Embedded Systems Supporting by Different Operating Systems

Total Page:16

File Type:pdf, Size:1020Kb

Embedded Systems Supporting by Different Operating Systems A Survey: Embedded Systems Supporting By Different Operating Systems Qamar Jabeen, Fazlullah Khan, Muhammad Tahir, Shahzad Khan, Syed Roohullah Jan Department of Computer Science, Abdul Wali Khan University Mardan [email protected], [email protected] -------------------------------------------------------------------------------------------------------------------------------------- Abstract: In these days embedded systems used in industrial, commercial system have an important role in different areas. e.g Mobile Phones and different Fields and applications like Network type of Network Bridges are embedded embedded system , Real-time embedded used by telecommunication systems for systems which supports the mission- giving better requirements to their users. critical domains, mostly having the time We use digital cameras, MP3 players, DVD constraints, Stand-alone systems which players are the example of embedded includes the network router etc. A great consumer electronics. In our daily life its deployment in the processors made for provided us efficiency and flexibility and completing the demanding needs of the many features which includes microwave users. There is also a large-scale oven, washing machines dishwashers. deployment occurs in sensor networks for Embedded system are also used in providing the advance facilities, for medical, transportation and also used in handled such type of embedded systems wireless sensor network area respectively a specific operating system must provide. medical imaging, vital signs, automobile This paper presents some software electric vehicles and Wi-Fi modules. infrastructures that have the ability of supporting such types of embedded systems. 1. Introduction: Embedded system are computer systems designed for specific purpose, to increase functionality and reliability for achieving a specific task, like general Figure 1: Taxonomy of Embedded Software’s purpose computer system it does not use for multiple tasks. Now days there are 2.Embedded software organization many types of distributed embedded for embedded systems: system increased the performance and Embedded systems needs higher usability. A system is embedded not only reliability because most of them are safety by hardware it have also embedded critical systems therefore consists on software. microprocessors. Some embedded system There are a variety of embedded are designed from scratch and software specifically developed for those are widely used embedded operating devices. Different high level programming systems. All embedded devices having languages, which fulfils the requirements operating system which can be supported of that particular software are used by the by that device. An embedded real time programmer, having the ability of device must have the RTOS. Embedded OS exception handling and should have the having reliability, portability and reliable code [1]. Software can be configurability are the important features designed using off the shelf components. in it. RTOS should show the accurate Operating systems are the example of the logical results, in specially safety critical reusable software components, which systems because in accuracy May loss doesn’t developed from scratch. causes of lost a life like air craft system. The operating systems giving above Software should not the platform- support the large systems consisting on dependent it should be the capability of higher CPU and memory size. And also evolvability either it would run on the LAN multitasking, TCP/IP networking, memory or shared wide-wide area network. It also protection can be supported by it. should be guaranteed that it provide the same services with respect to the Window NT [6] is not real time environment of the user, according to operating system, but due to industrial their requirement. Accuracy and precision need, window NT should be evolved for are important when environment achieving some features of real time changes.[2] systems. Embedded operating systems are Linux operating system also not developed for handling the particular supported real time system for this application. There for OS used in purpose RTAI (real time application embedded systems is most different than interface) [7] are designated which is an the general purpose OS used in our extension of Linux. Embedded Linux is also desktops computers. And these systems an evolution in Linux but it doesn’t also have the real time properties support real time application like RTAI. according to the system requirements. Commercial off-the-shelf Such types of operating systems are components used [8] for achieving the divided into two types, embedded target of distributed real time and operating system and real time operating embedded systems, such as mission systems. critical dynamic domains which includes 2.1 Real time and embedded the radar processing, online financial operating systems: trading etc. Clock synchronization [9] is an important feature of distributed real time Embedded systems are mostly operating systems. Clock synchronization used Real-time operating systems, QNX should be fault tolerated for giving the [3], WinCE[4], Vxworks [5] are most accuracy. When CPU [10] is highly loaded and unexpected interrupts disturbed time includes the functions data receiving, due to this RTOS exceed their limits then showing, and the ability of information more energy will be consumed by it as storage [15]. compared to the normal execution. In zigbee application design In heterogeneous environment algorithms implementation for serial embedded systems are more complex in communication and interface design it sense of their reliability and security uses the embedded visual C++. Different which in more demanding feature in this languages used by programmer for environment. Over a decade performance different algorithms.[16,17] of ICT is main focus of researchers. But Systems depending on window CE recently, security and reliability become have 4 layers 1) Hardware layer includes the higher issue. Some projects proposed all the hardware used in those systems, by [11] used the micro-kernel for such as processors. 2) Operating system is reliability and dependability, [12] an interface for users. 3) Applications proposed Minix OS and [13] suggest the layer consists on the applications which L4 OS for higher reliability. depend upon different types of 2.1.1 WinCE performances on the device. 4) Hardware support layer consists on interaction November 1996 in handheld PC between hardware and OS used by that window CE was introduced. There are system [18,19]. many extensions of windows CE. Embedded systems have the restriction of Basic needs of storing, space. Windows CE developed for manipulating, retrieving the data have achieving the given aim. This is a thin every operating system. These operations client operating system supports priority can be performed by replicating the data inheritance and developed for embedded on a backend server. Enterprise and applications like entertainment and personal application used such type of communication [14]. database respectively for applications which provided financial services and Window CE is real-time operating web-based like entertainment, games etc. systems which have the functionality of For this purpose a relational database like operate the embedded 32 bit processor. SQL server used by window CE. The Zigbee is an embedded system based on constraints on space using by the program ARM having the serial communication is followed by this engine. The functionality which improves the architecture of SQL engine includes query transmission area and reliability of optimization, relational storage helicome used as wireless sensor network (transaction and indexing) and backend module. Due to ARM device has of low data replication [20]. power consumption (now a days it is an issue of green computing) high Another system used master slave performance and lower cost. It also architecture call Computerized Numerical Control (CNC) using embedded real time embedded system a Linux operating operating system.[21] system is used. Different fault injection techniques used for checking the 2.1.2 Linux: reliability of the system [28]. Linux is quite Few years ago the use of Linux in good for different microprocessors due to embedded device became most popular. robustness because it is more scalable and People needs accessing their own account reliable [29]. anywhere so it is used as a functional OS 2.1.3 QNX: in networked systems. Linux have an important feature of flexibility, because QNX software system limited we can interrupt in kernel at runtime and designated the QNX for real time unload a module. Linux is open source so operating systems. It have the its code is worldwide available, also functionality of processing the medical portable and scalable. It can run on every machines, telecommunication, and processor and also license free. electronic devices. The requirements of these devices are higher reliability and Differentiability between the hardware safety because all are attach with our make the operating system most daily life, also having the features of sophisticated (mobile devices, severs etc). scalability and flexibility. It is small and Different configurators are developed for fast. the purpose to ensure the validity and user guidance. Too many configurators Medical devices like calculated the are developed like for feature models genetic methodology can some time commercial configurators [22] have been distributed on multi processors
Recommended publications
  • Tutorials Point, Simply Easy Learning
    Tutorials Point, Simply Easy Learning UML Tutorial Tutorialspoint.com UNIX is a computer Operating System which is capable of handling activities from multiple users at the same time. Unix was originated around in 1969 at AT&T Bell Labs by Ken Thompson and Dennis Ritchie. This tutorial gives an initial push to start you with UNIX. For more detail kindly check tutorialspoint.com/unix What is Unix ? The UNIX operating system is a set of programs that act as a link between the computer and the user. The computer programs that allocate the system resources and coordinate all the details of the computer's internals is called the operating system or kernel. Users communicate with the kernel through a program known as the shell. The shell is a command line interpreter; it translates commands entered by the user and converts them into a language that is understood by the kernel. Unix was originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna. There are various Unix variants available in the market. Solaris Unix, AIX, UP Unix and BSD are few examples. Linux is also a flavour of Unix which is freely available. Several people can use a UNIX computer at the same time; hence UNIX is called a multiuser system. A user can also run multiple programs at the same time; hence UNIX is called multitasking. Unix Architecture: Here is a basic block diagram of a UNIX system: 1 | P a g e Tutorials Point, Simply Easy Learning The main concept that unites all versions of UNIX is the following four basics: Kernel: The kernel is the heart of the operating system.
