State of the Union Krste Asanovic UC Berkeley, RISC-V Foundation, & Sifive Inc

Total Page:16

File Type:pdf, Size:1020Kb

State of the Union Krste Asanovic UC Berkeley, RISC-V Foundation, & Sifive Inc State of the Union Krste Asanovic UC Berkeley, RISC-V Foundation, & SiFive Inc. [email protected] 7th RISC-V Workshop Western DiGital, Milpitas, CA November 28, 2017 What is RISC-V? § A hiGh-quality, license-free, royalty-free RISC ISA specification oriGinally from UC Berkeley § Standard maintained By non-profit RISC-V Foundation § SuitaBle for all types of computinG system, microcontrollers to supercomputers § Numerous proprietary and open-source cores § ExperiencinG rapid uptake in industry and academia § Supported By GrowinG shared software ecosystem § A work in proGress… What’s Different about RISC-V? § Simple - Far smaller than other commercial ISAs § Clean-slate design - Clear separation Between user and privileged ISA - Avoids µarchitecture or technoloGy-dependent features § A modular ISA desiGned for extensibility/specialization - Small standard Base ISA, with multiple standard extensions - Sparse and variaBle-lenGth instruction encodinG for vast opcode space § Stable - Base and standard extensions are frozen - Additions via optional extensions, not new versions § Community designed - Developed with leading industry/academic experts and software developers 3 RISC-V Timeline PrivileGed Arch, v1.10 RISC-V Foundation Incorporated RV32E, RVC 1.9 PrivileGed Arch, v1.7, RVC v1.7 Hot Chips 2014 User ISA v2.0 IMAFD SoC 1st Rocket tapeout, EOS14, 45nm Softcores User ISA v1.0, You Raven-1 tapeout (28nm), are Workshop RVC MS thesis Workshop Commercial th First Linux st st here 7 RISC-V ISA project BeGins 1 Commercial 1 Berkeley World 4 Modest RISC-V Project Goal Become the industry-standard ISA for all computing devices So, how’s it going? 5 Industry Adoption Status § Large companies adoptinG RISC-V for deeply emBedded controllers in their SoCs (“minion cores”) - NVIDIA are puBlic with this, others in proGress privately - Replaces home-Grown and commercial cores § CTOs across entire value chain of IC suppliers, system providers, service providers, are aware and imagininG/evaluatinG strateGies to leverage RISC-V 6 Replacing 2nd-tier ISAs § Smaller proprietary-ISA soft-core IP companies switching to RISC-V standard to access larGer market: - Andes - Codasip - Cortus - others to announce If you’re a softcore IP provider, you should have a RISC-V product in development 7 Government Adoption § India has adopted RISC-V as national ISA § US DARPA mandated RISC-V in recent security call for proposals § Israel Innovation Authority creatinG genPro platform around RISC-V § Other countries at various staGes of investiGation If your country wishes to control security of its own information infrastructure, and further its own domestic semiconductor industry, sponsor RISC-V 8 Startups § Many startups choosing RISC-V for new products § Most are stealthy so will not be visible for at least another year We haven’t had to tell startups about RISC-V; they find out pretty quickly when shopping for processor IP 9 Commercial Ecosystem Providers § A theme at this workshop is mainstream commercial ecosystem support - Express LoGic, Imperas, Lauterbach, Micrium, SeGGer, UltraSOC, … Demand is driving supply in commercial ecosystem 10 RISC-V in Academic Research § BecominG standard ISA for academic research - Celerity >500 RISC-V core SoC in 16nm FinFET - FireSim modelinG 1,024 quad-core RISC-V servers in cloud § Recent “1st Workshop on Computer Architecture Research using RISC-V” (CARRV) at 50th MICRO in Boston was larGest workshop (standinG room only) – even Bigger than machine learning tutorial 11 RISC-V in Education Available December! Books available now! RISC-V spreading quickly throughout curricula of top schools 12 RISC-V: Completing the Innovation Cycle Research Open ecosystem is key to keepinG the virtuous cycle GoinG Industry Education 13 Foundation: 100+ Members 14 RISC-V Foundation RISC-V Foundation Growth History August 2015 to November 2017 100 80 60 40 20 0 Q3 2015 Q4 2015 Q1 2016 Q2 2016 Q3 2016 Q4 2016 Q1 2017 Q2 2017 Q3 2017 Q4 2017 Platinum Gold Silver Auditor Individual 15 Marketing Committee § Hired Racepoint GloBal as Foundation marketinG firm § MessaGing & MarketinG Kit released § Social Media proGram active - ReGular Twitter & LinkedIn updates § Multiple RISC-V events (outside the Foundation) - CARRV, SoC Conf Irvine, EEWorld weBinar § WeBsite refresh – RISC-V news aGGreGator § 7th Workshop has 15 editors/analysts in attendance 16 Upcoming Events § RISC-V Tokyo (Dec 18th, 2017) § EmBedded World - Have RISC-V booth and day long RISC-V series of talks § 8th RISC-V workshop May 2018 in Barcelona - Other reGional events BeinG considered § DAC June 2018 § HotChips August 2018 § Linley Processor Conference October 2018 § More to come… 17 RISC-V Technical Roadmap for 2017 § Primary Goals were to formally standardize Base ISA, memory model, deBuG, and staBilize privileGed architecture for Unix ports and tapeouts § Several corners/holes of Base ISA fixed, But not quite ratified due to spec versus profiles clarifications - No plans to chanGe any instruction specifications versus 2.0 § Unix platform staBle as of priv 1.10 - Only Backward-compatiBle chanGes thereafter 18 ISA Specifications and Profiles § OriGinal ISA specs mixed instruction specifications with platform mandates - But difficult to aGree Given wide ranGe of platforms (4KiB microcontroller versus 1TiB Unix server) § Now separatinG instruction set specifications from platform profiles - Maximize reuse of instruction set specifications for different use cases - Constrain profiles more tiGhtly to simplify software compatiBility 19 Expanded naming of instruction sets § SinGle-letter names will run out someday § Need finer-grain naming of instruction sets to describe profiles: - some C instructions depend on F or D BeinG present - how to report multiply not divide implemented? - need to specify potentially dozens of crypto extensions § Use Zxxxx to name standard instruction extensions (Xyyy used for non-standard instructions) § ExistinG sinGle-letter names retain meaninG § In active discussion on isa-dev mailinG list 20 Profiles for Software Compatibility § Software ABI/SBI defines a profile - What harts, reGisters, instructions, memory are available - How process/OS is started/terminated - How I/O happens - For Unix, ABI/SBI assumes IMAFDC=gC instructions § Need profiles for M-mode-only microcontrollers - For portable libraries in M-mode § and profiles for MU-mode microcontrollers - For each RTOS using M&U modes § and for BootinG MSU platforms § Instruction specs reused in all these profiles § Aim to have first ready in Q1 2018 21 Memory Model § Original model was too weak for C11 and also underspecified § AmazinG work By many experts over course of year § We have a resolution: - RVWMO is RISC-V Base ISA memory model, weakly ordered - detailed formal specs, both axiomatic and operational! - mapping from C11 to base ISA only, and with A extension - also defined RVTSO as optional extension providinG stronG TSO memory model (RVTSO strict suBset of RVWMO) - see Daniel LustiG’s talk later this morninG 22 ABI and Compilers § Calling convention and ABI has Been staBilized and documented § GCC and binutils have been upstreamed and released in GCC 7.1 (SiFive, Andes) § LLVM upstream in proGress (lowRISC, Andes) § Other compilers/lanGuages: CompCert, go, Rust, OCaml, Jikes JVM, OpenJDK (not JIT yet), Forth, Pascal,… 23 Unix Platform § PrivileGed Architecture 1.10 released at last workshop § Intent is for future additions to Be Backwards- compatiBle with 1.10 § Linux port accepted upstream for 4.15 release! § FreeBSD mainline since 11.0 § Hypervisor spec released - DesiGned to support recursive virtualization usinG enhanced S mode § See Andrew Waterman’s talk next 24 Other OS Ports § Many other OS ports in proGress or completed - FreeRTOS - ZephyrOS - Apache MyNewt - RIOT - seL4 - uC/OS - LiteOS - RTEMS - ThreadX - … 25 Run-Halt Debug § Successful collaBoration Between many orGanizations has resulted in a stable version awaiting ratification § Provides an aBstract interface to deBuG system to support alternative implementation styles § BeinG tarGeted By commercial ecosystem partners 26 Summary of 2017 Technical Roadmap § All planned major technical decisions settled § Some more work on ratification process needed 27 Technical Roadmap Goals for 2018 § Complete ratification of Base ISA and first profiles - IMADFC, deBuG specifications - Unix ABI/SBI profiles - M, MU, and MSU-mode platform profiles § Base vector extensions proposed and ratified - Validate with compiler support in LLVM, gcc § Hypervisor implemented, spec ratified - KVM primary, Beehive and Xen secondary § Formal spec completed and released 28 Vector Extensions § ReconfiGuraBle, vector-lenGth-aGnostic, mixed-precision, vector unit that replaces other ISAs’ packed-SIMD extensions § Ideal for machine learninG, DSP, Graphics, supercomputinG,… § ConsideraBle movement on desiGn, GettinG simpler § Support for scalar, 1D vector, and 2D matrix “shapes”of various types (floatinG, int, 8B, 16B, 32B, .., 512B) § Crypto extension Builds on wide scalar Bit vectors § “Best Vector ISA Ever” ™ § Talk tomorrow By RoGer Espasa 29 Security § Really two separaBle efforts in Foundation: - Trusted execution environments (TEE) - CryptoGraphic instruction extensions § Much other work includinG MIT Sanctum (enclaves), lowRISC (taGGed memory), CHERI (capaBilities), Dover (accelerated metadata rules), secure Boot (Microsemi, RamBus), … § RISC-V is dominatinG security research § Everyone aGrees security is really important § No industry aGreement on riGht
Recommended publications
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Using Mcuboot with RA Family Mcus Introduction Mcuboot Is a Secure Bootloader for 32-Bit Mcus
    Application Note Renesas RA Family Using MCUboot with RA Family MCUs Introduction MCUboot is a secure bootloader for 32-bit MCUs. It defines a common infrastructure for the bootloader, defines system flash layout on microcontroller systems, and provides a secure bootloader that enables easy software update. MCUboot is operating system and hardware independent and relies on hardware porting layers from the operating system it works with. The Renesas Flexible Software Package (FSP) integrates an MCUboot port starting from FSP v3.0.0. Users can benefit from using the FSP MCUboot Module to create a Root of Trust (RoT) for the system and perform secure booting and fail-safe application updates. The MCUboot is maintained by Linaro in the GitHub mcu-tools page https://github.com/mcu-tools/mcuboot. There is a \docs folder that holds the documentation for MCUboot in .md file format. This application note will refer to the above-mentioned documents wherever possible and is intended to provide additional information that is related to using the MCUboot Module with Renesas RA FSP v3.0.0 or later. This application note walks the user through application project creation using the MCUboot Module on Renesas EK-RA6M4 and EK-RA6M3 kits. Example projects for the use case of designing with TrustZone for multi-image support is provided for EK-RA6M4. Example projects for the use case of designing with single image support is provided for EK-RA6M3. The MCUboot Module is supported across the entire RA MCU Family. Guidelines of how to adapt the example project configurations for other RA Family MCUs are provided.
    [Show full text]
  • Technical Overview 11 October 2016 Problem and Context
    Technical Overview 11 October 2016 Problem and Context First release of a successful connected product… …. now make that repeatable please. An Open Source OS for MCUs • Open source networking stacks: Bluetooth Host and Controller • Pre-empGve, ckless RTOS with power management Security • Secure bootloader and Image Upgrade Networking Stats & Console & Config & • Flash FS and Access Mechanisms Logging Shell Upgrade Drivers Power • Build & Package Management OS HAL • Management Interfaces Secure Bootloader & FFS A Community Driven OS Why Apache So<ware Founda?on? Cloud Providers IP Providers • Liberal, BSD-style license • Strong Licensing and IP policies • Meritocracy • Free to contribute, contributors control project direcGon. • History of working with large organizaons: IBM, Pivotal/ EMC, MicrosoY. • Many years experience managing large, complex projects (e.g., Apache, Hadoop, MCU Vendors End-Users Subversion) Community driven open source best way to maintain healthy ecosystem RTOS • Tickless operaon: low power hooks • Driver Interface • Pre-empGve, mulGtasking RTOS • Strict priority-based scheduling • Up to 253 different priority levels • Unified buffer management • Resource uGlizaon tracking and watchdog • High-resoluGon Gmers • Built-in tasks: • Idle RTOS - Event Driven Model • Event Queues provide a mechanism for “mostly-sleeping” asynchronous tasks • Wake-up on: • Message from another Task • Timer • I/O state change • Incoming packet • Watchdog • Perform operaons: • Send an alert • Respond to a request • Schedule a wakeup • Go back to
    [Show full text]
  • Zephyr-RTOS Übersicht Und Status
    Zephyr-RTOS Übersicht und Status ECC 1. Juni 2021, © Markus Kappeler About me ● Markus Kappeler ● 25 years in business ● Soft- and Hardware development ● Founder of bytesatwork ● Sailing, Skiing Hiking and Mountain-Biking Agenda ● Zephyr ● Was ist Zephyr ● Features ● Roadmap ● RTOS – Realtime ● Footprint ● Bootloader mcuboot Zephyr Project ● Opensource Realtime Betriebsystem ● Lebendige Community ● Mehrere Architekturen ● Modular und Konfigurierbar ● Bereit für Produkt-Entwicklung Zephyr Hardware Architekturen Zephyr Projekt Mitglieder Februar 2016 2021 Upstream commits last year Momentum 2016 2021 Entwickler 80 969 Commits 2806 52591 Boards 4 250+ Zephyr Board-Unterstützung Siehe auch: https://docs.zephyrproject.org/latest/boards/index.html Zephyr Ecosystem Kernel / HAL Zephyr OS Zephyr “Community” • Scheduler • Kernel objects und services • Kernel und HAL Zephyr Project • low-level Architektur und BSP • OS Services wie IPC, Logging, file • Power Management und low level systems, crypto Interfaces zur Hardware Zephyr Project OS Services and Low level APIs • Plattform spezifische Treiber Zephyr OS • Generisches I/O API • SDK, Tools und Kernel / HAL Entwicklungsumgebung • File systems, Logging, Debugging und IPC • Zusätzliche Middleware OS Services • Cryptography Services • Device Management und Application Services Bootloader • Networking und Connectivity Application Services Zephyr Community • High Level APIs • Zugang zu standardisierten Daten • 3rd Party Module und Bibliotheken Modellen • Support für Zephyr in 3rd Party • High Level
    [Show full text]
  • Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
    Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material.
