Go Forth with TTL !
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Screen Oriented Simulator for a DEC PDP-8 Computer
University of Wollongong Research Online Department of Computing Science Working Faculty of Engineering and Information Paper Series Sciences 1983 A screen oriented simulator for a DEC PDP-8 computer Neil Gray University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/compsciwp Recommended Citation Gray, Neil, A screen oriented simulator for a DEC PDP-8 computer, Department of Computing Science, University of Wollongong, Working Paper 83-2, 1983, 65p. https://ro.uow.edu.au/compsciwp/69 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] THE UNIVERSITY OF WOlLONGONG DEPARTMENT OF COMPUTING SCIENCE A SCREEN ORIENTED SIMULATOR FOR A DEC PDP-8 COMPUTER .". N.A.B. Gray Department of Computing Science University of Wollongong Preprlnt No 83-2 January 25. 1983 P.O. Box 1144. WOLLONGONG. N.S.W. AUSTRALIA telephone (042)-282-981 telex AA29022 A Screen Oriented Simulator for a DEC PDP-8 computer. N.A.B. Gray. Department of Computing Science. University of Wollongong. PO Box 1144. WOllongong NSW 2500. Austr"1lia. ABSTRACT This note describes a simulator for the DEC PDP-8 computer. The simulator is intended as an aid tor students starting to learn assemDly language programming. It utilises the simple graphIcs capaDilities of the terminals in the department's laboratories to present. on the termI nal screen. a view of the operations of the simulated computer. The complete system comprises two versions at me program tor simulating a PDP-8 computer and a simplified "assembler" tor prepar Ing students' programs for execution. -
Exploring Software Inefficiency With
ZeroSpy: Exploring Software Inefficiency with Redundant Zeros Xin You∗, Hailong Yang∗y, Zhongzhi Luan∗, Depei Qian∗ and Xu Liuz Beihang University, China∗, North Carolina State University, USAz State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi, Chinay fyouxin2015,hailong.yang,07680,[email protected]∗, [email protected] Abstract—Redundant zeros cause inefficiencies in which the 1 for(int i=0;i<1000;++i) { 2 A[i] = 0; B[i] = i; zero values are loaded and computed repeatedly, resulting in 3 } 4 ... unnecessary memory traffic and identity computation that waste 5 for(int i=0;i<1000;++i) memory bandwidth and CPU resources. Optimizing compilers 6 I C[i] = A[i]-B[i]; is difficult in eliminating these zero-related inefficiencies due to Listing 1. An example code working on redundant zeros, where all variables are 32-bit integers. limitations in static analysis. Hardware approaches, in contrast, optimize inefficiencies without code modification, but are not enough to fulfill the computation, which yields better cache widely adopted in commodity processors. In this paper, we 1 propose ZeroSpy - a fine-grained profiler to identify redundant usage and vectorization potentials . zeros caused by both inappropriate use of data structures and Actually, a larger number of real-world applications (e.g., useless computation. ZeroSpy also provides intuitive optimization deep neural network and high-efficiency video coding) have guidance by revealing the locations where the redundant zeros already been reported to contain a significant amount of happen in source lines and calling contexts. The experimental redundant zeros and achieved significant speedup from the results demonstrate ZeroSpy is capable of identifying redundant zeros in programs that have been highly optimized for years. -
6502 Introduction
6502 Introduction Philipp Koehn 18 September 2019 Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1 some history Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1971 2 • First microprocessor on an integrated circuit: Intel 4004 • 4-bit central processing unit, 12 bit address space (4KB) Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1975 3 • MOS Technology 6502 • Dominant CPU in home computers for a decade (Atari, Apple II, Nintendo Entertainment System, Commodore PET) Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1977 4 • Atari 2600 • Video game console: Pong, Pac Man, ... connected to TV Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1980 5 • Commodore VIC20 • 1 MHz, 5KB RAM, BASIC, 3.5KB RAM, 176x184 3 bit color video Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1982 6 • Commodore C64 • 64KB RAM, 320x200 4 bit color video Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 Commodore C64 7 • BASIC programming language, but serious programs written in assembly • No fancy stuff like multi-process, user accounts, virtual memory, etc. • Machine itself had no mass storage - had to buy tape drive, then floppy disk drive, machine was obsolete once hard drives came around Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 BASIC Demo 8 • Commands get executed (just like Python interpreter) -
Computer Architecture Anc Instruction Set Design*
