Unit 3 Binary Representation

Total Page:16

File Type:pdf, Size:1020Kb

Unit 3 Binary Representation 3.1 3.2 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.3 3.4 Analog vs. Digital Analog vs. Digital • The analog world is based on continuous • Q. Which is better? events. Observations can take on (real) any • A. Depends on what you are trying to do. value. • Some tasks are better handled with analog • The digital world is based on discrete events. data, others with digital data. Observations can only take on a finite number Analog means continuous/real valued signals with of discrete values – an infinite number of possible values – Digital signals are discrete [i.e. 1 of n values] 3.5 3.6 Analog vs. Digital Analog vs. Digital • How much money is in my checking account? • How much do you love me? – Analog: I love you with all my heart!!!! – Analog: Oh, some, but not too much. – Digital: 3.2 x 10 3 MegaHearts – Digital: $243.67 3.7 3.8 The Real (Analog) World Digital is About Numbers • The real world is inherently analog. • In a digital world, numbers are used to represent all the possible discrete events • To interface with it, our digital systems need Numerical values to: – – Computer instructions (ADD, SUB, BLE, …) – Convert analog signals to digital values (numbers) – Characters ('a', 'b', 'c', …) at the input. – Conditions (on, off, ready, paper jam, …) – Convert digital values to analog signals at the • Numbers allow for easy manipulation output. – Add, multiply, compare, store, … • Analog signals can come in many forms • Results are repeatable – Voltage, current, light, color, magnetic fields, – Each time we add the same two number we get pressure, temperature, acceleration, orientation the same result 3.9 3.10 Interpreting Binary Strings • Given a string of 1’s and 0’s, you need to know the representation system being used, before you can understand the value of those 1’s and 0’s. • ______________________________________ 01000001 = ? Unsigned Binary system ASCII DIGITAL REPRESENTATION BCD System system 65 10 ‘A’ ASCII 41 BCD 3.11 3.12 Binary Representation Systems • Integer Systems • Codes – Unsigned – Text • Unsigned (Normal) binary • ASCII / Unicode – Signed – Decimal Codes • Signed Magnitude • BCD (Binary Coded Decimal) • 2’s complement / (8421 Code) • Excess-N* • 1’s complement* • Floating Point OVERVIEW – For very large and small (fractional) numbers * = Not fully covered in this class 3.13 3.14 4 Skills • We will teach you 4 skills that you should know and be able to apply with confidence – Convert a number in any base (base r) to decimal (base 10) – Convert a decimal number (base 10) to binary – Use the shortcut for conversion between binary Using positional weights/place values (base 2) and hexadecimal (base 16) BASE R TO BASE 10 – Understand the finite number of combinations that can be made with n bits (binary digits) and its implication for codes including ASCII and Unicode 3.15 3.16 Number Systems Anatomy of a Decimal Number • Number systems consist of • A number consists of a string of explicit coefficients (digits). 1. ________________ • Each coefficient has an implicit place value which is a _______ of the base. 2. ___ coefficients [__________] • The value of a decimal number (a string of decimal • Human System: Decimal (Base 10): coefficients) is the sum of each coefficient times it place value radix 0,1,2,3,4,5,6,7,8,9 (base) • Computer System: Binary (Base 2): 0,1 (934) 10 = 9* ___ + 3* ___ + 4* ____ = _____ • Human systems for working with computer systems (shorthand for human to read/write binary) Implicit place values Explicit coefficients – _____________________________________ – _____________________________________ (3.52) 10 = 3* ____ + 5* ____ + 2* ____ = ____ 3.17 3.18 Anatomy of a Binary Number General Conversion From Base r to Decimal • Same as decimal but now the coefficients • A number in base r has place values/weights are 1 and 0 and the place values are the that are the powers of the base powers of 2 • Denote the coefficients as: ai Most Significant Least Significant 3 2 1 0 -1 -2 Digit (MSB) Bit (LSB) (a3a2a1a0.a -1a-2)r = a 3*r + a 2*r + a 1*r + a 0*r + a -1*r + a -2*r Left-most digit = Right-most digit = (1011) 2 = 1*_ _ + 0* _ + 1* __ + 1* __ Most Significant Least Significant Digit (MSD) Digit (LSD) radix (base) place values coefficients = powers of 2 Nr => _______=> D 10 Number in base r Decimal Equivalent 3.19 3.20 Examples Binary Examples (746) 8 = (1001.1) 2 = (1A5) 16 = (10110001) 2 = (AD2) 16 = 3.21 3.22 Powers of 2 Unique Combinations 20 = 1 Given n digits of base r, how many unique numbers 21 = 2 • 22 = 4 can be formed? __ 3 2 = 8 – What is the range? [________] 24 = 16 25 = 32 2-digit, decimal numbers (r=10, n=2) 26 = 64 0-9 0-9 27 = 128 1024 512 256 128 64 32 16 8 4 2 1 3-digit, decimal numbers (r=10, n=3) 28 = 256 29 = 512 4-bit, binary numbers (r=2, n=4) 210 = 1024 0-1 0-1 0-1 0-1 6-bit, binary numbers (r=2, n=6) Main Point: Given n digits of base r, ___ unique numbers can be made with the range [________] 3.23 3.24 Approximating Large Powers of 2 • Often need to find decimal approximation of a large powers of 2 216 = 2 6 * 2 10 like 2 16 , 2 32 , etc. ≈ • Use following approximations: – 210 ≈ _________________ 224 = – 220 ≈ _________________ – 230 ≈ _________________ 28 – 240 ≈ _________________ 2 = "Making change" • For other powers of 2, decompose into product of 2 10 or 2 20 or 2 30 and a BASE 10 TO BASE 2 OR BASE 16 power of 2 that is less than 2 10 232 = – 16-bit half word: 64K numbers – 32-bit word: 4G numbers – 64-bit dword: 16 million trillion numbers 3.25 3.26 Decimal to Unsigned Binary Decimal to Unsigned Binary • To convert a decimal number, x, to binary: 73 10 = – Only coefficients of 1 or 0. So simply find place values 128 64 32 16 8 4 2 1 that add up to the desired values, starting with larger 87 = place values and proceeding to smaller values and place 10 a 1 in those place values and 0 in all others 145 10 = 25 = 10 0.625 = 32 16 8 4 2 1 10 .5 .25 .125 .0625 .03125 3.27 3.28 Decimal to Another Base • To convert a decimal number, x, to base r: – Use the place values of base r (powers of r). Starting with largest place values, fill in coefficients that sum up to desired decimal value without going over. Shortcuts for Converting Binary (r=2), Hexadecimal (r=16) and Octal (r=8) SHORTHAND FOR BINARY 75 10 = hex 256 16 1 3.29 3.30 Binary, Octal, and Hexadecimal Binary to Octal or Hex • Octal (base 8 = 2 3) • Hex (base 16=2 4) • Make groups of 3 bits • Make groups of 4 bits starting from radix point starting from radix point • 1 Octal digit ( _ ) can • 1 Hex digit ( _ ) can 8 16 and working outward and working outward represent: ________ represent: 0-F (_____) • Add 0’s where • Add 0’s where necessary • 3 bits of binary (_ _ _) • 4 bits of binary necessary 2 • Convert each group of 3 can represent: (_ _ _ _) can represent: • Convert each group of 4 2 to an octal digit to an octal digit 000-111 = ________ 0000-1111= ______ • Conclusion… • Conclusion… 101001110.11 101001110.11 __Octal digit = __ bits __ Hex digit = ___ bits 3.31 3.32 Octal or Hex to Binary Hexadecimal Representation • Expand each octal digit • Expand each hex digit • Since values in modern computers are many bits, we to a group of 3 bits to a group of 4 bits use hexadecimal as a shorthand notation (4 bits = 1 hex digit) – 11010010 = D2 hex or 0xD2 if you write it in C/C++ 317.2 8 D93.8 16 – 0111011011001011 = 76CB hex or 