Software 12/1/2008.

Slides:



Advertisements
Similar presentations
purpose Search : automation methods for device driver development in IP-based embedded systems in order to achieve high reliability, productivity, reusability.
Advertisements

Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Where Do the 7 layers “fit”? Or, where is the dividing line between hdw & s/w? ? ?
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
INTRODUCTION OS/2 was initially designed to extend the capabilities of DOS by IBM and Microsoft Corporations. To create a single industry-standard operating.
1 Network Packet Generator Characterization presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
1 I/O Management in Representative Operating Systems.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
1 THE ARCHITECTURE FOR THE DIGITAL WORLD TM THE ARCHITECTURE FOR THE DIGITAL WORLD Embedded Linux for ARM Architecture.
Introduction to The Linaro Toolchain Embedded Processors Training Multicore Software Applications Literature Number: SPRPXXX 1.
1 Introduction to Tool chains. 2 Tool chain for the Sitara Family (but it is true for other ARM based devices as well) A tool chain is a collection of.
Small Form Computing A bump in the wire. The questions ● What can we do with an inexpensive small computer? ● Can we make it a part of a seamless wireless.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
UNIX System Administration OS Kernal Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept Kernel or MicroKernel Concept: An OS architecture-design.
So just what is the Sedona Framework? –The Framework is an embedded device programming and control environment with two major facets –Open Source Free.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
BLU-ICE and the Distributed Control System Constraints for Software Development Strategies Timothy M. McPhillips Stanford Synchrotron Radiation Laboratory.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
Chapter 2 Operating System Overview
ARM 7 & ARM 9 MICROCONTROLLERS AT91 1 Development Tools & Partners.
Zero - G CONNECTING THE INTERNET OF THINGS. Introduction to Zero -G.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless and Mobile Security
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Implementation of Embedded OS Lab3 Porting μC/OS-II.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
VMM Based Rootkit Detection on Android
© 2015 Wind River. All Rights Reserved. Integrating FACE™ Aligned Componentry Larry Kinnan Principal Technologist, Wind River.
WIFI design Guide based PW620-I b/g ----Hardware section Orin.Zhu August 31 st, 2007.
Overview of Windows Driver Development Reference: us/gstart/hh/gstart/gs_intro_031j.asp.
System Programming Basics Cha#2 H.M.Bilal. Operating Systems An operating system is the software on a computer that manages the way different programs.
LonWorks Introduction Hwayoung Chae.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Virtualization Neependra Khare
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
An Embedded Wireless Mini-Server with Database Support Presented by: Amit Kumar.
Computer System Structures
Linux Optimization Kit Many developers need to get a performance increase from their Linux OS Linux OK allows users to achieve higher performance.
Developing IoT endpoints with mbed Client
Operating System Structures
Current Generation Hypervisor Type 1 Type 2.
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
Computer System Laboratory
Implementation of Embedded OS
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
A Wireless LAN Security Protocol
How To Set Up A Wireless Network
Many-core Software Development Platforms
Chapter 3: Windows7 Part 1.
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Yes, we do those languages too.
Outline Chapter 2 (cont) OS Design OS structure
LINUX System : Lecture 7 Lecture notes acknowledgement : The design of UNIX Operating System.
Operating Systems: A Modern Perspective, Chapter 3
Zephyr 真正的开源软件(Linux Foundation),宽松自由的许可证(Apache 2.0)
Presentation transcript:

Software 12/1/2008

Software components Host Driver ST Licensed code Provided as sources under NDA Portable to multiple OS Upper MAC ST Proprietary code Provided as static linkable library file under NDA Linked in with the driver during compile API/MIB documentation provided Lower MAC Provided as a binary file under NDA Downloaded to the STLC4560 during driver initialization HW Interface Driver Platform specific Customer required to write/create this driver for their specific hardware platform

HW/SW Overview - SoftMAC Architecture User Space, WPA Supplicant Supplicant required to: Handle user input/configuration WPA handshaking Transport protocol (EAP/PEAP) Handle certificates Install keys in UMAC Wi-Fi DRIVER Allows for porting to custom embedded OS and Processor UMAC Binary Library file Links with driver Provides configuration API to: Select encryption type Set Key Handles initial Authentication/Association to the AP Configures LMAC for the correct encryption LMAC Binary file, contains ARM executable code Hardware encryption/decryption of data according to configured encryption type and key. Host USER SPACE/WPA SUPPLICANT Kernel 802.3 Frames DRV DRV Wi-Fi DRIVER* DRV Upper API DRV UMAC Driver API 802.11 Frames and control messages Resource management: frames, memory, timers, debug Interconnect API Wi-Fi Module HW Layer LMAC Customer responsible for porting the WiFi Driver and any user space applications such as the supplicant.

HW/SW Overview - Software Matrix WEP = Wired Equivalent Privacy TKIP = Temporal Key Integrity Protocol AES/CCMP (HW Accelerator) = Advanced Encryption Standard/Counter Mode with Cipher Block Chaining Message Authentication Code Protocol WPA = WiFi Protected Access WPA2

HW/SW Overview - SoftMAC Architecture Deliverables Sample Linux driver code UMAC binary Library and header file (host specific) LMAC binary File. ARM executable code which is downloaded from the host to the module during Driver startup. Required porting activities Compile UMAC for target OS (done by ST/Sagrad) Port driver to embedded host/OS Memory handling - allocation/free Timers – Start/Stop Frame handling - allocation/free/ Debug message handling. Mechanism to pass 802.3 frames from and to the UMAC Register/Unregister driver with kernel Pass “Interconnect” messages to/from the UMAC which are sent/received over the hardware interface.

Pre-compiled Binaries for Processor Families Vast number of processors already supported. Big Endian and Little Endian support Software integration has been simplified by providing a sample driver. Ability to work with the customer to compile the UMAC for their specific platform and processor.   Little Endian Big Endian Arm X Arm4 Arm9e Armi i386 mips powerpc sh sh4 thumb xscale Specific Processor list available upon request.