Microprocessor 5 Software and Hardware Aspects of Development Debugging and Testing The Microcomputer 1st Edition Philippe Darche instant download
Microprocessor 5 Software and Hardware Aspects of Development Debugging and Testing The Microcomputer 1st Edition Philippe Darche instant download
https://textbookfull.com/product/microprocessor-1-prolegomena-
calculation-and-storage-functions-models-of-computation-and-
computer-architecture-1st-edition-philippe-darche/
https://textbookfull.com/product/software-development-design-and-
coding-with-patterns-debugging-unit-testing-and-refactoring-2nd-
edition-john-f-dooley/
https://textbookfull.com/product/hands-on-penetration-testing-on-
windows-unleash-kali-linux-powershell-and-windows-debugging-
tools-for-security-testing-and-analysis-1st-edition-phil-
Heterogeneous Computing Hardware Software Perspectives
1st Edition Mohamed Zahran
https://textbookfull.com/product/heterogeneous-computing-
hardware-software-perspectives-1st-edition-mohamed-zahran/
https://textbookfull.com/product/challenging-the-modern-
synthesis-adaptation-development-and-inheritance-1st-edition-
philippe-huneman/
https://textbookfull.com/product/software-supply-chain-security-
securing-the-end-to-end-supply-chain-for-software-firmware-and-
hardware-1st-edition-cassie-crossley/
https://textbookfull.com/product/computer-organization-and-
design-the-hardware-software-interface-risc-v-edition-david-a-
patterson/
https://textbookfull.com/product/computer-organization-and-
design-risc-v-edition-the-hardware-software-interface-david-a-
patterson/
Microprocessor 5
Series Editor
Jean-Charles Pomerol
Microprocessor 5
Philippe Darche
First published 2020 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as
permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced,
stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers,
or in the case of reprographic reproduction in accordance with the terms and licenses issued by the
CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the
undermentioned address:
www.iste.co.uk www.wiley.com
Quotation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Part 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Part 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Quotation
Shadokian philosophy1
1 The Shadoks are the main characters from an experimental cartoon produced by the
Research Office of the Office de Radiodiffusion-Télévision Française (ORTF). The two-
minute-long episodes of this daily cult series were broadcast on ORTF’s first channel (the
only one at the time!) beginning in 1968. The birds were drawn simply and quickly using an
experimental device called an animograph.
The Shadoks are ridiculous, stupid and mean. Their intellectual capacities are completely
unusual. For example, they are known for bouncing up and down, but it is not clear why!
Their vocabulary consists of four words: GA, BU, ZO and MEU, which are also the four
digits in their number system (base 4) and the musical notes in their four-tone scale. Their
philosophy is comprised of famous mottos such as the one cited in this book.
Preface
This five-volume series deals with the general operating principles of the
microprocessor. It focuses in particular on the first two generations of this
programmable component, that is, those that handle integers in 4- and 8-bit formats.
In adopting a historical angle of study, this deliberate decision allows us to return to
its basic operation without the conceptual overload of current models. The more
advanced concepts, such as the mechanisms of virtual memories and cache memory
or the different forms of parallelism, will be detailed in a future book with the
presentation of subsequent generations, that is, 16-, 32- and 64-bit systems.
The first volume addresses the field’s introductory concepts. As in music theory,
we cannot understand the advent of the microprocessor without talking about the
history of computers and technologies, which is presented in the first chapter. The
second chapter deals with storage, the second function of the computer present in the
microprocessor. The concepts of computational models and computer architecture
will be the subject of the final chapter.
x Microprocessor 5
The third volume deals with the hardware aspects of the microprocessor. It first
details the component’s external interface and then its internal organization. It then
presents the various commercial generations and certain specific families such as the
Digital Signal Processor (DSP) and the microcontroller. The volume ends with a
presentation of the datasheet.
The fourth volume deals with the software aspects of this component. The main
characteristics of the Instruction Set Architecture (ISA) of a generic component are
detailed. We then study the two ways to alter the execution flow with both classic
and interrupt function call mechanisms.
The final volume presents the hardware and software aspects of the development
chain for a digital system as well as the architectures of the first microcomputers in
the historical perspective.
