Step 2: How to Check the Behavior of Checksums Based on E2E Protection According to AUTOSAR E2E Profiles in ControlDesk

In this step, you will create an experiment in ControlDesk, generate TX and RX layouts for messages whose E2E protection behavior you want to check, and observe the behavior of the checksums. You will look at E2E profile 05 and profile 11 (variants A and C) as examples.



Logon to access dSPACE Help


如果您尚未拥有 mydSPACE ID,请首先进行注册。
Revision: May 2022

订阅新闻通讯

订阅/管理订阅/取消订阅 dSPACE新闻简讯