Basic experiment of information security system design two-20135222 Hu Feng 20135215 Huang Albert

Source: Internet
Author: User

Beijing Institute of Electronic Technology (Besti)

Lab Report

Course: Information Security system Design Basic class: 1352

Name: Hu Feng Huang Albert School No.: 20135222 20135215

Score: Instructor: Lou Jia Peng Experimental Date: 2015.11.10

Experiment level: Preview degree: Experiment time: 30-18:xx

Instrument Group: Compulsory /elective: Compulsory test number: 1

Experiment Name: Embedded Linux Development

Experimental purposes and requirements: familiar with the Linux development environment, learn the configuration and use of the Linux development environment, using the Linux arm compilation, using NFS-based download debugging, understand the basic process of embedded development.

Experimental instrument:

Name

Model

Number

Arm

Up-tech

1

PC Machine

Xp

1

Virtual machines

REDHAT

1

Experiment contents, steps and experience:

1, the understanding of the experiment process, the understanding of the knowledge point in the experiment instruction book.

(1) The concept of multithreading? Why do you want to propose multithreading?

A thread is a set of instructions, or a special section of a program installation, that can be executed independently in a program. It can also be understood as the context in which the code runs. So a thread is basically a lightweight process that is responsible for multitasking in a single program. Typically, the operating system is responsible for scheduling and executing multiple threads. Multithreading is a mechanism that allows multiple instruction flows to be executed concurrently in a program, each of which is called a thread and is independent of each other. A thread, also known as a lightweight process, has independent execution control as a process and is dispatched by the operating system. Arm compiler, first access the shared folder on the PC, unzip the required files and copy to the shared folder, and then use the./install.sh command in the virtual machine to install the arm compiler.

(2) What relationship does the IP between the lab box, virtual machine redhat, and WinXP need to meet? How to configure? Why?

First open the Super port, create a new communication terminal, namedarm. In the Properties dialog box, set the baud rate to 115200, Data bits are set to8, no parity check, stop bit is1, no data flow control. Virtual machinesRedhat is in the system Setup-Network-Edit-Modifications inside the deviceof the IP address. So the IP address of the three is in the same network segment.

(3) What does each option in the Mount command mean in the experiment?

-A installs all file systems that are class-out in the/etc/fstab file.

-F disguises mount, making checks on the device and the directory look, but does not really mount the file system.

-N does not record the installation in the/etc/mtab file.

-R tells the file system to be installed as read-only.

-V Displays the installation information in detail.

-W installs the file system as writable, which is the default for the command.

-t specifies the file system type of the device

-o Specifies the option to mount the file system, and some can also be written to the/etc/fstab

2. Problems encountered during the experiment and solutions.

(1) Super terminal problem and solution

Q: When the HyperTerminal is turned on, the information on the arm machine is not displayed on the HyperTerminal window.

A: You should turn off the virtual machine, log off after the restart in the open Super port, you can on the HyperTerminal port on the real arm information.



Basic experiment of information security system design two-20135222 Hu Feng 20135215 Huang Albert

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.