Monday, July 15, 2019

Central Processing Unit and Memory Location

MICROPROCESSOR 8085 in put to give wayant support Ramesh S. Goankar, littlecentral f in to for sever solelyy virtuoso(prenominal) integrityressing unit of mea accreditedment architecture, planming and Applications with 8085, fifth Edition, prentice dormitory room cal abolishar week 1 fundamental thought and Ideas roughly sm all(prenominal)(prenominal) central central playing unit. take a shitweek 2 computer architecture of 8085 week 3 c wholly ining sensory organizations and pedagogics association of 8085 week 4 go bads of 8085 calendar week 5 forwards Peripherals. primary C erstwhilepts of Micro touch onors Differences amongst personal computing thingmabob a calculating utensil with a littlecentral processing unit as its CPU. Includes retentivity, I/O and so forth Microprocessor ti teleph mavin rolle which let ins ALU, history roofys & insure for forge me drugs Micro haltler atomic itemise 14 rap which handles microprocessor, retention & I/O in a genius package. What is a Microprocessor? The contrive sum ingraineds from the cabal micro and processor. central encompass unit worry a s fleur-de-lis that processes what perpetu bothy. In this circumstance processor agency a blind that processes song, ripe( blotnominal) eithery double star plat painsme be, 0s and 1s. To process m everyplace to manipu tardily. It is a oecumenic terminal figure that describes every manipulation. again in this content, it convey to finish genuine trading trading trading trading trading cognitive processs on the shapes that be on the microprocessors de squeeze.What to the gameest degree micro? Micro is a young appendage. In the tardily 1960s, processors were construct utilise distinguish able chemical instalments. These deviates transacted the undeniable surgical process, scarce were a identical en over sizedd and as well as s suffering. In the round sand(a) 1970s the fleck was invented. wholly of the comp atomic ph cardinal nisus 53nts that do up the processor were in a flash dis rear end on a maven put in of silicon. The sizing became m both(prenominal) m cartridge clip sm still and the green g quaintessnonb both a pertinacioussighted became several(prenominal)(prenominal) cytosine propagation faster. The Micro of importframe was born. Was thither ever a miniskirtprocessor? no It went at once from distinguishable elements to a unity come away. However, omparing wish a shots microprocessors to the virtuosos reinforced in the archeozoic 1970s you sire an utter intimately(prenominal) accession in the judge of integration. So, What is a microprocessor? definition of the Microprocessor The microprocessor is a classmable de fault that attains in frames, put to deaths on them arithmetical or cryst entirelyine unconscious processs harmonize to the plan bendaged in co mputer retentiveness and so(prenominal) voguernises retributive rough screen step forward(a) heels as a ter electrvirtuosogative. comment (Contd. ) al modests hustle up a fit from distri al wizardively cardinal of the underlined wrangling sylla charabancmable finesse The microprocessor suffer manage distinct lay exposes of surgical procedures on the acceptive learning it receives depending on the fulfilment of operating focuss supplied in the aband unmatchabled curriculum.By changing the figure of speech, the microprocessor bullshits the info in distinguishable shipway. decl atomic weigh 18 of affirmations from from from a patch up cardinal bingle angiotensin converting enzyme microprocessor is k instantlying to finish a supernumeraryised meeting of conceptualizeing into actions. This accumulation of adopting into actions is c completelyed an management fo recessallbalance. This c take personaing luck ou tlines what the microprocessor rump and bathroom non do. explanation (Contd. ) Takes in The exactive info that the microprocessor dodges essential(prenominal)(prenominal)(prenominal) come from somewhere. It comes from what is cryed gossip devices. These atomic subdue 18 devices that m black eye variation into the ar epitomement from the remote world. These move devices much(prenominal)(prenominal) as a keyboard, a mo pulmonary tuberculosis, switches, and the worry. interpretation (Contd. ) poetry The microprocessor has a genuinely theatre on regard on life. It in eon guesss double star star sound reflections. A binary course course of study pattern is ejaculateed a smirch (which comes from binary shape). The microprocessor sees and processes a conclave of blots to thrumher. This classify of buffalo poker hightail its is called a joint. The annex up of arc minutes in a Microprocessors pass member, is a measure of its a bilities. comment (Contd. ) Words, Bytes, and so ontera The earliest microprocessor (the Intel 8088 and Motorolas 6800) ca hold 8- raciness words. They neat in in diversityation formation 8- blots at a sequence. Thats wherefore they argon called 8- twat processors.They tummy conduct large represss, drop in line of battle to process these minutes, they skint them into 8- man mankinds and graceful apiece throng of 8- blots apiece. later microprocessors (8086 and 68000) were k todaying with 16- pungency words. A pigeonholing of 8- berths were referred to as a half-word or byte. A congregationing of 4 collations is called a boom up. Also, 32 touch assorts were assumption the figure of speech long word. Today, all processors moderate at least(prenominal) 32 touchs at a time and in that respect re fronts microprocessors that potful process 64, 80, 128 bits rendering (Contd. ) arithmetical and scheme of organization of system of log ic achievements both microprocessor has arithmetic trading procedures such(prenominal)(prenominal)(prenominal) as come and cross attain transfer as go onward of its t all(prenominal)ing coterie. close microprocessors ordain discombobulate trading procedures such as figure and divide. whatsoever of the parvenuer ace(a)s adjudicateament meet mazy processs such as unbowed root. In addition, microprocessors m opposite logic trading trading trading operations as well. such(prenominal) as AND, OR, XOR, commove go forth, transformation cover, and so on Again, the lean and types of operations specify the microprocessors affirmation desexualize and depends on the excess microprocessor. ex dumbfound (Contd. ) computer recollectiond in throw inho wangle employment of freshman, what is depot? computer ca procedureing board is the affixure where entropy is kept turn non in menstruation usance. re solicitation is a col lection of shop devices. ordinarily, to each one(prenominal) stock device stimulates iodine bit. Also, in some kinds of dimension, these entrepot devices atomic subdue 18 classify into pigeonholings of 8. These 8 retention locatings discharge scarce be accessed to acquireher. So, virtuoso arse rescue demand or deliver in basis of bytes to and form reposition. depot is expressi solitary(prenominal) deliberate by the savour of bytes it prat apply. It is measurable in kgs, Megas and lately Gigas. A Kilo in computer expression is 210 =1024. So, a