Computer Systems: A Programmer's Perspective Plus Mastering Engineering With Pearson Etext -- Access Card Package (3rd Edition)
Computer Systems: A Programmer's Perspective Plus Mastering Engineering With Pearson Etext -- Access Card Package (3rd Edition)
3rd Edition
ISBN: 9780134123837
Author: Randal E. Bryant, David R. O'Hallaron
Publisher: PEARSON
bartleby

Videos

Question
Book Icon
Chapter 2, Problem 2.55HW
Expert Solution & Answer
Check Mark
Program Plan Intro

Byte ordering:

  • Some machines decide to store the objects in memory ordered from least significant byte to most, while other machines store them from most to least.
  • The byte ordering are made by the two ways:
    • Little Endian
      • In little Endian, the least significant byte comes first.
    • Big Endian
      • In big Endian, the most significant byte comes first.

Example:

The example for find the little-endian and big-endian for hexadecimal value is shown below:

Here assume that the hexadecimal value is “0x13244860”. Then address range for given ordering byte is “0x200” through “0x203”.

Big Endian for given hexadecimal value is

0x2000x2010x2020x203
13244860

Little Endian for given hexadecimal value is

0x2000x2010x2020x203
60482413

Explanation of Solution

Corresponding code from given question:

#include <stdio.h>

//Define variable "byte_pointer" in char datatype.

typedef unsigned char* byte_pointer;

//Function definition for show_bytes.

void show_bytes(byte_pointer start, size_t len)

{

//Declare variable "i" in int data type.

int i;

/* "For" loop to determine byte representation in hexadecimal */

for (i = 0; i < len; i++)

//Display each bytes in "2" digits hexadecimal value.

printf(" %.2x", start[i]);

printf("\n");

}

//Function to determine byte for "int" number.

void show_int(int x)

{

//Call show_bytes function with integer value.

show_bytes((byte_pointer) &x, sizeof(int));

}

//Function to determine byte for "float" number.

void show_float(float x)

{

//Call show_bytes function float value.

show_bytes((byte_pointer) &x, sizeof(float));

}

//Function to determine byte for "pointer" number.

void show_pointer(void *x)

{

//Call show_bytes function with pointer value.

show_bytes((byte_pointer) &x, sizeof(void *));

}

//Test all show bytes.

void test_show_bytes(int val)

{

//Define variables.

int ival = val;

float fval = (float) ival;

int *pval = &ival;

//Call function.

show_int(ival);

show_float(fval);

show_pointer(pval);

}

//Main function.

int main(int argc, char* argv[])

{

//Define the sample number.

int sampleNumber = 682402;

//Call test_show_bytes function.

test_show_bytes(sampleNumber);

return 0;

}

The given program is used to display the byte representation of different program objects by using the casting.

  • Define “byte_pointer” using “typedef”.
    • It is used to define data type as a pointer to an object of type “unsigned char”.
  • The function “show_bytes” is used to display the address of a byte sequence by using the argument that is byte pointer and a byte count.
    • Each byte is displayed by “2” digit.
  • The function “show_int” is to display the byte representations of object of “int” data type.
  • The function “show_float” is to display the byte representations of object of “float” data type.
  • The function “show_pointer” is to display the byte representations of object of “void *” data type.
  • Test all the data type values by using function “test_show_bytes”.
  • Finally, assign the sample number in main function and call the “test_show_bytes” with argument “sampleNumber”.

Byte ordering used by the given machines:

After compiling and running the above code, the following output will be appear

a2 69 0a 00

20 9a 26 49

3c cc e9 18 ff 7f 00 00

From the above output,

  • The byte representation for “int” data type is “a2 69 0a 00”.
  • The byte representation for “float” data type is “20 9a 26 49”.
  • The byte representation for “int *”data type is “3c cc e9 18 ff 7f 00 00”.

The byte ordering used by these machines is “big-endian”.

