SESM Demonstrator FPGA Power Node Prototype Emilio Bisbiglio, SESM, Przemyslaw Osocha, SESM,

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Managing Cisco IOS Software. Overview The router boot sequence Locating IOS software The configuration register Recovering Passwords Backing Up the Cisco.
I/O Organization popo.
MM Player Supervised by: Dr. Luai Malhis. Prepared by: Mustafa Assaf & Mahmoud Musa.
Concept V2.5 Lesson 11 Objectives: After completing this lesson, the learner will be able to:  Define the configuration rules associated with the Quantum.
Using an FPGA to Control the Protection of National Security and Sailor Lives at Sea Brenda G. Martinez, Undergraduate Student K.L. Butler-Purry, Ph.D.,
Chapter 19: Network Management Business Data Communications, 4e.
1 Performed By: Khaskin Luba Einhorn Raziel Einhorn Raziel Instructor: Rivkin Ina Spring 2004 Spring 2004 Virtex II-Pro Dynamical Test Application Part.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
1 Project supervised by: Dr Michael Gandelsman Project performed by: Roman Paleria, Avi Yona 12/5/2003 Multi-channel Data Acquisition System Mid-Term Presentation.
Group 4 Craig Bellamy Jeremy Ruple Frank Swehosky Ryan VanAlstine.
Team Monte Cristo Joseph Carrafa Sharon Clark Scott Hassett Alex Mason The Deep Fried Game Station.
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
1 Project supervised by: Dr Michael Gandelsman Project performed by: Roman Paleria, Avi Yona 26/4/2004 Multi-channel Data Acquisition System Final_A Presentation.
CCNA 2 v3.1 Module 2.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Monitoring systems COMET types MS55 & MS6 MS55/MS6 Configuration.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
1 Chapter 2 ROUTER FUNDAMENTALS By: Tassos Tassou.
Ch.2 – Introduction to Routers
Add on cards. Also known as Expansion card or interface adapter. It can be inserted into an expansion slot of a motherboard to add functionality to a.
Input/OUTPUT [I/O Module structure].
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
DLS Digital Controller Tony Dobbing Head of Power Supplies Group.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Page 1 Reconfigurable Communications Processor Principal Investigator: Chris Papachristou Task Number: NAG Electrical Engineering & Computer Science.
Ch.2 – Introduction to Routers
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
Device Drivers CPU I/O Interface Device Driver DEVICECONTROL OPERATIONSDATA TRANSFER OPERATIONS Disk Seek to Sector, Track, Cyl. Seek Home Position.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Experimental Evaluation of System-Level Supervisory Approach for SEFIs Mitigation Mrs. Shazia Maqbool and Dr. Craig I Underwood Maqbool 1 MAPLD 2005/P181.
Implementing Memory Protection Primitives on Reconfigurable Hardware Brett Brotherton Nick Callegari Ted Huffmire.
MAPLD 2005/254C. Papachristou 1 Reconfigurable and Evolvable Hardware Fabric Chris Papachristou, Frank Wolff Robert Ewing Electrical Engineering & Computer.
Features of the new Alibava firmware: 1. Universal for laboratory use (readout of stand-alone detector via USB interface) and for the telescope readout.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
Connectivity  The ability of a computer to communicate with others Sending Device Communications Device Communications Channel Communications Device Receiving.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Android Multi-Meter (AMM)
Chapter 13 – I/O Systems (Pgs ). Devices  Two conflicting properties A. Growing uniformity in interfaces (both h/w and s/w): e.g., USB, TWAIN.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
ATCA at UIUC M. Haney, M. Kasten High Energy Physics Z. Kalbarczyk, T. Pham, T. Nguyen Coordinated Science Laboratory ILLINOIS UNIVERSITY OF ILLINOIS AT.
Ch.2 – Introduction to Routers CCNA 2 version 3.0 Rick Graziani Cabrillo College.
Input Output Techniques Programmed Interrupt driven Direct Memory Access (DMA)
A commercially available digitization system Fotiou Andreas Andreas Fotiou.
Toshiba IR Test Apparatus Project Ahmad Nazri Fadzal Zamir Izam Nurfazlina Kamaruddin Wan Othman.
Rohde & Schwarz Topex TOPEX IP Radio Gateway July 2011.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
Functions of Operating Systems V1.0 (22/10/2005).
System Components Operating System Services System Calls.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
© 2002, Cisco Systems, Inc. All rights reserved..
MADEIRA Valencia report V. Stankova, C. Lacasta, V. Linhart Ljubljana meeting February 2009.
Team Members: ECE- Wes Williams, Will Steiden, Josh Howard, Alan Jimenez Sponsor: Brad Luyster Honeywell Network Traffic Generator.
Chapter 19: Network Management
Monitoring systems COMET types MS55 & MS6
SMS module HDL-MGSM.431.
Do-more Technical Training
Chapter 5: Switch Configuration
Chapter 5: Switch Configuration
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Chapter 5: Switch Configuration
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Chapter 13: I/O Systems I/O Hardware Application I/O Interface
♪ Embedded System Design: Synthesizing Music Using Programmable Logic
Presentation transcript:

