PDF Version 0

Total Page:16

File Type:pdf, Size:1020Kb

PDF Version � �� ������������������� 0 December 2013 B 25361 CAN Newsletter Hardware + Software + Tools + Engineering Encoders make mobile elevating work platforms flexible Electric servo drives prove themselves in outdoor use Motion Motion control Walking excavator uses J1939-linked hydraulics www.can-newsletter.org Adding Connectivity to Your Design Microchip offers support for a variety of wired and wireless communication BEFORE YOUR NEXT WIRED protocols, including peripheral devices and solutions that are integrated with a PIC® Microcontroller (MCU) or dsPIC® Digital Signal Controller (DSC). OR WIRELESS DESIGN: 1. Download free software libraries Microchip’s Solutions include: 2. Find a low-cost development tool USB Wi-Fi® 3. Order samples 8-, 16- and 32-bit USB MCUs for basic, Innovative wireless chips and modules low-cost applications to complex and highly allowing a wide range of devices to connect www.microchip.com/usb integrated systems along with free license to the Internet. Embedded IEEE Std 802.11 www.microchip.com/ethernet software libraries including support for USB Wi-Fi transceiver modules and free TCP/IP www.microchip.com/can device, host, and On-The-Go. stacks. www.microchip.com/lin Ethernet ZigBee® www.microchip.com/wireless PIC MCUs with integrated 10/100 Ethernet Certified ZigBee Compliant Platform (ZCP) for MAC, standalone Ethernet controllers and EUI the ZigBee PRO, ZigBee RF4CE and ZigBee - 48™/EUI - 64™ enabled MAC address chips. 2006 protocol stacks. Microchip’s solutions CAN consist of transceiver products, PIC18, PIC24 8-, 16- and 32-bit MCUs and 16-bit DSCs with and PIC32 MCU and dsPIC DSC families, and integrated CAN, stand alone CAN controllers, certified firmware protocol stacks. CAN I/O expanders and CAN transceivers. MiWiTM LIN MiWi and MiWi P2P are free proprietary protocol stacks developed by Microchip for LIN Bus Master Nodes as well as LIN Bus Slave short-range wireless networking applications Nodes for 8-, 16- and 32-bit PIC MCUs and based on the IEEE 802.15.4™ WPAN 16-bit dsPIC DSCs. The physical layer specification. Wi-Fi G Demo Board connection is supported by CAN and LIN (DV102412) transceivers. The Microchip name and logo, the Microchip logo, dsPIC, MPLAB and PIC are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. All other trademarks are the property of their registered owners. ©2012 Microchip Technology Inc. All rights reserved. ME1023BEng/05.13 Adding Connectivity to Your Design The future of CiA 402 – Building blocks for safe motions he CiA 402 profile for CANopen-specific due to the Tdrives and motion con- SRDO immanent restrictions trollers is already quite ma- to an 8-byte payload. The fol- ture. Introduced in 1996, it lowing safety functions are still has its benefits and its supported: weaknesses. Nevertheless, Safe acceleration range it is one of the most imple- Safe brake control mented motion profiles — Safe cam not just for CANopen com- Safe direction negative munication. The interna- Safe direction positive tionally standardized profile Safely-limited increment (IEC 61800-7-201) has also Safely-limited position Additional building blocks for the CiA 402 CANopen been mapped to Ether- Safely-limited speed motion profile are under development: Safe motion cat and Powerlink (IEC Safely-limited torque function (CiA 402-4) and PDO mapping for devices 61800-7-301). In the next Safe maximum controlling asynchronous and synchronous motors revision of this internation- acceleration (CiA 402-5) al standard, mappings to Safe maximum speed CC-Link IE and EPA will Safe operating stop mapping is not suitable, be- Abstract be launched as well. Of Safe stop 1 cause the system design- The CiA 402 CANopen Microchip offers support for a variety of wired and wireless communication course, IEC 61800-7-301 Safe stop 2 er needs to assign COB-IDs profile for drives and BEFORE YOUR NEXT WIRED protocols, including peripheral devices and solutions that are integrated also contains CANopen Safe speed monitor to the PDOs. Only the first motion controllers will with a PIC® Microcontroller (MCU) or dsPIC® Digital Signal Controller (DSC). OR WIRELESS DESIGN: mapping. CiA will withdraw Safe speed range four have pre-defined COB- be enhanced in the part 1 to part 3 of the CiA Safe torque-off IDs. Type specific PDO map- direction of drives. 1. Download free software libraries Microchip’s Solutions include: 402 specification, in order The safety functions pings for servos and stepper Additionally, there is 2. Find a low-cost development tool to avoid double-specifica- comply with the correspond- motors, respectively for fre- a new PDO mapping USB Wi-Fi® 3. Order samples tions and the risk of incon- ing IEC standards. The safe- quency inverters overcome under development for 8-, 16- and 32-bit USB MCUs for basic, Innovative wireless chips and modules www.microchip.com/usb sistent descriptions. Never- ty control-words and safety this problem, but do not sup- devices that can handle low-cost applications to complex and highly allowing a wide range of devices to connect theless, the CANopen SIG status-words are highly de- port both kinds of motors si- asynchronous and integrated systems along with free license to the Internet. Embedded IEEE Std 802.11 www.microchip.com/ethernet motion control will continue vice-specific depending on multaneously. The proposed synchronous motors software libraries including support for USB Wi-Fi transceiver modules and free TCP/IP www.microchip.com/can to enhance the profile. New the supported safety func- additional PDO mapping will using the same motion device, host, and On-The-Go. stacks. www.microchip.com/lin building blocks will be spec- tions. Therefore, the profile be specified in CiA 402-5, controller. Ethernet ZigBee® www.microchip.com/wireless ified in additional parts of provides a mapping function another building block of the CiA 402 specifications. for command bits and status the CiA 402 series of spec- Link PIC MCUs with integrated 10/100 Ethernet Certified ZigBee Compliant Platform (ZCP) for MAC, standalone Ethernet controllers and EUI The modular approach en- bits. Also, SRDO mapping is ifications. It is intended that www.can-cia.org the ZigBee PRO, ZigBee RF4CE and ZigBee ables motion control manu- highly device-specific. The three TPDOs and three RP- - 48™/EUI - 64™ enabled MAC address chips. 2006 protocol stacks. Microchip’s solutions facturers to implement opti- CiA 402-4 specification pre- DOs will be pre-defined. The consist of transceiver products, PIC18, PIC24 CAN mized functionality in their defines merely the mapping fourths will be used manufac- and PIC32 MCU and dsPIC DSC families, and 8-, 16- and 32-bit MCUs and 16-bit DSCs with products. of the safety control-word and turer-specific. The standard- certified firmware protocol stacks. integrated CAN, stand alone CAN controllers, One of the most im- the safety status-word into ized PDOs contain the status CAN I/O expanders and CAN transceivers. MiWiTM portant extensions is the SRDOs. Additional safety word, respectively the con- LIN MiWi and MiWi P2P are free proprietary support of safety func- target values and safety ac- trol word. Additionally, they protocol stacks developed by Microchip for tions. The SIG will adopt tual values may be mapped contain the values for vl ve- LIN Bus Master Nodes as well as LIN Bus Slave short-range wireless networking applications the motion safety profile by the system-designer. locity (first instance), position Nodes for 8-, 16- and 32-bit PIC MCUs and based on the IEEE 802.15.4™ WPAN originally developed by (second instance), and ve- 16-bit dsPIC DSCs. The physical layer specification. Wi-Fi G Demo Board the ETG (Ethercat Tech- Special PDO mapping locity (third instance). “With connection is supported by CAN and LIN (DV102412) nology Group). The map- this mapping we use the very transceivers. ping to CANopen will be Besides safety, there is a same EDS for power derive similar as to Ethercat in re- trend to control asynchro- systems irrespective of if they spect to the object diction- nous and synchronous mo- control asynchronous or syn- ary (index and sub-indexes tors with the very same de- chronous motors,” said Gün- control Motion will be the same). However, vice. This requires additional ther Wenzel from Schneider the mapping to SRDOs is PDO mapping. Generic PDO Electric. Holger Zeltwanger The Microchip name and logo, the Microchip logo, dsPIC, MPLAB and PIC are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. All other trademarks are the property of their registered owners. CAN Newsletter 4/2013 3 ©2012 Microchip Technology Inc. All rights reserved. ME1023BEng/05.13 The WAGO-I/O-SYSTEM 750 – Cover story One System for All Applications! The future of CiA 402 – Building blocks for safe motions 3 The CiA 402 CANopen profile for drives and motion CAN be connected to any fieldbus controllers will be enhanced with mappings to CC-Link IE and EPA in its next revision. There is also a new PDO Table of contents of Table mapping being developed, for devices that control synchronous and asynchronous motors. Imprint Motion control Publisher Walking excavator uses J1939-linked hydraulics 8 CAN in Automation GmbH Kontumazgarten 3 Encoders make mobile elevating work DE-90429 Nuremberg platforms flexible 26 Electric servo drives prove themselves [email protected] in outdoor use 38 www.can-cia.org www.can-newsletter.org Motor selection: Optimizing belt drives 48 Tel.: +49-911-928819-0 Fax: +49-911-928819-79
Recommended publications
  • 2020 Spring Product Guide Final-Min
    2020 SPRING INTEGRATOR PRODUCT GUIDE COME SWIM WITH THE BIG FISH November 9 – 11, 2020 | Cleveland, OH | Huntington Convention Center Take control of your business success. Gain insights from the integration industry elite this November at Total Tech Summit. This uniquely powerful by invitation-only event drives extraordinary progress in the integration industry. Total Tech Summit is where the industry elite gather. Total Tech Summit helps to grow and improve your company through: › Educational, deep-dive sessions from the industry elite › 1-on-1 and boardroom meetings with new vendors that can take your offerings from better to best › Networking at every turn. Connect with both integrators in your industry and beyond to help give you fresh ideas and business strategies › Complimentary flights, hotel, “Gathering of professionals that registration, and meals to help you are non-competition to collaborate focus on what matters most on ideas to grow business in profits, procurement, strategies, staffing and general business practices is a wealth of knowledge at the cost of a couple days’ time and to also have the added benefit of meeting one on one with manufacturers that you may not have reached out to.” — John Rudolph, Vice President, PCD To learn more and to apply to join the best in the industry, please visit www.totaltechsummit.com Table of Contents Page 6 Audio ▶ Page 23 Control/Networking/Energy Management ▶ Page 36 Home Enhancements (central vacuum, wire and cable, tools, testers, furniture) ▶ Page 48 Security ▶ Page 53 Video ▶ Page
    [Show full text]
  • Greg Kroah-Hartman [email protected] Github.Com/Gregkh/Presentation-Kdbus
    kdbus IPC for the modern world Greg Kroah-Hartman [email protected] github.com/gregkh/presentation-kdbus Interprocess Communication ● signal ● synchronization ● communication standard signals realtime The Linux Programming Interface, Michael Kerrisk, page 878 POSIX semaphore futex synchronization named eventfd unnamed semaphore System V semaphore “record” lock file lock file lock mutex threads condition variables barrier read/write lock The Linux Programming Interface, Michael Kerrisk, page 878 data transfer pipe communication FIFO stream socket pseudoterminal POSIX message queue message System V message queue memory mapping System V shared memory POSIX shared memory shared memory memory mapping Anonymous mapping mapped file The Linux Programming Interface, Michael Kerrisk, page 878 Android ● ashmem ● pmem ● binder ashmem ● POSIX shared memory for the lazy ● Uses virtual memory ● Can discard segments under pressure ● Unknown future pmem ● shares memory between kernel and user ● uses physically contigous memory ● GPUs ● Unknown future binder ● IPC bus for Android system ● Like D-Bus, but “different” ● Came from system without SysV types ● Works on object / message level ● Needs large userspace library ● NEVER use outside an Android system binder ● File descriptor passing ● Used for Intents and application separation ● Good for small messages ● Not for streams of data ● NEVER use outside an Android system QNX message passing ● Tight coupling to microkernel ● Send message and control, to another process ● Used to build complex messages
    [Show full text]
  • Performance Tuning Guide
    Red Hat Enterprise Linux 7 Performance Tuning Guide Optimizing subsystem throughput in Red Hat Enterprise Linux 7 Red Hat Subject Matter ExpertsLaura Bailey Charlie Boyle Red Hat Enterprise Linux 7 Performance Tuning Guide Optimizing subsystem throughput in Red Hat Enterprise Linux 7 Laura Bailey Red Hat Customer Content Services Charlie Boyle Red Hat Customer Content Services Red Hat Subject Matter Experts Edited by Milan Navrátil Red Hat Customer Content Services [email protected] Legal Notice Copyright © 2016 Red Hat, Inc. and others. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Proof Your Canopen Products – Conformance and Interoperability