Multi-level organization
specialize in one of these fields. I wish you a pleasant stroll through these different
worlds.
Original company names have been used, although some have merged. This will
allow readers to find specification sheets and original documentation for the
mentioned integrated circuits on the Internet and to study them in relation to this
work.
The concepts presented are based on the concepts studied in selected earlier
works (Darche 2000, 2002, 2003, 2004, 2012), which I recommend reading
beforehand.
Philippe DARCHE
August 2020
Introduction
The two preceding volumes respectively addressed the hardware and software
characteristics of the microprocessor. This last volume complements them by
focusing on the software development chain and on development and testing tools.
The final chapter in this book, which is also Part 2, presents structural changes in the
first generations of microcomputers.
PART 1
The first part of this last volume is divided into two chapters. The first presents
the software development chain, and the second illustrates the hardware and
software tools used in development and testing.
Development Chain
The processor uses two-state logic. Instruction codes and data are therefore
expressed in binary. This is machine language. Manipulating such data is not
humanly possible for a program longer than about a hundred lines. The first
computers were programmed in this language, and the program (i.e. machine code
and data) was entered in binary format using switches as input peripherals. Because
of the difficulty of use, an additional layer of language closer to natural language
(English) was therefore necessary. This language is called “Assembly Language,”
Microprocessor 5: Software and Hardware Aspects of Development,
Debugging and Testing – The Microcomputer,
First Edition. Philippe Darche.
© ISTE Ltd 2020. Published by ISTE Ltd and John Wiley & Sons, Inc.
4 Microprocessor 5
which is abbreviated in this work as AL. The term assembly emerged from the
EDSAC project (Electronic Delay Storage Automatic Calculator, Wilkes 1950,
1951) defining the action of reading subprograms from a symbolic instruction tape
(a letter), translating them into binary, and making them executable by the main
program (modern functions of a link editor and loading program combined). This
mechanism is attributed to David J. Wheeler (Wheeler 1950). Excluding machine-
oriented language, assembly language is therefore the processor’s base programming
language. It is referred to as symbolic. This indicates that it manipulates symbolic
information, instruction words, variables and labels primarily. A specific assembly
language corresponds to a single Instruction Set Architecture (ISA, cf. § V1-3.5).
Assembly instructions are referred to using a form of abbreviated writing called
operation code (or opcode) mnemonic (cf. § V4-2.1). An opcode mnemonic is a
symbolic representation of a machine code. The assembler is the computing tool that
translates between the symbolic name and the binary value. The first assembler was
written by Nathaniel Rochester for the IBM 701 (1954). Recall that instructions in
machine language, also called machine code or sometimes hard code (Bell 1973),
are a series of binary instructions that are read and executed by the microprocessor.
Figure 1.1 shows an example of assembly with two lines of instructions for the 8086
microprocessor. The assembler translated the mnemonics into machine code, here
expressed in base 16 for readability. This tool is specialized for a processor or a
family of processors. There is no efficiency loss between assembly languages and
binary because the translation is direct. This is not the case for High-Level
(programming) Language (HLL) compilers, where one high-level instruction
(i.e. statement) corresponds to a sequence of several instructions in assembly
language.
1 High-level languages like C (Kernighan 1983) are sometimes classified by some authors
(cf. Doyle (1985), for example) in the “low-level” category because they offer instructions
close to the microprocessor such as sequential and combinatorial logic operators, and because
they make it possible to manipulate variable addresses (concept of the pointer). This argument
will not be adopted in this work because these languages provide high-level control structures
and the idea of data typing, which is not the case for AL.
6 Microprocessor 5
Figure 1.3 presents the development chain for a computing application written in
a compilable high-level language. It is also called the compilation chain or, more
generally, the toolchain. A source program (or code) is written in a high-level
language, for example in C (file extension .c) using a text editor. It is first
precompiled (file extension .i for our example in the Microsoft environment or
direct display on the standard output peripheral for UNIX). The precompiler is a
preprocessor that will transform the source before delivering it to the compiler. It
primarily provides functions for macro-expansion, macro(-definition) and file
inclusion (cf. § 1.3.4). It also uses control structures to enable conditional
compilation. Macro-operations are customizable thanks to its formal parameters, as
are the functions, and they can be interlocked. The preprocessor is therefore no more
or less than a manipulator of character strings with functions for search, deletion,
insertion and substitution of character strings, just like a simple text editor. An
additional function is the deletion of comments, which are useless to the machine.
