Decentralized Architectures

Total Page:16

File Type:pdf, Size:1020Kb

Decentralized Architectures PERSONAL DATA JOURNAL Issue Nº3 April, 2012 Personal Data in Decentralized Network Architectures by Markus Sabadello, Technical Editor One of the most fundamental challenges for the PDE to consider will be the design and deployment of suitable underlying architectures for realizing emerging visions around the management and use of personal data. The basic organizational structures, according to which participants of an ecosystem exchange information with each other, influence many of its fundamental properties, such as privacy, security, flexibility, discovery, or the dependencies between different actors. The possible types of architectural Centralized Architectures patterns that can be implemented are highly diverse, with Centralized architectures are based on the idea that all centralized structures on one end of the spectrum, and fully communication passes through a single point in the system, distributed systems on the other end. On the Internet, very which is responsible for managing the flow of information different forms have always existed, depending on the between participants, for coordinating their behavior, and for infrastructural layer and the concrete applications and services one looks at. Contents Such organizational structures can be described and Feature Article: Personal Data in Decentralized Network analyzed using terminology and methods from the Architechures , Page 1 mathematical field of graph theory. They are really trans- disciplinary concepts, which have been applied to many Industry News: Page 3 practical situations and academic theories both in the natural Events: Page 6-7 and social sciences. One often-cited book in this context is Standards: Page 8-9 “Neither Market nor Hierarchy: Network Forms of Organization” by Walter W. Powell (1990), which argues that Startup Circle: Page 10 with the advent of modern communication technologies, Resources: Page 11-12 decentralized networks have become an increasingly important concept in various disciplines. Today, they are Special Report: US Privacy Initiatives, Page 13 used not only to describe certain electronic communication Book Reviews: “The Daily You” and “Consent of the systems, but also the structures of corporations, international Networked,” Page 14-15 relations, terrorist organizations, revolutionary movements, Opinions: Sara Wedeman and Tony Fish, Page 16-17 and civil society. Publisher’s Note: ”Catalyzing the Ecosystem,” by Kaliya Hamlin, Page 22 Editorial: “US and EU: A Tale of Two Cities,” by Kelly Mackin, Page 27 Page 1 Personal Data Journal Issue N°3 April 2012 Personal Data Journal introducing hierarchies. This approach has the advantages of decentralized being efficient, well organized, reliable, and secure, as long architectures – is now Personal Data Journal is as all key components of the hierarchy function correctly. more popular than published by the Personal Data ever before, and Ecosystem Consortium. Our goal visions as well as In practice, this means that these systems make use of central is to create and support a diverse hubs or servers, which transmit, control, and organize all concrete projects to community of companies, small information and all communication within the system. Such enable personal data designs are known as client-server architectures, or more storage and and large around the world recently described with marketing terms such as “software as communication in building a thriving personal data a service” or “cloud computing”. Today, many of the most decentralized network ecosystem. widely used Internet services such as Google Search, Gmail, architectures are on Facebook, Twitter and Youtube are based on this design, the rise. Personal Data Journal Staff involving a powerful server structure at the center of the Publisher: Kaliya Hamlin architecture, and large numbers of clients on the periphery Decentralized Associate Publisher: which depend on instructions and information from the Architectures Patrick Reilly servers. Alternatives to Editor: Kelly Mackin centralized forms of The implication of such centralized systems is that the Technical Editor: Markus organization are political or corporate entity offering a service is in full commonly referred to Sabadello control of all personal data and communication processes by the terms Researcher: Joseph Boyle which take place, and as a result, there is an inherent “decentralized”, potential for abusing this control and for violating the privacy “distributed” or “peer- of participants. Concrete abuse scenarios and harmful to-peer”, and they Sales consequences include the excessive storage, analysis, provide aggregation, manipulation, and monetization of personal Patrick Reilly [email protected] communication data, as well as the surveillance and manipulation of structures that are less people’s messages as they are exchanged via a network. And or not at all dependent Subscriptions: besides general privacy issues, which are shared by large on any single central Enterprise licenses for Personal numbers of users, concerns have also clearly increased as a point in the system. consequence