Summary of comprehensive test points for software network engineer exams

Chapter 1 Encoding and Transmission

Nyquist's theorem: R=2W*log2(N)

Manchester encoding is a bi-phase code 
differential Manchester encoding: it flips when it encounters 0 and does not change when it encounters 1. 
Manchester encoding: There is a level jump in each bit, which provides rich synchronization information. The comprehensive function encoding is used in applications where the speed is not very high. High Ethernet

The E1 frame is 8 bits, 32 channels, and is sent 8000 times per second, so 8*32*8000=2.048Mb/s. The 
transmission rate of the E1 channel is 2.048Mb/s. 
The transmission rate of each voice channel is 64kb/s.

Hamming code: m+k+1<2^k

E1-E5 has always been the data rate multiplied by 4. 
T1-T5 T1 channel, the transmission rate is 1.544Mb/s 
T2 channel, 4 T1 channels, 
T3 channels, 7 T2 channels, 
T4 channels, and 6 T3 channels

The HDLC protocol is a bit-oriented synchronous link control protocol that uses the 01111110 flag as the frame delimiter

2DPSK Each bit contains two cycles. If the carrier frequency is 2400Hz, the symbol rate is 1200 baud.

Delay: 
For cable channel: tp=200km/(200km/ms)=10ms 
For satellite channel: tp=270ms

Shannon theory calculation data rate: 
C=W*log2(1+S/N) 
db=10*lg(S/N)

Chapter 2: Network Architecture

FTP 21 TELENT 23 SNMT 25 DNS 53 TFTP 69 HTML 80 SNMP 161

Multicast address: 
reserved D address 224.0.0.0-239.255.255.255 
224.0.0.0-224.0.0.255 reserved multicast address (permanent group address) 224. 0.0.0 is reserved and not allocated 
224.0.1.0-224.0.1.255 public group Broadcast address, used for Internet 
224.0.2.0-238.255.255.255 User-available multicast address (temporary group address), network-wide range 
239.0.0.0-239.255.255.255 Local management multicast address, specific local range valid 
automatic dedicated IP address :169.254.0.0-169.254.255.255

UDP header: source port, destination port, data length, checksum

POP3 protocol: The client agent and the server establish a TCP connection. This protocol is based on TCP port 110.

The host bits cannot be all 1 or 0

Internal private addresses: 
10.0.0.0-10.255.255.255 
172.16.0.0-172.31.255.255 
192.168.0.0-192.168.255.255

IPV6 unicast address type: The 
format prefix of the global unicast address 2000::/3 
The format prefix of the link local address FE80::/12 The 
format prefix of the site local address FEC0::/10 
The global unicast address is equivalent to the IPV4 public network Address, allows aggregation of route prefixes, aggregation global unicast address format prefix: 001 
link local address: communication between local nodes in stateless auto-configuration 
Site-local address is similar to IPV4 private address. Will not be forwarded to other sites outside this site

MAC address: 
6 bytes 48 bits

The minimum overhead of both the IP header and the TCP header is 20 bytes, and the Ethernet frame header and frame trailer total 18 bytes.

SMTP sends emails, running on TCP, port 25

Chapter 3 Network Classification

The standard protocol of the limited LAN at the MAC layer is CSMA/CD (Carrier Sense Multipoint Access/Collision Detection) 
802.11 CSMA/CA (Carrier Sense Multipoint Access/Collision Avoidance)

CSMA/CD has high transmission medium utilization and high collision probability 
1. Non-persistent listening algorithm: idle, sending, busy, wait N before listening. Reduce the probability of conflict, reduce channel utilization, and increase transmission delay. 
2. I-persistent monitoring algorithm: idle, sending, busy, continue monitoring. It is helpful to seize the channel, reduce the idle time of the channel, and easily cause conflicts. 
3. P-persistent listening algorithm: idle, send with probability P, busy, continue to listen. Effectively balance conflicts and channel utilization. 
CSMA/CD uses the listening-to-change detection method. 
The longest time it takes to detect conflicts is twice the network propagation delay. 
Ethernet can connect up to 4 repeaters. 
The transmission delay is <2 times the propagation delay. Delay 2S/0.7C+2tPHY+8tR

