000 | 02933nam a2200301Ia 4500 | ||
---|---|---|---|
000 | 03758nam a22003375i 4500 | ||
001 | 978-3-031-28701-5 | ||
003 | DE-He213 | ||
005 | 20240319121031.0 | ||
007 | cr nn 008mamaa | ||
008 | 230914s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031287015 _9978-3-031-28701-5 |
||
082 | _a5.43 | ||
100 |
_aWang, K. C. _935970 |
||
245 |
_aEmbedded and Real-Time Operating Systems _cby K. C. Wang. _h[electronic resource] / |
||
250 | _a2nd ed. 2023. | ||
260 |
_aCham _bSpringer International Publishing _c2023 |
||
300 |
_aXV, 851 p. 149 illus., 118 illus. in color. _bonline resource. |
||
520 | _aThis book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. Embedded and Real-Time Operating Systems describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). This Second Edition covers ARM64 architecture and programming. These include exception levels, vector tables and exceptions handling, GICv3 programming and interrupt processing. It covers virtual to physical address mappings in ARMv8, and shows a 64-bit OS with kernel space in EL1 and separate user spaces in EL0. It also covers ARM TrustZone technology and secure systems. These include hardware and software architectures for secure and normal worlds, interactions and switching between the two worlds. It shows a secure world comprising a secure monitor in EL3 to provide service functions, and a normal world comprising processes in non-secure EL1, which use SMC to access service functions in the secure world. Throughout the book, complete working sample systems demonstrate the design principles and implementation techniques. The content is suitable for advanced-level and graduate students working in software engineering, programming, and systems theory. | ||
650 |
_aEmbedded computer systems. _935971 |
||
650 |
_aEmbedded Systems. _935972 |
||
650 |
_aMobile computing. _935973 |
||
650 |
_aMobile Computing. _935974 |
||
650 |
_aOperating systems (Computers). _935975 |
||
650 |
_aOperating Systems. _935976 |
||
856 | _uhttps://doi.org/10.1007/978-3-031-28701-5 | ||
942 |
_cEBK _2ddc |
||
999 |
_c15601 _d15601 |