0x76CB if you write it in C/C++ 3.33 3.34 Binary Representation Systems • Integer Systems • Codes – Unsigned – Text • Unsigned (Normal) binary • ASCII / Unicode – Signed – Decimal Codes • Signed Magnitude • BCD (Binary Coded Decimal) • 2’s complement / (8421 Code) • 1’s complement* ASCII & Unicode • Excess-N* BINARY CODES • Floating Point – For very large and small (fractional) numbers * = Not covered in this class 3.35 3.36 Binary Codes BCD (If Time Permits) • Rather than convert a decimal number to binary which may lose • Using binary we can represent any kind of some precision (i.e. 0.1 10 = infinite binary fraction), BCD represents each decimal digit as a separate group of bits (exact information by coming up with a code decimal precision) n – Each digits is represented as a ___________ number (using place values 8,4,2,1 • Using n bits we can represent 2 distinct items for each dec. digit) – Often used in financial and other applications where decimal precision is needed Colors of the rainbow: Letters: (439) This is the Binary •Red = 000 •‘A’ = 00000 10 Coded Decimal (BCD) •Orange = 001 •‘B’ = 00001 representation of 439 •Yellow = 010 •‘C’ = 00010 •Green = 100 . BCD Representation: •Blue = 101 . This is the binary •Purple = 111 . representation of 439 •‘Z’ = 11001 Unsigned Binary Rep.: (i.e. using power of 2 110110111 2 place values) Important: Some processors have specific instructions to operate on #’s represented in BCD 3.37 3.38 ASCII Code ASCII Table • Used for representing text characters LSD/MSD 0 1 2 3 4 5 6 7 0 NULL DLW SPACE 0 @ P ` p • Originally 7-bits but usually stored as 8-bits = 1- 1 SOHDC1 ! 1 A Q a q byte in a computer 2 STXDC2 “ 2 B R b r 3 ETXDC3 # 3 C S c s • Example: 4 EOTDC4 $ 4 D T d t "Hello\n"; 5 ENQNAK % 5 E U e u – 6 ACK SYN & 6 F V f v – Each character is converted to ASCII equivalent 7 BELETB ‘ 7 G W g w • ‘H’ = 0x48, ‘e’ = 0x65, … 8 BSCAN ( 8 H X h x 9 TABEM ) 9 I Y i y • \n = newline character is represented by either one or two ASCII A LFSUB * : J Z j z character B VTESC + ; K [ k { C FFFS , < L \ l | D CRGS - = M ] m } E SORS .
Recommended publications
  • Proposal for Addition of Group Mark Symbol Introduction
    Proposal for addition of Group Mark symbol Ken Shirriff github.com/shirriff/groupmark Feb 14, 2015 Abstract The group mark symbol was part of the character set of important computers of the 1960s and 1970s, such as the IBM 705, 7070, 1401 and 1620. Books about these computers and manuals for them used the symbol to represent the group mark in running text. Unfortunately, this symbol does not exist in Unicode, making it difficult to write about technical details of these historical computers. Introduction The group mark was introduced in the 1950s as a separator character for I/O operations. In written text, the group mark is indicated by the symbol: . Unicode doesn't include this symbol, which is inconvenient when writing about the group mark or the character set of these computers. The group mark became part of IBM's Standard BCD Interchange Code (BCDIC) in 1962. [1, page 20 and figure 56]. This standard was used by the IBM 1401, 1440, 1410, 1460, 7010, 7040, and 7044 data processing systems [2]. The BCDIC standard provided consistent definitions of codes and the relation between these codes and printed symbols, including uniform graphics for publications.[2, page A-2]. Unicode can represent all the characters in BCDIC, except for the group mark. This proposal is for a Unicode code point for the group mark for use in running text with an associated glyph . This is orthogonal to the use of the group mark as a separator in data files. While the proposed group mark could be used in data files, that is not the focus of this proposal.
