-- initrd -- revision = rev.01 kernel_image modules_image # modules_image can be pcmcia-cs.
$ Cd ..
# Dpkg-I kernel-image *. deb pcmcia-cs *. deb # installation
Make-kpkg kernel_image actually executes make oldconfig and make dep. If you do not use initrd, do not use the -- initrd option.
If you want to load a module that does not exist in the pcmcia-cs module
://bugs.debian.org/149236.
Standard Debian mode
Check out the error reports related to kernel-package, gcc, binutils, and modutils. Use a newer version as required.
Be careful when compiling a custom kernel with source code in the Debian system. It is safer to use the -- append_to_version option of make-kpkg to create multiple kernel images.
# Apt-get install debhelper modutils kernel-packagelibncurses5-dev
# Apt-get install kernel-source-2.4.18 # use the latest version
# Apt-get install faker
connections.Service ip6table stopChkconfig ip6table off
7. iptable. we recommend that you use the firewall to manage connections.Service iptable stopChkconfig iptable off
8. isdn, which must be used only when an ISDN environment needs to be established.Service isdn stopChkconfig idsn off
9. hidd, some Bluetooth input devices, such as keyboard and mouse.Service hidd stopChkconfig hidd off
10. pcscd is used for smart card. Currently, this type of machine is unavailable, so it is all switched off.
changes will generate systems that are more suitable for our needs. In particular, I always remember the network connection requirements. The following table lists the options for my changes and provides suggestions for system changes that you may wish to make.
Kernel configuration
Note: You may need PCMCIA to connect your laptop to IOT platform. Older laptops do not support newer Carton (32-bit) cards, but this is usually not a problem
Support. I don't choose.symmetric multi-processing Support: Symmetric multi-processing support. Unless you're rich with multiple CPUs, you don't have to choose.
4. General SetupHere are some of the most common properties to set. This part of the content is very much, generally use the default settings on it. Here are some of the most frequently used options:
networking Support: Network support. must, no network card also suggest you choose.PCI SUPPORT:PCI Support. If you use a PCI card,
How to buy a notebook built-in wireless network card?
Wireless LANs are also known as WLANs. WLAN is the use of wireless technology in the air transmission data, voice and video signals. Its main purpose is to solve a small range of wiring problems and a new scheme. Say simple is from Adsl,lan and so on a variety of broadband access to the computer we use to achieve wireless transmission, it and we are familiar with CDMA and GPRS are two completely different ways of accessing the Internet (CDMA
Installation section
The presence of unrecognized hardware
(1) ISA device--not all ISA devices can be automatically detected, and you can generally set the I/O ports and interrupts by hand.
(2) PCI/AGP devices-If a PCI device cannot be detected, then there is generally no driver for this device.
(3) PCMCIA/PC Equipment--If your PCMCIA device cannot be detected, it is generally because your
"NetworkAddress", you can enter a value by double-clicking on the new "NetworkAddress" string name.Enter the new MAC address value you specified. The new MAC address should be a 12-digit number or letter, in which there is no "-", classLooks like "00c095ecb761".There are two ways to activate a new MAC address:If you are using a normal built-in network card, you must restart your computer for the changes to take effect.If you are using a PCMCIA card, y
only exists in U-boot_after_make/drivers/mtd/ubi: LIBUBI.A only in U-boot_after_make/drivers/net/higmac exists: LIBHIGMAC.A only exists in u-boot_after_make/drivers/net/higmacv300: CTRL.O only in U-boot_ AFTER_MAKE/DRIVERS/NET/HIGMACV300 exists:. Depend exists only in u-boot_after_make/drivers/net/higmacv300: HIGMAC.O only in U-boot_after _MAKE/DRIVERS/NET/HIGMACV300 exists: libhigmacv300.a only exists in u-boot_after_make/drivers/net/higmacv300: MDIO.O only in U-boot_ AFTER_MAKE/DRIVERS/NET/HI
selection of standard power cords.Controller signal line
The Controller has three signal lines connected to the card reader 4 ~ 9-core), lock status sensor 2-core in the electric lock) and 2-core push button ). These three signal lines can be replaced by twisted pair wires in integrated cabling.
To avoid electromagnetic interference in space, the signal line of the card reader should be shielded. The other two signal lines can be shielded or non-shielded.
Remote signal line
There is a signal li
, the selection of standard power cords.
Controller signal line
The Controller has three signal lines connected to the card reader (4 ~ 9-core), lock status sensor (2-core) and push button (2-core) in the electric lock ). These three signal lines can be replaced by twisted pair wires in integrated cabling.
To avoid electromagnetic interference in space, the signal line of the card reader should be shielded. The other two signal lines can be shielded or non-shielded.
Remote signal line
There is a
Communication: RS232 Interfacecommand Syntax
field
description
prefix
a semicolon character"; " (59), must be placed in front of all commands, when the device receives the prefix character will reset the command input buffer.
address
two
commandstring
commandsare Specifictoeachdevice --seethefollowingsectionsfor thecommandsthateachdevicesupports.
one of the three signals is down, the physical state of the router serial port is in the state of Down). In addition, if the No DETECT DSR-DTR command is configured on the serial port of the router, the DTE side (router) does not detect whether the headend is sent over the DSR and CTS signals, and the physical layer is reported up as soon as the DCD signal is detected. 2, if the router's serial port configuration of the Flow control command (the specific command is FlowControl Auto), RTS and CT
interrupt, you can compile a program with a more complex structure. Such a program can do one thing and monitor one thing. Once something is monitored, interrupt what is being done, process monitoring, of course, you can also monitor multiple things, the image analogy, the interruption function enables the single-chip microcomputer to have a bowl, look at the pot function.
The above three steps are equivalent to killing the dragon and giving up the eight-handed martial arts. You can barely prot
); physical Layer authentication and encryption; Link Management. The digital speech processing circuit consists of the Speech Encoding and decoder and the speech interface circuit. The audio codecs adopt the CVSD encoding method. CVSD (Continuous Variable Slope Delta Modulation) is a continuous variable slope incremental modulation. It is an adaptive incremental modulation technology that can obtain high-quality audio encoding without resending voice packets. CVSD encoding is good at processin
How to configure a network device for connecting a notebook to the Console PortIf you use the Console port to manage CISCO devices, connect one end of the Console line to the Console port of the device, and the other end to the DB9 or DB25 interface of the computer.DB9 and DB25 interfaces are generally only available on the desktop. We cannot debug devices around the desktop every day. Instead, we often use laptops to debug devices, many laptops do not have the DB9 and DB25 interfaces, while USB
Transferred from: http://blog.csdn.net/zeroboundary/article/details/8966586In RS232 the CTS and RTS have a clear meaning, but since Hayes (HAYES) introduced smart Cat (SmartModem) is a bit confusing, but now this meaning for the mainstream, the main chip manufacturers of the UART controller flow control basic use HAYES Modem flow control interpretation.In RS232, the RTS and CTS are used to switch direction
The principle of fault detection in firewall systemAs most computers use Windows systems, firewalls also have their own systems, usually Linux, and computers, firewalls, if there is a failure, can be divided into software failures and hardware failures, hardware failures are more obvious, easy to judge, and software failure because the firewall is usually no information display or display of the small amount, it is not easy to judge, this need through the terminal software, the use of dedicated
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.