and allow for the transfer of information in units of bits,
bytes, words, or groups of words called "records" depending on
the device in use.
All instructions in the I/O subset are basically similar to the
previously mentioned internal transfer instructions (section 3.5)
except for the fact that addressing as such is not relevant; on
the other hand the CPU must have information as to which periph-
eral unit is to be employed for the actual data transfer and
secondly there must be instituted some means of allocating the
necessary time for the transfer.
To handle the control of peripheral devices - of which there may
be several units of widely differing types connected to the CPU
at any given time - the RC3803 CPU is equipped with a six-line
device selection network. To initiate operation on a specific de-
vice a signal must be transmitted on the selection network, but
each individual peripheral device will only respond to this sig-
nal if it is identical to the device>s own device code. The de-
vice code is a six-bit integer number corresponding to the lines
in the selection network.
\f
4_._2_ _ _ _ _ _ _ _O_p_e_r_a_t_i_o_n_ _o_f_ _I_/_O_ _D_e_v_i_c_e_s_ 4.2
In general all operations on individual I/O devices are handled
by manipulation of two control bits which are called the "Busy"
and "Done" flags respectively. If the Busy and Done flags are
both 0 the device is idle and cannot perform any operation. To
initiate operation on a device the Busy flag must be set to 1,
and if the Done flag is not already 0 it must be set to this va-
lue. When the device has finished its operation it will itself
set the Busy flag to 0 and the Done flag to 1. (If the Busy and
Done flags are both - erroneously - set to 1 the situation is
meaningless and will produce unpredictable effects.)
Thus to initiate operation on a particular device the program
must first determine whether that device is currently performing
an operation or not, i.e. it must check the state of the Busy
and Done flags. If the Busy and Done flags are 0 and 1 respective-
ly, the program will be able to start the operation by setting
Busy to 1 and Done to 0 as described above. When the operation
has been completed the device will reset the two flags and will
thus be available for another operation whenever necessary.
There are two ways in which the program can test the state of the
Busy and Done flags. One is to use the instruction I/O SKIP (cf.
section 4.6.7), the other is to employ the Interrupt System which
is standard on the RC3803.
4_._3_ _ _ _ _ _ _ _I_n_t_e_r_r_u_p_t_ _S_y_s_t_e_m_ 4.3
The interrupt system consists of an interrupt request line to
which each I/O device is connected, an Interrupt On flag in the
CPU and a 16-bit interrupt priority mask.
\f
An interrupt is initiated by an I/O device at the time when it
completes its operation and resets the Busy and Done flags; si-
multaneously the device places an interrupt request on the inter-
rupt request line provided that the bit in the interrupt priority
mask, which corresponds to the priority level on the device, is 0
(cf. section 4.4). If that particular bit of the mask is 1, the
device will still set the flags, but it will not place an inter-
rupt request on the line.
The Interrupt On flag controls the state of the interrupt system
in the sense that if the Interrupt On flag is set to 1 the CPU
will respond to the process interrupt requests; if the Interrupt
On flag is set to 0 it will not do so but will simply go on with
normal sequential execution of the program.
The CPU responds to an interrupt request by immediately setting
the Interrupt On flag to 0 so that no further interrupts can in-
terfere with the interrupt service routine. The CPU then places
the program counter in memory location 0 and executes a "jump
indirect" to memory location 1 on the underlying assumption, that
this location contains the address - direct or indirect - of the
interrupt service routine.
When control has been transferred to the interrupt service rou-
tine this routine will first ensure, that the contents of accumu-
lators to be used by the routine are saved, so that these values
again can be made available when control is eventually returned
to the program proper. The same applies to the carry bit. When
this has been accomplished the routine will determine which de-
vice requested the interrupt; following this it will proceed with
the operations relevant to the servicing of the interrupt.
The determination of which device is in need of service can be
accomplished through either the I/O SKIP instruction or the
INTERRUPT ACKNOWLEDGE instruction. This last-mentioned instruc-
tion returns the six-bit device code of the device requesting the
interrupt, thereby initiating operation of that particular device.
If more than one device has requested an interrupt, the code re-
turned will be that belonging to the device which is physically
closest to the CPU on the I/O bus.
\f
When the I/O device has completed its operation, the interrupt
service routine will restore all previously saved values, set
the Interrupt On flag to 1 and finally return control to the in-
terrupted program. For this purpose the instruction, that will
set the Interrupt On flag to 1, will allow the processor to exe-
cute one further instruction before the next interrupt can take
place. This extra instruction must be the instruction which re-
turns control to the main program; otherwise the interrupt ser-
vice routine may go into a loop. However, since the updated value
of the program counter - as related above - was placed in loca-
tion 0 upon responding to the interrupt request, the final in-
struction in the servicing routine can simply be the instruction
"JMP @ 0"; this will transfer control to the main program as in-
tended.
4_._4_ _ _ _ _ _ _ _P_r_i_o_r_i_t_y_ _I_n_t_e_r_r_u_p_t_s_ 4.4
If the Interrupt On flag remains 0 throughout the interrupt ser-
vice routine - as assumed above - all further interrupts will be
ignored and there is thus only one level of device priority. This
level of priority - i.e. which devices will be able to secure an
interrupt - will be determined either by the order in which I/O
SKIP instructions are issued or - if the INTERRUPT ACKNOWLEDGE
instruction is used - by the relative physical locations on the
I/O bus of the various devices.
If the complete computer installation embodies I/O devices of
widely differing speeds of operation - such as for example a
teletypewriter versus a fixed head disc - it can be convenient
for the programmer to set up a multi-level interrupt schedule;
this is accomplished by the use of the priority mask coupled
with the appropriate instructions.
\f
The priority mask is one 16-bit word to which the individual I/O
devices are connected in such a way, that each I/O device is as-
signed to one specific bit of the mask. The standard mask bit
assignment are arranged in such a manner, that devices having
roughly the same speed of operation will correspond to the same
bit in the mask and will therefore be on the same priority level.
(Appendix A of this manual contains - in addition to the device
codes - the standard RC mask bit assignments). Although this
standard is relevant for most purposes it is not necessary to
comply with it, and the programmer is completely free to define
his own levels of priority for the individual devices by using
the MASK OUT instruction (cf. section 4.7.5). Whenever a bit in
the priority mask is set to 1 all devices in the priority level
corresponding to that particular bit will be prevented from re-
questing an interrupt. In addition all pending interrupt requests
from devices in that priority level will be ignored.
When multi-level priority handling is implemented, the interrupt
service routine must be written in such a way that it may itself
be interrupted without damage. This is done by arranging for the
main interrupt routine to save the state of the machine, - the
contents of the four accumulators, the carry bit, and the return
address - whenever it takes over control.
The information concerned must be stored in separate locations
for each time the interrupt handler is entered, so that a higher
level of interrupt will not overlay the return information cor-
responding to a lower priority level. Having thus saved the
necessary return information the main interrupt routine must
determine which device has requested service and then transfer
control to the correct interrupt handling routine. The actual
transfer is effected in the same way as for the previously de-
scribed single-level interrupt handler.
When the correct service routine has received control it will
save the current priority mask, establish the new priority mask
and activate the interrupt system. When it has finished servi-
cing the I/O device, the routine will de-activate the interrupt
system, reset the priority mask to its original form, restore the
state of the machine, again activate the interrupt system, and
finally return control to the interrupted program.
\f
4_._5_ _ _ _ _ _ _ _D_i_r_e_c_t_ _M_e_m_o_r_y_ _A_c_c_e_s_s_ _D_a_t_a_ _C_h_a_n_n_e_l_ 4.5
The handling of data transfers under program control as described
above requires an interrupt plus the execution of several in-
structions for each word transferred and therefore occupies valu-
able time on the processor.
To avoid this and at the same time to obtain higher transfer ra-
tes the RC3803 CPU is equipped with a separate data channel
through which an I/O device - at its own request - can gain di-
rect access to main memory.
When an I/O device is ready to send or to receive data it re-
quests access to memory via the data channel. All such requests
are synchronized by the CPU at the beginning of each memory
cycle. The CPU will then pause at specified points during the
execution of an instruction; at each pause it will accept all
previously synchronized requests in which instance a word will
be transferred directly via the channel from the device to memory
or vice versa without interference with the program.
All requests are honoured in relation to the relative physical
positions on the I/O bus of the different requesting devices;
that is: the device being physically closest to the CPU is ser-
viced first, then the next closest device and so on until all
requests have been processed. As synchronization of new requests
occur continuously even while previous requests are being atten-
ded to, a device can in effect saturate the channel if it re-
quests transfer continually. All devices further out on the bus
cannot gain access to the channel until the transfers involving
the closer device have been processed, although of course devices
which are closer still on the bus will not be affected.
In addition to the pause intervals during the execution of an
instruction data channel request will be handled on completion
of an instruction. At this point furthermore, all outstanding
I/O interrupt requests will be accepted. When all such data
transfers have been accomplished the CPU will continue with nor-
mal sequential operation.
\f
4_._6_ _ _ _ _ _ _ _I_/_O_ _I_n_s_t_r_u_c_t_i_o_n_s_ 4.6
All I/O instructions use the format given below:
0 1 1 AC OP Con-
CODE trol DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
In this format bits 0, 1, and 2 are 011, bits 3 and 4 specify the
accumulator involved, bits 5 to 7 contain the operation code,
bits 8 and 9 control the Busy and Done flags in the device, and
bits 10 to 15 contain the device code. The six bits provided for
the device code will define 64dD10uU unique devices, but thetotal
number of separate devices which can be employed simultaneously
on any given installation will be slightly lower than this as
some of the available device codes are reserved for the CPU and
certain processor features. Of the remaining codes some have been
assigned to specific devices by Regnecentralen. A complete list-
ing of device codes appear in Appendix A.
The subset of I/O instructions has a number of options that can
be obtained by appending the appropriate optional mnemonic to
the standard mnemonic of the instruction. These optional mne-
monics are listed in the table below; the column headings corre-
spond to those given in section 3.6.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Class Optional Bit
A_b_b_r_e_v_i_a_t_i_o_n_ _ _ _M_n_e_m_o_n_i_c_ _ _ _S_e_t_t_i_n_g_s_ _ _ _ _ _ _ _ _ _O_p_e_r_a_t_i_o_n_ _ _ _ _ _ _ _ _ _ _ _ _
F 00 Does not affect the Busy
(Flags) and Done flags.
S 01 Start the device by set-
ting Busy = 1 and Done = 0.
C 10 Idle the device by setting
both Busy and Done to 0.
P 11 Pulse the special in-out
bus control line. The
effect - if any - depends
on the actual device.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
\f
T BN 00 Tests for Busy = 1.
(Tests) BZ 01 Tests for Busy = 0.
DN 10 Tests for Done = 1.
DZ 11 Tests for Done = 0.
________________________________________________________________
The I/O instruction subset contains the following instructions:
DATA IN A, DATA IN B, DATA IN C, DATA OUT A, DATA OUT B, DATA
OUT C, I/O SKIP, and NO I/O TRANSFER.
4_._6_._1_ _ _ _ _ _D_A_T_A_ _I_N_ _A_ 4.6.1
DIA<f' ac,device
= == ======
0 1 1 AC 0 0 1 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will place the contents of the A input buffer on
the specified device in the AC specified in the instruction.
After the data transfer has been completed the Busy and Done
flags are set as specified by "f".
The number of data bits moved depends on the size of the buffer
and the mode of operation of the device selected. Bits in the AC
not receiving any data are set to 0.
\f
4_._6_._2_ _ _ _ _ _D_A_T_A_ _I_N_ _B_ 4.6.2
DIB<f' ac,device
= == ======
0 1 1 AC 0 1 1 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will have exactly the same effect as the one
previously described - except that it will utilize the B buffer
of the peripheral device.
4_._6_._3_ _ _ _ _ _D_A_T_A_ _I_N_ _C_ 4.6.3
DIC<f' ac,device
= == ======
0 1 1 AC 1 0 1 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will have exactly the same effect as the two
previously described - except that it will utilize the C buffer
of the peripheral device.
\f
4_._6_._4_ _ _ _ _ _D_A_T_A_ _O_U_T_ _A_ 4.6.4
DOA<f' ac,device
= == ======
0 1 1 AC 0 1 0 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will place the contents of the specified AC in
the A output buffer of the selected device. After the data
transfer has been completed, the Busy and Done flags are set as
specified by "f". The contents of the AC will remain unaltered.
The number of data bits moved will depend on the size of the
buffer and on the mode of operation of the device.
4_._6_._5_ _ _ _ _ _D_A_T_A_ _O_U_T_ _B_ 4.6.5
DOB<f' ac,device
= == ======
0 1 1 AC 1 0 0 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will have exactly the same effect as the one
previously described - except that it will utilize the B buffer
of the peripheral device.
\f
4_._6_._6_ _ _ _ _ _D_A_T_A_ _O_U_T_ _C_ 4.6.6
DOC<f' ac,device
= == ======
0 1 1 AC 1 1 0 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will have exactly the same effect as the two
previously described - except that it will utilize the C buffer
of the peripheral device.
4_._6_._7_ _ _ _ _ _I_/_O_ _S_K_I_P_ 4.6.7
SKP<t' device
= ======
0 1 1 0 0 1 1 1 T DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will test the state of the Busy and Done flags
and will thus enable the programmer to decide on actions to be
taken in consequence of the values of these flags, i.e. whether
a device is in need of service from the interrupt system or not.
The test performed depends on the value of bits 8 and 9 of the
instruction and is selected by appending the appropriate op-
tional mnemonic to the instruction according to the table given
in section 4.6. If the test condition specified by "T" is true
the next sequential instruction will be skipped.
\f
4_._6_._8_ _ _ _ _ _N_O_ _I_/_O_ _T_R_A_N_S_F_E_R_ 4.6.8
NIO <f' device
= ======
0 1 1 0 0 0 0 0 F DEVICE CODE
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will set the Busy and Done flags in the selec-
ted device according to the control code specified by "F".
4_._7_ _ _ _ _ _ _ _C_e_n_t_r_a_l_ _P_r_o_c_e_s_s_o_r_ _F_u_n_c_t_i_o_n_s_ 4.7
I/O instructions with a device code of 77Dd8uU will perform a number
of special functions rather than control a specific peripheral
device. With the exception of the I/O SKIP instruction all I/O in-
structions having a device code of 77dD8uU will use bits 8 and 9 of
the instruction format to control the state of the Interrupt On
flag. The I/O SKIP instruction - when used with a device code of
77dD8uU - will cause a test of the state of the Interrupt On flag.
(Alternatively it may be used to test the state of the Power Fail
flag; see section 5.2). The optional mnemonics for these special
instructions are the same as for normal I/O instructions. The
table below lists the resulting actions for these instructions
when used with the special device code 77dD8uU.
\f
_ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ _ _ __ __ ___
Class Optional Bit
A_b_b_r_e_v_i_a_t_i_o_n_ _ _ _M_n_e_m_o_n_i_c_ _ _ _S_e_t_t_i_n_g_s_ _ _ _ _ _ _ _ _ _O_p_e_r_a_t_i_o_n_ ____________
F 00 Does not affect the state
(Flags) of the Interrupt On flag.
S 01 Set the Interrupt On flag
to 1.
C 10 Set the Interrupt On flag
to 0.
P 11 Does not affect the state
of the Interrupt On flag.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ___________________________
T BN 00 Tests for Interrupt On = 1.
(Tests) BZ 01 Tests for Interrupt On = 0.
DN 10 Tests for Power Fail = 1.
DZ 11 Tests for Power Fail = 0.
________________________________________________________________
In addition to use of the ordinary I/O instructions with the spe-
cial device code 77dD8uU, there is a subset of special instructions
for processor functions which contains the following instruc-
tions: INTERRUPT ENABLE, INTERRUPT DISABLE, READ SWITCHES,
INTERRUPT ACKNOWLEDGE, MASK OUT, I/O RESET, HALT, and CPU SKIP.
\f
4_._7_._1_ _ _ _ _ _I_N_T_E_R_R_U_P_T_ _E_N_A_B_L_E_ 4.7.1
INTEN
NIOS CPU
0 1 1 0 0 0 0 0 0 1 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will set the Interrupt On flag to 1. If
the state of the Interrupt On flag is hereby changed, the CPU
will allow one more instruction to be executed before the first
I/O interrupt can occur.
4.7.2
4_._7_._2_ _ _ _ _ _I_N_T_E_R_R_U_P_T_ _D_I_S_A_B_L_E_
INTDS
NIOC CPU
0 1 1 0 0 0 0 0 1 0 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will set the Interrupt On flag to 0.
\f
4_._7_._3_ _ _ _ _ _R_E_A_D_ _S_W_I_T_C_H_E_S_ 4.7.3
READS ac (F = 00)
==
DIA <f' ac,CPU
= ==
0 1 1 AC 0 0 1 F 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will place the current setting of the
data switches on either the Diagnostic Front Panel (if connected)
or the front frame of the CPU-board in the AC specified in the
instructions. After the transfer has been completed, the Interrupt
On flag is set according to the control code specified by "F".
4_._7_._4_ _ _ _ _ _I_N_T_E_R_R_U_P_T_ _A_C_K_N_O_W_L_E_D_G_E_ 4.7.4
INTA ac (F = 00)
==
DIB <f' ac,CPU
= ==
0 1 1 AC 0 1 1 F 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will cause the six-bit device code of
that device, which is physically closest to the CPU on the I/O
bus, to be placed in bits 10 to 15 of the AC specified in the
instructions. Bits 0 to 9 of the AC involved will be set to 0.
After the transfer has been completed the Interrupt On flag is
set according to the control code specified by "F".
\f
4_._7_._5_ _ _ _ _ _M_A_S_K_ _O_U_T_ 4.7.5
MSKO ac (F = 00)
==
DOB <f' ac,CPU
= ==
0 1 1 AC 1 0 0 F 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will place the contents of the AC speci-
fied in the priority mask. After the transfer has been completed,
the Interrupt On flag is set according to the control code speci-
fied by "F". The contents of the AC remain unaltered.
N_O_T_E_:
The digit 1 in any bit position disables interrupt re-
quests from any peripheral device in the corresponding
priority level.
4_._7_._6_ _ _ _ _ _I_/_O_ _R_E_S_E_T_ 4.7.6
IORST (F = 10)
DIC <f' ac,CPU
= ==
0 1 1 AC 1 0 1 F 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will cause the Busy and Done flags in
all I/O devices to be set to 0; simultaneously all bits in the
16-bit priority mask are set to 0. The Interrupt On flag is set
according to the control code specified by "F".
\f
4_._7_._7_ _ _ _ _ _H_A_L_T_ 4.7.7
HALT (F = 00)
DOC <f' ac,CPU
= ==
0 1 1 AC 1 1 0 F 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This set of instructions will set the Interrupt On flag accord-
ing to the control code specified by "F". Following this the pro-
cessor is stopped.
4_._7_._8_ _ _ _ _ _C_P_U_ _S_K_I_P_ 4.7.8
SKP <t', CPU
=
0 1 1 0 0 1 1 1 T 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will cause the Interrupt On flag or the Power
Fail flag to be tested depending on the control code specified
by "T". If the test condition is true the next sequential in-
struction will be skipped.
\f
F_5_._ _ _ _ _ _ _ _ _P_R_O_C_E_S_S_O_R_ _F_E_A_T_U_R_E_S_ 5.
5_._1_ _ _ _ _ _ _ _I_n_t_r_o_d_u_c_t_i_o_n_ 5.1
Features included in the RC3803 computer are a power monitor
which will handle automatic shut-down and restart in the event of
a failure of the power supply, a special CPU function allowing
memory to be extended beyond the 32K words> capacity, and an ex-
tended instruction set containing the time consumption routines
in the RC3600 software.
The extended instruction set covers a set of micro-programmed
monitor-procedures.
Each procedure is described in details using a pseudo-language
notation as explained below.
A micro-programmed monitor-procedure is in fact one instruction
possibly interrupted by interrupt or DMA-request.
When finished request the procedure is restarted, that is the
instruction is executed once again. If then terminated the next
instruction is executed as usual. This formalisme is described
using the pseudo-functions fetchnext and serverequest:
Fetchnext: The actual value of the instruction counter PC is
incremented and the next instruction is fetched
from the memory word addressed in PC.
Serverequest: The actual value of the instruction counter PC is
decremented and the request sevice is entered. When
finished the serviceroutine includes a call of
fetchnext, hereby initiating execution of the ac-
tual instruction once again. Please refer to sec-
tion 4.3 for more details.
The notation used in describing the implemented procedures and
the examples given are related to those given in the system manu-
al >MUS SYSTEM, Programming Guide, Rev. 1.00>, with the follow-
ing notice:
CUR = Current process description address.
PC = Program Counter (instruction counter). \f
5_._2_ _ _ _ _ _ _ _P_o_w_e_r_ _F_a_i_l_ 5.2
Core memory in the RC3803 computer is of magnetic type and in-
formation stored in it is therefore independent of power supply
and will be retained unaltered for a very considerable time in
event of the power supply being cut off. The same does not, how-
ever, apply to the accumulators, program counter, various flags,
etc. in the CPU; all values in these components will be indeter-
minate following a break in the supply of power. The Power Fail
feature provides the capability to overcome this difficulty.
In the event of an unexpected power failure the voltage will
rapidly decrease from its normal value to the value where the
processor automatically shuts down completely. There will however
be an interval of time - roughly one or two milliseconds -
between the initial drop-off of voltage and the actual shut-down.
The Power Fail circuit will sense the beginning reduction of
voltage, set the Power Fail flag and request an interrupt. The
interrupt service routine will then be able to utilize the inter-
val before shut-down to store the contents of the accumulators,
the carry bit, and the current priority mask in memory. In addi-
tion to this it will save memory location 0, where it will store
a jump instruction to the desired restart location and finally it
will execute a HALT. As one or two milliseconds is sufficient
time to execute up to 1500 instructions there is ample time to
perform the power fail routine.
When the power supply is again restored, the CPU will execute a
"JMP 0" instruction after an interval of 100 milliseconds. This
will effect a restart of the interrupted program.
The power fail feature has no device code and no interrupt dis-
able bit in the priority mask. Neither does it respond to the
INTERRUPT ACKNOWLEDGE instruction. The Power Fail flag can be
tested by means of the CPU SKIP instruction as described in sec-
tion 4.7.8.
\f
5_._3_ _ _ _ _ _ _ _M_E_M_O_R_Y_ _E_X_T_E_N_S_I_O_N_ 5.3
Normal memory capacity of the RC3803 computer is 32K words (64K
bytes). The Memory Extension feature provides the capability to
increase this capacity to 64K words (128K bytes).