100BASE-T 
is a local area network standard operating at 100Mbps, known as Fast Ethernet, using UTP (Unshielded Twisted Pair) copper cables 
stipulating a distance of no more than 100 meters from the transceiver to the hub

802.11 2.4GHz ISM expansion communication technology 1MB/S 2MB/S 
802.11B 2.4GHz ISM CCK technology 11MB/S 
802.11a 5GHz U-Nii OFDM modulation technology 54MB/S 
802.11g 2.4GHz ISM OFDM modulation technology 54MB/S 
802.11n 6 6 00MB /s is backward compatible with abg, and both frequency bands can be supported

The original IEEE802.11 encryption method is Limited Equivalence Protocol (WEP). 
802.11i defines a new key exchange protocol TKIP, adopts the advanced encryption standard AES, and uses 802.1x to implement access control.

The air interface standard for wireless access systems proposed by IEEE802.16: WiMAX 
global microwave interconnection access, also called 802.16 wireless metropolitan area network, with data transmission up to 50km, QOS guarantee, high transmission rate, and rich services

Frame Relay FR 
is divided into Permanent Virtual Circuit (PVC) and Switched Virtual Circuit (SVC). 
Frame Relay is simpler than HDLC. It only does error detection and does not retransmit. There is no sliding window flow control mechanism, only congestion control, and the complex Error detection is handed over to higher-level 
connection-oriented services, flow control, and traffic shaping technology. 
Frame Relay virtual circuit identifier: DLCI 
DLCI: Data link connection identifier, the value that identifies the PVC or SVC. 
CIR: Committed Information Rate 
LMI: Frame Relay Local Management interface, signaling standard between routers and Frame Relay switches, provides Frame Relay management mechanism 
VPI: virtual path of ATM

The access layer implements user access control 
, the aggregation layer: route selection between VLANs, packet filtering, and multicast management. The 
core switching layer: link redundancy, route redundancy, VLAN trunking, and load balancing 
provide high-speed connections between different areas. optimal transmission path

IEEE802.3 Ethernet frame length: the length from the destination address to the checksum

ADSL access: 
PC: ADSL MODEM, splitter, home junction box, telephone line, DSL access multiplexer (DSLAM) connected to ATM or IP network 
voice line: splitter, home junction box, telephone line, DSL connection Input multiplexer (DSLAM) access telephone switch

WPA wifi protection, a subset of 802.11i

ADSL VDSL (Very High Data Rate Digital Subscriber Line) Asymmetric transmission 
SDSL Single pair digital subscriber 
HDSL High data rate data subscriber

PPPoE allows an Ethernet host to connect to a remote access hub through a simple bridge device. ADSL uses the PPPoE protocol

IEEE802.ae 10 Gigabit Ethernet physical standard gets rid of the restriction that Ethernet can only be used in local area networks and can be used in metropolitan area networks and wide area networks.

Wireless network spread spectrum technology: 
Each signal bit can be transmitted using N chip bits. 
Technologies to reduce blocking probability include: direct sequence spread spectrum (DS), frequency hopping (FH), time hopping (TH), linear frequency modulation (Chirp) )

The wireless sensor network technology used in the Internet of Things is 802.15.3ZigBee Piconet

X.25 (packet switching technology), Frame Relay, and ATM (Asynchronous Transfer Mode) all require the establishment of virtual circuits

Chapter 4: Network interconnection technology

BGP transport protocol TCP port number 17 Supports CIDR (Classless Inter-Domain Routing) 
routing updates only send incremental routes, rich route filtering and routing policies 
BGP4 introduction mechanism supports route aggregation, including AS path aggregation, using hop-by-hop routing Publish a list of reachable ASs

ACL protocol is TCP or UDP 
standard access control 1-99 
extended access control 100-199 2000-2699 
eq gt lt neq log

