// Question B of the first top embedded cup finals// 7913377 vrs570540852 3754 accepted 376 K 0 Ms GCC 2259b 01:05:35// This is a topic for simulating Modbus protocol. It mainly describes the underlying programming of C involving network transmission data encoding, CRC verification code, and floating point number conversion.// In the floating point conversion, I directly write this encoding in the memory (in the unsigned long mode), then read this mem
. just only on single update of the row for example might not lead to fill the * _ tab_modifications. see example below: STEP1: *** create a table crc. gs, analyze it and then fill test_gs.gs with 100 rows and perform some DML tables create user crc identified by crcdefault tablespace users temporary tablespace temp; grant connect, resource to crc; connect
Tags: http io strong ar data div sp on CModbus an industry-commonly used communication protocol, a communication convention. Modbus protocol includes RTU, ASCII, TCP. One of the most commonly used modbus-rtu, relatively simple, on a single-chip computer is easy to achieve. Although the RTU is relatively simple, but look at the protocol materials, manuals said too professional, at first a lot of content is difficult to understand.What are the so-called agreements? Is the agreement between each ot
1. setenv command
This command is used to set environment variables, as described below
# setenv
setenv-set Environment Variables
Usage:
setenv Name Value ...
-Set environment variable ' name ' to ' Value ... '
setenv name
-delete environment variable ' name 'As described, when you want to set an environment variable, the usage is as follows:
setenv Name Value, when you want to delete an environment variable, use such as:
setenv name。 The implementation of the function is mostly a stri
CRC-16 (Cyclic Redundancy error check)The CRC-16 error check program is as follows: Packet (only data bit, not the start bit, stop bit and optional parity bit) is considered as a continuous binary, its maximum valid bit (MSB) preferred sending. The packet is first multiplied by x 16 (16 digits left), and then divided into x 16 + x 15 + X 2 + 1, X percentile 16 + x percentile 15 + x percentile 2 + 1 can be e
can find the file hello/hello.c in the sample source code). We command DMESG (or you can view system log files such as/var/log/messages etc., if you enable these system logs) to obtain the specific reason for module mount failure, the module Hello.ko mount failure is due to the module_layout in the module The version information for the exported symbol does not match the current kernel. The function module_layout is defined after the Kernel module version option Modversions (that is, the kernel
definition file has the following definition:#define Cfg_nand_block_size (Because I'm using NAND UBOOT here, it should be the previous one:Cfg_env_size = 16Cfg_env_offset = (1024In the same way, you can also see the definition in the Include/configs directory, depending on what board you are using.2. Read the Uboot MTD fileDetermined the environment variable in the flash offset, you can directly open the Uboot MTD device file, and then use Lseek to locate, and then use the Read function to
Read-Write Analog registers:Send command (host to slave) format:[Device Address][Command Number[High Start register address8bit][Low8bit][high number of registers read8bit][Low8bit] [CRCthe low checksum8bit] [CRCthe High calibration8bit]Example:[11][03][00][6B][00][03][CRC low ][CRC high ]Meaning for example the following:All: The address of the device, the address in The sample is one, the default address
Ethernet: ModbusRTU; Message format: [Transaction metadata identifier (2 bytes)] + [Protocol identifier (2 bytes)] + [length (2 bytes)] + ModbusRTU-CRC Check (2 bytes) All in all, ModbusTCP has 6 more packet headers than ModbusRTU, the CRC check with two bytes at the end is missing. The following mainly describes the ModbusRTU: 0x03 code.
Read register data packet format
Response format
already appropriate tags in the disassembly code ):
List 239. Re-implement decryption with IDA-C
Auto A; Auto P; Auto CRC; Auto ch;For (P = locbyname ("S0"); byte (p )! = 0; P ++){CRC = 0;
For (A = locbyname ("begincode"); A {Ch = byte ();// Because IDA does not support byte and word types// (It is a pity). It must be involved in bitwise operations.// The CRC lo
ArticleDirectory
Contents
Introduction
1. Problem
2. Perspective
3. CRC cards
4. Experience
5. Conclusion
References
Appendix
A laboratory for teaching A laboratory for TeachingObject-oriented thinking
Kent Beck, Apple Computer, Inc.Ward cunnheim, Wyatt Software Services, Inc.
From the oopsla '89 Conference ProceedingsOctober 1-6, 1989, New Orleans, LouisianaAnd the special issue of sigplan noticesVolume 24
This article was reproduced from: http://blog.163.com/yucheng_xiao/blog/static/76600192201393092918776/First, the basic principleThe CRC test principle is actually the addition of an R-bit binary test code (sequence) after a P-bit binary data sequence, thus constituting a binary sequence with a total length of n=p+r bits; There is a particular relationship between the code attached to the data sequence and the contents of the data series. This particu
message will receive an ACK.4. After the file data is sent, the sender sends the end of the file Z, receiver pays after receiving confirmation.5. When no files need to be sent, transmit end message B is sent, the ACK is received, and the connection is closed, and the physical connection remainsEach message is numbered and 0~63.XMODEMSimple and general, transmission information Unit is "packet =128b", transmission speed is slow, suitable for the poor quality of the telephone line in the case of
Cyclic Redundancy check Cyclic Redundancy test is a set of verification codes based on data computing. It is used to check whether the data is changed or transmitted incorrectly during transmission.Algorithm principle
Assume that 15-bit binary information G = 101001110100001 needs to be sent during data transmission. The binary code can be expressed as an algebraic polynomial g (x) = x ^ 14 + x ^ 12 + x ^ 9 + x ^ 8 + x ^ 7 + x ^ 5 + 1, where the K-bit value in G, corresponds to the x ^ K coeffic
data block. Critical data blocks define 3 standard blocks, each of which must contain them. 3 standard data blocks are: IHDR, IDAT, Iend.
Here are 4 pieces of data: IHDR, Plte, IDAT, iend
PNG data block structure
PNG file, each chunk consists of 4 parts length | Type (name) | Data | CRC, described below
Length:4 bytes, just length of the data, not include type and CRC type:4 bytes, ASCII letters ([a-z
Turn from: http://www.juliantec.info/julblog/yihect/linux-kernel-build-system-7
From the previous analysis, we already know that in Linux, there are two types of modules: internal modules and external modules. What we're saying here about target modules is to compile those internal modules, and the processing of the external modules will be described later. We also know that both internal and external modules are compiled in two phases. Stages of life into modules of the corresponding. o files
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.