    [Show full text]
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 S5-155U Cpu 948 Simatic S5
    Contents Introduction 1 SIMATIC S5 User Program 2 S5-155U Program Execution 3 CPU 948 Operating Statuses and Program Execution Levels 4 Programming Guide Interrupt and Error Diagnostics 5 This manual has the order number: Integrated Special Functions 6 6ES5 998–3PR21 Extended Data Block DX 0 7 Memory Assignment and Memory Organization 8 Memory Access Using Absolute Addresses 9 Multiprocessor Mode and Com- munication in the S5-155U 10 PG Interfaces and Functions 11 Appendix 12 Indexes: Abbreviations Key Words 13 The List of Operations, order no. 6ES5 997-3UA22, is included with this manual. 10/98 C79000-G8576-C848 Release 04 Safety Guidelines This manual contains notices which you should observe to ensure your own personal safety, as well as to protect the product and connected equipment. These notices are highlighted in the manual by a warning triangle and are marked as follows according to the level of danger: Danger ! indicates that death, severe personal injury or substantial property damage will result if proper precautions are not taken. Warning ! indicates that death, severe personal injury or substantial property damage can result if proper precautions are not taken. Caution ! indicates that minor personal injury or property damage can result if proper precautions are not taken. Note draws your attention to particularly important information on the product, handling the product, or to a particular part of the documentation. Qualified Personnel The device/system may only be set up and operated in conjunction with this manual. Only qualified personnel should be allowed to install and work on this equipment. Qualified persons are defined as persons who are authorized to commission, to ground, and to tag circuits, equipment, and systems in accor- dance with established safety practices and standards.
    [Show full text]
  • DS8108 Digital Scanner Product Reference Guide (En)
    DS8108 Digital Scanner Product Reference Guide MN-002926-02 DS8108 DIGITAL SCANNER PRODUCT REFERENCE GUIDE MN-002926-02 Revision A March 2018 ii DS8108 Digital Scanner Product Reference Guide No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
    [Show full text]
  • Iso/Iec Jtc1/Sc 22/Wg 20 N 619665
    ISO/IEC JTC1/SC 22/WG 20 N 619665 Date: 16 November 19981999-04-21 ISO ORGANISATION INTERNATIONALE DE NORMALISATION INTERNATIONAL ORGANIZATION FOR STANDARDIZATION ÌÅÆÄÓÍÀÐÎÄÍÀß ÎÐÃÀÍÈÇÀÖÈß ÏÎ ÑÒÀÍÄÀÐÒÈÇÀÖÈÈ CEI (IEC) COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE INTERNATIONAL ELECTROTECHNICAL COMMISSION ÌÅÆÄÓ•€•Ž„ÍÀß ÇËÅÊÒÐÎÒÅÕÍÈ×ÅÑÊÀß ÊÎÌÈÑÑÈß Title Proposed editorial changes to ISO/IEC FCD 14651.2 - International String Ordering - Method for comparing Character Strings and Description of the Common Template Tailorable Ordering [ISO/CEI CD 14651 - Classement international de chaînes de caractères - Méthode de comparaison de chaînes de caractères et description du modèle commun d’ordre de classement] Status: Final Committee DocumentExpert contribution Reference: SC22/WG20 N 568R (Disposition of comments on first FCD ballot)619 Date: 1998-11-161999-04-21 Project: 22.30.02.02 Editor: Alain LaBonté Gouvernement du Québec Secrétariat du Conseil du trésor 875, Grande-Allée Est, Secteur 3C Québec, QC G1R 5R8 CanadaMichael Everson Email: [email protected]@indigo.ie ISO/IEC 14651:1999(E) ÓISO/IEC Contents: FOREWORD......................................................................................................................................iii INTRODUCTION ................................................................................................................................iv 1 Scope .............................................................................................................................................1