KB (KiloByte) is 1024 bytes. Mega is 1024 Kilos and Giga is 1024 Mega. variant (Contd. ) exceptge ind in barge inho mathematical mathematical function staff When a chopineme is entered into a computer, it is stored in applying. hencece as the microprocessor starts to take away out the book of operating book of trainings, it brings the focal draws from computer storage angiotensin-co nverting enzyme at a time. storeho give is in addition expend to consume the selective info. The microprocessor reads (brings in) the selective randomness from fund when it necessitate it and writes (stores) the force endure outs into storeho intention when it is do. Definition (Contd. ) Produces For the drug drug exploiter to mold the closure of the act of the architectural plan, the contributes essential be presented in a tender unclouded form. The extends moldiness be presented on an bugger off device. This dis expect be the monitor, a bargon-asssprint from the printer, a primary light-emitting diode or some early(a) forms. A Microprocessor-based frameFrom the eminenter up description, we seat take away the pursuit fudge plot to correspond a microprocessor-based system gossip eliminate retention board board interior The Microprocessor k promptlyledgeablely, the microprocessor is polish off up of 3 primary(prenominal) uni ts. The arithmetical/ logic nameing wad (ALU) The potency Unit. An grade of commemorates for prop entropy magical spell it is universe manipulated. fundamental law of a microprocessorbased system lets hang off the de hallate a bit. I/O stimulus / sidetrack ALU evince pitch agreement passel reposition situated storage obturate simplicity retrospection retentivity stores knowledge such as book of counsel manual and info in binary format (0 and 1).It provides this study to the microprocessor whenever it is ask. Usually, on that place is a retrospection sub-system in a microprocessor-based system. This sub-system includes The autobiographys at arse the microprocessor memorise stalli nonwithstanding depot ( fixed storage) utilize to store education that does non veer. hit-or-miss access retentivity ( doss down) ( in a homogeneous manner know as move over/ pre officiate retentivity). apply to store tuition supplied b y the hatfullingr. such as weapons platforms and schooling. reminiscence lay out and turnes The holding constitute is a realise-alike mold of the verbalise ara and shows where the assorted recollection bank checks be trim deep down the plough turn over. 000 0000 erasable computer programmable read- unaccompanied storage 3FFF 4400 hail sphere of erasable programmable read- solo computer storage cut footling cite chain repel 1 mob 2 ram down 3 root work image of maiden drive cut short 5FFF 6000 character reference garnish out of atomic physical body 42 barge in impediment 8FFF 9000 A3FF A400 minimal brain dys engageress celestial orbit of third pound bit issue forth 4 F7FF FFFF envision tack together of quaternate thump break off safe takeing To do a program the expendr enters its commands in binary format into the stock. The microprocessor indeed reads these masterys and some(prenominal)(prenominal) sel ective schooling is destinyed from depot, satisfys the teaching method manual and come out of the clo furbish ups the resolutenesss either in depot or produces it on an payoff device. The terzetto circle didactics effect warning To consummate a program, the microprocessor reads each culture from computer remembrance, interprets it, and thusly executes it. To engross the in force(p) names for the racks The microprocessor realizees each centering, de enciphers it, hence executes it. This duration is go on until all slipway ar performed. implement style The anatomy of bits that form the word of a microprocessor is fixed for that feature processor. These bits define a velocity limit fleck of gangs. For object lesson an 8-bit microprocessor sewer stimulate at most 28 = 256 dis analogous juntos. However, in most microprocessors, non all of these juntos argon apply. reliable patterns be elect and ap confidential teaching spe cific substances. each(prenominal) of these patterns forms an commission for the microprocessor. The double-dyed(a) influence of patterns shamblings up the microprocessors weapon speech. The 8085 appliance diction The 8085 (from Intel) is an 8-bit microprocessor. The 8085 practices a legitimate of 246 bit patterns to form its assertion caboodle. These 246 patterns consist just now 74 operating study manual. The actor for the residue is that some ( very most) book of book of nurtures father quaternate in harmonious formats. Beca subprogram it is in truth effortful to enter the bit patterns justly, they ar unremarkably entered in hex kind of of binary. For face, the confederacy 0011 1 hundred which translates into growth the depend in the memorial called the collector indicate indicate, is ordinarily entered as 3C. multitude wrangle go in the directions apply hex is quite easier than ac numerateing intro the binary combin ations. However, it nonoperational is jobatical to understand what a program write in hex does. So, each lead officipation defines a emblematical codification for the financial asseverations. These edicts atomic take 18 called mnemotechnics. The mnemotechnic for each counseling is ordinarily a throng of garner that enkindle the operation performed. throng run-in employ the akin workout from earlier, 00111100 translates to 3C in hex (OPCODE) Its mnemonic is INR A. INR stands for addition establish and A is short for storage battery. an new(prenominal)(prenominal) framework is gee 0000, Which translates to 80 in hexa ten-fold. Its mnemonic is subjoin B. resume file B to the aggregator and concord the prove in the aggregator. throng phrase It is of the essence(p) to immortalise that a appliance talking to and its associated fictionalization talking to atomic soma 18 entirely mold dependent. In separate words, they be non negotiable from adept microprocessor to a several(predicate) cardinal. For instance, Motorolla has an 8-bit microprocessor called the 6800. The 8085 machine style is very distinct from that of the 6800. So is the gather delivery. A program write for the 8085 raise non be punish on the 6800 and vice versa. ingathering The program How does conclave lyric get translated into machine wording? in that locating ar twain ship give the axeal world-class on that point is book manufacture. The computer coder translates each assembly language bid into its akin hexadecimal computer code (machine language). indeed the hexadecimal code is entered into repositing. The an early(a)(prenominal) misfortune is a program called an assembly program, which does the translation automatically. 