Computer architecture anc instruction set design* by P. C. ANAGNOSTOPOULOS, M. J. MICHEL, G. SOCKUT, G. M. STABLER, and A. van DAM Brown University Providence, Rhode Island INTRODUCTION The Brown University Graphics System (BUGS)1* was designed as the vehicle for performing this research. Prin A group of computer scientists and mathematicians at cipally, the configuration consists of an IBM S/360-67 Brown University has been engaged in the study of running the CP-67/CMS time-sharing system,10 used by computer graphics for the past eight years. During the the entire Brown University community, and a satellite course of these studies a variety of topics has been inves display station, as illustrated in Figure 1. This reasonably tigated, in particular, during the last few years, the use of powerful satellite configuration provides such facilities as microprogramming for implementing graphics sys program editing and compilation, debugging tools, and tems.2021' In early 1971, Professor Andries van Dam and most importantly, application processing power and data his associates submitted a threefold research proposal to storage. However, because of the two rather distinct the National Science Foundation. The problems to be demands placed upon the local processor, that of display investigated were: generation and general computing, and because these two capabilities could run in parallel, it was further deter (1). Inter-Connected Processing (ICP-ing) between a mined that the inclusion of two separate processors in the central computer and an associated satellite proces graphics station would be in order. In particular, the first sor, with the goal of a dynamically alterable solu of these processors would be of a general-purpose nature, tion to the "division of labor" problem; program while the second would be designed specifically for main modules would be dynamically linked in either tenance and regeneration of the display. -
Download a Sample
Preface Like many American kids in 1979, I woke up to find that Santa had left a brand new Atari VCS1 under the tree (thanks, Mom and Dad, for paying Santa’s invoice!). This was a pretty big deal for a six- year-old who could tell you the location and manufacturer of every standup arcade cabinet within a five mile radius. Having an “arcade in your home” wasn’t just a thing you saw on Silver Spoons, it was now a real thing. The sights and sounds that jumped o↵ of our little Panasonic color TV probably deserve a gigantic run-on sentence worthy of Dylan Thomas, as my brother and I bounced tiny pixellated missiles o↵ of walls in Combat, combed through the perplexing game modes of Space Invaders, battled angry duck-like dragons in Adventure, and became Superman as we put flickering bad guys in a flickering jail. These cartridges were opaque obelisks packaged in boxes with fantastically unattainable illustrations, available at K-Mart for $30 or so. You could tell these species of video games weren’t related to arcade games, though they had a unique look-and-feel of their own. We also had an Apple ][ by this time, so I tried to fit all of these creatures into a digital taxonomy. Atari games had colors and fast motion, but not as much as arcade games, and they never were as complex as Apple ][ games. What made them tick? Why were Activision games so much more detailed? Would the missile still blow up your spaceship if you turned the TV o↵? (Turns out the answer is yes.) 1 It wasn’t sold as “Atari 2600” until 1982. -
The Ultimate C64 Overview Michael Steil, 25Th Chaos Communication Congress 2008
The Ultimate C64 Overview Michael Steil, http://www.pagetable.com/ 25th Chaos Communication Congress 2008 Retrocomputing is cool as never before. People play Look and Feel C64 games in emulators and listen to SID music, but few people know much about the C64 architecture A C64 only needs to be connected to power and a TV and its limitations, and what programming was like set (or monitor) to be fully functional. When turned back then. This paper attempts to give a comprehen- on, it shows a blue-on-blue theme with a startup mes- sive overview of the Commodore 64, including its in- sage and drops into a BASIC interpreter derived from ternals and quirks, making the point that classic Microsoft BASIC. In order to load and save BASIC computer systems aren't all that hard to understand - programs or use third party software, the C64 re- and that programmers today should be more aware of quires mass storage - either a “datasette” cassette the art that programming once used to be. tape drive or a disk drive like the 5.25" Commodore 1541. Commodore History Unless the user really wanted to interact with the BA- SIC interpreter, he would typically only use the BA- Commodore Business Machines was founded in 1962 SIC instructions LOAD, LIST and RUN in order to by Jack Tramiel. The company specialized on elec- access mass storage. LOAD"$",8 followed by LIST tronic calculators, and in 1976, Commodore bought shows the directory of the disk in the drive, and the chip manufacturer MOS Technology and decided LOAD"filename",8 followed by RUN would load and to have Chuck Peddle from MOS evolve their KIM-1 start a program. -
Cern Libraries, Geneva Cm-P00087609 Cern/Fc/1374
CERN/FC/1374 CERN LIBRARIES, GENEVA Original: English 15 September, 1971 CM-P00087609 ORGANISATION EUROPÉENNE POUR LA RECHERCHE NUCLÉAIRE CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH FINANCE COMMITTEE Hundred-and-fourteenth Meeting Geneva - 29 September, 1971 ADJUDICATION FOR REMOTE INPUT OUTPUT STATIONS FOR THE CERN CENTRAL COMPUTER SYSTEM The document CERN/FC/1340, Programme for Acquisition of Peripheral Equipment for the CERN Central Computer System, outlines the programme of development needed to build up a decentralized service based on the CDC 7600 computer. The first step in this programme consists of the acquisition of five or six Remote Input Output Stations. Each station will be based on a small computer which initially drives a card reader, line printer and a communications controller. Additional stations may be purchased later and some will be expanded by the addition of extra peripherals and high speed communications equipment as the demands on the decentralized service grow. The offers received from firms show the Modular One computer manufactured by Computer Technology Limited to be the one which most exactly meets the technical specification. The offer from Computer Technology Limited is a few percent more expensive than the two other possible machines for the initial configuration, but this is more than compensated for by the proven software and greater capability for ex• pansion of the Modular One Computer. The Finance Committee is requested to approve the award of the contract for an initial order of five or six basic Remote Input Output Stations from Computer Technology Limited at a price of approx• imately 182,000 Swiss Francs per station (excluding the card reader), with the possibility of later 71/286/5/e CERN/FC/1374 I. -
W65C02S Microprocessor DATA SHEET
The Western Design Center, Inc. February 2004 W65C02S Data Sheet W65C02S Microprocessor DATA SHEET WDC ã The Western Design Center, Inc., 2003. All rights reserved The Western Design Center, Inc. February 2004 W65C02S Data Sheet WDC reserves the right to make changes at any time without notice in order to improve design and supply the best possible product. Information contained herein is provided gratuitously and without liability, to any user. Reasonable efforts have been made to verify the accuracy of the information but no guarantee whatsoever is given as to the accuracy or as to its applicability to particular uses. In every instance, it must be the responsibility of the user to determine the suitability of the products for each application. WDC products are not authorized for use as critical components in life support devices or systems. Nothing contained herein shall be construed as a recommendation to use any product in violation of existing patents or other rights of third parties. The sale of any WDC product is subject to all WDC Terms and Conditions of Sales and Sales Policies, copies of which are available upon request. Copyright Ó1981-2004 by The Western Design Center, Inc. All rights reserved, including the right of reproduction, in whole, or in part, in any form. The Western Design Center, Inc. W65C02S Data Sheet 2 The Western Design Center, Inc. W65C02S Data Sheet TABLE OF CONTENTS 1 INTRODUCTION................................................................................................................................................................................5 -
W65C02S 8–Bit Microprocessor
October 19, 2010 W65C02S 8–bit Microprocessor WDC reserves the right to make changes at any time without notice in order to improve design and supply the best possible product. Information contained herein is provided gratuitously and without liability, to any user. Reasonable efforts have been made to verify the accuracy of the information but no guarantee whatsoever is given as to the accuracy or as to its applicability to particular uses. In every instance, it must be the responsibility of the user to determine the suitability of the products for each application. WDC products are not authorized for use as critical components in life support devices or systems. Nothing contained herein shall be construed as a recommendation to use any product in violation of existing patents or other rights of third parties. The sale of any WDC product is subject to all WDC Terms and Conditions of Sales and Sales Policies, copies of which are available upon request. Copyright ©1981-2010 by The Western Design Center, Inc. All rights reserved, including the right of reproduction, in whole, or in part, in any form. TABLE OF CONTENTS 1 INTRODUCTION ....................................................................................................... 5 1.1 FEATURES OF THE W65C02S ........................................................................................................... 5 2 FUNCTIONAL DESCRIPTION .................................................................................. 6 2.1 INSTRUCTION REGISTER (IR) AND DECODE ....................................................................................... -