The console port uses a dedicated configuration cable to directly connect to the computer serial port, and uses a terminal emulation program for local configuration. The 
default data rate of the router console port is 9600b/s.

vtp pruning is a switch configuration command, VTP pruning. Reduce the amount of unnecessary information such as broadcast, multicast, unicast, reserved bandwidth, etc. on the trunk port

Broadcast multi-access network (broadcast multi-access) such as ethernet, token ring FDDI 
non-broadcast multi-access network (none broadcast multi-access NBMA) such as frame relay x.25 
point-to-point network such as PPP, HDLC 
point-to-multipoint network such as RARP protocol network

The difference between RIP 1 and 2 versions, three improvements: 
1. Adopts a triggered update mechanism to accelerate routing convergence 
2. Supports variable length subnet mask and classless inter-domain routing (VLSM, CIDR) 
3. Use experience Hash passwords to limit the dissemination of routing information 
4. Multicast instead of broadcast 
5. Support authentication

OSPF area: 
standard area 
backbone area 
stub area 
complete stub area 
incomplete stub area

MPLS: (Multi-Label Forwarding Protocol) 
A fast packet switching and routing system that provides destinations for network data traffic. The ability to route, forward, and switch is 
independent of layer 2 and 3 protocols such as ATM and IP. It maps IP addresses to Labels with fixed length for different packet forwarding and packet switching capabilities

Loose source routing: IP packets must pass through the router specified by the source site

RIP protocol prevents routing loops: 
split horizon, route poisoning, suppression time, triggered updates, setting maximum metric value

show ip route can view the routing table information of the local router and view the routing information. The 
show command can be executed in user mode and privileged mode.

The factory serial port encapsulation protocol of the router is HDLC (Advanced Data Link Control), which can support multi-point addressing. 
You can change the protocol to PPP or Frame Relay yourself.

Link state routing protocols (SPF, OSPF) do not exchange routing tables with each other. 
Triggered updates occur when the network changes and send periodic update link state notifications.

Benefits of using routers for LAN segmentation: isolation of broadcast domains, routing and addressing

OSPF 32-bit identification ID, 0-65535, 0 is the backbone area

The destination address matches the network entry with the longest subnet mask.

RSVP: The recipient applies for resource reservation. This application is one-way.

During the transition period between IPV4 and IPV6: 
1. Dual protocol stack 
2. Tunnel technology 
3. NAT-PT translation technology

Chapter 5: Cybersecurity

Public key encryption is also called asymmetric key encryption. 
The form of a public key is a digital certificate.

Commonly used symmetric encryption algorithms: DES (American Data Encryption Standard), RC-5, IDEA 
Asymmetric: RSA, MD5, elgamal, backpack algorithm, Rabin, DH, DSA, ECC (elliptic curve encryption algorithm) 
AES Advanced Encryption Standard 
3DES is A shared secret key algorithm 
Diffie-Hellman key exchange algorithm 
PGP encryption algorithm: email encryption

Message digest algorithm MD5: output is 128-bit 
SHA-1 output: 160-bit 
SET: standard for secure online credit card payment

IPsec: a security protocol based on the IP layer, used in VPN 
Security association triplet in IPsec: security parameter index SPI, target IP address, security protocol

Function of digital signature: ensure the integrity of information transmission, identity authentication of the sender, and prevent denial of transactions. 
Digital signature algorithm: hash, DSS, RSA. 
Design of digital signature: the sender cannot deny it, and the receiver can verify but cannot fabricate it. or tamper with

Private key for decryption and signing 
Public key for encryption and authentication

Secure Hash Algorithm SHA-1: 
A message with a maximum length of no more than 264 bits is input, generates a 160-bit message digest output, and 512 blocks are used to process the input

Prevent replay attacks: 
one-time keys, sequence numbers, timestamps

The Kerberos system uses one-time keys and timestamps. 
In the Kerberos authentication system, users first apply for an initial ticket from the authentication server AS, and then obtain the session key from the ticket granting service period TGS. 
Kerberos is used to ensure security in a distributed network environment. A central authentication server provides user-to-server and server-to-user authentication services, using DES encryption technology.