of political events such as the Iran Green Data Journal are available at Therefore, there is an Revolution, the Arab Spring, Tea Party or the Occupy http://www.pde.cc/journal for inherent potential to Movements, where activists often found their online $3,000 - $10,000 depending the give individual communication to be monitored, censored, and used against organization’s size. participants more them by established political authorities. control, privacy and Personal Data Journal is As a consequence of strong tendencies toward more independence. Some published by Personal Data centralized and strictly hierarchical designs of online approaches exhibit applications and services, criticism has become widespread. certain hierarchical Ecosystem Consortium With growing public awareness about the deficiencies of features (e.g. a non-profit 501(c)6 trade highly centralized systems, the search for alternatives has “federations” that still association. also intensified, and various countertrends have emerged. To distinguish between some extent, tools such as Encrypt Facebook or CrypTweet clients and servers), Executive Director: can be used to achieve more privacy; however, they are whereas others are Kaliya Hamlin really just workarounds. The real alternative – i.e. adopting completely distributed and do not distinguish Board Members: between Clay Shirky different Phillip J. Windley, Ph.D. Internet Identity Workshop #14 participants in any way. Tony Fish May 1-3, 2012 Mountain View, CA Aldo Castaneda www.internetidentityworkshop.com/ If you want to be on the ground floor of making the new personal http://personaldataecosystem.org data ecosystem move from vision to reality. This is the place to be. Page 2 Personal Data Journal Issue N°3 April 2012 Decentralized networks offer greater resilience against file sharing, for example encrypted messaging and disruptions and they are effective in repairing topological newsfeeds. damages due to redundant and re-adjustable connections between participants. Their ability to easily add and remove SocialSwarm sees itself not as a software project, but as an new connections enables them to recruit and integrate new advocacy group that can act as a mediator between different members into the network at any time, or to even join initiatives. separate networks together. Yet another strength of such Unhosted attempts to decouple applications from data networks is their ability to transmit and process messages in a storage by providing an abstract “remoteStorage” API, very efficient way, bypassing hierarchies that may cause therefore giving individuals choice and eliminating the need obstruction and delays, and getting information directly to for being dependent on any single part of a system. the participants that need it. Connections between participants can be dynamically optimized, and resources or SecuShare provides social networking that is completely communication channels that are found to be valuable can independent of servers and instead relies on client software immediately be used again. communicating in a peer-to-peer fashion. It implements a “social onion routing” protocol that utilizes one’s social One of the ideas that is currently receiving a lot of attention graph for routing purposes and for calculating trust. is to build a decentralized social networking service, i.e. a “Facebook without a single Facebook”, or in other words, an Thimbl uses the Finger technology from the early days of the infrastructure similar to E-Mail, where multiple service Internet to enable decentralized microblogging, and it makes providers and users can interact with each other and fulfill a strong political statement by describing capitalism as the their social communication needs, without being dependent reason why today there is too much centralization online. on any single company or server system. Based on this idea, the Federated Social Web effort has emerged, which operates Crabgrass provides tools for organizing and collaborating in as a W3C Community Group and has so far held two democratic ways. However, it does not view itself as a summits in Portland, Oregon, and Berlin, Germany. A web traditional social network. It focuses on group collaboration comic exists that explains the idea in simple terms, rather than a hierarchic, ego-centric approach.Briar seeks to conferences dedicated to decentralized architectures such as develop a secure communications network for civil society
Recommended publications
  • Marvell ARMADA™ 16X Plug Computer Development
    Cover Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Doc. No. MV-S400320-00, Rev. - December 2010 Marvell. Moving Forward Faster Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Document Conventions Note: Provides related information or information of special importance. Caution: Indicates potential damage to hardware or software, or loss of data. Warning: Indicates a risk of personal injury. Document Status Doc Status: Preliminary Technical Publication: x.xx For more information, visit our website at: www.marvell.com Disclaimer No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees: 1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S.
    [Show full text]
  • Pen Testing with Pwn Plug
    toolsmith ISSA Journal | March 2012 Pen Testing with Pwn Plug By Russ McRee – ISSA Senior Member, Puget Sound (Seattle), USA Chapter Prerequisites one who owns a Sheevaplug: “Pwn Plug Community Edition does not include the web-based Plug UI, 3G/GSM support, Sheevaplug1 NAC/802.1x bypass.” 4GB SD card (needed for installation) For those of you interested in a review of the remaining fea- tures exclusive to commercial versions, I’ll post it to my blog Dedicated to the memory of Tareq Saade 1983-2012: on the heels of this column’s publishing. Dave provided me with a few insights including the Pwn This flesh and bone Plug’s most common use cases: Is just the way that we are tied in But there’s no one home • Remote, low-cost pen testing: penetration test cus- I grieve for you –Peter Gabriel tomers save on travel expenses; service providers save on travel time. • Penetration tests with a focus on physical security and s you likely know by now given toolsmith’s position social engineering. at the back of the ISSA Journal, March’s theme is • Data leakage/exfiltration testing: using a variety of co- A Advanced Threat Concepts and Cyberwarfare. Well, vert channels, the Pwn Plug is able to tunnel through dear reader, for your pwntastic reading pleasure I have just many IDS/IPS solutions and application-aware fire- the topic for you. The Pwn Plug can be considered an ad- walls undetected. vanced threat and useful in tactics that certainly resemble Information security training: the Pwn Plug touches cyberwarfare methodology.
    [Show full text]
  • Plugcomputer
    Fakultat¨ Informatik Institut f ¨urTechnische Informatik, Professur f ¨urVLSI-Entwurfssysteme, Diagnostik und Architektur PLUGCOMPUTER Alte Idee, Neuer Ansatz Thomas Gartner¨ Dresden, 14.7.2010 Ubersicht¨ Motivation Alte Idee: NSLU2 Neuer Ansatz: PlugComputer Quellen TU Dresden, 14.7.2010 PlugComputer Folie 2 von 24 Motivation Problemstellung Wie kann ich meine personlichen¨ Daten und Dateien moglichst¨ effizient, f ¨urmich und ausgewahlte¨ Personen, ¨uberallund immer verf ¨ugbarmachen? • Soziale Netzwerke • Hostingdienste wie z.B. Flickr, Google Suite, YouTube . • Server anmieten Probleme: • Daten ¨ubergabean Dritte • Dienste wegen ihrer Große¨ f ¨urAngreifer attraktiv TU Dresden, 14.7.2010 PlugComputer Folie 3 von 24 Motivation Losungsansatz¨ Idee: Eigener Server im eigenen, sicheren Netz das inzwischen meistens ohnehin standig¨ mit dem Internet verbunden ist. Vorteile: • Beschrankter¨ physikalischer Zugang f ¨urDritte • Voll anpassbar Nachteile: • Konfigurationsaufwand • Energieverbrauch • Larm¨ • Verantwortung f ¨urdie eigenen Daten TU Dresden, 14.7.2010 PlugComputer Folie 4 von 24 Motivation Losungsansatz¨ TU Dresden, 14.7.2010 PlugComputer Folie 5 von 24 Alte Idee: NSLU2 Allgemein Mit dem Network Storage Link von Linksys konnen¨ Sie die Speicherkapazitat¨ Ihres Netzwerks schnell und einfach um viele Gigabyte erweitern. Dieses kleine Netzwerkgerat¨ verbindet USB2.0-Festplatten direkt mit Ihrem Ethernet- Netzwerk. [Lina] TU Dresden, 14.7.2010 PlugComputer Folie 6 von 24 Alte Idee: NSLU2 Außen • 130 mm x 21 mm x 91 mm • 1x 10/100-RJ-45-Ethernet-Port • 2x USB 2.0-Port • 1x Stromanschluss TU Dresden, 14.7.2010 PlugComputer Folie 7 von 24 Alte Idee: NSLU2 Innen • Intel IXP420 (ARMv5TE) • 133 MHz, spater¨ 266 MHz • 8 MB Flash • 32 MB SDRAM TU Dresden, 14.7.2010 PlugComputer Folie 8 von 24 Alte Idee: NSLU2 Modifikationen • NSLU2 Firmware basiert auf Linux! • Ersetzbar durch Debian, OpenWrt, SlugOS .
