Solutions

Note: Applies to NDDS 3.x and RTI Connext 4.x and above First, it is important to point out that NDDS 3.x and RTI Connext 4.x and above are not wire-protocol compatible. Applications built with these 2 products cannot communicate with each other. Second, although the object models of both products ...
3277 reads — 0 comments
This depends on what version of RTI Software you have installed: Version 4.2x and earlier: rtiddsgen only recognizes keys in the outermost structure. Version 4.3x and later: You can specify the key not only in the top-level message but also in nested structures. Let's look at some use cases: 1) You ...
5442 reads — 2 comments
A simple way to tell whether UDP checksum is enabled is to use Wireshark or tcpdump to display the UDP header. Look at the udp checksum field in the UDP header. If this field is 0x0000, then UDP checksum is disabled; otherwise it is enabled. For example, on a Linux machine, the following command ...
11330 reads — 3 comments
As described in the online HTML documentation for the DomainParticipantResourceLimits Qos Policy, there is a QoS parameter called topic_data_max_length , which is used to set the maximum length of the topic data to be sent out. topic_data_max_length is a DDS_Long, which is a 32-bit signed long ...
7339 reads — 0 comments
Note: This article applies to RTI Connext DDS version 4.4c and higher. The error indicates that the XML parser encountered a tag for a field that doesn't exist in 4.4c and higher, because it was renamed. Two fields in the DataWriter's protocol.rtps_reliable_writer QoS were renamed in 4.4c: Old name ...
3979 reads — 0 comments
RTI Protocol Analyzer with Wireshark uses the Windows Packet capture ( WinPcap ) driver (called NPF) when it starts to capture live data. Loading the driver requires Administrator privileges. Once the NPF driver is loaded, every local user can capture from the driver until it is stopped. On Windows ...
45217 reads — 0 comments
SENS/TORNADO 2.0 NETWORK STACK CONFIGURATION/PERFORMANCE ISSUES -------------------------------- 1. INTRODUCTION 1.1 NETWORK STACK VERSIONS 1.2 NET POOLS 1.2.1 CLUSTERS 1.2.2 CLUSTER BLOCKS 1.2.3 MBLOCKS 1.3 RECEIVING: DATA FLOW FROM DRIVER TO APPLICATION LEVEL 1.4 SENDING: DATA FLOW FROM ...
10228 reads — 0 comments

Pages