    [Show full text]
  • What We Know About Testing Embedded Software
    What we know about testing embedded software Vahid Garousi, Hacettepe University and University of Luxembourg Michael Felderer, University of Innsbruck Çağrı Murat Karapıçak, KUASOFT A.Ş. Uğur Yılmaz, ASELSAN A.Ş. Abstract. Embedded systems have overwhelming penetration around the world. Innovations are increasingly triggered by software embedded in automotive, transportation, medical-equipment, communication, energy, and many other types of systems. To test embedded software in a cost effective manner, a large number of test techniques, approaches, tools and frameworks have been proposed by both practitioners and researchers in the last several decades. However, reviewing and getting an overview of the entire state-of-the- art and the –practice in this area is challenging for a practitioner or a (new) researcher. Also unfortunately, we often see that some companies reinvent the wheel (by designing a test approach new to them, but existing in the domain) due to not having an adequate overview of what already exists in this area. To address the above need, we conducted a systematic literature review (SLR) in the form of a systematic mapping (classification) in this area. After compiling an initial pool of 560 papers, a systematic voting was conducted among the authors, and our final pool included 272 technical papers. The review covers the types of testing topics studied, types of testing activity, types of test artifacts generated (e.g., test inputs or test code), and the types of industries in which studies have focused on, e.g., automotive and home appliances. Our article aims to benefit the readers (both practitioners and researchers) by serving as an “index” to the vast body of knowledge in this important and fast-growing area.
    [Show full text]
  • Unit V Algorithm for Booting the UNIX System
    Unit V Algorithm for booting the UNIX system : As we’ve noted, the boot process begins when the instructions stored in the computer’s permanent, nonvolatile memory (referred to colloquially as the BIOS, ROM,NVRAM, and so on) are executed. This storage location for the initial boot instructions is generically referred to as firmware (in contrast to “software,” but reflecting the fact that the instructions constitute a program[2]). These instructions are executed automatically when the power is turned on or the system is reset, although the exact sequence of events may vary according to the values of stored parameters.[3] The firmware instructions may also begin executing in response to a command entered on the system console (as we’ll see in a bit). However they are initiated, these instructions are used to locate and start up the system’s boot program , which in turn starts the Unix operating system. The boot program is stored in a standard location on a bootable device. For a normal boot from disk, for example, the boot program might be located in block 0 of the root disk or, less commonly, in a special partition on the root disk. In the same way, the boot program may be the second file on a bootable tape or in a designated location on a remote file server in the case of a network boot of a diskless workstation. There is usually more than one bootable device on a system. The firmware program may include logic for selecting the device to boot from, often in the form of a list of potential devices to examine.
