Implementation of a Microsoft Windows Embedded Standard System

Implementation of a Microsoft Windows Embedded Standard System

University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 12-2010 Implementation of a Microsoft Windows embedded standard system. Kristopher L. Kumler University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Recommended Citation Kumler, Kristopher L., "Implementation of a Microsoft Windows embedded standard system." (2010). Electronic Theses and Dissertations. Paper 783. https://doi.org/10.18297/etd/783 This Master's Thesis is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. IMPLEMENTATION OF A MICROSOFT WINDOWS EMBEDDED STANDARD SYSTEM By Kristopher L. Kumler B.S., University of Louisville, 2002 A Thesis Submitted to the Faculty of the University of Louisville J.B. Speed School of Engineering in Partial Fulfillment of the Requirements for the Professional Degree MASTER OF ENGINEERING Department of Computer Engineering and Computer Science December 2010 IMPLEMENTATION OF A MICROSOFT WINDOWS EMBEDDED STANDARD SYSTEM Submitted by: _______________________________ Kristopher L. Kumler A Thesis Approved On _______________December 8, 2010 _______________ (Date) by the Following Reading and Examination Committee: ___________________________________ Ahmed H. Desoky, Thesis Director ___________________________________ Adel S. Elmaghraby ___________________________________ John F. Naber ii ACKNOWLEDGMENTS I would like to express my appreciation to my advisor, Dr. Ahmed Desoky, for his guidance and patience. I also thank my committee, Dr. Adel Elmaghraby and Dr. John Naber. Special thanks to Mr. David Goffinet and Image Vault, LLC. for the use of equipment and the use of Image Vault’s software product as an example host application. Thanks to Eric Kramer, for his help with advice, proofreading, and editing. I want to express my appreciation to my wife, Mandy Kumler, for pushing me to finish. Her tremendous love and dedication throughout the past twelve years is ineffable. iii ABSTRACT Many dedicated-use computer systems sold as complete products require a turn-key design delivered to the customer. This requires a system which is stable, secure, and serviceable. Adaptability of the system to existing software applications is a key consideration for many vendors. This thesis attempts to establish and gather best practices for designing, configuring, and building a Microsoft Windows Embedded Standard 2009 system. An existing real-world system will be used as a case study and example implementation. The end result will be a relatively compact, secure, and efficient Microsoft Windows Operating System image to support the target software application. iv TABLE OF CONTENTS APPROVAL PAGE....................................................................................................ii ACKNOWLEDGMENTS .........................................................................................iii ABSTRACT .............................................................................................................. iv TABLE OF CONTENTS............................................................................................ v LIST OF TABLES .................................................................................................... vi LIST OF FIGURES ................................................................................................. vii LIST OF FIGURES ................................................................................................. vii I. INTRODUCTION.................................................................................................. 1 II. LITERATURE REVIEW......................................................................................4 A. System Reliability.............................................................................................4 B. System Security ................................................................................................ 7 C. Microsoft Windows Embedded Products ........................................................8 D. Windows Embedded Standard...................................................................... 10 III. INSTRUMENTATION AND EQUIPMENT......................................................15 A. Hardware Platform .........................................................................................15 B. Hosted Application..........................................................................................17 C. Windows Embedded Tools .............................................................................17 IV. DEVELOPMENT OF AN EMBEDDED OPERATING SYSTEM PLATFORM 20 A. Motherboard ...............................................................................................20 B. Device Drivers .............................................................................................23 C. Host Application .........................................................................................26 D. AutoUpdate Application..........................................................................29 E. Image Configuration ...................................................................................30 F. Target Image Preparation...........................................................................36 V. DISCUSSION OF RESULTS..............................................................................39 VI. CONCLUSIONS................................................................................................ 41 VII. RECOMMENDATIONS..................................................................................42 APPENDIX I. TARGET ANALYSIS RESULTS......................................................44 APPENDIX II. RECORDER APPLICATION DEPENDENCY SPECIFICATION .46 APPENDIX III. RECORDER APPLICATION ANALYZED DEPENDENCIES.....48 APPENDIX IV. IVRECORD COMPONENT CREATION...................................... 54 APPENDIX V. AUTOUPDATE COMPONENT CREATION .................................58 APPENDIX VI. WINDOWS SECURITY DIALOG PREFERENCES .....................60 APPENDIX VII. IMAGE CONFIGURATION CREATION....................................64 LIST OF REFERENCES.........................................................................................69 VITA ........................................................................................................................71 v LIST OF TABLES TABLE I. WINDOWS EMBEDDED FAMILY COMPARISON................................9 TABLE II. BOOT AND STORAGE OPTIONS .........................................................11 TABLE III. HARDWARE DEVICES .......................................................................15 TABLE IV. REQUIREMENT RESOLUTIONS ......................................................39 vi LIST OF FIGURES FIGURE 1. SYSTEM RELIABILITY FAILURE FAULT TREE ...............................................6 FIGURE 2. TARGET ANALYZER PROBE EXECUTION ................................................... 21 FIGURE 3. SELECTOR PROTOTYPE USED FOR MACRO COMPONENT ...........................22 FIGURE 4. COMPONENT DATABASE MANAGER IMPORT ............................................23 FIGURE 5. VIDEO CAPTURE DEVICE RESOURCES ......................................................24 FIGURE 6. COMPONENT REPOSITORY SELECTION ..................................................... 25 FIGURE 7. DEPENDENCY WALKER ANALYSIS ............................................................ 27 FIGURE 8. RECORDER SOFTWARE COMPONENT DEPENDENCIES ...............................28 FIGURE 9. CONFIGURATION SETTINGS – RUN -TIME IMAGE LICENSING ..................... 31 FIGURE 10. ACPI MULTIPROCESSOR PC CONFIGURATION .......................................32 FIGURE 11. WINDOWS FIREWALL CONFIGURATION ..................................................33 FIGURE 12. SYSTEM CLONING TOOL CONFIGURATION ..............................................34 FIGURE 13. CONFIGURATION DEPENDENCY CHECK .................................................. 35 FIGURE 14. FIRST BOOT AGENT EXECUTING ............................................................36 FIGURE 15. FIRST BOOT AGENT COMPLETE ............................................................. 37 FIGURE 16. FINAL SYSTEM RUNNING IMAGE VAULT ’S RECORDER APPLICATION ........38 FIGURE 17. DEPENDENCY WALKER PROFILING CONFIGURATION ..............................48 FIGURE 18. IVR ECORD COMPONENT PROPERTIES ................................................... 57 FIGURE 19. AUTO UPDATE COMPONENT PROPERTIES ............................................... 59 FIGURE 20. COMPONENT DESIGNER REGISTRY DATA ..............................................60 FIGURE 21. IMAGE CONFIGURATION EXTRA REGISTRY DATA ....................................68 vii I. INTRODUCTION Modern dedicated computer systems are in use throughout the consumer marketplace. Devices such as ATMs, retail kiosks, gaming or security systems, medical devices, or other application-dedicated systems require a stable and secure platform for their Operating System. The repercussions of failures in either system stability, with crashes or denial of service, or security, with user or external breaches, can result in the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    80 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us