A   B   C   D   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   Y   Z  

Masuda, T.

Paper Title Page
WEP010 Development of a PC/104-Plus Based CPU Module with Power over Ethernet Capability 186
  • M. Ishii, T. Masuda, T. Ohata, R. T. Tanaka
    JASRI/SPring-8, Hyogo-ken
  We developed a PC/104-Plus based CPU module with power over ethernet (PoE, IEEE 802.3af) capability. It is based on RENESAS* SH-4 CPU that is used for embedded applications requiring both high performance and low power consumption. We ported Linux 2.6 kernel to the CPU module and set up to run on diskless environment of NFS root. By stacking a dedicated PoE low power module onto the CPU module, it runs without a direct DC power supply. The PoE capability has advantages of power cable saving and power management by remote operation via a power sourcing equipment such as a switching hub. We can choose stackable PC/104 or PC/104-Plus peripheral I/O modules from a variety of commercial products such as analog inputs and outputs or digital inputs/outputs. Therefore, we can assemble a compact, flexible and low-cost embedded-measurement instrument. As a first application, we have a plan to apply the CPU module to a precise analog-signal measurement such as a digital voltmeter. We will report the influence of the PoE power sourcing on the precise measurement.

* http://www.renesas.com/

poster icon Poster  
WEP018 Evaluation and Improvement of PoE-based Temperature Measurement Module 207
  • T. Masuda, T. Kudo, T. Ohata, R. T. Tanaka
    JASRI/SPring-8, Hyogo-ken
  • T. Fukui
    RIKEN/SPring-8, Hyogo
  We developed the PoE-based small-size temperature measurement module*. It consists of a CPU card operated by Linux 2.6 kernel and an RTD card equipped with four-channel inputs of 3-wired Pt100 RTD sensors. We have installed the modules into the machine tunnel of the SCSS (SPring-8 Compact SASE Source) prototype accelerator to measure the air temperatures. The measurement seems to be affected by RF nose because the noise level becomes higher when the machine operations start. We have, therefore, redesigned an RTD card to improve noise immunity to realize precise measurement even under the RF noise. The modifications are as follows; using 4-wired Pt100 sensors with shielded twisted cables, and bringing out the analog ground of the RTD card onto an external connector. In addition, we have increased the number of input channels of the RTD card up to 24. The new module can be also driven with PoE. We have successfully improved the noise immunity and showed the good results of about 0.01°C accuracy during the accelerator operations. Because of its compactness and PoE capability, we will apply the new modules to measure temperatures of insertion device magnets at Japanese XFEL.


poster icon Poster  
THX03 TCP/IP Vulnerabilities of Embedded-System Implementations 224
  • T. Sugimoto, M. Ishii, T. Masuda, T. Ohata, T. Sakamoto, R. T. Tanaka
    JASRI/SPring-8, Hyogo-ken
  TCP/IP is established as a de facto standard network-communication protocol. Development of the TCP/IP enables us to build a large-scale distributed control system. Recent accelerator-control system consists of many TCP/IP devices; not only computers, but also embedded devices such as digital multimeters, oscilloscopes, multi-channel analyzers, and so on. Since these embedded devices are designed with limited hardware resources, most devices use subset of the TCP/IP components. The limited resources and components therefore cause many problems such as vulnerabilities of TCP/IP implementations. In SPring–8, by increasing the number of network-connected instruments with latent vulnerabilities, more trouble have arisen such as packet flooding and unexpected response delaying. One of the most serious trouble is hang-up of pulse-motor controllers* based on embedded operating system. To determine cause of the trouble, network-connected instruments were inspected using basic TCP/IP tools and security scanners. As a result, we successfully found vulnerabilities of embedded implementation. In this presentation, the cause of vulnerabilities in embedded systems will be discussed.

* T. Masuda et. al., Proceedings of PCaPAC2005, WEP30 (2005)

slides icon Slides