Three basic experiments of information security system design

Source: Internet
Author: User

Beijing Institute of Electronic Technology (BESTI)

Lab Report

Course: Information Security system Design Basic class: 1352

Name: Malmqvist School Number: 20135235

Score: Instructor: Lou Jia Peng Experimental Date: 2015.12.3

Experiment level: Preview degree: Experiment time: 15:30~18:00

Instrument Group: Compulsory/Elective: compulsory Test number: three

Experiment name: Transplantation of experimental three-time system

Experimental purposes and Requirements: 1. Learn the principle of driving design under Linux;

2. Master the process of driving development and debugging by using the module method.

Experimental instrument:

Name

Model

Number

Embedded experimental Platform

Up-tech s2410/p270

1

PC Machine

Lenovo

1

Experiment contents, steps and experience:

First, the contents of the experiment:

1.1 Install Ads (install file in 00-ads1.2 directory, crack method 00-ads1.2 \crack directory)

1.2 Installing the Giveio driver (installation files in the 01-giveio directory) Copy the entire Giveio directory to the C:\WINDOWS and copy the Giveio.sys file from that directory to

under the c:/windows/system32/drivers. in Control Panel, choose Add Hardware > Next > select-yes i have connected this hardware > Next > Check-Add new Hardware Device > Next > Check Install I manually select hardware from List > next > select-Show All devices > select-Install from disk-browse, specify drive as C:\WINDOWS\GIVEIO\giveio.inf file, click OK, install driver

1.3 Installing the JTAG driver (install files in the 02-uarmjtag2.0 directory)

1.4 Configure HyperTerminal: Baud rate is 115200, data bit 8, no parity, stop bit 1, no data flow control.

1.5 Test the basic installation is correct, refer to document "03-Test document. pdf", test program in 04-test directory

Second, the experimental steps:

1, ensure that the ARM machine and computer host connection is correct, and the PC power on, open HyperTerminal set some constants to confirm that the arm machine is normal.

2, the HyperTerminal configuration to the state of Vivi.

3, the installation of ads and Giveio mobile and so on according to the experimental content to do, there will be no problem.

Run the ADS1.2 integrated development environment, click the File->open option, select the project file we use the/ucos V6.0/EXP11 drawing in the CD API function as an example select EXP11.MCP and click Open.

Select the file you want to compile in a blank location in front of the corresponding folder to select, the header file library file is not selected, because it has been included in the source code. Click Make to compile the link.

4. Be sure to turn on the Uarmjtag click Initialize Configuration selection ARM9 Click OK before running the debug program.

5. Click Options->configure Target to bring up the dialog box. To set it. The main changes were two places:

Name: Select Arm Ethernet driver;configuration: configured to: 127.0.0.1. Click OK, then select ADP to click OK.

The loading interface will appear after you determine. If the loading is complete without any display in the text area, then you need to close it and run the debug once.

Then continue to click on Options->configure Target and select ADP Click OK after the dialog box pops up. After determining the loading interface will appear, this time needs to be closed.

Then click Debug again this time is the normal loading state. Appears to indicate a normal load.

6, then we click the Run button. After the normal state he will stop in the main function, which is the system automatically. We'll run the drawing experiment after we continue with the Run button

The result of the drawing is this, and the sine function appears. As follows:

The Vivi console displays as follows:

After that, pause and exit the program before the end.

Three, experimental problems and solutions

In the experiment when running ads, the code to get above is not warning but error, and then the entire machine restarted and then re-done again, found missing a very important point, is not delete folder exp11_ DATA. Then, after deleting this folder, there is no error.

Four, the experiment experience:

The experiment was done very quickly, because it was done last week, and then the test case was broken, so there was no display of the pattern. The experimental process also encountered some small problems caused by carelessness, and then re-follow the experimental step by step-by-step careful, successful. Through this experiment, it is found that no matter what things to be careful, otherwise it is likely to ignore some small details, leading to failure!

Three basic experiments of information security system design

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.