The Liteos Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks

Total Page:16

File Type:pdf, Size:1020Kb

The Liteos Operating System: Towards Unix-Like Abstractions for Wireless Sensor Networks 2008 International Conference on Information Processing in Sensor Networks The LiteOS Operating System: Towards Unix-like Abstractions for Wireless Sensor Networks Qing Cao, Tarek Abdelzaher John Stankovic Department of Computer Science Department of Computer Science University of Illinois at Urbana-Champaign University of Virginia {qcao2, zaher}@cs.uiuc.edu [email protected] Tian He Department of Computer Science University of Minnesota [email protected] Abstract sensor networks circle. The purpose of LiteOS is to sig- nificantly reduce such a learning curve. This philosophy is This paper presents LiteOS, a multi-threaded operating the operating system equivalent of network directions taken system that provides Unix-like abstractions for wireless sen- by companies such as Arch Rock [1] (that superimposes a sor networks. Aiming to be an easy-to-use platform, LiteOS familiar IP space on mote platforms to reduce the learning offers a number of novel features, including: (1) a hier- curve of network programming and management). archical file system and a wireless shell interface for user interaction using UNIX-like commands; (2) kernel support Our key contribution is to present a familiar, Unix-like for dynamic loading and native execution of multithreaded abstraction for wireless sensor networks by leveraging the applications; and (3) online debugging, dynamic memory, likely existing knowledge that common system program- and file system assisted communication stacks. LiteOS also mers (outside the current sensor network community) al- supports software updates through a separation between the ready have: Unix, threads, and C. By mapping sensor net- kernel and user applications, which are bridged through a works to file directories, it allows applying user-friendly suite of system calls. Besides the features that have been im- operations, such as file directory commands, to sensor net- plemented, we also describe our perspective on LiteOS as works, therefore reducing the learning curve for operating an enabling platform. We evaluate the platform experimen- and programming sensor networks. tally by measuring the performance of common tasks, and LiteOS differs from both current sensor network oper- demonstrate its programmability through twenty-one exam- ating systems and more conventional embedded operating ple applications. systems. Compared to the former category, such as TinyOS, LiteOS provides a more familiar environment to the user. Its 1 Introduction features are either not available in existing sensor network This paper introduces LiteOS, an operating system that operating systems, such as the shell and the hierarchical file provides Unix-like abstractions to wireless sensor networks. system, or are only partially supported. Compared to the LiteOS maps a sensor network into a UNIX-like file system, latter category (conventional embedded operating systems), and supports extremely resource-constrained nodes such as such as VxWorks [29], eCos [2], embedded Linux, and MicaZ. It supports C programming natively, and allows on- Windows CE, LiteOS has a much smaller code footprint, line debugging to locate application bugs. We believe that running on platforms such as MicaZ, with an 8MHz CPU, such an operating system could potentially expand the cir- 128K bytes of program flash, and 4K bytes of RAM. Em- cle of sensor network application developers by providing bedded operating systems, such as VxWorks, require more a familiar programming environment. While TinyOS and computation power (e.g., ARM-based or XScale-based pro- its extensions have significantly improved programmability cessors) and more RAM (at least tens of KBytes), and thus of mote-class embedded devices via a robust, modular en- cannot be easily ported to MicaZ-class hardware platforms vironment, NesC and the event-based programming model (such as MicaZ, Tmote, and Telos). introduce a learning curve for most developers outside the A possible counter-argument to our investment in a 978-0-7695-3157-1/08 $25.00 © 2008 IEEE 233 DOI 10.1109/IPSN.2008.54 small-footprint UNIX-like operating system is that, in the aging familiar abstractions is advisable. One approach is near future, Moore’s law will make it possible for conven- to build user-friendly applications and GUIs such as Sen- tional Linux and embedded operating systems to run on sorMap [25] and MoteView [7]. In this paper, we explore motes. For example, the recent iMote2 [6] platform by a complementary solution that targets the operating system CrossBow features an XScale processor that supports em- and programming environment. bedded Linux. Sun and Intel also demonstrated more pow- In additional to proposing