To switch from running in normal configuration to running in ex-
tended memory configuration the following instruction must be ap-
plied:
DICP ac, 1
==
0 1 1 XX 1 0 1 1 1 0 0 0 0 0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
This instruction will allow the CPU to utilize the extra block
of core memory and it will furthermore set the Memory Extension
flag to 1. For the instruction to have the desired effect the
switch 64K/128K BYTES on the front frame of the CPU-board must
be in the 128K BYTES position; otherwise the instruction is dum-
my.
The state of the Memory Extension flag can be tested with the I/O
SKIP instruction using the device code (001) reserved for the
Extended Memory (see Appendix A). The testing of the flag thus
follows through the instruction:
SKPDN 1
0 1 1 0 0 1 1 1 1 0 0 0 0 0 0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
As usual with this instruction the next sequential instruction
will be skipped if the test condition is true, i.e. if the Memory
Extension flag is 1.
\f
If the 64K/128K BYTES switch on the front panel is returned to
the 64K BYTES position the Memory Extension flag is n_o_t_ automati-
cally set back to 0 (although the CPU no longer will be able to
utilize the extended memory block). To return the Memory Extension
flag to 0 an I/O RESET instruction must be used. The flag will
also be set to 0 following a power up.
The CPU can execute programs placed in all 128K bytes, because
Multi-level indirect addressing is disabled, when Memory Extension
is selected.
The Disc Controller is capable of writing data into and reading
data from the extended area of memory.
N_O_T_E_: It is important to be aware of the fact, that when
Memory Extension is applied the program counter will
continue from 77777dD8uU to 100000dD8uU in the course of
normal sequential operation.
5_._4_ _ _ _ _ _ _ _C_P_U_ _I_D_E_N_T_I_F_Y_ 5.4
IDFY ac
==
0 1 1 AC 0 0 1 0 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction loads a microprogram revision number (2 for
RC3803) into the accumulator selected in the AC-field.
5_._5_ _ _ _ _ _ _ _B_y_t_e_ _M_a_n_i_p_u_l_a_t_i_o_n_ 5.5
In addition to performing operations on structured and unstruc-
tured 16-bit quantities, the instruction set of the RC3803 allows
loading and storing of 8-bit bytes.
\f
5_._5_._1_ _ _ _ _ _L_O_A_D_ _B_Y_T_E_ 5.5.1
LDB
0 1 1 0 0 1 0 1 1 0 0 0 0 0 0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CALL: RETURN:
; AC0 - AC0(0:7):=0; AC0(8:15):= BYTE
; AC1 FROM BYTEADDRESS UNCHANGED
; AC2 - UNCHANGED
; AC3 - UNCHANGED
The 8-bit byte addressed by the byte pointer contained in AC1 is
placed in bits 8-15 of the AC0. Bits 0-7 of the AC0 are set to 0.
The contents of AC2 and AC3 remain unchanged.
The byte address in AC1 is a word address left shifted one and
with a one added in bit 15 if the byte addressed within the word
is placed in bit 8:15.
\f
5_._5_._2_ _ _ _ _ _S_T_O_R_E_ _B_Y_T_E_ 5.5.2
STB
0 1 1 0 0 1 1 0 1 0 0 0 0 0 0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CALL: RETURN:
; AC0 AC0(8:15):= BYTE UNCHANGED
; AC1 TO BYTEADDRESS UNCHANGED
; AC2 - UNCHANGED
; AC3 - UNCHANGED
Bits 8-15 of AC0 are placed in the byte addressed by the pointer
contained in AC1. Bits 0-7 of AC0 are don>t care and not affect-
ed.
The contents of AC2 and AC3 remain unchanged. Note that the re-
maining part of the word addressed is untouched.
The byte address in AC1 is a word address left shifted one and
with a one added in bit 15 if the byte addressed with the word
placed in bit 8:15.
\f
5_._6_ _ _ _ _ _ _ _B_Y_T_E_ _M_O_V_E_ 5.6
BMOVE
0 1 1 XX 1 0 1 0 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 CONVERT ADDR. CONVERT ADDR
; AC1 FROM ADDR. FROM ADDR + BYTE COUNT + 1
; AC2 TO ADDR. TO ADDR + BYTE COUNT + 1
; AC3 BYTE COUNT ZERO
This instruction moves a byte string from the byte address speci-
fied in AC1 to the byte address specified in AC2. The number of
bytes to be moved is specified in AC3. If AC0 <' 0 the moved byte
is converted via a table addressed by AC0.
The byte addresses in AC1, AC2, and AC0, are word addresses
shifted one and with a one added in bit 15 if a right byte is ad-
dressed. \f
The instruction may be interrupted by interrupt request and data
channel request following the algorithme:
START, ; BMOVE :
LOOP: If bytecount = 0 then goto EXIT else
begin
Q:= byte (fromaddr)
If convertaddr <' 0
then Q:= byte (Q + convertaddr) ;
byte (toaddr):= Q
fromaddr := fromaddr + 1 ; Update AC1
toaddr := toaddr + 1 ; Update AC2
bytecount := bytecount -1 ; Update AC3
end ;
TEST: If (INT REQ or DMA REQ) = 0
then goto LOOP
WAIT: Servereq (PC) ; Dcr. prog. counter and
serve req.
EXIT: Fetchnext (PC) ; Incr. prog. counter and
exec. instr.
5_._7_ _ _ _ _ _ _ _W_O_R_D_ _M_O_V_E_ 5.7
WMOVE
0 1 1 XX 1 0 1 0 1 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 WORD COUNT ZERO
; AC1 FROM ADDR. FROM ADD + WORD COUNT + 1
; AC2 TO ADDR. TO ADDR + WORD COUNT + 1
; AC3 - UNCHANGED
\f
This instruction moves a word string from the address in AC1 to
the address in AC2. The number of words to be moved is specified
in AC0.
The instruction may be interrupted by interrupt and data channel
request following the algorithme:
START, ; WMOVE :
LOOP: If wordcount = 0 then goto EXIT else
begin
Q:= word (fromaddr)
word (toaddr):= Q
fromaddr := fromaddr + 1 ; Update AC1
toaddr := toaddr + 1 ; Update AC2
wordcount := wordcount -1 ; Update AC0
end ;
TEST: If (INT REQ or DMA REQ) = 0
then goto LOOP
WAIT: Servereq (PC) ; Decr. PC and serve req.
EXIT: Fetchnext (PC) ; Incr. PC and exec instr.
5_._8_ _ _ _ _ _ _ _S_E_A_R_C_H_ _I_T_E_M_ 5.8
SCHEL
0 1 1 XX 1 0 1 1 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 - DESTROYED
; AC1 CHAINHEAD DESTROYED
; AC2 NAMEADDR ELEMENT
; AC3 - CUR \f
This instruction searches the chain for an element with a given
name and delivers the address of the element, if found, and a
zero if the name is not found in the chain. The chain-datastruc-
ture is illustrated in fig. 5.8.
N_A_M_E_A_D_D_R_ NAME(0)
NAME(1)
NAME(2)
RECORD CHAIN DESCRIPTOR
C_H_A_I_N_H_E_A_D_ + 0
+ 1
CHAINHEAD.CHAIN + 2
END;
1.ITEM 2.ITEM LAST ITEM
RECORD ITEMHEAD
ITEM + 0
+ 1
ITEM.CHAIN + 2
+ 3
ITEM.NAME(0) + 4
ITEM.NAME(1) + 5
ITEM.NAME(2) + 6
END;
E_L_E_M_E_N_T_ =ITEM
EXAMPLE: Search by name through the DOMUS - coreitemchain.