    [Show full text]
  • The ASCII Code)
    255 APPENDIX! The American Standard Code for Information Interchange (The ASCII code) dec hex character name 0 00 NUL null character 1 01 SOH start of heading 2 02 STX start text 3 03 ETX end text 4 04 EOT end of transmission 5 05 ENQ enquiry 6 06 ACK acknowledge 7 07 BEL ring bell 8 08 BS backspace 9 09 HT horiwntal tab 10 Oa LF linefeed 11 Ob VT vertical tab 12 Oc FF fonnfeed 13 Od CR carriage return 14 Oe SO shift out 15 Of SI shift in 16 10 OLE data link escape 17 11 DCI device control #1 18 12 DC2 device control #2 19 13 DC1 device control #3 20 14 DCI device control #4 21 15 NAK negative acknowledge 22 16 SYN synchronous idle 23 17 ETB end transmission block 24 18 CAN cancel 25 19 EM end medium 26 1a SUB substitute 27 Ib ESC escape 28 lc FS file separator 29 Id GS group separator 30 Ie RS record separator 31 If US unit separator 32 20 SP space 256 APPENDICES The ASOI code (contd.) dec hex char dec hex char dec hex char 33 21 65 41 A 97 61 a 34 22 .. 66 42 B 98 62 b 35 23 # 67 43 C 99 63 c 36 24 $ 68 44 D 100 64 d 37 25 % 69 45 E 101 65 e 38 26 & 70 46 F 102 66 f 39 27 71 47 G 103 67 g 40 28 ( 72 48 H 104 68 h 41 29 ) 73 49 I 105 69 i 42 2a * 74 4a J 106 6a j 43 2b + 75 4b K 107 6b k 44 2c 76 4c L 108 6c I 45 2d - 77 4d M 109 6d m 46 2e 78 4e N 110 6e n 47 2f / 79 4f 0 111 6f 0 48 30 0 80 50 P 112 70 P 49 31 1 81 51 Q 113 71 q 50 32 2 82 52 R 114 72 r 51 33 3 83 53 S 115 73 s 52 34 4 84 54 T 116 74 t 53 35 5 85 55 U 117 75 u 54 36 6 86 56 V 118 76 v 55 37 7 87 57 W 119 77 w 56 38 8 88 58 X 120 78 x 57 39 9 89 59 Y 121 79 Y 58 3a
    [Show full text]
  • ASCII, Unicode, and in Between Douglas A. Kerr Issue 3 June 15, 2010 ABSTRACT the Standard Coded Character Set ASCII Was Formall
    ASCII, Unicode, and In Between Douglas A. Kerr Issue 3 June 15, 2010 ABSTRACT The standard coded character set ASCII was formally standardized in 1963 and, in its “complete” form, in 1967. It is a 7-bit character set, including 95 graphic characters. As personal computers emerged, they typically had an 8-bit architecture. To exploit that, they typically came to use character sets that were “8-bit extensions of ASCII”, providing numerous additional graphic characters. One family of these became common in computers using the MS-DOS operating system. Another similar but distinct family later became common in computers operating with the Windows operating system. In the late 1980s, a true second-generation coded character set, called Unicode, was developed, and was standardized in 1991. Its structure provides an ultimate capacity of about a million graphic characters, catering thoroughly to the needs of hundreds of languages and many specialized and parochial uses. Various encoding techniques are used to represent characters from this set in 8- and 16-bit computer environments. In this article, we will describe and discuss these coded character sets, their development, their status, the relationships between them, and practical implications of their use. Information is included on the entry, in Windows computer systems, of characters not directly accessible from the keyboard. BEFORE ASCII As of 1960, the interchange of data within and between information communication and processing systems was made difficult by the lack of a uniform coded character set. Information communication in the traditional “teletypewriter” sense generally used a 5-bit coded character set, best described as the “Murray code” (although as a result of historical misunderstandings it is often called the “Baudot code”).