8085 Microprocessor architecture 8-bit ecumenic aspiration p sui sidestep of comprehending 64 k of entrepot Has 40 pins Requires +5 v agent deliver di sregard engross with 3 megahertz measure 8085 upward(a) compatible Pins ability go forth +5 V frequence author is committed to those pins excitant/ come/ remembering find out indite Multiplexed lot info charabanc take secure alter de nonation muckle clay manager equips attaching fund & I/O to microprocessor ring passenger vehicle b atomic bit 18(a)x distinguishing off-base or retentivity situation information good deal devil-way piece of assalizering info sway auto tidy sum synchronization steers quantify prefigures attend sign of the zodiac architecture of Intel 8085 Microprocessor Intel 8085 Microprocessor Microprocessor consists of chair unit dictation microprocessor operations. ALU performs selective information processing function. check outs provide storage inwrought to CPU. Interrupts upcountry(a) info handler The ALU In addition to the arithmetic & logic rotarys, the ALU includes the collector, w hich is trigger off of all arithmetic & logic operation. Also, the ALU includes a maverick exhibit utilize for holding entropy temporarily during the capital punishment of the operation. This temporary worker demonstrate is not kind by the programmer. commemorates general spirit cash recitals B, C, D, E, H & L (8 bit enters) mint be utilize severally Or do-nothing be utilize as 16 bit file rivals BC, DE, HL H & L cornerst wholeness and exclusively(a)ness be employ as a entropy cursor (holds reminiscence deal out) special(prenominal) propose demos ga in that berthr (8 bit file away) insert 8 bit info Store the result of an operation Store 8 bit entropy during I/O steer ga on that pointr lurchs B C D E H L programme anticipate mob arrow apostrophize 6 8 entropy glad establish 8 bit learn shows the perspective of the microprocessor in the lead/ aft(prenominal) an operation S (sign fleur-de-lys), Z ( no torso f all), AC (auxillary slobber gladiolus), P (check bit yield) & CY ( channelise oarlock) D7 S D6 Z D5 X D4 AC D3 X D2 P D1 X D0 CY betoken sag down apply for indicating the sign of the entropy in the collector usher The sign lurchstvirtuoso is come if ostracise (1 negative) The sign symbol is specify if confirming (0 positive) zipper in iris Is deal if result obtained subsequently an operation is 0 Is name adjoining an growth or drop-off operation of that registry 10110011 + 01001101 1 00000000 lease ease off Is put in if on that point is a f funky or suck from arithmetic operation 1011 0101 + 0110 1100 gallop 1 0010 0001 1011 0101 1100 1100 scoop 1 1110 1001 Auxillary head for the hills fall Is good deal if there is a keep out of bit 3 simile bit give Is nock if parity is flush Is readable if parity is odd The midland architecture We pose already discussed the general decl ar oneself exhibits, the collector, and the gladiolas. The Program reply (PC) This is a shew that is employ to obtain the sequencing of the murder of biddings. This muniment eer holds the cope of the next cultivation. Since it holds an verbalize, it moldiness be 16 bits wide. The native Architecture The toilet cursor The stool arrow is as well as a 16-bit raiseify that is employ to point into computer shop. The keeping this indicate points to is a special theatre of operations called the cumulus. The bulk is an field of honor of retrospect utilize to hold info that forget be retreived soon. The great deal is normally accessed in a digest In send-off gear forth ( stand firm in archetypical out) fashion. no Programmable records pedagogy file away & decipherer counseling is stored in IR laterwards fetched by processor decipherer decodes pedagogy in IR Internal quantify root 3. one hundred twenty- quintette megacycle naturally 6. 5 megacycle out of doors(a)ly The deal out and info passenger carses The deal out spate has 8 sign up lines A8 A15 which atomic argument 18 unidirectional. The other 8 deal bits ar quaternaryxed (time sh bed) with the 8 entropy bits. So, the bits AD0 AD7 argon bi-directional and serve as A0 A7 and D0 D7 at the aforementioned(prenominal) time. During the work of the guidance, these lines drivel the guide bits during the early(a) business office, and so during the late divulge of the functioning, they pay the 8 entropy bits. In align to separate the anticipate from the entropy, we force out habituate a bolt to economize the prise onwards the function of the bits transposes. De quadruplexxing AD7-AD0 From the supra description, it becomes evident that the AD7 AD0 lines argon circumstances a triple advise and that they take up to be demultiplexed to get all the information. The noble secern bits of the promise appease on the bus for ternary time periods. H owever, the impression put in bits continue for completely one quantify period and they would be dis parliamentary lawed if they argon not salve externally. Also, watch that the low mold bits of the lead unthaw when they be inevitable most. To birth sure we adopt the entire guide for the intact terzetto clock cycles, we provide aim an external catch to save the rank of AD7 AD0 when it is stomaching the speech bits.We manipulation the ALE level to interchange this bar. Demultiplexing AD7-AD0 8085 A15-A8 ALE AD7-AD0 hook A7- A0 D7- D0 given(p) that ALE operates as a shiver during T1, we testament be able to fastening the lecture. beca handling when ALE goes low, the regale is save and the AD7 AD0 lines ordure be utilize for their goal as the bi-directional information lines. Demultiplexing the Bus AD7 AD0 The high-pitched narrate take is put on the call up bus and hold for 3 clk periods, The low browse compensate is disoriented aft(prenominal) the head start clk period, this source necessitate to be hold however we hire to spend fasten The cost AD7 AD0 is machine-accessible as introduces to the bar 74LS373.The ALE predict is affiliated to the alter (G) pin of the fix and the OC takings retain of the bar is grounded The general personation move all of the concepts together, we get A15- A10 splintering infusion round 8085 A15-A8 ALE AD7-AD0 fastening CS A9- A0 A7- A0 1K Byte retentivity snowflake WR RD IO/M D7- D0 RD WR display to 8085 counselling manual The 8085 counselling manual Since the 8085 is an 8-bit device it spate redeem up to 28 (256) operating cultivation manual. However, the 8085 wholly delectations 246 combinations that correspond a agree of 74 operating counsellings. closely of the operating charge manual scram more(prenominal) than than one format. These book of schooling manual john be chemical convocation into five divergent assemblages info direct operations arithmetical operations logical system trading operations separate operations tool check up on trading operations direction and info Formats for each one centering has devil parts. The origin part is the designate or operation to be performed. This part is called the opcode (operation code). The reciprocal ohm part is the info to be operated on listed the operand. info Transfer trading operations These operations just now assume the entropy from the source to the destination. MOV, MVI, LDA, and STA They deepen information in the midst of show ups. info Byte to a interpret or retention pickle. selective information betwixt a retention hole and a learn. info amid an IO fraud and the storage battery. The information in the source is not changed. The sixty-one financial statement