    [Show full text]
  • Embedded Sensors System Applied to Wearable Motion Analysis in Sports
    Embedded Sensors System Applied to Wearable Motion Analysis in Sports Aurélien Valade1, Antony Costes2, Anthony Bouillod1,3, Morgane Mangin4, P. Acco1, Georges Soto-Romero1,4, Jean-Yves Fourniols1 and Frederic Grappe3 1LAAS-CNRS, N2IS, 7, Av. du Colonel Roche 31077, Toulouse, France 2University of Toulouse, UPS, PRiSSMH, Toulouse, France 3EA4660, C3S - Université de Franche Comté, 25000 Besançon, France 4 ISIFC – Génie Biomédical - Université de Franche Comté, 23 Rue Alain Savary, 25000 Besançon, France Keywords: IMU, FPGA, Motion Analysis, Sports, Wearable. Abstract: This paper presents two different wearable motion capture systems for motion analysis in sports, based on inertial measurement units (IMU). One system, called centralized processing, is based on FPGA + microcontroller architecture while the other, called distributed processing, is based on multiple microcontrollers + wireless communication architecture. These architectures are designed to target multi- sports capabilities, beginning with tri-athlete equipment and thus have to be non-invasive and integrated in sportswear, be waterproofed and autonomous in energy. To characterize them, the systems are compared to lab quality references. 1 INTRODUCTION electronics (smartphones, game controllers...), in an autonomous embedded system to monitor the Electronics in sports monitoring has been a growing sportive activity, even in field conditions. field of studies for the last decade. From the heart rate Our IMU based monitoring system allows monitors to the power meters, sportsmen
    [Show full text]
  • Thread Scheduling in Multi-Core Operating Systems Redha Gouicem
    Thread Scheduling in Multi-core Operating Systems Redha Gouicem To cite this version: Redha Gouicem. Thread Scheduling in Multi-core Operating Systems. Computer Science [cs]. Sor- bonne Université, 2020. English. tel-02977242 HAL Id: tel-02977242 https://hal.archives-ouvertes.fr/tel-02977242 Submitted on 24 Oct 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Ph.D thesis in Computer Science Thread Scheduling in Multi-core Operating Systems How to Understand, Improve and Fix your Scheduler Redha GOUICEM Sorbonne Université Laboratoire d’Informatique de Paris 6 Inria Whisper Team PH.D.DEFENSE: 23 October 2020, Paris, France JURYMEMBERS: Mr. Pascal Felber, Full Professor, Université de Neuchâtel Reviewer Mr. Vivien Quéma, Full Professor, Grenoble INP (ENSIMAG) Reviewer Mr. Rachid Guerraoui, Full Professor, École Polytechnique Fédérale de Lausanne Examiner Ms. Karine Heydemann, Associate Professor, Sorbonne Université Examiner Mr. Etienne Rivière, Full Professor, University of Louvain Examiner Mr. Gilles Muller, Senior Research Scientist, Inria Advisor Mr. Julien Sopena, Associate Professor, Sorbonne Université Advisor ABSTRACT In this thesis, we address the problem of schedulers for multi-core architectures from several perspectives: design (simplicity and correct- ness), performance improvement and the development of application- specific schedulers.
    [Show full text]
  • New Approach for Testing and Providing Security Mechanism for Embedded Systems
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 ( 2016 ) 851 – 858 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA New Approach for Testing and providing Security Mechanism for Embedded Systems Swapnili P. Karmorea, Anjali R. Mahajanb Research Scholar, Department of Computer Science and enginnering, G. H. Raisoni College of Engineering, Nagpur, India. Head, Department of Information Technology, Government Polytechnic, Nagpur, India. Abstract Assuring the quality of embedded system is posing a big challenge for software testers around the globe. Testing of one embedded system widely differs from another. The approach presented in the paper is used for the testing of safety critical feature of embedded system. The input and outputs are trained validated and tested via ANN. Security is provided via skipping invalid and critical classes and by embedding secret key in the Ram of embedded device. The work contributes simulating environment where cost and time required for testing of embedded systems will be minimized, which removes drawback of traditional approaches. Keywords: Embedded system testing; Black box testing; Safety critical embedded systems; Artificial neural network. 1. Introduction Testing is the most common process used to determine the quality and providing security for embedded systems. In the embedded world, testing is an immense challenge. In the test plan, the distinguished characteristics of embedded systems must be reflected as these are application specific. They give embedded system exclusive and distinct flavor. Real-time systems have to meet the challenge of assuring the correct implementation of an application not only dependent upon its logical accuracy, but also its ability to meet the constraints of timing.
    [Show full text]
  • What Is Embedded Computing?
