26
Ravi Vasdev 2210259 SEMINAR ON SEMINAR ON

Ravi Vasdev 2210259 SEMINAR ON. WHAT ARE EMBEDDED SYSTEMS THESE ARE SINGLE BOARD COMPUTERS THESE ARE ELECTRONIC DEVICES THAT INCORPORATE MICROPROCESSORS

Embed Size (px)

Citation preview

Ravi Vasdev2210259

SEMINAR ONSEMINAR ON

WHAT ARE EMBEDDED WHAT ARE EMBEDDED SYSTEMSSYSTEMS

THESE ARE SINGLE BOARD COMPUTERSTHESE ARE SINGLE BOARD COMPUTERS THESE ARE ELECTRONIC DEVICES THAT THESE ARE ELECTRONIC DEVICES THAT

INCORPORATE MICROPROCESSORSINCORPORATE MICROPROCESSORS THESE DEVICES ARE CONTROLLED BY THESE DEVICES ARE CONTROLLED BY

INSTRUCTIONS STORED IN A CHIPINSTRUCTIONS STORED IN A CHIP PROGRAMMES ARE STORED IN THE ROMPROGRAMMES ARE STORED IN THE ROM

TYPES OF EMBEDDED TYPES OF EMBEDDED SYSTEMSSYSTEMS

REACTIVE SYSTEMSREACTIVE SYSTEMSINTERACTIVE SYSTEMSINTERACTIVE SYSTEMSTRANSFORMATIONAL SYSTEMSTRANSFORMATIONAL SYSTEMS

REAL TIME EMBEDDED REAL TIME EMBEDDED SYSTEMSSYSTEMS

WHAT ARE REAL TIME SYSTEMSWHAT ARE REAL TIME SYSTEMS

TAKE THE INPUTTAKE THE INPUT PROCESS THE INPUTPROCESS THE INPUT GIVE THE REQUIRED RESULTGIVE THE REQUIRED RESULT ALSO CONSIDER THE TIMING CONSTRAINTSALSO CONSIDER THE TIMING CONSTRAINTS

TYPES OF TIMING TYPES OF TIMING CONSTRAINTSCONSTRAINTS

HARD TIME CONSTRAINTHARD TIME CONSTRAINTSOFT TIME CONSTRAINTSOFT TIME CONSTRAINTFIRM TIME CONSTRAINT FIRM TIME CONSTRAINT

HARD TIME CONSTRAINTHARD TIME CONSTRAINT

LATE & INCORRECT RESPONSELATE & INCORRECT RESPONSELEADS TO SYSTEM FAILURELEADS TO SYSTEM FAILURE

EXAMPLEEXAMPLEMEDICAL EQUIPMENT MONITORINGMEDICAL EQUIPMENT MONITORING

SOFT TIME CONSTRAINTSOFT TIME CONSTRAINT

TIMELINESS REQUIREMENTTIMELINESS REQUIREMENTSYSTEM FAILURE – DEPENDS ON SYSTEM FAILURE – DEPENDS ON

COMPUTATION TIMECOMPUTATION TIME

EXAMPLEEXAMPLEAIRLINE RESERVATION SYSTEMSAIRLINE RESERVATION SYSTEMS

FIRM TIME CONSTRAINTFIRM TIME CONSTRAINT

COMBINATION OF BOTH HARD & COMBINATION OF BOTH HARD & SOFT TIME CONSTRAINTSSOFT TIME CONSTRAINTS

SHORTER SOFT TIME REQUIRED SHORTER SOFT TIME REQUIRED LONGER HARD TIME REQUIREDLONGER HARD TIME REQUIRED

EXAMPLEEXAMPLEPATIENT VENTILATOR MECHANISMPATIENT VENTILATOR MECHANISM

REAL TIME OPERATING REAL TIME OPERATING SYSTEM(RTOS)SYSTEM(RTOS)

Correctness of the computations not onlyCorrectness of the computations not only

depends upon the logical correctness ofdepends upon the logical correctness of

the computation but also upon the time atthe computation but also upon the time at

which the result is produced. If the timingwhich the result is produced. If the timing

constraints of the system are not met,constraints of the system are not met,

system failure is said to have occurred.system failure is said to have occurred.