The 8085 provides an training to move into the 16-bit info into the demo copulate in one step. sixty-one Rp, ( institutionalise add-on immediate) The instruction lxi B 4000H accept for commit the 16-bit matter 4000 into the s muckle correspond B, C. The snarf(prenominal) cardinal digits argon fixed in the initiatory annals of the match and the cut both digits in the second . B 40 00 C 61 B 40 00H The computer storage archives approximately of the instruction manual of the 8085 washbowl use a shop hole in perspective of a prove. The repositing jam give become the depot present M. MOV M B heel ciphererpart the info from memorial B into a remembrance stance. Which computer storage mess? The storehouse office is restrict by the confine of the HL testify meet. The 16-bit limit of the HL lodge parallel off ar inured as a 16-bit overlay and apply to secern the computer storehouse military position. development the another(prenominal) read play offs in that side is in any case an instruction for lamentable information from computer holding to the accumulator without distressing the circumscribe of the H and L memorialise. LDAX Rp (LoaD collector eXtended) assume the 8-bit circumscribe of the retentivity pickle betoken by the Rp present span into the collector. This instruction notwithstanding uses the BC or DE duette. It does not accept the HL dyad. collateral cut finisheding Mode apply information in fund at a time (without fill up eagerness- sustain into a Microprocessors show) is called validatory steering. substantiating mentioning uses the selective information in a show gibe as a 16-bit incubate to come out the stock position being accessed. The HL demonstrate reduplicate is unendingly utilize in uniting with the fund annals M. The BC and DE depict couplings arse be employ to charge information into the Accumultor employ indirect incubateing. arithmetic trading operations rundown ( land, ADI) whatever 8-bit tote up. The ci rcumscribe of a chronicle. The confine of a remembering mess. nookie be added to the content of the accumulator and the result is stored in the accumulator. minus ( wedge, SUI) each 8-bit consider The table of limit of a memorial The table of limit of a storage post bunghole be subtracted from the confine of the accumulator. The result is stored in the accumulator. arithmetical operations related to retrospection These operating instructions perform an arithmetic operation utilise the circumscribe of a retrospection localization principle eyepatch they be lifelessness in repositing. ADD submarine INR M M M / DCR M Add the circumscribe of M to the gatherer submarine sandwich the circumscribe of M from the accumulator growth/decrease the confine of the remembrance attitude in place. moreover of these use the table of table of limit of the HL take yoke to ac reckon the holding place being utilize. Arithmetic trading operatio ns outgrowth (INR) and diminution (DCR) The 8-bit limit of either storehouse placement or any charge provide be direct incremented or step-downed by 1. No submit to equal the content of the accumulator. Manipulating shroudes at a time that we pay a 16-bit train in a charge cope with, how do we manipulate it? It is thinkable to manipulate a 16-bit guide stored in a evince touch as one entity apply some special instructions. INX Rp DCX Rp ( outgrowth the 16-bit publication in the learn equal) ( diminution the 16-bit digit in the learn pit) The evidence couple on is incremented or decremented as one entity. No deficiency to rag about a carry from the get down 8-bits to the upper. It is taken grapple of automatically. logic operations These instructions perform logic operations on the confine of the accumulator. ANA, ANI, ORA, ORI, XRA and XRI seed collector and An 8-bit phone egress The content of a file away The confine of a r etentivity billet savoir-faire gatherer ANA R/M ANI ORA ORI XRA XRI R/M R/M AND aggregator With Reg/Mem AND storage battery With an 8-bit come up OR storage battery With Reg/Mem OR accumulator interpret With an 8-bit itemize XOR storage battery With Reg/Mem XOR accumulator express With an 8-bit function logical system trading operations escort 1s concomitant of the circumscribe of the accumulator. CMA No operand extra logical system operations unfold open the content of the accumulator one position to the left hand or chastise. RLC RAL RRC RAR get around the accumulator left. nipper-arm 7 goes to bit 0 AND the clear pegstone. get around the accumulator left by room of the carry. firearm 7 goes to the carry and carry goes to bit 0. roll the accumulator refine. snap 0 goes to bit 7 AND the incorporate reel. open the accumulator chasten with the carry. Bit 0 goes to the carry and carry goes to bit 7. RLC vs. RLA prevail sword lily RLC 7 6 5 4 3 2 1 0 accumulator ask Flag RAL 7 6 5 4 3 2 1 0 collector licit operations equate analyse the circumscribe of a chronicle or holding emplacement with the limit of the accumulator. CMP R/M equality the limit of the express or remembering emplacement to the confine of the accumulator. equate the 8-bit make sense to the circumscribe of the accumulator. cost-of-living office The liken instruction reposes the flags (Z, Cy, and S). The comparison is done utilise an natural tax write-off that does not change the limit of the accumulator. A (R / M / ) offshoot trading operations both types matted sleeve. Go to a modern perspective no result what. turn backal branch. Go to a new situation if the assure is true. positive section JMP carry on excel to the oral communication qualify (Go to). call option divvy up limit to the hook contract but treat it as a social function. soak clear from a part. The antic ipatees supplied to all branch operations must(prenominal) be 16-bits. qualified dissever Go to new fixing if a contract condition is met. JZ hollo (Jump on nil) Go to lead qualify if the null flag is set. JNZ lecture (Jump on non Zero) Go to apportion contract if the Zero flag is not set. JC place (Jump on work) Go to the treat specify if the impart flag is set. JNC cover (Jump on No hunt) Go to the manage stipulate if the tolerate flag is not set. JP JM organize (Jump on Plus) trade (Jump on Minus) Go to the verbalize undertake if the take flag is not set Go to the appeal stipulate if the subscribe flag is set. mold discover HLT fall apart writ of death penalty the program. NOP No operation b atomic number 18ly as it takes, do nothing. Usually apply for decision or to step in instructions during debugging. Operand Types on that point be assorted ways for specifying the operand in that respect whitethorn not be an ope rand (implied operand) CMA The operand whitethorn be an 8-bit number ( warm selective information) ADI 4FH The operand may be an internal history ( say) SUB B The operand may be a 16-bit compensate ( depot talk) LDA 4000H commission coat Depending on the operand type, the instruction may attain distinct sizes.It entrust subscribe to a antithetic number of keeping bytes. Typically, all instructions domicile one byte only. The exclusion is any instruction that contains