Application Modelling and Performance Estimation of Mixed-Critical Embedded Systems

Total Page:16

File Type:pdf, Size:1020Kb

Application Modelling and Performance Estimation of Mixed-Critical Embedded Systems Carl von Ossietzky Universität Oldenburg Fakultät II – Informatik, Wirtschafts- und Rechtswissenschaften Department für Informatik Application Modelling and Performance Estimation of Mixed-Critical Embedded Systems Von der Fakultät II – Informatik, Wirtschafts- und Rechtswissenschaften der Carl von Ossietzky Universität Oldenburg zur Erlangung des Grades und Titels eines Doktors der Ingenieurwissenschaften (Dr.-Ing.) angenommene Dissertation von Herrn Philipp Ittershagen geboren am 24. Oktober 1986 in Quakenbrück Philipp Ittershagen: Application Modelling and Performance Estimation of Mixed-Critical Embedded Systems gutachter: Prof. Dr.-Ing. Wolfgang Nebel weitere gutachter: Prof. Dr. Martin Fränzle tag der disputation: 23. November 2018 ABSTRACT The focus of the challenges in developing embedded systems is significantly shifting towards the integration of multiple subsystems on a powerful single platform while considering the cost, size, and power consumption con- straints as well as the heterogeneous, domain-specific requirements which are characteristic in the domain of embedded systems. The rise of mixed- critical embedded systems moreover imposes novel challenges on the spe- cification, development, and functional validation in the design flow. In the emerging dynamic scheduling context of mixed-criticality platforms, the system behaviour needs to be estimated in an early step in the design flow to assess the integration impact, especially for quality of service-driven, low-critical subsystems. This work provides a modelling and integration flow for specifying, estim- ating, and evaluating software functions, ranging from an initial executable specification to an implementation candidate on a Multi-Processor System- on-a-Chip. The flow starts with a mixed-criticality programming model proposed to express safety- as well as performance-critical functional beha- viour along with their real-time requirements. A component-based refine- ment flow then provides an implementation candidate on a contemporary MPSoC. The integrated measurement infrastructure then allows for system- atically analysing the functional behaviour as well as the overhead of mech- anisms for isolating, managing, and observing the refined mixed-criticality subsystems. Based on a data-driven model to evaluate dynamic resource con- sumption effects of high-critical subsystems, the thesis proposes a method for constructing workload models of safety-critical software components on the target platform. The evaluation of this work demonstrates that these models can support mixed-criticality system integration scenarios where in- tellectual property issues may prevent integration or the need for fast time- to-market goals require a decoupled development and integration phase of mixed-critical applications. iii ZUSAMMENFASSUNG Der Fokus der Herausforderungen in der Entwicklung eingebetteter Sys- teme verschiebt sich immer mehr in Richtung der Integration mehrerer Teilsysteme auf einer gemeinsamen, leistungsfähigen Plattform. Dabei spielt die gleichzeitige Betrachtung der Einschränkungen bezüglich Kosten, Grö- ße und Leistungsaufnahme sowie der für eingebettete Systeme charakteristi- schen heterogenen, domänenspezifischen Anforderungen eine entscheiden- de Rolle. Der Trend zu gemischt-kritischen eingebetteten Systemen stellt darüber hinaus neue Herausforderungen an die Spezifikation, Entwicklung und funktionale Validierung in deren Entwicklungsfluss. Durch den Ein- zug dynamischer Scheduling-Verfahren in gemischt-kritischen Plattformen ist eine Abschätzung des Systemverhaltens zur Bewertung der Auswirkung der Integration von Teilsystemen bereits in den ersten Schritten des Ent- wicklungsflusses erforderlich, insbesondere bei der Integration von niedrig- kritischen, serviceorientierten Funktionen. In dieser Arbeit wird ein Modellierungs- und Integrationsfluss zur Spe- zifikation, Abschätzung und Bewertung von Softwarefunktionen, ausge- hend von einer initialen, ausführbaren Spezifikation bis hin zu einer Imple- mentation auf einem Multi-Processor System-on-a-Chip, vorgestellt. Dazu wird zunächst ein Programmiermodell für gemischt-kritische Systeme einge- führt, in dem sicherheitskritisches sowie leistungsorientiertes funktionales Verhalten zusammen mit ihren Echtzeitanforderungen ausgedrückt werden kann. Eine komponentenbasierte Verfeinerungsstrategie erlaubt dann die prototypische Entwicklung eines Implementationskandidaten auf einem Multi-Processor System-on-a-Chip. Darüber hinaus ermöglicht eine inte- grierte Messinfrastruktur, den zeitlichen Mehraufwand der Mechanismen zur Isolation, Kontextverwaltung und zeitlichen Beobachtung der gemischt- kritischen Teilsysteme systematisch zu analysieren. Basierend auf einem da- tengetriebenen Modell zur Bewertung der dynamischen Nutzung von Platt- formressourcen des sicherheitskritischen Teilsystems wird in dieser Arbeit anschließend eine Methode zur Konstruktion von Auslastungsmodellen für die sicherheitskritischen Teilsysteme auf der Zielplattform vorgeschlagen. Die Bewertung in dieser Arbeit zeigt, dass durch diese Modelle die Integra- tionsszenarien gemischt-kritischer Systeme unterstützt werden können, bei denen der Schutz geistigen Eigentums eine Integration erschweren könnte oder bei denen kurze Vorlaufzeiten für die Marktreife eine Entkoppelung der Entwicklung von der Integration gemischt-kritischer Anwendungen erfordern. v PUBLICATIONS Some ideas and figures have appeared previously in the following publica- tions: [1] Philipp Ittershagen, Kim Grüttner and Wolfgang Nebel. ‘Mixed- Criticality System Modelling with Dynamic Execution Mode Switch- ing’. In: Proceedings of the Forum on Specification and Design Languages (FDL’15). Barcelona, Spain, 2015. doi: 10.1109/fdl.2015.7306356. [2] Philipp Ittershagen, Kim Grüttner and Wolfgang Nebel. ‘A Task- level Monitoring Framework for Multi-processor Platforms’. In: Pro- ceedings of the 19th International Workshop on Software and Compilers for Embedded Systems (SCOPES’16). ACM Press, May 2016. doi: 10. 1145/2906363.2906373. [3] Philipp Ittershagen, Kim Grüttner and Wolfgang Nebel. ‘An Integra- tion Flow for Mixed-Critical Embedded Systems on a Flexible Time- triggered Platform’. In: ACM Trans. Des. Autom. Electron. Syst. 23.4 (Apr. 2018). doi: 10.1145/3190837. [4] Philipp Ittershagen, Philipp A. Hartmann, Kim Grüttner and Wolf- gang Nebel. ‘A Workload Extraction Framework for Software Per- formance Model Generation’. In: Proceedings of the 7th Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools (RAPIDO’15). ACM Press, Jan. 2015. doi: 10 . 1145 / 2693433 . 2693436. [5] Philipp Ittershagen, Philipp A. Hartmann, Kim Grüttner and Achim Rettberg. ‘Hierarchical Real-time Scheduling in the Multi-core Era – An Overview’. In: Proceedings of the 16th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Com- puting (ISORC’13). IEEE, June 2013. doi: 10 . 1109 / isorc . 2013 . 6913241. vii CONTENTS 1 introduction 1 1.1 Context . 3 1.2 Motivation . 4 1.3 Scope & Research Questions . 5 1.4 Outline . 7 i foundations 2 system-level design 11 2.1 Top-Down & Bottom-Up Approach . 13 2.2 Platform-Based Design . 15 2.3 MPSoC Platform Challenges . 16 2.4 System-Level Design with SystemC . 18 2.4.1 Structural & Behavioural Modelling . 18 2.4.2 System-Level Modelling . 19 2.5 Refinement & Implementation . 20 2.5.1 Modelling Layers . 21 2.5.2 Computational Refinement . 22 2.5.3 Communication Refinement . 24 2.6 Validation & Verification . 24 2.6.1 Formal Verification . 25 2.6.2 Simulation-based Methods . 26 2.6.3 Performance Estimation . 27 2.6.4 Workload Modelling . 30 2.7 Oldenburg System Synthesis Subset . 32 3 mixed-critical embedded systems 35 3.1 Introduction . 35 3.2 Segregation Approaches . 37 3.3 Real-Time Models & Analysis . 38 4 thesis contributions 41 4.1 Contributions . 41 4.2 Assumptions . 43 5 related work 45 5.1 Mixed-criticality . 45 5.1.1 Real-Time Models . 45 5.1.2 Platforms . 47 5.1.3 Industrial Efforts . 49 5.1.4 Design Flows . 49 5.2 Performance & Workload Models . 51 5.3 Summary . 52 ii design flow & modelling approach 6 mixed-criticality system design flow 55 6.1 Application Layer Components . 56 6.1.1 Tasks . 57 6.1.2 Shared Objects . 58 ix x contents 6.2 Runtime Model . 59 6.2.1 Modelling Scope . 60 6.2.2 Runtime Model Properties . 61 6.2.3 Scheduling Configuration . 61 6.2.4 Mapping . 62 6.3 Execution Semantics & Simulation . 62 6.3.1 Application Layer Components . 64 6.3.2 Runtime Model . 64 6.3.3 Instantiation & Simulation . 65 6.4 Target Implementation . 67 6.4.1 Platform Components & Constraints . 68 6.4.2 Mapping & Scheduling Configuration . 69 6.4.3 Application Context Management . 70 6.4.4 Programming Model Implementation . 73 6.5 Summary . 74 7 performance modelling 77 7.1 Measurement Infrastructure Architecture . 77 7.1.1 Online Pre-Processing . 78 7.1.2 Data Extraction & Post-Processing . 79 7.2 Data-Driven Performance Modelling . 80 7.2.1 Assumptions . 81 7.2.2 Model Construction . 82 7.3 Application Proxy . 84 7.3.1 Target Requirements . 84 7.3.2 Implementation . 85 7.4 Summary . 86 iii results 8 integration flow evaluation 91 8.1 Setup . 91 8.1.1 Frame & Slot Configuration . 93 8.1.2 Benchmark Timing Behaviour . 95 8.2 Dynamic Mixed-Criticality Scheduling . 96 8.2.1 Scheduling Configuration . 96 8.2.2 Static & Dynamic Scheduling Comparison . 97 8.3 Segregation Overhead . 98 8.3.1 Cache Flush . 99 8.3.2 Application Context Switching . 101 9 modelling accuracy 103 9.1 Performance Model . 103 9.2 Application Proxy . 104 9.3 Proxy &
Recommended publications
  • Real-Time, Safe and Certified OS
    Real-Time, Safe and Certified OS Roman Kapl <[email protected]> drivers, customer projects, development Tomas Martinec <[email protected]> testing and certification © SYSGO AG · INTERNAL 1 Introduction • PikeOS – real-time, safety certified OS • Desktop and Server vs. • Embedded • Real-Time • Safety-Critical • Certified • Differences • Scheduling • Resource management • Features • Development © SYSGO AG · INTERNAL 2 Certification • Testing • Analysis • Lot of time • Even more paper • Required for safety-critical systems • Trains • Airplanes © SYSGO AG · INTERNAL 3 PikeOS • Embedded, real-time, certified OS • ~150 people (not just engineers) • Rail • Avionics • Space • This presentation is not about PikeOS specifically © SYSGO AG · INTERNAL 4 PikeOS technical • Microkernel • Inspired by L4 • Memory protection (MMU) • More complex than FreeRTOS • Virtualization hypervisor • X86, ARM, SPARC, PowerPC • Eclipse IDE for development © SYSGO AG · INTERNAL 5 Personalities • General • POSIX • Linux • Domain specific • ARINC653 • PikeOS native • Other • Ada, RT JAVA, AUTOSAR, ITRON, RTEMS © SYSGO AG · INTERNAL 6 PikeOS Architecture App. App. App. App. App. App. Volume Syste m Provider Partition PikeOS Para-Virtualized HW Virtualized File System (Native, POSIX, Guest OS PikeOS Native ARINC653, ...) Guest OS Linux, Android Linux, Android Device Driver User Space / Partitions Syste m PikeOS System Software ExtensionSyste m Extension PikeOS Microkernel Kernel Space / Hypervisor Architecture Platform Kernel Level Support Package Support Package Driver SoC /
    [Show full text]
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Security Target Pikeos Separation Kernel V4.2.2
    Security Target PikeOS Separation Kernel v4.2.2 Document ID Revision DOORS Baseline Date State 00101-8000-ST 20.6 N.A. 2018-10-10 App Author: Dominic Eschweiler SYSGO AG Am Pfaffenstein 14, D-55270 Klein-Winternheim Notice: The contents of this document are proprietary to SYSGO AG and shall not be disclosed, disseminated, copied, or used except for purposes expressly authorized in writing by SYSGO AG. Doc. ID: 00101-8000-ST Revision: 20.6 This page intentionally left blank Copyright 2018 Page 2 of 47 All rights reserved. SYSGO AG Doc. ID: 00101-8000-ST Revision: 20.6 This page intentionally left blank Copyright 2018 Page 3 of 47 All rights reserved. SYSGO AG Doc. ID: 00101-8000-ST Revision: 20.6 Table of Contents 1 Introduction .................................................................................................................... 6 1.1 Purpose of this Document ........................................................................................... 6 1.2 Document References ................................................................................................ 6 1.2.1 Applicable Documents......................................................................................... 6 1.2.2 Referenced Documents ....................................................................................... 6 1.3 Abbreviations and Acronyms ....................................................................................... 6 1.4 Terms and Definitions................................................................................................
    [Show full text]
  • Us 2019 / 0319868 A1
    US 20190319868A1 ( 19) United States (12 ) Patent Application Publication ( 10) Pub . No. : US 2019 /0319868 A1 Svennebring et al. ( 43 ) Pub . Date : Oct. 17 , 2019 ( 54 ) LINK PERFORMANCE PREDICTION (52 ) U . S . CI. TECHNOLOGIES CPC .. .. H04L 43/ 0882 (2013 . 01 ); H04W 24 /08 ( 2013 . 01 ) (71 ) Applicant : Intel Corporation , Santa Clara , CA (57 ) ABSTRACT (US ) Various systems and methods for determining and commu nicating Link Performance Predictions (LPPs ), such as in ( 72 ) Inventors : Jonas Svennebring , Sollentuna (SE ) ; connection with management of radio communication links, Antony Vance Jeyaraj, Bengaluru ( IN ) are discussed herein . The LPPs are predictions of future network behaviors /metrics ( e . g . , bandwidth , latency , capac (21 ) Appl . No. : 16 /452 , 352 ity , coverage holes , etc . ) . The LPPs are communicated to applications and /or network infrastructure, which allows the applications/ infrastructure to make operational decisions for ( 22 ) Filed : Jun . 25 , 2019 improved signaling / link resource utilization . In embodi ments , the link performance analysis is divided into multiple layers that determine their own link performance metrics, Publication Classification which are then fused together to make an LPP. Each layer (51 ) Int . Cl. runs different algorithms, and provides respective results to H04L 12 / 26 ( 2006 .01 ) an LPP layer /engine that fuses the results together to obtain H04W 24 / 08 (2006 .01 ) the LPP . Other embodiments are described and / or claimed . 700 Spatio - Temporal History Data Tx1 : C1 TIDE _ 1, DE _ 2 . .. Txt : C2 T2 DE _ 1 , DE _ 2 , . .. win Txs : C3 122 T : DE _ 1, DE _ 2 , .. TN DE _ 1 , DE _ 2 .. TxN : CN CELL LOAD MODEL 710 Real- Time Data 744 704 Patent Application Publication Oct.
    [Show full text]
  • Embedded Operating Systems
    7 Embedded Operating Systems Claudio Scordino1, Errico Guidieri1, Bruno Morelli1, Andrea Marongiu2,3, Giuseppe Tagliavini3 and Paolo Gai1 1Evidence SRL, Italy 2Swiss Federal Institute of Technology in Zurich (ETHZ), Switzerland 3University of Bologna, Italy In this chapter, we will provide a description of existing open-source operating systems (OSs) which have been analyzed with the objective of providing a porting for the reference architecture described in Chapter 2. Among the various possibilities, the ERIKA Enterprise RTOS (Real-Time Operating System) and Linux with preemption patches have been selected. A description of the porting effort on the reference architecture has also been provided. 7.1 Introduction In the past, OSs for high-performance computing (HPC) were based on custom-tailored solutions to fully exploit all performance opportunities of supercomputers. Nowadays, instead, HPC systems are being moved away from in-house OSs to more generic OS solutions like Linux. Such a trend can be observed in the TOP500 list [1] that includes the 500 most powerful supercomputers in the world, in which Linux dominates the competition. In fact, in around 20 years, Linux has been capable of conquering all the TOP500 list from scratch (for the first time in November 2017). Each manufacturer, however, still implements specific changes to the Linux OS to better exploit specific computer hardware features. This is especially true in the case of computing nodes in which lightweight kernels are used to speed up the computation. 173 174 Embedded Operating Systems Figure 7.1 Number of Linux-based supercomputers in the TOP500 list. Linux is a full-featured OS, originally designed to be used in server or desktop environments.
    [Show full text]
  • Parallel Processing with the MPPA Manycore Processor
    Parallel Processing with the MPPA Manycore Processor Kalray MPPA® Massively Parallel Processor Array Benoît Dupont de Dinechin, CTO 14 Novembre 2018 Outline Presentation Manycore Processors Manycore Programming Symmetric Parallel Models Untimed Dataflow Models Kalray MPPA® Hardware Kalray MPPA® Software Model-Based Programming Deep Learning Inference Conclusions Page 2 ©2018 – Kalray SA All Rights Reserved KALRAY IN A NUTSHELL We design processors 4 ~80 people at the heart of new offices Grenoble, Sophia (France), intelligent systems Silicon Valley (Los Altos, USA), ~70 engineers Yokohama (Japan) A unique technology, Financial and industrial shareholders result of 10 years of development Pengpai Page 3 ©2018 – Kalray SA All Rights Reserved KALRAY: PIONEER OF MANYCORE PROCESSORS #1 Scalable Computing Power #2 Data processing in real time Completion of dozens #3 of critical tasks in parallel #4 Low power consumption #5 Programmable / Open system #6 Security & Safety Page 4 ©2018 – Kalray SA All Rights Reserved OUTSOURCED PRODUCTION (A FABLESS BUSINESS MODEL) PARTNERSHIP WITH THE WORLD LEADER IN PROCESSOR MANUFACTURING Sub-contracted production Signed framework agreement with GUC, subsidiary of TSMC (world top-3 in semiconductor manufacturing) Limited investment No expansion costs Production on the basis of purchase orders Page 5 ©2018 – Kalray SA All Rights Reserved INTELLIGENT DATA CENTER : KEY COMPETITIVE ADVANTAGES First “NVMe-oF all-in-one” certified solution * 8x more powerful than the latest products announced by our competitors**
    [Show full text]
  • A Security Architecture for Accessing Health Records on Mobile Phones
    A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES Alexandra Dmitrienko, Zecir Hadzic, Hans Lohr,¨ Marcel Winandy Horst Gortz¨ Institute for IT Security, Ruhr-University Bochum, Bochum, Germany Ahmad-Reza Sadeghi Fraunhofer-Institut SIT Darmstadt, Technische Universitat¨ Darmstadt, Darmstadt, Germany Keywords: Health records, Mobile computing, Smartphone, Security architecture, Trusted computing. Abstract: Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the hardware platform often offers dedicated security features. Malicious software (malware) like Trojan horses on the mobile phone could gain unautho- rized access to sensitive medical data. In this paper, we propose a complete security framework to protect medical data (such as electronic health records) and authentication credentials that are used to access e-health servers. Derived from a generic archi- tecture that can be used for PCs, we introduce a security architecture specifically for mobile phones, based on existing hardware security extensions. We describe security building blocks, including trusted hardware features, a security kernel providing isolated application environments as well as a secure graphical user in- terface, and a trusted wallet (TruWallet) for secure authentication to e-health servers. Moreover, we present a prototype implementation of the trusted wallet on a current smartphone: the Nokia N900. Based on our architecture, health care professionals can safely and securely process medical data on their mobile phones without the risk of disclosing sensitive information as compared to commodity mobile operating systems.
    [Show full text]
  • NEWS RELEASE for IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected]
    NEWS RELEASE FOR IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected] Curtiss-Wright Showcases Latest Avionics Solutions at Avionics Expo 2019 AVIONICS EXPO – AEROSPACE TECH WEEK 2019, MOC Event Center, Munich, Germany (Booth A17) – March 12-13, 2019 – Curtiss-Wright’s Defense Solutions division today announced that it will be displaying its latest avionics products at Avionics Expo, Munich Germany, March 12- 13, 2019 (Booth A17). The products featured in Curtiss-Wright’s booth include: DO-254/DO-178 Safety-certifiable 3U and 6U OpenVPX™ single board computers Rugged airborne video management system solutions including a rugged 21'' touchscreen LCD Advance Video Display Unit (AVDU), Video Recorder, Video Switch and Converter Flight Test Instrumentation (FTI) products including the KAM-500 and Axon family of Data Acquisition Units (DAU) The Fortress™ Flight Data Recorder, and… An ultra-compact mission processor system (the Parvus® DuraCOR® 311) and networking system (Parvus DuraNET® 20-11). Live Demonstrations of Curtiss-Wright Products: In addition to a wide range of proven COTS modules and systems, Curtiss-Wright collaborated with other leading technology partners for live demonstrations of open architecture products hosted in the partners’ booths: Featured in Green Hills Software’s Booth - A64 - “Green Hills Software® INTEGRITY-178 tuMPTM for Avionics Systems” The Avionics Systems Demo features Green Hills Software’s INTEGRITY-178 tuMP DO-178B Level A Safety Certified and Future Airborne Capability Environment (FACE™) Conformant RTOS. Curtiss-Wright Corporation Page 2 INTEGRITY-178 will be demonstrated on a Curtiss-Wright’s safety-certifiable VPX3-152 3U OpenVPX NXP® Power Architecture® T2080 SBC and VPX3-716 3U OpenVPX AMD E8860 Graphics Processing Module.
