Från Runor Till Radiovågor Radiovågor Till Runor Från

Total Page:16

File Type:pdf, Size:1020Kb

Från Runor Till Radiovågor Radiovågor Till Runor Från Från runor till radiovågor Från HISTORIEN OM KISTA SCIENCE CITY Inger Björklind Bengtsson Anders Anjou Åsa Waldton Från runor till radiovågor runor radiovågor till Från Från runor till radiovågor Historien om Kista Science City BOKEN samlar historia om Kista i Igelbäcksdalen. Här hade en gång vikingarna ett starkt fäste. Här föddes global mobiltelefoni tusen år senare. IBM och Ericsson var pionjärer. De drog till sig andra företag inom data och telekommunikation samtidigt som elektroniken började sitt segertåg. Mobiltelefoni från Sverige skulle förändra världen. Att bygga Kista växte till en rörelse och eldsjälar klev in på arenan: företagsledare, professorer, akademiker, ingenjörer, politiker, stadsbyggare, fastighetägare, byggherrar, arkitekter, anställda, studenter... Tillsammans med omgivande kommuner har de bidragit till att Kista vuxit till en vetenskapsstad – Kista Science City – en av världens främsta IT-noder. Här är tempot högt. Inte bara forskare och studenter inom akademi och industri är engagerade i utvecklingen av det digitala samhället, utan även unga boende liksom nyfikna inom olika verksamheter. En mångfald innovationer skapas i korsningen mellan konst, vetenskap och kultur. Idéer uppstår ofta av en tillfällighet, s.k. »accidental learning«, då människor, konst, kultur och vetenskap av en händelse möts på samma plats. Sveriges idoler i framtiden är unga, smarta, svenska, uppfinnare! Foto: Wingårdh Arkitekter AB Victoria Tower – Kistas nyaste glittrande symbol kommer att synas vida omkring och dominera Stockholms och Kista Science Citys skyline. Upplevelsen blir stark, inte minst för trafikanter som färdas sträckan Uppsala–Arlanda–Kista–Stockholm. Tornet uppförs intill Kistamässan och ska inrymma hotell och kontor. Invigning sker hösten 2011. Arkitekt är Wingårdh Arkitekter AB. Från runor till radiovågor HISTORIEN OM KISTA SCIENCE CITY BOKEN HAR TILLKOMMIT TACK VARE BIDRAG FRÅN Akademiska Hus AP Fastigheter Brostaden Diligentia Drott Ericsson Eurodis Fabege AB IBM Infineon Technologies Institutionen för data- och systemvetenskap, Stockholms universitet Kista Galleria Kista Science City AB Kista Science City Fastighetsägare KTH LjungbergGruppen/Atrium Ljungberg NCC Niam Fund Philips Skanska Sweco Theorells Stockholm Business Region Svenska Bostäder TagMaster Tieto Enator Vasakronan Wihlborgs VINNOVA Boken tilldelades Olle Engkvist-priset 2005 4 Från runor till radiovågor HISTORIEN OM KISTA SCIENCE CITY Bo- ken om Kistaovå- gor »En berättelse om hur enskilda eldsjälar tagit sig an ett samhällsbygge som låtit Sverige göra ett tillväxtsprång inom data och telekom« Competence, Boen år 2005 5 ISBN 978-91-981809-1-6 © Inger Björklind Bengtsson, förutom angivna bildrätter Utgivare: Anna Ma Media Text & Layout: Inger Björklind Bengtsson Form: Åsa Waldton Foto: Anders Anjou, där inget annat anges. Denna version trycktes i flexband på Elanders Fälth & Hässler i augusti 2011: Från runor till radiovågor. Historien om Kista Science City Smärre uppdateringar 2018 för eboken. Ebok utgiven i september 2018 av Anna Ma Media, Stockholm 6 Förord 7 Inledning 9 Vattenvägen blev en bäck 17 Kista gav Stockholm framtidstro 37 Optimismen stor i Sveriges Silicon Valley 51 Kista Science Park världens trådlösa centrum 85 Från ABC-område till en stad i staden 113 IBM, Telia och Ericsson – det intelligenta samhället runt hörnet 173 Giganterna och företagen runt giganterna 213 Intelligent kulturskapare i Uppland 245 Det nya internationella Stockholm 253 Företagen i Kista Science City 2009 292 Bildleverantörer 294 Person-, företags-, organisations- och platsregister 295 Källhänvisningar 300 Minibiografier 301 7 Boken är tillägnad Kista 8 FÖrord BOKEN OM KISTA SCIENCE CITY berättar en historia om 35 års nytänkande, modiga beslut och samverkan mellan näringslivet, akademin, forsknings- institutioner och Stockholm stad. Kista Science City är Stockholms kraftigaste tillväxtmotor. Genom sin koncentration av ett kunskapsintensivt näringsliv i världsklass, spets inom forskning och utbildning samt en levande stad har Kista Science City befäst sin plats på kartan som ett av de främsta internationella klustren inom ICT. I början av 2000-talet gick näringslivet, akademin och Stockholms stad samman kring en gemensam vision för att utveckla Kista från en »science park« till just Kista Science City – en stad med stadens alla beståndsdelar. Tillsammans byggde vi vidare på Kistas innovationskraft de senaste 35 åren. Nyckeln till Kista Science Citys framgång är samverkan. Ett tidigt exempel på framgångsrik samverkan i Kista var när de nordiska televerken skapade global mobiltelefoni (NMT) och leverantören LM Ericsson utvecklade, tack vare NMT-konceptet, mobiltelefonin. Här lades grunden för människor att komma närmare varandra globalt, oavsett land och kultur. Den höga andelen tjänsteföretag, hög kompetens och förstklassisk utbildning och forskning är tillsammans med stadens satsningar på att utveckla Kista Science City, starkt bidragande till Stockholms stabila tillväxt. Kista utvecklas ständigt med nya bostäder, ny infrastruktur och mötes- platser som torg, handel, hotell och besöksattraktioner. En stad blir levande när människor möts – planerat och oplanerat. I Kista Science City finns särskilt goda förutsättningar för spännande möten med den höga densiteten av företag, anställda, högkvalificerade forskare i världen, studenter, boende och besökare. Allt inom gångavstånd. Det är genom samverkan – på alla nivåer och inom alla områden – som Kista Science City fortsätter att utvecklas till sin fulla potential. Med spetsutveckling inom näringslivet, stadens satsningar på bredbands- utbyggnad och e-tjänsteprogram, invånare som internationellt sett betraktas som »early adopters« får Stockholm utmärkelser som ständigt visar på hög livskvalitet. Här kan nämnas Intelligent Community of the Year (2009) och The First Green Capital of the Year (2010). Välkommen att ta del av framgångssagan Kista Science City och att läsa om framtidens stad! Sten Nordin Finansborgarråd i Stockholms stad 9 10 INLEDNING – intelligenta kista SCIENCE CITY »Människans kunskap ska höjas med hjälp av teknik och så ska ett större värde tillföras samhället« Organisation for Economic Co-operation and Development (OECD) DET VILAR EN magisk kraft över vetenskapsstaden Kista Science City! Här utvecklas informationstekniken (IT) och i synnerhet den mobila kommunika- tionstekniken i en hisnande förändringstakt. Besökare får möjlighet att testa och uppleva världens skarpaste och mest verklighetsnära mobila tjänster och delta i den mobila utvecklingen. Du må vara svensk, tysk, japan, kines, ameri- kan eller kuban; tanken är att den mångkulturella vetenskapsstaden ska han- tera många språk. För drygt tusen år sedan byggde vikingar bostäder här i den bördiga Igelbäcks dalen på Järvafältet; de kommunicerade med omvärlden via sina run- stenar. På samma plats har den moderna kommunikationstekniken slagit rot och radiovågor är det bärande mediet. Kista är en av de självklara noderna i den globala IT-utvecklingen och strategin är att fullborda en vetenskapsstad. Äventyret i modern tid började i slutet av 70-talet. Militären som exercerat på fältet hade flyttat till Kungsängen och den siste lantbrukaren hade lagt ner spaden. Nu byggdes bostäder och industrier; IBM och Ericsson slog sig ner i Kista. Internationella storföretag flyttade efter: amerikanska Hewlett-Pack- ard, Sun, Intel, Apple, Microsoft, europeiska Bosch, Siemens, Philips, nordiska Nokia, japanska Yokogawa, kinesiska Huawei och ZTE ... och efter dem inno- vativa företag med bredd, varav många underleverantörer. Erövringståget inom data och mobiltelefoni drog ut över världen. Forsk- ningsinstitut och högskoleutbildningar flyttade in i Electrum, som blev ett nytt centrum för IT-forskning och utbildning i Sverige. Internet, datorer och mobil- telefoner blev människans rättighet liksom tidigare fasta telefoner, flyg, båtar och tåg. Den nya tekniken gav oss möjlighet att närma oss varandra över lands- och kulturgränser på ett alldeles nytt sätt. Att just Kista i Sverige blivit ett globalt centrum för informationsteknologi och mobilteknologi är kommunikationshistoriskt sett ett märkligt sammanträf- fande: För mer än hundratrettio år sedan satsade Lars Magnus Ericsson först Bild motstående sida av alla i världen på att konstruera telefoner för just vardagsmänniskan. Första År 1981 bygger Tage Ljungberg och Skanska en stor tegelfastighet telefonerna var klara 1878. Utvecklingen gick hand i hand med H.T. Ceder- i kvarteret Skalholt. Robert Bosch grens grundande av Stockholms Allmänna Telefonaktiebolag (SAT). Cedergren har börjat planera sitt huvudkontor ville ge »en telefon till varje stockholmare«. Ett samarbete mellan Ericsson och (1982) vid Isafjordsgatan och dåvarande Klövern ska (1985) Cedergren ledde till att Stockholm år 1885 hade fler telefoner än någon annan uppföra ett helt hus åt Tillquist stad i världen. Process i hörnet Isafjordsgatan– Cirka hundra år senare skapade de nordiska televerken global mobiltelefoni Färögatan. Övriga byggnader är Rifa, SRA, första kontorshotellet (NMT) och leverantören LM Ericsson utvecklade, tack vare NMT-konceptet, längs Kistagången (mitt emot SRA), mobiltelefoni för alla och envar. Startskottet för global mobiltelefoni fyrades Ohlsson & Skarnes rosa industri- av i Kista. Mobiltelefonins vagga ligger faktiskt i Igelbäcksdalen! byggnader längs Torshamnsgatan samt Agfa Gevaerts anläggning, Stadsbyggare, politiker, fastighetsbolag och byggherrar har drivit utveck- nuvarande Kistamässan. lingen av samhället Kista.
Recommended publications
  • GSM Security
    International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: 2319-6386, Volume-2 Issue-5, March 2014 GSM Security Anshu Anand Jethi, Ajay Rana Abstract- This paper demonstrates the secure communication in GSM. Global System for Mobile Communication (GSM) is a A. The Purpose of GSM Security: second generation cellular standard developed to provide voice • The access to the mobile services. services and data delivery using digital modulation. • Any significant item from being revealed at the radio With its great features like providing access to users at anytime path, generally to ensure the privacy of user-related and anywhere, mobile communication is very attractive among information. the users as well as operators and service providers. But, in spite of of several advantages, mobile communication also has been II. SECURITY FEATURES OF GSM facing many security problems. In 2G and 3G technologies viz GSM, GPRS and UMTS, the architecture comprises of mainly Several security functions built into GSM to safeguard three nodes; the mobile station (MS), Visitor Location subscriber privacy which includes: Register/Serving GPRS Support Node (VLR/SGSN), and Home Registered subscriber’s authentication. Location Register /Authentication Center (HLR/AuC). These Subscriber identity protection nodes are involved to encrypt/decrypt the data and authenticate the user (MS) in GSM, GPRS and UMTS. Secure data transfer via encryption Keywords- GSM, GPRS and UMTS, (VLR/SGSN), Mobile phones are unworkable without SIM (HLR/AuC). Duplicate SIM not allow on the network I. INTRODUCTION Securely stored KI. A. Registered subscribers Authentication Wireless and mobile communication systems are very famous among the customers as well the operators and The objective of this authentication security feature is to service providers.