several novel features, LiteOS erful sensor network hardware platforms [3, 24]. While it is also draws from previous research efforts. Its shell sub- true that more resources will be available within the current system is directly inspired by Unix, by adopting Unix-like mote form factor, Moore’s law can also be harvested by de- commands. The advantage of such command-line shells is creasing the form factor while keeping resources constant. that they are well-established mechanisms to interact with For example, the current MicaZ form factor is far from ade- complicated systems, providing powerful scripting and au- quate for wearable computing applications. Wearable body tomation support. Previous systems, such as Mantis and networks can have a significant future impact on health- Contiki, have implemented shell interfaces on resource- care, leisure, and social applications if sensor nodes could constrained motes. In contrast, LiteOS implements the shell be made small enough to be unobtrusively embedded in at- on the resource-rich PC side (basestation). This design tire and personal effects. These applications will drive the choice allows us to implement more powerful commands, need for small-footprint operating systems and middleware because the shell is no longer constrained by sensor node as computation migrates to nodes that are smaller, cheaper, resources. and more power-efficient. This paper serves as a proof of There have also been efforts to provide file systems concept by pushing the envelope within the constraints of a for MicaZ-class sensor nodes, such as MatchBox [11] and current device; namely, the MicaZ motes. ELF [8], as well as flash-based systems, where additional We have implemented LiteOS on the MicaZ platform. flash is plugged to sensor nodes, such as Capsule [22]. To The LiteOS software is available for download at the web- implement the file system of LiteOS, we did not adopt the site http://www.liteos.net, including its manual, program- former because their interfaces do not match our goals: ming guide, application notes, and source code. Matchbox and ELF do not support hierarchical file orga- The rest of this paper is organized as follows. Section 2 nizations, and only provide basic abstractions for file oper- describes the related work. Section 3 introduces the LiteOS ations such as reading and writing. On the other hand, we operating system and describes its design and implemen- did not adopt the latter because it requires an external flash tation. Section 4 introduces its programming environment attachment. In contrast, we want users with off-the-shelf and application examples. Section 5 presents the evalua- MicaZ nodes to be able to directly use LiteOS. tion results. Section 6 outlines more features that LiteOS The third subsystem of LiteOS, its kernel, features dy- currently supports. Section 7 discusses the potential of this namic loading, a feature that is taken for granted in almost platform. Section 8 concludes this paper. every modern operating system. One approach to imple- 2 Related Work ment dynamic loading is based on virtual memory. While The rapid advances of sensor networks in the past few virtual memory support in MicaZ-class sensor networks has years created many exciting systems and applications. Op- been implemented [14, 20], we observe that such efforts erating systems such as TinyOS [16], Contiki [9], SOS [15], slow down program execution, because of the lack of hard- Mantis [5], t-Kernel [14], and Nano-RK [10] provided soft- ware support for page tables and the limited computation ware platforms. Middleware systems such as TinyDB [21] power of the CPU. While the direction of supporting dy- and EnviroTrack [4] made fast development of special- namic loading with the help of virtual memory may still be ized applications feasible. Deployed applications ranged possible, several previous efforts have tried alternative ap- from global climate monitoring to animal tracking [18], proaches to implement dynamic loading in sensor networks. promising unprecedented sampling of the physical world. The dynamic loading mechanism of LiteOS follows the Widespread adoption and commercialization of sensor net- line of several previous efforts in the literature that did not works is the next logical step. involve virtual memory such as TinyOS (using XNP), SOS, The most obvious challenge in sensor network devel- and Contiki. In XNP, a boot loader provides loading ser- opment has been to fit within extremely constrained plat- vice by reprogramming part of the flash and jumping to its form resources. Previous work, such as TinyOS, there- entry point to dispatch it. While this approach is practical, fore focused on reducing overhead and increasing robust- it cannot load more than one application, due to potential ness. Since initial users were researchers, compatibility conflicts in memory accesses.
Recommended publications
  • A Comparative Study on Operating System for Wireless Sensor Networks
    ICACSIS 2011 ISBN: 978-979-1421-11-9 A Comparative Study on Operating System for Wireless Sensor Networks Thang Vu Chien, Hung Nguyen Chan, and Thanh Nguyen Huu Thai Nguyen University of Information and Communication Technology Quyet Thang Commune, Thai Nguyen City, Vietnam E-mail: [email protected], [email protected], [email protected] Abstract—Wireless Sensor Networks (WSNs) them work correctly and effectively without a conflict have been the subject of intensive research over the in support of the specific applications for which they last years. WSNs consist of a large number of are designed. Each sensor node needs an OS that can sensor nodes, and are used for various applications control the hardware, provide hardware abstraction to such as building monitoring, environment control, application software, and fill in the gap between wild-life habitat monitoring, forest fire detection, applications and the underlying hardware. industry automation, military, security, and health- The basic functionalities of an OS include resource care. Operating system (OS) support for WSNs abstractions for various hardware devices, interrupt plays a central role in building scalable distributed management and task scheduling, concurrency control, applications that are efficient and reliable. Over and networking support. Based on the services the years, we have seen a variety of operating provided by the OS, application programmers can systems (OSes) emerging in the sensor network conveniently use high-level application programming community to facilitate developing WSN interfaces (APIs) independent of the underlying applications. In this paper, we present OS for WSNs. We begin by presenting the major issues for hardware.
    [Show full text]
  • AMNESIA 33: How TCP/IP Stacks Breed Critical Vulnerabilities in Iot
    AMNESIA:33 | RESEARCH REPORT How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Published by Forescout Research Labs Written by Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels and Amine Amri RESEARCH REPORT | AMNESIA:33 Contents 1. Executive summary 4 2. About Project Memoria 5 3. AMNESIA:33 – a security analysis of open source TCP/IP stacks 7 3.1. Why focus on open source TCP/IP stacks? 7 3.2. Which open source stacks, exactly? 7 3.3. 33 new findings 9 4. A comparison with similar studies 14 4.1. Which components are typically flawed? 16 4.2. What are the most common vulnerability types? 17 4.3. Common anti-patterns 22 4.4. What about exploitability? 29 4.5. What is the actual danger? 32 5. Estimating the reach of AMNESIA:33 34 5.1. Where you can see AMNESIA:33 – the modern supply chain 34 5.2. The challenge – identifying and patching affected devices 36 5.3. Facing the challenge – estimating numbers 37 5.3.1. How many vendors 39 5.3.2. What device types 39 5.3.3. How many device units 40 6. An attack scenario 41 6.1. Other possible attack scenarios 44 7. Effective IoT risk mitigation 45 8. Conclusion 46 FORESCOUT RESEARCH LABS RESEARCH REPORT | AMNESIA:33 A note on vulnerability disclosure We would like to thank the CERT Coordination Center, the ICS-CERT, the German Federal Office for Information Security (BSI) and the JPCERT Coordination Center for their help in coordinating the disclosure of the AMNESIA:33 vulnerabilities.
    [Show full text]
  • Tinyos Meets Wireless Mesh Networks
    TinyOS Meets Wireless Mesh Networks Muhammad Hamad Alizai, Bernhard Kirchen, Jo´ Agila´ Bitsch Link, Hanno Wirtz, Klaus Wehrle Communication and Distributed Systems, RWTH Aachen University, Germany [email protected] Abstract 2 TinyWifi We present TinyWifi, a nesC code base extending TinyOS The goal of TinyWifi is to enable direct execution of to support Linux powered network nodes. It enables devel- TinyOS applications and protocols on Linux driven network opers to build arbitrary TinyOS applications and protocols nodes with no additional effort. To achieve this, the Tiny- and execute them directly on Linux by compiling for the Wifi platform extends the existing TinyOS core to provide new TinyWifi platform. Using TinyWifi as a TinyOS plat- the exact same hardware independent functionality as any form, we expand the applicability and means of evaluation of other platform (see Figure 1). At the same time, it exploits wireless protocols originally designed for sensornets towards the customary advantages of typical Linux driven network inherently similar Linux driven ad hoc and mesh networks. devices such as large memory, more processing power and higher communication bandwidth. In the following we de- 1 Motivation scribe the architecture of each component of our TinyWifi Implementation. Although different in their applications and resource con- straints, sensornets and Wi-Fi based multihop networks share 2.1 Timers inherent similarities: (1) They operate on the same frequency The TinyOS timing functionality is based on the hardware band, (2) experience highly dynamic and bursty links due to timers present in current microcontrollers. A sensor-node radio interferences and other physical influences resulting in platform provides multiple realtime hardware timers to spe- unreliable routing paths, (3) each node can only communi- cific TinyOS components at the HAL layer - such as alarms, cate with nodes within its radio range forming a mesh topol- counters, and virtualization.
    [Show full text]
  • Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy
    Journal of Sensor and Actuator Networks Review Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy Nahla S. Abdel Azeem 1, Ibrahim Tarrad 2, Anar Abdel Hady 3,4, M. I. Youssef 2 and Sherine M. Abd El-kader 3,* 1 Information Technology Center, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 2 Electrical Engineering Department, Al-Azhar University, Naser City, Cairo 11651, Egypt; [email protected] (I.T.); [email protected] (M.I.Y.) 3 Computers & Systems Department, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 4 Department of Computer Science & Engineering, School of Engineering and Applied Science, Washington University in St. Louis, St. Louis, MO 63130, 1045, USA; [email protected] * Correspondence: [email protected] Received: 19 March 2019; Accepted: 7 May 2019; Published: 15 May 2019 Abstract: The rabid growth of today’s technological world has led us to connecting every electronic device worldwide together, which guides us towards the Internet of Things (IoT). Gathering the produced information based on a very tiny sensing devices under the umbrella of Wireless Sensor Networks (WSNs). The nature of these networks suffers from missing sharing among them in both hardware and software, which causes redundancy and more budget to be used. Thus, the appearance of Shared Sensor Networks (SSNs) provides a real modern revolution in it. Where it targets making a real change in its nature from domain specific networks to concurrent running domain networks. That happens by merging it with the technology of virtualization that enables the sharing feature over different levels of its hardware and software to provide the optimal utilization of the deployed infrastructure with a reduced cost.
    [Show full text]
  • Overview of Wireless Sensor Network (WSN) Security
    Overview of Wireless Sensor Network (WSN) Security Aparicio Carranza Heesang Kim Xiao Lin Chen NYC College of Technology NYC College of Technology NYC College of Technology 186 Jay Street – V626 186 Jay Street 186 Jay Street Brooklyn, NY, USA Brooklyn, NY, USA Brooklyn NY, USA 718 – 260 – 5897 703 – 232 – 2001 917 – 285 - 5155 [email protected] [email protected] xiaolin,[email protected] ABSTRACT of different transmission schemes, allowing the connection Our civilization has entered an era of big data networking. to be made between different models. A router is a good Massive amounts of data is being converted into bits for example of a gateway. There are two common Wireless transmitting over the Internet and shared all over the world network topologies commonly used in WSN systems, they every second. The concept of “smart” devices has are “relay nodes” and “leaf nodes”. The relay network is a conquered preconceived notions of daily routines. broad network topology where the source and destination Smartphones and wearable device technologies have made are interconnected through some node. In these networks, humans to be continuously interconnected, making distance the source and destination cannot communicate directly a factor of no limitation. “Smart” systems are based on a with each other because the distance between the source single concept called the Internet of Things (IoT). IoT is a and destination is greater than the transmission range, due web of wirelessly networked devices embedded with to this an intermediate node needs to relay. The advantage electronic components and sensors that monitors physical of using the relay nodes is that the information can travel and environmental conditions and acquires data to be long distances even when the caller and recipient are far shared with other systems.
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Low Power Or High Performance? a Tradeoff Whose Time
    Low Power or High Performance? ATradeoffWhoseTimeHasCome(andNearlyGone) JeongGil Ko1,KevinKlues2,ChristianRichter3,WanjaHofer4, Branislav Kusy3,MichaelBruenig3,ThomasSchmid5,QiangWang6, Prabal Dutta7,andAndreasTerzis1 1 Department of Computer Science, Johns Hopkins University 2 Computer Science Division, University of California, Berkeley 3 Australian Commonwealth Scientific and Research Organization (CSIRO) 4 Department of Computer Science, Friedrich–Alexander University Erlangen–Nuremberg 5 Department Computer Science, University of Utah 6 Department of Control Science and Engineering, Harbin Institute of Technology 7 Division of Computer Science and Engineering, University of Michigan, Ann Arbor Abstract. Some have argued that the dichotomy between high-performance op- eration and low resource utilization is false – an artifact that will soon succumb to Moore’s Law and careful engineering. If such claims prove to be true, then the traditional 8/16- vs. 32-bit power-performance tradeoffs become irrelevant, at least for some low-power embedded systems. We explore the veracity of this the- sis using the 32-bit ARM Cortex-M3 microprocessor and find quite substantial progress but not deliverance. The Cortex-M3, compared to 8/16-bit microcon- trollers, reduces latency and energy consumption for computationally intensive tasks as well as achieves near parity on code density. However, it still incurs a 2 overhead in power draw for “traditional” sense-store-send-sleep applica- tions.∼ × These results suggest that while 32-bit processors are not yet ready for applications with very tight power requirements, they are poised for adoption ev- erywhere else. Moore’s Law may yet prevail. 1Introduction The desire to operate unattended for long periods of time has been a driving force in de- signing wireless sensor networks (WSNs) over the past decade.
    [Show full text]
  • Monitoring High Voltage Power Lines Using Efficient WSN
    Advances in Energy and Power 7(1): 10-19, 2020 http://www.hrpub.org DOI: 10.13189/aep.2020.070102 Monitoring High Voltage Power Lines Using Efficient WSN Khaled Al-Maitah, Batool Al-Khriesat, Abdullah Al-Odienat* Department of Electrical Engineering, Faculty of Engineering, Mutah University, Jordan Received March 13, 2020; Revised April 22, 2020; Accepted April 27, 2020 Copyright©2020 by authors, all rights reserved. Authors agree that this article remains permanently open access under the terms of the Creative Commons Attribution License 4.0 International License Abstract The power transmission line is one of most [1]. Moreover, power systems are now highly critical components in electrical power system. In order to interconnected which allows the transfer of a large enhance the reliability of the large power systems, an electrical energy over long distances far from the source of advanced and efficient Wireless Sensor Network (WSN) generation to locations suffer of lack in electrical energy [2] must be employed along power transmission line. However, [3]. time delay has emerged as one of the most critical issues in In power systems, transmission lines are critical the design of WSN-based monitoring network of components from the reliability and stability view point. transmission lines. This paper proposes a new model for There is a real need for an efficient monitoring system of WSN for monitoring High Voltage Transmission Line the transmission lines to enhance the normal operation of (HVTL) which improves the needed time delay to transmit the power system and avoid the major disconnections and the measured quantity from transmission line towers to the blackouts [4].
    [Show full text]
  • System Architecture Directions for Post-Soc/32-Bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J
    System Architecture Directions for Post-SoC/32-bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J. Zhao, Kevin Ma, and David E. Culler Department of Electrical Engineering and Computer Sciences, University of California, Berkeley (hs.kim,m.andersen,kaifei,samkumar,william_zhao,kevinma.sd,culler)@berkeley.edu ABSTRACT those that have guided design over the past 20 years, since the The emergence of low-power 32-bit Systems-on-Chip (SoCs), which emergence of the field [31, 37]. While it is easy to observe high- integrate a 32-bit MCU, radio, and flash, presents an opportunity level trends and infer that at some point conventional concurrency to re-examine design points and trade-offs at all levels of the sys- models and networking stacks will fit on this class of computing tem architecture of networked sensors. To this end, we develop a platform, when dealing with low power embedded operation, the post-SoC/32-bit design point called Hamilton, showing that using devil is always in the details. integrated components enables a ∼$7 core and shifts hardware mod- The datasheets for modern 32-bit System-on-Chip units (SoCs) ularity to design time. We study the interaction between hardware with an integrated microcontroller (MCU) and radio are truly im- and embedded operating systems, identifying that (1) post-SoC pressive [10, 43]. Thread-based OSes have reemerged (e.g., RIOT motes provide lower idle current (5.9 µA) than traditional 16-bit [14]), and commercially-driven IPv6 network protocols have arrived motes, (2) 32-bit MCUs are a major energy consumer (e.g., tick (e.g., OpenThread [71]).
