Hart Protocol DD files, Software Engineering

Assignment Help:
I am working on DD development project and I am using 475 field communicator for testing DD. While development of DD, I tested DD with SDC 625 PC application using HART modem. I have found some difference in MENU display in both the cases.

I have implemented Burst mode in DD using HART Protocol Ver 7.0. I am using array indexing for 3 messages of burst mode. While testing with SDC 625 PC application, I am able to see all the burst variables along with their Labels as described in common practice command template. But when I am testing the same code with 475, there is no Label display. In place of error display, there is a label that “NO_LABEL_AVAiLABLE”.
Can you please guide me what am I missing in DD. I have attached the code also for reference.

MENU burst_menu_1
{
LABEL "Burst Message 1";
ITEMS
{
burst_messages[0].BURST_MODE_SELECT (DISPLAY_VALUE),
burst_messages[0].COMMAND_NUMBER (DISPLAY_VALUE),
burst_messages[0].UPDATE_PERIOD (DISPLAY_VALUE),
burst_messages[0].MAX_UPDATE_PERIOD (DISPLAY_VALUE),
burst_messages[0].BURST_TRIGGER_MODE (DISPLAY_VALUE),
burst_messages[0].BURST_CLASSIFICATION (DISPLAY_VALUE),
burst_messages[0].BURST_UNIT (DISPLAY_VALUE),
burst_messages[0].TRIGGER_LEVEL (DISPLAY_VALUE),
burst_vars2 // menu
}
}

MENU burst_vars2
{
LABEL "Burst Variables";
VALIDITY IF ( ( burst_messages[0].COMMAND_NUMBER == 33 ) ||
( burst_messages[0].COMMAND_NUMBER == 9 ) ) {TRUE;} ELSE {FALSE;}
ITEMS
{
burst_messages[0].BURST_VAR[0] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[1] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[2] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[3] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[4] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[5] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[6] (DISPLAY_VALUE),
burst_messages[0].BURST_VAR[7] (DISPLAY_VALUE)
}
}

Related Discussions:- Hart Protocol DD files

Some important steps while doing testing, Some Important Steps while doing ...

Some Important Steps while doing performing testing The below objectives are to be kept in mind when performing testing: i)  It should be done with the intention of finding

Explain about the software testing strategies, Explain about the software t...

Explain about the software testing strategies. A method approach to software testing. Verification and Validation. Verification refers to the set of activities tha

What is operational testing, Testing conducted to consider a system or comp...

Testing conducted to consider a system or component in its operational environment. Contrast with development, testing,; testing, acceptance;

Dma, what effect does memory have on dma? what about on board cache? how mu...

what effect does memory have on dma? what about on board cache? how much are the system buses available?

Advantage of software life cycle model, Q. Advantage of software life cycle...

Q. Advantage of software life cycle model? The advantage of this model is the wide range of options to accommodate the good features of outer life cycle models. It becomes equi

Write sql code to make the changes, Assuming that all the tables have been ...

Assuming that all the tables have been created as given in the relational schema, write SQL code to make the following changes in the structure of the tables: (i) Make the empl

Explain the activities of software maintenance, The activities of software ...

The activities of software maintenance Software maintenance is a broad activity that contains error correction, increasing of capabilities, deletion of obsolete capabilities an

Explain configuration management, Configuration management (CM) covers the ...

Configuration management (CM) covers the tools and procedure used to control, coordinate and track code, needs, documentation, problems, change requests, designs, tools, compilers,

What is eva, What is EVA? Earned Value Analysis is a process of perform...

What is EVA? Earned Value Analysis is a process of performing quantitative analysis of the software project. It gives a common value scale for each task of software project. It

Encryption-decryption algorithms and aes, Introduction The goal of the ...

Introduction The goal of the assignment is to build functionality on top of twitter that allows you to encrypt tweets to subgroups of your twitter Background Material R

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd