Ravi Vasdev SEMINAR ON
WHAT ARE EMBEDDED SYSTEMS THESE ARE SINGLE BOARD COMPUTERS THESE ARE ELECTRONIC DEVICES THAT INCORPORATE MICROPROCESSORS THESE DEVICES ARE CONTROLLED BY INSTRUCTIONS STORED IN A CHIP PROGRAMMES ARE STORED IN THE ROM
TYPES OF EMBEDDED SYSTEMS TYPES OF EMBEDDED SYSTEMS REACTIVE SYSTEMS INTERACTIVE SYSTEMS TRANSFORMATIONAL SYSTEMS
REAL TIME EMBEDDED SYSTEMS WHAT ARE REAL TIME SYSTEMS TAKE THE INPUT PROCESS THE INPUT GIVE THE REQUIRED RESULT ALSO CONSIDER THE TIMING CONSTRAINTS
TYPES OF TIMING CONSTRAINTS HARD TIME CONSTRAINT SOFT TIME CONSTRAINT FIRM TIME CONSTRAINT
HARD TIME CONSTRAINT LATE & INCORRECT RESPONSE LEADS TO SYSTEM FAILURE EXAMPLE MEDICAL EQUIPMENT MONITORING
SOFT TIME CONSTRAINT TIMELINESS REQUIREMENT SYSTEM FAILURE – DEPENDS ON COMPUTATION TIME EXAMPLE AIRLINE RESERVATION SYSTEMS
FIRM TIME CONSTRAINT COMBINATION OF BOTH HARD & SOFT TIME CONSTRAINTS SHORTER SOFT TIME REQUIRED LONGER HARD TIME REQUIRED EXAMPLE PATIENT VENTILATOR MECHANISM
REAL TIME OPERATING SYSTEM(RTOS) Correctness of the computations not only Correctness of the computations not only depends upon the logical correctness of the computation but also upon the time at the computation but also upon the time at which the result is produced. If the timing which the result is produced. If the timing constraints of the system are not met, system failure is said to have occurred.
PROGRAMMING LANGUAGES USED FOR EMBEDDED SYSTEM Assembly Language C C++ JAVA 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% AssemblyCC++JavaOther
FACTORS INFLUENCING CHOICE OF PROGRAMMING LANGUAGE A language compiler should be available for the chosen hardware architecture of the embedded system Compilers should be available on multiple Operating systems and microprocessors
LINUX AND REAL –TIME EMBEDDED SYSTEMS
EMBEDDED HARDWARE EMBEDDED HARDWARE MICROPROCESSOR /MICROCONTROLLER PDA ROM DRAM LCD
TYPES OF ATTACKS ON EMBEDDED SYSTEM PRIMARY ATTACKS PRIVACY ATTACKS INTEGRITY ATTACKS AVAILABILITY ATTACKS
SECONDARY ATTACKS SOFTWARE ATTACKS PHYSICAL ATTACKS SIDE – CHANNEL ATTACKS
Attacks on the Embedded System Privacy Attacks Eavesdropping Micro probing (Physical Attacks) Integrity Attacks Fault Injection Timing Analysis (Side Channel Attacks) Availability Attacks Viruses Trojan Horse (Software Attacks)
COMMON SECURITY FUNCTIONS REQUIRED USER IDENTIFICATION SECURE NETWORK ACCESS AVAILABILITY SECURE STORAGE CONTENT SECURITY TEMPER RESISTANCE
BASIC SECURITY FUNCTIONS AVAILABILITY USER IDENTI- FICATION SECURE NETWORK ACCESS SECURE STORAGE CONTENT SECURITY TEMPER RESISTANCE
PRACTICES FOR SOFTWARE SECURITY APPLICABILITY SOFTWARE SECURITY APPLICABILITY REQUIREMENT LEVEL DESIGN & ARCHITECTURE LEVEL CODE LEVEL
APPLICATIONS APPLICATIONS FOR HEART BEAT RATE & OXYGEN CONTENT IN BLOOD FOR GENERATION & MEASUREMENT OF LIGHT FOR DISPLAYING THE RESULT
EXAMPLES OF EMBEDDED SYSTEMS CHILDREN’S TOYS COMMUNICATION SYSTEMS COMPUTER PERIPHERALS HOME APPLIANCES MEDICAL IMAGING SYSTEMS ROBOTS PERSONAL DIGITAL ASSISTANTS
PICTORIAL VIEW
WHY OPT FOR THIS TECHNOLOGY Area of synergy between Hardware & Software Reduce the size of the circuit
BIBLIOGRAPHY Fundamentals of Embedded Software By Daniel W. Lewis Electronics For You