search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Feature: Cobots


Figure 2: The runtime architecture of the Lynx system running a separation kernel


causes spikes in worst-case execution times more than six-fold compared to a single core. This is where Lynx focuses, providing a secure hypervisor that can securely partition and isolate applications, whilst guaranteeing that there is microsecond-level response to time-critical events.


Connected These issues are further compounded by the fact that cobots need to be connected, for sharing sensor data, receiving instructions, software updates and their monitoring. The security aspect will impact the system and any device accessible from that network connection. To avoid this, security must be incorporated from the beginning as opposed to retrofitted. There must be an early alert when the system has been compromised, coupled with a way to bring it back to a known good state. And since this is not a static environment, being able to securely download new software to keep the system secure is a must. From a software perspective, the system must be built so it can’t be reconfigured after boot-up and so that no application can accidentally or otherwise cause the robot to fail.


The emergence of collaborative robots is all about interaction and joint work with people in the workplace, in contrast to traditional industrial robots which work autonomously


A Lynx system running a separation


kernel can meet these requirements; see Figure 2. In most deployments, there will be two platform kernels running: 1. The Separation Kernel controlling the physical hardware;


2. The OS kernel hosting guest applications. This introduces an extra abstraction


layer, compared with typical OS designs where hardware control is integrated with the OS kernel. Here, the separation kernel is the only piece of software with access to physical hardware; the application kernels have no access to real hardware and can only manage “mapped resources”. For this “software-assisted hardware


partitioning model”, all application partition boundaries are exclusively


hardware-enforced according to a model. Here, if an application violates a partition boundary, hardware first catches the violation and requests software assistance from the Separation Kernel Hypervisor to manage the exception.


Computing Cobots are about edge computing, which relates to shifting the intelligence nearer to where data is gathered. For latency, network availability and privacy reasons, these cobots will usually harness local on-premise computing resources instead of accessing the cloud. To do so successfully, in a context where they operate alongside and around people and undertake tasks with high safety risks, implies that their design must be safe and secure.


www.electronicsworld.co.uk September/October 2020 39


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68