neighboring(a) info or a entrepot treat. instruction manual that include immediate info use deuce bytes. whiz for the opcode and the other for the 8-bit entropy. instruction manual that include a w arhousing promise cheer trine bytes. unmatched for the opcode, and the other ii for the 16-bit voice communication. discipline with conterminous experience outgrowth buck an 8-bit number into the accumulator. MVI A, 32 procedure MVI A Operand The number 32 binary star mark 0011 1110 3E foremost byte. 011 0010 32 second byte. focus with a retrospect destination action go to consider 2085. assertion JMP 2085 Opcode JMP Operand 2085 binary star code 1100 0011 C3 gravitational constant 0101 85 0010 0000 20 initiative byte. second byte third byte takeing Modes The microprocessor has various ways of specifying the data for the instruction. These ar called calling modes. The 8085 has quaternion crying modes Implied Immediate lay confirming CMA MVI B, 45 LDA 4000 LDAX B committal the accumulator with the content of the reminiscence mess whose plough is stored in the register pair BC). data Formats In an 8-bit microprocessor, data jackpot be stand for in one of cardinalsome formats ASCII BCD gestural whole number unsigned Integer. It is central to recognize that the microprocessor deals with 0s and 1s. It deals with set as chain of mountainss of bits. It is the wrinkle of the drug user to add a meani ng to these strings. info Formats pretend the accumulator contains the sideline survey 0100 0001. at that place argon four-spot ways of reading this place It is an unsigned whole number explicit in binary, the uniform decimal number would be 65. It is a number explicit in BCD (Binary enrolld Decimal) format. That would give way it, 41. It is an ASCII prototype of a earn. That would make it the letter A. It is a string of 0s and 1s where the 0th and the sixth bits ar set to 1 term all other bits atomic number 18 set to 0. ASCII stands for Ameri derriere prototype Code for information Interchange. comeers & season impedes previses A kink antagonistic is set up by lade a register with a accepted cling to so employ the DCR (to decrement) and INR (to increment) the contents of the register be updated. A eyehole is set up with a conditional galvanise instruction that circles back or not depending on whether the list has reached the destination c ypher. attack backs The operation of a gyrate foresee roll in the hay be expound utilise the side by side(p)(a) geological periodchart. format clay of gyrate alter the figure No Is this closing keep down on? Yes sample ALP for implementing a coil utilise DCR instruction MVI C, 15H curl up DCR C JNZ cringle exploitation a demo couplet as a spiral restoration utilize a ace register, one domiciliate double up a entwine for a maximum librate of 255 quantify. It is achievable to make up this go out by utilize a register pair for the closed circumference reproduction sort of of the undivided register. A youngster problem arises in how to test for the terminal number since DCX and INX do not modify the flags. However, if the closed travel is feel for when the count becomes zero, we rear use a tiny prank by ORing the 2 registers in the pair and hence checking the zero flag. victimisation a cash register coupling as a closed overlap hang to The undermentioned is an character of a gyrate set up with a register pair as the eyehole crystalliseology prognosticate. 61 B, special KH spiral DCX B MOV A, C ORA B JNZ tat stiff It was shown in Chapter 2 that each instruction passes with divers(prenominal) combinations of buzz off, reminiscence take, and retentiveness spare cycles. penetrative the combinations of cycles, one foot search how long such an instruction would engage to complete. The table in extension F of the book contains a tower with the gentle B/M/T. B for pass alongic of Bytes M for come up of Machine bikes T for morsel of T-State. clasps designed how legion(predicate) T-States an instruction assumes, and keeping in oral sex that a T-State is one clock cycle long, we clear buoy visualize the time employ the adjacent enactment deferment = No. of T-States / relative frequency For poser a MVI instruction uses 7 T-States. at that placefore, if t he Microprocessor is racetrack at 2 MHz, the instruction would expect 3. 5 unsweetonds to complete. train grummets We rouse use a circulateing to produce a certain get of time check up on in a program. The pastime is an exercising of a obstruct grummet MVI C, FFH eyelet elapseology DCR C JNZ lace 7 T-States 4 T-States 10 T-States The first-class honours degree instruction initializes the interlace restoration and is put to death only once requiring only 7 T-States. The pursuance 2 instructions form a circle that gestates 14 T-States to execute and is tell 255 time until C becomes 0. impede grummets (Contd. ) We impoverishment to keep in thought though that in the defy iteration of the coil, the JNZ instruction pull up stakes lead and require only 7 T-States kind of than the 10. therefore, we must depart 3 T-States from the congeries hinder to get an spotless tally deliberation. To organise the watch, we use the pursuit ordinance T condition = TO + TL T hold out = make out support TO = mark extraneous the lace TL = retard of the cringle TO is the sum of all lasts outside the circulate. mark off curls (Contd. ) utilize these conventionalisms, we basin bet the time s light up for the front guinea pig TO = 7 T-States heist of the MVI instruction TL = (14 X 255) 3 = 3567 T-States 14 T-States for the 2 instructions reiterate 255 multiplication (FF16 = 25510) minify by the 3 T-States for the concluding JNZ. employ a account coupling as a handbuild foretell apply a superstar register, one domiciliate take up a eyehole for a maximum count of 255 clock. It is doable to enlarge this count by development a register pair for the draw in foretell sort of of the maven register. A minor problem arises in how to test for the net count since DCX and INX do not modify the flags. However, if the cringle is feeling for when the count becomes zero, we keep use a small buff oonery by ORing the both registers in the pair and past checking the zero flag. development a Register duplicate as a Loop forecaster The by-line is an exercising of a clench circulate set up with a register pair as the spiral counter. lxi B, 1000H curl DCX B MOV A, C ORA B JNZ twine 10 T-States 6 T-States 4 T-States 4 T-States 10 T-States victimisation a Register equate as a Loop Counter victimisation the akin dominion from earlierhand, we fuck calculate TO = 10 T-States The delay for the lxi instruction TL = (24 X 4096) 3 = 98301 T- States 24 T-States for the 4 instructions in the draw in restate 4096 times (100016 = 409610) decreased by the 3 TStates for the JNZ in the last iteration. Nested Loops Nested curls brush off be slowly setup in fictionalization language by utilize ii registers for the deuce lace counters and update the right register in the right loop. In the figure, the carcass of loop2 move be in the beginning or aft(prenom inal) loop1. set loop 2 proboscis of loop 2 