The transformed source is then compiled to obtain a file in assembly language
(generated file extension .s or .asm, respectively under UNIX and Windows), which
is then assembled. In simple cases, the obtained file is a file (example of an output
file extension .hex), a binary memory image ready to be loaded into RAM or ROM
(FW for FirmWare). The case of separate compilation (modular programming), or
where the execution environment for the software is taken into account as, for
example, with an Operating System (OS), generates a binary object file (output file
extension .o or .obj depending on the OS), also referred to as an object module. An
object program is therefore the final result from an assembler. In this latter case, it
lacks code. This code corresponds to missing object modules. Once this code is
available, the last step is called static linking. It is carried out by a linker or a link
editor. This tool is generally automatically called by the compiler. It makes it
possible to bring together all of the code forming the application based on a format
that depends on the operating system. This missing code is presented in the form of
independent object modules or compiled functions belonging to static libraries (file
extension .a and .lib depending on the OS). This linker resolves address
correspondence problems. The executable file is called a.out by default in UNIX;
under Windows, it has a .exe extension or, formerly, a .com extension. This file can
then be executed by the microprocessor (MPU for MicroProcessor Unit). To do so,
it is loaded by the OS and then given execution control. The loader allocates
memory, initializes the environment and can resolve address correspondence
problems if necessary. It is also responsible for launching the program. To conclude,
note that there are link editors/loaders.
Development Chain 7
There are two main language families that determine how a program is executed:
interpreted and compiled languages. In the first case, the interpreter analyzes an
instruction from the source program each time it is to be executed to determine how
to do so, and this is done at the time of execution (Figure 1.4). In the second case,
compilation and assembly translate a source program (written in a high-level
programming language) into an object module. This takes place during compilation
and assembly. Following link editing, the execution of an object program takes place
during execution. Between the two categories, there are hybrid languages that are
compiled and then interpreted (semi-compiled language) like Java. For the latter, the
source is compiled to obtain instruction byte code in an intermediate language.
These instructions are then interpreted by the virtual machine or, for faster
execution, compiled on the fly. Another approach is the Forth language, which is
both interpreted and compiled.
Compatibility at the object code level makes it possible to distribute the program
without supplying the source code. It is then necessary to carry out link editing (cf.
§ 1.2.2) with system libraries on the host computer, an example being libc in the C
language. The specification takes over from the source code with, in addition, the
definition of an object file format such as COFF or ELF (respectively Common
Object File Format and Executable and Linkable Format, cf. § 1.2.2 for more
details).
2 Or programs.
3 The hardware layers and their interfaces will be covered in a future book by the author.
Development Chain 11
Figure 1.6. API and ABI interfaces and Hardware Abstraction Layer. For a color
version of this figure, see www.iste.co.uk/darche/microprocessor5.zip
The ABI is a set of specifications to which the executable must conform so that it
can be executed in a given execution environment. It defines a standard binary
interface to be able to execute the compiled application. It is located between the
applicable program and the OS, a library, or a set of I/O routines such as the BIOS
(Basic Input/Output System, cf. § 4.2.2 in Darche (2003) and § 3.5.3). It enables
portability of applications at the binary level. We can consider the ABI as equivalent
to the API at the object code level. An example is System V (SCO 1996a, 1996b,
1997). We should also mention iBCS (Intel Binary Compatibility Standard), which
allows the same binary code to function on x86 platforms under different Unix
systems. It is generally made up of two parts, one that is common for all
architectures and one that is specific to a particular architecture. It specifies a set of
functions that the OS provides to the program user as well as how they should be
called. The ABI instructions belong to the user set, not the system. The transfer of
control to the OS is done through the intermediary of software interruption, which
can be compared to a function call with (potential) passing of parameters under
constraint. The potential parameters are generally passed by registers, or less
commonly on the stack. The ABI therefore includes low-level information specific
to the target architecture. This is the machine interface, the function call sequence
and the interface with the OS. The machine interface describes the underlying
architecture (i.e. ISA) and the data representation. The data representation
specification provides its types with the format, order of storage (endianness; Cohen
1981, cf. § 2.6.2 in Darche (2012)) and associated alignments. The detail of the call
sequence includes the register usage conventions, the stack frame layout convention
and the passing of parameters (number, passing mode and type). The interface with
the OS describes the exception interface, signal management, virtual addressing,
process initialization (stack, registers, etc.) and debugging support. The executable
and object file format are also specified (header, sections, etc.) as well as a library
format. The ABI secondarily specifies the alphanumeric code used, for example, for
character-based data control (\n, for example), or for the package data file. It
provides information about loading the program and about potential dynamic
linking. The ABI must support the API’s libraries. Tools such as the compiler, the
assembler and the linker, that is, the development chain, make reference to the ABI.
An EABI (Embedded ABI) refers to the ABI version used in embedded systems. Its
specific characteristics are the absence of a linker and modified memory
management.
The interface between the OS and the hardware, the latter of which is optional, is
called the Hardware Abstraction Layer. It is a software layer in the OS that abstracts
the underlying hardware and is accessible via an API. An example is Windows.
Drivers and hardware-specific software such as hot-swap management belong to this
layer. It enables the addition of new hardware without having to change the OS’s
programs. Real-Time Operating Systems (RTOS) may not use a kernel (kernel-less
approach), but instead a library linked to the application (library-based RTOS).
Development Chain 13
Using a standard API or ABI enables software compatibility (cf. § V4-3.3.2). The
former enables application portability at the source-language level, and the latter
does so at the binary level.
It should be noted that the idea of the machine is relative. As specified by Smith
and Nair (2000), it depends on the point of view under consideration. As part of an
operating system, the machine is the hardware support enabling execution, and the
software interface is the ISA. As part of a process executing a program for a user,
the machine is the OS, which supplies storage and memory as well as services such
as I/O, and hardware support for execution is the ABI.
The three primary tools required to develop an application are the assembler, the
linker and the loader/launcher; there is also a tool called a disassembler. “Tuning
and testing” will be addressed in the following chapter.
1.2.1. Assembler
The assembly of a source file will give rise to the creation of an output file
named “listing” (the extension for the generated file is .lst), an object module, either
absolute or relocatable, and a list of cross references (Figure 1.7). It should be noted
that comments are deleted, which is handled by the precompiler (preprocessor) for a
high-level language.
4 The term “address” refers to the logical address, a term belonging to the concept of Virtual
Memory (VM, this will be covered in a future book by the author on storage). If there is no
logical translation, it is a Physical Address (PA).
5 The original definition from IBM was Symbolic Assembly Program.
6 A contraction of the two names Windows and Intel.
14 Microprocessor 5
7 An identifier or username is a noun (cf. a character string) designating, among other things,
a variable, a constant, a subprogram or a label.
Development Chain 15
describing a grammar is the Backus–Naur Form (BNF, Backus et al. 1960, 1963;
Knuth 1964; ISO 1996). During this step, syntax errors are addressed. Semantic
analysis is the penultimate step. It verifies, among other things, whether the variable
format is coherent between registers and/or variables. Code generation is the final
step. Code generation will involve symbolic evaluation. It associates an operation
code or opcode with each instruction and, to each identifier, an address, when this
correspondence is possible. If not, the linker stops associating to generate the final
executable. The mode of assembly can be absolute or relative. This refers to the
addressing mode (cf. § V4-1.2) used to reference the identifiers. Relative addressing
enables address translation (relocation, cf. § V4-3.1.4), which makes it possible to
install the code and the variables anywhere in memory without having to recalculate
the addresses.
The structure of the symbol table will change depending on the step in the
development chain. During assembly (assembly time), this data structure will
contain, in its most complete form, the lexical units and, in less complete forms,
16 Microprocessor 5
only identifiers with their attributes. When included in an object module, it makes it
possible to resolve references during linking time by connecting the identifier and
the reference. During execution, this table, which can be optionally included,
enables the debugger to know the names of the identifiers. Figure 1.9 shows an
example of this kind of table, extracted from the listing file in Figure 1.10.
The structure of the generated file, that is, the object module, can be broken
down into a general information header, code and data, the area for useful address
translation during a change of address, the global symbol table and the optional
debugging information. The object module can be called absolute if the address of
the program start was fixed and all of the identifiers’ addresses are generated from it
(this is the case in a mono-pass assembler). The memory dump therefore cannot be
moved to main memory, contrary to a relocatable module. Modern assemblers
generate this second kind of object module.
At the programmer’s request, a listing file can be generated. The data line for
this type of file (Figure 1.10) is typically divided into three areas called fields that
are, from left to right, the line number (expressed in base-10 most of the time), the
memory address (expressed in hexadecimal), the size, the variable name (optional)
and the initialization value (optional), which corresponds to the assembly of the
fourth zone, the source, as described in § 1.3.
The instruction line is typically divided into three areas called fields that are,
from left to right, the line number (expressed in base-10 most of the time), the
memory address (expressed in hexadecimal8), the machine code, then the source. A
cross reference table can be constructed from the symbol table during assembly. For
each symbol, whether internal to the program or external (i.e. public), there will be
an entry in this table with its name, its value and the list of instructions it references,
or even the number of the corresponding line. This can be seen in this file. This list
facilitates debugging, among other things, and it can be used by a compiler.
will be executed is not sufficiently powerful (i.e. MPU power and memory and
storage capacities) to run the development tools. It is often used to develop
embedded applications. A multiprocessor assembler is capable of generating code
for microprocessors in a different family. There is also something called a
meta-assembler, a scientific curiosity that makes it possible to write an assembler as
they were initially described (Ferguson 1966). A High-Level Assembler (HLA)
approaches high-level languages by enabling variable types and using control
structures and macro-instructions. One of the first was described by Wirth (1968)
with his PL360 language for the IBM System/360. A modern version of this type of
language is HLA, proposed by Hyde (2010). Some high-level language compilers,
such as the one for C, make it possible to insert lines of assembly language. This is
referred to as an inline assembler. This is useful for directly accessing the MPU’s
instruction set or for calls to the OS. The downside is the loss of portability since
this language is specific to an architecture or a specific MPU. Finally, we can
mention the patch assembler, which is used in debuggers to modify application code
in real-time to correct an error and test it immediately.
1.2.2. Linker
During the last step before obtaining the program executable, the linker (linkage
editor) or link editor provides address translation functions (relocation,
cf. § V4-3.1.4) and symbolic resolution. It selects the implementation address for the
code and the variables as a function of the memory model, for example. It defines a
size as an assembler and a start address (TOS for Top Of Stack) for the stack. If all
of the modules are presented, it resolves the address correspondence if necessary.
Generally, from the object modules and static and dynamic libraries (or DLL, for
Dynamic Link Library), that is, shared between several applications, and following
the arguments entered on the command line, it generates a module, either an
executable or a relocatable, as illustrated in Figure 1.11. The executable file has an
extension of .com, .exe (Windows environment), or an execution permission9
(x for UNIX), or is a file for programming an EPROM (file extension .hex, for
example). The second case, in which a new relocatable object module is generated,
is due to the fact that the linker does not continue to the end, that is, that there
remain unresolved references because, for example, of a missing library. Symbolic
information generated optionally during assembly can be supplied as well for
debugging at the executable source level (traditional file extension .map). This
information can be related to sections (number, type, start address and size) and
Flora, 20;
Acheulean, 117, 118, 174, 175;
Chellean, 117, 118;
glacial, 65, 108, 117-119, 191, 192, 202, 208;
interglacial, 20, 67, 90, 91, 117-119;
Mousterian, 199;
Pliocene, 61, 63;
Postglacial, 361, 372, 375, 463, 488;
Pre-Chellean, 117, 118;
Pre-Neolithic, 488
Font-de-Gaume, 283, 314, 318, 319, 321, 325, 331, 349, 356, 358,
365, 372, 395-397, 399, 406-409, 412, 414-424, 435, 449
Foro, 167
Fox, 43, 63, 71, 206, 265, 287, 333, 343, 348, 366, 447, 498, see
Vulpes;
arctic, 44, 46, 193, 207, 287, 289, 348, 370, 447, 468, 469, see
Canis lagopus.
Frileuse, 167
G
Galley Hill, 28, 302, 337, 338;
see Brünn race
Gansersfelsen, 435
Gargas, 31, 307, 314, 317, 325, 327, 349, 394, 395
Gibraltar skull, 7, 9, 140, 214, 215, 216, 219, 226, 228, 232, 233,
236
Glaciers, 64-66, 89, 90, 94, 104-106, 118, 189, 190, 361-363
Gourdan, 214, 279, 331, 341, 369, 388, 392, 435, 438
Goyet, 435
Grattoir, 129, 130, 177, 254, 270, 306-310, 386, 390, 470, 473,
494;
caréné, 308, 309, 463
Gray's Thurrock, 28, 109, 116, 128, 149, 152, 156, 157
Grimaldi race, 7, 19, 245, 260, 262-269, 278, 279, 294, 301, 314,
490-492
H
Hachette (tranchette, chopper, cleaver), 270, 488, 494
Hare, 289, 333, 368, 447, 468, 498, see Lepus (timidus);
arctic, 46, 207, 287, 348, 370, 447, 468, 469, see Lepus variabilis;
tailless, see Lagomys and Pika
Harpoons, 355, 383-385, 387, 388, 390, 391, 440, 443-445, 449,
450, 456, 460-462, 465, 466, 470, 474, 486, 487
Heidelberg man, Mauer, 7, 23, 24, 40, 41, 53, 54, 90, 95-101, 114,
138, 143, 144, 214, 228, 229, 489, 491, 492, Pl. II
Hippopotamus, H. major, 38, 39, 41, 43, 44, 47, 69, 71, 86, 91, 92-
94, 102, 117, 123-125, 134, 147, 148, 155, 157, 165, 174, 177, 186,
192, 199, 263, 264
Horse, 45, 165, 182, 192, 225, 284, 355, 385, 392, 404, 405, 407,
408, 410, 412-414, 431, 432, 469, 498;
Desert, Plateau or Celtic, see Equus caballus celticus;
Forest or Nordic, 95, 147, 288, 289, 367, 369, 400, 498;
Hipparion, 63;
kiang or wild ass, 194, 285-287, 366, 367, 372-374, 400, 447;
Solutré, 288, 289, 414;
Steno's, 34, 96, 110, 111, 125, see Equus stenonis;
Steppe, see Equus przewalski
Hoxne, 158
Human figures, 317, 321-323, 328, 329, 337, 357, 393, 395, 399,
433, 434, 497
Hunting, 2, 11, 166, 202, 211-214, 283, 372, 456, 471, 496, 497
Hyæna, 43, 62, 76, 110, 147, 148, 155, 165, 188, 214, 245, 265,
317, 356, 476;
see Cave-hyæna and Hyæna
Hylobates, 6;
see Gibbon
I
Ibex, Ibex priscus, 44, 46, 201, 206, 264, 265, 287, 289, 321, 348,
357, 369, 371, 391, 401, 405, 433, 447, 466, 469, 497
J
Jackal, 43, 44;
see Canis neschersensis
K
Kärlich, 314
Kesslerloch, 279, 286, 355, 361, 364, 378, 383, 435, 436, 441, 442,
444-446, 449
Krapina, 7, 162, 167, 181-185, 214, 219, 220, 228, 229, 256
L
Lacave, 279, 331, 340, 345, 347, 391
Lagomys, 63;
pusillus, 202, 370, see Pika
Lamarck, on man, 4
Laugerie Basse, 13, 14, 275, 279, 331, 348, 376-378, 385, 388,
392, 407, 434, 435, 471
Laugerie Haute, 13, 14, 279, 294, 296, 314, 331, 346, 352, 435
Laussel, 245, 246, 249, 275, 313, 314, 317, 326-329, 331, 352,
395, 435
Lauterach, 314
Lemming, 46, 191, 193, 194, 202, 207, 281, 287, 333, 348, 361,
364, 370, 469, 476;
see Myodes
Leptobos, 71;
elatus, 62;
etruscus, 63;
see Cattle
Lepus, 469;
cuniculus, 364, see Rabbit;
timidus, 364, see Hare;
variabilis, 206, see Hare, arctic
Lion, 43, 86, 94-96, 98, 148, 165, 188, 281, 317, 348, 356, 365,
378, 400, 407, 446, 468, 472, 498;
