Solutions

Note: This article applies to RTI Connext 6.1.0 and above. Connext DDS 6.1.0 has introduced some changes and new behaviors for statuses. This article introduces and clarifies some of those changes. First, let's explain some status definitions: Lost : This status indicates that one or more DDS ...
2366 reads — 0 comments
This article explains what Instances and Instance States are, describes how they apply whether you use them or not, and clears up some common configurations affecting Instance States. ...
2847 reads — 0 comments
In Connext DDS Professional 6.1.0 and above, a new UDP-based transport is available for communicating over a wide area network (WAN). The Real-Time WAN Transport is a smart transport that enables secure, scalable, and high-performance communication over WANs, including public networks. Real-Time ...
2798 reads — 0 comments
When using certain restrictive umask settings, the RTI Connext installer may cause the GNOME desktop environment to lock up and prevent access to the desktop environment of a device. You can work around this issue by setting a more permissive umask, running the installer, and restoring the restrictive umask afterward. ...
1788 reads — 1 comment
Unlike Connext DDS Professional, Connext DDS Micro only supports finite resource limits to ensure that memory growth is bounded. Configuring these limits is therefore an important part of the system design. Here are some considerations to help you determine the optimal resource limits: How many ...
3204 reads — 0 comments
Some requirements for building a complex IIoT system are outside the scope of a stand-alone middleware. In order to support these system-level requirements, RTI created a suite of tools that accelerate development for the most complex use cases, including those using Connext DDS Micro due to ...
2651 reads — 0 comments
This article describes the procedure to build and run Code Generator ( rtiddsgen ) examples directly on an embedded target. We will use a Raspberry Pi for this example, but the procedure is similar for other embedded targets. In order to build directly on the target, the target must include a ...
4889 reads — 3 comments

Pages