Read about computer architecture for dummies, The latest news, videos, and discussion topics about computer architecture for dummies from alibabacloud.com
The time for the soft exam to enter the countdown is also the time for us to return to the warehouse.
I still remember the first time I read the soft exam, the knowledge of computer architecture was a good thing, now I feel more cordial when I read the book again, because I am familiar with it.
View my export chart first:
Graph export ideas:
Start with a macro perspective and think about the
space requires hardware and software to work closely together. Specialized hardware translates virtual addresses by using a page table, and the contents of the page table are provided by the operating system. The virtual memory provides three important functions. First, it automatically caches the contents of the virtual address space on the most recently used storage disk in main memory. A block in the virtual memory cache is called a page. References to pages on the disk trigger a page fault,
is too high, we will be mixed with the p in the peer to reduce its burden. That's what Napster did.Who's Napster?It's ignorant. Napster is ..... (Please own Baidu).Let's superficial understanding first (whoever it is!) ) and look at how it works:Its file transfer uses the peer-to structure, the file search uses the C/s structure (centralized). That is, the peer in the p, what you want, what you have, all tell me the server, the one who has what you want, I call it immediately to you, this perso
Processor Architecture
ISA
One processor supportsCommandAndByte encoding of commandsCalled itsInstruction Set architecture ISA.
Although the performance and complexity of the processors manufactured by each vendor are constantly improved, different models are compatible at the ISA level. Therefore, ISA providesConcept Abstraction Layer.
This concept abstraction layer is the ISA model: the instruction set en
takes over the process and is responsible for reading the VP2 and VP3 from the disk and loading the memory. The page table is then updated with the mapping between the two pages in memory and VP2 and VP3.However, if you access Process1 's VP5 and VP6, a segment error occurs (because the two pages are not mapped).Protection is also one of the purposes of mapping, simply to say that each page can be set permissions properties, who can modify, who can access and so on.The implementation of virtual
protected]_basic/etc/init.d]#The directory structure of Linux is an inverted tree, that is, it has only one root (/), absolute path refers to the full path from the root to the directory in which the relative path refers to not starting with the root, is a current directory as the starting point to specify. A CD is a command that implements a directory jump. PWD Displays the current location in an absolute path[Email protected]_basic INIT.D] #pwd/etc/init.d[Email protected]_basic init.d] #cd/bo
As you can see, your machine is idle most of the time. If you use the task manager or other Linux platform tools such as top or xload in Windows, observe the CPU, you will see that the CPU usage is usually 1 ~ 2%. In fact, if you have more computers, this waste will increase. In a department with 300 computers, the CPU idle rate is astonishing. However, these departments still need powerful servers to compile or simulate computing. This situation will even worse, because with the increase of use
1. Preface
The processor is a complex system. It is not a one-stop process. It is a product that has been continuously upgraded, updated, and designed, and is still being updated.
The processor can only run a series of commands, each of which is just a simple operation, such as adding numbers. Commands must also be encoded. These codes are composed of binary digits of 0 and 1 of a certain rule. These codes are collectively referred to as the instruction set of the processor.
To be continued
first, the formation of computer network architecture
1, why layering?
when dealing with complex systems:
A clear structure allows us to define a specific part of a large complex system and explore its various parts of the relationshipModularity makes system maintenance and upgrades simple
Change the specific implementation of one layer of service transparent to the rest of the system (no impact)e.g. cha
Computer Network Architecture declaration: Most of the definitions refer to the Liu Huajun "computer Network and communication", reproduced please indicate the source and author
1 computer network architecture concept 1.1 network protocol because the communication of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.