Real-time systems, Computer Engineering

Assignment Help:

This document is intended to help students get started with the real-time systems (RTS) assignment. We will start on the assignment together in the laboratory. Students will then complete the assignment, and analyse real-time design aspects (e.g. threads, mutexes, deadlocks etc), as per the original 2011 instructions, in their own time, and hand in the report by the due date.    

Instructions
1.  Download the following items from the course website, under the "RTS Resources" section, to a working folder:

a)  "Practical Assignment" - linked to the "RTS_practial_assignment_2011sp1.pdf" document.

b)  "Source code for practical assignment" - linked to "RTS_practical_1_2011sp1.zip"

c)  "Patch for practical assignment" - linked to "RTS_practical_1_2012_patch.zip"

2.  Unzip the downloaded files in the working folder.

3.  Start Microsoft Visual Studio (2010 professional is used here). Students are encouraged to familiarise themselves with this, popular, powerful, flexible and developer-friendly tool. Visit the online MSDN Developer Center for help.  

4.   (Left) Click on "New Project ..." on the start page.

5.  Make a new Visual C++ Win32 Console Application named "RTS_prac" in your working folder.

a)  Under application settings, check the "Empty Project" option.

6.  From within the Solution Explorer,  
a)  Right click on Header Files and add the two .h files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

b)  Right click on Source Files and add the two .c files downloaded to the "RTS_practical_1_2011sp1" directory ("Existing Items").

7.  Each .c file contains its own main() function. Comment out all source code in the file that you do not want to use.

8.  We now need to add the POSIX functionality, provided by a 3rd party. Source code is freely available, but it is not necessary for what we would like to do here. We can just link our project with the built code.


Related Discussions:- Real-time systems

How do you ensure that our records are scanned accurately, How do you ensur...

How do you ensure that our records are scanned accurately? Not only do we have a highly trained and capable staff, we also have quality controls in place to make sure your reco

How does the xml serializer work, How does the Xml Serializer work?  What A...

How does the Xml Serializer work?  What ACL permissions does a process using it require?   Xml Serializer needs write permission to the system's TEMP directory.

What are assembly attributes, Attributes are declarative tags in code that ...

Attributes are declarative tags in code that put in additional metadata into an assembly.

Vector reduction instructions-vector processing, Vector reduction Instructi...

Vector reduction Instructions : When operations on vector are being deduced to scalar items as the result, then these are the vector reduction instructions. These instructions are

Interrupt and scanning method of keypad operation, INTERRUPT METHOD - USING...

INTERRUPT METHOD - USING PORTB CHANGE INTERRUPT By using 4 by 4 matrix keypad connected to PORTA and PORTB. The rows are connected to PORTA-Low (RA1-RA4) and the columns are co

Conversion of decimal number 82.67 to its binary equivalent, Conversion of ...

Conversion of Decimal number 82.67 to its Binary Equivalent Ans. Firstly see the integer part 82 and determine its binary equivalent  as The Binary equivalent is (101001

What are the different methods used for handling, What are the different me...

What are the different methods used for handling the situation when multiple interrupts occurs? 1) Vectores interrupts 2) Interrupt nesting 3) Simultaneous Requests.

What are digital signatures and its uses, What are Digital Signatures and i...

What are Digital Signatures and its uses? A digital signature is an electronic quite than a written signature which can be used through someone to authenticate the identity of

Illustrate basic strategy used in raid, Q. Illustrate Basic strategy used i...

Q. Illustrate Basic strategy used in RAID? Basic strategy used in RAID is to replace large capacity disk drive with multiple smaller capacity disks. Data on these disks is dist

What is macro call, What is macro call? Explain. Macro call: While a...

What is macro call? Explain. Macro call: While a macro name is used along with a set of actual parameters this is replaced through a code generated from its body. Such code

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd