Doina Bucur. Temporal Monitors for
|
|
- Robyn Powers
- 8 years ago
- Views:
Transcription
1 Doina Bucur / Temporal Monitors for 1
2 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS In summary: 2
3 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS Specifications: qualitative temporal (LTL) with: atomic propositions = { boolean expressions over variables; checkpoints, including interrupts } In summary: 2
4 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS Specifications: qualitative temporal (LTL) with: atomic propositions = { boolean expressions over variables; checkpoints, including interrupts } Verifier: native TinyOS software component quantified overhead emulation: absolute RAM and CPU overhead per monitor is negligible; ROM overhead for a basic LTL pattern is ~5.5% of that available on a Telos revision B platform. In summary: 2
5 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in
6 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. 3
7 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. 3
8 RS2!-)+,/H&$!76<!"#$%"&'() O#,,%O$# RS2 (#,,%O$#) : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in RS2!1%O%&'%!76<?U*&,!S^S O#,,%O$#) 76</ Y-:Z O#,,%O$#) RS2 "&O)#O#,$)#..%) [ ((?C?B 1+I&# <&D&$+.!/K&$O= wireless-sensor-networks/wireless- 8/#.+$&,D!RS2!F)#H H&O)#O#,$)#..%) modules.html ] -%V+/!8,/$)JH%,$/ "S5CEB![>W>> CGUP&$!/&.&O#, H&O)#O#,$)#..%) /%)&+.!8< S": :,$%,,+ (#,,%O$#)!"#$%"&'() [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. RS2 [.+/=!0?\23 E?\X] #/O&..+$#) S-!(#I% [.+/=!0>"23! 0,1$+&'2'3'0+"/.'4/#'54*6'"7'.8&'9&%")':"#$%&' "#$%&'!(#)*#)+$&#,!! -%.#/!01%'!23!4!51678"89:1;!<+$+/=%%$!0>?@A@?BBC3! 3
9 O#,,%O$#!"#$%"&'() RS2!-)+,/H&$!76< RS2 (#,,%O$#) : A network embedded OS RS2!1%O%&'%!76< [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in RS2 76</ ((?C?B S": [ "&O)#O#,$)#..%) 1+I&# :,$%,,+ <&D&$+.!/K&$O= Y-:Z wireless-sensor-networks/wireless(#,,%o$#) 8/#.+$&,D!RS2!F)#H O#,,%O$#)!"#$%"&'() H&O)#O#,$)#..%) modules.html ] -%V+/!8,/$)JH%,$/ "S5CEB![>W>> H&O)#O#,$)#..%) CGUP&$!/&.&O#, /%)&+.!8<?U*&,!S^S O#,,%O$#) [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. "#$%&'!(#)*#)+$&#,!! 3 RS2 [.+/=!0?\23 E?\X] #/O&..+$#) S-!(#I% [.+/=!0>"23! 0,1$+&'2'3'0+"/.'4/#'54*6'"7'.8&'9&%")':"#$%&' -%.#/!01%'!23!4!51678"89:1;!<+$+/=%%$!0>?@A@?BBC3! [ lifeunderyourfeet.org / Microsoft Research Sensor Map ]
10 high-level logic nesc is modular TinyOS application TinyOS system components Hardware HPL 4
11 high-level logic nesc is modular TinyOS application TinyOS system components Hardware HPL 4
12 ...with interrupt-based concurrency calls command startperiodic() signals event fired() Event handlers execute with priority. A single interrupt level. Events may cascade on some platforms....with sequential event handlers, plus deferred computational tasks. 5
13 Native verifier in TinyOS TinyOS application TinyOS system components Runtime path verifier Hardware The verifier is a new OS component (offline, generated). 6
14 Instrumentation NesC instrumentation (offline, manual): events rooted in hardware interrupts, software conditions or checkpoints; tested with 60+ through the OS nesc events signaled to verifier; signaling time as per system load 7
15 configuration HplMsp430GeneralIOC { [..] } Instrumentation implementation { [..] components PaxLTLC; NesC [..] instrumentation (offline, manual): events rooted in hardware interrupts, software conditions or checkpoints; PaxLTLC.notify tested with <-60+ P10.pax_notify; through the OS PaxLTLC.notify <- P11.pax_notify; nesc PaxLTLC.notify events signaled <-to P12.pax_notify; verifier; signaling time as per system load } // where P10, P11, etc are instantiations of HplMsp430Gene [..] generic module HplMsp430GeneralIOP([..]) { [..] uses async event void notify(uint16_t ap, bool val); } implementation { [..] async command void IO.set() { [..] signal pax_notify((portx*10+pin), TRUE);} async command void IO.clr() { [..] 7
16 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed 8
17 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed Buffer and stack overflows, deadlocked/livelocked software, data races. 8
18 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed Buffer and stack overflows, deadlocked/livelocked software, data races. No next-hop destination for routing in a multihop network; unexpected value, outlier or gradient in sensed data or battery level; incorrect order of use of the OS kernel s API. 8
19 LTL patterns (basic) # Universality. p is true : # (F01) Globally [](p) # (F02) Before r <>r -> (p U r) # (F03) After q [](q -> [](p)) # (F04) Between q and r []((q &!r & <>r) -> (p U r)) # (F05) After q until r [](q &!r -> (p W r)) # Precedence. s precedes p: # (F16) Globally!p W s # (F17) Before r <>r -> (!p U (s r)) # (F19) Between q and r []((q &!r & <>r) -> (!p U (s r))) # (F20) After q until r [](q &!r -> (!p W (s r))) Between an timer alarm and the next one there must be new sensor data. Every time a LED is on, it must have been preceded by the sending of a packet. 9
20 [..] g. 3. Wiring and instrumentation added to the HPL components which control t crocontroller pins on the TelosB; the logging is done by signalling the notify eve istence-after (E-A), etc, and we omit them from the evaluation results. ese, we add two composite properties which are practically useful: k_ i=1 LTL patterns (composed) Gp i and a generic event-sequence chain p 1 U(p 2 U(...Up k )) d also multiple basic monitors checking the same application. Into these property types, we randomly input combinations of atomic prop ions from our list of relevant system events. The resulting specifications a her violated or satisfied by the system software; our monitors will repo ether the checking In both has cases, finished randomly (thusgenerated a violation formulas. was encountered) in re e, at the end of each monitoring step variable finished checking e monitor implementation from Fig. 5 records the verification status, and orted Doina Bucur, to RV 12 the system users. 10
21 Monitor generation 2 r s 1!p &!r &!s p &!r &!s 1 3!r F r (!p U ( s r )) Fig. 4. Deterministic monitor generated for the speci- (Precedence pattern, Before scope) fication F r! (!p U ( s r )). Generated with a LTL-to-TGBA State 1 is the initial state, and translator (part of SPOT). each transition is accepting. Deterministic, all transitions accepting. implementation { async event void notify(uint16_t ap, bool val) { // store (ap, val) if (!finished_checking) post step(); } task void step() { atomic { // calculate new state with (ap, val) current_checking_steps++; current = next; next = -1; if (current == 1) { if ((call statebv.get(r)) (call statebv.get(s))) next = 2; else if ((call statebv.get(p)) &&!(call statebv.get(r)) &&!(call statebv.get(s))) next = 3; else if (!(call statebv.get(p)) &&!(call statebv.get(r)) && 11
22 r s p &!r &!s } Monitor 2 generation 2 r s 1 3!r Fig. 4. Deterministic monitor generated for the specification F r! (!p U ( s r )). State 1 is the initial state, and each transition is accepting. 1!p &!r &!s p &!r &!s 1 3!r F r (!p U ( s r )) Fig. 4. Deterministic monitor generated for the speci- (Precedence pattern, Before scope) fication F r! (!p U ( s r )). Generated with a LTL-to-TGBA State 1 is the initial state, and translator (part of SPOT). each transition is accepting. Deterministic, all transitions accepting. task void step() { atomic { // calculate new state with (ap, val) current_checking_steps++; current = next; next = -1; if (current == 1) { implementation { async event if ((call void notify(uint16_t statebv.get(r)) ap, (call statebv.get(s))) bool val) { // store next (ap, = val) 2; if (!finished_checking) else if ((call statebv.get(p)) && post step();!(call statebv.get(r)) && }!(call statebv.get(s))) next = 3; task void else step() if (!(call { statebv.get(p)) && atomic {!(call statebv.get(r)) && // calculate!(call new state statebv.get(s))) with (ap, val) current_checking_steps++; next = 1; current } = next; next = -1; else if (current == 2) { if (current next = 2; == 1) { } if ((call statebv.get(r)) else(call if (current statebv.get(s))) == 3) { if next (!(call = 2; statebv.get(r))) else next if ((call = 3; statebv.get(p)) && }!(call statebv.get(r)) && finished_checking!(call statebv.get(s))) = (next == -1); }}} next = 3; else if (!(call statebv.get(p)) && 11!(call statebv.get(r)) &&