IPsec key management is implemented using the IKE (Internet Key Exchange Protocol) mechanism. IKE solves the problem of securely establishing or updating shared keys in an insecure network environment.

80: Default port of web service 
8080: Web service in LAN 
445, 193: LAN shared folder, printer 
443: Default port of SSL protocol

Database disaster recovery belongs to system security and application security

DES algorithm key length 64bit 
Triple DES algorithm key length 128bit

Authentication methods supported by the IIS service, only basic authentication uses clear text

VPN tunnel protocol: IPsec L2TP GRE PPTP L2F etc. 
GRE IPsec belongs to the third layer tunneling protocol 
L2TP PPTP L2F belongs to the second layer tunneling protocol 
L2TP protocol encapsulation: IP UDP L2TP PPP PPP payload

IEEE802.11i defines a new encryption protocol CCMP based on AES

HTTP Hypertext Transfer Protocol, information plain text transmission 
HTTPS SSL encrypted transmission protocol with security, the security mechanism is at the transport layer port 443 
S-HTTP Secure Hypertext Transfer Protocol, a protocol for secure information communication, the security mechanism is at the application layer

Virus: 
CIH: malignant, destroys computer hardware 
Happy Hour: VB source program virus, specially infects htm, html vbs, sap 
Panda Burning Incense: variant worm virus, downloaded file infection, destroys computer system, Program 
X undercover: Trojan horse, infects smartphones 
Worms, CIH viruses, and macro viruses are all stand-alone viruses. Trojan is a Trojan horse virus that enables remote attacks through the network. 
Macro viruses: infect MS office system files.

PKI (public key infrastructure)

IETF divides the intrusion system into 4 components: 
event generator, event analyzer, corresponding unit, and event database

Windows server 2003 system builds a domain environment: 
communication group, security group (local domain group, global group, universal group)

Chapter 6 Network Software System

To change the default FTP port number in Linux system: you can modify /etc/vsftpd/vsftpd.conf

/etc/hostname contains the host name of the system, including the complete domain name 
/etc/hostname.interface file names the network card 
/ect/hosts host name and IP configuration file 
/etc/resolv.conf sets the DNS of the host 
/etc/networks Use Name the subnet 
/etc/gateways routing table file 
/etc/shadow 
/etc/passwd shadow is the shadow file of passwd, corresponding to each other. Shadow includes users and encrypted passwords, user expiration dates, etc.

Commonly used configurations of web servers under Linux: 
/etc/inetd.conf TCPIP service configuration file, add or delete a service 
/etc/lilo.conf Loader configuration file, configure Linux boot parameters 
/etc/httpd/conf/httpd.conf Configuration server Port number used 
/etc/httpd/conf/access.conf Security and user access related settings

/etc/resolve.conf DNS domain name resolution configuration file 
Nameserver DNS server IP address 
Domain Local domain name 
Search Domain name search list 
Sortlist Sort the returned domain names

The host directory is the root of the virtual directory. Only the www service supports virtual servers.

FTP related commands: 
dir: You can specify the list directory to be viewed to display the remote directory file and subdirectory list 
! dir: Display file information in the current directory of the client 
rpm: Manage various software packages 
IN: Create a file in another location File link

SNMP: 
UDP port 162 of the management process, port 161 of the agent process. 
get-request, get-next-request, set-request are all sent by the management to the agent. 
get-response trap is sent by the agent to the management 
. In SNMP network management, one agent can be managed by multiple network managers. Workstation management, starting from V2, gateway workstations can also manage each other. 
SNMP trap packets use port 162, and other types are UDP port 161.

SNMP service program: 
snmp.exe snmptrap.exe 
When configuring the SNMP service, the current login user needs to belong to the super management group (administrator member) 
SNMPc support: FTP SMTP WEB TELNET


The first character of the linux ls-al command  - represents a normal file, d represents a directory, l represents a connection file, and b represents a device file.

