| The development of Internet technology has greatly promoted China’s industrial revolution and the development of new technologies,and embedded technology with single-chip microcomputer as the core has also developed along with this wave and has had a far-reaching impact on people’s lives.However,the network system may not be able to communicate properly due to the wrong IP address of the device or the failure of the memory that stores the IP address parameters.Solving such problems requires a technician to find the wrong device,look at the problem,and make changes to the IP address,costing people and money.Through the in-depth study of the network protocol,this paper analyzes the faults under the static distribution network parameters of the embedded system,and uses the ARP protocol as a breakthrough to perfectly solve the problem caused by the abnormal IP address,search for the abnormal equipment and give it the correct IP address,so that it can communicate normally,and also solve the problems caused by interference and voltage fluctuation in industrial occasions;Adopting a u C/OS-II small embedded real-time operating system for task management and adopting a process monitoring and watchdog approach effectively solves the problem of device robustness.The main work of this article is as follows:In view to the traditional manual change problem,adding specific fields to the Padding field behind the ARP packet to make the specific target host respond and modify the IP address of the target host.In view of the problem that Ethernet data transmission is invisible and the IP address is really modified successfully,the Qt software which is very convenient in the visualization page is introduced.The function to capture and display the IP address of embedded devices,and the instruction of IP address modification is packaged by the software end and sent to the device.To address the issue of embedded devices being unable to properly read the IP address information inside the memory,the timer in the u C/OS-II operating system can be used to simulate the work of the software watchdog,completing the monitoring function of the memory.If problems are found,the embedded device can be restarted and restored.At the end of the paper,simulation verification and performance testing were conducted on the system,which effectively met the repair of device IP address anomalies in the system and the communication requirements during system operation.The expected goals were achieved,and the model has a certain degree of universality and portability. |