23 Tool chain AP set LTL: [](q -> [](p)) SPOT r s 1!p &!r &!s p &!r &!s implementation { async event void notify(uint16_t bool val) { // store (ap, val) if (!finished_checking) post step(); } TinyOS application TinyOS system components AP set Hardware !r language translator Fig. 4. Deterministic monitor generated for the specification F r! (!p U ( s r )). State 1 is the initial state, and each transition is accepting. Runtime path verifier ncc binary task void step() { atomic { // calculate new state with ( current_checking_steps++; current = next; next = -1; if (current == 1) { if ((call statebv.get(r)) (call statebv.get(s))) next = 2; else if ((call statebv.get!(call statebv.get(r!(call statebv.get(s next = 3; else if (!(call statebv.ge!(call statebv.get(r!(call statebv.get(s next = 1; } else if (current == 2) { next = 2; } notification else if (current == 3) { and trace if (!(call statebv.get(r)) next = 3; } finished_checking = (next == emulator
24 Evaluation For CPU and stack overhead: emulator (MSPsim for TelosB). For (other) memory overhead: compilation to executable suffices (there is no dynamic allocation). 13
25 Monitor size Kilobytes ROM overhead (TelosB) RAM overhead (TelosB) Bytes Automaton size (no. states x no. transitions) 14
26 CPU overhead 1.25 CPU overhead (TelosB) Added load % Timeline in duty cycle x 20ms Accurate to the clock tick (advantage of emulating), modulo sampling rate. 15
27 Kilobytes ROM overhead (TelosB) ROM overhead (MicaZ) U-G U-B U-A U-W U-AB A-G A-B A-A A-W A-AB E-G E-B E-A E-W E-AB P-G P-B P-A P-W P-AB R-G R-B R-A R-W R-AB BE-G BE-B BE-A BE-W BE-AB LTL property pattern and scope ROM overhead 16
28 30 RAM overhead (TelosB) RAM overhead (MicaZ) Bytes U-G U-B U-A U-W U-AB A-G A-B A-A A-W A-AB E-G E-B E-A E-W E-AB P-G P-B P-A P-W P-AB R-G R-B R-A R-W R-AB BE-G BE-B BE-A BE-W BE-AB LTL property pattern and scope RAM overhead 17
29 18
Temporal Monitors for TinyOS
Temporal Monitors for TinyOS Doina Bucur Innovation Centre for Advanced Sensors and Sensor Systems (INCAS 3 ), The Netherlands doinabucur@incas3.eu Abstract. Networked embedded systems generally have extremely
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationRuntime Verification for Real-Time Automotive Embedded Software
Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime
More informationFormal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
More informationREMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS
REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Varsha jaladi 1, Guthula Ganga Raja Sekhar 2, K.Raghava Rao 3 1 BTech Student, dept. of Electronics and Computers, K L University,
More informationTowards Lightweight Logging and Replay of Embedded, Distributed Systems
Towards Lightweight Logging and Replay of Embedded, Distributed Systems (Invited Paper) Salvatore Tomaselli and Olaf Landsiedel Computer Science and Engineering Chalmers University of Technology, Sweden
More informationFastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
More informationComparison of Operating Systems TinyOS and Contiki
Comparison of Operating Systems TinyOS and Contiki Tobias Reusing Betreuer: Christoph Söllner Seminar: Sensorknoten - Betrieb, Netze & Anwendungen SS2012 Lehrstuhl Netzarchitekturen und Netzdienste, Lehrstuhl
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationOperating Systems. Lecture 03. February 11, 2013
Operating Systems Lecture 03 February 11, 2013 Goals for Today Interrupts, traps and signals Hardware Protection System Calls Interrupts, Traps, and Signals The occurrence of an event is usually signaled
More informationIntroduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu
Introduction to Operating Systems Indiana University Chen Yu Perspective of the Computer System Software A general piece of software with common functionalities that support many applications. Example:
More informationFull and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
More informationUsing a Generic Plug and Play Performance Monitor for SoC Verification
Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why
More informationChapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationChapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
More informationI Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
More informationRCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
More informationChapter 13 Embedded Operating Systems
Operating Systems: Internals and Design Principles Chapter 13 Embedded Operating Systems Eighth Edition By William Stallings Embedded System Refers to the use of electronics and software within a product
More informationlogic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?