    [Show full text]
  • Rationale and Design for the Peace Box an Electronic Device for Your Home Or Office
    Rationale and Design for the Peace Box An Electronic Device for your Home or Office A thesis submitted by Markus Sabadello, Austria, [email protected] to the European Peace University (EPU) – Private University Stadtschlaining/Burg, Austria in partial fulfillment of the requirements for a Master of Arts Degree in Peace and Conflict Studies 1/23/2012 This thesis offers a summary of different lines of thought on how Information and Communication Technologies (ICTs) can be used for promoting the ideal of peace, for example by helping to manage a crisis, by supporting development and education, by overcoming authoritaran regimes, or by promoting a global civil society and global culture of peace. After introducing these ideas, the concept of a „Peace Box“ is presented, which is a small computer-like device that can be set up in any home or office to provide applications and services for actively supporting the various visions of using ICTs for peace. Contents 1. Introduction .............................................................................................................................................. 1 1.1. ICTs for Peace .................................................................................................................................. 2 1.2. ICTs against Peace ......................................................................................................................... 4 2. Technological Considerations ...........................................................................................................
    [Show full text]
  • Taller De Firmware
    Robótica embebida Embedded Single Board Computers Facultad de Ingeniería Instituto de Computación Contenido • Single Board Computers – Orígenes – Evolución – Algunos ejemplos Embedded Single Board Computers Single-board computers (SBCs) son computadoras completas fabricadas en una única placa de circuito. El diseño es centrado en un microprocesador con RAM, almacenamiento, E/S y otras características necesarias para ser una computadora funcional en una sola placa. Un poco de historia • Las primeras micro computadoras consistían de media docena (o más) placas de circuitos conectadas a un backplane. • Estas placas implementaban el CPU, memoria, controladores de disco y puertos paralelos/seriales Un poco de historia • Estas computadoras se utilizaban entre otras cosas, para adquisición de datos, control de procesos industriales. • Eran muy grandes para utilizarlas embebidas en dispositivos. Un poco de historia • A comienzo de la década del 80 la tecnología de circuitos integrados había llegado a un nivel de integración que permitía integrar funciones que ocupaban toda una placa en un solo chip (large scale integration chips). Un poco de historia • Permitió implementar computadoras completas en una sola placa, sin necesidad de utilizar backplanes. • Las primeras computadoras personales fueron implementadas de esta forma. • La Apple I de Steve Wozniak es un ejemplo. • Hoy día se siguen utilizando backplanes para implementar ciertos sistemas. Apple I Ferguson Big Board Ferguson Big Board • Diseño del 1980. • Basada en el microprocesador Z80, 64KB RAM. • Utilizaba el sistema operativo comercial CP/M. • Segunda versión "Little Board" (Ampro, 1983) • Dado su bajo costo, confiabilidad, simplicidad, y tamaño fue práctica para utilizarla embebida directamente en dispositivos que no eran computadoras.
    [Show full text]
  • SMART SANTANDER Information on 1St Open Call for Experiments
    SMART SANTANDER Information on 1st Open Call for Experiments Dr. Alex Gluhak, University of Surrey Dr. Luis Sanchez, University of Cantabria Open call information day th Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Brussels, 14 of September 2011 Outline • First call overview (AG) – Call procedure and guidelines for proposals – Detailed technical call objectives – Expected impact of proposals • SmartSantander infrastructure (AG, LS) – Testbed architecture – Deployment description at the 4 testbed sites • Experimentation on top of SmartSantander (AG,LS) – Available experimentation tools – Example experiments • Q&A Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Overview of First Call for Experiments Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Open call information • Web: http://www.smartsantander.eu/index.php/open-calls • Contact e-mail: [email protected] Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key documents • Detailed open call text – Provides an overview of the technical call objectives and expected impact – Overview of the facility • Guide for applicants – Template adapted from EC how to prepare a proposal – Follows FP7 regulations • Regulations for the use of the facility – 7 articles outlining expectations and guidelines for experimentation Copyright © SmartSantander Project FP7-ICT-2009-5 257992. All Rights reserved. Key call facts Call identifier SmartSantander-1-Open-Call Call opening 1st October 2011 Call closing 16. November 2011, 17.00 Brussels time (last received version prior deadline counts) Experimentation Jan – December 2012 Timeframe (length may vary based on nature of experiment – typical 9 month) Max funding per 200k Euros experiment Maximum funding for call Up to 600k Euros Number of expected 3+ experiments Number of partners per 1-2 partners experiment Proposal language English Copyright © SmartSantander Project FP7-ICT-2009-5 257992.
    [Show full text]
  • Liemeshko Magistr.Pdf
    НАЦІОНАЛЬНИЙ ТЕХНІЧНИЙ УНІВЕРСИТЕТ УКРАЇНИ «КИЇВСЬКИЙ ПОЛІТЕХНІЧНИЙ ІНСТИТУТ імені ІГОРЯ СІКОРСЬКОГО» Факультет інформатики та обчислювальної техніки Кафедра технічної кібернетики «На правах рукопису» До захисту допущено: УДК 004.453 Завідувач кафедри ________ Ігор ПАРХОМЕЙ «___»_____________2020 р. Магістерська дисертація на здобуття ступеня магістра за освітньо-професійною програмою «Інформаційне забезпечення робототехнічних систем» зі спеціальності 126 «Інформаційні системи та технології» на тему: «Система управління розумним будинком» Виконав (-ла): студент (-ка) ІІ курсу, групи ІК-91мп Артем ЛЄМЕШКО __________ Керівник: доцент, к.т.н., Олег ЛІСОВИЧЕНКО __________ Консультант з нормоконтролю: доцент, к.т.н., доц., Віктор ПАСЬКО __________ Рецензент: проф. каф. ОТ, д.т.н., проф. Сергій СТІРЕНКО __________ Засвідчую, що у цій магістерській дисертації немає запозичень з праць інших авторів без відповідних посилань. Студент _____________ Київ – 2020 року Національний технічний університет України «Київський політехнічний інститут імені Ігоря Сікорського» Факультет інформатики та обчислювальної техніки Кафедра технічної кібернетики Рівень вищої освіти – другий (магістерський) Спеціальність – 126 «Інформаційні системи та технології» Освітньо-професійна програма «Інформаційне забезпечення робототехнічних систем» ЗАТВЕРДЖУЮ Завідувач кафедри _______ Ігор ПАРХОМЕЙ «___»_____________2020 р. ЗАВДАННЯ на магістерську дисертацію студенту Лємешко Артему Дмитровичу 1. Тема дисертації «Система управління розумним будинком», науковий керівник дисертації
    [Show full text]
  • Quick Start Guide for Guruplug Server Standard and Server Plus GTI-2010.05.07
    Quick Start Guide – GuruPlug Server page 1 / 10 Quick Start Guide for GuruPlug Server Standard and Server Plus GTI-2010.05.07 Thank you for purchasing GuruPlug Server Standard / GuruPlug Server Plus - the most sophisticated compact ARM based computer ever built. This is running at 1.2GHz yet using less than 10W power consumption. This little palm-sized powerhouse can handle all your biggest tasks while still saving about 96% on energy costs when compared to the average 175 Watt desktop computer. You can customize your Plug to work in almost any industry - Home Automation, Security/Surveillance, Medical Monitoring, Industrial Automation, Smart Grid Electrical, Mesh and Grid Computing. You can never have enough storage, not to mention fast access to all that data. That's why we have provided Wi-Fi, Bluetooth, Gigabit Ethernet, USB 2.0 and eSATA connection options to the Server line of products. Go ahead give us what you got, we can take it. A. Package contents Please check the package you’ve received with the following contents: Contents GuruPlug Server Standard GuruPlus Server Plus Remark 1 GuruPlug 1 unit 1 unit 2 Detachable AC plug 1 pcs 1 pcs 3 Detachable AC power cord converter 1 pcs 1 pcs 4 AC power cord 1 pcs 1 pcs 5 Ethernet RJ45 cable 1 pcs 1 pcs 6 Warranty sheet Yes Yes 7 CD No No Note 1 8 JTAG debug board No No Note 2 Note 1: All files will be put on the following website for downloading https://www.globalscaletechnologies.com/t-downloads.aspx Note 2: Our JTAG debug board module is sold separately.