    [Show full text]
  • Freescale Embedded Solutions Based on ARM Technology Guide
    Embedded Solutions Based on ARM Technology Kinetis MCUs MAC5xxx MCUs i.MX applications processors QorIQ communications processors Vybrid controller solutions freescale.com/ARM ii Freescale Embedded Solutions Based on ARM Technology Table of Contents ARM Solutions Portfolio 2 i.MX Applications Processors 18 i.MX 6 series applications processors 20 Freescale Embedded Solutions Chart 4 i.MX53 applications processors 22 i.MX28 applications processors 23 Kinetis MCUs 6 Kinetis K series MCUs 7 i.MX and QorIQ Kinetis L series MCUs 9 Processor Comparison 24 Kinetis E series MCUs 11 Kinetis V series MCUs 12 Kinetis M series MCUs 13 QorIQ Communications Kinetis W series MCUs 14 Processors 25 Kinetis EA series MCUs 15 QorIQ LS1 family 26 QorIQ LS2 family 29 MAC5xxx MCUs 16 MAC57D5xx MCUs 17 Vybrid Controller Solutions 31 Vybrid VF3xx family 33 Vybrid VF5xx family 34 Vybrid VF6xx family 35 Design Resources 36 Freescale Enablement Solutions 37 Freescale Connect Partner Enablement Solutions 51 freescale.com/ARM 1 Scalable. Innovative. Leading. Your Number One Choice for ARM Solutions Freescale is the leader in embedded control, offering the market’s broadest and best-enabled portfolio of solutions based on ARM® technology. Our end-to-end portfolio of high-performance, power-efficient MCUs and digital networking processors help realize the potential of the Internet of Things, reflecting our unique ability to deliver scalable, systems- focused processing and connectivity. Our large ARM-powered portfolio includes enablement (software and tool) bundles scalable MCU and MPU families from small from Freescale and the extensive ARM ultra-low-power Kinetis MCUs to i.MX ecosystem.
    [Show full text]
  • Evolution of the Pikeos Microkernel
    Evolution of the PikeOS Microkernel Robert Kaiser Stephan Wagner SYSGO AG, Klein-Winternheim, and SYSGO AG, Klein-Winternheim Distributed Systems Lab, University of Applied Sciences, Wiesbaden E-mail: {rob,swa}@sysgo.com Abstract as such it can host an operating system along with its world of application programs (see Figure 1). Since partitions op- The PikeOS microkernel is targeted at real-time embed- erate on separate sets of resources, they are completely iso- ded systems. Its main goal is to provide a partitioned envi- lated and there is no way for a program in one partition to ronment for multiple operating systems with different design affect another partition 2. In this way, multiple ”guest” op- goals to coexist in a single machine. It was initially mod- erating systems are able to coexist in a single machine and elled after the L4 microkernel and has gradually evolved their individual functionalities can be tailored to match the over the years of its application to the real-time, embedded requirements of their application programs. Thus, applica- systems space. This paper describes the concepts that were tions are no longer forced to unconditionally trust a huge added or removed during this evolution and it provides the monolithic kernel containing a lot of complex functionali- rationale behind these design decisions. ties that the application may or may not need. Instead, each subsystem can choose the amount of code that it wants to trust: It can trade complexity for trust. 1 Introduction In complex embedded systems, there frequently ex- ist applications with very different temporal requirements: some must guarantee timely service under all circumstances Microkernels have been receiving new attention during while others have no such constraint, but are instead ex- the recent years.
    [Show full text]
  • Rtzvisor: a Secure and Safe Real-Time Hypervisor
    electronics Article mRTZVisor: A Secure and Safe Real-Time Hypervisor José Martins †, João Alves †, Jorge Cabral ID , Adriano Tavares ID and Sandro Pinto * ID Centro Algoritmi, Universidade do Minho, 4800-058 Guimarães, Portugal; [email protected] (J.M.); [email protected] (J.A.); [email protected] (J.C.); [email protected] (A.T.) * Correspondence: [email protected]; Tel.: +351-253-510-180 † These authors contributed equally to this work. Received: 29 September 2017; Accepted: 24 October 2017; Published: 30 October 2017 Abstract: Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes) to run as userland components. In this paper, we present mRTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, mRTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support.
    [Show full text]