HOWTOs

This page contains a set of short informal recipes to help you solve common challenges you may face when using RTI Connext DDS. This recipes include topics such as configuring favorite IDE to work with our libraries, tuning the performance of your application, or configuring your firewall to let DDS traffic through.

You can contribute by commenting on existing HOWTOs or creating your own here (requires logging in).

This article introduces connext-config, a new tool that facilitates the creation of build systems for RTI Connext DDS applications written in C and C++ using the popular tool chain GNU Autoconf and Automake.
2416 reads — 0 comments
This article discusses the various problems and possible solutions to a design pattern you may encounter when architecting your DDS-based application.
3776 reads — 0 comments
This article describes the process by which RTI Connector loads its XML configuration files and how to load multiple files.
4727 reads — 0 comments
This document describes all the steps required to use a hardware Trusted Platform Module (TPM) version 2.0 to protect the identity of domain participants in a system built on top of RTI Connext DDS Secure.
3554 reads — 0 comments

The attached PDF describes all the steps required to use a hardware Trusted Platform Module (TPM) version 1.2 to protect the identity of domain participants in a system built on top of RTI Connext DDS Secure.

2737 reads — 0 comments
ContentFilteredTopics allow a DataReader receive only a subset of the samples written by the Writer. The application of the filter may be done on the DataWriter side or on the DataReader side. To minimize network overhead it is desirable that the filter evaluation is applied on the writer side. Wireshark may be used to verify where the filtering is actually happening.
4524 reads — 1 comment

If you are a Windows user and have ever needed to capture traffic from the loopback interface, you will probably have struggled to do so. Wireshark won't let you do it.

43535 reads — 1 comment

Pages