Real-time systems, Computer Engineering

Assignment Help:

This document is intended to help students get started with the real-time systems (RTS) assignment. We will start on the assignment together in the laboratory. Students will then complete the assignment, and analyse real-time design aspects (e.g. threads, mutexes, deadlocks etc), as per the original 2011 instructions, in their own time, and hand in the report by the due date.    

Instructions
1.  Download the following items from the course website, under the "RTS Resources" section, to a working folder:

a)  "Practical Assignment" - linked to the "RTS_practial_assignment_2011sp1.pdf" document.

b)  "Source code for practical assignment" - linked to "RTS_practical_1_2011sp1.zip"

c)  "Patch for practical assignment" - linked to "RTS_practical_1_2012_patch.zip"

2.  Unzip the downloaded files in the working folder.

3.  Start Microsoft Visual Studio (2010 professional is used here). Students are encouraged to familiarise themselves with this, popular, powerful, flexible and developer-friendly tool. Visit the online MSDN Developer Center for help.  

4.   (Left) Click on "New Project ..." on the start page.

5.  Make a new Visual C++ Win32 Console Application named "RTS_prac" in your working folder.

a)  Under application settings, check the "Empty Project" option.

6.  From within the Solution Explorer,  
a)  Right click on Header Files and add the two .h files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

b)  Right click on Source Files and add the two .c files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

7.  Each .c file contains its own main() function. Comment out all source code in the file that you do not want to use.

8.  We now need to add the POSIX functionality, provided by a 3rd party. Source code is freely available, but it is not necessary for what we would like to do here. We can just link our project with the built code.


Related Discussions:- Real-time systems

Define file record length, Define File record length ? File record leng...

Define File record length ? File record length must be selected to match the data characteristics.

What is delay system, What is Delay System? Delay System: A class of ...

What is Delay System? Delay System: A class of telecommunication networks like data a network that places the call or message arrivals in a queue in the lack of resources, an

What is the relation between response time and throughput, The Throughput g...

The Throughput graph represents the amount of data in bytes that the Vusers received from the server in a second. When we evaluate this with the transaction response time, we will

Use of arrays in assembly, An array is referencing using a base array value...

An array is referencing using a base array value as well as an index. To simplify addressing in arrays 8086 has provided two index registers for mathematical computations viz. BP a

How to build the structure chart, Building the Structure Chart - Proces...

Building the Structure Chart - Processes in the DFD tend to show single module on the structure chart Afferent processes - give inputs to system Central processes -

3 variable k-maps, 3-variable K-maps have 8 squares which arenormally arran...

3-variable K-maps have 8 squares which arenormally arranged in 4 columns and 2 rows.Columns are labeled with 2 variables. The columns are arranged so that either A or B cha

Illustrates several names of popular internet browsers, Illustrates several...

Illustrates several names of popular internet browsers? Popular Internet Browsers are: Internet Explorer, Netscape Navigator and Mosaic, Google chrome and Mozilla and Opera.

Explain the meaning of accept socket primitive, Explain the meaning of A...

Explain the meaning of ACCEPT socket primitive. The Accept Primitive: A server which uses connection-oriented transport should call procedure accepts to accept

Explian two limitations of dead-box analysis, (a) Explian two limitations o...

(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd