Subscribe and listen to AW’s podcast!
Subscribe and listen to the Automation World Gets Your Questions Answered podcast!
Listen Here

RTOS Advances EtherCAT Real-Time Performance

Mentor Graphics’ Embedded Nucleus real-time operating system (RTOS) now has EtherCAT Master protocol support.

Targeting high-performance, next-generation industrial automation devices, the RTOS, combined with the KPA EtherCAT Master stack, provides a fully integrated reference software solution that streamlines development time and cost for device developers. Designed to meet the rigorous timing requirements for industrial automation, the reference solution delivers EtherCAT cycle times of 100 microsecond cycles (10,000 frames per second) with an extremely low jitter rate for precise device synchronization. The Nucleus RTOS with KPA EtherCAT Master protocol is suitable for devices with hard and soft real-time requirements in industrial automation, as well as medical, energy and other market segments. The low-overhead KPA EtherCAT stack has been optimized for embedded devices. The real-time performance of the Nucleus RTOS and the deterministic qualities of EtherCAT communication provides the speed and synchronization required in today’s industrial automation devices. The EtherCAT solution includes the KPA EtherCAT Studio configuration tool, and sample applications that have been integrated with Nucleus RTOS and the Sourcery CodeBench integrated development environment (IDE).

>>For more information on this product, click here
Mentor Graphics Corp.

Fill out the form below to request more information about RTOS Advances EtherCAT Real-Time Performance
Revealed: Sensor & AI Secrets
New report features peers and pros on how machine vision, smart instrument sensors and AI can improve manufacturing.
Download e-book
Revealed: Sensor & AI Secrets
What It Takes To Protect Against Cyber-Attacks
Learn what dozens of end-users and system integrators have to say about how best to protect your operations against cyber-attacks.
Download Now
What It Takes To Protect Against Cyber-Attacks