20145317 "Information Security system Design Fundamentals" Course summary Weekly Activity link Summary
No. 0 Week Assignment: Textbook problem, installing virtual machine http://www.cnblogs.com/5317p/p/5866828.html
First week assignment: The practice of common directives in Linux http://www.cnblogs.com/5317p/p/5882782.html
Second week assignment: the use of Vim/gcc/gdb/makefile http://www.cnblogs.com/5317p/p/5907116.html
Third week assignment: Chapter II "Information Representation and processing" http://www.cnblogs.com/5317p/p/5928437.html
Week five homework: Textbook chapter III "Machine-level representation of the program" Http://www.cnblogs.com/5317p/p/5958317.html http://www.cnblogs.com/5317p/p/5967738.html
Six weeks Assignment: Y86 instruction, HCl language, and Y86 order implementation http://www.cnblogs.com/5317p/p/5982968.html http://www.cnblogs.com/5317p/p/5991083.html
Seventh Week assignment: Textbook sixth chapter "Memory hierarchy Structure" http://www.cnblogs.com/5317p/p/6006072.html http://www.cnblogs.com/5317p/p/6013931.html
Eighth Week assignment: Review teaching materials 1-7 chapters, Linux common directives http://www.cnblogs.com/5317p/p/6028780.html http://www.cnblogs.com/5317p/p/6036817.html
Nineth Week Assignment: Textbook Appendix A, chapter 10th "System Level I/O" http://www.cnblogs.com/5317p/p/6052889.html http://www.cnblogs.com/5317p/p/6059341.html
Tenth week assignment: Textbook Appendix A, 10th Chapter "System Level I/O", Code practice http://www.cnblogs.com/5317p/p/6076074.html http://www.cnblogs.com/5317p/p/6083348.html
11th Week Assignment: Teaching material eighth chapter "Abnormal Control Flow", chapter tenth "System Level I/O", Code practice http://www.cnblogs.com/5317p/p/6100134.html http://www.cnblogs.com/5317p/p/ 6106708.html
12th Week Assignment: first three weeks code summary http://www.cnblogs.com/5317p/p/6130393.html
13th Week Assignment: Teaching material 11th chapter "Network Programming", 12th chapter "Concurrent Programming", Code practice http://www.cnblogs.com/5317p/p/6159107.html
14th Week Assignment: Textbook Nineth chapter "Virtual Memory" http://www.cnblogs.com/5317p/p/6194117.html
Summary of LAB Report links
Familiarity with the experimental development environment: Connecting ARM development Boards, virtual machines, and HyperTerminal http://www.cnblogs.com/5317p/p/6036921.html
Experiment two firmware design: Implement simple multithreaded programming code running implementation after connecting ARM development Board, Virtual machine and HyperTerminal http://www.cnblogs.com/5317p/p/6059376.html
Transplantation of the experimental three-real-time system: Connect the ARM Development Board, HyperTerminal and install ads, JTAG driver, test whether the configuration is successful http://www.cnblogs.com/5317p/p/6130372.html
Experimental four-driver program design: To write a simple virtual hardware driver on the PC and debug, the implementation of the experiment-driven interface functions, analyze and understand the interaction between the driver and the application process http://www.cnblogs.com/5317p/p/6083359.html
Experiment five simple Embedded Web server experiment: Learn to use socket for communication programming process, understand a real network communication application overall design, read the content of the HTTP protocol, learn several important ways to use network functions. Read HTTPD. C source code. Add some additional features on this basis. Test the functionality of an embedded WEB server using a browser on a PC computer. Http://www.cnblogs.com/5317p/p/6130357.html
Code hosting link and QR code:
git log--pretty=format: Results of "%h-%an,%ar:%s"
Code volume summary (with WC command, available)
- Is code-driven learning done?
Git uses more progress than last semester
- Add code, Pity Dorado code is the best way to understand, talk about your experience
In practice, we can understand the operation of the Code, and the relationship with the internal system
- What lessons do you have in practice?
Actively use the search engine when encountering problems, Baidu can solve most of the problems
- Answer your questions in the No. 0 week's homework
- How does the compilation system work?
First step configuration; the second step is to determine the location of the standard library and header files; The third step is to determine the dependencies, the fourth step header file pre-compilation, the fifth step preprocessing, the sixth step, the seventh step connection, the eighth step installation, the Nineth step operating system connection, the tenth step to build the installation package, the 11th step dynamic connection.
- How are the numbers represented? How can I use its principle to determine the coding range of a given word length?
The storage of data in computer is in binary form, and the byte order of storage is big-endian and small-end.
- Sequential implementation and pipeline implementation of the specific steps?
Instruction execution Process: the first is to take instruction and analysis instructions. In accordance with the order specified in the program, the current execution instructions are taken out from the internal memory and sent to the controller's instruction register to analyze the instructions taken, that is, according to the operation code in the instruction to determine what the computer should do. The second is the execution instructions. According to the results of the instruction analysis, the controller issues a series of control potentials needed to complete the operation, so as to direct the computer-related parts to complete this operation, as well as prepare for the removal of an instruction.
- What is the actual structure of the memory?
The storage medium constituting the memory is mainly used in semiconductor devices and magnetic materials. The smallest storage unit in memory is a bistable semiconductor circuit or a storage element of a CMOS transistor or magnetic material that can store a binary code. A storage unit is composed of several storage elements, and then a memory is composed of many storage units. A memory contains many storage units, each of which can hold one byte. The location of each storage unit has a number, which is the address, typically in hexadecimal notation. The sum of all the storage units in a memory that can hold data is called its storage capacity.
- What should I do with exception control flow?
Through the jump table of the Exception table (exception table), an indirect procedure call is made to the operating system subroutine (exception handler (exception handler)) specifically designed to handle this event.
- The fundamentals of virtual memory work?
Virtual memory considers main memory as a cache of address space stored on disk, protects only active areas in main memory, and transmits data back and forth between disk and main memory as needed, provides consistent address space for each process, simplifies memory management, and protects the address space of each process from being destroyed by other processes
- How does system-level I/O redirection work?
I/O redirection means that the created FD points to another file.
- Lessons learned and deficiencies
- Own harvest (input, efficiency, effect, etc.)
The ability of autonomous learning has been further improved and efficiency has been improved. Classroom teaching is inferior to self-learning is that teachers need to try to meet the needs of all students, can not be exhaustive, easy to learn that students need to spend a lot of time in the understanding of the Knowledge section, and some students keep up with the progress.
- Where you need to improve.
Some weeks play more, self-study is not so serious.
If you have a pair, write about the help you have provided or what help you have received, and provide advice to the teacher.
Personally think knot pair learning advantages and disadvantages, on the one hand can help each other mutual learning, more tedious work more people to complete can save energy, but on the other hand, the group division of Labor will inevitably make everyone on the work of the whole content of the unclear.
Advice for learning younger brothers and sisters in school
If you re-learn the course, how can you learn better
Consciously self-discipline.
Questionnaire Survey
- How long do you spend on average per week in this course?
About 20 hours.
- Do you improve your weekly learning efficiency?
Finally there are improvements
- Are you satisfied with your learning effect?
Not bad.
- Will you continue at least one blog post at the end of the course? (If you can, I'll put your blog into a book when I graduate)
Write when you are free
- What do you think the teacher of this class should continue to do?
Weekly inspection
- What do you think the teacher of this class should stop doing?
Not yet thought.
What do you think the teacher of this course should start to do new things?
Not yet thought.
Give the link and QR code of this articleLinks: http://www.cnblogs.com/5317p/p/6220654.html
Category: Information security systems
20145317 Summary of the course of the basic design of information security system