Figur 5.8
\f
The instruction may be interrupted by interrupt and data channel
request following the algorithme:
START: element:= CHAINHEAD ; SCHEL:
LOOP: element:= word (element.chain) ; AC3:= next element
If element = 0 then goto EXIT
Q:= word (nameaddr)
Q1:= word (element.name) ; Compare 1. word
If Q <' Q1 then goto TEST ; in name
Q:= word (nameaddr + 1)
Q1:= word (element.name + 1) ; Compare 2. word
If Q <' Q1 then goto TEST ; in name
Q:= word (nameaddr + 2)
Q1:= word (element.name + 2) ; Compare 3. word
If Q <' Q1 then goto TEST ; in name
Goto EXIT
TEST: CHAINHEAD:= element ; Saved work value for use
If (INT REQ or DMA REQ) = 0 ; when restarted after int.
then goto LOOP
WAIT Servereq (PC) ; Dcr. PC and servereq
Fetchnext (PC) ; Incr. PC and exec instr.
; *
EXIT: AC2:= element ; AC2:= AC3
AC3:= CUR ; AC3:= CUR,
Fetchnext (PC) ; Incr. PC and exec. instr.
* When served request a fetch results in executing the
current instruction (PC unchanged) once again with a
probably changed set of registers if so specified in the
microprogrammed instruction just interrupted.
\f
5_._9_ _ _ _ _ _ _ _S_E_A_R_C_H_ _F_R_E_E_ 5.9
SFREE
0 1 1 XX 1 0 1 1 1 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 - UNCHANGED
; AC1 - UNCHANGED
; AC2 START ELEMENT FREE ELEMENT
; AC3 - UNCHANGED
This instruction searches a chain for a free element and delivers
it if present, and a zero if not found. The chain-datastructure
is illustrated in fig 5.9.
S_T_A_R_T_ _E_L_E_M_E_N_T_
C_H_A_I_N_H_E_A_D_.CHAIN
1.BUF- 2.BUF- 3.BUF-
RECORD BUFFERHEAD FER FER FER
B_U_F_F_E_R_ +0
+1
BUFFERCHAIN +2
+3 ..
+4
BUFFER.RECEIVER 0 +5 <' 0 0
END;
ELEMENT:= BUFFER
EXAMPLE: The MUS-buffer chain is searched for a free buffer
starting from the one addressed in >START ELEMENT>.
Figur 5.9
\f
The instruction may be interrupted by interrupt and data channel
request following the algorithme:
START: element:= start element ; SFREE:
LOOP: If element = 0 then goto EXIT
Q:= word (element. receiver)
If Q = 0 then goto EXIT ; AC2:=
element:= element.chain ; Next element;
TEST: If (INT REQ or DMA REQ) = 0
then goto LOOP
WAIT: Servereq (PC) ; Dcr. PC and serve req.
EXIT: Fetchnext (PC) ; Incr. PC and exec instr.
5_._1_0_ _ _ _ _ _ _P_R_O_C_E_S_S_ _L_I_N_K_ 5.10
LINK
0 1 1 XX 1 1 0 0 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL:
; AC0 - DESTROYED
; AC1 QUEUEHEAD QUEUEHEAD
; AC2 NEW ELEMENT NEW ELEMENT
; AC3 - QUEUEHEAD \f
This instruction links an element to the end of a queue.
A queue consists of one or more queue elements. One of the
elements is the queue head as shown in fig 5.10.
a_ _I_n_i_t_:
N_E_W_ _E_L_E_M_E_N_T_
(neutral)
QUEUHEAD 1.EVENT 2.EVENT
RECORD EVENTHEAD
EVENT.NEXT
EVENT.PREV
END
b_ _I_n_s_e_r_t_e_d_: QUEUEHEAD 1.EVENT 2.EVENT 3.EVENT
(NEWELEMENT)
EXAMPLE: Bufferinsertion in the MUS-eventqueue of a process.
Figur 5.10: a+b \f
The instruction executes the following algorithme:
; LINK:
START: element:= new element ; Update
oldtail:= word (HEAD.prev) ; Link element
word (HEAD.prev):= element ;
word (element.next):= HEAD
word (element.prev):= oldtail
word (oldtail.next):= element
EXIT: Fetchnext (PC) ; Incr. PC and exec instr.
5_._1_1_ _ _ _ _ _ _P_R_O_C_E_S_S_ _R_E_M_O_V_E_ 5.11
REMEL
0 1 1 XX 1 1 0 0 1 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 - PREDECESSOR
; AC1 - UNCHANGED
; AC2 OLD ELEMENT OLD ELEMENT
; AC3 - SUCCESSOR
\f
This instruction removes an element from a queue as shown in fig.
5.11.
QUEUEHEAD OLD ELEMENT
a_ _I_n_i_t_:
b_ _R_e_m_o_v_e_d_:
REMOVED
OLD ELEMENT
Figur 5.11: a + b
\f
The instruction executes the following algorithme:
START: element:= old element ; REMEL:
successor: word (element.next) ; Update gueue:
predecessor:= word (element.prev)
word (predecessor.next):= successor
word (successor.prev):= predecessor ; Remove element
word (element.next):= element
word (element.prev):= element
EXIT: Fetchnext (PC) ; Incr. PC and exec. instr.
5_._1_2_ _ _ _ _ _ _P_R_O_C_E_S_S_ _L_I_N_K_ _P_R_I_O_R_I_T_Y_ 5.12
PLINK
0 1 1 XX 1 1 0 1 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
; AC0 - DESTROYED
; AC1 - QUEUE HEAD
; AC2 PROCESS PROCESS
; AC3 - QUEUE HEAD
\f
This instruction links a process to the running queue as the last
process among processes of same priority.
QUEUEHEAD LAST
(prior)
54dD8uU
+ 15dD8uU
Inserted
LAST:= Last element in
the queue with P_R_O_C_E_S_S_
priority greather (neutral)
than or egual to
that of PROCESS
PROCESS.prior + 15Dd8uU
The QUEUEHEAD is itself an active element and points out first
process in the running queue, that is - current process. If
neutral - an empty queue - the first element (the head) points
out itself: the dummy process.
Figur 5.12
\f
The instruction may be interrupted by interrupt and data chan-
nel request following the algorithme:
; PLINK:
START: word (PROC.state):= 0 ; Proc state:= runnig
priority:= word (Proc.prior) ; ACO:= proc.priority
HEAD:= word (54dD8uU) ; HEAD:= running queue head
element:= HEAD ; AC3:= HEAD
LOOP: element:= word (element.next) ; AC3:= next element
Q:= word (element.prior) ; AC1:= priority of next
If Q < priority then goto EXIT
TEST: If (INT REQ or DMA REQ) = 0
then goto LOOP
WAIT: Servereq (PC) ; Dcr. PC and servereq
Fetchnext (PC) ; Incr. PC and exec instr.
EXIT: predecessor:= word (element.prev) ; Update queue
word (element.prev):= proc ;
word (proc.next):= element ; insert dement.
word (proc.prev):= predecessor ;
word (predecessor.next):= proc ;
Fetchnext (PC) ; Incr. PC and exec.instr.
\f
5_._1_3_ _ _ _ _ _ _I_N_S_T_R_U_C_T_I_O_N_ _F_E_T_C_H_ _(_M_U_S_I_L_)_ 5.13
FETCH
0 1 1 XX 1 1 0 1 1 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
;AC0 - DESTROVED
;AC1 - DESTROVED
;AC2 CUR CUR
;AC3 - UNCHANGED
This instruction decodes MUSIL-instructions and performs a vector
jump as shown in fig. 5.13. The MUSIL instruction-counter (deno-
M_M_m_ ted MPC) is found + 33 relative to current process description
P_p_p_ 8
P_P_p_ address CUR.
M_m_m_
Instruction address table.
Current instruction (PC) + 0
+ 1
+ 2
x + 3
+ 4
.
.
M_M_m_
MPC: MUSIL program counter, word (CUR.33 )
P_P_p_ 8
M_M_m_ DISP: (word(MPC) shift(-8)) and 377
P_P_p_ 8
EXAMPLE: DISP - vector jump to the MUSIL-instruction pointed out
by x above (DISP = 3)
Figur 5.13
\f
This instruction executes the following algorithme:
; FETCH:
M_M_m_ START: ; Fetch MPC:= word (CUR.33 )
P_P_p_ 8
Q:= word MPC ; Q = word (MPC) = next instruction;
Incr. MPC ; Increment MPC
M_M_m_ Result:= Q and 337 ; Decode instruction:
P_P_p_ 8
Q:= Q-result
DISP:= Q shift (-8) ; DISP:= word (MPC) (0:7)
EXIT: PC:= word (PC + DISP) ; Modify PC
Fetchnext (PC) ; Incr. PC and exec instr.
5_._1_4_ _ _ _ _ _ _T_A_K_E_ _A_D_D_R_E_S_S_ _(_M_U_S_I_L_)_ 5.14
TKADD
0 1 1 XX 1 1 1 0 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
;AC0 MODIFBITS MODIFBITS SHIFT (-2)
;AC1 - ADDRESS
;AC2 CUR CUR
;AC3 - DESTROYED \f
This instruction supplies the ADDR of an integer or string addressed
by the MUSIL PC (MPC) and increments MPC.
Integer, MODIF(14:15) = 00: Addr := Word (MPC) ;
String, - - - = 01: - - - - ;
File, - - - = 10: - - - - ;
Mfield,* - - - = 11: Addr := word (zone.zfirst) + Field (8:15),
zone = word (CUR.zn + Field (0:7))
*zonerecordfield
Field = word (MPC)
The instruction executes the following algorithme:
; TKADD:
START: ; Fetch MPC:= word (CUR.33Dd8Uu)
address:= word (MPC) ; Update AC1;
incr. MPC ; Increment MPC
If modif (14:15) = 3 then
begin
Q:= address and 377Dd8Uu ; Update AC1:
address:= (address -Q) shift (-8)
Q1:= address + cur ; Q1:= Cur + address (0:7)
Q1:= word (Q1.Zn) ; Zone:= word (Q1.Zn)
Q1:= word (Q1.zfirst) ; Q1:= word (zone.zfirst)
address:= Q1+Q ; Update AC1
end ; ADDRESS = Q1 + address (8:15)
EXIT: Modif:= modif shift (-2) ; Update AC0: modif shift (-2);
Fetchnext (PC) ; Incr. PC and exec. instr.
\f
5_._1_5_ _ _ _ _ _ _T_A_K_E_V_A_L_U_E_ _(_M_U_S_I_L_)_ 5.15
TKVAL
0 1 1 XX 1 1 1 0 1 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
CALL: RETURN:
;AC0 MODIFBITS MODIFBITS SHIFT (-2)
;AC1 - VAL
;AC2 CUR CUR
;AC3 - UNCHANGED
This instruction returns the value of an integer in MUSIL.
MODIF (14:15): 00 VAL = WORD (MPC)
- - : 01 VAL := R
- - : 10 VAL := WORD (WORD (MPC))
- - : 11 VAL := R
M_M_m_ R= word (CUR.32 ), the interpreter register
P_P_p_ 8 \f
This instruction is executed in following the algorithme:
; TKVAL:
START:If modif and (14:15) = 0 then
begin ; Case modif 0:
VAL:= word (MPC) ; AC1:= value
incr MPC
goto EXIT ; Increment MPC;
end
If modif (15) = 1 then ; Case modif 1 or 3:
begin
VAL:= R ; AC1:= value;
goto EXIT
end
; Case modif 2 :
Q:= word (MPC)
VAL:= word (Q) ; AC1:= value
incr MPC ; Increment MPC;
EXIT: Modif:= modif shift (-2) ; Update AC0;
Fetchnext (PC) ; Incr. PC and exec. instr.
\f
5_._1_6_ _ _ _ _ _ _C_O_M_P_A_R_E_ _B_y_t_e_ _S_t_r_i_n_g_s_ 5.16
COMP
0 1 1 XX 1 1 1 1 0 0 0 0 0 1 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
X = DON>T CARE
This instruction compares two byte strings and returns:
RESULT = byte (STR ADDR1 + x) - byte (STR ADDR2 + x),
if the strings differ in position x else zero.
CALL: RETURN:
;AC0 COUNT RESULT (R<0, R=0, R'0)
;AC1 STR ADDR1 UNDEFINED
;AC2 STR ADDR2 UNDEFINED
;AC3 - DESTROYED
\f
The instruction may be interrupted by interrupt and data channel
request following the algorithme:
START, ; COMP:
LOOP: If count = 0 then goto EXIT else
begin
Q1:= byte (str addr1)
Q2:= byte (str addr2)
If Q1 <' Q2 then
begin
count:= Q1-Q2 ; Update AC0;
goto EXIT
end
str addr1:= str addr1 + 1 ; Update: AC1
str addr2:= str addr2 + 1 ; - AC2
count:= count -1 ; - AC0;
end;
TEST: If (INT REQ or DMA REQ) = 0
then goto LOOP
WAIT: Servereq (PC) ; Decr. PC and servereq
Fetchnext (PC) ; Incr. PC and exec instr.
EXIT: RESULT:= count ; Update AC0,
Fetchnext (PC) ; Incr. PC and exec instr.
\f
6_._ _ _ _ _ _ _ _ _P_R_O_C_E_S_S_O_R_ _O_P_T_I_O_N_S_ 6.
The RC3803 CPU can be equipped with the following optional fea-
tures: a Real Time Clock and a Teletype Controller.
6_._1_ _ _ _ _ _ _ _R_e_a_l_ _T_i_m_e_ _C_l_o_c_k_ 6.1
The Real Time Clock generates a continuous sequence of pulses
independently of processor timing. The clock can be used prima-
rily for low resolution timing as compared to processor speed,
but it has a high long-term accuracy.
Following a power turn-on the various frequencies are only avail-
able after an interval of 5 seconds, because the crystal must be
given this amount of time to settle down after excitation in or-
der to emit a steady pulse train.
Selection of clock frequency is accomplished by means of the I/O
instruction DATA OUT A, Real Time Clock:
DOA <f' ac,RTC
= ==
0 1 1 AC 0 1 0 F 0 0 1 1 0 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will select the clock frequency according to
the values of bits 14 and 15 in the specified AC as listed
below:
AC bits 14 & 15: 00 01 10 11
Frequency: 50 Hz 10 Hz 100 Hz 1000 Hz
In addition the instruction will cause the Busy and Done flags
to be set according to the control code specified by "F" (cf.
section 4.6). Setting the Busy flag by means of this instruction
will allow the next pulse from the clock to set Done thus re-
questing an interrupt if the Interrupt On flag is 1.
\f
The interrupt priority level of this device is associated with
bit 13 of the interrupt priority mask.
The DATA OUT A instruction applied to select the clock frequency
is needed only once. The first interrupt after this instruction
has set Busy = 1 can come at any time up to the clock frequency,
but once the first interrupt has appeared the following interrupts
will adhere to the selected frequency - provided that the program
sets Busy = 1 before the next interrupt is due. This is done by
the instruction:
NIOS 14.
The I/O RESET instruction will - whether it appears in the pro-
gram or is generated by using the Diagnostic Front Panel - reset
the clock to a frequency of 50 Hz.