    [Show full text]
  • A Rust-Based Runtime for the Internet of Things
    A Rust-based Runtime for the Internet of Things Fredrik Nilsson Niklas Adolfsson Department of Computer Science and Engineering CHALMERS UNIVERSITY OF TECHNOLOGY UNIVERSITY OF GOTHENBURG Gothenburg, Sweden 2017 Master’s thesis 2017 A Rust-based Runtime for the Internet of Things Fredrik Nilsson Niklas Adolfsson Department of Computer Science and Engineering Chalmers University of Technology University of Gothenburg Gothenburg, Sweden 2017 A Rust-based Runtime for the Internet of Things Fredrik Nilsson Niklas Adolfsson © Fredrik Nilsson, Niklas Adolfsson, 2017. Supervisor: Olaf Landsiedel Examiner: Magnus Almgren Master’s Thesis 2017 Department of Computer Science and Engineering Chalmers University of Technology and University of Gothenburg SE-412 96 Gothenburg Telephone +46 31 772 1000 Typeset in LATEX Gothenburg, Sweden 2017 iv A Rust-based Runtime for the Internet of Things Fredrik Nilsson Niklas Adolfsson Department of Computer Science and Engineering Chalmers University of Technology and University of Gothenburg Abstract As the number of connected devices increases, known as the Internet of Things (IoT), reliability and security become more important. C and C++ are common programming languages for IoT devices, mostly due to their fine-grained memory management and low runtime overhead. As these languages are not memory-safe and memory management has proven to be difficult to handle correctly, problems such as buffer overflows and dangling pointers are likely to increase as the IoT de- vices become more prevalent. These problems can result in reliability and security issues. In contrast to C and C++, Rust is a memory-safe systems programming lan- guage that, just like C and C++, provides low runtime overhead and fine-grained memory management.
    [Show full text]
  • Justin Mclean Iot Sydney Email: [email protected] Twitter: @Justinmclean Who Am I?
    The Internet of Things Justin Mclean IoT Sydney Email: [email protected] Twitter: @justinmclean Who am I? • Freelance developer • Programming for 25 years • Apache Flex PMC, Incubator PMC, Apache member • Run IoT meetup group in Sydney Australia • Been tinkering with Arduino and open source hardware for 5+ years Internet of Things? • Small mostly dumb, low cost, low power computers • Sense the environment around them • Collate and push data up to somewhere to be analysed • Enable something be controlled in some way Rapid Growth • Rapid growth over the last few years • Estimated 6 billion connected things • 25-100 billion connected things by 2020 • 1-20 trillion industry by 2020 What’s Changed • Long tail of Moore’s Law • Small cheap fast electronics • Easy to program chips • Rapid prototyping • Low cost and low volume manufacture Pebble Pebble Prototype Clyde Inside Clyde Brad the Toaster Problems • Power • Reliable bandwidth / communication • Standards - everyone has their own • Security • Who owns the data? • Licensing Open Source Hardware • Same as Open Source software right? • Copyright and licensing • Physical things require manufacture • Costs to consider • Distribution issues • Some assembly required Is it really Open Source? • Where do you draw the line? • Can it easily be made? • Is all software available? • Can you easily modify it? OSHWA • Open Source Hardware Association http://www.oshwa.org • Came up with a defnition of OSHW • Checklist and guidelines • Must be documented! • Clarifes issue such as dual licensing (you
    [Show full text]
  • Upkit: an Open-Source, Portable, and Lightweight Update Framework For
    Paper published at the 39th IEEE International Conference on Distributed Computing Systems (ICDCS) in July 2019 UpKit: An Open-Source, Portable, and Lightweight Update Framework for Constrained IoT Devices Antonio Langiu, Carlo Alberto Boano, Markus Schuß, and Kay Romer¨ Institute of Technical Informatics, Graz University of Technology, Austria E-mail: [email protected]; [email protected]; [email protected]; [email protected] Abstract—Updating the software running on constrained IoT to embed some software update capabilities in the firmware devices such as low-power sensors and actuators in a secure and running on each IoT device [6], [7]. Such capabilities include, efficient way is an open problem. The limited computational, among others, the (over-the-air) download of the update image, memory, and storage capabilities of these devices, together with their small energy budget, indeed, restrict the number of features the verification of its integrity and authenticity, as well as its that can be embedded into an update system and make it installation [8]. All these steps should be performed while also difficult to build a generic and compact solution. As a minimizing the downtime of a device and its services. result, existing update systems for constrained IoT devices are often not portable, do not perform a proper verification of the Updating constrained IoT devices. Updating the software downloaded firmware, or focus only on a single phase of the running on constrained IoT devices, e.g., low-power sensors update process, which exposes them to security threats and calls and actuators [9], is still an open research problem [6], for new solutions.
