Beijing Institute of Electronic Technology (BESTI)
Lab Report
Course: Information Security system Design Basic class: 1352
Name: Malmqvist School Number: 20135235
Score: Instructor: Lou Jia Peng Experimental Date: 2015.12.3
Experiment level: Preview degree: Experiment time: 15:30~18:00
Instrument Group: Compulsory/Elective: compulsory Test number: three
Experiment name: Transplantation of experimental three-time system
Experimental purposes and Requirements: 1. Learn the principle of driving design under Linux;
2. Master the process of driving development and debugging by using the module method.
Experimental instrument:
Name |
Model |
Number |
Embedded experimental Platform |
Up-tech s2410/p270 |
1 |
PC Machine |
Lenovo |
1 |
Experiment contents, steps and experience:
First, the contents of the experiment:
1.1 Install Ads (install file in 00-ads1.2 directory, crack method 00-ads1.2 \crack directory)
1.2 Installing the Giveio driver (installation files in the 01-giveio directory) Copy the entire Giveio directory to the C:\WINDOWS and copy the Giveio.sys file from that directory to
under the c:/windows/system32/drivers. in Control Panel, choose Add Hardware > Next > select-yes i have connected this hardware > Next > Check-Add new Hardware Device > Next > Check Install I manually select hardware from List > next > select-Show All devices > select-Install from disk-browse, specify drive as C:\WINDOWS\GIVEIO\giveio.inf file, click OK, install driver
1.3 Installing the JTAG driver (install files in the 02-uarmjtag2.0 directory)
1.4 Configure HyperTerminal: Baud rate is 115200, data bit 8, no parity, stop bit 1, no data flow control.
1.5 Test the basic installation is correct, refer to document "03-Test document. pdf", test program in 04-test directory
Second, the experimental steps:
1, ensure that the ARM machine and computer host connection is correct, and the PC power on, open HyperTerminal set some constants to confirm that the arm machine is normal.
2, the HyperTerminal configuration to the state of Vivi.
3, the installation of ads and Giveio mobile and so on according to the experimental content to do, there will be no problem.
Run the ADS1.2 integrated development environment, click the File->open option, select the project file we use the/ucos V6.0/EXP11 drawing in the CD API function as an example select EXP11.MCP and click Open.
Select the file you want to compile in a blank location in front of the corresponding folder to select, the header file library file is not selected, because it has been included in the source code. Click Make to compile the link.
4. Be sure to turn on the Uarmjtag click Initialize Configuration selection ARM9 Click OK before running the debug program.
5. Click Options->configure Target to bring up the dialog box. To set it. The main changes were two places:
Name: Select Arm Ethernet driver;configuration: configured to: 127.0.0.1. Click OK, then select ADP to click OK.
The loading interface will appear after you determine. If the loading is complete without any display in the text area, then you need to close it and run the debug once.
Then continue to click on Options->configure Target and select ADP Click OK after the dialog box pops up. After determining the loading interface will appear, this time needs to be closed.
Then click Debug again this time is the normal loading state. Appears to indicate a normal load.
6, then we click the Run button. After the normal state he will stop in the main function, which is the system automatically. We'll run the drawing experiment after we continue with the Run button
The result of the drawing is this, and the sine function appears. As follows:
The Vivi console displays as follows:
After that, pause and exit the program before the end.
Three, experimental problems and solutions
In the experiment when running ads, the code to get above is not warning but error, and then the entire machine restarted and then re-done again, found missing a very important point, is not delete folder exp11_ DATA. Then, after deleting this folder, there is no error.
Four, the experiment experience:
The experiment was done very quickly, because it was done last week, and then the test case was broken, so there was no display of the pattern. The experimental process also encountered some small problems caused by carelessness, and then re-follow the experimental step by step-by-step careful, successful. Through this experiment, it is found that no matter what things to be careful, otherwise it is likely to ignore some small details, leading to failure!
Three basic experiments of information security system design