6_._2_ _ _ _ _ _ _ _T_e_l_e_t_y_p_e_ _C_o_n_t_r_o_l_l_e_r_ 6.2
The Teletype Controller provides for two-way communication be-
tween the computer and the operator. The input device is the
Teletype keyboard and the output device is the Teletype printer.
All information exchanges between the computer and the keyboard/
printer use a subset of the 128 character alphanumeric ASCII code
as listed in Appendix B. In addition to a keyboard and a printer,
some models of the Teletype terminal can be equipped with a paper
tape reader/punch combination. Terminals so equipped are designated
Automatic Send/Receive (ASR) terminals, while those not so equipped
are designated Keyboard Send/Receive (KSR) terminals.
6_._2_._1_ _ _ _ _ _I_n_s_t_r_u_c_t_i_o_n_s_ 6.2.1
Since the terminal is in effect two peripheral devices coupled
together, the controller contains both an input buffer and an
output buffer. These buffers are independent of one another and
are both 8 bits in length.
Similarly two completely separate sets of Busy and Done flags
are available for input and output operations respectively.
\f
The Busy and Done flags are controlled by means of the two stan-
dard device flag commands in the instructions according to the
following list:
"F" = S Sets Busy = 1 and Done = 0 and either reads a charac-
ter into the input buffer or transfers a character in
the output buffer to the printer (or the punch).
"F" = C Sets Busy = 0 and Done = 0 thereby stopping all data
transfer operations. This command - if issued while a
transfer is in process - will result in partial
reception of the character code being transferred.
"F" = P No effect.
The instructions used to read the character buffer and to load
the character buffer are the standard I/O instructions with the
appropriate device codes. An extract of Appendix A containing
these codes appear below:
Octal
Code Mnemonic Maskbit Device
10 TTI 14 Teletype input, first controller
11 TT0 15 Teletype output, first controller
50 TTI1 14 Teletype input, second controller
51 TT01 15 Teletype output, second controller
\f
6_._2_._1_._1_ _ _ _R_E_A_D_ _C_H_A_R_A_C_T_E_R_ _B_U_F_F_E_R_ 6.2.1.1
DIA <f' ac,TTI
= ==
0 1 1 AC 0 0 1 F 0 0 1 0 0 0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will place the contents of the input buffer in
bits 8 to 15 of the AC specified in the instruction. Bit 8 is a
parity check bit while bits 9 to 15 contain the character code
proper. Bits 0 to 7 of the AC are all set to 0.
After the data transfer has been completed the controller>s Busy
and Done flags for input are set according to the control code
specified by "F".
6_._2_._1_._2_ _ _ _L_O_A_D_ _C_H_A_R_A_C_T_E_R_ _B_U_F_F_E_R_ 6.2.1.2
DOA <f' ac,TTO
= ==
0 1 1 AC 0 0 1 F 0 0 1 0 0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
This instruction will place bits 9 to 15 of the specified AC in
the output buffer of the controller. After the transfer has been
completed the controller>s Busy and Done flags for output are set
according to the control code specified by "F". The contents of
the AC specified in the instruction will remain unaltered.
\f
6_._2_._2_ _ _ _ _ _P_r_o_g_r_a_m_m_i_n_g_ 6.2.2
On account of the two-sided nature of the Teletype terminal this
section will describe input and output procedures separately.
6_._2_._2_._1_ _ _ _I_n_p_u_t_ 6.2.2.1
Input operations - whether full- or half-duplex - do not have to
be initialized by the program because the striking of a key on
the keyboard automatically will transmit the corresponding char-
acter code to the controller. When the character has been assem-
bled the input Busy flag is set to 0, the input Done flag is set
to 1 and a program interrupt consequently requested - provided
that the priority mask bit is 0.
The character can then be read by issuing the READ CHARACTER
BUFFER instruction (DIA). The instruction should be issued with
either a C or an S command so that the input Done flag is set to
0; this will allow the controller to initiate a further program
interrupt request when the next character has been fully assembled.
6_._2_._2_._2_ _ _ _O_u_t_p_u_t_ 6.2.2.2
Output operations are initiated by the program using the LOAD
CHARACTER BUFFER instruction (DOA). The instruction should be
issued with an S command, which will set the Busy flag to 1 and
allow the transmitting of the character to the terminal. When the
transmission has been completed the output Busy flag is set to 0
and the output Done flag is set to 1 thus issuing a program in-
terrupt request.
The output buffer must be reloaded by means of the LOAD CHARACTER
BUFFER instruction every time a character is to be sent to the
terminal. Thus to transmit a multi-character message a sequence
of LOAD CHARACTER BUFFER instructions with S commands must be
issued. The program must make allowance for complete transmission
of every single character before transmission of the next char-
acter is initiated. \f
6_._2_._3_ _ _ _ _ _P_r_o_g_r_a_m_m_i_n_g_ _E_x_a_m_p_l_e_s_ 6.2.3
The following examples show sections of programs which will
handle character operations involving the Teletype keyboard,
printer, paper tape reader, and paper tape punch.
Example 1 reads a character from the Teletype keyboard, example
2 reads a character from Tape reader, and example 3 prints a
character on the Teletype printer and - if the tape punch on an
ASR terminal is turned on - simultaneously punches the character
on the tape.
6_._2_._3_._1_ _ _ _E_x_a_m_p_l_e_ _1_ 6.2.3.1
SKPDN TTI ;Character buffer loaded yet?
JMP .-1 ;No
DIAC 1,TTI ;Read character and clear Done
flag
6_._2_._3_._2_ _ _ _E_x_a_m_p_l_e_ _2_ 6.2.3.2
NIOS TTI ;Start reader
SKPDN TTI ;Frame buffer loaded yet?
JMP .-1 ;No
DIAC 1,TTI ;Read frame and clear Done flag
6_._2_._3_._3_ _ _ _E_x_a_m_p_l_e_ _3_ 6.2.3.3
SKPBZ TTO ;Printer free?
JMP .-1 ;No, try again
DOAS 1,TTO ;Print character
\f
6_._2_._3_._4_ _ _ _E_x_a_m_p_l_e_ _4_ 6.2.3.4
The subroutine shown in this example and called from the main
program by a JUMP TO SUBROUTINE instruction (JSR to TTYRD) illu-
strates reading and echoing characters on the Teletype with Tele-
type interrupts disabled. AC0 is used to store the character.
TTYRD: SKPDN TTI ;Has character been typed?
JMP .-1 ;No, then wait
DIAC 0,TTI ;Yes, then read character and
clear Done flag
SKPBZ TTO ;Is TT0 ready?
JMP .-1 ;No, then wait
DOAS 0,TTO ;Yes, then echo character
JMP 0,3 ;Return
6_._2_._3_._5_ _ _ _E_x_a_m_p_l_e_ _5_ 6.2.3.5
This example shows how Teletype may be programmed using the pro-
gram interrupt facility. To do so makes it possible to perform a
number of calculations in the intervals of time between Teletype
characters.
\f
This routine will read a line and echo it on the Teletype printer
using the interrupt priority system. The characters are read into
a buffer area beginning at location 1000dD8uU. The routine is termin-
ated by either a carriage return character or line overflow. Line
overflow is determined by the value of MAXLL (maximum line
length).
m_
.LOC O ;
0 ;Program counter stored here when
an interrupt occurs.
IHAND ;Address of interrupt handler
.LOC 400 ;
START: LDA 1,BUFFER ;Set up buffer pointer in
autoincrement location 23
STA 1,23 ;
LDA 1,MAXLL ;Get maximum line length
STA 1,CNTR ;Initialize line overflow counter
SUBZL 1,1 ;Set AC1 = 1
DOBS 1,CPU ;Mask out TTO and turn on
interrupts
.
.
.