Windows system: 
regedit command enters the registry editor 
cmd enters the DOS command line 
mmc opens the windows management console

tracert (trace route) is a route tracing utility used to confirm the path taken by IP datagrams to access the target. -d specifies not to resolve the IP address to the host name route 
print to view the local routing table

Cat more and less can view the file content. cat outputs all the file content at one time. more paging view less cursor movement.

IIS: web ftp smtp nntp is a set of integrated software in IIS and does not provide POP3 services.

xinetd is a daemon process. Linux centrally monitors all the listening ports of some network-related services (ftp, http) by xinetd. 
After receiving the request, it temporarily starts the corresponding service and transfers the corresponding port to the corresponding service.

route add 10.41.0.0 mask 255.255.0.0 10.27.0.1 metric 7

The DHCP client can obtain from the DHCP server: DHCP server IP address, DNS server IP address, default gateway IP address

SMTP port number: 25

The main resource records in the DNS server: 
A: Domain name to IP address mapping 
PTR: IP address to domain name mapping 
MX: Mail server and its priority 
CNAM: Alias 
​​NS: Authorization server for the region

nslookup Diagnoses information about the Domain Name System infrastructure and views IP addresses of DNS servers 
tracert Traceroute utility used to determine the path taken by an IP datagram to reach a destination 
arp Displays and modifies values ​​in the arp cache 
arp -s ip address physical address: Staticly bind an IP and MAC mapping record, 
display and modify the local address cache resolution table for static arp. The address resolution table is a cache memory that records the data link layer address, usually the mapping of Ethernet MAC address to IP address. 
ipconfig TCPIP configuration setting value, refresh DHCP DNS setting 
ipconfig/all displays the TCPIP configuration of all network cards 
netstat provided by windows Network management commands, monitor TCPIP, display routing tables, actual network connections, and status information of each network interface device

Windows Server 2003 Active Directory manages network resources. Active Directory needs to be installed in the NTFS area.

/proc is mainly used to store process and system information 
. It saves all detailed information of the current system, including processes, file systems, hardware, etc. 
Some parameters in the system can be modified instantly through /proc.

Common Linux commands: 
cd Change the current working directory 
pwd Display the current directory 
mkdir Create a new directory 
ls View directory, file 
cp Copy 
rm Delete 
mv Move 
cat The first line displays the file content 
tac The last line 
more Displays page by page 
less Display files Allow users
to shutdown  forward and backward  , close system
logout, log out, 
grep, search for the specified string in the specified file, 
chmod, change the permissions of the file.

Linux configuration file 
/root directory 
/bin Places various command programs and different shells used when the OS is running 
/boot Places files that must be read during startup, system kernel, configuration files 
/dev Peripheral device code files 
/etc System settings , management related files 
/etc/rc.d Shutdown script file 
/home Home directory of all accounts 
/lib Common library file 
/mnt Default place for placing CDs and floppy disks 
/root Administrator's private directory 
/usr subdirectory, use To store system commands and programs 
/var to store various temporary files and log files when the system is running 
/sbin to store the programs executed when the system is started.

Network availability refers to the percentage of time the network is available to users

The difference between RMON and SNMP: 
RMON provides management information for the entire subnet, while the SNMP management information base only contains the management information of local devices. The RMON 
monitoring system has two parts: the detector and management station 
management information base are part of MIB-2, and the monitor Statistics and analysis can be performed on each group

GRUB can boot both Linux and windows systems. 
LILO can only boot Linux.

APIPA (Automatic Private IP Addressing) 169.254.0.1-169.254.255.254

Chapter 7 Network Communication Equipment

(The knowledge points are too detailed, so just give up. Chapter 7 of the real test usually only has one multiple-choice question, so there is no need to prepare carefully, just look at previous years' questions)

Chapter 8 Intellectual Property

Copyright can be divided into personal rights and property rights. 
Personal rights are divided into: publication, signature, modification, and protection of the integrity of the work. 
Property rights are divided into: reproduction, distribution, rental, exhibition, performance, screening, broadcasting, information network dissemination, filming, adaptation, translation, and compilation.