    [Show full text]
  • Mysql Globalization Abstract
    MySQL Globalization Abstract This is the MySQL Globalization extract from the MySQL 8.0 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-27 (revision: 70895) Table of Contents Preface and Legal Notices .................................................................................................................. v 1 Character Sets, Collations, Unicode ................................................................................................. 1 1.1 Character Sets and Collations in General .............................................................................. 2 1.2 Character Sets and Collations in MySQL ............................................................................... 3 1.2.1 Character Set Repertoire ........................................................................................... 5 1.2.2 UTF-8 for Metadata ................................................................................................... 7 1.3 Specifying Character Sets and Collations .............................................................................. 8 1.3.1 Collation Naming Conventions .................................................................................... 9 1.3.2 Server Character Set and Collation .......................................................................... 10 1.3.3 Database Character Set and Collation .....................................................................
    [Show full text]
  • Reference Card
    eg1 Mm#$w&m" SPECIAL SYMBOLS SYMBOL IO.COLUMN USE PUNCH * ln col!mn lr indicatesprima'y contiol statement In any other columnr indicalescontinuation of conlrolstatement A I 1.7-8 Separates notes t!om slatemenl on primary conlol card Indicat€s terminalion of Darameterson PRAM contol card 0-3-8 S€parales specification fields: two commas (,,) in succession requiredto indicateblank specification{except last) ! In columnl, lollowedby mnemonicoperator: indicatessecondary (blank) contol statementand delimits its operatol In prinary conlol statement: delimitsoptions tield; two blanks(ti) il successionrequirsd for blank optionfield lollowedby specilications Indicates termination of slatement 0i SeDaratessubfields within a so€cification PFIIMARY CC]NTROL PRTXARYCOtTiOf iCALLtoptionsiname/vers ion, I ibrary,ti le,parameter,parameter,... ccoFoptionstname'versron,ribrary aE-) option3: X: abort job il no find or activationot unit recordroutrne optioni: A-E: loSicallest switches no X: use no'maloutout unit fecordrouline if io lind or activatlonand iSnoreICAL R = clerr switches tilc: P : primary output steam H, M, or L = serviceand selectionpfioiity (high,medium, or low) S = secondary output stean XorY P = go-column FORTRAN input cards dCOREtopl i onstl ibrary,name,/ve rs ion,v,v,v,...v O ' COREttn in imum,har.m!m options: A = coileclion to memory localion: v: conectron address '€lative to system base address/co(ections nininum: ninimrn erlension (no, ot words) of core r€quir€d lor task €lemenl (NoA) norimufr: marim!m exlensiondesir€d X, Z, ot P = cofrect
    [Show full text]
  • Number Systems
    Number Systems PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 09 Mar 2013 02:39:37 UTC Contents Articles Two's complement 1 Ones' complement 10 Binary-coded decimal 14 Gray code 24 Hexadecimal 39 Octal 50 Binary number 55 References Article Sources and Contributors 70 Image Sources, Licenses and Contributors 72 Article Licenses License 73 Two's complement 1 Two's complement Two's complement is a mathematical operation on binary numbers, as well as a binary signed number representation based on this operation. The two's complement of an N-bit number is defined as the complement with respect to 2N, in other words the result of subtracting the number from 2N. This is also equivalent to taking the ones' complement and then adding one, since the sum of a number and its ones' complement is all 1 bits. The two's complement of a number behaves like the negative of the original number in most arithmetic, and positive and negative numbers can coexist in a natural way. In two's-complement representation, negative numbers are represented by the two's complement of their absolute value;[1] in general, negation (reversing the sign) is performed by taking the two's complement. This system is the most common method of representing signed integers on computers.[2] An N-bit two's-complement numeral system can represent every integer in the range −(2N − 1) to +(2N − 1 − 1) while ones' complement can only represent integers in the range −(2N − 1 − 1) to +(2N − 1 − 1).
