APS For Internet of Things Engin

2019-01-06  本文已影响0人  志䦀zy

<font color = #FF8C00>1.computer architecture</font>

1.1working principle of scalar & the time/space diagram

Normally,the instruction is divided into 5 parts,namely IF ID EXE MEM WB,in the pipelines,these parts are often used .
Let me show the concrete meaning of the above parts.

IF: (Instruction fetch)

ID: (Instruction Decode)

EXE: (Execute)

MEM : (Memory Access)

WB: (Write Back)

supplement: pipeline processing
It is technique of decomposing a sequential process into suboperations,with each sub-process being executed in a special dedicated segment that operates concurrently.

when reffered to space time diagram:

1.2 dependency : in the operation of instructions,it may have problems

in the above scenario,in cycle 4,l1 and l4 are trying to access the same resource which introduce conflict.

solution to the structural dependency:we have to keep the instruction on wait until the required resource becomes available.

solution to structural dependency

When the above instructions are executed in a pipelined processor, then data dependency condition will occur, which means that I2 tries to read the data before I1 writes it, therefore, I2 incorrectly gets the old value from I1.


image.png

solution to the data dependency:operand forwarding we use the interface registers present between the stages to hold intermediate output so that dependent instruction can access new value from the interface register directly.

solution to data dependency

1.3 Memory hierarchy

1.4 Virtual Memory and Cache Memory

<font color = #FF8C00>2.Computer Organization Principle</font>

2.1 Hardware System Architecture

2.2 complement arthmetic (计算)

2.3 Instruction format(zero one two three)

computer performs task on the basis of instruction of provided.A instruction in computer comprises of groups called fields.The most common fields are:

在这里插入图片描述 image.png

These instructions make creation of program much easier but it does not mean that program will run much faster because now instructions contain more information and each micro instruction will be performed once a circle.

<font color = #FF8C00>3. AI principle</font>

3.1 Three schools

3.2 Turing testing

Turing proposed that a human evaluator would judge natural language conversations between a human and a machine designed to generate human-like responses.
If the evaluator cannot reliably tell the machine from the human, the machine is said to have passed the test.

3.3 Predicate logic(谓词逻辑)

predicate logic involves using standard forms of logical symbolism . Most simple sentences, for example, ``Peter is generous'' can be represented in terms of logical formula in which a predicate is applied to one or more arguments


image.png image.png

4. operating system

4.1 process

A process is an instance of a computer program that is being executed. It contains the program code and its activity. Dependent on OS, a process may be made up of multiple threads of execution that execute instructions concurrently.

process states:

4.2 scheduling

A process scheduler schedules different processes to be assigned to the CPU based on particular scheduling algorithms. There are several popular scheduling algorithms .

FCFS

RR (Round Robin)

4.3 Mutual Exclusion

Mutual exclusion is a property of concurrency control,which is instituted for the purpose of preventing race competition.
It's required that one thread of execution can't never enter into the critical section while another concurrent thread of execution enters its own critical section.

solving problem using mutual exclusion:

deadlock: in concurrent computing,a deadlock is a state which each member of a group is waiting other member to take action.

necessary conditions: a deadlock arises if and only if all of the following conditions hold in a system at the same time

<font color = #FF8C00>5. Software Engineering</font>

5.1 software risk

5.2 software development process

a software development process is the process of dividing software development work into distinct(清楚的) phases to improve design, product management, and project management.

software methodologies

<font color = #FF8C00>6.Database principle</font>

6.1 Database schema

different kinds of DB schema

DB schema should have the following properties:
complete minimal and normalized

<span id='SQL'> 6.2 SQL </span>

6.3 normalization(标准化)

<span id = '1NF'> 1NF : Within a table that is in first normal form, each row has columns that are each represent one thing and contain one element.
(每一行都有一列,每个列代表一个东西并且包含一个元素)</span>

<span id = '2NF'>2NF :Within a table that is in second normal form, the data in each columns in each row are dependent on each row's entire primary key.
(每行中每列的数据取决于每行的整个主键)
A primary key is one or more columns in a row that is used to identify and index that row of the table.</span>

<span id = '3NF'>3NF : Within a table that is in third normal form, the data in each column in each row are dependent only on columns that are part of the primary key.
(每行中每列的数据仅取决于主键的部分列)</span>

<font color = #FF8C00>7.Computer Network</font>

7.1 OSI(Open Systems Interconnection) Model

remove Presentation and Session Layer

OSI model

<span id = 'IPA'>An Internet Protocol address (IP address) is a numerical label assigned to each device. At present there are two versions of protocols in use.
IPV4:uses 32-bit addressing which limits address space up to 4294967296 (232) possible unique addresses.
IPV6: uses 128-bit addressing which limits address space up to 2128 possible addresses.</span>

8. Data Structure

8.1 List (Array & Linked List)

array:is a data structure consisting of a collection of elements.

