Sei sulla pagina 1di 54

IoT Optimized IP: Balancing processor

performance and energy consumption


Dr. Yankin Tanurhan, Vice President of Engineering, SG, Synopsys
With contributions from Jamil Kawa and Ron Lowman
Symposium on Emerging Trends in Computing, Montreux
10-11 Octobert 2016

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

Cloud 2.0 for the Internet of Things


Home Cloud

Work Cloud

Connectivity for Work, Home, Personal, & Environment

Central
Cloud

WiFi

Away or on the move

Mobile

Personal Cloud
Central Cloud: Work/Home/Personal Cloud for Ubiquitous Coverage
Source: IEEE ISSCC Conference, 2014
2016 Synopsys, Inc.

IoT From Sensors to Servers


Full Device and Energy Technologies Spectrum
IoT Edge Devices

Aggregation Layers
(Hubs/Gateways)

Remote Processing
(Cloud Based)

Things with sensors &


actuators that monitor & control
-DATA CAPTURE-

Connectivity & Interfaces to


aggregate the edge data to send
to the cloud -

Applications to analyze the


data and offer cloud services

2016 Synopsys, Inc.

IoT The Vision!


New Frontiers Life Enriching Connected Devices

Google Image Capturing device


For vision impaired. Warns of approaching traffic

Google Lens
Glucose detector
Reader could be a smart phone or wearable
2016 Synopsys, Inc.

The Promise: Lots of Creative Ideas!

Senses what your plant needs


and send alerts to your phone

Biometric shirts
monitor your sleep
cycles working on
baby pajamas

Drones deployed for deliveries


and agriculture

Ring video doorbell


streams live audio &
video
2016 Synopsys, Inc.

Smart Slippers for


the elderly

More Smart Home Gadgets.HOWEVER

Amazon Echo: can


perform 27 functions

Samsungs smart
refrigerator !

2016 Synopsys, Inc.

ADAS will lead to Autonomous Vehicles


Advanced Driver Assistance Systems

ADAS developed to enhance and automate vehicle systems for safety


Reduce driver stress
Avoid collisions by offering technologies that alert the driver to potential
problems
Avoid collisions by implementing safeguards and taking over control of the
vehicle

2016 Synopsys, Inc.

SIPO International Forum in Taiwan - August 2016

Autonomous Sensors Sprinkled Around


Wireless Network of Sensors 10 Trillion Sensors by 2032

Central
Cloud

Source: Chen, ISSCC 2010

Source: Tsensors Workshop, Stanford, Nov 2013

Sprinkling billions of battery powered, toxic autonomous sensors in the environment not an option
Requires use of self-contained energy harvesting and storage elements
MEMs & 3D-IC integration techniques mature

2016 Synopsys, Inc.

Wearable Devices
and Their Current Power Source

Battery capacity
doubles every 10 years
Battery technology not
keeping up

Application

Battery Capacity

Battery

Lasts per charge

Google Glass

570mAh

Li Polymer

1 days

Samsung Gear S Smart Watch

300mAh

Li-Ion

2 days

Samsung Gear Fit Smart Watch

210mAh

Li Polymer

4-5 days

Zinc Air

3-22 days

Starkey Hearing Aid


2016 Synopsys, Inc.

10

91 - 630mAh

Implantable Devices
Themes & Common Threads
In 2010: 219K people worldwide had
cochlear devices implanted
More than 1 million pacemakers and more
than 200K defibrillators are implanted
worldwide every year

Bladder implant / Ear implants

ECG monitoring system - SYRINGE


Form factor critical
Width < 1.5mm ,
length dictated by signal amplitude ~2cm
64nW total system power

Leadless Pace Maker


Jeon et al, ISSCC 2014

2016 Synopsys, Inc.

11

IoT Edge Device Market


Internet of Things and its attractive growth
5B people connected by 20201
33B objects connected by 2020, IoT will include 25B2 (~2Bu/yr)
11.5% CAGR through 2022 for IoT chip market (from $4.6 to $10.8B)3
50%+ volume driven by smart home and wearables4
55% global IoT security market growth through 20195
$7.4B and over 887 deals to IoT startups since 20106
Fragmented market.. so key applications drive innovation
Mobile handsets drive interoperability (WiFi, Cellular, Bluetooth)
Regulations & standards drive security (PCI, NIST, FIPS, Common
Criteria, WiFi, etc)
Wearables & drones drive energy efficiency
World Economic Forum
Gartner
3
Marketandmarkets
1
2