    [Show full text]
  • Ported Plan 9
    Recent Plan 9 Work at Bell Labs Geoff Collyer [email protected]−labs.com *All L=>oH=JoHEAI MKHH=O0Ell,NAM JAHIAO%'%" 75) ABSTRACT *All L=>I HA?AnJlO FoHJA@ 2l=n ' Jo nAM IOIJAmI MEJD non-2+ =H?DE­ JA?JKHAI. 6DEI EI = IJ=JKI HAFoHJ on JDoIA FoHJI =n@ = IKmm=HO oB MD=J DAlFA@,MD=J @E@nߣJ =n@MD=J ?oKl@. 1. Introduction 1n mO CHoKF oB 2l=n ' @ALAloFAHI =n@ KIAHI =J *All L=>I En MKHH=O 0Ell @KHEnC JDA l=IJ JMo OA=HI &ߞ oH Io, mK?D oB oKH MoHk D=I >AAn >=IA@ on FoHJI oB 2l=n ' Jo m=?DEnAI oJDAH JD=n JDA 1*M 2+. 6DEI J=lk MEll @AI?HE>A JDA FoHJI, MD=J MA KIA JDAm oHFl=nJoKIA JDAmBoH,=n@MD=J MA lA=HnA@. )I KIK=l, JDA >Klk oB 2l=n ' ?o@A EI IKBBE?EAnJlO FoHJ=>lA JD=J onlO JDA kAHnAl nAA@I Jo >A moLA@ Jo = nAM IOIJAm, =n@ ALAn JD=J onlO EnLolLAI FoFKl=JEnC = IK>@EHA?JoHO oB /sys/src/9 =n@ FoIIE>lO ?HA=JEnC = >ooJIJH=F FHoCH=m En /sys/src/boot.) FoHJ Jo = IOIJAm BoH MDE?D MA D=LA no ?omFElAH =n@ no IEmEl=H kAHnAl MoKl@ HAGKEHA IK>IJ=nJE=llOmoHA MoHk,=I@AI?HE>A@EnHABAHAn?A [$]. 2. Non−PC Ports: Common Problems and Techniques 9A FoHJA@ 2l=n ' Jo 2oMAH2+ "#, "" =n@ "# m=?DEnAI =n@ Jo )4M ' $ =n@ +oHJAN-)&m=?DEnAI. 6DAO=ll ID=HA ?AHJ=En?l=IIAIoB o>IJ=?lAI.
    [Show full text]
  • Fedora Linux Kernels Running on ARM Processors
    Latest Trends in Information Technology Fedora Linux Kernels Running on ARM Processors PETER KOTVAN, PETER FODREK Institute of Control and Industrial Informatics Faculty of Electrical Engineering and Information Technology Slovak University of Technology Ilkovicovaˇ 3, 812 19 Bratislava SLOVAK REPUBLIC [email protected], [email protected] Abstract: This paper will report our experience with installing and using the Fedora Linux distribution on a dedi- cated ARM processor based device. At first we will deal with ARM processors and its specifics. In the next section ARM based devices Dreamplug will be described. We will describe installation of Fedora Linux distribution on Dreamplug and compilation of the Linux kernel. The original Fedora kernel package was altered to support ARM based devices which incorporates different approaches especially to bootstrapping. Key–Words: Fedora, Linux Kernel, ARM processors 1 Introduction 2 ARM architecture and devices There are two main processor architectures used over the course of last years. Usually, a personal computer ARM is a reduced instruction set computer processor contains one of x86 or x86-64, however the most pop- architecture. It is the most widely used 32-bit instruc- ular 32-bit architecture is ARM (Advanced RISC Ma- tion set architecture. The combination of high perfor- chine). As the name says ARM is reduced instruction mance, low power consumption and low heat emis- set computer (RISC). Currently ARM processors are sion resulted in application of this architecture in mo- used primarily in smart phones, tablets and embedded bile phones, PDAs, tablets and cameras. With imple- devices. In the future, it is likely that the computers mentation of multi-cored ARM processors, it is possi- will be, too, powered by these processors.
