Download as pdf
Download as pdf
You are on page 1of 5
2.8 STACKS AND QUE A computer program often needs to perform a particular sub relents structure. In order to organize the control and ini yeen the main program and the subroutine, a data structur , . This section will describe stacks, as well as a closely related data structure cal queue. Data operated on by a program can be organized in @ van already eneniatal ite sieved Mais. Now, we consider an important data struc~ ture known as a stack, A stack is alist of data elements, usually words oF bytes, with the accessing restriction that elements can be added or removed at one end of the list only. This end is called the top of the stack, and the other end is called the bottom. The structure is sometimes referred to as a pushdown stack. Imagine pile of trays in ‘a cafeteria: customers pick up new trays from the top of the pile, and clean trays are added to the pile by placing them onto the top of the pile. Another descriptive phrase, last-in-first-out (LIFO) stack, is also used to describe this type of storage mechanism: the last data item placed on the stack is the first one removed when retrieval begins. The terms push and pop arc used to describe placing a new item on the stack and removing the top item from the stack, respectively. Data stored in the memory of a computer can be organized as a stack, with succ sive elements occupying successive memory locations. Assume that the first element is placed in location BOTTOM, and when new elements are pushed onto the stack, they ure placed in successively lower address locations. We use a stack that grows in the direction of decreasing memory addresses in our discussion, because this is acommon practice. Figure 2.21 shows a stack of word data items in the memory of a computer. It contains numerical values, with 43 at the bottom and —28 at the top. A processor register is used to keep track of the address of the element of the stack that is at the top at any given time, This register is called the stack pointer (SP). It could be one of the general-purpose registers or a register dedicated to this function, If we assume a a stack is used. Ned a jety of ways. We have 2.8 STACKS AND QUEUES: Current top element Stack Bottom element Figure 2.21 A stack of words in the memory. byte-addressable memory with a 32-bit word length, the push operation can be imple- mented as Subtract #4,SP Move NEWITEM,(SP) Where the Subtract instruction subtracts the source operand 4 from the destination operand contained in SP and places the result in SP. These two instructions move the ‘word from location NEWITEM onto the top of the stack, decrementing the stack pointer by 4 before the move. The pop operation can be implemented as, Move (SP),ITEM Add #4,SP ‘These two instructions move the top value from the stack into location ITEM and then increment the stack pointer by 4 so that it points to the new top element. Figure 2.22 shows the effect of each of these operations on the stack in Figure 2.21. If the processor has the Autoincrement and Autodecrement addressing modes, then the push operation can be performed by the single instruction Move NEWITEM,—(SP) 2.8 STACKS AND QUEUES n SAFEPOP Compare — 42000,8P Chock (o see if the stack pointer contains Branch>0 EMPTYERROR an address value greater than 2000, If it does, the stuck is empty. Branch to the routine EMPTYERROR for appropriate faction Move (SP)+,ITEM Otherwise, pop the top of the stack into memory location ITEM. (a) Routine for a sate pop operation SAFEPUSH Compare #1500,SP Check to see if the stack pointer Braneh<0_ FULLERROR contains an address value equal to or less than 1500. If it does, the stack is full. Branch to the routine FULLERROR for appropriate action, Otherwise, push the clement in memory location NEWITEM onto the stack. Move NEWITEM,-(SP) (©) Routine for a sate push operation Figure 2.23 Checking for empty and full errors in pop and push operations. Another useful data structure that is similar to the stack is called a quewe. Data are stored in and retrieved from a queue on a first-in-first-out (FIFO) basis. Thus, if we assume that the queue grows in the direction of increasing addresses in the memory, which is a common practice, new datu are added at the back (high-address end) and retrieved from the front (low-address end) of the queue. There are two important differences between how a stack and a queue are imple- mented. One end of the stack is fixed (the bottom), while the other end rises and falls as data are pushed and popped. A single pointer is needed to point to the top of the stack at any given time. On the other hand, both ends of a queue move to higher addresses as data are added at the back and removed trom the front. So