    EMBEDDED COMPUTING more stringent cost and power con- straints. PDA design requires careful What Is Embedded attention to both hardware and soft- ware. In the next decade, some micro- processors, largely invisible to users, Computing? will be used for signal processing and control—for example, to enable home Wayne Wolf, Princeton University networking across noisy, low-quality media such as power lines. Others will be used to create advanced user inter- or those who think a lot about embedded computing, as well as Evolving from a craft to an the uninitiated, it’s important to engineering discipline over F define exactly what the term means. In brief, an embedded the past decade, embedded system is any computer that is a com- ponent in a larger system and that relies computing continues to on its own microprocessor. mature. But is embedded computing a field or just a fad? The purpose of this new bimonthly column is to give researchers difficult to implement in mechanical faces—for example, for the entire clus- as well as practitioners an opportunity controllers. ter of home entertainment devices. to demonstrate that embedded com- Laser and inkjet printers also Microprocessors have also enabled puting is an established engineering dis- emerged in the 1980s. Print engines new categories of portable devices cipline with principles and knowledge require computational support for that will assume roles and perform at its core. both typesetting and real-time control. functions yet to be determined. The First, users generate characters and cell phone and PDA combinations A LONG HISTORY lines that a computation must convert that hit the market in 2001 are a People have been building embedded into pixels.
    [Show full text]
  • Embedded Hardware
    Lecture #2 Embedded Hardware 18-348 Embedded System Engineering Philip Koopman Friday, 15-Jan-2016 Electrical& Computer ENGINEERING © Copyright 2006-2016, Philip Koopman, All Rights Reserved Announcements Many posted materials are accessible only from a CMU IP Address • Look for this on course web page: If you can't access a file due to access restrictions, you need to get a campus IP address for your web browsing requests. Use Cisco VPN Anyconnect... Course web page has schedules, assignments, other important info • http://www.ece.cmu.ecu/~ece348 • Blackboard will have grades, announcements, sample tests • Look at blackboard announcements before sending e-mail to course staff Lab board handouts in progress • See Blackboard/admin page for TA office hours • OK to go to any scheduled lab section (but, give priority to scheduled students) • For Friday prelab give a good faith attempt to get things working by the deadline – If you hit a showstopper get it fixed on Tuesday so you can do Prelab 2 on time. 2 Design Example: Rack-Mount Power Supply Power supply for server • AC to DC conversion (750-1000W) • Coordinates 2 redundant supplies to maximize uptime • Safeguard against power problems (under/over-voltage; over-current; over-temp) Typical approach: • General microcontroller for AC, alarms, housekeeping • DSP runs control loop on DC side at > 10 KHz to provide stable DC http://accessories.us.dell.com Dell 870W Power Supply for PowerEdge R710 Server power Key requirement: “Doesn’t emit smoke” 3 Apple USB Power Adapter Teardown iPhone
    [Show full text]
  • Embedded Smart Health Monitoring System-Wearable Devices
    Volume 4, Issue 5, May – 2019 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Embedded Smart Health Monitoring System-Wearable Devices A Sushmitha, Anusha N S, Anusha S Raj Vidyashree. C Student, Dept of ECE, Assistant Professor, Dept of ECE, Dr. Ambedkar Institute of Technology, Dr. Ambedkar Institute of Technology, Bangalore, India. Bangalore, India. Abstract:- This paper gives an insight towards current The objective of developing monitoring systems is to trends and employed methodologies in wearable device reduce health care costs by reducing physician office visits, technology. In the present era it is essential to design a hospitalizations, and diagnostic testing procedure. The cost-effective healthcare system as it is essential to make doctors can continuously monitor the health of the patients the smart health systems available to all the people from any location. around the world. In this project we have developed a healthcare monitoring system which bears the track of II. OVERVIEW patient’s exercising postures, breathing patterns, glucose level detection along with the implementation of A wearable health monitoring system are being Peltier. With the advancement of technology and usage beneficial to common people as well as the health care of Cloud computing, it becomes easy for updation of systems in maintaining the patient‟s activeness or fitness these measured data. This automatic updation of data level and also for self-health tracking. The usage of prevents all the errors which can be caused by embedded systems along the recent technologies such as manually entering the data. IoT and Cloud Computing in healthcare systems has widened the scope of assessing the health of an individual Keywords:- Cloud, Wearable Device, Embedded patient‟s health conditions.