HANG: LDA 0,CNTR ;When need full line to continue
hang up here until reading is all
done
MOV 0,0,SZR ;
JMP .-2 ;
.
.
.
.
BUFFR: 777 ;Buffer begins at location 1000
MAXLL: 110 ;Maximum of 72DD10UU
characters per line
CNTR: 0 ;Line overflow counter
.
.
.
IHAND: SKPDN TTI ;Make sure TTI caused the
p_interrupt \f
HALT ;Error - some other peripheral
interrupted
STA 0,SAV0 ;Save accumulators that will be
used
STA 1,SAV1 ;
DIAC 0,TTI ;Read character and clear Done
STA 0, 23 ;Store character in buffer
SKPBZ TTO ;Make sure TT0 not busy
JMP .-1 ;
DOAS 0,TTO ;Echo character
LDA 1,CR ;Is it a carriage return?
SUB 0,1,SZR ;
JMP .+4 ;No
SUBC 0,0 ;Yes, clear AC0 without changing
carry
STA 0,CNTR ;Zero out CNTR to indicate line
done
JMP .+3 ;
DSZ CNTR ;If not a carriage return,
decrement CNTR
JMP OUT ;Line not yet done, go dismiss
LDA 0,TTMSK ;Line is done
MSKO 0 ;Mask out TTI (and TT0) to inhibit
further input
OUT: LDA 0,SAV0 ;Restore accumulators
LDA 0,SAV1 ;
INTEN ;Turn interrupts back on
JMP 0 ;Return to interrupted program
SAV0: 0
SAV1: 0
CR: 215
TTMSK: 3
\f
F_7_._ _ _ _ _ _ _ _ _P_R_O_G_R_A_M_ _L_O_A_D_I_N_G_ 7.
7_._1_ _ _ _ _ _ _ _I_n_t_r_o_d_u_c_t_i_o_n_ 7.1
Whenever the computer is used for information processing of any
kind the program must - as previously mentioned - reside in main
memory. But to read a program into memory is in itself a kind of
information processing and therefore requires the existence in
memory of a program - called a loading program - to perform this
duty.
Although the loading program will normally be present, it may
from time to time be necessary to read it into memory. This is
done by a small, specialized loading program which is called a
"bootstrap loader" and whose only function is to read into memory
the more general-purpose loading program.
Two methods are available for entering the bootstrap loader into
memory. One is for the operator to enter it manually utilizing
the data switches and the deposit switch on the Diagnostic Front
Panel. The other is to use the Automatic Program Load option if
the computer in question is so equipped.
In this chapter only automatic program loading is described. For
details about manual loading the reader must consult the Reference
Manual for the Diagnostic Front Panel - RCSL: 52-AA542.
\f
7_._2_ _ _ _ _ _ _ _A_u_t_o_m_a_t_i_c_ _L_o_a_d_i_n_g_ 7.2
To use the Automatic Program Load option, the operator must first
select the input device and set up the loading program on this
device in preparation to be read. In addition the device code of
this unit must be set up in its binary form on the data switches
10 to 15 on the front frame of the CPU board (cf. the illustra-
tion appearing in the following chapter). The setting of data
switch 0 on the front panel depends on the type of input device
selected. If this is a data channel device - for instance magne-
tic tape - data switch 0 must be set to 1. If it is a low-speed
device - for instance a paper tape reader - data switch 0 must be
set to 0.
When this has been done, push the AUTOLOAD switch on the opera-
tor panel. This will cause the bootstrap loader to be read, de-
posited in memory locations 0 to 37Dd8uU and started location 0.The
bootstrap loader will then read the data switches (0 and 10 to
15), set up its own I/O instructions with the device code as read
and finally perform a program load procedure which depends on the
setting of data switch 0.
If data switch 0 has been set to 1, the bootstrap loader will
start the device for data channel transfer starting storage at
location 0 and will then loop at location 377dD8uUuntil adatachan-
nel transfer places a word in this location. When this happens,
the word placed in this location is executed as an instruction;
typically this will be a JUMP into the data which have been
placed in locations 0 to 376dD8uU.
N_O_T_E_: For proper program loading via the data channel the de-
vice in use must be initialized for the reading opera-
tion by an I/O RESET instruction followed by a NIOS
instruction. Furthermore the device must stop reading
when 256dD10uU words has been read; otherwise the avail-
able memory locations will overflow.
\f
If data switch 0 has been set to 0, the bootstrap loader will
read the loading program via programmed I/O. The device must
supply data as 8-bit bytes; each pair of bytes read will be me-
mory stored in as a single word wherein the first and second byte
will become respectively the left and right halves of the word.
To simplify the positioning of the input medium - for instance
paper tape - the bootstrap loader will ignore leading null char-
acters, i.e. it will not store any word until it has read a non-
zero synchronization byte.
The first word following this synchronization byte must be the
negative of the total number of words to be read including this
first word. The number of words to be read - including the first
- cannot exceed 192dD10uU. The bootstrap loader will storethe words
read in memory starting in location 100dD8uU. When the lastword has
been read the bootstrap loader will transfer control to that lo-
cation.
The Automatic Loading hardware in RC3803 is capable of contain-
ing up to 16 times 32 word programs, one of this programs is
listed on the following pages, a bootstrap loader capable of
loading in either of the manners described above.
A list of the available bootstrap loaders in the Automatic Pro-
gram Load option, F10A is too shown.
For details about the RC3803 program load refer to:
GENERAL INFORMATION
Hardware Testprograms and Program Load to RC3803
RCSL - 52AA894
\f
B_O_O_T_S_T_R_A_P_ _L_O_A_D_E_R_ _F_O_R_
A_U_T_O_M_A_T_I_C_ _P_R_O_G_R_A_M_ _L_O_A_D_
00000 060477 BEG: READS 0 ;READ SWITCHES INTO AC0
00001 105120 MOVZL 0,1 ;ISOLATE DEVICE CODE
00002 124240 COMOR 1,1 ;-DEVICE CODE -1
00003 010011 LOOP: ISZ OP1 ;COUNT DEVICE CONTROL INTO
ALL
00004 010031 ISZ OP2 ;I0 INSTRUCTIONS
00005 010033 ISZ OP3 ;
00006 010014 ISZ OP4 ;
00007 125404 INC 1,1,SZR ;DONE?
00010 000003 JMP LOOP ;NO INCREMENT AGAIN
00011 060077 OP1: 060077 ;START DEVICE;(NIOS 0) -1
00012 030017 LDA 2,C377 ;YES,PUTJMP 377INTO
LOCATION 377
00013 050377 STA 2,377 ;
00014 063377 OP4: 063377 ;BUSY ? :( SKPBN 0 ) -1
00015 000011 JMP OP1 ;NO, GO TO OP1
00016 101102 MOVL 0,0,SZC ;LOW SPEED DEVICE?(TEST
SWITCH 0)
00017 000377 C377: JMP 377 ;NO, GO TO 377 AND WAIT
FOR CHAN.
00020 004031 LOOP2:JSR GET+1 ;GET A FRAME
00021 101065 MOVC 0,0.SNR ;IS IT NONZERO?
00022 000020 JMP LOOP2 ;NO, IGNORE AND GET ANOTHER
00023 004030 LOOP4:JSR GET ;YES, GET A FULL WORD
00024 046027 STA 1,@C77 ;STORE STARTING AT 100
00025 010100 ISZ 100 ;COUNT WORD - DONE?
00026 000023 JMP LOOP4 ;NO, GET ANOTHER
00027 000077 C77: JMP 77 ;YES - LOCATION COUNTER AND
JUMP TO LAST WORD
00030 126420 GET: SUBZ 1,1 ;CLEAR AC1, SET CARRY
OP2:
Figur 7.1 \f
\f
«eof»