two pointers are needed to keep track of the wo ends of the queue. Another difference between a stack and a queue is that, without further control, 4 queue would continuously move through the memory of a computer in the direc- tion of higher addresses. One way to limit the queue 10 a fixed region in memory is to use a circular bufjer. Let us assume that memory addresses from BEGINNING to END are assigned to the queue. The first entry in the queue is entered into location si ‘ ys nUCTIONS AND PROGRA! ; sue by entering them at d to the de reaches END, space entries are appende ue fine the back of the quCLe ee te ig if some He NING ‘and the process Con- the region assigned / cl when nit empty (see Problems 2.18 id successive BIN haber nddresses. By the U Hoc peen created at tne begin o> Wil ea ence, the back pointer is reset ve aque ete case ofa tack, care must Be RET ties jaa trctue is either completely full or <2 and 2.19). 2.9 SUBROUTINES sk : a parti wubtask many times Ina given program, it is often necessary to FE Tad. Rote Cs mle re aarrerem data values, Such a subtask is usualy called & Sing oF or sbroutine may evaluate the sine function or sorta ist of Val peel include the block of nstrctions that constitutes subroutine at eyety place where itis needed in the program. However, o save SPare, only one copy of the rea Wows that constitu the subroutine is placed in the memory, and any program that requires the use of the subroutine simply branches (o its staring location. When a program branches ta subroutine we say that itis calling the subroutine, The instruction that performs this branch operation is named a Call instruction. ‘After a subroutine has been executed, the calling program mus ¢ instruction that called the subroutine. The subroutine _ continuing immediately after th r «Ge said to return to the program that called it by executing a Return instruction. Since ——.-the:subroutine may be called from different places in a calling program, provision “must pe' made for returning to the appropriate location. The location where the calling —-program resumes execution isthe location pointed to by the updated PC while the Call ingtruction is being executed. Hence, the contents of the PC must be saved by the Call instruction to enable correct return to the calling program. The way in which a computer makes it possible to call and return from subroutines is referred to as its subroutine linkage method. The simplest subroutine linkage method isto save the retum address in a specific location, which may be a register dedicated to eit homis Sie regis eae the i reer When the subroutine completes y thie. Is he calling program by branching oy fe Ree ig program by branching indirectly The Call instruction is just a special branch instructi heCs is just a special branch instruction that performs the following . Sa be iia of the PC in the link register 2 e ; : w larget address specified by the instruction | resume execution, fe iar 4 Retum instruction is special branch instruction that performs the operation: Branch tothe address contained in the link register Figure 2.24 illustrates this procedure 2.9 SUBROUTINES ee Memory Tocation Calling program Mem a ieee _TE sient focation Subroutine SUB _ 200 Call SUB ——- 204 next instruction > first instruction Return EEE Call Retum Figure 2.24 Subroutine linkage using a link register 2.9.1 SUBROUTINE NESTING AND THE PROCESSOR STACK ‘A common programming practice, called subroutine nesting, is to have one subroutine fall another. In this ease, the return adress of the second call is also stored in the link register, destroying its previous contents Hence, it is essential to save the contents of the link register in some other location ypefore calling another subroutine. Otherwise, the rerurn address of the first subroutine will be lost. Subroutine nesting can be carried out to any depth. Eventually, the last subroutine called completes its computations and returns © the subroutine that called it. The return address needed for this first return 1S the lust one generated in the nested call sequenct That is, return addresses are generated and used in a last-in-first-out order. This SuBBES'S that the return addresses associated swith subroutine calls should be pushed onto stack. Many processors do this utomatically as one of the operations performed by the Call instruction, A particular register 18 designated as the stack pointer, SP, to be used in this operation, The stack pointer points to a stack called the processor stack, The Call instruction pushes the contents of the PC onto the processor stack and loads the subroutine address into the PC. The Retum instruction pops the return address from the processor stack into the PC.

You might also like