    [Show full text]
  • Fax86: an Open-Source FPGA-Accelerated X86 Full-System Emulator
    FAx86: An Open-Source FPGA-Accelerated x86 Full-System Emulator by Elias El Ferezli A thesis submitted in conformity with the requirements for the degree of Master of Applied Science (M.A.Sc.) Graduate Department of Electrical and Computer Engineering University of Toronto Copyright c 2011 by Elias El Ferezli Abstract FAx86: An Open-Source FPGA-Accelerated x86 Full-System Emulator Elias El Ferezli Master of Applied Science (M.A.Sc.) Graduate Department of Electrical and Computer Engineering University of Toronto 2011 This thesis presents FAx86, a hardware/software full-system emulator of commodity computer systems using x86 processors. FAx86 is based upon the open-source IA-32 full-system simulator Bochs and is implemented over a single Virtex-5 FPGA. Our first prototype uses an embedded PowerPC to run the software portion of Bochs and off- loads the instruction decoding function to a low-cost hardware decoder since instruction decode was measured to be the most time consuming part of the software-only emulation. Instruction decoding for x86 architectures is non-trivial due to their variable length and instruction encoding format. The decoder requires only 3% of the total LUTs and 5% of the BRAMs of the FPGA's resources making the design feasible to replicate for many- core emulator implementations. FAx86 prototype boots Linux Debian version 2.6 and runs SPEC CPU 2006 benchmarks. FAx86 improves simulation performance over the default Bochs by 5 to 9% depending on the workload. ii Acknowledgements I would like to begin by thanking my supervisor, Professor Andreas Moshovos, for his patient guidance and continuous support throughout this work.
    [Show full text]
  • Standardization of Cryptographic Techniques – the Influence of the Security Agencies Gunnar Klein
    Standardization of Cryptographic Techniques – The Influence of the Security Agencies Gunnar Klein To cite this version: Gunnar Klein. Standardization of Cryptographic Techniques – The Influence of the Security Agen- cies. 4th History of Nordic Computing (HiNC4), Aug 2014, Copenhagen, Denmark. pp.321-327, 10.1007/978-3-319-17145-6_33. hal-01301423 HAL Id: hal-01301423 https://hal.inria.fr/hal-01301423 Submitted on 12 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Standardization of Cryptographic Techniques –The Influence of the Security Agencies Gunnar Klein Informatics/eHealth division, Business School Örebro University, Örebro, Sweden [email protected] Abstract. This paper is inspired by the global debate emerging after the re- lease by Edward Snowden in 2013 of many documents describing the policy and practice of the US National Security Agency (NSA) and some of its col- laborating partners in other countries, GCHQ in the UK and FRA in Sweden. This paper gives five examples from 1989-1995 on how security experts from Norway, Denmark and Sweden were put under pressure by actions from NATO and various security agencies during their work for the European standardization bodies, CEN and ETSI.
