000 02933nam a2200301Ia 4500
000 03758nam a22003375i 4500
001 978-3-031-28701-5
003 DE-He213
005 20240319121031.0
007 cr nn 008mamaa
008 230914s2023 sz | s |||| 0|eng d
020 _a9783031287015
_9978-3-031-28701-5
082 _a5.43
100 _aWang, K. C.
_935970
245 _aEmbedded and Real-Time Operating Systems
_cby K. C. Wang.
_h[electronic resource] /
250 _a2nd ed. 2023.
260 _aCham
_bSpringer International Publishing
_c2023
300 _aXV, 851 p. 149 illus., 118 illus. in color.
_bonline resource.
520 _aThis book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. Embedded and Real-Time Operating Systems describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). This Second Edition covers ARM64 architecture and programming. These include exception levels, vector tables and exceptions handling, GICv3 programming and interrupt processing. It covers virtual to physical address mappings in ARMv8, and shows a 64-bit OS with kernel space in EL1 and separate user spaces in EL0. It also covers ARM TrustZone technology and secure systems. These include hardware and software architectures for secure and normal worlds, interactions and switching between the two worlds. It shows a secure world comprising a secure monitor in EL3 to provide service functions, and a normal world comprising processes in non-secure EL1, which use SMC to access service functions in the secure world. Throughout the book, complete working sample systems demonstrate the design principles and implementation techniques. The content is suitable for advanced-level and graduate students working in software engineering, programming, and systems theory.
650 _aEmbedded computer systems.
_935971
650 _aEmbedded Systems.
_935972
650 _aMobile computing.
_935973
650 _aMobile Computing.
_935974
650 _aOperating systems (Computers).
_935975
650 _aOperating Systems.
_935976
856 _uhttps://doi.org/10.1007/978-3-031-28701-5
942 _cEBK
_2ddc
999 _c15601
_d15601