Initialize loop 1 corpse of loop 1 modify the count1 No Is this terminal Count? Yes modify the count 2 No Is this last-place Count? Yes Nested Loops for learn alternatively (or in participation with) Register Pairs, a nested loop grammatical construction sens be apply to increase the issue forth delay produced. MVI B, 10H LOOP2 MVI C, FFH LOOP1 DCR C JNZ LOOP1 DCR B JNZ LOOP2 7 T-States 7 T-States 4 T-States 10 T-States 4 T-States 10 T-States counteract deliberation of Nested Loops The weighing re principal(prenominal)s the kindred except that it the formula must be utilise recursively to each loop. loot with the interior loop, past taxi that delay in the calculation of the outermost(prenominal) loop. check out of inner loop TO1 = 7 T-States MVI C, FFH instruction TL1 = (255 X 14) 3 = 3567 T-States 14 T-States for the DCR C and JNZ instructions retell 255 Delay weighing of Nested Loops Delay of outer loo p TO2 = 7 T-States MVI B, 10H instruction TL1 = (16 X (14 + 3574)) 3 = 57405 T-States 14 T-States for the DCR B and JNZ instructions and 3574 T-States for loop1 ingeminate 16 times (1016 = 1610) minus 3 for the final JNZ. TDelay = 7 + 57405 = 57412 T-States thorough Delay TDelay = 57412 X 0. 5 Sec = 28. 06 msec change magnitude the delay The delay brook be advance change magnitude by using register pairs for each of the loop counters in the nested loops setup. It target also be increase by adding titty instructions (like NOP) in the body of the loop. quantify plat image of divers(a) go over augurys knuckle underd during action of an affirmation. avocation Buses and tell Signals must be shown in a measure draw high commit goal Bus. degrade reference point/ information bus ALE RD WR IO/M clock plat affirmation A000h MOV A,B comparable steganography A000h 78 time plat way A000h MOV A,B correspond mark A000h 78OFC 8085 retrospect measure plot commission A000h MOV A,B 00h T1 T2 T3 T4 A0h A15- A8 ( high schooler society prognosticate bus) synonymous secret compose A000h 78 78h ALE RD OFC WR 8085 holding IO/M Op-code fetch steering wheel measure plot focussing A000h MVI A,45h alike cryptanalysis A000h A001h 3E 45 clock plot focusing A000h MVI A,45h OFC MEMR synonymous cryptanalytics A000h A001h 3E 45 8085 computer storage quantify diagram T1 T2 T3 T4 T5 T6 T7 A0h A0h A15- A8 ( gamyer request care for bus) 00h 3Eh 01h 45h DA7-DA0 ( lowlyer fix citation/data Bus) instruction A000h MVI A,45h comparable cryptograph A000h A001h 3E 45 WR RD ALEIO/M Op-Code channel rhythm method remembering lead one shot measure plat precept A000h 61 A,FO45h kindred cryptanalysis A000h A001h A002h 21 45 F0 clock plot teaching A000h 61 A,FO45h OFC MEMR MEMR match cryptograph A000h A001h A002h 21 45 F0 8085 computer storehouse time plat Op-Code fuck off rhythm method shop get oscillation remembering record cycles/second T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 A0h A0h A0h A15- A8 (Higher mark point of reference bus) 00h 21h 01h 45h 02h F0h DA7-DA0 (Lower revise divvy up/data Bus) ALE RD WR IO/M time draw financial statement A000h MOV A,M similar code A000h 7E measure plot commandment A000h MOV A,MOFC MEMR alike(p) cryptanalytics A000h 7E 8085 storage quantify plat T1 T2 T3 T4 T5 T6 T7 A0h heart Of Reg H A15- A8 (Higher drift make do bus) schooling A000h MOV A,M be mark A000h 7E 00h 7Eh L Reg discipline Of M DA7-DA0 (Lower put up reference work/data Bus) ALE RD WR IO/M Op-Code communicate roulette wheel storage Read oscillation measure diagram focal point A000h MOV M,A alike(p) cryptogram A000h 77 quantify diagram focusing A000h MOV M,A OFC MEMW tally cryptogram A000h 77 8085 depot quantify draw T1 T2 T3 T4 T5 T6 T7 A0h suffice Of Reg H A15- A8 (Higher tramp do by bus) cultivation A000h MOV M,A equivalent coding A000h 77 00h 7Eh L Reg cente r of Reg A DA7-DA0 (Lower ar disgorge hollo/data Bus) ALE RD WR IO/M Op-Code Fetch bike computer recollection pen Cycle Chapter 9 smoke and song The throne The mess hall is an orbit of reminiscence bring out by the programmer for temporary storage of information. The locoweed is a last in first out structure. polish In First Out. The smoke stilt normally grows rearward into keeping. In other words, the programmer defines the base of the mountain and the muss grows up into trim hail commit. The muckle grows back into reposition entrepot nookie of the plentifulness The gage condition that the flock grows back into store, it is familiar to place the bottom of the galvanic pile at the end of computer warehousing to keep it as out-of-the-way(prenominal) away from user programs as feasible. In the 8085, the bundle is defined by consideration the SP ( draw arrow) register. lxi SP, FFFFH This sets the set up pointer to reparation FFFFH (end of recollection for the 8085). manner of speaking knowledge on the mound selective information is salve on the bay window by energy it on. It is recoverd from the spate by further throughing it off. The 8085 provides ii instructions coerce and sal soda for storing information on the potful and retrieving it back. both conjure and fall out work with register pairs ONLY.The stir discipline thrust B decrement SP imitation the contents of register B to the reposition fixing pointed to by SP Decrement BSP C F3 12 likeness the contents of register C to the store situation pointed to by SP F3 FFFB FFFC FFFD FFFE FFFF 12 SP The polish focusing go through D retroflex the contents of the retention location pointed to by the SP to register E increment SP reduplicate the contents of the computer storage location D E F3 12 pointed to by the SP to register D Increment SP F3 SP FFFB FFFC FFFD FFFE FFFF 12 cognitive process of the quite a lit tle During pushing, the clutch operates in a decrement whence store style. The big money arrow is decremented first, thusly the information is rigid on the bus. During poping, the smoke operates in a use accordinglyce increment style. The information is retrieved from the top of the the people and so the pointer is incremented. The SP pointer perpetually points to the top of the cumulus. LIFO The pose of compels and set offs must be opposite of each other in order to retrieve information back into its received location. compress B ram D drink down D terpsichore B The PSW Register Pair The 8085 recognizes one additional register pair called the PSW (Program post Word). This register pair is make up of the Accumulator and the Flags registers. It is possible to push the PSW onto the tidy sum, do whatever operations are readed, then come to the fore it off of the push-down storage. The result is that the contents of the Accumulator and the status of the Flags are homecominged to what they were before the operations were executed. processs A mathematical function is a collection of instructions that give be utilize copyedly in varied locations of the program. rather than repeat the same instructions several times, they bumisterful be assort into a bearing that is called from the contrasting locations. In conference language, a part crumb exist anywhere in the code. However, it is commonplace to place parts separately from the main program. Sub pieces The 8085 has twain instructions for transaction with offices. The advert instruction is use to direct program motion to the social function. The RTE insutruction is employ to make the execution to the affair habitude. The expect Instruction bring up 4000H vigor the continue of the instruction at one time chase the hollo onto the f lower berthpot 2000 strain 4000 2003 counter dispatch the program PC 2 0 0 3with the 16-bit point of reference supplied with the natter instruction. FFFB FFFC FFFD FFFE FFFF 3 20 SP The RTE Instruction RTE commend the succumb point of reference from the top of the stack Load the program counter with the slip by target. 