




已阅读5页,还剩12页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
论文附件(一)英文原文:he single slice machine is also called tiny controller, is because it was used in the industry to control realm at the earliest stage.single slice machine from inside chip have cpu appropriation processor to develop only since then.at the earliest stage of design the principle is to pass to integrate a great deal of peripherals and cpu in a chip, making calculator system smaller, integrating more easily into complicated of but to mention to request a strict control equipments in the middle.the intel z80 is the processor which designed according to this kind of thought at the earliest stage, from now on, single slice the development of the machine and appropriation processor went by different roads then.。the single slice of the earlier period all of machines are 8 or 4.among them, the intel is most successful of 8031, because of in brief dependable but the function was quite good to acquire very big good opinion.henceforth at 8031 up developed mcs51 serieses a single slice machine system.according to the single slice of this system machine system is still in the extensive usage till now.because the industry controls the exaltation ofwith realm request, starting appearing 16 single slice machine, but because sex price wanted to dont get a very extensive application than the disregard.develop greatly along with the consumption electronics product after 90s, the single slice machine technique got a huge exaltation.along with the extensive application of intel i 960 serieses especially later arm series, the 32 single slice machine replaces 16 single slice the high level position of the machine quickly, and gets into an essential market.and traditional of 8 single slice the function of the machine also got to fly to raise soon, handling an ability to compare with to raise few a hundredfolds in 80s.currently, 32 single slice of the high level with main machine already over 300 mhzs, the function keeps appropriation processor of making track for the mid 90s, and the common model number factory price drop into to usd 1, tallest carry of model number also only usd 10.the contemporary and single slice machine system has already no longer developed and used just under the naked machine environment, the in great quantities appropriative built-in operate system is applied extensively in the whole serieseses of the single slice is on board.but be ising the high level of handheld pc and cellular phone core processing single slice the machine even can use appropriative windows and the linux operate system directly.single slice the machine ratio appropriation processor is the most suitable to match to apply in the built-in system, so it got the most applications.in fact the single slice machine is an amount the most calculators are in the world.the modern mankind are living medium use of assemble in almost each electronics and machine product have a single slice machine.all have 1-2 single slice machine in the computer accessorieses such as cellular phone, telephone, calculator, home appliances, electronics toy, handheld pc and mouse etc.and personal computer in would also capable number not a few single slice the machine be working.provide with more than 40 departments a single slice machine generally on the car, complicated industrys controling the top of the system even may has single several hundred pedestalses slices machine to work in the meantime!single slice the amount of the machine not only far above the pc machine and other calculations of comprehensive, even than the mankinds amount still want have another.scm system software interference methodsin improving the ability of anti-jamming system hardware, software interference with its flexible design, save hardware resources, more and more attention to reliability. below the mcs-51 scm system as an example, the computer system software interference methods for research.a method of anti-jamming softwarein engineering practice, anti-jamming software on the content of the main ones being: one, eliminate the analog input signal noise (such as digital filtering technology); two, is running the program when the chaos back to the right track approach. in this paper, which made several effective methods of anti-jamming software.1.1 redundant directivescpu process is to take instructions from operating code, and then take a few operators. when the pc interference errors, procedures will be from the normal track flying, when flying to a double-byte instructions, if