Chapter 9 Reliability and System Performance Evaluation

(Basically not tested in the real questions)

Chapter 10 Storage System

The conversion between the main memory unit address and the cache unit address is completed by hardware.

Virtual memory: 
It is usually divided into multiple physical memory fragments, some of which are temporarily stored on external disk storage, and data are exchanged when needed. 
Virtual memory consists of two levels of main memory and auxiliary memory.

Memory Classification: 
Location: Memory Outer Village 
Material: Magnetic Memory, Semiconductor, Optical 
Working Mode: Read/Write, Read-Only 
Access Mode: Address Access, Content Access Associative Memory is Content Access Addressing 
Mode: Random, Sequential, Direct

Access mode read-write device data block tag access characteristics represent 
sequential access shared unspecified linear tape 
direct access shared data blocks, each unique tag can be directly moved to a specific data block disk 
random access each addressable unit dedicated There is a unique identifier for each addressable unit. Access the data unit at any time. Main memory 
associative access. Each addressable unit is unique. Each addressable unit has a unique identifier. Select the read and write point cache based on the content.

RAID technology has the highest disk capacity utilization: RAID0 
RAID0: two or more disk drives, each disk is divided into different blocks, interleaved access, and parallel transmission. 
Distribute data on different drives to increase transfer speed, balance drive load 
No mirror disk, no error control 
RAID1: Disk mirroring function 50% 
RAID3: Parity check complete fault tolerance 75%

Open system storage methods: 
built-in storage and external storage 
External storage: direct-attached storage (DAS), networked storage (network access storage NAS, storage area storage SAN)

IR (instruction register) instruction register stores the instructions to be executed

Chapter 11 Operating System

windows2003 secure login: ctrl+alt+del

In operating system file management, file directories are used to organize and manage information in external memory. The 
data structure of the management file is called a file control block (FCB), and the ordered collection of file control blocks is called a file directory.

Three basic states of operating system processes: ready, running, blocked

Interrupt vector: 
The entry address of the interrupt service program that can be provided 
refers to the data stored in the memory when an interrupt occurs and pointing to the address of the interrupt handler. Each interrupt vector occupies one word. The low byte is the interrupt number and the high byte is the routine. The offset address of the program 
uses the stack to protect breakpoints and scenes: 
protecting breakpoints means putting CS (segment address) and IP (offset) on the stack

DMA (Direct Memory Access) 
uses a DMA Controller (DMAC) to control and manage data transfers. DMAC and CPU share the data bus and have the ability to access memory independently in 
three ways: 
1. Pause the CPU to hand over control until the DMA operation is completed 
2. Cycle stealing mode temporarily abandons the bus when the CPU is idle and inserts a DMA cycle 
3. Sharing mode The CPU does not use the system bus, and the DMAC performs DMA transfers.

Time slice rotation method: 
number of users n, time slice q, system response time for each Tonghu: (n-1)*q+q=n*q

Chapter 12 Basic knowledge of system development and operation

Several popular development methods: 
Structured development method 
Data structure-oriented software development method: Jackson 
Problem-oriented analysis method 
Prototyping method 
Object-oriented software development method: Booch Coad OMT

Several connections between UML entities: 
dependency relationship, 
generalization relationship 
, association relationship (aggregation relationship, combination relationship) 
, implementation relationship, 
generalization relationship, and can also represent the special/general relationship that exists between two types of things.

Software risk includes two characteristics: uncertainty and loss.

Regression testing: Testing after a change has been made to the software to detect other errors that may have been caused by the change

White box testing:  called structural testing. Commonly used techniques to
design test cases based on the internal structure and logic of the program  involve different coverage standards. Test data is determined according to the specified coverage standards during testing.

Software design: abstraction, modularity, information hiding, and module independence

Software life cycle model: 
Waterfall model requires clear requirements. 
V model is an evolutionary model of the waterfall model. The evolutionary model associates testing and analysis with design. The 
prototype model is a model that quickly builds a runnable prototype system based on feedback during the operation. The improvement 
is suitable for situations where there is a lack of accurate understanding of software requirements. 
The spiral model is combined with waterfall and evolution, and the risk analysis 
fountain model  is added
. Incremental model iteration, each increment releases an operational product, flexible personnel allocation, and can quickly construct runnable methods.

Reliability of the software product: 
number of potential errors, location of potential errors, how the software product is used

Coupling: 
from low to high non-direct coupling data coupling tag coupling control coupling external coupling public coupling content coupling 
content coupling: one module directly modifies or operates the data of another module, or directly accesses another module

Methods for project estimation: 
expert judgment, heuristic methods, machine learning methods

Chapter 13 Computer Hardware Structure

Program counter (PC): 
A register in the CPU that stores the address of the next instruction to be executed. 
Accumulation register (AC): 
referred to as the accumulator. When the arithmetic logic unit (ALU) performs arithmetic or logical operations, it provides the ALU with an Workspace for transferring and staging user data

ALU: 
The execution unit of the CPU, mainly responsible for the operation 
program status register (PSW): 
part of the controller, which stores various status information that reflects the current instruction execution structure and stores control information. 
Address register: stores the address of the memory unit currently accessed by the CPU.

Calculator memory is generally divided into: 
Static data area Code area Stack area Heap area Stack 
area: The compiler automatically allocates and releases local variables allocated for running functions, function parameters, return data, return addresses, etc.
The operation mode is similar to the stack area  in the data structure  : the programmer allocates and releases it. If the programmer does not release it, the OS reclaims
the global area (static area): stores global variables, static data, and constants; the system releases 
the program code after the program ends. Area: stores the binary code of the function body

The computer must perform an order operation before adding or subtracting floating point numbers. The order code of x is greater than the order code of Y. Y should be expanded to be the same as

The interrupt control method spends more CPU time processing interrupts, and the increased number of interrupts leads to data loss. I/O devices are suitable for transferring data using DMA with less CPU intervention.

The processor is mainly composed of a processor, a memory and a bus, including 
a data bus, an address bus, and a control bus. The 
component-level internal bus within the chip (system bus) and the external bus (communication bus)

CPU: 
The control center of the computer, mainly composed of arithmetic units, controllers, register groups, internal buses and other components 
Controller: program counter, instruction register, instruction decoder, timing generator, operation controller The controller 
must not only ensure The normal execution of instructions must also be able to handle abnormal events. 
The program counter (PC) is a special register with two functions: registering information and counting. 
Internal bus: transmitting data, data address, control signal

Register: 
scattered in the controller and arithmetic unit. 
Program counter: stores the address of the next instruction. 
Instruction register: stores the opcode to be executed by the central processor. 
Flag register: records whether the arithmetic unit overflows, the result is 0 and other abnormal situations. 
Data register: Stores operands, operation results, and intermediate results of operations. 
Address register: stores the address of the memory unit currently accessed by the CPU.

Computer instructions: 
including operation codes and address codes. 
In order to analyze and execute an instruction, they should be stored in the instruction register.

The complement of a positive number is the same as the original code. The complement of a negative number is the absolute value. The complement of 
a positive the same as its original code and complement. The complement of a negative number is its complement + 1.

The input/output control methods for data transmission between the computer host and peripherals include program control method, interrupt method, and DMA

Addressing mode: 
How to provide operands or provide operand addresses. 
Different addressing modes can be used to shorten the instruction length, expand the addressing space, and improve programming flexibility. 
Immediate addressing 45 in MOV R1 #45 
direct addressing  Register Addressing R1 Register 
in MOV R1 #45  Indirect Addressing Indirect Addressing  Relative Addressing  Indexed Addressing



Computer main memory: 
consists of memory banks, addressing systems, memory data registers, reading and writing systems and control circuits. The 
addressing system is the address selection mechanism for reading and writing information, including memory address register (MAR) and address decoding. device

Chapter 14 Computer English


The main thing is that it is not difficult to accumulate and understand the language. 

Guess you like

Origin blog.csdn.net/ducanwang/article/details/133203301