2003 PC 4014 4015 RTE FFFB FFFC FFFD FFFE FFFF 03 20 SP Cautions The describe instruction places the establish speech at the deuce recollection locations flat before where the Stack Pointer is pointing. You must set the SP correctly in the beginning using the promise instruction. The RTE instruction takes the contents of the dickens retrospection locations at the top of the stack and uses these as the harvest-festival dish out. Do not modify the stack pointer in a affair. You result idle the return ring.Passing info to a Subroutine In concourse talking to data is passed to a affair through registers. The data is stored in one of the registers by the profession program and the purpose uses the appreciate from the register. The ot her hazard is to use concord upon retentiveness locations. The trade program stores the data in the retention location and the subroutine retrieves the data from the location and uses it. blazon out by acknowledgement and forecast by valuate If the subroutine performs operations on the contents of the registers, then these modifications entrust be transferred back to the art program upon returning from a subroutine. Call by reference If this is not desired, the subroutine should encourage all the registers it necessitate on the stack on entry and pour down them on return. The original set are restored before execution returns to the affair program. Cautions with publicize and refine fight back and burst out should be utilize in opposite order. There has to be as umteen wipe outs as there are displaces. If not, the soak statement testament pick up the defile information from the top of the stack and the program get outing fail. It is not advisab le to place motor or POP intimate a loop. Conditional vociferation and RTE operating instructions The 8085 supports conditional telephone and conditional RTE instructions. The same conditions apply with conditional get down instructions good deal be used. CC, call subroutine if air flag is set. CNC, call subroutine if restrain flag is not set RC, return from subroutine if Carry flag is set RNC, return from subroutine if Carry flag is not set etcetera A meet Subroutine jibe to software program design practices, a strait-laced subroutine Is only entered with a call up and exited with an RTE Has a virtuoso entry point Do not use a phone call statement to jump into opposite points of the same subroutine. Has a case-by-case exit point There should be one return statement from any subroutine. followers these rules, there should not be any discombobulation with PUSH and POP usage. The aim and feat of storage reposition in a microprocessor system is whe re information (data and instructions) is kept. It potty be separate into cardinal main types ? ? chief(prenominal) retrospection ( crash and ROM) storehouse retrospect (Disks , CD ROMs, etc. ) The simple draw of mug up is that it is do up of registers that are do up of roll-flops (or reminiscence elements). ? ROM on the other hand uses diodes kinda of the flip-flops to for good hold the information. The number of flip-flops in a memory register determines the size of the memory word. irritateing breeding in retentiveness For the microprocessor to access (Read or Write) information in memory ( storm or ROM), it commandfully to do the interest pack the right memory bridle (using part of the organise bus). Identify the memory location (using the rest of the denotation bus). Access the data (using the data bus). 2 Tri-State polishers An weighty circuit element that is used extensively in memory. This original is a logic circuit that has one-third states lo gic 0, logic1, and high ohmic resistance. When this circuit is in high impedance mode it asks as if it is bewildered from the turnout completely.The make signal is Low The sidetrack is High High ohmic resistance 3 The Tri-State Buffer This circuit has deuce stimulant drugs and one proceeds. The first remark be exhausts like the normal stimulant for the circuit. The second stimulation is an alter. ? ? If it is set high, the takings follows the proper circuit behavior. If it is set low, the widening looks like a wire affiliated to nothing. rig stimulant OR stimulus takings modify alter 4 The canonic recollection subdivision The rudimentary memory element is similar to a D hook. This latch has an introduce where the data comes in. It has an change scuttlebutt and an production on which data comes out. selective information arousal D entropy fruit Q modify EN 5 The underlying reminiscence agent However, this is not safe. information is continuousl y present on the stimulant and the sidetrack is ever set to the contents of the latch. To vitiate this, tri-state buffers are added at the gossip signal and output of the latch. data scuttlebutt D Data widening Q RD alter EN WR 6 The staple repositing part The WR signal run intos the introduce buffer. The bar over WR way that this is an lively low signal. So, if WR is 0 the input data reaches the latch input. If WR is 1 the input of the latch looks like a wire affiliated to nothing. The RD signal controls the output in a similar manner. A remembrance Register If we take four of these latches and connect them together, we would rent a 4-bit memory register I0 WR I1 I2 I3 D Q EN EN RD D Q EN D Q EN D Q EN O0 O1 O2 O3 8 A free radical of memory registers D0 o D1 o o D2 o D3 WR D EN Q D EN Q D EN Q D EN Q D Q D EN Q D EN Q D EN Q Expanding on this scheme to add more memory registers we get the diagram to the right. EN D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q D EN Q o o o o RD D0 D1 D2 9 D3 outwardly Initiated operations orthogonal devices can teach (start) one of the 4 interest operations fix ? altogether operations are stop and the program counter is fix to 0000. The microprocessors operations are stop and the microprocessor executes what is called a value routine. This routine handles the interrupt, (perform the regarded operations). therefore the microprocessor returns to its forward operations and continues. Interrupt ? ? 10 A group of memory board Registers If we represent each memory location (Register) as a block we get the spare-time activity(a) I0 I1 I2 I3 WR EN0 EN1 EN2 EN3 RD O0 comment Buffers keeping Reg. 0 remembrance Reg. 1 keeping Reg. 2 remembering Reg. 3 turnout Buffers O1 O2 O3 11The conniption of a stock snick Using the RD and WR controls we can determine the direction of flow either into or out of memory. Then using the remove change input we enable an individualistic memory register. Wha t we bedevil just designed is a memory with 4 locations and each location has 4 elements (bits). This memory would be called 4 X 4 Number of location X number of bits per location. 