the instructions for a few moments landed on the operation, as the number-up operation operation code, procedural error will be . if the fly to the three-byte instructions, a greater probability of error.in some key areas were inserted into single-byte instructions, or to be effective single-byte command rewrite directive known as redundancy. is usually double-byte instructions and orders three bytes inserted after more than two bytes of the nop. this flew to operate even if the number of flying procedures, the air operations of nop because of the existence of the directive to avoid being behind the operation as a number of implementation, automatically into the right track.in addition, the system flows to play an important role in the directive such as ret, reti, lcall, ljmp, jc, and other instructions inserted before the two nop, also could be flying into the right track procedures to ensure that the implementation of these important directives.1.2 interception technologythe so-called blocking, is flying the procedure will lead the specified location and then an error handling. traps are usually software used to block flying procedures. therefore must be reasonably designed trap, trap in the second to the appropriate location.1.2.1 software design trapswhen flying into the non-process procedures, redundant command will not work. by software traps, interceptors flying procedures, to lead the specified location and then an error handling. software trap is used to capture the flying process toward reduction of import address 0000 h instructions. eprom process in central africa usually fill in the following areas as software instructions trap:nopnopljmp 0000hits native code for the 000002000 trap arrangementsusually in the process of the unused space filled eprom 0000020000. finally one should fill 020,000, when flying procedures fell on the area, to automatically orbit. in the user program, and various modules in the margins between the unit can also fill traps command. when using the interference and interruption due to open, in the corresponding interrupt service procedures set up software trap, caught the wrong time can be interrupted. if an application system not yet used an external interrupt, external interrupt an interruption of service program for the following forms:nopnopretitop of instruction available reti, can also be used ljmp 0000h. if the fault diagnosis procedures and systems since the restoration of the design process reliable, complete with ljmp 0000h for the return instructions directly into the fault diagnosis procedures, as soon as possible to deal with failure and recovery procedures of the operation.taking into account the capacity of program memory, software trap 1 k space in the general 2-3 can be effectively blocked.1.3 software watchdog technology.if out-of-control process into the cycle of death, usually a watchdog technology to process from the death cycle. by constantly testing procedures cycle running time, if the process cycle time exceeds the maximum running time cycle, the system that a cycle of death, the need for error handling.watchdog technology can be hardware, software can be. in industrial applications, serious interference may sometimes be interrupted damage control word, closure of interruption. the system can not regularly weigou, hardware watchdog circuit failure. the software watchdog to be effective in solving such problems.the author in practical application, using ring interrupted surveillance systems. t0 watchdog timer with t1, with timer t1 surveillance main program, the main program watchdog t0. this ring used the software watchdog has a good anti-jamming performance, greatly improving the system reliability. the need for frequent use of t1 timer serial communications monitoring and control system, the timer t1 can not be interrupted, may be diverted from the serial interruption to monitor (if using a mcs-52 series microcontroller, can also be used to replace t1 to t2 surveillance). such software watchdog monitoring principle is: the main program, t0 interrupted service program, t1 service interruption in the process to establish a running observation variables, assumed to be mwatch, t0watch, t1watch, each cycle of a main program, mwatch plus 1 , the same t0, t1 procedures for the implementation of a service interruption, t0watch, t1watch plus 1. t0 interruption in the service of process in t1watch by detecting changes in the determination of whether the normal operation of t1, t1 interruption in the service of process in