All Articles
-
Enabling ONOS Built-in Services
Tags: computernetworkIn this exercise, you will integrate ONOS built-in services for link and host discovery with your P4 program. Such built-in services are based on the ability of switches to send data plane packets to the controller (packet-in) and vice versa (packet-out). To make this work with your P4 program, ... Read More
-
Using ONOS as the Control Plane
Tags: computernetwork securityThis post brings more details about the execution of Using ONOS as the Control Plane Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Start ONOS along with a set of built-in apps for basic services such as topology discovery Load a custom ON... Read More
-
Yang, OpenConfig and gNMI
Tags: computernetworkThis post brings more details about the execution of Yang, OpenConfig, and gNMI Basics Tutorial that is part of the Next Generation SDN Tutorial. And it will cover the following topics: Understanding the YANG language Understand YANG encoding Understanding YANG-enabled transport protocols... Read More
-
KeePass Integration with AutoHotKey
Tags: security taskautomationIf you have to handle several passwords through some pass phrase manager like KeePass, I hope this post can help you to do less efort to get your passwords and bring it in a safe/secure way. To do that I propose a solution using KeePass and AutoHotKey tools, that will automate part of this proces... Read More
-
Next Generation SDN - P4Runtime Basics
Tags: computernetwork securityThis post brings more details about the execution of P4Runtime Basics Tutorial that is part of the Next Generation SDN Tutorial. This post will cover the following topics: Look at the P4 starter code Compile it for the BMv2 software switch and understand the output (P4Info and BMv2 JSON fil... Read More
-
Buffer Overflow Through Vulnerable Program (Unix OS)
Tags: reverseengineering securityThe following program is an example of insecure implementation that enable the user to inject shell commands during its execution. It uses the system() function that executes commands into the host environment through the command processor and it returns after the command has been completed. Sys... Read More
-
Stack Overflow Explained
Tags: reverseengineering security
-
Beaglebone Black - Soldering Jtag Connector
Tags: hardwareThe mostly goal in this article is to show how to soldering a JTAG connector in the Beaglebone Black (BBB) board, then in the next post I hope to show you how to connect it with J-Link Segger 8.08.90, at least if it works :). Otherwise, at least you can see here the pinout related to P2 connector... Read More
-
Building NuttX for Beaglebone Black (BBB)
Tags: embeddedsystems digitalprocessingTo follow this tutorial (Linux), besides the Beaglebone Black (BBB), you will need a computer to build the NuttX OS, one microSD card, one serial-usb adapter and any serial software to interfaces with BBB. After complete the check list, is time to execute some commands. Setting up the Developme... Read More
-
Control Systems - The Step Response
Tags: controlIn this post I want to cover some interesting things about step response and I hope to clarify via examples what the step response is and how it can be used to specify the design for closed-loop control systems, to do that I will use program laguage for Octave. So, to answer the question “What is... Read More
-
Heterogeneous Co-Simulation - Software and Hardware
Tags: embeddedsystems digitalprocessingThe idea to write this post appeared some years ago when I was working as a FPGA Developer, I was amazed with the possibility to test my stuffs in a complete simulated environment, my goal here is make this tutorial simple and guided by practical exercise to clarify the co-simulation usage. When ... Read More
-
State Chart XML SCXML - Generating C Code Using XMLStarlet
Tags: embeddedsystems softwaredevelopmentSCXML stands for State Chart XML: State Machine Notation for Control Abstraction. It is an XML-base markup language that provides a generic state-machine-based execution environment based on Harel statecharts. Read More
-
Two-Wheeler balancing robot
Tags: controlThe 2-Wheeler Balancing Mechanical Kit is used to apply control laws related to inverted pendulum, with this mechanical kit I will start a serie related to control this kit. For this task I will use the Hercules LaunchPad, based on TMS-570 microcontrollers from Texas Instruments. In the next ima... Read More
-
Tasks creation in Hercules LauchPad
Tags: embeddedsystemsThe Hercules TMS570LS04 LaunchPad Development Kit is an inexpensive evaluation platform designed to help usere and get started on development with Hercules microcontrollers platform. Read More
-
Communication wireless using 3DR Telemetry Radio
Tags: rf embeddedsystems controlThe 3DR Radio is the easiest way to setup a telemetry connection between your autopilot and a ground station. Bellow you can see the simple test setup using a computer, any serial-usb adapter and a couple of telemetry radio, to prepare the setup you just need to connect the ground module directly... Read More
-
Operational Amplifier Series - Comparator Circuit
Tags: analogelectronic embeddedsystemsFrom the datasheet, the LM741 can be operated in an open-loop configuration.The magnitude of the open-loop gain is typically large thus for a small difference between the non inverting and inverting input terminals, the amplifier output will be driven near the supply voltage. Without negative fee... Read More
-
Reading XML Files in C++ (libxml2)
Tags: softwaredevelopmentXML files could be very useful for many kind of application, as configuration storage, software interface, resource for code generator, etc. Read More
-
Setting up Uncrustify Tool for Git Automation (C/C++ Languages)
Tags: softwaredevelopmentUncrustify is a tool used to fit a standard for a program language aplying style according to the configuration file, it turns the code as a standardized code. This tool is very used in cases of large projects that is difficult to disseminate a coding conventions or in cases of each team member u... Read More
-
Investigating Car Key (RF Remote Control) With HackRF One - Part 1
Tags: reverseengineering security rfFirst of all, I would like to register that this post has no intention to teach how to break the laws, to ensure this I will omit the car model and suppress any other information that could open a window for malicius people. I want to mension that it is just a theme that should be developed for s... Read More
-
Test Coverage Using Google Test, GCov and LCov
Tags: softwaredevelopmentThis post will describe a setup to start working with test coverage. First of all, I would like to highlight the GitHub link of this project BraveCoverage It is related to a very small piece of code to demonstrate how to start a project providing test coverage metrics. But why this is important?... Read More
-
Base Project to Use GTest and GMock for Unit Tests
Tags: softwaredevelopment embeddedsystemsThe goal of this post is to create a base to be used in all unit tests project that uses google test and google mock framework. Here I am configuring the environment for a Debian distribution and, of course, the commands below is valid only for distribution Debian based. So, first thing first, we... Read More
-
VHDL - Two Logic Gates Analysis
Tags: embeddedsystems digitalprocessingFirstly I would like to say that the following project is an initial example for who wishes start a work with VHDL, after read this example you will be able to simulate your first digital design in vhdl. The circuit below represents two logical gates “AND” and “OR”, and their corresponding input... Read More
-
Reversing a BIOS Flash Via Hardware - First Steps
Tags: reverseengineering securityThis brief tutorial about dumping the BIOS (Basic Input/Output System) content directly via hardware (Programmer MiniPro TL866), will pass to you the procedure executed to get BIOS binary code. Other articles of this blog will cover binary contents analysis and some modifications based on its dis... Read More