    [Show full text]
  • Paralel Gerçek Zamanli Kiyaslama Uygulama Takimi
    T.C. SAKARYA ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ PARALEL GERÇEK ZAMANLI KIYASLAMA UYGULAMA TAKIMI YÜKSEK LİSANS TEZİ Sevil SERTTAŞ Enstitü Anabilim Dalı : BİLGİSAYAR VE BİLİŞİM MÜHENDİSLİĞİ Tez Danışmanı : Dr. Öğr. Üyesi Veysel Harun ŞAHİN Nisan 2019 TEŞEKKÜR Yüksek lisans eğitimim boyunca değerli bilgi ve deneyimlerinden yararlandığım, araştırmanın planlanmasından yazılmasına kadar tüm aşamalarında yardımlarını esirgemeyen değerli danışman hocam Dr. Öğr. Üyesi Veysel Harun ŞAHİN’e teşekkürlerimi sunarım. i İÇİNDEKİLER TEŞEKKÜR ........................................................................................................... i İÇİNDEKİLER ...................................................................................................... ii SİMGELER VE KISALTMALAR LİSTESİ ....................................................... iv ŞEKİLLER LİSTESİ ............................................................................................. v TABLOLAR LİSTESİ ........................................................................................... vi ÖZET ..................................................................................................................... vii SUMMARY ........................................................................................................... viii BÖLÜM 1. GİRİŞ …………………………………………………………….................................... 1 BÖLÜM 2. WCET .................................................................................................................... 3 BÖLÜM 3. KIYASLAMA UYGULAMALARI
    [Show full text]
  • Tcc Engenharia Eletrica
    UNIVERSIDADE DO SUL DE SANTA CATARINA MAX BACK SISTEMA EMBARCADO COM RTOS: UMA ABORDAGEM PRÁTICA E VOLTADA A PORTABILIDADE Palhoça 2018 MAX BACK SISTEMA EMBARCADO COM RTOS: UMA ABORDAGEM PRÁTICA E VOLTADA A PORTABILIDADE Trabalho de Conclusão de Curso apresentado ao Curso de Graduação em Engenharia Elétrica com ênfase em Telemática da Universidade do Sul de Santa Catarina como requisito parcial à obtenção do título de Engenheiro Eletricista. Orientador: Prof. Djan de Almeida do Rosário, Esp. Eng. Palhoça 2018 Dedico este trabalho а Deus, por ser o verdadeiro princípio e fim de todas as coisas (das que valem a pena). AGRADECIMENTOS Agradeço a minha esposa Gizele e meus filhos, Eric e Thomas, meus pais e a toda minha família que, com muito carinho е apoio, não mediram esforços para que eu chegasse até esta etapa de minha vida. Agradeço aos professores do curso por terem transmitido seu conhecimento a mim e meus colegas com tanto empenho e dedicação. Não existe triunfo sem perda, não há vitória sem sofrimento, não há liberdade sem sacrifício. (O Senhor dos Anéis – J.R.R. Tolkien, 1954) RESUMO A crescente demanda pelo desenvolvimento de solução conectadas entre sistemas já existentes, assim como a ampliação do uso destes sistemas embarcados mostram a importância de soluções robustas, de tempo real, com ciclos de desenvolvimento cada vez mais curtos e necessidade de reaproveitamento de código. Este trabalho apresenta a seleção do sistema operacional de tempo real FreeRTOS e o experimento de sua utilização como base para o desenvolvimento de um controlador wearable (vestível) em duas plataformas de hardware diferentes, implementando a solução inicialmente em uma delas e depois portando para a outra plataforma, desenvolvendo principalmente a programação específica do novo hardware e procurando manter a parte da aplicação inalterada e independente de plataforma.