the detection of changes in the mwatch determine whether the normal operation of the main program, in the main program through the detection of changes in the t0watch determine whether the normal t0工作. if an observation detected abnormal changes in variables, such as an increase should not increase 1, to the error handling procedures for dealing with troubleshooting. of course, most of the main program cycle, the timer t0 and t1 timing cycle should be completely reasonable to consider. not to go into space.2 system failure treatment, since the resumption of the design process.scm system caused by interference or brown-out reset after reset it is an abnormal reduction should be carried out fault diagnosis and automatically reset before the resumption of non-normal state.2.1 normal reduction of non-recognitionrocedures for the implementation of always starting from 0000 h, resulting from the 0000 h program started four possibilities: one, booting the system power-on reset; second, the software fault reset; three, watchdog overtime not weigou hardware reset; four tasks is being implemented in the brown-out reset after the call. in addition to the four cases in the first case, it is an abnormal reduction, the need to be identified.2.1.1 reset the hardware and software reset of the identificationhere hardware reset that boot reduction and reset the watchdog, the registers have an impact on the reduction of hardware, such as the reduction after the pc = 0000h, sp = 07h, psw = 00h, and so on. the software will reset the sp, spw had no effect. therefore, the computer monitoring system, when the normal operation of procedures, will address more than sp set up 07 h, or psw the first five users sign-in system at the normal operation of a set. so just detection system reset or sp-psw.5 signs of whether this could be sentenced hardware reset. figure 1 is used psw.5 for signs of discrimination, on the hardware and software reset of the process flow chart.figure 1 hardware and software reset identification flow chart in addition, as hardware reset state-chip ram is random, and the software reset-chip ram can be reset to maintain state, to select a film within one or two units as a power symbol. zuoshang used to set up 40 h, signs, signs on, the word for the 78 h, if the system reset after 40 h unit content is not equivalent to 78 h, is that hardware reset, or software that is reset, to deal with mistakes. if the two modules for a power symbol, such discrimination means reliability.2.1.2 boot reduction and reset the watchdog fault identificationboot reduction and reset the watchdog fault because of the same hardware reset, to be the correct identification, the use of general non-volatile ram or eerom. when the system during normal operation, set up a power-down can protect the observation unit. when normal operation at the time of the interruption weigou service program zhongshi the observation unit to maintain the normal value (as aah), and the main way in the unit cleared, the observation unit can be brown-out protection, the boot by testing whether the normal value of the unit can determine whether the watchdog reset.2.1.3 boots reduction and the reduction of non-normal start-up identificationmonitoring system to identify the situation as a result of accidents in the system, such as brown-out conditions caused by the boot boot reduction and reset, the process control system is particularly important. if a time for the control of standards of measurement and control systems, monitoring and control tasks required to complete a one hour. in 50 minutes has been monitoring the implementation of the circumstances, the system voltage reduction caused abnormal, and then reset at this time if the system for monitoring and control from the beginning would cause unnecessary consumption of time. so can a monitoring unit on the current state of the operating system, the system time to monitor, control process will be divided into a number of steps or a certain period of time, the end of each step in the implementation of an operation or each time the monitoring unit was shut down to allow for the value of home , a different task or tasks at different stages have different values, if the system is monitoring mission, or are they a certain time period, the monitoring unit will be home to non-normal shutdown value. then this system unit can be reset after the original contractor system running, and jump to an error in the process restore the original system running.2.2 non-normal reset after the system