    [Show full text]
  • DS3678 Product Reference Guide (EN)
    DS3678 Digital Scanner Product Reference Guide MN-002689-01 DS3678 DIGITAL SCANNER PRODUCT REFERENCE GUIDE MN-002689-01 Revision A June 2016 ii DS3678 Digital Scanner Product Reference Guide No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Zebra. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Zebra grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Zebra. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Zebra. The user agrees to maintain Zebra’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
    [Show full text]
  • Lecture Packed ASCII Arithmetic
    Assembly Language for Intel-Based Computers, 4th Edition Kip R. Irvine Unpacked and Packed Integers Slides prepared by Kip R. Irvine Revision date: 07/11/2002 Modified 2006, Dr. Nikolay Metodiev Sirakov • Chapter corrections (Web) Assembly language sources (Web) (c) Pearson Education, 2002. All rights reserved. You may modify and copy this slide show for your personal use, or for use in the classroom, as long as this copyright statement, the author's name, and the title are not changed. ASCII and Packed Decimal Arithmetic • Unpacked BCD • ASCII Decimal • AAA Instruction • AAS Instruction • AAM Instruction • AAD Instruction • Packed Decimal Integers • DAA Instruction • DAS Instruction Irvine, Kip R. Assembly Language for Intel-Based Computers, 2003. Web site Examples 2 Unpacked BCD • Binary-coded decimal (BCD) numbers use 4 binary bits to represent each decimal digit • A number using unpacked BCD representation stores a decimal digit in the lower four bits of each byte • For example, 5,678 is stored as the following sequence of hexadecimal bytes: 05 06 07 08 Irvine, Kip R. Assembly Language for Intel-Based Computers, 2003. Web site Examples 3 ASCII Decimal • A number using ASCII Decimal representation stores a single ASCII digit in each byte • For example, 5,678 is stored as the following sequence of hexadecimal bytes: 35 36 37 38 Irvine, Kip R. Assembly Language for Intel-Based Computers, 2003. Web site Examples 4 AAA Instruction • The AAA (ASCII adjust after addition) instruction adjusts the binary result of an ADD or ADC instruction. It makes the result in AL consistent with ASCII digit representation.
    [Show full text]
  • Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype
    Signals Codes Analog and Digital Signals Compression Data integrity Powerline communications Skype Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype Cristian S. Calude March{May 2008 Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype 1 / 209 Signals Codes Analog and Digital Signals Compression Data integrity Powerline communications Skype Thanks to Nevil Brownlee and Ulrich Speidel for stimulating discussions and critical comments. Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype 2 / 209 Signals Codes Analog and Digital Signals Compression Data integrity Powerline communications Skype Assignment and exam Test (3 questions): 24 April, 1.30 - 2.20 pm. Exam: prepare all results discussed in class Exam: try to solve as many problems as possible from the proposed list Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype 3 / 209 Signals Codes Analog and Digital Signals Compression Data integrity Powerline communications Skype Goals Understand digital and analog signals Understand codes and encoding schemes Understand compression, its applications and limits Understand flow-control and routing Discuss recent issues related to the above topics Data Communications Fundamentals: Signals, Codes, Compression, Integrity, Powerline Communications, and Skype 4 / 209 Signals Codes Analog and Digital Signals Compression Data integrity Powerline communications Skype References 1 S. A. Baset, H. Schulzrinne. An analysis of the Skype Peer- to-Peer Internet Telephony Protocol, 15 Sept. 2004, 12 pp. 2 B. A. Forouzan. Data Communications and Networking, McGraw Hill, 4th edition, New York, 2007. 3 S. Huczynska. Powerline communication and the 36 officers problem, Phil. Trans. R. Soc. A 364 (2006), 3199{3214.
    [Show full text]