  • Reason:
    • Consider, the byte representation of “int” value is “a2 69 0a 00”.
    • From this, the value is ordered from most significant byte to least significant byte. Hence, it is referred as big-endian.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Objective: The objective of this assignment is to gain practice with pen testing a live web application running on a remote server. The live web application is a known vulnerable web application called DVWA (Damn Vulnerable Web Application) with security settings set to low. The web app is running on an AWS EC2 (Elastic Compute Cloud) instance running Ubuntu 22. Note: The point of this assignment is to step it up a notch, we learnt about different web application vulnerabilities and applied that knowledge, now we are going to pen test and enumerable the vulnerabilities of a web app + the underlying infrastructure it is running on. Before you begin please find out what your IP address is and place it in this sheet so that I can track who is doing what: IP Addresses.docx . Tasks: 1- Start by connecting to the target, I did not install a TLS certificate on purpose that is why you are going to connect via http and not via https: http://3.99.221.134/dvwa/login.php 2- Broken Authentication:…
No AI solutions please
No AI solutions please

Chapter 2 Solutions

Computer Systems: A Programmer's Perspective Plus Mastering Engineering With Pearson Etext -- Access Card Package (3rd Edition)

Chapter 2.1, Problem 2.11PPChapter 2.1, Problem 2.12PPChapter 2.1, Problem 2.13PPChapter 2.1, Problem 2.14PPChapter 2.1, Problem 2.15PPChapter 2.1, Problem 2.16PPChapter 2.2, Problem 2.17PPChapter 2.2, Problem 2.18PPChapter 2.2, Problem 2.19PPChapter 2.2, Problem 2.20PPChapter 2.2, Problem 2.21PPChapter 2.2, Problem 2.22PPChapter 2.2, Problem 2.23PPChapter 2.2, Problem 2.24PPChapter 2.2, Problem 2.25PPChapter 2.2, Problem 2.26PPChapter 2.3, Problem 2.27PPChapter 2.3, Problem 2.28PPChapter 2.3, Problem 2.29PPChapter 2.3, Problem 2.30PPChapter 2.3, Problem 2.31PPChapter 2.3, Problem 2.32PPChapter 2.3, Problem 2.33PPChapter 2.3, Problem 2.34PPChapter 2.3, Problem 2.35PPChapter 2.3, Problem 2.36PPChapter 2.3, Problem 2.37PPChapter 2.3, Problem 2.38PPChapter 2.3, Problem 2.39PPChapter 2.3, Problem 2.40PPChapter 2.3, Problem 2.41PPChapter 2.3, Problem 2.42PPChapter 2.3, Problem 2.43PPChapter 2.3, Problem 2.44PPChapter 2.4, Problem 2.45PPChapter 2.4, Problem 2.46PPChapter 2.4, Problem 2.47PPChapter 2.4, Problem 2.48PPChapter 2.4, Problem 2.49PPChapter 2.4, Problem 2.50PPChapter 2.4, Problem 2.51PPChapter 2.4, Problem 2.52PPChapter 2.4, Problem 2.53PPChapter 2.4, Problem 2.54PPChapter 2, Problem 2.55HWChapter 2, Problem 2.56HWChapter 2, Problem 2.57HWChapter 2, Problem 2.58HWChapter 2, Problem 2.59HWChapter 2, Problem 2.60HWChapter 2, Problem 2.61HWChapter 2, Problem 2.62HWChapter 2, Problem 2.63HWChapter 2, Problem 2.64HWChapter 2, Problem 2.65HWChapter 2, Problem 2.66HWChapter 2, Problem 2.67HWChapter 2, Problem 2.68HWChapter 2, Problem 2.69HWChapter 2, Problem 2.70HWChapter 2, Problem 2.71HWChapter 2, Problem 2.72HWChapter 2, Problem 2.73HWChapter 2, Problem 2.74HWChapter 2, Problem 2.75HWChapter 2, Problem 2.76HWChapter 2, Problem 2.77HWChapter 2, Problem 2.78HWChapter 2, Problem 2.79HWChapter 2, Problem 2.80HWChapter 2, Problem 2.81HWChapter 2, Problem 2.82HWChapter 2, Problem 2.83HWChapter 2, Problem 2.84HWChapter 2, Problem 2.85HWChapter 2, Problem 2.86HWChapter 2, Problem 2.87HWChapter 2, Problem 2.88HWChapter 2, Problem 2.89HWChapter 2, Problem 2.90HWChapter 2, Problem 2.91HWChapter 2, Problem 2.92HWChapter 2, Problem 2.93HWChapter 2, Problem 2.94HWChapter 2, Problem 2.95HWChapter 2, Problem 2.96HWChapter 2, Problem 2.97HW

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Text book image
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
What Are Data Types?; Author: Jabrils;https://www.youtube.com/watch?v=A37-3lflh8I;License: Standard YouTube License, CC-BY
Data Types; Author: CS50;https://www.youtube.com/watch?v=Fc9htmvVZ9U;License: Standard Youtube License