    [Show full text]
  • Guruplug Server Plus First Steps
    GuruPlug Server Plus First steps Initial Setup and first login 1. Plug network cord in (eth0, the upper network plug) and connect jtag board with GuruPlug and PC 2. configure minicom on your PC to have access to the GuruPlug via jtag board a) install minicom (sudo apt-get install minicom) b) start minicom settings (sudo minicom -s) c) choose „settings for serial port...“ and select with ENTER d) press E to modify Bps/Par/Bits e) press E to set Bps to 115200, V for 8 databits, L for no parity and W for 1 stopbit. Confirm with ENTER f) press ENTER again g) „Save settings as...“ marvell 3. start minicom with “minicom -o marvell” a) it will show something like • Willkommen zu minicom 2.4 • • Optionen: I18n • Übersetzt am Jan 25 2010, 06:49:09. • Port /dev/ttyUSB0 • • Drücken Sie CTRL-A Z für Hilfe zu speziellen Tasten 4. plug your GuruPlug in. In minicom, you should see the boot-process a) it will show something like • U-Boot 2009.11-rc1-00602-g28a9c08-dirty (Feb 09 2010 - 18:15:21) • Marvell-Plug2L • • SoC: Kirkwood 88F6281_A0 • DRAM: 512 MB • NAND: 512 MiB • In: serial • Out: serial • Err: serial • Net: egiga0, egiga1 • 88E1121 Initialized on egiga0 • 88E1121 Initialized on egiga1 • etc. 5. when booting is done, you are asked to enter password and username a) sheevaplug-debian login: root b) Password: nosoup4u 6. After successful login, it shows • sheevaplug-debian:~# • from now on, I will put a # in front of all commands on the GuruPlug to make it mor clear Configure network 1.
    [Show full text]
  • When Open Source Hardware Fall in Love with Fedora
    When Open Source Hardware Fall in love with Fedora Presented by Tong Hui Open Source Evangelist of DFRobot License statement goes here. See https://fedoraproject.org/wiki/Licensing#Content_Licenses for acceptable licenses. About Tong Hui ● Open Source Evangelist @ DFRobot ● Open Source Embedded Mentor ● Embedded Mentor at AKAEDU ● Embedded Engineer FAS: Tonghuix Weibo: http://weibo.com/tonghuix Twitter: @tonghuix Website: http://tonghuix.tk Blog: http://tonghuix.blogspot.com Agenda What is Open Source Hardware(OSHW) Developing OSHW in Fedora Arduino ARM-based Chips Embedded Linux Good News for Fedora Plans and Hopes Q & A What is Open Source Hardware (OSHW) Open Source Hardware Based on Open Source Software idea Mechanical drawings Schematics BOM table PCB layout HDL layout …... One of open source culture movement License – Most of FOSS are suitable OSHW https://en.wikipedia.org/wiki/Open_source_hardware Some OSHW projects Arduino RepRap – 3D Printer OpenSPARC / OpenRISC OpenMoko / GTA04 Open Embedded / Yocto My Contributing Projects OpenDrone Quadcopter Www.open-drone.org FlyMaple – forked from “Leaflabs Maple” ARM Cortex-M, STM32 Boards Dreamer MEGA - Arduino-based Boards Development OSHW in Fedora Needed Software PCB (KiCAD, gEDA, Eagle) CAD (FreeCAD, Blender) Cross Compile Toolchain Arduino IDE Fritzing Hardware Arduino Bealgeboard / Pandaboard Raspberry Pi Cubieboard Play Arduino in Fedora Install Arduino IDE yum install arduino Add user to plugdev and dialout group All Done, Play now! ARM MCU or Bare Development Suggestions ARM Cross Compile Toolchain (linaro) JTAG/SWD Debugger (OpenJTAG) OpenOCD Leaflabs Maple ( STM32 Boards, MCU) Oscilloscope (Xoscope) Qemu Demo: Flymaple Flymaple, A flight controller with 10 DOF IMU, based on STM32F103. It forks from “Leaflabs Maple”, use same Maple IDE, and supported Arduino pin-out and API.
    [Show full text]