    [Show full text]
  • Enabling Energy Efficient Smart Object Networking at Internet-Scale: Experimental Tools, Software Platform, and Information-Cent
    Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols Oliver Hahm To cite this version: Oliver Hahm. Enabling Energy Efficient Smart Object Networking at Internet-Scale : Experimental Tools, Software Platform, and Information-Centric Networking Protocols. Networking and Internet Architecture [cs.NI]. Université Paris-Saclay, 2016. English. NNT : 2016SACLX090. tel-01505064 HAL Id: tel-01505064 https://pastel.archives-ouvertes.fr/tel-01505064 Submitted on 10 Apr 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. NNT : 2016SACLX090 Thèse de doctorat de l’Université Paris-Saclay préparée à Ecole Polytechnique École doctorale n∘580 Sciences et technologies de l’information et de la communication Spécialité de doctorat: Informatique par M. Oliver Hahm Enabling Energy Efficient Smart Object Networking at Internet-Scale Experimental Tools, Software Platform, and Information-Centric Networking Protocols Thèse présentée et soutenue à Berlin, le 01 décembre 2016. Composition du Jury : M. Jochen H. Schiller Professeur (Président du jury) Freie Universität Berlin M. Carsten Bormann Professeur (Rapporteur) Universität Bremen M. Dirk Kutscher Docteur (Rapporteur) Huawei German Research Center M. Anis Laouiti Maître de conférences (Examinateur) Telecom SudParis M.
    [Show full text]
  • Dr. Amr Bekhit, Phd Şirket Sahibi, Helmpcb Gömülü Sistemler Danışmanlığı
    Dr. Amr Bekhit, PhD Şirket Sahibi, HelmPCB Gömülü Sistemler Danışmanlığı [email protected] https://helmpcb.com https://www.linkedin.com/in/amrbekhit/ Hakkımda • Otomotiv, endüstriyel ve patlayıcı (ATEX/IECEx/Exproof) ortamlarda olduğu gibi zor şartlarda çalışmak üzere ürün tasarlayarak hem elektronik hem de mekanik mühendisliği alanlarında 12 senelik tecrübeye sahip gömülü sistem uzmanıyım. • İngiltere’deki Leeds Üniversitesinde Mekatronik ve Robotik Mühendisliği bölümünden doktora derecesiyle mezun oldum. • Küçük firmalarda çalıştığım için, müşteri hizmetleri, taşeron kadroları yönetmek ve üretim düzenlemek gibi ürün geliştirme alanında teknik olmayan (soft skills) konularda da geniş tecrübeye sahibim. • Yeni kavram ve teknolojileri hızlı bir şekilde öğrenip pratik çözümlere dönüştürmek için kabiliyetliyim. Eğitim • “Dolu Su Borularında Çalışmak Üzere Paralel Platformları Kullanan Robot” adlı tezi ile Doktora, Leeds Üniversitesi, 2015. (http://etheses.whiterose.ac.uk/12674/) • Mekatronik Bölümünden 1. Sınıf Onur Derecesiyle Lisans, Leeds Üniversitesi, 2008. Nitelikler ATEX/IECEx Exproof Kendinden Emniyetli Tasarım: • Kendinden emniyetli devre tasarımı (Zone 0) • Son belgelendirme • EMC, çevre ve IP testleri • Denetimlere hazırlama • Teknik dokümantasyon yazma • Kalite sistemleri yürütme Gömülü Linux Sistemleri: • Bootloader ve kernel ayarlama ve derleme • Python, Go ve Node-Red ile uygulama • Devicetree dosyasını oluşturma geliştirme • Sürücü tadil etme, hata bulma ve aktarma • Mender.io güncelleme sistemini entegre etme • Buildroot ile
    [Show full text]