    [Show full text]
  • Prototyping Wearables: a Code-First Approach to the Design of Embedded Systems
    W&M ScholarWorks Arts & Sciences Articles Arts and Sciences 10-2016 Prototyping Wearables: A Code-First Approach to the Design of Embedded Systems Daniel Graham College of William and Mary, [email protected] Gang Zhou College of William and Mary, [email protected] Follow this and additional works at: https://scholarworks.wm.edu/aspubs Recommended Citation Graham, Daniel and Zhou, Gang, Prototyping Wearables: A Code-First Approach to the Design of Embedded Systems (2016). 10.1109/JIOT.2016.2537148 This Article is brought to you for free and open access by the Arts and Sciences at W&M ScholarWorks. It has been accepted for inclusion in Arts & Sciences Articles by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. 806 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 5, OCTOBER 2016 Prototyping Wearables: A Code-First Approach to the Design of Embedded Systems Daniel Graham and Gang Zhou, Senior Member, IEEE Abstract—As wearable devices become ubiquitous, there will by analyzing the code they are required to run, thereby allow- be an increased demand for platforms that allow engineers ing software developers with limited hardware experience to and researchers to quickly prototype and evaluate new wear- develop their own prototypes. The second context is that of able devices. However, many of these platforms require that the hardware be configured before the code is written, thereby lim- hardware/software co-design, where the experienced hardware iting the programmer to the limitations of the hardware. In this engineer is interested in optimizing a hardware design utiliz- paper, we present a platform that allows researchers and engi- ing information from the code that the platform is required neers to quickly prototype new wearable devices using a code-first to run.
    [Show full text]
  • UNIX-Like Operating Systems
    History OS UNIX UI UNIX-like Security Questions Operating Systems by Roman Szturc Simple, Low-Power Machines History user had sole use of the machine, OS program was loaded into the machine and the UNIX machine set to work, UI task is responsible for everything, Security Questions task totaly determines behavior of computer. machines came with libraries of support code which were linked to the user’s program to assist in operations such as input and output This would become the genesis of the modern-day operating system. More Powerful Computers History Later, more powerful computers appeared. They were OS characterized as follows: UNIX UI CPU is much faster than R/W operations, Security CPU is idle while R/W operation in progress, Questions CPU can perform other task while idle. Need to manage multiple tasks Task switching. Task scheduling. Operating System History OS An operating system (OS) is the system (low-level) UNIX UI software responsible for Security Questions direct control and management of hardware, task management, storage allocation, presentation of a default user interface. Program and Process process2 History OS data2 UNIX UI Security process1 Questions data1 PSfrag replacements program code memory Early Operating Systems History OS Early OS had some problems. The OS UNIX UI were very diverse — each OS specific to particular Security hardware, Questions used radically different models of commands and procedures, Typically, each time the manufacturer brought out a new machine, there would be a new OS. UNIX UNIX is an OS developed in the 1960s and 1970s by AT&T Bell Labs employees including K.
    [Show full text]
  • Testing & Validation Strategy for Industrial
    The need for a bespoke Testing and Validation strategy for Industrial Automation and Embedded Systems www.happiestminds.com Introduction The last few years have seen tectonic shifts in technology and part of that narrative has been the evolution of Industry 4.0 and the emergence of a software driven approach. Traditionally, a bulk of the investment in the Industrial world would have been allocated to hardware, however that is changing rapidly with the advent of advanced software platforms. In fact, Industrial software is now witness to a blending of Information Technology (IT) and Operational Technology (OT) leading to the creation of new platforms that combine data generated at the corporate level and data received from the field. The Industrial Automation segment has been bolstered by the rapid adoption of IoT which has resulted in reduced costs, flatter and open AI architectures, tighter integration of IT and OT and the ubiquity of edge devices and sensors. As Industrial Automation continues to evolve, end users and IA suppliers are at the crossroads where they must walk the fine line between risk and reward. The risk is in being overly enthusiastic and adopting new technologies before they have been proven at scale. Alternatively, not adopting these technologies until the point of stability can result in other risk savvy competitors forging ahead to snare a large portion of the market. A couple of years ago, we saw the emergence of open industrial system architectures with themes such as computing at the edge and multivendor interoperable open systems to name a few. Today, prominent industry initiatives like Industry 4.0 and Open Process Automation Forums are leading the transformation.
    [Show full text]