1 |
Slicing and characterizing typical-case behavior for component-based embedded systemsRussell, Jeffry Thomas 28 August 2008 (has links)
Not available / text
|
2 |
Designing a reconfigurable embedded processorMatson, John Mark 02 May 2003 (has links)
The growth of applications for embedded processors has spawned a need for
highly configurable devices. Custom microprocessors have long life cycles for a
fast paced market, where as off-the-shelf designs often do not provide the level of
configuration, nor the ability to allow system-on-chip designs. This paper presents
a description for a software environment that allows designers to provide
configuration options for a design, and responds by dynamically reconfiguring the
environment to provide a ready to test design. A background survey is provided on
current embedded RISC architectures, along with a proposed new embedded ISA
and a cycle-level simulator. Justification is presented for a new instruction format
to reduce code size with little loss to performance. A manual is also provided for
the new ISA. / Graduation date: 2003
|
3 |
QUIC-TCP: validation of QUIC-TCP through network simulationsUnknown Date (has links)
The scalability of QUIC-TCP was examined by expanding previous
developmental 11-node, 4-flow topology to over 30 nodes with 11 flows to validate
QUIC-TCP for larger networks. The topology was simulated using ns-2 network
simulator with the same ns-2 module of FAST-TCP modified to produce QUIC-TCP
agent that the original development used. A symmetrical topology and a random
topology were examined. Fairness, aggregate throughput and the object of the utility
function were used as validation criteria. It was shown through simulation that QUICTCP
optimized the utility function and demonstrated a good balance between aggregate
throughput and fairness; therefore QUIC-TCP is indeed scalable to larger networks. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2013.
|
4 |
Embedded System Security: A Software-based ApproachCui, Ang January 2015 (has links)
We present a body of work aimed at understanding and improving the security posture of embedded devices. We present results from several large-scale studies that measured the quantity and distribution of exploitable vulnerabilities within embedded devices in the world. We propose two host-based software defense techniques, Symbiote and Autotomic Binary Structure Randomization, that can be practically deployed to a wide spectrum of embedded devices in use today. These defenses are designed to overcome major challenges of securing legacy embedded devices. To be specific, our proposed algorithms are software- based solutions that operate at the firmware binary level. They do not require source-code, are agnostic to the operating-system environment of the devices they protect, and can work on all major ISAs like MIPS, ARM, PowerPC and X86. More importantly, our proposed defenses are capable of augmenting the functionality of embedded devices with a plethora of host-based defenses like dynamic firmware integrity attestation, binary structure randomization of code and data, and anomaly-based malcode detection. Furthermore, we demonstrate the safety and efficacy of the proposed defenses by applying them to a wide range of real- time embedded devices like enterprise networking equipment, telecommunication appliances and other commercial devices like network-based printers and IP phones. Lastly, we present a survey of promising directions for future research in the area of embedded security.
|
5 |
Experimental implementation of the new prototype in LinuxUnknown Date (has links)
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. In the wired network, TCP performs remarkably well due to its scalability and distributed end-to-end congestion control algorithms. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication and develop TCP congestion control algorithm for mobile applications. We show that the optimal TCP congestion control and link scheduling scheme amounts to window-control oriented implicit primaldual solvers for underlying network utility maximization. Based on this idea, we used a scalable congestion control algorithm called QUeueIng-Control (QUIC) TCP where it utilizes queueing-delay based MaxWeight-type scheduler for wireless links developed in [34]. Simulation and test results are provided to evaluate the proposed schemes in practical networks. / by Gee Won Han. / Thesis (M.S.C.S.)--Florida Atlantic University, 2013. / Includes bibliography. / Mode of access: World Wide Web. / System requirements: Adobe Reader.
