The first experimental report on the foundation of Information security system design

Source: Internet
Author: User

20145336 Zhang Ziyang "The basis of information security system Design" Interim summary of the experimental report cover

Experimental steps
    1. Connecting the Development Board

      The Development Board and computer through the serial cable and network cable and the host connection, and then connect the power cord, keep the power switch in the state of shutdown.

    2. Set up Super Terminal

      Run the Windows XP system under Start, all programs, accessories, communications, HyperTerminal. Create a new communication terminal, named Arm. In the Properties dialog box, set the baud rate to 115200, the data bit to 8, no parity, stop bit 1, no data flow control. Save As on the desktop.

    3. Start the experimental platform

      Open the HyperTerminal and turn on the arm machine power switch. Wait a minute and the information from the arm machine is displayed in the HyperTerminal window. Continue to wait, enter the Ifconfig command, recording the IP of the arm machine is: 192.168.0.121.

    4. Modify the IP of the XP system and the Redhat virtual machine so that they are all in the same network segment as the arm machine's IP.

    5. Install the arm compiler in the PC "Start", "Run", enter the virtual machine's IP. \192.168.0.234, enter the username BC, password 123456 and then OK, you can access the virtual machine's files. Then extract the required files to the shared folder BC. Enter the virtual machine, enter the./install.sh on the command line, and the setup script will automatically establish the directory and configure the compilation environment.

    6. Configure environment variables use VI in a virtual machine modify the PATH variable in the/root/.bash_profile file to path= $PATH: $HOME/bin:/opt/host/armv4l/bin/

    7. Build the hello.c file and compile it into the virtual machine into the folder/ROOT/BC, and write the hello.c file in this directory. Compile the hello.c with the command ARMV4L-UNKNOWN-LINUX-GCC and generate a hello executable file.

    8. Download debugging mount the shared folder in HyperTerminal to establish communication between the board and the virtual machine. Enter command "Mount-t nfs-o nolock 192.168.0.234:/root/bc/host"

Group members

20145333 Ru Xiang

20145336 Zhang Ziyang

20145207 Li Yuan

The first experimental report on the foundation of Information security system design

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.