SESM Demonstrator FPGA Power Node Prototype Emilio Bisbiglio, SESM, Przemyslaw Osocha, SESM, Joao Cunha, SESM, Fabio Giovagnini, SESM,

All rights reserved © 2010 Page 2pSHIELD Project pSHIELD SPD Node Layer Conceptual Model

All rights reserved © 2010 Page 3pSHIELD Project pS-NC - pSHIELD Node Capabilities interface with the Middleware Layer: –To enable the SPD composability –To provide Node pSHIELD-specific functionalities –To provide access to legacy Node capabilities NC - legacy, technology-dependent, Node Capabilities pSHIELD SPD Node Layer: Interfaces

All rights reserved © 2010 Page 4pSHIELD Project Legacy Node Capabilities – consist of one or more Legacy* Device Components, such as CPU, I/O Interfaces, Memory, Battery, etc. pSHIELD Node Adapter, composed of Specific Components – the innovative SPD functionalities provided to each of the Legacy Device Components, such as status, metrics, or checkpoint-recovery * By Legacy means any third-party or of-the-shelf device pSHIELD SPD Node Layer: Legacy capabilities

All rights reserved © 2010 Page 5pSHIELD Project pSHIELD Interface – physical interface to the pSHIELD Network. SPD Node Status – collection and disclosure of SPD-relevant parameters and measurements. Checks on system health status for self-recovery, self- reconfiguration and self-adaptation. Reconfiguration – module or system reconfiguration for recovery or new functionalities. Dependability – self-dependability at node layer: error detection and system recovery. Checkpointing service provider. Security and Privacy – hardware and software security and privacy service provider. Power Management –power sources management. pSHIELD SPD Node Layer: Innovative SPD

All rights reserved © 2010 Page 6pSHIELD Project Demonstration of: –Node Legacy Device with SPD functionalities: pS-NC interface SPD metrics Self-recovery from hardware transient faults (through fault- injection) Auto-reconfiguration Data encryption –Provision of security and privacy services – hardware data encryption/decryption Node function –Dependable, secure and reconfigurable FM Demodulation pSHIELD Power Node Demonstrator: FMDemodulator

All rights reserved © 2010 Page 7pSHIELD Project FMDemodulator: Node Context

All rights reserved © 2010 Page 8pSHIELD Project FMDemodulator: Hardware

All rights reserved © 2010 Page 9pSHIELD Project FMDemodulator: Hardware FM analog signal Xilinx ML507 evaluation boardDAQ Adapter Ethernet (pShield Network) Ethernet (pShield Network) Fault injection trigger

All rights reserved © 2010 Page 10pSHIELD Project Implemented using the audio out channel of a PC audio board. The signal features are contained in a wave file. Consists of a Audio FSK modulated signal: –FSK Rate: 50 Hz –“Space” freq.: 1070 Hz –“Mark” freq.: 1270 Hz –Amplitude: 1 Vpp FM Signal Generator

All rights reserved © 2010 Page 11pSHIELD Project A remote PC, connected to the pSHIELD network via ethernet. A server/client application running on the PC allows a remote user to: –receive and store the data samples sent by FMDemodulator; –receive and analyze the metrics of the system –send the commands (reconfigure/recover) to the system pSHIELD Control Center

All rights reserved © 2010 Page 12pSHIELD Project The Fault Injector emulates a hardware fault, by changing a register cell that corresponds to a parameter of the processing algorithm. The result of the fault should be a fatal error of the FM Demodulation application. The fault is triggered by pushing a button. Fault Injector

All rights reserved © 2010 Page 13pSHIELD Project Dependable, secure and reconfigurable FM Demodulation function: 1.Analog FM signal demodulation Demodulates incoming FM Signal Processes & analyzes the characteristics of the sampled signal Provides all the valid samples to the pShield Network 2.Dependability Rejects the invalid samples Recovers from device failure: FPGA reprogramming 3.Metrics Collects performance results Collects dependability and security measurements 4.Security Encrypts demodulated data 5.Reconfiguration Self-adaptation for improved performance: FPGA partial reconfiguration (only demodulation module) FMDemodulator SPD Node Function

All rights reserved © 2010 Page 14pSHIELD Project FMDemodulatorMetrics Device:SESM pSHIELD SPD Power Node Demodulator Function Name:FMDemodulation Inputs: Analog Audio FSK signal (Data Rate: 50 Hz; Mark:1020 Hz; Space: 1070 Hz; Amplitude: 1Vpp) Outputs:Digital demodulated signal (Data Resolution: 8 bit) SPD Status SPD Level:0-3(TBD) Status:Halted / Initialized / Running-full / Running-degradated / Error Description In Port:DAQ Adapter IN Out Port:TCP/IP Port 80 Key Length: 64 bit Key Length range:32 to 448 bit Data encrypted length 64 bit Measurements Demodulated frames:20 Demodulation errors:2 Function recovery:0 Device recovery failures:1 Encrypted Bytes1000