|
6 |
Cache optimization for real-time embedded systemsUnknown Date (has links)
Cache memory is used, in most single-core and multi-core processors, to improve performance by bridging the speed gap between the main memory and CPU. Even though cache increases performance, it poses some serious challenges for embedded systems running real-time applications. Cache introduces execution time unpredictability due to its adaptive and dynamic nature and cache consumes vast amount of power to be operated. Energy requirement and execution time predictability are crucial for the success of real-time embedded systems. Various cache optimization schemes have been proposed to address the performance, power consumption, and predictability issues. However, currently available solutions are not adequate for real-time embedded systems as they do not address the performance, power consumption, and execution time predictability issues at the same time. Moreover, existing solutions are not suitable for dealing with multi-core architecture issues. In this dissertation, we develop a methodology through cache optimization for real-time embedded systems that can be used to analyze and improve execution time predictability and performance/power ratio at the same time. This methodology is effective for both single-core and multi-core systems. First, we develop a cache modeling and optimization technique for single-core systems to improve performance. Then, we develop a cache modeling and optimization technique for multi-core systems to improve performance/power ratio. We develop a cache locking scheme to improve execution time predictability for real-time systems. We introduce Miss Table (MT) based cache locking scheme with victim cache (VC) to improve predictability and performance/power ratio. MT holds information about memory blocks, which may cause more misses if not locked, to improve cache locking performance. / VC temporarily stores the victim blocks from level-1 cache to improve cache hits. In addition, MT is used to improve cache replacement performance and VC is used to improve cache hits by supporting stream buffering. We also develop strategies to generate realistic workload by characterizing applications to simulate cache optimization and cache locking schemes. Popular MPEG4, H.264/AVC, FFT, MI, and DFT applications are used to run the simulation programs. Simulation results show that newly introduced Miss Table based cache locking scheme with victim cache significantly improves the predictability and performance/power ratio. In this work, a reduction of 33% in mean delay per task and a reduction of 41% in total power consumption are achieved by using MT and VCs while locking 25% of level-2 cache size in an 4-core system. It is also observed that execution time predictability can be improved by avoiding more than 50% cache misses while locking one-fourth of the cache size. / by Abu Asaduzzaman. / Vita. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
7 |
Design Space Exploration and Optimization of Embedded Memory SystemsRabbah, Rodric Michel 11 July 2006 (has links)
Recent years have witnessed the emergence of microprocessors that are
embedded within a plethora of devices used in everyday life. Embedded
architectures are customized through a meticulous and time consuming
design process to satisfy stringent constraints with respect to
performance, area, power, and cost. In embedded systems, the cost of
the memory hierarchy limits its ability to play as central a
role. This is due to stringent constraints that fundamentally limit
the physical size and complexity of the memory system. Ultimately,
application developers and system engineers are charged with the heavy
burden of reducing the memory requirements of an application.
This thesis offers the intriguing possibility that compilers can play
a significant role in the automatic design space exploration and
optimization of embedded memory systems. This insight is founded upon
a new analytical model and novel compiler optimizations that are
specifically designed to increase the synergy between the processor
and the memory system. The analytical models serve to characterize
intrinsic program properties, quantify the impact of compiler
optimizations on the memory systems, and provide deep insight into the
trade-offs that affect memory system design.
|
8 |
Designing and experimenting with e-DTS 3.0Phadke, Aboli Manas 29 August 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / With the advances in embedded technology and the omnipresence of smartphones,
tracking systems do not need to be confined to a specific tracking environment. By introducing mobile devices into a tracking system, we can leverage their mobility and the
availability of multiple sensors such as camera, Wi-Fi, Bluetooth and Inertial sensors. This thesis proposes to improve the existing tracking systems, enhanced Distributed Tracking System (e-DTS 2.0) [19] and enhanced Distributed Object Tracking System (eDOTS)[26], in the form of e-DTS 3.0 and provides an empirical analysis of these improvements. The enhancements proposed are to introduce Android-based mobile devices into the tracking system, to use multiple sensors on the mobile devices such as the camera, the Wi-Fi and Bluetooth sensors and inertial sensors and to utilize possible resources that may be available in the environment to make the tracking opportunistic. This thesis empirically validates the proposed enhancements through the experiments carried out on a prototype of e-DTS 3.0.
|
Page generated in 0.0974 seconds