Sunteți pe pagina 1din 16

Embedded System Architecture

Embedded System Architecture


Every embedded system (ES) is composed of interacting elements (hardware or software). An architecture is a set of representations of those elements and their relationships. Architecture helps understanding the whys of the elements with given functionalities. Defining and understanding the architecture of an ES is an essential component of good system design. An architectural systems engineering in an ES helps understanding the design is essential to resolve challenges when designing a new system helps design re-use, reduces design time and cost.2

Embedded System Architecture


An embedded architecture captures various views, which are representations of the system. It is thus a useful tool in understanding all of the major elements:
Why each component is there? Why the elements behave the way they do?

Without an architecture design it is difficult to determine how the system would behave under a variety of circumstances in the real world. The architecture conveys in some way the critical components in a design and their relationships to each other. Even if the architectural structures are rough and informal, it is still better than nothing.
3

Embedded Systems Model


The embedded system model indicates that at the highest level, they have

at least one layer (hardware) or all layers (hardware, system software and application software) into which all components fall.
The hardware layer contains all the physical components. The system software layer contains all the software located on the ES. The application software layer contains all the SW being processed by the ES. 4

This model is essentially a layered (modular) model of an ES architecture. It gives visual representation of the main elements and their associated functions.

Networks Architecture in ES
The ES is a networking of internal components and the networks architecture. Good to associate the networking components with a universal networking model, the seven layer OSI reference model. Data originating at the application layer flow downward through all seven layers. Information (header) is appended to the data at each layer (except for the application and physical layers). Data is wrapped with information for other devices to unwrap and process.

Mapping OSI layers Physical Data-link Network Transport Session Presentation Application ES layers Hardware System SW

5 SW Application

OSI Model and Real World Protocol


The functionalities and methodologies implemented at each layer based on the OSI model are commonly referred to as networking protocols. It isnt always the case that there are all seven layers or there is just one protocol per layer. The functionality of one layer of the OSI model can be implemented in one protocol, or also it can be implemented across multiple protocols and layers. A group of protocols may have their own name and be grouped together in their own proprietary layers. Examples are: TCP/IP WAP Bluetooth

The TCP/IP, OSI and ES Models

The TCP/IP stack is made up of four layers.


OSI layers Top three (App, Presentation, Session) Transport layers Network layer Two OSI layers (Data Link and Physical)

TCP/IP layers TCP/IP App layer Transport layer. Internet layer 7 Network access layer

The OSI, WAP and ES Models

The Wireless Application Protocol (WAP) stack provides five layers of upper layer protocols.
OSI layers Application layer Presentation layer Session layer Transport layer WAP layers WAP Application layer Security layer Session + Transaction layer 8 Transport layer

The Bluetooth, OSI and ES Models


The Bluetooth stack is a three-layer model made up of Bluetooth-specific as well as adopted protocols from other network stacks, such as WAP and/or TCP/IP .
OSI layers
Physical and Lower Data Link layers
Upper Data link, Network + Transport layer Session, Presentation + Application layer

Bluetooth layers
Transport Protocol Group

Middleware Protocol Group

Application Protocol Group


9

(1) Physical Layer Protocols in the ES Models

The Physical Layer represents all of the networking HW physically located in an embedded device. It defines, manages, and processes, via hardware, the actual voltage representations of 1s and 0s. Physical layer protocols defining the networking hardware of the device are located in the hardware layer of the ES model. Physical layer protocols are classified as either LAN or WAN protocols. They can be further subdivided according to the transmission medium connecting the device to the network (wired or wireless). 10

(2) Data-Link Layer Protocols in the ES


Data-link layer protocols are implemented in the system software layer. Closest to the hardware layer.

Includes any software needed to control the hardware. Bridging also occurs at this layer. Data-link layer protocols can be used for (i) LAN, (ii) WAN, or (iiii) both. Can be wired or wireless. Generally, reliant on a specific physical layer. May also be ported to very different mediums. Supports hardware-independent upper-data-link functionality.

11

(3) Network Layer Protocols in the ES


Implemented in the system software layer. Is typically hardware independent. Depends only on the data-link layer implementation.

Networks can be divided into smaller sub-networks, called segments. Devices within a segment communicate via their physical addresses. Devices in different segments communicate through an additional address, called the network address. Conversion between physical addresses and network addresses can occur in the data-link layer protocols (i.e. ARP, RARP etc.)
12 Network layer protocols can also convert between physical and network addresses as well as assign network addresses.

(4) Transport Layer Protocols in the ES


Transport layer protocols sit on top of and are specific to the network layer protocols. Are typically responsible for communication between two specific devices (point-to-point) communication.

Ensures reliable point-to-point data transmission, by ensuring that: 1. packets are received and transmitted in the correct order 2. transmitted at a reasonable rate 3. packets are not corrupted 4. Provides acknowledgement on receiving 5. Requests retransmission in case of detection of error.

13

(5) Session Layer Protocols in the ES


The connection between two networking applications on two different devices is called a session. The management of a session is handled by the session layer.

Generally, sessions are assigned a port (number).


The session layer protocols 1. Separate and manage each sessions data 2. Regulate the data flow of each session 3. Handle any error 4. Ensure the security of the session 5.
14 Ensure that the two applications involved in the session are the right applications.

(6) Presentation Layer Protocols in the ES


Protocols in the presentation layer are responsible for translating data into formats that higher applications can process.

1. Presentation layer protocols are usually implemented in networking applications in the application software layer in ES. 2. Data compression/decompression, data encryption/decryption, data protocol/character conversions. 15

(7) Application Layer Protocols in the ES

1. A device initiates a network connection to another device at the application layer. 2. Application layer protocols are either used directly as network applications by end-users or the protocols are implemented in end-user network applications. 16 3. These applications virtually connect to applications on other devices.

S-ar putea să vă placă și