• Enabling ONOS Built-in Services

      Tags: computernetwork    
    In this exercise, you will integrate ONOS built-in services for link and host discovery with your P4 program. Such built-in services are based on the ability of switches to send data plane packets to the controller (packet-in) and vice versa (packet-out). To make this work with your P4 program, ...   Read More

  • Using ONOS as the Control Plane

      Tags: computernetwork     security    
    This post brings more details about the execution of Using ONOS as the Control Plane Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Start ONOS along with a set of built-in apps for basic services such as topology discovery Load a custom ON...   Read More

  • Yang, OpenConfig and gNMI

      Tags: computernetwork    
    This post brings more details about the execution of Yang, OpenConfig, and gNMI Basics Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Understanding the YANG language Understand YANG encoding Understanding YANG-enabled transport protocols...   Read More

  • KeePass Integration with AutoHotKey

      Tags: security     taskautomation    
    If you have to handle several passwords through some pass phrase manager like KeePass, I hope this post can help you to do less efort to get your passwords and bring it in a safe/secure way. To do that I propose a solution using KeePass and AutoHotKey tools, that will automate part of this proces...   Read More

  • Next Generation SDN - P4Runtime Basics

      Tags: computernetwork     security    
    This post brings more details about the execution of P4Runtime Basics Tutorial that is part of the Next Generation SDN Tutorial. This post will cover the following topics: Look at the P4 starter code Compile it for the BMv2 software switch and understand the output (P4Info and BMv2 JSON fil...   Read More

  • Buffer Overflow Through Vulnerable Program (Unix OS)

      Tags: reverseengineering     security    
    The following program is an example of insecure implementation that enable the user to inject shell commands during its execution. It uses the system() function that executes commands into the host environment through the command processor and it returns after the command has been completed. Sys...   Read More

  • Stack Overflow Explained

      Tags: reverseengineering     security    

  • Beaglebone Black - Soldering Jtag Connector

      Tags: hardware    
    The mostly goal in this article is to show how to soldering a JTAG connector in the Beaglebone Black (BBB) board, then in the next post I hope to show you how to connect it with J-Link Segger 8.08.90, at least if it works :). Otherwise, at least you can see here the pinout related to P2 connector...   Read More

  • Building NuttX for Beaglebone Black (BBB)

      Tags: embeddedsystems     digitalprocessing    
    To follow this tutorial (Linux), besides the Beaglebone Black (BBB), you will need a computer to build the NuttX OS, one microSD card, one serial-usb adapter and any serial software to interfaces with BBB. After complete the check list, is time to execute some commands. Setting up the Developme...   Read More

  • Control Systems - The Step Response

      Tags: control    
    In this post I want to cover some interesting things about step response and I hope to clarify via examples what the step response is and how it can be used to specify the design for closed-loop control systems, to do that I will use program laguage for Octave. So, to answer the question “What is...   Read More

  • Heterogeneous Co-Simulation - Software and Hardware

      Tags: embeddedsystems     digitalprocessing    
    The idea to write this post appeared some years ago when I was working as a FPGA Developer, I was amazed with the possibility to test my stuffs in a complete simulated environment, my goal here is make this tutorial simple and guided by practical exercise to clarify the co-simulation usage. When ...   Read More

  • State Chart XML SCXML - Generating C Code Using XMLStarlet

      Tags: embeddedsystems     softwaredevelopment    
    SCXML stands for State Chart XML: State Machine Notation for Control Abstraction. It is an XML-base markup language that provides a generic state-machine-based execution environment based on Harel statecharts.   Read More

  • Two-Wheeler balancing robot

      Tags: control    
    The 2-Wheeler Balancing Mechanical Kit is used to apply control laws related to inverted pendulum, with this mechanical kit I will start a serie related to control this kit. For this task I will use the Hercules LaunchPad, based on TMS-570 microcontrollers from Texas Instruments. In the next ima...   Read More

  • Tasks creation in Hercules LauchPad

      Tags: embeddedsystems    
    The Hercules TMS570LS04 LaunchPad Development Kit is an inexpensive evaluation platform designed to help usere and get started on development with Hercules microcontrollers platform.   Read More

  • Communication wireless using 3DR Telemetry Radio

      Tags: rf     embeddedsystems     control    
    The 3DR Radio is the easiest way to setup a telemetry connection between your autopilot and a ground station. Bellow you can see the simple test setup using a computer, any serial-usb adapter and a couple of telemetry radio, to prepare the setup you just need to connect the ground module directly...   Read More

Embedded Systems

RF

Control Systems

Digital Processing

Analog Electronic

Security

Reverse Engineering

Software Development

Hardware

Computer Network

Task Automation