    [Show full text]
  • Ramp: Research Accelerator for Multiple Processors
    ..................................................................................................................................................................................................................................................... RAMP: RESEARCH ACCELERATOR FOR MULTIPLE PROCESSORS ..................................................................................................................................................................................................................................................... THE RAMP PROJECT’S GOAL IS TO ENABLE THE INTENSIVE, MULTIDISCIPLINARY INNOVATION John Wawrzynek THAT THE COMPUTING INDUSTRY WILL NEED TO TACKLE THE PROBLEMS OF PARALLEL David Patterson PROCESSING. RAMP ITSELF IS AN OPEN-SOURCE, COMMUNITY-DEVELOPED, FPGA-BASED University of California, EMULATOR OF PARALLEL ARCHITECTURES. ITS DESIGN FRAMEWORK LETS A LARGE, Berkeley COLLABORATIVE COMMUNITY DEVELOP AND CONTRIBUTE REUSABLE, COMPOSABLE DESIGN Mark Oskin MODULES. THREE COMPLETE DESIGNS—FOR TRANSACTIONAL MEMORY, DISTRIBUTED University of Washington SYSTEMS, AND DISTRIBUTED-SHARED MEMORY—DEMONSTRATE THE PLATFORM’S POTENTIAL. Shih-Lien Lu ...... In 2005, the computer hardware N Prototyping a new architecture in Intel industry took a historic change of direction: hardware takes approximately four The major microprocessor companies all an- years and many millions of dollars, nounced that their future products would even at only research quality. Christoforos Kozyrakis be single-chip multiprocessors, and that N Software
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Inside the Mobile Revolution
    Inside the Mobile Revolution A POLITICAL HISTORY of GSM Europe's most successful industrial policy intervention – propelling mobile phones into the hands of over 4 billion people STEPHEN TEMPLE CBE 1 2nd Edition Copyright © Stephen Temple 2010 May be used free of charge but may not be changed in any way or used in part or in whole in another published works in whatever medium without the author's permission 2 Foreword Over the period 1984-87 the political and strategic direction of GSM was being shaped by France, Germany, Italy and the UK. It was the genesis of the mobile revolution. This is the UK record of what happened, how it happened, why it happened and captures the political dynamics within which it all took place. The GSM 1800 MHz (PCN) element was added a few years later when the UK's DTI was at the leading edge of telecommunications liberalisation and I propelled it to be the first credible entity to set out the vision of the personal mobile phone as a consumer product (‘Phones on the Move’) and put forward the conditions to make it happen. My election as Chairman of the Technical Assembly of the European Telecommunications standards Institute in 1988 then provided an excellent vantage point as GSM went through its transition from a policy to a new born infant digital mobile industry. All this left me sitting on a unique (although in parts partial) account of how GSM came to be the mobile radio equivalent of the cosmic “big bang” and one of Europe's most successful high technology projects.
    [Show full text]
  • Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems
    Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712) edited by Garth A. Gibson and Hyang-Ah Kim Jangwoo Kim††, Eriko Nurvitadhi††, Eric Chung††; Alex Nizhner†, Andrew Biggadike†, Jad Chamcham†; Srinath Sridhar∗, Jeffrey Stylos∗, Noam Zeilberger∗; Gregg Economou∗, Raja R. Sambasivan∗, Terrence Wong∗; Elaine Shi∗, Yong Lu∗, Matt Reid††; Amber Palekar†, Rahul Iyer† May 2005 CMU-CS-05-138 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 †Information Networking Institute ∗Department of Computer Science ††Department of Electrical and Computer Engineering Abstract This technical report contains six final project reports contributed by participants in CMU’s Spring 2005 Advanced Operating Systems and Distributed Systems course (15-712) offered by professor Garth Gibson. This course examines the design and analysis of various aspects of operating systems and distributed systems through a series of background lectures, paper readings, and group projects. Projects were done in groups of two or three, required some kind of implementation and evalution pertaining to the classrom material, but with the topic of these projects left up to each group. Final reports were held to the standard of a systems conference paper submission; a standard well met by the majority of completed projects. Some of the projects will be extended for future submissions to major system conferences. The reports that follow cover a broad range of topics. These reports present a characterization of synchronization behavior
    [Show full text]
  • First Steps Simics/GEMS on Ubuntu 7.10