    [Show full text]
  • A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks
    A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre To cite this version: Kosmas Kritsis, Georgios Papadopoulos, Antoine Gallais, Periklis Chatzimisios, Fabrice Theoleyre. A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks. Communications Surveys and Tutorials, IEEE Communications Society, Institute of Electrical and Electronics Engineers, 2018, 20 (3), pp.1799 - 1825. 10.1109/COMST.2018.2820810. hal-01886690 HAL Id: hal-01886690 https://hal.archives-ouvertes.fr/hal-01886690 Submitted on 23 Apr 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1 A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks Kosmas Kritsis, Georgios Z. Papadopoulos, Member, IEEE, Antoine Gallais, Periklis Chatzimisios, Senior Member, IEEE, and Fabrice Theoleyre,´ Senior Member, IEEE, Abstract—Envisioned communication densities in Internet of may be used for counting the number of vehicles, such to Things (IoT) applications are increasing continuously. Because control optimally the street traffic lights and to reduce the these wireless devices are often battery powered, we need waiting time [3]. specific energy efficient (low-power) solutions.
    [Show full text]
  • A Comparative Study Between Operating Systems (Os) for the Internet of Things (Iot)
    VOLUME 5 NO 4, 2017 A Comparative Study Between Operating Systems (Os) for the Internet of Things (IoT) Aberbach Hicham, Adil Jeghal, Abdelouahed Sabrim, Hamid Tairi LIIAN, Department of Mathematic & Computer Sciences, Sciences School, Sidi Mohammed Ben Abdellah University, [email protected], [email protected], [email protected], [email protected] ABSTRACT Abstract : We describe The Internet of Things (IoT) as a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data in real time with the outside world. It therefore assumes an operating system (OS) which is considered as an unavoidable point for good communication between all devices “objects”. For this purpose, this paper presents a comparative study between the popular known operating systems for internet of things . In a first step we will define in detail the advantages and disadvantages of each one , then another part of Interpretation is developed, in order to analyze the specific requirements that an OS should satisfy to be used and determine the most appropriate .This work will solve the problem of choice of operating system suitable for the Internet of things in order to incorporate it within our research team. Keywords: Internet of things , network, physical object ,sensors,operating system. 1 Introduction The Internet of Things (IoT) is the vision of interconnecting objects, users and entities “objects”. Much, if not most, of the billions of intelligent devices on the Internet will be embedded systems equipped with an Operating Systems (OS) which is a system programs that manage computer resources whether tangible resources (like memory, storage, network, input/output etc.) or intangible resources (like running other computer programs as processes, providing logical ports for different network connections etc.), So it is the most important program that runs on a computer[1].
    [Show full text]
  • Iot Ecosystem Brand White Paper
    IoT Ecosystem Brand White Paper The Standards and Definition of IoT Ecosystem Brand September 20th, 2020 IoT Ecosystem Brand White Paper 1 There are times when it is wise for important role in business growth Foreword corporations to take a pregnant in the years to come. Frameworks pause. To look around and see if the that encourage entrepreneurism very things that have made them and put the customer at the center successful are the right ingredients of the organisation to create lasting to secure success in the future. lifetime value right across a vibrant ecosystem. As a diligent student of corporate history and business transformation But here is the issue that has been myself it is often easy to spot, with troubling me and many others for the magic of hindsight, the point at some time. which a successful company started to fail. From then on, it's often a long, Our financial accounting models, undignified journey of management performance metrics, calculations denial and subsequent terminal of economic profit, ROCE and many David Roth decline with the destruction of much of the established metrics that shareholder value along the way. analysts plug into their spreadsheets to uncover hidden value, are all CEO The Store WPP, Corporations have a bad habit of part of an old model - a model not Chairman BrandZTM thinking they will last forever - that's designed for an ecosystem era. and BAV Group, how they are built and structured. Global They struggle to extract onto the Consumers and customers have a balance sheet the true value the very different mindset as viewed ecosystem is creating, the value to through the lens of their changing the firm, it's ecosystem partners and attitudes and bonds towards the their respective brands.
    [Show full text]