The simplest type of data structure is a linear array, also called one-dimensional array.

linked list: is a linear collection of data elements of any type, called nodes, where each node has itself a value, and points to the next node in the linked list.

image.png

8.2 Stack | Queue

stack:

In computer science, a stack is an abstract data type that serves as a collection of elements, with two principal operations:

The order in which elements come off a stack gives rise to its alternative name, LIFO (last in, first out).

queue:

8.3 Tree (Binary Tree) & Graph

Binary Tree

Graph

<font color = #FF8C00>9.Microcomputer System Theory & Interface Technology</font>

<font color = #FF8C00> 10.Principle of Communication </font>

10.1 modulator

Analog System : Source -> Modulator -> Channel(with noise) -> Demodulator -> Receiver(Destination)

Digital System: Source -> Encode -> Modulator -> Channel(with noise) -> Demodulator -> Decode -> Receiver(Destination)

<span id='AM'>Amplitude modulated wave: AM DSB SSB VSB</span>

AM: Amplitude Modulation(here the amplitude of the carrier signal is varied in accordance with the instantaneous amplitude of the modulating signal)
DSB :Double Sideband Amplitude Modulation(DSB-AM)

Angle modulation: FM PM

Frequency Modulation:the frequency of the carrier signal is varied in accordance with the instantaneous amplitude of the modulating signal
Phase Modulation:the phase shift of the carrier signal is varied in accordance with the instantaneous amplitude of the modulating signal

10.2 Fundamental digital modulation method

11.Principle of Automatic Control

11.1 control system

To overcome the limitations of the open-loop controller, control theory introduces feedback. A closed-loop controller uses feedback to control states or outputs of a dynamical system.

If we assume the controller C, the plant P, and the sensor F are linear and time-invariant.
the systems above can be analysed using the Laplace transform on the variables. This gives the following relations:


image.png

Solving for Y(s) in terms of R(s) gives


image.png

11.2 PID Controller

PID Controller
image.png

<span id='feedback'>Feedback occurs when outputs of a system are routed back as inputs as part of a chain of cause-and-effect that forms a circuit or loop.</span>

12.Signal & System

This is one of the most important course in my whole college. In this course ,I’ve learned three kinds of transform,namely fourier,laplace and z.And the most important is,it’s the first time that I acknowledge the concept of frequency domain.

12.1 The basic concept of signal & system

12.2 Frequency domain

12.3 Different kinds of transform

在这里插入图片描述
在这里插入图片描述

13. sensor & actuator

14. Embedded System

15.single chip microcomputer (microcomputer)

Mainly introduce the MCS-8051 microcomputer.:The Intel 8051 is an 8-bit microcontroller which means that most available operations are limited to 8 bits. There are 3 basic "sizes" of the 8051: Short, Standard, and Extended. The Short and Standard chips are often available in DIP

Application:

Basic Pins(partly):

Ports:

<span id='MCS51'>MCS51 Architecture</span>

MCS51 architecture

16.WSN(Wireless Sensor Network)

16.1 Application

16.2 Component

The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors.
Each such sensor network node has typically several parts:

16.3 Characteristics include:

17.RFID(Radio-Frequency Identification)

17.1 RFID Tag

A radio-frequency identification system uses tags, or labels attached to the objects to be identified.
A Tag contain as least three parts:

17.2 Readers

RFID systems can be classified by the type of tag and reader.

<font color = #FF8C00>18. Web Application Design</font>

18.1 Technologies:

web application development has several characteristics that have to be addressed and these include: short development life-cycle times; different business models;
some of technologies:

image.png

19.Network Security

19.1 Security management

Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.

<SPAN ID='DNSPOISON'>DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to the attacker's computer </SPAN>

<SPAN ID='SCANNER'>A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by attackers to identify network services running on a host and exploit vulnerabilities.</SPAN>

上一篇 下一篇

猜你喜欢

热点阅读