Skip to main content

计算机系统结构

抽象来说,计算机系统结构,或称计算机体系结构,是一个系统在其所处环境中最高层次的概念;它确定一台计算机硬件和软件之间的衔接。具体地说计算机体系结构指的是计算机系统设计的观念与架构,描述计算机在实做的设计原则。它确定一个计算机设计的:
  • 部件
  • 部件功能
  • 部件间接口
并且计算机体系结构着重于“负责了计算机架构的中心功能:计算”的中央处理器(CPU)内部的运行动作与存储器的访问。
注意,不要与处理器领域的微体系结构/微架构(Microarchitecture)相混淆。

实例

以常见的冯·诺伊曼计算机的设计为例,体系结构设计包括了:
  • 指令集架构(Instruction set architecture;简称 ISA):被视为一种机器语言,包含了许多相关的指令集(存储器寻址、处理器控制,暂存器控制等等...)。
  • 微体系结构/微架构(Microarchitecture)或称计算机组织(Computer organization):是更详细的叙述系统内部各元素如何进行合作与沟通。
  • 数据表示,即硬件能直接识别和处理的数据类型和数据格式;
  • 寄存器定义,包括操作数寄存器、变址寄存器、控制寄存器等的定义、数量和使用方式;
  • 指令系统,包括机器指令的操作类型和格式、指令间的排序和控制机制等;
  • 异常机制,包括中断、NMI和内部异常等;
  • 机器工作状态的定义和切换,如管态和目态等;
  • 输入输出结构,包括处理机、存储器与输入输出设备之间的连接方式、数据传送方式、数据流量、以及数据交换过程的控制等;


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...