Download presentation
Presentation is loading. Please wait.
Published byRosamund Martin Modified over 9 years ago
1
Ravi Vasdev 2210259 SEMINAR ON
2
WHAT ARE EMBEDDED SYSTEMS THESE ARE SINGLE BOARD COMPUTERS THESE ARE ELECTRONIC DEVICES THAT INCORPORATE MICROPROCESSORS THESE DEVICES ARE CONTROLLED BY INSTRUCTIONS STORED IN A CHIP PROGRAMMES ARE STORED IN THE ROM
3
TYPES OF EMBEDDED SYSTEMS TYPES OF EMBEDDED SYSTEMS REACTIVE SYSTEMS INTERACTIVE SYSTEMS TRANSFORMATIONAL SYSTEMS
4
REAL TIME EMBEDDED SYSTEMS WHAT ARE REAL TIME SYSTEMS TAKE THE INPUT PROCESS THE INPUT GIVE THE REQUIRED RESULT ALSO CONSIDER THE TIMING CONSTRAINTS
5
TYPES OF TIMING CONSTRAINTS HARD TIME CONSTRAINT SOFT TIME CONSTRAINT FIRM TIME CONSTRAINT
6
HARD TIME CONSTRAINT LATE & INCORRECT RESPONSE LEADS TO SYSTEM FAILURE EXAMPLE MEDICAL EQUIPMENT MONITORING
7
SOFT TIME CONSTRAINT TIMELINESS REQUIREMENT SYSTEM FAILURE – DEPENDS ON COMPUTATION TIME EXAMPLE AIRLINE RESERVATION SYSTEMS
8
FIRM TIME CONSTRAINT COMBINATION OF BOTH HARD & SOFT TIME CONSTRAINTS SHORTER SOFT TIME REQUIRED LONGER HARD TIME REQUIRED EXAMPLE PATIENT VENTILATOR MECHANISM
9
REAL TIME OPERATING SYSTEM(RTOS) Correctness of the computations not only Correctness of the computations not only depends upon the logical correctness of the computation but also upon the time at the computation but also upon the time at which the result is produced. If the timing which the result is produced. If the timing constraints of the system are not met, system failure is said to have occurred.
10
PROGRAMMING LANGUAGES USED FOR EMBEDDED SYSTEM Assembly Language C C++ JAVA 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0% 90.0% AssemblyCC++JavaOther 2001-2002 2003-2004
11
FACTORS INFLUENCING CHOICE OF PROGRAMMING LANGUAGE A language compiler should be available for the chosen hardware architecture of the embedded system Compilers should be available on multiple Operating systems and microprocessors
12
LINUX AND REAL –TIME EMBEDDED SYSTEMS
13
EMBEDDED HARDWARE EMBEDDED HARDWARE MICROPROCESSOR /MICROCONTROLLER PDA ROM DRAM LCD
14
TYPES OF ATTACKS ON EMBEDDED SYSTEM PRIMARY ATTACKS PRIVACY ATTACKS INTEGRITY ATTACKS AVAILABILITY ATTACKS
15
SECONDARY ATTACKS SOFTWARE ATTACKS PHYSICAL ATTACKS SIDE – CHANNEL ATTACKS
16
Attacks on the Embedded System Privacy Attacks Eavesdropping Micro probing (Physical Attacks) Integrity Attacks Fault Injection Timing Analysis (Side Channel Attacks) Availability Attacks Viruses Trojan Horse (Software Attacks)
17
COMMON SECURITY FUNCTIONS REQUIRED USER IDENTIFICATION SECURE NETWORK ACCESS AVAILABILITY SECURE STORAGE CONTENT SECURITY TEMPER RESISTANCE
18
BASIC SECURITY FUNCTIONS AVAILABILITY USER IDENTI- FICATION SECURE NETWORK ACCESS SECURE STORAGE CONTENT SECURITY TEMPER RESISTANCE
19
PRACTICES FOR SOFTWARE SECURITY APPLICABILITY SOFTWARE SECURITY APPLICABILITY REQUIREMENT LEVEL DESIGN & ARCHITECTURE LEVEL CODE LEVEL
20
APPLICATIONS APPLICATIONS FOR HEART BEAT RATE & OXYGEN CONTENT IN BLOOD FOR GENERATION & MEASUREMENT OF LIGHT FOR DISPLAYING THE RESULT
21
EXAMPLES OF EMBEDDED SYSTEMS CHILDREN’S TOYS COMMUNICATION SYSTEMS COMPUTER PERIPHERALS HOME APPLIANCES MEDICAL IMAGING SYSTEMS ROBOTS PERSONAL DIGITAL ASSISTANTS
22
PICTORIAL VIEW
24
WHY OPT FOR THIS TECHNOLOGY Area of synergy between Hardware & Software Reduce the size of the circuit
25
BIBLIOGRAPHY Fundamentals of Embedded Software By Daniel W. Lewis Electronics For You www.howstuffworks.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.