5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling
More informationA304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard
A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard Table of Contents Introduction/Purpose... 2 SSM User
More informationEmbedded Systems. 6. Real-Time Operating Systems
Embedded Systems 6. Real-Time Operating Systems Lothar Thiele 6-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic
More informationMBP_MSTR: Modbus Plus Master 12
Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page
More informationThe Xen of Virtualization
The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture
More informationThe Microsoft Windows Hypervisor High Level Architecture
The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove (amislove@ccs.neu.edu) Operating System Services Operating systems provide an environment for
More informationImplementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet
Implementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet T. Liu, C. Sadler, P. Zhang, and M. Martonosi, MobiSys 04 Presented by Fabián E. Bustamante (based on the
More informationIntroduction to Software Verification
Introduction to Software Verification Orna Grumberg Lectures Material winter 2013-14 Lecture 4 5.11.13 Model Checking Automated formal verification: A different approach to formal verification Model Checking
More informationADL User Guide for Open AT V4.10
ADL User Guide for Open AT V4.10 Revision: 002 Date: September 2006 ADL User Guide for Open AT V4.10 Revision: 002 Date: Reference: WM_DEV_OAT_UGD_019 Confidential Page: 1 / 220 Document History Index
More informationCloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationArchitecture of the Kernel-based Virtual Machine (KVM)
Corporate Technology Architecture of the Kernel-based Virtual Machine (KVM) Jan Kiszka, Siemens AG, CT T DE IT 1 Corporate Competence Center Embedded Linux jan.kiszka@siemens.com Copyright Siemens AG 2010.
More informationFlexible Online Energy Accounting in TinyOS
Flexible Online Energy Accounting in TinyOS Simon Kellner System Architecture Group Karlsruhe Institute of Technology kellner@kit.edu Abstract. Energy is the most limiting resource in sensor networks.
More informationSecurity of MICA*-based / ZigBee Wireless Sensor Networks
Security of MICA*-based / ZigBee Wireless Sensor Networks Cambridge University Computer Lab and myself also Brno University of Technology Department of Intelligent Systems 28 December 2008 Our approach
More informationTesting LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
More informationGIVE WINGS TO YOUR IDEAS TUTORIAL
GIVE WINGS TO YOUR IDEAS TUTORIAL PLUG IN TO THE WIRELESS WORLD Tutorial Version: 001 / 1.0 Date: October 30, 2001 Reference: WM_SW_OAT_UGD_001 confidential Page: 1 / 18 (THIS PAGE IS INTENTIONALY LEFT
More informationOPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
More informationDo AUTOSAR and functional safety rule each other out?
Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000
More informationFine-Grained User-Space Security Through Virtualization. Mathias Payer and Thomas R. Gross ETH Zurich
Fine-Grained User-Space Security Through Virtualization Mathias Payer and Thomas R. Gross ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application access
More informationPC Notebook Diagnostic Card
www.winter-con.com User s Guide PC Notebook Diagnostic Card User s Guide 1 www.winter-con.com User s Guide INTRODUCTION Notebook Diagnostic Card is a powerful diagnostic tool for technicians and administrators
More informationSYSTEM ecos Embedded Configurable Operating System
BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original
More informationÜbung zu Drahtlose Kommunikation. 10. Übung 14.01.2012
Übung zu Drahtlose Kommunikation 10. Übung 14.01.2012 TinyOS is an operating system designed to target limited-resource sensor network nodes TinyOS 0.4, 0.6 (2000-2001) TinyOS 1.0 (2002): first nesc version
More informationTechnical Report CS-2006-27-11: A Performance Analysis of MANTIS and TinyOS
Technical Report CS-26-27-11: A Performance Analysis of MANTIS and TinyOS Cormac Duffy, Utz Roedig, John Herbert and Cormac J. Sreenan Computer Science Department, University College Cork, Ireland Email:
More informationThe Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
More informationComputer-System Architecture
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System
More informationComputer Systems Structure Input/Output
Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices
More informationDesign of WSN-Based Remote Monitoring System for Environmental Parameters in Substation
International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department
More informationWave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
More informationAQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
More informationPOSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)
RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate
More informationLast Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
More informationOutline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool
Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science
More informationDigitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah
(DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de jens_onno.krah@fh-koeln.de NIOS II 1 1 What is Nios II? Altera s Second Generation
More informationReal Time Programming: Concepts
Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize
More informationUsing the TASKING Software Platform for AURIX
Using the TASKING Software Platform for AURIX MA160-869 (v1.0rb3) June 19, 2015 Copyright 2015 Altium BV. All rights reserved. You are permitted to print this document provided that (1) the use of such
More informationVirtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating
More informationOperating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
More informationOperating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
More informationZing Vision. Answering your toughest production Java performance questions
Zing Vision Answering your toughest production Java performance questions Outline What is Zing Vision? Where does Zing Vision fit in your Java environment? Key features How it works Using ZVRobot Q & A
More informationChapter 2 System Structures
Chapter 2 System Structures Operating-System Structures Goals: Provide a way to understand an operating systems Services Interface System Components The type of system desired is the basis for choices
More informationTrustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
More informationVirtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16
1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 2 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge
More informationTopics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives
Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,
More informationSoftware Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB
Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer Dr. Johan Kraft, Percepio AB Debugging embedded software can be a challenging, time-consuming and unpredictable factor in development
More informationNotes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.
Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.
More informationSoftware Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationUnit 12 Database Recovery
Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationFundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
More informationCloud Operating Systems for Servers
Cloud Operating Systems for Servers Mike Day Distinguished Engineer, Virtualization and Linux August 20, 2014 mdday@us.ibm.com 1 What Makes a Good Cloud Operating System?! Consumes Few Resources! Fast
More informationXenomai: integration and qualification of a real time operating system ARMadeus Systems
: integration and qualification of a real time operating system ARMadeus Systems Gwenhaël 8 july 2009 1 / 22 Plan 1 2 3 of in a Buildroot environment 4 5 6 2 / 22 : basics Real time extension for Linux.
More informationThe BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware
More informationAutomatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation
Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation Satish Narayanasamy, Cristiano Pereira, Harish Patil, Robert Cohn, and Brad Calder Computer Science and
More informationMAC A Run Time monitoring and checking tool
MAC A Run Time monitoring and checking tool Gursharan Singh Mohd. Salman Mehmood Agenda Motivation Software Development Steps Methods New Paradigm (Runtime Verification) Materializing Runtime Verification
More informationsel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia
sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia 1 OS Trade-Offs Usability Minix Android Linux Trustworthiness Minix Android L4 sel4 Performance Linux L4 sel4 2015 Gernot
More informationMOTEWORKS. Key Features. Overview
MOTEWORKS SOFTWARE PLATFORM MoteWorks 2.0 provides a complete software development environment for wireless sensor network applications. Included is a collection of flexible software packages that enables
More informationMutual Exclusion using Monitors
Mutual Exclusion using Monitors Some programming languages, such as Concurrent Pascal, Modula-2 and Java provide mutual exclusion facilities called monitors. They are similar to modules in languages that
More informationintroduction to program monitoring
introduction to program monitoring CS 119 part II beyond assert and print course website http://www.runtime-verification.org/course09 action standing order: sell when price drops more than 2% within 1
More informationOperating Systems for Wireless Sensor Networks: A Survey
Sensors 2011, 11, 5900-5930; doi:10.3390/s110605900 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Operating Systems for Wireless Sensor Networks: A Survey Muhammad Omer Farooq
More informationOperating System Structures
Operating System Structures Meelis ROOS mroos@ut.ee Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.
More informationVirtualization in Linux KVM + QEMU
CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization
More informationCSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
More informationA New Chapter for System Designs Using NAND Flash Memory
A New Chapter for System Designs Using Memory Jim Cooke Senior Technical Marketing Manager Micron Technology, Inc December 27, 2010 Trends and Complexities trends have been on the rise since was first
More informationSafety and Security Features in AUTOSAR
Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2
More informationChapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
More informationDevelop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs
Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs AN033101-0412 Abstract This describes how to interface the Dallas 1-Wire bus with Zilog s Z8F1680 Series of MCUs as master devices. The Z8F0880,
More informationRuntime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
More informationHow To Test In Tinyos With Unit Test (Forum) On A Microsoft Microsoft Computer (Forums) On An Ipa (Forms) On Your Computer Or Microsoft Macbook (Forims) On The Network (For
Unit Testing for Wireless Sensor Networks Michael Okola Computer Science Department University of Virginia Charlottesville, Virginia okola@virginia.edu Kamin Whitehouse Computer Science Department University
More informationHelping you avoid stack overflow crashes!
Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we
More informationCOMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
More informationFormal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
More informationEXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationLoad and Performance Testing
Blaise Internet 4.8.4 Load and Performance Testing Lane Masterton Assistant Statistician Technology Services Division Australian Bureau of Statistics Content 1. Purpose 2. Test Targets 3. Approach 4. Solution
More informationCS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization
CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;
More informationDebugging A MotoHawk Application using the Application Monitor
CONTROL SYSTEM SOLUTIONS Debugging A MotoHawk Application using the Application Monitor Author(s): New Eagle Consulting 3588 Plymouth Road, #274 Ann Arbor, MI 48105-2603 Phone: +1 (734) 929-4557 Ben Hoffman
More informationReal-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More information