PROGRAMMING LANGUAGES PROGRAMMING LANGUAGES USED FOR EMBEDDED SYSTEMUSED FOR EMBEDDED SYSTEM

Assembly Assembly LanguageLanguage

C C C++C++JAVAJAVA

0.0%

10.0%

20.0%

30.0%

40.0%

50.0%

60.0%

70.0%

80.0%

90.0%

Assembly C C++ Java Other

2001-2002

2003-2004

FACTORS INFLUENCING FACTORS INFLUENCING CHOICE OF PROGRAMMING CHOICE OF PROGRAMMING

LANGUAGELANGUAGE

A language compiler should be A language compiler should be available for the chosen hardware available for the chosen hardware architecture of the embedded architecture of the embedded systemsystem

Compilers should be available on Compilers should be available on multiple Operating systems and multiple Operating systems and microprocessorsmicroprocessors

LINUX AND REAL –TIME LINUX AND REAL –TIME EMBEDDED SYSTEMSEMBEDDED SYSTEMS

EMBEDDED HARDWAREEMBEDDED HARDWARE

MICROPROCESSOR MICROPROCESSOR /MICROCONTROLLER/MICROCONTROLLER

PDAPDA ROMROM DRAMDRAM LCDLCD

TYPES OF ATTACKS ON TYPES OF ATTACKS ON EMBEDDED SYSTEMEMBEDDED SYSTEM

PRIMARY ATTACKSPRIMARY ATTACKS

PRIVACY ATTACKSPRIVACY ATTACKS INTEGRITY ATTACKSINTEGRITY ATTACKS AVAILABILITY ATTACKSAVAILABILITY ATTACKS

SECONDARY ATTACKSSECONDARY ATTACKS

SOFTWARE ATTACKSSOFTWARE ATTACKS PHYSICAL ATTACKSPHYSICAL ATTACKS SIDE – CHANNEL ATTACKSSIDE – CHANNEL ATTACKS

Attacks on the Embedded

System

Privacy Attacks Integrity AttacksAvailability

Attacks

VirusesTrojan Horse

(Software Attacks)

Fault InjectionTiming Analysis(Side Channel

Attacks)

EavesdroppingMicro probing

(Physical Attacks)

COMMON SECURITY COMMON SECURITY FUNCTIONS REQUIREDFUNCTIONS REQUIRED

USER IDENTIFICATIONUSER IDENTIFICATIONSECURE NETWORK ACCESSSECURE NETWORK ACCESSAVAILABILITYAVAILABILITYSECURE STORAGESECURE STORAGECONTENT SECURITYCONTENT SECURITYTEMPER RESISTANCETEMPER RESISTANCE

TEMPER RESISTANCE

CONTENT SECURITY

SECURE STORAGE

SECURE NETWORK ACCESS

USER IDENTI-

FICATION

AVAILABILITY

BASIC SECURITY

FUNCTIONS

PRACTICES FOR SOFTWARE PRACTICES FOR SOFTWARE SECURITY APPLICABILITYSECURITY APPLICABILITY

SOFTWARE SECURITY

APPLICABILITY

REQUIREMENT LEVEL

DESIGN & ARCHITECTURE

LEVELCODE LEVEL

APPLICATIONSAPPLICATIONS

FOR HEART BEAT RATE & FOR HEART BEAT RATE & OXYGEN CONTENT IN OXYGEN CONTENT IN BLOODBLOOD

FOR GENERATION & FOR GENERATION & MEASUREMENT OF LIGHTMEASUREMENT OF LIGHT

FOR DISPLAYING THE FOR DISPLAYING THE RESULTRESULT

EXAMPLES OF EMBEDDED EXAMPLES OF EMBEDDED SYSTEMSSYSTEMS

CHILDREN’S TOYSCHILDREN’S TOYSCOMMUNICATION SYSTEMSCOMMUNICATION SYSTEMSCOMPUTER PERIPHERALSCOMPUTER PERIPHERALSHOME APPLIANCESHOME APPLIANCESMEDICAL IMAGING SYSTEMSMEDICAL IMAGING SYSTEMSROBOTSROBOTSPERSONAL DIGITAL ASSISTANTSPERSONAL DIGITAL ASSISTANTS

PICTORIAL VIEWPICTORIAL VIEW

WHY OPT FOR THIS WHY OPT FOR THIS TECHNOLOGYTECHNOLOGY

Area of synergy between Hardware Area of synergy between Hardware & Software& Software

Reduce the size of the circuitReduce the size of the circuit

BIBLIOGRAPHYBIBLIOGRAPHY

Fundamentals of Embedded Fundamentals of Embedded Software By Daniel W. LewisSoftware By Daniel W. Lewis

Electronics For YouElectronics For Youwww.howstuffworks.comwww.howstuffworks.com