Architecture of Distributed Real-Time Embedded System

Total Page:16

File Type:pdf, Size:1020Kb

Architecture of Distributed Real-Time Embedded System Architecture of distributed real-time embedded system CHEUK WING LEUNG KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013 TRITA-ICT-EX-2013:155 Architecture of distributed real-time embedded system Master of Science Thesis CHEUK WING LEUNG Supervisor: Examiner: Detlef Scholle, XDIN AB Mats Brorsson, KTH Barbro Claesson, XDIN AB TRITA-ICT-EX-2013:155 Acknowledgements My deepest gratitude goes to my supervisors Detlef Scholle and Barbro Claesson for giving me this opportunity to work in the project. They have inspired me and given me valuable advices throughout the project. I would like to thank the examiner Mats Brorsson for the support and guidance to my thesis project. I thank the employees in XDIN AB for good company and creating an good environment during the project. Especially Sebastian Ullström and David Skoglund for the help in testing of the system and developing the demonstration setup. I want to thank Joanna Larsson, Amir Kouhestani, José Pérez, Robin Hultman and Tobias Lindblad, the students who working together in the same project for moral support and inspiring discussions on details of the project. Finally, I would like to thank my parents and my friends, especially Markus Näslund for all of the support. Abstract CRAFTERS (Constraint and Application Driven Frame- work for Tailoring Embedded Real-time System) project aims to address the problem of uncertainty and heterogene- ity in a distributed system by providing seamless, portable connectivity and middleware. This thesis contributes to the project by investigating the techniques that can be used in a distributed real-time embedded system. The conclusion is that, there is a list of specifications to be meet in order to provide a transparent and real-time distributed system. This thesis has implemented a basic system that pro- vides support of scalability, accessibility, fault tolerant and consistency. The system is tested in different areas and it shows its potentials to be a well transparent real-time system. This built the basis for further development. Contents Contents List of Figures List of Tables List of Abbreviations 1 Introduction 1 1.1 Background . 1 1.2 Problemstatement............................ 2 1.3 Team goal . 2 1.4 Method .................................. 2 1.4.1 Theoretical study . 2 1.4.2 Implementation . 2 1.5 Delimitations ............................... 3 2 Requirements of the system 4 2.1 Overviewoftherequirements . 4 2.2 Explanations of the requirements . 5 3 Distributed Real-time Embedded System 7 3.1 Motivation on distributed system . 7 3.1.1 Centralizedsystem........................ 7 3.1.2 Decentralizedsystem....................... 8 3.1.3 Distributedsystem........................ 9 3.2 Background of Distributed Real-time Embedded System . 9 3.2.1 Real-time system . 10 3.2.2 Embeddedsystem ........................ 10 3.3 Challenges in distributed real-time embedded system . 11 3.3.1 Embedded concerns . 11 3.3.2 Distributed concerns . 11 3.3.3 Real-time concerns . 11 3.3.4 Dimensions of middleware . 12 CONTENTS 3.4 Summary of the distributed real-time embedded system . 14 4 Middleware Architecture 15 4.1 Structureofamiddleware ........................ 15 4.1.1 Communication within the system . 15 4.1.2 Synchronous protocol within the system . 16 4.1.3 QoS support . 17 4.1.4 Transparent to applications and system . 18 4.1.5 Fault-tolerant . 19 4.1.6 Consistency control . 19 4.1.7 Other coordinating units . 19 4.2 Related work: TAO . 20 4.2.1 Object-oriented middleware . 20 4.2.2 TAOStructure .......................... 21 4.2.3 Communication in TAO . 21 4.2.4 Synchronization Protocol in TAO . 22 4.2.5 QoS support in TAO . 23 4.2.6 Interface in TAO . 23 4.2.7 Fault-tolerant in TAO . 24 4.2.8 Consistency control in TAO . 25 4.2.9 Additional feature in TAO . 26 4.3 Related work: AUTOSAR . 27 4.3.1 Component-based middleware . 28 4.3.2 AUTOSAR Structure . 28 4.3.3 Communication in AUTOSAR . 29 4.3.4 Synchronization Protocol in AUTOSAR . 30 4.3.5 QoS support in AUTOSAR . 31 4.3.6 Interface in AUTOSAR . 32 4.3.7 Fault-tolerant in AUTOSAR . 32 4.3.8 Consistency control in AUTOSAR . 33 4.3.9 Additional feature in AUTOSAR . 34 4.4 Related work: DySCAS . 34 4.4.1 Policy-based middleware . 34 4.4.2 DySCAS Structure . 35 4.4.3 Communication in DySCAS . 36 4.4.4 Synchronization Protocol in DySCAS . 36 4.4.5 QoS support in DySCAS . 36 4.4.6 Interface in DySCAS . 38 4.4.7 Fault-tolerant in DySCAS . 38 4.4.8 Consistency control in DySCAS . 38 4.4.9 Additional feature in DySCAS . 39 4.5 Summary of middleware architecture . 39 5 Discussions on the Middleware 40 CONTENTS 5.1 Summary of architecture comparison . 40 5.2 Embeddedconcerns ........................... 40 5.3 Real-time performance . 42 5.4 Accessibilitytransparent. 42 5.5 Migratability transparent . 43 5.6 Concurrency transparent . 43 5.7 Scalability transparent . 44 5.8 Failure transparent . 44 5.9 Reconfigurability . 45 5.10 Summary of discussions . 46 6 Specification for System Design 48 6.1 System specification . 48 6.1.1 Approach . 48 6.1.2 Communication . 48 6.1.3 Synchronization protocol . 49 6.1.4 QoS support . 49 6.1.5 Fault-tolerant . 49 6.1.6 Consistency Control . 50 6.2 Summary of the system specification . 50 7 Design of the middleware 51 7.1 Overview ................................. 51 7.2 Operation in the system . 52 7.3 Systemobject............................... 52 7.3.1 System interface . 52 7.3.2 Database handler . 53 7.3.3 Scheduler ............................. 55 7.3.4 Signal handler . 56 7.3.5 Resource manager . 57 7.3.6 Fault detector . 58 7.3.7 Trace handler . 59 7.4 Wrapper object . 59 7.4.1 Wrapper interface . 59 7.4.2 Middleware . 59 7.4.3 Client handler . 60 7.5 Task object . 60 7.5.1 Task interface . 60 7.6 Summary of the design . 60 8 Implementation 62 8.1 Overview ................................. 62 8.2 Real-time support . 62 8.2.1 Task distribution . 62 CONTENTS 8.2.2 Simulation and results . 63 8.3 Scalability support . 64 8.3.1 Group sending . 64 8.3.2 Simulation and results . 65 8.3.3 Asynchronous method handling . 68 8.3.4 Simulation and results . 69 8.4 Accessibilitytransparency . 70 8.4.1 Trading and naming . 70 8.4.2 Centralized communication . 71 8.4.3 Simulation and results . 71 8.5 Fault tolerance . 72 8.5.1 Fault detection and signal redirection . 72 8.5.2 Simulation and results . 72 8.6 Consistency................................ 74 8.6.1 Resource locking . 74 8.6.2 Simulation and results . 74 8.7 Use case: brake-by-wire system . 75 8.7.1 Introduction of brake-by-wire system . 75 8.7.2 Simulation setup of the use case . 76 8.7.3 Challenges of brake-by-wire system . 77 8.7.4 Two-phased execution . 77 8.7.5 Group receiving . 77 8.7.6 Results of the use case . 78 8.8 Conclusion on the implementation . 78 9 Conclusion and Future Work 80 9.1 Conclusion on the project . 80 9.2 Limitations . 80 9.3 Futurework................................ 81 A System interface B Wrapper interface C Task interface Bibliography List of Figures 3.1 CentralizedSystem.............................. 8 3.2 DecentralizedSystem ............................ 8 3.3 DistributedSystem.............................. 9 4.1 Synchronous Communication . 16 4.2 Asynchronous Communication . 17 4.3 TAOStructure[15] .............................. 21 4.4 Middle-tier Server Blocking Protocol . 22 4.5 Asynchronous Method Handling Synchronization Protocol . 22 4.6 StructureoftheCORBAInterface . 24 4.7 Infrastructure of the Fault-Tolerant Service . 25 4.8 Server Queue-Based Worker Thread Pool Server . 27 4.9 Leader/Followers Thread Pool Server . ..
Recommended publications
  • IBM Research Report Proceedings of the IBM Phd Student Symposium at ICSOC 2006
    RC24118 (W0611-165) November 28, 2006 Computer Science IBM Research Report Proceedings of the IBM PhD Student Symposium at ICSOC 2006 Ed. by: Andreas Hanemann (Leibniz Supercomputing Center, Germany) Benedikt Kratz (Tilburg University, The Netherlands) Nirmal Mukhi (IBM Research, USA) Tudor Dumitras (Carnegie Mellon University, USA) Research Division Almaden - Austin - Beijing - Haifa - India - T. J. Watson - Tokyo - Zurich Preface Service-Oriented Computing (SoC) is a dynamic new field of research, creating a paradigm shift in the way software applications are designed and delivered. SoC technologies, through the use of open middleware standards, enable collab- oration across organizational boundaries and are transforming the information- technology landscape. SoC builds on ideas and experiences from many different fields to produce the novel research needed to drive this paradigm shift. The IBM PhD Student Symposium at ICSOC provides a forum where doc- toral students conducting research in SoC can present their on-going dissertation work and receive feedback from a group of well-known experts. Each presentation is organized as a mock thesis-defense, with a committee of 4 mentors providing extensive feedback and advice for completing a successful PhD thesis. This for- mat is similar to the one adopted by the doctoral symposia associated with ICSE, OOPSLA, ECOOP, Middleware and ISWC. The closing session of the symposium is a panel discussion where the roles are reversed, and the mentors answer the students’ questions about research careers in industry and academia. The symposium agenda also contains a keynote address on writing a good PhD dissertation, delivered by Dr. Priya Narasimhan, Assistant Professor at Carnegie Mellon University and member of the ACM Doctoral Dissertation Committee.
    [Show full text]
  • What We Know About Testing Embedded Software
    What we know about testing embedded software Vahid Garousi, Hacettepe University and University of Luxembourg Michael Felderer, University of Innsbruck Çağrı Murat Karapıçak, KUASOFT A.Ş. Uğur Yılmaz, ASELSAN A.Ş. Abstract. Embedded systems have overwhelming penetration around the world. Innovations are increasingly triggered by software embedded in automotive, transportation, medical-equipment, communication, energy, and many other types of systems. To test embedded software in a cost effective manner, a large number of test techniques, approaches, tools and frameworks have been proposed by both practitioners and researchers in the last several decades. However, reviewing and getting an overview of the entire state-of-the- art and the –practice in this area is challenging for a practitioner or a (new) researcher. Also unfortunately, we often see that some companies reinvent the wheel (by designing a test approach new to them, but existing in the domain) due to not having an adequate overview of what already exists in this area. To address the above need, we conducted a systematic literature review (SLR) in the form of a systematic mapping (classification) in this area. After compiling an initial pool of 560 papers, a systematic voting was conducted among the authors, and our final pool included 272 technical papers. The review covers the types of testing topics studied, types of testing activity, types of test artifacts generated (e.g., test inputs or test code), and the types of industries in which studies have focused on, e.g., automotive and home appliances. Our article aims to benefit the readers (both practitioners and researchers) by serving as an “index” to the vast body of knowledge in this important and fast-growing area.
    [Show full text]
  • Design and Architectures for Signal and Image Processing
    EURASIP Journal on Embedded Systems Design and Architectures for Signal and Image Processing Guest Editors: Markus Rupp, Dragomir Milojevic, and Guy Gogniat Design and Architectures for Signal and Image Processing EURASIP Journal on Embedded Systems Design and Architectures for Signal and Image Processing Guest Editors: Markus Rupp, Dragomir Milojevic, and Guy Gogniat Copyright © 2008 Hindawi Publishing Corporation. All rights reserved. This is a special issue published in volume 2008 of “EURASIP Journal on Embedded Systems.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Editor-in-Chief Zoran Salcic, University of Auckland, New Zealand Associate Editors Sandro Bartolini, Italy Thomas Kaiser, Germany S. Ramesh, India Neil Bergmann, Australia Bart Kienhuis, The Netherlands Partha S. Roop, New Zealand Shuvra Bhattacharyya, USA Chong-Min Kyung, Korea Markus Rupp, Austria Ed Brinksma, The Netherlands Miriam Leeser, USA Asim Smailagic, USA Paul Caspi, France John McAllister, UK Leonel Sousa, Portugal Liang-Gee Chen, Taiwan Koji Nakano, Japan Jarmo Henrik Takala, Finland Dietmar Dietrich, Austria Antonio Nunez, Spain Jean-Pierre Talpin, France Stephen A. Edwards, USA Sri Parameswaran, Australia Jurgen¨ Teich, Germany Alain Girault, France Zebo Peng, Sweden Dongsheng Wang, China Rajesh K. Gupta, USA Marco Platzner, Germany Susumu Horiguchi, Japan Marc Pouzet, France Contents
    [Show full text]
  • Middleware-Based Database Replication: the Gaps Between Theory and Practice
    Appears in Proceedings of the ACM SIGMOD Conference, Vancouver, Canada (June 2008) Middleware-based Database Replication: The Gaps Between Theory and Practice Emmanuel Cecchet George Candea Anastasia Ailamaki EPFL EPFL & Aster Data Systems EPFL & Carnegie Mellon University Lausanne, Switzerland Lausanne, Switzerland Lausanne, Switzerland [email protected] [email protected] [email protected] ABSTRACT There exist replication “solutions” for every major DBMS, from Oracle RAC™, Streams™ and DataGuard™ to Slony-I for The need for high availability and performance in data Postgres, MySQL replication and cluster, and everything in- management systems has been fueling a long running interest in between. The naïve observer may conclude that such variety of database replication from both academia and industry. However, replication systems indicates a solved problem; the reality, academic groups often attack replication problems in isolation, however, is the exact opposite. Replication still falls short of overlooking the need for completeness in their solutions, while customer expectations, which explains the continued interest in developing new approaches, resulting in a dazzling variety of commercial teams take a holistic approach that often misses offerings. opportunities for fundamental innovation. This has created over time a gap between academic research and industrial practice. Even the “simple” cases are challenging at large scale. We deployed a replication system for a large travel ticket brokering This paper aims to characterize the gap along three axes: system at a Fortune-500 company faced with a workload where performance, availability, and administration. We build on our 95% of transactions were read-only. Still, the 5% write workload own experience developing and deploying replication systems in resulted in thousands of update requests per second, which commercial and academic settings, as well as on a large body of implied that a system using 2-phase-commit, or any other form of prior related work.
    [Show full text]
  • Scheduling Many-Task Workloads on Supercomputers: Dealing with Trailing Tasks
    Scheduling Many-Task Workloads on Supercomputers: Dealing with Trailing Tasks Timothy G. Armstrong, Zhao Zhang Daniel S. Katz, Michael Wilde, Ian T. Foster Department of Computer Science Computation Institute University of Chicago University of Chicago & Argonne National Laboratory [email protected], [email protected] [email protected], [email protected], [email protected] Abstract—In order for many-task applications to be attrac- as a worker and allocate one task per node. If tasks are tive candidates for running on high-end supercomputers, they single-threaded, each core or virtual thread can be treated must be able to benefit from the additional compute, I/O, as a worker. and communication performance provided by high-end HPC hardware relative to clusters, grids, or clouds. Typically this The second feature of many-task applications is an empha- means that the application should use the HPC resource in sis on high performance. The many tasks that make up the such a way that it can reduce time to solution beyond what application effectively collaborate to produce some result, is possible otherwise. Furthermore, it is necessary to make and in many cases it is important to get the results quickly. efficient use of the computational resources, achieving high This feature motivates the development of techniques to levels of utilization. Satisfying these twin goals is not trivial, because while the efficiently run many-task applications on HPC hardware. It parallelism in many task computations can vary over time, allows people to design and develop performance-critical on many large machines the allocation policy requires that applications in a many-task style and enables the scaling worker CPUs be provisioned and also relinquished in large up of existing many-task applications to run on much larger blocks rather than individually.
    [Show full text]
  • Runtime Monitoring of Web Service Choreographies Using Streaming XML
    Runtime Monitoring of Web Service Choreographies Using Streaming XML ∗ Sylvain Hall´e Roger Villemaire University of California, Santa Barbara Universit´edu Qu´ebec `aMontr´eal Department of Computer Science C.P. 8888, Succ. Centre-ville Santa Barbara, CA 9310-65110 Montreal, Canada H3C 3P8 [email protected] [email protected] ABSTRACT web services. Since most web services exchange XML mes- A wide range of web service choreography constraints on sages, one can refer to a recorded trace as an XML “docu- the content and sequentiality of messages can be translated ment” that can be analyzed using standard XML tools, us- into Linear Temporal Logic (LTL). Although they can be ing for example the XML Query Language (XQuery) [19,28]. checked statically on abstractions of actual services, it is However, most works attempting to tap on the resources desirable that violations of these specifications be also de- available in XQuery engines operate in a post mortem fash- tected at runtime. In this paper, we show that, given a ion: an instance of a choreography must be finished be- suitable translation of LTL formulæ into XQuery expres- fore analysis can take place on a complete XML document. sions, such runtime monitoring of choreography constraints While in some cases, a post mortem analysis on recorded is possible by feeding the trace of messages to a streaming traces is appropriate, there exist situations where violations XQuery processor. The forward-only fragment of LTL is in- of a specification must be addressed as soon as they are troduced; it represents the fragment of LTL supported by discovered.
    [Show full text]
  • Advanced Digital Broadcast Holdings S.A. Annual Report
    ADVANCED DIGITAL BROADCAST HOLDINGS S.A. ANNUAL REPORT 2006 Art Director: Ireneusz Golka Contents To Our Shareholders ……………… 6 Business, Operations and Strategy … 9 Corporate Governance …………… 29 Consolidated Financial Statements … 57 Statutory Financial Statements … 101 2006 : a technology year Business Highlights Revenue growing 5% to US$ 262 million Record half-year revenue at US$ 164.3 million 6 new Set-Top Box customers Hansenet (Germany, IPTV), Island Media (US, Satellite), ITI Neovision (Poland, Satellite), Telefonica O2 Czech Republic (Czech Republic, IPTV), Telecom Project 5 (Russia, Terrestrial), Jazztel (Spain, IPTV) Shift to high-end: HD-MPEG4 products at 20% of 2006 Revenue First significant sales in Americas 6% of the Group’s full-year revenue Long-term strategic partnership with ITI Neovision of Poland encompassing full-fledge collaboration, exclusivity and financial arrangements IPTV up 41%, Satellite up 140%, SW & Services up 220% compensated weak Italian DTT market and technical delays Awarded in Europe’s 500 - Entrepreneurs for Growth ranked 173 of 500 companies selected amongst 28 countries, for having achieved 58% annual compound average growth rate and the creation of more than 190 jobs, primarily in Europe, over 2002-2005 4 o ADB HOLDINGS o ANNUAL REPORT 2006 Strengthening ADB Group : High-End Focus a technology leader IN % OF 2006 DIGITAL TV EQUIPMENT SEGMENT REVENUE HD products in Italian RAI and UK BBC HD trials n MPEG2 SD, Others 62% n MPEG4 SD 16% World’s first hybrid, single-chip, n MPEG4 HD 22% advanced video coding,
    [Show full text]
  • Embedded Sensors System Applied to Wearable Motion Analysis in Sports
    Embedded Sensors System Applied to Wearable Motion Analysis in Sports Aurélien Valade1, Antony Costes2, Anthony Bouillod1,3, Morgane Mangin4, P. Acco1, Georges Soto-Romero1,4, Jean-Yves Fourniols1 and Frederic Grappe3 1LAAS-CNRS, N2IS, 7, Av. du Colonel Roche 31077, Toulouse, France 2University of Toulouse, UPS, PRiSSMH, Toulouse, France 3EA4660, C3S - Université de Franche Comté, 25000 Besançon, France 4 ISIFC – Génie Biomédical - Université de Franche Comté, 23 Rue Alain Savary, 25000 Besançon, France Keywords: IMU, FPGA, Motion Analysis, Sports, Wearable. Abstract: This paper presents two different wearable motion capture systems for motion analysis in sports, based on inertial measurement units (IMU). One system, called centralized processing, is based on FPGA + microcontroller architecture while the other, called distributed processing, is based on multiple microcontrollers + wireless communication architecture. These architectures are designed to target multi- sports capabilities, beginning with tri-athlete equipment and thus have to be non-invasive and integrated in sportswear, be waterproofed and autonomous in energy. To characterize them, the systems are compared to lab quality references. 1 INTRODUCTION electronics (smartphones, game controllers...), in an autonomous embedded system to monitor the Electronics in sports monitoring has been a growing sportive activity, even in field conditions. field of studies for the last decade. From the heart rate Our IMU based monitoring system allows monitors to the power meters, sportsmen
    [Show full text]
  • Web Services, CORBA and Other Middleware
    Web Services, CORBA and other Middleware © Copyright IONA Technologies 2002 Dr. Seán Baker IONA Technologies Web Services For The Integrated Enterprise, OMG Workshop, Munich Feb 2003 Overview • There a number of different types of middleware – So what does Web Services offer? © Copyright IONA Technologies 2002 IONA © Copyright 2 2 Middleware • Middleware enables integration, but there are multiple – competing – choices: –CORBA –J2EE –.NET © Copyright IONA Technologies 2002 IONA © Copyright – Various MoM & EAI proprietary middleware – Web Sevices – the new kid on the block. 3 3 There’s lots of choice • Some based on technical grounds, including: – RPC versus message passing – Java specific versus multi-language – Direct versus indirect communication – Permanent versus occasional connection © Copyright IONA Technologies 2002 IONA © Copyright – Platform versus integration middleware • Some based on personal choice 4 4 Intra-enterprise versus inter-enterprise • Most middleware has been designed for intra- enterprise • Inter-enterprise adds at least two challenges – Firewalls ( & inter-enterprise security in general) © Copyright IONA Technologies 2002 IONA © Copyright – Different middleware may be used at the two ends • As well as different operating system, languages, etc 5 5 Web Services • Aims to address both of these issues – Its protocol is layered on HTTP • So it can flow through a firewall • This “cheat” raises security and other concerns, but ones that need to be addressed in any case – It uses XML to format messages © Copyright IONA
    [Show full text]
  • Embedded Systems Supporting by Different Operating Systems
    A Survey: Embedded Systems Supporting By Different Operating Systems Qamar Jabeen, Fazlullah Khan, Muhammad Tahir, Shahzad Khan, Syed Roohullah Jan Department of Computer Science, Abdul Wali Khan University Mardan [email protected], [email protected] -------------------------------------------------------------------------------------------------------------------------------------- Abstract: In these days embedded systems used in industrial, commercial system have an important role in different areas. e.g Mobile Phones and different Fields and applications like Network type of Network Bridges are embedded embedded system , Real-time embedded used by telecommunication systems for systems which supports the mission- giving better requirements to their users. critical domains, mostly having the time We use digital cameras, MP3 players, DVD constraints, Stand-alone systems which players are the example of embedded includes the network router etc. A great consumer electronics. In our daily life its deployment in the processors made for provided us efficiency and flexibility and completing the demanding needs of the many features which includes microwave users. There is also a large-scale oven, washing machines dishwashers. deployment occurs in sensor networks for Embedded system are also used in providing the advance facilities, for medical, transportation and also used in handled such type of embedded systems wireless sensor network area respectively a specific operating system must provide. medical imaging, vital signs, automobile This paper presents some software electric vehicles and Wi-Fi modules. infrastructures that have the ability of supporting such types of embedded systems. 1. Introduction: Embedded system are computer systems designed for specific purpose, to increase functionality and reliability for achieving a specific task, like general Figure 1: Taxonomy of Embedded Software’s purpose computer system it does not use for multiple tasks.
    [Show full text]
  • New Approach for Testing and Providing Security Mechanism for Embedded Systems
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 ( 2016 ) 851 – 858 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA New Approach for Testing and providing Security Mechanism for Embedded Systems Swapnili P. Karmorea, Anjali R. Mahajanb Research Scholar, Department of Computer Science and enginnering, G. H. Raisoni College of Engineering, Nagpur, India. Head, Department of Information Technology, Government Polytechnic, Nagpur, India. Abstract Assuring the quality of embedded system is posing a big challenge for software testers around the globe. Testing of one embedded system widely differs from another. The approach presented in the paper is used for the testing of safety critical feature of embedded system. The input and outputs are trained validated and tested via ANN. Security is provided via skipping invalid and critical classes and by embedding secret key in the Ram of embedded device. The work contributes simulating environment where cost and time required for testing of embedded systems will be minimized, which removes drawback of traditional approaches. Keywords: Embedded system testing; Black box testing; Safety critical embedded systems; Artificial neural network. 1. Introduction Testing is the most common process used to determine the quality and providing security for embedded systems. In the embedded world, testing is an immense challenge. In the test plan, the distinguished characteristics of embedded systems must be reflected as these are application specific. They give embedded system exclusive and distinct flavor. Real-time systems have to meet the challenge of assuring the correct implementation of an application not only dependent upon its logical accuracy, but also its ability to meet the constraints of timing.
    [Show full text]
  • Operating System Vs. Middleware
    What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. • It is also a consolidator and integrator. – Custom-programmed middleware solutions have been developed for decades to enable one application to communicate with another that either runs on a different platform or comes from a different vendor or both. • Today, there is a diverse group of products that offer packaged middleware solutions. AP 04/07 Operating System vs. Middleware Application Middleware Operating System AP 04/07 1 The Middleware Layer Distributed Application Distributed Application Middleware API Middleware API Middleware Middleware Operating System API Operating System API Operating System Operating System (Processes, Communication, (Processes, Communication, Memory Management) Memory Management) Network AP 04/07 Purpose and Origin • Middleware is connectivity software that consists of a set of enabling services that allow multiple processes running on one or more machines to interact across a network. • Middleware is essential to migrating mainframe applications to client/server applications and to providing for communication across heterogeneous platforms. – This technology has evolved during the 1990s to provide for interoperability in support of the move to client/server architectures (see Client/Server Software Architectures). • The most widely-publicized middleware initiatives are the – Open Software Foundation's Distributed Computing Environment (DCE), – Object Management Group's Common Object Request Broker Architecture (CORBA), and – Microsoft's COM/DCOM (Component Object Model) AP 04/07 2 Technical Detail • Middleware servi ces are set s of di st rib ut ed soft ware that exist between the application and the operating system and network services on a system node in the network.
    [Show full text]