Real-time systems, Computer Engineering

Assignment Help:

This document is intended to help students get started with the real-time systems (RTS) assignment. We will start on the assignment together in the laboratory. Students will then complete the assignment, and analyse real-time design aspects (e.g. threads, mutexes, deadlocks etc), as per the original 2011 instructions, in their own time, and hand in the report by the due date.    

Instructions
1.  Download the following items from the course website, under the "RTS Resources" section, to a working folder:

a)  "Practical Assignment" - linked to the "RTS_practial_assignment_2011sp1.pdf" document.

b)  "Source code for practical assignment" - linked to "RTS_practical_1_2011sp1.zip"

c)  "Patch for practical assignment" - linked to "RTS_practical_1_2012_patch.zip"

2.  Unzip the downloaded files in the working folder.

3.  Start Microsoft Visual Studio (2010 professional is used here). Students are encouraged to familiarise themselves with this, popular, powerful, flexible and developer-friendly tool. Visit the online MSDN Developer Center for help.  

4.   (Left) Click on "New Project ..." on the start page.

5.  Make a new Visual C++ Win32 Console Application named "RTS_prac" in your working folder.

a)  Under application settings, check the "Empty Project" option.

6.  From within the Solution Explorer,  
a)  Right click on Header Files and add the two .h files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

b)  Right click on Source Files and add the two .c files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

7.  Each .c file contains its own main() function. Comment out all source code in the file that you do not want to use.

8.  We now need to add the POSIX functionality, provided by a 3rd party. Source code is freely available, but it is not necessary for what we would like to do here. We can just link our project with the built code.


Related Discussions:- Real-time systems

Define superscalar processors, In scalar processors just one instruction is...

In scalar processors just one instruction is implemented per cycle which means just one instruction is issued for each cycle and only that one instruction is completed however the

Alpha-beta pruning, Alpha-beta pruning: Thus we can prune via the alph...

Alpha-beta pruning: Thus we can prune via the alpha-beta method, it makes means to perform a depth-first search requiring the minimax principle. Just compared to a breadth fir

Determine the process of kernel, What are the events done by the Kernel aft...

What are the events done by the Kernel after a process is being swapped out from the main memory? When Kernel changes the process out of the primary memory, it performs the fol

Simplify using k-map, Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M1...

Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M12 + M13 + M8 + M9 2. M0 + M2 + M4 + M5 + M8 + M10 + M12 3. F(W,X,Y,Z) = ∑ (0,1,2,4,5,6,8,9,12,13,14)

What is collective message passing, Q. What is Collective Message Passing? ...

Q. What is Collective Message Passing? In collective message passing all the processes of a group take part in communication. MPI offers a number of functions to apply the coll

What is the role of a controller in an mvc application, The controller resp...

The controller responds to user interactions, with the application, by selecting the act method to implement and also selecting the view to render.

Describe the characteristics of mainframes, Problem 1 (a) List and desc...

Problem 1 (a) List and describe the characteristics of mainframes, minicomputers and microcomputers. (b) Briefly describe what is meant by electronic commerce and what b

What types of data entry services do you perform, What types of data entry ...

What types of data entry services do you perform? Our business is to understand what data you require entered and in what particular format. After an initial analysis is perfor

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Explain in detail about real time processing, Explain in detail about Real ...

Explain in detail about Real time (transaction) processing When booking seats on a flight, for illustration, real time (transaction) processing would be used. Response to a que

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd