RTOS, secure virtualization technology for real-time systems, DO-178B and hypervisor for the most demanding embedded operating system applications...

Strategies for Developing Embedded Applications Getting the most out of real time, Linux compatibility and POSIX conformance

The benefits of Linux® compatibility and POSIX® conformance are yours when you use LynuxWorks™ operating systems and tools to simplify your embedded systems development.

Case studies in commercial and DoD embedded projects demonstrate significant cost reductions and shortened product development cycles wherever LynuxWorks development strategies are used.

Using Linux and LynxOS Concurrently
30 Linux development seats, 5 LynxOS RTOS development seats
Created high-availability environment, fault tolerance with combined Linux/LynxOS solution
Run-time cost reduced by Linux
Real-time requirements provided by LynxOS as needed

Telecom switch developer reduced overall cost by 30%

A data switching developer dramatically reduced development costs by using LynuxWorks' Linux-compatibility.

They accomplished their major development on Linux development seats. Only those applications that required real-time capabilities were transferred to the LynxOS RTOS environment for testing. Since only some of their applications demanded real time, they were able to balance their product cost, resulting in savings against budget of 30%.

 

USE OPEN-SOURCE DRIVERS
All prototyping done using BlueCat Linux and VisualLynux™ IDE
Develop real-time drivers later in the process, after it is determined that real time is required
Purchase LynxOS at time of final hardware choice, only after real time is deemed necessary.

Datacom switch developer uses Linux to bring product to market

An avionics switch developer created their prototype in BlueCat® Linux to take advantage of the numerous open-source drivers that available for Linux. They were able to prototype and bring their product to Alpha stage using BlueCat Linux as the operating-system environment.

Further study showed that their anticipated real-time requirement did not materialize, which enabled the current design to be brought to market. If the market determines that real time is required in the future, the entire suite of applications created in BlueCat Linux can be brought to the real-time LynxOS environment with no porting.

PORTING NON-POSIX APPLICATIONS
10 development seats of Linux and 1 seat of LynxOS
Preliminary software developed Linux, final ported to LynxOS
Faster development time on Linux because no special training for engineers was required

Weapons system developer shortened product development time by 20%

The development team accomplished the porting of applications that were non-conformant to the POSIX standard by first transitioning the non-conforming code to a Linux environment. Working code was produced in the Linux environment, then the code was transitioned to the real-time environment in LynxOS. The results were a dramatic reduction in the budgeted time and costs.

RE-USE LEGACY CODE
Existing legacy application quickly ported to new environment
Testing and simulation processed on low-cost Linux system
Legacy application suite was protected.

DoD customer re-uses legacy code with Linux transition

An existing application used for a legacy weapon system was written in FORTRAN 77. However, that particular version of FORTRAN was not currently supported by the real-time operating system that the organization was using.

To work around this compatibility problem, the customer re-compiled their FORTRAN application on a COTS Linux (RedHat 7.2) and then executed the resulting Linux binary in the POSIX-conformant LynxOS real-time environment. The non real-time code ran unchanged in the LynxOS real-time operating system.

PORTING SOLARIS™ APPLICATIONS
POSIX applications can be easily ported to POSIX-conformant real-time operating systems
Legacy, non real-time applications can converge into a real-time environment
No special tools, training, or operating changes were required

Army communication system ported from Solaris to LynxOS

An existing Solaris™ application required porting to a real-time environment. Previous attempts to port the application to a non POSIX-conformant operating system (VxWorks®) had been unsuccessful.

The application was ported from Solaris to LynxOS in 4 weeks. One million lines of POSIX application code were involved in the transition.

Read the full story.

Who else uses a LynuxWorks embedded OS?

A LynuxWorks embedded OS is featured in this embedded system application:
Who else uses a LynuxWorks embedded operating system?
Security white papers
Separation Kernels Enable Rapid Development of Trustworthy Systems
By using separation kernel technology and a security abstraction design approach, military system developers can use off-the-shelf components and tools to rapidly build and maintain high security systems. (March 2014)
Coming Together of Safety and (Cyber) Security Changes Demands in RTOS Market
Separation kernels and secure hypervisors will be evermore in demand as safety and certification will be required in more and more applications. Governments are already working on infrastructures deploying this type of technology. (October 2012)
Building in RTOS Support for Safety- & Security-Critical Systems
LynuxWorks explains the differences between safety-critical and security-critical applications and how to meet their demanding requirements with the LynxOS-178 RTOS and the LynxSecure hypervisor. (EE Times Design, August 2011)
Enhancing Application Performance on Multicore Systems
Tips on optimizing a multicore real-time system, including virtualization, avoiding synchronization and concurrency while maximizing application parallelism. (Military Embedded Systems, February 2011)
Hardware Virtualization puts a new spin on Secure Systems
Real-time determinism and military security don't have to be separate realities. A combination of a secure separation kernel and an embedded hypervisor enables whole new levels of system security. (COTS Journal, October 2010)
Using a Separation Kernel to add Military-Grade Security to Legacy Systems
A challenge for the software designer is how to integrate modern military-grade software programs into legacy software designed long before security standards were predominant in system requirements. (VME Critical Systems, Summer 2010)
Virtualization: Keeping Embedded Software safe and Secure in an Unsafe World
A new, secure methodology is needed to separate systems of different security levels which run on shared resources—without compromising the performance of legacy systems. (EE Times, June 2010)
Secure Virtualization Combines Traditional Desktop OSs and Embedded RTOSes in Military Embedded Systems
Advances in software and hardware technologies now make it feasible to use both embedded and desktop operating systems in a secure military system. (Military Embedded Systems, May 2010)
DO-178B Provides Certification Safety net
Developers of commercial avionics software must demonstrate compliance with DO-178 guidelines. The FAA has issued additional guidance for so-called DO-178B Reusable Software Components (RSCs as defined in AC20-148), which allow for reuse of certifications. (COTS Journal, November 2009)
Designing Safety-critical Avionics Software Using open Standards
Safety-critical avionics systems have continually grown more complex and software-intensive. Regulatory authorities and avionics manufacturers have responded with guidance such as DO-178B and RSC to ensure that software performs safely, with controlled development cost. (Boards and Solutions, September 2009)
Two Different Realms: RTOS Support for Safety-critical vs. Security-critical Systems
Safety- and security-critical system functions are evolving simultaneously, with different yet similar requirements. Modern RTOSes are stepping up to meet these needs. (VME and Critical Systems, June 2009)
Virtualization Makes Better use of Open-source OSes and apps
With the introduction of the embedded hypervisor, embedded systems can avoid certain performance or licensing issues inherent to open-source OSes and applications. (EE Times, March 23, 2009)
Secure Virtualization Technology can Extend the life of Legacy Systems
By combining the concept of virtualization and security, one can consolidate multiple legacy systems running on heterogeneous operating systems onto a single host system with high-assurance security. (Military Embedded Systems, January/February 2009)
Virtual Machines: Intel's CPU Extensions Transform Virtualization
Virtualization has traditionally presented its share of design challenges in information-assurance-based systems. But now, Intel's VT-x and VT-d CPU extensions are changing the game and showing potential to become the de facto path to virtualization. (Military Embedded Systems, January 2009)
Separation Kernel for a Secure Real-time Operating System
The technical foundation adopted for the so-called MILS architecture is a separation kernel like LynxSecure, which permits multiple functions to be realised on a common set of physical resources without unwanted mutual interference. (Boards and Solutions Magazine, February 2008)
Advances in Virtualization aid Information Assurance
Advances in the newest Intel® processors are making virtualization much easier to implement in security applications than ever before. (Embedded Computing Design, January 2008)
Protecting our most Vital Systems
Some significant defence programmes are already committed to a new approach to high-threat, high-asset-value systems. Rance DeLong explains MILS. (Components in Electronics, April 2007)
Perspectives: Security and the Separation Kernel
Today's avionics systems are designed to support more than one application, using a partitioned operating system and memory management units to ensure applications have adequate separation. (Avionics Magazine, April 2007)
MILS: An Architecture for Security, Safety, and Real Time
The unrelenting growth and integration of embedded controls, information processing, and communications has created a need for systems that provide robust protection for resources and services in the face of serious threats. (Embedded Technology Magazine, November 2006)
Partitioning Operating Systems Versus Process-based Operating Systems
Partitioning operating systems are the latest buzz, while processes, by contrast, have been around for over 30 years. Both provide memory protection, however, the intent behind them is very different.
DO-178B and the Common Criteria: Future Security Levels
Although there are similarities between the airborne safety-critical requirements in RTCA/DO-178B and the Common Criteria, ISO 14508, compliance with the higher levels of security in the Common Criteria demands meeting additional security requirements. (COTS Journal, April 2006)
Reusing Safety-Critical Software Components
Safety-critical systems often operate together as a single "system-of-systems," making it important that they meet the most stringent and rigorous requirements for safety-criticality. The failure of one module in a system could create other failures or vulnerabilities, or worse yet, failure of the system as a whole. (COTS Journal, August 2005)
Using the Microprocessor MMU for Software Protection in Real-Time Systems
With minimal impact to overall system performance, user tasks and the kernel can be protected from accidental corruption by using multiple protected address spaces.
Improving code Migration and Reuse
The unrelenting growth and integration of embedded controls, information processing, and communications has created a need for systems that provide robust protection for resources and services in the face of serious threats. (Embedded Computing Design, August 2006)
FCS Program Rolls Forward in Formation
A wireless data network, with advanced communications and technologies, links soldiers with 18 new, lightweight manned and unmanned ground vehicles, unmanned aircraft, sensors and weapons—and it's all in one program. (COTS Journal, June 2005)
Secure Operating Systems for Deeply Embedded Devices
As we add more intelligence to our embedded devices, we find that they are becoming increasingly integrated into our information technology infrastructure. Though system security is not a new concept, security-in-depth is a new paradigm developers are now starting to address. (RTC Magazine, September 2004)
LynxSecure Separation Kernel and Embedded Hypervisor LynxOS-SE Embedded RTOS Luminosity Eclipse-based IDE
LynxOS Embedded RTOS RTOS: LynxOS-178 for software certification

 

SpyKer Embedded-System Trace Tool

Industry Solutions

Migration

Industry Standards

Embedded Systems Technology

RTOS Training for Embedded Systems

Training at LynuxWorks

LynuxWorks Support

Embedded Systems

LynxOS RTOS Support

Embedded System Consulting

Contact Us

About LynuxWorks

Press Room

Newsletter and Announcements

Careers

Partners

Site Map

Board Support Packages (BSPs)

BSP Device Drivers

BSP Targets by Operating System

BSP Targets by Form Factor

Third-party I/O Devices and Hardware

SynergyWorks: LynuxWorks partners


What is SynergyWorks?

Third-party add-ons for LynuxWorks operating systems

Copyright © LynuxWorks™, Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of LynuxWorks is prohibited.