    December 2012 B 25361 CAN Newsletter Hardware + Software + Tools + Engineering Proof your CANopen products – conformance and interoperability Testing Easy access to CAN network analysis Isobus testing with implement and remaining bus simulation www.can-newsletter.org Solutions for open networks from one source Open CAN-based protocols are the basis of networking in com- mercial vehicles, avionics and industrial control technology. Vector supports you in all development phases of these systems: > Systematic network design with CANoe, ProCANopen and CANeds > Successful implementation with source code for CANopen, J1939 and more > Efficient configuration, test and extensive analysis with ProCANopen, CANoe and CANalyzer Multifaceted trainings and individual consulting complete our extensive offerings. Thanks to the close interlocking of the Vector tools and the competent support, you will increase the efficiency of your entire development process from design to testing. Further information, application notes and demos: www.vector.com/opennetworks AFDX® is an Airbus‘ registered trademark Vector Informatik GmbH Proof your CANopen products – conformance and interoperability Holger Zeltwanger Author Holger Zeltwanger CAN in Automation e. V. Managing Director [email protected] Definitions Compatibility: Capability to exist or perform in harmonious, agreeable, or congenial combination with others. Conformance: Compliance in actions, behavior, etc., with certain accepted stan- dards or specifications. Compliancy: A disposition or tendency to yield to the will of Figure 1: Current CANopen Conformance Test (CCT) tool others. he bell rings. The ap- CAN bit-rates of the tool and nor corrections of the EDS, Ilnteroperability: Tprentice opens the door the devices to 250 kbit/s, he links it to the test tool The ability of systems or of the CiA office.
    [Show full text]
  • Understanding and Improving Security of the Android Operating System
    Syracuse University SURFACE Dissertations - ALL SURFACE December 2016 Understanding and Improving Security of the Android Operating System Edward Paul Ratazzi Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Engineering Commons Recommended Citation Ratazzi, Edward Paul, "Understanding and Improving Security of the Android Operating System" (2016). Dissertations - ALL. 592. https://surface.syr.edu/etd/592 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT Successful realization of practical computer security improvements requires an understanding and insight into the system’s security architecture, combined with a consideration of end-users’ needs as well as the system’s design tenets. In the case of Android, a system with an open, modular architecture that emphasizes usability and performance, acquiring this knowledge and insight can be particularly challenging for several reasons. In spite of Android’s open source philosophy, the system is extremely large and complex, documentation and reference materials are scarce, and the code base is rapidly evolving with new features and fixes. To make matters worse, the vast majority of Android devices in use do not run the open source code, but rather proprietary versions that have been heavily customized by vendors for product dierentiation. Proposing security improvements or making customizations without suicient insight into the system typically leads to less-practical, less-eicient, or even vulnerable results. Point solutions to specific problems risk leaving other similar problems in the distributed security architecture unsolved.
    [Show full text]
  • Product Information Canbedded
    CANbedded Product Information CANbedded Table of Contents 1 Solutions with CANb edded ..................................................................................................................................................... 4 1.1 CANbedded ................................................................................................................................................................................ 4 1.2 Advantages of CANbedded ...................................................................................................................................................... 4 1.3 Your Partner Right From the Start ......................................................................................................................................... 4 1.4 Uniform Solution ....................................................................................................................................................................... 4 2 CANbedded - Basic Software for CAN Communication ....................................................................................................... 4 2.1 Overview of Advantages: ......................................................................................................................................................... 5 2.2 Application Areas ...................................................................................................................................................................... 5 2.3 Functions...................................................................................................................................................................................
    [Show full text]
  • Pagedout 002 Beta2.Pdf
    It seems PO!#1 was received well. OK, that was an understatement - the download count (over 135k at the moment of writing these words) and the positive feedback we've received blew my predictions out of the water! It seems Paged Out! Institute our readers appreciated the old-school zine feel, liked the https://pagedout.institute/ experimental one-page format, and enjoyed the topic choice. Project Lead At the same time I realize we still have a long way to go on multiple fronts. To give you a glimpse of what's on my mind, here Gynvael Coldwind are three most urgent matters. Executive Assistant First of all, the print files proved to be more tricky than Arashi Coldwind expected. Thankfully the first version is being battle-tested at a printing house as we speak, so it shouldn't be long now. Once we have these, we'll claim we've reached beta2. DTP Programmer foxtrot_charlie Secondly, and even more importantly, we have even more delays with optimizing the PDFs towards screen readers (text-to- DTP Advisor speech engines and the like). This requires more work both on the process side and technical side, but we'll get there. And tusiak_charlie once we do, we'll call it the final version. Lead Reviewers And last, I'm thinking of re-working the article review process for Mateusz "j00ru" Jurczyk PO!#3 to distribute the review work more evenly both in terms of time and between reviewers, and to automate certain things we KrzaQ usually check for. So, if you've written an article for PO!#1 or PO! #2, note that there will be changes ("the only constant thing is Reviewers change" and all that).
    [Show full text]
  • Crestron 3-Series Control Systems Reference Guide
    Crestron 3-Series Control Systems Reference Guide A portion of the code in this product is covered by the Microsoft® Public License (Ms-PL), which can be found at www.microsoft.com/opensource/licenses.mspx. This device includes an aggregation of separate independent works that are each generally copyrighted by Crestron Electronics, Inc., with all rights reserved. One of those independent works, Linux Bridge Project, is copyrighted under the GNU GENERAL PUBLIC LICENSE, Version2, reproduced in “GNU General Public License” on page 78, where the corresponding source code is available at: ftp://ftp.crestron.com/gpl. The specific patents that cover Crestron products are listed at patents.crestron.com/. Crestron, the Crestron logo, 3-Series, 3-Series Control System, Core 3, Core 3 OS, Core 3 UI, Cresnet, Crestron Mobile Pro, Crestron Toolbox, e-Control, Fusion RV, VisionTools, and VT Pro-e are either trademarks or registered trademarks of Crestron Electronics, Inc. in the United States and/or other countries. BACnet is either a trademark or registered trademark of American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. in the United States and/or other countries. iPad and iPhone are either trademarks or registered trademarks of Apple, Inc. in the United States and/or other countries. Blu-ray Disc is a trademark or registered trademark of the Blu-ray Disc Association (BDA) in the United States and/or other countries. Android is either a trademark or registered trademark of Google, Inc. in the United States and/or other countries. Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Open Source Used in Cisco Findit Network Probe, Version 1.1.0
    Open Source Used In Cisco FindIT Network Probe 1.1.0.x Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-157639917 Open Source Used In Cisco FindIT Network Probe 1.1.0.x 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-157639917 En ce qui a trait au logiciel gratuit ou à exploitation libre figurant dans ce document, si vous avez des questions ou souhaitez recevoir une copie du code source, auquel vous avez droit en vertu des licences gratuites ou d'exploitation libre applicables (telles que licences GNU Lesser/General Public), veuillez communiquer avec nous à l'adresse external- [email protected]. Dans vos demandes, veuillez inclure le numéro de référence 78EE117C99-157639917 Contents 1.1 Angular Bootstrap 0.12.0 1.1.1 Available under license 1.2 Angular UI Sortable 1.1.1 1.2.1 Available under license 1.3 angular-chart.js 0.7.2 1.3.1 Available under license 1.4 Angular-dashboard-frmework 0.8.0 1.4.1 Available under license 1.5
    [Show full text]
  • The LPIC-2 Exam Prep I