see Cave-lion and Felis leo
Lissoir, polisher, smoother, 270, 271, 380, 388, 392, 456, 463, 466,
470
Lists and Tables, chronology, 18, 21, 22, 23, 33, 41, 54, 108, 280,
362;
climatic changes, 38, 39, 41, 43, 117, 191, 192, 275, 281, 284,
361-364;
fauna, 21, 41, 43, 54, 62, 95, 125, 147, 206, 207, 287;
human fossils, 7, 9, 219, 236, 237, 239, 266, 294, 295, 336, 378,
490;
human races, 41, 54, 108, 278, 280, 362, 458, 490, 491, 499,
500;
industries, divisions of, 18, 113, 114, 248, 249, 252, 340, 389;
succession of, 12, 13, 14, 16, 17, 18, 33, 41, 108, 280, 362;
implements, 130, 172, 254, 270, 271, 306, 308, 310
Loess, 5, 23-25, 29, 30, 36, 38, 46, 97, 103, 112, 115, 117-119,
122-124, 151, 159, 161, 162, 174, 176, 181, 252, 281, 282, 284,
286, 314, 334, 337, 364, 376, 442, 448;
stations, see Camps, open
M
Macaque, 54, 61, 63, 69, 76
Macerata, 167
Madeleine, La, 13, 16, 279, 351, 383-389, 398, 435, 443, 445, 449,
471
Mammoth, 10, 43, 102, 109, 117, 134, 147, 148, 177, 187, 194, 200,
202, 205, 206, 213, 218, 281, 288, 289, 316, 317, 321, 324-326,
333, 337, 348-350, 356, 364, 372, 385, 401, 403, 420, 421, 427,
429, 449, 450, 476, see Elephas;
woolly, 13, 40, 41, 43, 106, 117, 174, 187, 190-192, 196, 205,
207, 208, 210, 218, 221, 285-289, 334, 335, 363, 370, 372, 384,
397, 398, 420, 427, 446, see Elephas primigenius
Mantes-la-Ville, 167
Marcilly-sur-Eure, 214
Markkleeberg, 167
Marsoulas, 314, 319, 321, 328, 373, 394, 395, 396, 399, 403, 405,
415, 416, 435, 471, 485
Mas d'Azil, 15, 16, 279, 319, 357, 375, 380, 385, 388, 391-396, 432,
433, 435, 437, 449, 458-465, 471, 472, 474
Massat, 437, 471
Mediterranean race, 261, 278, 457, 458, 479, 480, 485, 489, 491,
492, 499, 500
Megaceros, 45, 68, 70, 106, 147, 182, 196, 287, 367;
see Deer, giant
Mesaticephaly, 8, 479
Micoque, La, 113, 167, 168, 179, 192, 196, 245, 246, 248, 249
Microlithique, microlith, 270, 306, 308, 310, 388, 396, 450, 470-472
Montières, 109, 127, 149, 152, 186, 244, 245, 283, 314, 331
Moose, 44, 94, 96, 265, 281, 348, 366, 468, 469, 472, 488, 496-
498;
see Alces
Moulin-de-Laussel, 331
Moustier, Le, 13, 16, 196-199, 214, 245, 246, 251, 253, 255;
man, 7, 196, 214, 221-223, 226, 228, frontispiece
Mouthe, La, 17, 246, 279, 314, 317, 320, 321, 394, 395, 398, 399,
401
Musk-ox, 42-44, 46, 65, 66, 187, 191, 193, 207, 285, 287, 289, 348,
362, 366, 370;
see Ovibos moschatus
N
Narbonne, 435, 437
Negroid race, 261, 262, 266-269, 278, 301, 302, 321, 492
Neolithic, New Stone Age, 10, 13, 18, 19, 21, 41, 108, 280, 362,
447, 482, 484-486, 488, 493-501
Neopithecus, 49
Niaux, 314, 319, 353, 373, 391, 394, 395, 400, 406, 409-411,
412, 429, 435
O
Oban, 474, 475, 486
Oberlarg, 435
Ofnet, 279, 285, 314, 331, 370, 435, 469, 471, 473, 475-481;
races, 442, 457-460, 480, 481, 490, 491, 500;
see Furfooz race and Origin
Ondratitz, 331
Ovibos, 376;
moschatus, 193, 445, 447, see Musk-ox
P
Painted Pebbles, see Azilian-Tardenoisian industry
Painting, 305, 316-318, 320, 321, 324, 325, 327, 328, 330, 358,
365, 394-396, 404-406, 408-429, 464, 465, 474, 496, 497
Palæolithic, Old Stone Age, 13, 16, 18, 19, 21, 28, 33, 41, 108, 160,
280, 362;
Lower Palæolithic, 14, 41, 108, 113, 114, 214, 280, 362, 490, 491;
Upper Palæolithic, 14, 41, 108, 214, 275, 276, 278, 280, 362, 395,
396, 490, 491, 500;
chronology, 18, 41, 108, 280, 362, 456
Perçoir, drill, borer, 130, 135, 153, 172, 179, 253, 254, 270, 306,
308, 310, 311, 344, 346, 385, 386, 388, 390, 392, 470, 473, 488
Pescara, 167
Pierre de jet, throwing stone, 130, 172, 213, 254, 270, 306
Piltdown, 109, 116, 128, 130-135, 149, 152, 214, Pl. II;
industry, 127, 128, 133-135;
man (Eoanthropus), 7, 23, 24, 40, 50, 53, 54, 56, 130-145, 214,
489-491;
race, see Piltdown man and Origin
Pithecanthropus, Trinil race, 7, 23, 24, 40, 53, 54, 86, 491, 511, Pl.
II;
anatomical features, 9, 10, 53, 56, 74, 77-84, 233, 234, 240,
490;
discovery, 73-77
Placard, 279, 331, 333, 334, 340, 345-348, 352, 353, 355, 378-
380, 383, 385, 389, 435, 436, 438
Pliohylobates, 49, 54
Pliopithecus, 49, 54
Pointe, point, knife, lance head, spear head, 15, 113, 153, 172, 177,
179, 248-255, 270, 306, 308, 310, 311, 473;
Châtelperron, 306, 307, 311;
pointe à cran, shouldered, 270, 308, 310, 313, 334, 340, 342,
345, 346, 352;
pointe à face plane, 341;
pointe de lance, 271, 306;
pointe de laurier, laurel leaf, 15, 270, 310-312, 334, 337, 339-
341, 344, 345, 347, 348, 352;
pointe de sagaie, javelin point, 271, 308, 340, 346, 354, 355,
361, 364, 370, 383, 387, 390, 442, 449, 462, 494;
pointe de saute, willow leaf, 340, 344, 347;
pointe à soie, 270, 310, 311, 313, 340, 345
Předmost, 257, 279, 331, 341, 345, 348, 349, 366, 395, 427;
see Brünn race;
mammoth hunters, 279, 337
Primates, 3-10, 40, 49-64, 73-84, 86, 140, 141, 217, 219, 227, 231,
233-235, 237-240, 490, 491
Propliopithecus, 49, 54
Propulseur, spear thrower, dart thrower, 271, 355, 391, 432, 433,
436, 445, 449
Ptarmigan, Lagopus, 44, 206, 207, 287, 289, 370, 371, 375, 469
Q
Quartz, 166
Quartzite, 163, 164, 265
Quina, La, 9, 113, 211, 213, 214, 245, 246, 248, 253-256;
man, 7, 9, 214, 216, 217, 219, 221, 225, 236, 237, 248
R
Rabbit, 265, 343, 368, 468;
see Lepus cuniculus
Racloir, scraper, 113, 114, 130, 135, 172, 178, 209, 248, 250, 251,
253-255, 270, 306, 387, 388, 470, 472, 473, 488
Reindeer, 13, 41, 43, 44, 46, 102, 103, 187, 191-194, 196, 197,
202, 205, 206, 209, 210-212, 214, 221, 223, 225, 284, 285, 286-
289, 314, 317, 332, 333, 365, 366, 370, 372, 385, 392, 399, 405,
407, 411-413, 415, 419-421, 429, 433, 440, 441, 445, 447, 461,
462, 468, 469, 471, 474, 481, 498;
see Rangifer
Reindeer Epoch, Period, 13, 14, 102, 192, 275, 286, 363, 375, 392,
438, 456, 459
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com