has resumed operation of the program designon the order of some of the demanding process control system, the system of non-normal reset not, generally from out-of-control requirements that mandate a module or restore operation. therefore, monitoring and control system to make important data unit, the backup parameters, such as the system running, the system of the process, the current import, export value, the current value of the clock, observation unit value, these data should not only regular backup, and if so laws should also be backed up immediately.when the system has to determine the reduction of non-normal circumstances, we should first restore the necessary data systems, such as the display module initialization, the expansion of chip-chip, such as the initialization. this was followed by another system of monitoring and control system status, operating parameters to be restored, including the display interface recovery. after further reduction before the mission, parameters, running time of recovery, re-entering the system running.it should be pointed out that the real restoration of the operating system needs very careful to state the system to back up important data and to check the reliability of data to ensure recovery of the reliability of data.secondly, the multi-task, multi-process measurement and control systems, data recovery to consider resumption of the order problem, the author of the practical application of data recovery process flow chart shown in figure 2.figure in the restoration of basic data system is out of the back-up data covering the current system data. basic system initialization means the chip, display, input and output method to initialize, attention should be paid to the initial input and output should not be mistaken action. and reset before the mandate of the mission is to initialize the state of implementation, operation hours.(二)英文翻译:单片机也被称为微控制器(microcontroler),是因为它最早被用在工业控制领域。单片机由芯片内仅有cpu的专用处理器发展而来。最早的设计理念是通过将大量外围设备和cpu集成在一个芯片中,使计算机系统更小,更容易集成进复杂的而对提及要求严格的控制设备当中。intel的z80是最早按照这种思想设计出的处理器,从此以后,单片机和专用处理器的发展便分道扬镳。早期的单片机都是8位或4位的。其中最成功的是intel的8031,因为简单可靠而性能不错获得了很大的好评。此后在8031上发展出了mcs51系列单片机系统。基于这一系统的单片机系统直到现在还在广泛使用。随着工业控制领域要求的提高,开始出现了16位单片机,但因为性价比不理想并未得到很广泛的应用。90年代后随着消费电子产品大发展,单片机技术得到了巨大的提高。随着intel i960系列特别是后来的arm系列的广泛应用,32位单片机迅速取代16位单片机的高端地位,并且进入主流市场。而传统的8位单片机的性能也得到了飞速提高,处理能力比起80年代提高了数百倍。目前,高端的32位单片机主频已经超过300mhz,性能直追90年代中期的专用处理器,而普通的型号出厂价格跌落至1美元,最高端的型号也只有10美元。当代单片机系统已经不再只在裸机环境下开发和使用,大量专用的嵌入式操作系统被广泛应用在全系列的单片机上。而在作为掌上电脑和手机核心处理的高端单片机甚至可以直接使用专用的windows和linux操作系统。单片机比专用处理器最适合应用于嵌入式系统,因此它得到了最多的应用。事实上单片机是世界上数量最多的计算机。现代人类生活中所用的几乎每件电子和机械产品中都会集成有单片机。手机、电话、计算器、家用电器、电子玩具、掌上电脑以及鼠标等电脑配件中都配有1-2部单片机。而个人电脑中也会有为数不少的单片机在工作。汽车上一般配备40多部单片机,复杂的工业控制系统上甚至可能有数百台单片机在同时工作!单片机的数量不仅远超过pc机和其他计算的综合,甚至比人类的数量还要多。 单片机系统软件抗干扰方法在提高硬件系统抗干扰能力的同时,软件抗干扰以其设计灵活、节省硬件资源、可靠性好越来越受到重视。下面以mcs-51单片机系统为例,对微机系统软件抗干扰方法进行研究。1 软件抗干扰方法的研究在工程实践中,软件抗干扰研究的内容主要是: 一、消除模拟输入信号的嗓声(如数字滤波技术);二、程序运行混乱时使程序重入正轨的方法。本文针对后者提出了几种有效的软件抗干扰方法。1.1 指令冗余cpu取指令过程是先取操作码,再取操作数。当pc受干扰出现错误,程序便脱离正常轨道“乱飞”,当乱飞到某双字节指令,若取指令时刻落在操作数上,误将操作数当作操作码,程序将出错。若“飞” 到了三字节指令,出错机率更大。在关键地方人为插入一些单字节指令,或将有效单字节指令重写称为指令冗余。通常是在双字节指令和三字节指令后插入两个字节以上的nop。这样即使乱飞程序飞到操作数上,由于空操作指令nop的存在,避免了后面的指令被当作操作数执行,程序自动纳入正轨。此外,对系统流向起重要作用的指令如ret、 reti、lcall、ljmp、jc等指令之前插入两条nop,也可将乱飞程序纳入正轨,确保这些重要指令的执行。1.2 拦截技术所谓拦截,是指将乱飞的程序引向指定位置,再进行出错处理。通常用软件陷阱来拦截乱飞的程序。因此先要合理设计陷阱,其次要将陷阱安排在适当的位置。1.2.1 软件陷阱的设计 当乱飞程序进入非程序区,冗余指令便无法起作用。通过软件陷阱,拦截乱飞程序,将其引向指定位置,再进行出错处理。软件陷阱是指用来将捕获的乱飞程序引向复位入口地址0000h的指令。通常在eprom中非程序区填入以下指令作为软件陷阱:nopnop ljmp 0000h其机器码为0000020000。1.2.2 陷阱的安排通常在程序中未使用的eprom空间填0000020000。最后一条应填入020000,当乱飞程序 落到此区,即可自动入轨。在用户程序区各模块之间的空余单元也可填入陷阱指令。当使用的中断因干扰而开放时,在对应的中断服务程序中设置软件陷阱,能及时捕获错误的中断。如某应用系统虽未用到外部中断1,外部中断1的中断服务程序可为如下形式:nopnopreti返回指令可用“reti”,也可用“ljmp 0000h”。如果故障诊断程序与系统自恢复程序的设计可靠、 完善,用“ljmp 0000h”作返回指令可直接进入故障诊断程序,尽早地处理故障并恢复程序的运行。考虑到程序存贮器的容量,软件陷阱一般1k空间有2-3个就可以进行有效拦截。1.3 软件“看门狗”技术若失控的程序进入“死循环”,通常采用“看门狗”技术使程序脱离“死循环”。通过不断检测程序循环运行时间,若发现程序循环时间超过最大循环运行时间,则认为系统陷入“死循环”,需进行出错处理。“看门狗”技术可由硬件实现,也可由软件实现。 在工业应用中,严重的干扰有时会破坏中断方式控制字,关闭中断。则系统无法定时“喂狗”,硬件看门狗电路失效。而软件看门狗可有效地解决这类问题。笔者在实际应用中,采用环形中断监视系统。用定时器t0监视定时器t1,用定时器t1监视主程序,主程序监视定时器t0。采用这种环形结构的软件“看门狗”具有良好的抗干扰性能,大大提高了系统可靠性。对于需经常使用t1定时器进行串口通讯的测控系统,则定
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 幼儿园老师上学期工作总结
- 工作个人成长汇报
- 绩效导入工作总结
- 收货部门工作总结
- 消防安全与科技培训课件
- 消防在建工地课件
- 质量异常反馈培训课件
- 质量安全监督站课件
- 消化道出血说课课件
- 责任心安全培训课件
- 国家教育考试保密安全培训
- 电器特种作业培训课件
- 2025新高考数学核心母题400道(教师版)
- 卫星网络管理与运维-深度研究
- 房地产质量管理制度
- 2024医疗设备融资租赁法规解读
- 2020-2024年五年高考政治真题分类汇编专题19 世界多极化(原卷版)
- 胃食管反流-讲稿
- 2024至2030年中国扇数据监测研究报告
- 2024-2030年中国化工新材料行业需求趋势及发展可行性分析报告
- 急诊急救流程大全
评论
0/150
提交评论