    The LPIC-2 Exam Prep i The LPIC-2 Exam Prep Copyright 2013 Snow B.V. The LPIC-2 Exam Prep ii Copyright © 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 Snow B.V. Copyright 2013 Snow B.V. The LPIC-2 Exam Prep iii COLLABORATORS TITLE : The LPIC-2 Exam Prep ACTION NAME DATE SIGNATURE WRITTEN BY Heinrich W. 2010 Klöpping, Beno T.J. Mesman, Piet W. Plomp, Willem A. Schreuder, Ricky Latupeirissa, Patryck Winkelmolen, Many, many Snow B.V. colleagues for peer reviewing and authoring updates., Jos Jansen, and Joost Helberg REVISION HISTORY NUMBER DATE DESCRIPTION NAME Copyright 2013 Snow B.V. The LPIC-2 Exam Prep iv Contents 0 Capacity Planning (200) 1 0.1 Measure and Troubleshoot Resource Usage (200.1) . .1 0.1.1 iostat .....................................................2 0.1.2 vmstat ....................................................2 0.1.3 netstat ....................................................3 0.1.4 ps .......................................................4 0.1.5 pstree .....................................................5 0.1.6 w .......................................................5 0.1.7 lsof ......................................................5 0.1.8 free ......................................................6 0.1.9 top . .6 0.1.10 uptime ....................................................7 0.1.11 sar ......................................................7 0.1.12 Match / correlate system symptoms with likely problems . .8 0.1.13 Estimate throughput and identify bottlenecks in a system including networking . .8 0.2 Predict Future Resource Needs (200.2) . .8 0.2.1 ........................................................9 0.2.2 Predict future growth . .9 0.2.3 Resource Exhaustion . .9 0.3 Questions and answers . 10 1 Linux Kernel (201) 11 1.1 Kernel Components (201.1) . 11 1.1.1 Different types of kernel images .
    [Show full text]
  • Stable and Should Be Used Instead
    SIMP Documentation THE SIMP TEAM Dec 09, 2020 Contents 1 Level of Knowledge 3 1.1 Quick Start................................................4 1.2 Changelogs................................................4 1.3 SIMP Getting Started Guide....................................... 103 1.4 SIMP User Guide............................................ 119 1.5 SIMP HOWTO Guides.......................................... 208 1.6 Frequently Asked Questions....................................... 281 1.7 Contributing to SIMP.......................................... 290 1.8 SIMP Security Concepts......................................... 326 1.9 SIMP Security Control Mapping..................................... 344 1.10 Vulnerability Supplement........................................ 705 1.11 Help................................................... 707 1.12 License.................................................. 708 1.13 Contact.................................................. 709 1.14 Glossary of Terms............................................ 709 Index 725 i ii SIMP Documentation This is the documentation for the 6.5.0-1 release of SIMP, which is compatible with CentOS and Red Hat Enterprise Linux (RHEL). This guide will walk a user through the process of installing and managing a SIMP system. It also provides a mapping of security features to security requirements, which can be used to document a system’s security conformance. Warning: Be EXTREMELY CAREFUL when performing copy/paste operations from this document! Different web browsers and operating
    [Show full text]
  • An Overview of the Verification of the Sel4 Microkernel
    An Overview of the Verification of the seL4 Microkernel Lukas Stevens Seminar | Formal Proof in Mathematics and Computer Science 21st June 2018 Contents 1 What is the seL4 Microkernel? 1 1.1 A Brief History of Microkernels . .1 1.2 seL4: Putting the Security in L4 . .2 1.3 Operating System Verification: An Overview . .2 2 Engineering the seL4 Kernel 3 2.1 Design Process for Verification . .3 2.2 Formal Methods of the Correctness Proof . .5 3 Layers of the Functional Correctness Proof 6 3.1 Abstract Specification . .6 3.2 Executable Specification . .7 3.3 Low-level Implementation in C . .8 3.4 Refinement by Forward Simulation . .9 3.5 The Costs and Benefits of Verification . 11 4 Summary and Outlook 13 1 What is the seL4 Microkernel? 1.1 A Brief History of Microkernels Our interactions with computers are shaped by operating systems (OS) such as Linux, Windows and Android. Therefore, understanding the inner workings of operating systems is not only interesting, but also important. At the core of every OS resides the kernel [Lin]. The kernel is responsible for providing the necessary abstractions that are needed to run the rest of the OS and user facing applications. These abstractions include memory management, i.e. mapping of virtual addresses into physical memory, and scheduling of threads. In order to provide these services, the kernel is the first part of the OS loaded into memory at startup, and it retains complete control over the whole system after that. Owing to its critical nature, the kernel is usually loaded into a protected memory region, which can not be accessed by the rest of the OS or user applications.
    [Show full text]