Детальная информация

Название: MODERN COMPUTER ARCHITECTURE AND ORGANIZATION: learn x86, arm, and risc-v architectures and... the design of smartphones, pcs, and cloud servers.
Авторы: LEDIN JIM.
Выходные сведения: [S.l.]: PACKT PUBLISHING LIMITED, 2022
Коллекция: Электронные книги зарубежных издательств; Общая коллекция
Тематика: Computer organization.; Computer architecture.; EBSCO eBooks
Тип документа: Другой
Тип файла: PDF
Язык: Английский
Права доступа: Доступ по паролю из сети Интернет (чтение, печать, копирование)
Ключ записи: on1314051533

Разрешенные действия:

pdf/3274756.pdf
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
epub/3274756.epub
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети

Группа: Анонимные пользователи

Сеть: Интернет

Права на использование объекта хранения

Место доступа Группа пользователей Действие
Локальная сеть ИБК СПбПУ Все Прочитать Печать Загрузить
Интернет Авторизованные пользователи СПбПУ Прочитать Печать Загрузить
-> Интернет Анонимные пользователи

Оглавление

  • Cover
  • Copyright
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Introducing Computer Architecture
    • Technical requirements
    • The evolution of automated computing devices
      • Charles Babbage’s Analytical Engine
      • ENIAC
      • IBM PC
        • The Intel 8088 microprocessor
        • The Intel 80286 and 80386 microprocessors
      • The iPhone
    • Moore’s law
    • Computer architecture
      • Representing numbers with voltage levels
      • Binary and hexadecimal numbers
      • The 6502 microprocessor
      • The 6502 instruction set
    • Summary
    • Exercises
  • Chapter 2: Digital Logic
    • Technical requirements
    • Electrical circuits
    • The transistor
    • Logic gates
    • Latches
    • Flip-flops
    • Registers
    • Adders
      • Propagation delay
    • Clocking
    • Sequential logic
    • Hardware description languages
      • VHDL
    • Summary
    • Exercises
  • Chapter 3: Processor Elements
    • Technical requirements
    • A simple processor
      • Control unit
        • Executing an instruction – a simple example
      • Arithmetic logic unit
      • Registers
    • The instruction set
    • Addressing modes
      • Immediate addressing mode
      • Absolute addressing mode
      • Absolute indexed addressing mode
      • Indirect indexed addressing mode
    • Instruction categories
      • Memory load and store instructions
      • Register-to-register data transfer instructions
      • Stack instructions
      • Arithmetic instructions
      • Logical instructions
      • Branching instructions
      • Subroutine call and return instructions
      • Processor flag instructions
      • Interrupt-related instructions
      • No operation instruction
    • Interrupt processing
      •  processing
      •  processing
      • BRK instruction processing
    • Input/output operations
      • Programmed I/O
      • Interrupt-driven I/O
      • Direct memory access
    • Summary
    • Exercises
  • Chapter 4: Computer System Components
    • Technical requirements
    • Memory subsystem
    • Introducing the MOSFET
    • Constructing DRAM circuits with MOSFETs
      • The capacitor
      • The DRAM bit cell
      • DDR5 SDRAM
      • Graphics DDR
      • Prefetching
    • I/O subsystem
      • Parallel and serial data buses
      • PCI Express
      • SATA
      • M.2
      • USB
      • Thunderbolt
    • Graphics displays
      • VGA
      • DVI
      • HDMI
      • DisplayPort
    • Network interface
      • Ethernet
      • Wi-Fi
    • Keyboard and mouse
      • Keyboard
      • Mouse
    • Modern computer system specifications
    • Summary
    • Exercises
  • Chapter 5: Hardware-Software Interface
    • Technical requirements
    • Device drivers
      • The parallel port
      • PCIe device drivers
      • Device driver structure
    • BIOS
      • UEFI
    • The boot process
      • BIOS boot
      • UEFI boot
      • Trusted boot
      • Embedded devices
    • Operating systems
    • Processes and threads
      • Scheduling algorithms and process priority
    • Multiprocessing
    • Summary
    • Exercises
  • Chapter 6: Specialized Computing Domains
    • Technical requirements
    • Real-time computing
      • Real-time operating systems
    • Digital signal processing
      • ADCs and DACs
      • DSP hardware features
      • Signal processing algorithms
        • Convolution
        • Digital filtering
        • Fast Fourier transform (FFT)
    • GPU processing
      • GPUs as data processors
        • Big data
        • Deep learning
    • Examples of specialized architectures
    • Summary
    • Exercises
  • Chapter 7: Processor and Memory Architectures
    • Technical requirements
    • The von Neumann, Harvard, and modified Harvard architectures
      • The von Neumann architecture
      • The Harvard architecture
      • The modified Harvard architecture
    • Physical and virtual memory
      • Paged virtual memory
      • Page status bits
      • Memory pools
    • Memory management unit
    • Summary
    • Exercises
  • Chapter 8: Performance-Enhancing Techniques
    • Technical requirements
    • Cache memory
      • Multilevel processor caches
      • Static RAM
      • Level 1 cache
      • Direct-mapped cache
      • Set associative cache
      • Processor cache write policies
      • Level 2 and level 3 processor caches
      • Superpipelining
      • Pipeline hazards
      • Micro-operations and register renaming
      • Conditional branches
    • Simultaneous multithreading
    • SIMD processing
    • Summary
    • Exercises
  • Chapter 9: Specialized Processor Extensions
    • Technical requirements
    • Privileged processor modes
      • Handling interrupts and exceptions
      • Protection rings
      • Supervisor mode and user mode
      • System calls
    • Floating-point arithmetic
      • The 8087 floating-point coprocessor
      • The IEEE 754 floating-point standard
    • Power management
      • Dynamic voltage frequency scaling
    • System security management
      • Trusted Platform Module
      • Thwarting cyberattackers
    • Summary
    • Exercises
  • Chapter 10: Modern Processor Architectures and Instruction Sets
    • Technical requirements
    • x86 architecture and instruction set
      • The x86 register set
      • x86 addressing modes
        • Implied addressing
        • Register addressing
        • Immediate addressing
        • Direct memory addressing
        • Register indirect addressing
        • Indexed addressing
        • Based indexed addressing
        • Based indexed addressing with scaling
      • x86 instruction categories
        • Data movement
        • Stack manipulation
        • Arithmetic and logic
        • Conversions
        • Control flow
        • String manipulation
        • Flag manipulation
        • Input/output
        • Protected mode
        • Miscellaneous instructions
        • Other instruction categories
        • Common instruction patterns
      • x86 instruction formats
      • x86 assembly language
    • x64 architecture and instruction set
      • The x64 register set
      • x64 instruction categories and formats
      • x64 assembly language
    • 32-bit ARM architecture and instruction set
      • The ARM register set
      • ARM addressing modes
        • Immediate
        • Register direct
        • Register indirect
        • Register indirect with offset
        • Register indirect with offset, pre-incremented
        • Register indirect with offset, post-incremented
        • Double register indirect
        • Double register indirect with scaling
      • ARM instruction categories
        • Load/store
        • Stack manipulation
        • Register movement
        • Arithmetic and logic
        • Comparisons
        • Control flow
        • Supervisor mode
        • Breakpoint
        • Conditional execution
        • Other instruction categories
      • 32-bit ARM assembly language
    • 64-bit ARM architecture and instruction set
      • 64-bit ARM assembly language
    • Summary
    • Exercises
  • Chapter 11: The RISC-V Architecture and Instruction Set
    • Technical requirements
    • The RISC-V architecture and applications
    • The RISC-V base instruction set
      • Computational instructions
      • Control flow instructions
      • Memory access instructions
      • System instructions
      • Pseudo-instructions
      • Privilege levels
    • RISC-V extensions
      • The M extension
      • The A extension
      • The C extension
      • The F and D extensions
      • Other extensions
    • RISC-V variants
    • 64-bit RISC-V
    • Standard RISC-V configurations
    • RISC-V assembly language
    • Implementing RISC-V in an FPGA
    • Summary
    • Exercises
  • Chapter 12: Processor Virtualization
    • Technical requirements
    • Introducing virtualization
      • Types of virtualization
        • Operating system virtualization
        • Application virtualization
        • Network virtualization
        • Storage virtualization
      • Categories of processor virtualization
        • Trap-and-emulate virtualization
        • Paravirtualization
        • Binary translation
        • Hardware emulation
    • Virtualization challenges
      • Unsafe instructions
      • Shadow page tables
      • Security
    • Virtualizing modern processors
      • x86 processor virtualization
        • x86 hardware virtualization
      • ARM processor virtualization
      • RISC-V processor virtualization
    • Virtualization tools
      • VirtualBox
      • VMware Workstation
      • VMware ESXi
      • KVM
      • Xen
      • QEMU
    • Virtualization and cloud computing
      • Electrical power consumption
    • Summary
    • Exercises
  • Chapter 13: Domain-Specific Computer Architectures
    • Technical requirements
    • Architecting computer systems to meet unique requirements
    • Smartphone architecture
      • iPhone 13 Pro Max
    • Personal computer architecture
      • Alienware Aurora Ryzen Edition R10 gaming desktop
        • Ryzen 9 5950X branch prediction
        • Nvidia GeForce RTX 3090 GPU
        • Aurora subsystems
    • Warehouse-scale computing architecture
      • WSC hardware
      • Rack-based servers
      • Hardware fault management
      • Electrical power consumption
      • The WSC as a multilevel information cache
      • Deploying a cloud application
    • Neural networks and machine learning architectures
      • Intel Nervana neural network processor
    • Summary
    • Exercises
  • Chapter 14: Cybersecurity and Confidential Computing Architectures
    • Technical requirements
    • Cybersecurity threats
      • Cybersecurity threat categories
      • Cyberattack techniques
      • Types of malware
      • Post-exploitation actions
    • Features of secure hardware
      • Identify what needs to be protected