    First Steps Simics/GEMS on Ubuntu 7.10 Author: Aleksandar Vitorovic, [email protected], student of Faculty of Electrical Engineering, University of Belgrade, Serbia This document is not a product of the Multifacet Group. It is a GEMS user contribution, and this document is provided as-is, without warranty or guarantee of any kind, and without support. This document may serve as a useful guide for many users, but is neither tested nor verified by any authors of the GEMS infrastructure. 1 Introduction This tutorial explains basic steps for users to get familiar with GEMS/Simics environment. It is idiot- proof tutorial. Basic think you should know to start simulator is showed. In every fork I decided to choose one option and explain it in detail. For further details and other options you should consult appropriate documentation. In chapter 2 is detailed installation process for GEMS 2.1 and Simics 3.0.30 on Ubuntu 7.10 x86. In chapter 3 is detailed installation process for Simics 2.2.19 on Ubuntu 7.10 x86. In chapter 4 there is different manuals for Frequently used Commands. In chapter 5 we explain how to add benchmark to your target machine and how to start that. In chapter 6 there is list of used references. This tutorial are provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE WARRANTY OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 2 GEMS 2.1/Simics 3.0.30 Installation It is possible to install GEMS 2.1 based on Simics 3.0.30 on Ubuntu 7.10 x86 with GCC 4.1.3, although GEMS manufacturers internally work with GCC 3.4.6.
    [Show full text]
  • Automotive MRD Overview
    Developing Multicore Software is Easy, If… Freescale Technical Forum - Summer 2009 Emeka Nwafor Director, Product Management Development Tools © 2009 Wind River Systems, Inc. Abstract Multicore is here. There has been much written and discussed about how challenging developing Multicore Software can be. Most of us have heard the saying "you shouldn't bring a knife to a gunfight". This principle applies to developing Multicore Software. We will talk about how Wind River's development tools help to make developing Multicore Software easier on Freescale's family of multicore processors. We will also talk about directions that Wind River is taking to make developing Multicore Software "easy". 2 © 2009 Wind River Systems, Inc. Agenda Context: Where are we with multicore, today? What is Wind River's Multicore Software solution? Simplifying development on Freescale's multicore devices Directions for Multicore Software 3 © 2009 Wind River Systems, Inc. Some Market Trends around Multicore 12% Decline in single processor projects since 2006 18% Increase in dual-processor based designs since 2006 42% Percentage of embedded developers that say that chip technology will represent the most dramatic area change in embedded software development over the next 2-5 years 34% Percentage of embedded developers saying that embedded development / design processes will change significantly in the next 2-5 years 84% State that in-house code from previous projects is reused in new projects Source: 2009 TechInsights Embedded Market Study 4 © 2009 Wind River Systems, Inc. Some Qualitative Observations “We found that things were obscenely sensitive while we were trying to optimize the usage of our cache…” “It is very easy to write a slow multicore application and very hard to figure why it is slow.” “Software Engineers didn’t ask for multicore – it was forced on them…” “We are absolutely terrified about multicore and the challenges that parallelism and concurrency are introducing.
    [Show full text]
  • GSM and UMTS
    GSM and UMTS: The Creation of Global Mobile Communication Edited by Friedhelm Hillebrand Copyright q 2001 John Wiley & Sons Ltd ISBNs: 0-470-84322-5 (Hardback); 0-470-845546 (Electronic) GSM and UMTS GSM and UMTS: The Creation of Global Mobile Communication Edited by Friedhelm Hillebrand Copyright q 2001 John Wiley & Sons Ltd ISBNs: 0-470-84322-5 (Hardback); 0-470-845546 (Electronic) GSM and UMTS The Creation of Global Mobile Communication Edited by Friedhelm Hillebrand Consulting Engineer, Germany With contributions from 37 key players involved in the work for GSM and UMTS JOHN WILEY & SONS, LTD Copyright q 2002 by John Wiley & Sons, Ltd Baffins Lane, Chichester, West Sussex, PO19 1UD, England National 01243 779777 International (+44) 1243 779777 e-mail (for orders and customer service enquiries): [email protected] Visit our Home Page on http://www.wiley.co.uk or http://www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency, 90 Tottenham Court Road, London, W1P 9HE, UK, without the permission in writing of the Publisher, with the exception of any material supplied speci- fically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the publication. Neither the author(s) nor John Wiley & Sons Ltd accept any responsibility or liability for loss or damage occasioned to any person or property through using the material, instructions, methods or ideas contained herein, or acting or refraining from acting as a result of such use.