Programming the 65816
Programming the 65816 Including the 6502, 65C02 and 65802 Distributed and published under COPYRIGHT LICENSE AND PUBLISHING AGREEMENT with Authors David Eyes and Ron Lichty EFFECTIVE APRIL 28, 1992 Copyright © 2007 by The Western Design Center, Inc. 2166 E. Brown Rd. Mesa, AZ 85213 480-962-4545 (p) 480-835-6442 (f) www.westerndesigncenter.com The Western Design Center Table of Contents 1) Chapter One .......................................................................................................... 12 Basic Assembly Language Programming Concepts..................................................................................12 Binary Numbers.................................................................................................................................................... 12 Grouping Bits into Bytes....................................................................................................................................... 13 Hexadecimal Representation of Binary................................................................................................................ 14 The ACSII Character Set ..................................................................................................................................... 15 Boolean Logic........................................................................................................................................................ 16 Logical And....................................................................................................................................................... -
Memory Management in Linux Is a Complex System ○ Supports a Variety of Systems from MMU-Less Microcontrollers to Supercomputers
Linux Memory Management Ahmed Ali-Eldin This lecture ● Kernel memory allocations ● User-space memory management ● Caching in memory Numbers every programmer should know... Yearly updated data: https://colin-scott.github.io/personal_website/research/interactive_latency.html Kernel memory allocation ● Kernel processes require memory allocation ○ kernel cannot easily deal with memory allocation errors ○ kernel often cannot sleep ● The kernel memory allocation mechanisms differ from user-space allocation ● The kernel treats physical pages as the basic unit of memory management ● x-86 processors include a hardware Memory Management Unit (MMU) ● Memory management in Linux is a complex system ○ supports a variety of systems from MMU-less microcontrollers to supercomputers. Pages in Linux ● Old days: Pages with default size 4 KB ● Now: Huge pages + 4KB pages (since kernel 2.6.3) ● Rationale ○ on a machine with 8KB pages and 32GB of memory, physical memory is divided into 4,194,304 distinct pages ○ 64-bit Linux allows up to 128 TB of virtual address space for individual processes, and can address approximately 64 TB of physical memory ○ While assigning memory to a process is relatively cheap, memory management is not! ■ Every memory access requires a page walk ■ Typically take 10 to 100 cpu cycles ■ A TLB can hold typically only 1024 entries (out of the 4 Million distinct pages above) and has to be flushed every context switch Large Memory Applications ● Applications touching greater than 10 GB such as a large in-memory database with 17 GiB with 1000 connections ○ Uses approximately 4.4 million pages ○ With a page table size of 16 GiB ● Idea: Having larger page sizes enables a significant reduction in memory walks for such an application Huge Pages ● on x86, it is possible to map 2M and even 1G pages using entries in the second and the third level page tables. -
Architecture and Computer Storage
White Paper Architecture and Computer Storage July 2002 Architecture and Computer Storage 0 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and Symmetrix are registered trademarks and where information lives is a trademark of EMC Corporation. Other trademarks are the property of their respective owners. Copyright © 2002 EMC Corporation. All rights reserved Published in the USA H749 Architecture and Computer Storage 1 Table of Contents Architecture and Computer Storage............................................................................3 Why is architecture important for computer systems? .............................................................................................. 3 Architectures—Good and Bad .................................................................................................................................. 3 What about storage?.................................................................................................................................................. 4 Breakthrough #1 that changed