Endianness and Serial Communication
Endianness is a consideration that is easily overlooked in the design of embedded systems. I myself am amply guilty of this oversight. It’s something you don’t ever have to worry about if you’re only working with a single processor or two processors that have the same endianness. You can even avoid it if you have two processors that have different endianness but never transmit data between themselves that consists of more than one byte. It’s easy to lull...
Help, My Serial Data Has Been Framed: How To Handle Packets When All You Have Are Streams
Today we're going to talk about data framing and something called COBS, which will make your life easier the next time you use serial communications on an embedded system -- but first, here's a quiz:
Quick Diversion, Part I: Which of the following is the toughest area of electrical engineering? analog circuit design digital circuit design power electronics communications radiofrequency (RF) circuit design electromagnetic...Elliptic Curve Digital Signatures
A digital signature is used to prove a message is connected to a specific sender. The sender can not deny they sent that message once signed, and no one can modify the message and maintain the signature. The message itself is not necessarily secret. Certificates of authenticity, digital cash, and software distribution use digital signatures so recipients can verify they are getting what they paid for.
Since messages can be of any length and mathematical algorithms always use fixed...
Public speaking
Public Speaking: This common task goes with embedded system engineering. Pitching a project. Presenting at a conference. Delivering a status report. Teaching. All part of the job.
Stephane Boucher did a v-blog post here last week and is naturally apprehensive about how he did.
If you have not seen it you can catch it here:
First - Stephane - You did fine!
I spent some time (5 quarters, 3 classes a day, computer technology in a tech school) in a classroom and am comfortable in front of a...
Polynomial Math
Elliptic Curve Cryptography is used as a public key infrastructure to secure credit cards, phones and communications links. All these devices use either FPGA's or embedded microprocessors to compute the algorithms that make the mathematics work. While the math is not hard, it can be confusing the first time you see it. This blog is an introduction to the operations of squaring and computing an inverse over a finite field which are used in computing Elliptic Curve arithmetic. ...
Public speaking
Public Speaking: This common task goes with embedded system engineering. Pitching a project. Presenting at a conference. Delivering a status report. Teaching. All part of the job.
Stephane Boucher did a v-blog post here last week and is naturally apprehensive about how he did.
If you have not seen it you can catch it here:
First - Stephane - You did fine!
I spent some time (5 quarters, 3 classes a day, computer technology in a tech school) in a classroom and am comfortable in front of a...