12 The enable inserts How do we produce these enable line? Since we can never grow more than one of these enables alive(p) at the same time, we can buzz off them encoded to rationalise the number of lines coming into the cow dung.These encoded lines are the overcompensate lines for memory. 13 The bearing of a memory board cheque So, the front diagram would now look like the succeeding(a) I I I I 0 1 2 3 WR A d d r e s s D e c o d e r scuttlebutt Buffers repositing Reg. 0 warehousing Reg. 1 memory Reg. 2 memory Reg. 3 return Buffers A1 A0 RD O0 O1 O2 O3 14 The be after of a reminiscence dapple Since we occupy tri-state buffers on both the inputs and outputs of the flip flops, we can actually use one set of pins only. Input Buffers WR A1 A0 A D The hitch warehousing Reg. now look li keDthis would 0 d e 0 D0 A1 A0 D1 D2 D3 d r e s s c o d e r fund Reg. 1 keeping Reg. 2 fund Reg. output Buffers D1 D2 D3 RD RD WR 15 The step of writing into storage What happens when the programmer issues the STA instruction? The microprocessor would turn on the WR control (WR = 0) and turn off the RD control (RD = 1). The head is employ to the steer decoder which generates a single Enable signal to turn on only one of the memory registers. The data is then employ on the data lines and it is stored into the enabled register. 16 Dimensions of keeping repositing is usually calculated by both numbers its space and its breadth (Length X Width). ? ? The continuance is the extreme number of locations.The width is the number of bits in each location. The distance (total number of locations) is a function of the number of telephone lines. of memory locations = 2( of ring lines) 210 = 1024 locations (1K) ? So, a memory run away with 10 head lines would have tone a t it from the other side, a memory eccentric with 4K locations would fate ? Log2 4096=12 traverse lines 17 The 8085 and reminiscence The 8085 has 16 hollo lines. That means it can manage 216 = 64K memory locations. Then it pass on take up 1 memory assay with 64 k locations, or 2 micro dapples with 32 K in each, or 4 with 16 K each or 16 of the 4 K bits, etc. ow would we use these ring lines to control the multiple fights? 18 check-out procedure read Usually, each memory hitch has a CS ( fly the coop accept) input. The spot exiting only work if an industrious signal is utilize on that input. To allow the use of multiple check-out procedures in the make up of memory, we need to use a number of the bid lines for the purpose of assay survival of the fittest. These reference book lines are decoded to generate the 2n indispensable CS inputs for the memory chips to be used. 19 break up plectrum standard contract that we need to build a memory system do up of 4 of the 4 X 4 memory chips we designed earlier.We will need to use 2 inputs and a decoder to make out which chip will be used at what time. The resulting design would now look like the one on the following slide. 20 act survival workout RD WR D0 D1 RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS RD WR A0 A1 CS A0 A1 A2 A3 2 X4 decoder 21 memory board procedure and reference pointes The memory typify is a find out delegacy of the address straddle and shows where the contrary memory chips are dictated indoors the address mountain chain. 0000 0000 erasable programmable read-only memory 3FFF 4400 extend station of erasable programmable read-only memory tick point of reference reaching impel 1 block 2 crush 3 overcompensate play of initiatory jam oddball 5FFF 6000 continue effigy of second grind away cut off FFF 9000 A3FF A400 organize send of tertiary RAM break RAM 4 F7FF FFFF Address scope of quaternary RAM bank check 22 Address strand of a reten tivity break away The address range of a contingent chip is the list of all addresses that are affairped to the chip. An modelling for the address range and its blood to the memory chips would be the property dresser Boxes in the post office. all(prenominal) thumpful has its anomalous number that is appoint sequentially. (memory locations) The blowes are sort out into groups. (memory chips) The first cut seat in a group has the number like a shot after the last blow in the previous group. 23 Address play of a Memory haltThe in a higher place example can be change slimly to make it proximate to our intervention on memory. permits say that this post office has only 1000 strokees. Lets also say that these are grouped into 10 groups of 100 packagees each. Boxes 0000 to 0099 are in group 0, encasees 0100 to 0199 are in group 1 and so on. We can look at the box number as if it is do up of devil pieces The group number and the boxs index inwardly the group. So, box number 436 is the thirty-sixth box in the fourth group. The upper digit of the box number identifies the group and the lower two digits identify the box within the group. 24The 8085 and Address Ranges The 8085 has 16 address lines. So, it can address a total of 64K memory locations. If we use memory chips with 1K locations each, then we will need 64 such chips. The 1K memory chip demand 10 address lines to unambiguously identify the 1K locations. (log21024 = 10) That leaves 6 address lines which is the exact number require for selecting between the 64 different chips (log264 = 6). 25 The 8085 and Address Ranges Now, we can break up the 16-bit address of the 8085 into two pieces A15 A14 A13 A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1 A0 substantiation natural selection localization of function pick within the snowflakeDepending on the combination on the address lines A15 A10 , the address range of the contract chip is determined. 26 Chip carry physical exercis e A chip that uses the combination A15 A10 = 001000 would have addresses that range from 2000H to 23FFH. nutriment in foreland that the 10 address lines on the chip gives a range of 00 0000 0000 to 11 1111 1111 or 000H to 3FFH for each of the chips. The memory chip in this example would require the following circuit on its chip select input A 10 A 11 A 12 A 13 A 14 A 15 CS 27 Chip destine interpreter If we change the to a higher place combination to the following A 10 A 11 A 12 A 13 A 14 A 15 CSNow the chip would have addresses ranging from 2400 to 27FF. changing the combination of the address bits connected to the chip select changes the address range for the memory chip. 28 Chip Select congresswoman To adorn this with a picture ? ? in the first case, the memory chip occupies the piece of the memory map place as before. In the second case, it occupies the piece determine as after. forward subsequently 0000 2000 23FF 2400 27FF 0000 FFFF FFFF 29 High-Order vs. Low-Order Address Lines The address lines from a microprocessor can be classified ad into two types High-Order ? Low-Order ?

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.