      • Anticipate all types of attacks
      • Features of secure system design
        • Secure key storage
        • Encryption of data at rest
        • Encryption of data in transit
        • Cryptographically secure key generation
        • Secure boot procedure
        • Tamper-resistant hardware design
    • Confidential computing
    • Designing for security at the architectural level
      • Avoid security through obscurity
      • Comprehensive secure design
      • The principle of least privilege
      • Zero trust architecture
    • Ensuring security in system and application software
      • Common software weaknesses
        • Buffer overflow
        • Cross-site scripting
        • SQL injection
        • Path traversal
      • Source code security scans
    • Summary
    • Exercises
  • Chapter 15: Blockchain and Bitcoin Mining Architectures
    • Technical requirements
    • Introduction to blockchain and bitcoin
      • The SHA-256 hash algorithm
      • Computing SHA-256
      • Bitcoin core software
    • The bitcoin mining process
      • Bitcoin mining pools
      • Mining with a CPU
      • Mining with a GPU
    • Bitcoin mining computer architectures
      • Mining with FPGAs
      • Mining with ASICs
      • Bitcoin mining economics
    • Alternative types of cryptocurrency
    • Summary
    • Exercises
  • Chapter 16: Self-Driving Vehicle Architectures
    • Technical requirements
    • Overview of self-driving vehicles
      • Driving autonomy levels
    • Safety concerns of self-driving vehicles
    • Hardware and software requirements for self-driving vehicles
      • Sensing vehicle state and the surroundings
        • GPS, speedometer, and inertial sensors
        • Video cameras
        • Radar
        • Lidar
        • Sonar
      • Perceiving the environment
        • Convolutional neural networks
        • Example CNN implementation
        • CNNs in autonomous driving applications
        • Lidar localization
        • Object tracking
      • Decision processing
        • Lane keeping
        • Complying with the rules of the road
        • Avoiding objects
        • Planning the vehicle path
    • Autonomous vehicle computing architecture
      • Tesla HW3 Autopilot
    • Summary
    • Exercises
  • Chapter 17: Quantum Computing and Other Future Directions in Computer Architectures
    • Technical requirements
    • The ongoing evolution of computer architectures
    • Extrapolating from current trends
      • Moore’s law revisited
      • The third dimension
      • Increased device specialization
    • Potentially disruptive technologies
      • Quantum physics
      • Spintronics
      • Quantum computing
      • Quantum code-breaking
      • Adiabatic quantum computation
      • The future of quantum computing
      • Carbon nanotubes
    • Building a future-tolerant skill set
      • Continuous learning
      • College education
      • Conferences and literature
    • Summary
    • Exercises
  • Appendix
    • Answers to Exercises
    • Chapter 1: Introducing Computer Architecture
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
      • Exercise 5
      • Answer
      • Exercise 6
      • Answer
    • Chapter 2: Digital Logic
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
      • Exercise 5
      • Answer
      • Exercise 6
      • Answer
    • Chapter 3: Processor Elements
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
      • Exercise 5
      • Answer
      • Exercise 6
      • Answer
    • Chapter 4: Computer System Components
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
    • Chapter 5: Hardware-Software Interface
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
    • Chapter 6: Specialized Computing Domains
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 7: Processor and Memory Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 8: Performance-Enhancing Techniques
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 9: Specialized Processor Extensions
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
      • Exercise 5
      • Answer
      • Exercise 6
      • Answer
      • Exercise 7
      • Answer
      • Exercise 8
      • Answer
    • Chapter 10: Modern Processor Architectures and Instruction Sets
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
      • Exercise 5
      • Answer
      • Exercise 6
      • Answer
      • Exercise 7
      • Answer
      • Exercise 8
      • Answer
    • Chapter 11: The RISC-V Architecture and Instruction Set
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 12: Processor Virtualization
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 13: Domain-Specific Computer Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
    • Chapter 14: Cybersecurity and Confidential Computing Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
    • Chapter 15: Blockchain and Bitcoin Mining Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
    • Chapter 16: Self-Driving Vehicle Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
    • Chapter 17: Future Directions in Computer Architectures
      • Exercise 1
      • Answer
      • Exercise 2
      • Answer
      • Exercise 3
      • Answer
      • Exercise 4
      • Answer
  • PacktPage
  • Index

Статистика использования

pdf/3274756.pdf

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика

epub/3274756.epub

stat Количество обращений: 0
За последние 30 дней: 0
Подробная статистика