20145207 Summary of the course of the basic design of information security system

Source: Internet
Author: User
Tags hosting gdb debugger

20145207 Summary of the course of the basic design of information security system

Link Summary
    • No. 0 Week blog about Linux system, install virtual machine, textbook overview

    • 1th Week blog Linux system basic command, VIM use

    • 2nd Week blog Vim Editor, use of the GCC compiler, GDB Debugger tool, makefile automated compilation

    • 3rd Week Blog Material: Chapter II "Information Representation and processing"

    • 4th Week Blog
    • 5th Week Blog Material: Chapter III "Machine-level representation of the program", understand the concept of function call stack frame, and can be debugged with GDB

    • 6th Week Blog Material: Fourth chapter "Processor architecture"

    • 7th Week Blog Material: Sixth chapter "Memory Hierarchy"
    • Interim summary

    • 9th Week Blog Material: Appendix A, Chapter 10th "System Level I/O"

    • 10th Week Blog Appendix A, 10th Chapter "System Level I/O", Code Analysis

    • 11th Week Blog Material: Eighth chapter "Abnormal Control Flow", chapter tenth "System Level I/O", Process creation and control system call and function use

    • 12th Week of the first three weeks of code learning

    • 13th Week Blog Material: 11th chapter "Network Programming", chapter 12th "Concurrent Programming"

    • 14th Week Blog Material: The Nineth chapter "Virtual Memory"

Summary of LAB Report links
    • Experiment a development environment familiar

    • Experiment two firmware design

    • Transplantation of experimental three-time system

    • Experimental four-peripheral driver program Design

    • Experiment five simple embedded Web server experiment

Code hosting links and QR codes
    • Code Hosting Links
    • Git

    • Code-driven learning has done
    • Hands-on practice lets us really understand knowledge

Answer the questions you asked in the No. 0 week's homework
    • Chapter One: What is the life cycle of a program?
    • Write programs, preprocess, compile, assemble, link, run
    • Chapter Two: The effect of unsigned numbers and number of twos complement on programming?
    • Two different expressions, C and C + + support signed and unsigned numbers. Java only supports signed numbers
    • Chapter Three: How to become Machine code in C program language?
    • Pre-processing, compilation, and compilation become binary machine code, high-level language translated into assembly language and then become a binary language
    • The fourth chapter: How is pipelining realized?
    • Pipelining of program execution for processor implementation
    • The fifth chapter: How to optimize the program?
    • You can optimize your program by reducing process calls, eliminating unnecessary memory references, and more
    • The sixth chapter: how to improve the time locality and spatial locality of the program
    • According to the sequential execution of memory sequence, the program has good spatial locality, and the procedure of repeated reference to the same variable has good time locality.
    • The seventh chapter: what is the link?
    • Linking is the process of collecting and combining various pieces of code and data into a single file
    • The eighth chapter: what is the consequence of the indeterminate behavior caused by the concurrent execution of the program?
    • Cause program exceptions
    • The Nineth chapter: How does virtual memory work?
    • Virtual memory provides a consistent address space for each process, simplifying memory management
    • The Tenth chapter: why is Standard I/O limited?
    • Standard I/O and network files are incompatible with each other
    • The 11th chapter: how does the Web server communicate?
    • The Web server uses the HTTP protocol and its clients to communicate with each other
    • The 12th chapter: What is concurrent programming?
    • Program logic control flow overlaps in time
Bonus points Item
    • GDB Debug Assembler Stack Process analysis

Lessons learned and deficiencies
    • Harvest: Improve self-learning ability
    • Insufficient: Super much insufficient, study of particularly tired, not interested.
Questionnaire Survey
    • How long do you spend on average per week in this course?
    • About 20 hours
    • Do you improve your weekly learning efficiency?
    • No
    • Are you satisfied with your learning effect?
    • General, not satisfied
    • Will you continue at least one blog post at the end of the course? (If you can, I'll put your blog into a book when I graduate)
    • Yes, but I can't write the academic stuff. 1
    • What do you think the teacher of this class should continue to do?
    • Cancel end of term
    • What do you think the teacher of this class should stop doing?
    • Forced
    • What do you think the teacher of this course should start to do new things?
    • You should focus on how to get students interested in your class, not what the students are thinking now. Take your blog as a weekly burden. You see the result is good: a semester down, students blog, their own batch of papers are very people have a sense of accomplishment. But... Burden

20145207 Summary of the course of the basic design of information security system

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.