20145207 Summary of the course of the basic design of information security system
Link Summary
No. 0 Week blog about Linux system, install virtual machine, textbook overview
1th Week blog Linux system basic command, VIM use
2nd Week blog Vim Editor, use of the GCC compiler, GDB Debugger tool, makefile automated compilation
3rd Week Blog Material: Chapter II "Information Representation and processing"
- 4th Week Blog
5th Week Blog Material: Chapter III "Machine-level representation of the program", understand the concept of function call stack frame, and can be debugged with GDB
6th Week Blog Material: Fourth chapter "Processor architecture"
- 7th Week Blog Material: Sixth chapter "Memory Hierarchy"
Interim summary
9th Week Blog Material: Appendix A, Chapter 10th "System Level I/O"
10th Week Blog Appendix A, 10th Chapter "System Level I/O", Code Analysis
11th Week Blog Material: Eighth chapter "Abnormal Control Flow", chapter tenth "System Level I/O", Process creation and control system call and function use
12th Week of the first three weeks of code learning
13th Week Blog Material: 11th chapter "Network Programming", chapter 12th "Concurrent Programming"
14th Week Blog Material: The Nineth chapter "Virtual Memory"
Summary of LAB Report links
Experiment a development environment familiar
Experiment two firmware design
Transplantation of experimental three-time system
Experimental four-peripheral driver program Design
Experiment five simple embedded Web server experiment
Code hosting links and QR codes
Answer the questions you asked in the No. 0 week's homework
- Chapter One: What is the life cycle of a program?
- Write programs, preprocess, compile, assemble, link, run
- Chapter Two: The effect of unsigned numbers and number of twos complement on programming?
- Two different expressions, C and C + + support signed and unsigned numbers. Java only supports signed numbers
- Chapter Three: How to become Machine code in C program language?
- Pre-processing, compilation, and compilation become binary machine code, high-level language translated into assembly language and then become a binary language
- The fourth chapter: How is pipelining realized?
- Pipelining of program execution for processor implementation
- The fifth chapter: How to optimize the program?
- You can optimize your program by reducing process calls, eliminating unnecessary memory references, and more
- The sixth chapter: how to improve the time locality and spatial locality of the program
- According to the sequential execution of memory sequence, the program has good spatial locality, and the procedure of repeated reference to the same variable has good time locality.
- The seventh chapter: what is the link?
- Linking is the process of collecting and combining various pieces of code and data into a single file
- The eighth chapter: what is the consequence of the indeterminate behavior caused by the concurrent execution of the program?
- Cause program exceptions
- The Nineth chapter: How does virtual memory work?
- Virtual memory provides a consistent address space for each process, simplifying memory management
- The Tenth chapter: why is Standard I/O limited?
- Standard I/O and network files are incompatible with each other
- The 11th chapter: how does the Web server communicate?
- The Web server uses the HTTP protocol and its clients to communicate with each other
- The 12th chapter: What is concurrent programming?
- Program logic control flow overlaps in time
Bonus points Item
Lessons learned and deficiencies
- Harvest: Improve self-learning ability
- Insufficient: Super much insufficient, study of particularly tired, not interested.
Questionnaire Survey
- How long do you spend on average per week in this course?
- About 20 hours
- Do you improve your weekly learning efficiency?
- No
- Are you satisfied with your learning effect?
- General, not satisfied
- Will you continue at least one blog post at the end of the course? (If you can, I'll put your blog into a book when I graduate)
- Yes, but I can't write the academic stuff. 1
- What do you think the teacher of this class should continue to do?
- Cancel end of term
- What do you think the teacher of this class should stop doing?
- Forced
- What do you think the teacher of this course should start to do new things?
- You should focus on how to get students interested in your class, not what the students are thinking now. Take your blog as a weekly burden. You see the result is good: a semester down, students blog, their own batch of papers are very people have a sense of accomplishment. But... Burden
20145207 Summary of the course of the basic design of information security system