    [Show full text]
  • MC-Sim: an Efficient Simulation Tool for Mpsoc Designs
    MC-Sim: An Efficient Simulation Tool for MPSoC Designs Jason Cong, Karthik Gururaj, Guoling Han, Adam Kaplan, Mishali Naik, Glenn Reinman Computer Science Department, University of California, Los Angeles Los Angeles, CA 90095, USA ABSTRACT Chip (MPSoC). To manage the massive increase in the design The ability to integrate diverse components such as processor space available for system designers, simulation tools, which cores, memories, custom hardware blocks and complex can provide rapid and accurate estimations of the performance network-on-chip (NoC) communication frameworks onto a and cost of design instances, are required. Specifically, the tool single chip has greatly increased the design space available for should possess the capability to rapidly and accurately evaluate system-on-chip (SoC) designers. Efficient and accurate the performance of multi-core designs, model a variety of performance estimation tools are needed to assist the designer in memory systems and NoC configurations, simulate coprocessors making design decisions. In this paper, we present MC-Sim, a efficiently and allow the designer to migrate from one design heterogeneous multi-core simulator framework which is capable instance to another easily. of accurately simulating a variety of processor, memory, NoC configurations and application specific coprocessors. We also 1.1 Previous Work describe a methodology to automatically generate fast, cycle- Single processor simulators true behavioral, C-based simulators for coprocessors using a Traditional single-core simulators, such as SimpleScalar [7], high-level synthesis tool and integrate them with MC-Sim, thus were designed to model out-of-order superscalar processor augmenting it with the capacity to simulate coprocessors. Our C- pipelines, and lack the ability to model multiple application based simulators provide on an average 45x improvement in workloads or shared-memory parallel applications, let alone the simulation speed over that of RTL descriptions.
    [Show full text]
  • Simics Brief Introduction Presented By: Chunrong Lai Software Engineer Simics Technology Center (STC), Software and Services Group
    Simics Brief Introduction Presented By: Chunrong Lai Software Engineer Simics Technology Center (STC), Software and Services Group 26 Oct, 2012 What is Simics? Simics is a high-performance, full system simulator used by software developers to simulate large and complex electronic systems. Wind River Simics • Simulate any size of target system • Run unmodified binaries • Other use cases as add-ons Simics allows you to break the rules of embedded systems development Software and Services Group ‹#› Simics History Research project at SICS started in 1991 Virtutech was founded in Sweden in 1998 and incorporated in USA in 2003. Acquired by Intel in 2010 Marketed and sold through Wind River (subsidiary) Software and Services Group ‹#› Simics Customers Marketing, Field & Sales Simics users Simics Technology Center Widley used acroos different Intel Simics External Customers, include groups/projects as an uniform network, communication, space, software platform simulator semiconductor and HPC field Software and Services Group ‹#› What Wind River Simics Customers Say Computing Server Networking Industrial Space . Shortens bring-up . Finds and solves . Prevents the loss . Saves $6M in time from 22 weeks problems in 30 of $10M by getting target hardware to 29 days minutes instead the ASIC right labs of three weeks before and three people manufacturing . Configures complex labs in minutes instead of weeks Software and Services Group ‹#› 5 Some Simics Features and Capabilities • High performance • Modeling language for fast development • Synchronized
    [Show full text]