2016 Synopsys, Inc.

12

Linley 2016 IoT Report


Marketresearchrports.biz
6
CB Insights
4
5

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

13

Sources of Energy Abound


From Solar to Bacteria
Piezoelectric
Wind

Solar

Magnetic

Shoe Insert + Walking


Motion

Vibration

2016 Synopsys, Inc.

14

Garbage

Batteries

---- Weve Got Potential +++

Implanted Glucose Cells +


Body Heat

Glucose Fuel

Energy Harvesting
Towards Autonomous Sensors
Energy

Time

Energy
Energy
Harvester
Harvester

EnergyStore
Store
Energy
&&
management
management

EnergySource
Source
Energy
Analog++RF
RF
Analog

Sensor
Sensor
ADC
ADC
CPU
CPU
Memory
Memory

Energy harvesting is the process for collecting energy from the surrounding environment and
converting it to electricity.
Requirements for an autonomous system
Energy source must exceed energy needed by >2x for safety
storage element must take into account intermittent energy sources such as solar
total energy consumption includes harvester overhead, leakage, and dynamic power
2016 Synopsys, Inc.

15

Power Density Matrix for Energy Harvesting Methods


Energy Source

Power Density & Performance

Source of Information

Acoustic Noise

0.003 W/cm3 @ 75Db

Rabaey, Ammer, DA Silva Jr., Patel &


Roundy, 2000

Temperature Variation

10 W/cm3

Roundy, Steingart, Frechette, Wright,


Rabaey, 2004

Ambient Radio Frequency

1 W/cm2

Yeatman, 2004

Ambient Light

100 mW/cm2 (direct sun)


100_W/cm2 (illuminated office)

Available

Thermoelectric

60_ W/cm3

Stevens, 1999

Vibration (micro generator)

4_W/cm3 (human motion - Hz)


800_W/cm3 (machines kHz)

Mitcheson, Green, Yeatman,& Holmes,


2004

Vibration (Piezoelectric)

200 W/cm3

Roundy, Wright, & Pister, 2002

Airflow

1 W/cm2

Holmes, 2004

Push Buttons

50_J/N

Paradiso & Feldmeier, 2001

Shoe Inserts

30 W/cm2

Shenck & Paradiso, 2001

Heel Strike

7 W/cm2

Yaglioglu, 2002
Shenck & Paradiso, 2001

2016 Synopsys, Inc.

16

Rechargeable Energy Sources


Li-Ion Batteries, Micro-Batteries, Super-Caps, and More ...

Source: www.tested.com

Source: Hsia et al; Transducers 2013, SPAIN

2016 Synopsys, Inc.

17

Source: BERC , Nov 2013

Source: www.nature.com

Rechargeable Battery or Super-Capacitors


On-Chip Storage Solutions
Choice: high power or high energy
Today, most common rechargeable
battery is Li-ion
Energy density: 300mWh/cm
Power density of 100mW/cm

Super capacitors in their early phase


Energy density ~2mWh/cm
Potential ~100mWh/cm
Power density comparable to Li-ion

Emerging Micro-batteries very promising


Up to 100 W/cm
Up to 100 mWh/cm

2016 Synopsys, Inc.

18

Source: UIUC

On-Chip Energy Storage Technologies


Solid-State SuperCapacitors: Iono-Gel Electrolytes

Source: Hsia et al; Transducers 2013, SPAIN

Solid-state micro-supercapacitors are a good solution for on-chip energy storage


Photoresist-derived porous carbon =electrode with high specific capacitance & good conductivity
Electrolytes: Iongels or Carbon in Aqueous
Volumetric capacitance of 9.8F/cm*3 possible
Voltage range up to 3V
2016 Synopsys, Inc.

19

Energy Storage Technologies


Micro Batteries. Aiming for the Best of Both Worlds

Source: 3-D Micro Battery U. of Illinois Prof. William King

Micro Batteries
Up to 100 W/cm
Up to 100 mWh/cm
Has advantages (the best of) Li-Ion & Super-Caps
Small form factor ideal for implanted pace makers, etc..
2016 Synopsys, Inc.

20

100 mWh/cm
Univ. Illinois Research

So What Should We Use? Application Dependency


Hybrid Energy Source is the Answer ?
Application demands low power but long life?
Perhaps a fuel cell or a Li-Ion battery

Application demands high peak power?


Perhaps a Super-cap

Most sensor-systems require both


Perhaps a hybrid combination

The decision is simply driven by the suitability of the


power source for the particular application lifetime per
charge, peak drive capability, ease of re-charging, form
factor, ease of integration and cost

2016 Synopsys, Inc.

21

An IBM simulation of an autonomous


sensor system using the IBM TrueNorth
processor (SyNAPSE chip) with 5.4 billion
transistors and 20mW power budget

Energy Budgeting
Towards Autonomous Sensors

Energy
Energy
Harvester
Harvester

EnergyStore
Store
Energy
&&
management
management
Analog++RF
RF
Analog

Sensor
Sensor
ADC
ADC
CPU
CPU
Memory
Memory

Key issues to keep in focus


Idle time is as much as 97% of total time -> watch for leakage
Energy storage / source is a function of total energy and of power density
RF transmission is the most power hungry part of the system.
2016 Synopsys, Inc.

22

An autonomous Sensor Example


Simplified Energy Calculations
Will use an off the shelf available rechargeable solid state battery
6mm x 6mm x 200um, Capacity 50uAh (alternative,3mmx3mm@12uAh)
Output voltage (nominal): 3.8V
Charging source: 4.1V
Cell resistance = 30K
Charging time to 80% capacity = 20 min
Current capability: 0- 50uA
Self discharge = 2.5% / year

Matching Solar die


4mm x 6.2mm -> 4.2 4.5V
Short circuit current = 50uA

Solar die max capability and solid-state battery charging current a match

2016 Synopsys, Inc.

23

An Autonomous Sensor Example- CK rate = 32KHz


Simplified Energy Calculations
U-Processor Specs Use Synopsys ARC EM4 Processor Core
Commercial: dynamic power 16.586uW @ 10MHz, VDD = 1.1V, 25C
Commercial: static power (leakage) 0.195 uW
PLSense: dynamic power 4.578 uW @.55V , 10MHz, 25C
PLSense: static power (leakage) 0.102 uW

Tx/Rx typical specs


1Km range: 100mW, 15 mA
1m range 50uW, 10uA

12-bit ADC- Use Synopsys SAR

Energy
Energy
Harvester
Harvester

EnergyStore
Store
Energy
&&
managemen
men
manage

2016 Synopsys, Inc.

24

ADC
ADC

tt

Active current 17uA @ 10k SPS


Inactive current < 1 uA

Sensor
Sensor

Analog++RF
RF
Analog

CPU
CPU
Memory
Memory

Thinking Outside the Box


Large-scale Piezoelectric Energy Harvesting
A Busy Highway company: Innowattech
Piezoelectric 33 ft under mile of busy highway stretch
Enough energy to power 250 homes on an average
Voltree:
Harvests the metabolic energy of trees, converts to
electricity to power sensors in forests to detect fires
Garbage to Energy
MFCs: Microbial Fuel Cells ~4.9 mW/m*2

Runs on cellulose degradation

Most famous DNA string: Enterobactor cloacae


I ~ 120 mA/m*2, R=1000 , V= 60mV
source: postscapes.com
2016 Synopsys, Inc.

25

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

26

How Does IoT Impact SoC Designs?


Ultra Low Power
Sensors

Software
Processor

Actuators

SoC IP Requirements
Ultra low power
Wireless power charging
High reliability
Small size
Flexible electronics
(i.e. printable electronics)
2016 Synopsys, Inc.

27

Storage

RF

Typical ultra low power system budgets


.1uA RAM retention
.3-.5uA uA Standby mode
150-200 uA active
Ultra low power ICs: < 500nA standby
Energy harvesting ICs consume as little as 300nA in
their active state

Smart (and Vulnerable) Everything - IoT


Who lost your data in
2015's biggest hacks,
breaches?

Security flaw affects


nearly every Android
phone with an ? chip

Security breaches are more critical


The meter dash: how
to hack parking
2016 Synopsys, Inc.

28

eg
rity
In t

Ph
Ta ysica
m
Pro per l
tec
tio
n

Authentication

Star networks and ring networks:


less redundancy

Target hackers
broke in via HVAC
system

n
tio
ec
rot
t P

tio
n

ten

Least susceptible to failure


Most vulnerable to security breaches

TEE

or
iza

n
Co

Mesh network:
fully connected network with ample
redundancy

Da
ta

Au
th

ta
Da ption
cry
En

Ide

o
ati
c
i
tif

Remotely kill a jeep on the way


to the highway with me in it!

Rings smart
doorbell can
leave your house
vulnerable to
attacks

Example IoT SoC Architectures


Corral the Market Fragmentation
High-End Edge Device
Radio
Radio (WiFi,
(WiFi,
Bluetooth)
Bluetooth)

10/100/1G
10/100/1G Enet
Enet

MIPI
MIPI

GPU

UART

System
System Logic
Logic

Low-End Edge Device

LPDDR2/3
LPDDR2/3

Ext
Ext Flash
Flash
Memory
Memory
Controller
Controller

Application
Application
Processor
Processor
ARC
ARC HS38
HS38

SDMMC
SDMMC

Radio
Radio (ISM,
(ISM, 802.15.4,
802.15.4, Bluetooth
Bluetooth Smart)
Smart)
Radio
Radio (Bluetooth
(Bluetooth Smart
Smart // 802.15.4)
802.15.4)

UART
UART

SPI
SPI

NVM

ROM

ADC

PWM
PWM //
Timers
Timers

AAstripped
strippeddown
downApps
AppsProcessor
Processor
65nm

to
28nm
(some
65nm to 28nm (some40nm)
40nm)
Linux,
Android
Linux, Android
Google
Googleglass,
glass,Nest,
Nest,Video
VideoCams
Cams

2016 Synopsys, Inc.

29

Internal
Internal Flash
Flash

System
System Logic
Logic

Power
Power
ARC
ARC EM
EM
Processor
Processor

USB
USB Host
Host
OTG
OTG w/
w/
Charge
Charge
Detect
Detect

I2C
I2C

SPI
SPI

NVM
NVM

ROM
ROM

MTP
MTP // EEPROM
EEPROM

GPIO
GPIO

GPIO
GPIO

I2C
I2C

Audio
Audio

Sensor Subsystem

SRAM
SRAM

USB
USB 2.0
2.0 Host
Host
OTG
OTG w/
w/
Charge
Charge Detect
Detect

ARC EMxx
Sensor Subsystem

Sensor Subsystem
ARC
ARC EM
EM
Co-Processor
Co-Processor

Smart Analog Device

ROM
ROM

SRAM
SRAM

ADC
ADC //

DAC
DAC // PWM
PWM
// Timers
Timers

Comparator
Comparator

IP: eFlash, NVM, USB, ADC, uP, peripherals,


IP: eFlash, NVM, USB, ADC, uP, peripherals,
Sensor
Sensorsubsystem
subsystem
90nm 55nm & 40nm
90nm 55nm & 40nm
RTOS: FreeRTOS, Contiki, MQX
RTOS: FreeRTOS, Contiki, MQX
Fitbit, Smart meters, Smart Appliances
Fitbit, Smart meters, Smart Appliances
Confidential

Sensor
Sensor

ARC
ARC EM
EM Processor
Processor

SRAM
SRAM

ADC
ADC //

I2C
I2C

SPI
SPI

IP:
IP: Power,
Power,Audio,
Audio,Sensor
Sensor
180nm
some
130/110/90nm
180nm some 130/110/90nm
RTOS:
RTOS:None,
None,Limited
LimitedRTOS
RTOS
Tire
sensors,
accelerometers
Tire sensors, accelerometers

Comparator
Comparator

IoT Wireless Connectivity


Different Applications Require Different Solutions
Nearables / Wearables

Smart Home/Building

Smart City

Portable
Medical

Laundry

HVAC

WildFire
Monitor

Earthquake
Monitor

Fitness
Monitors

Head Phones

Sprinkler
System

Garage Door

Flood / Water
Monitoring

Metering

Payment

Security
Access

Surveillance
Cameras

Security
Locks

Street
Lighting

Maintenance
Services

Beacons

Defacto
Standard

LTE-M
NB-IoT
LTE-M2

2016 Synopsys, Inc.

30

Lots of Standards to Consider


Relative Timeline of Wireless Protocols for IoT

Mobile Phone
Integration

Relative
Power
(Tx/Rx)
1st Release

BLE

4.2
Security &
Internet
Connect

Health

Low

5.0
Mesh & Long
Range
Medium

802.11b

802.11g/a

802.11n

802.11ac

802.11ah* (900MHz)

High

LTE-M1

LTE-M2 /
NB-IoT

Requires
Custom Hub

Cellular Provider Optional


(LPWA)

2016 Synopsys, Inc.

31

Medium
/ Low

IPv6
Security
Home Automation

Low

Metering
Factory Automation
Energy Harvesting
* 802.11ah is new, may not be integrated into mobile
phone due to new radio requirements

Synopsys - IoT Wireless & Analog Support


Bluetooth, 802.15.4
Deploying complete BLE & 802.15.4 PHY
Software stacks with partners
(Mindtree, Searan, Alpwise, Tismo Systems, Luxoft)

Full qualification
Membership of Bluetooth SiG & Thread Group

802.11 for Smart Home, Office


AFE for 802.11n/ac/ax baseband
supporting BW up to 160MSPS, down to 28nm
Porting to FinFET
802.11ah PHY is next step

General purpose ADCs for MCU


(medical, motor, etc.)
State of the art 12 & 14-bit ADCs for general
purpose measurements in SoC, down to 28nm
2016 Synopsys, Inc.

32

LTE for cellular and Smart City


LTE/LTE-A AFE baseband,
up to 5 aggregated channels
(100MSPS), down to 28nm
LTE cat-0 AFE baseband, down to 28nm

LTE-M1, LTE-M2 = NB-IOT


for Smart City & Smart Home
Developing optimized LTE-M AFE, down to 28nm
Porting this IP to FinFET nodes

5G for Cellular
AFE to support 5G applications.
Giga-SPS data converters, 28nm and below

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

33

Configurable Processor Options


for Improving IoT Device Energy Efficiency
Adding DSP acceleration to RISC processor
Using multi-bank memories to increase operations per cycle, e.g. XY
memories
Closely coupling memories and peripherals
Use of a tailored DMA to move data around the system while the processor
sleeps
Application specific instructions

2016 Synopsys, Inc.

34

DSP Instructions to Reduce Cycle


IoT devices by definition need to sense and process real world signals
Minimize energy per function power x cycles

Mixed control and DSP


Good power and efficiency for RISC and DSP

Code size
Memory footprint, active memory power, I-cache miss rate

Data types
Fractional Q31, Q15

DSP instructions
MUL/MAC, Rounding & saturation. Vector operations, Complex, Single and dual accumulators

Improved latency and energy efficiency for Voice Control, Speech Playback,
Inertial sensor processing
2016 Synopsys, Inc.

35

Support for Multi-bank Memories

XY Memory architectures can increase throughput and reduce code size.


both will increase energy efficiency to perform the same task

2016 Synopsys, Inc.

36

XY vs Multi-issue Architecture Comparison


MAC Performance vs Area Optimization Profiling
For increasing DSP performance, two
options were investigated
Addition of XY memory support and
architecture change to multi-issue
Through basic prototyping, sufficient data
was gathered to analyze the options

Conclusions
XY option for higher DSP performance &
lower energy
1 MAC/cycle Performance: Area Sweet Spot

Architecture Investigation Summary

XY delivered highest performance within the rigid power/area constraints set by the
ARCv2EM Development
2016 Synopsys, Inc.

37

DSP Performance (MACs/cycle)

Adding DSP Instructions with Multi-bank


Memories Significantly Improve
Performance
Address generation
Implicit loads
MAC operations
Rounding & saturation

38

Address generation
Implicit loads
MAC operations
Rounding & saturation

1 x 32x32 MAC/cycle
2 x 16x16 MAC/cycle

1/3 x 32x32 MAC/cycle


2/3 x 16x16 MAC/cycle

EM5D / EM7D
EM4 / EM6

2016 Synopsys, Inc.

Address generation
Implicit loads
MAC operations
Rounding & saturation

+100 DSP Instr.


Compiler Support

EM9D / EM11D
with 32-bit XY

23x+

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

39

Bus-Free Subsystems
Leveraging Closely Coupled Memories and Peripherals

Typical 32-bit processor embedded system

Bus-less
sensor
hub implementation
ARC + APEX
integrated
embedded
system

Removing the bus architecture reduces cycle count, area, and energy

2016 Synopsys, Inc.

40

Confidential

Standard Memory Implementation


Use-Case: Processing

Data flow:
-Memory CPU Memory
-Fetching 1 data element takes 4 CPU
cycles
- Cycles:
- load, ahb, ahb, data, load,
ahb,

=15MHz
= 5MHz

2016 Synopsys, Inc.

41

-Fetching 1 instruction takes 5 CPU


cycles
- Cycles:
- load, ifq, ahb, ahb,
instruction,

Closely Coupled Memory Implementation


Use-Case: Processing

=15MHz
= 5MHz

Data flow:
-Memory CPU Memory
-Fetching 1 data element takes 1 CPU
cycles
- Cycles:
- load, data/load, data/load,
- Improvement: 4 1 cycles
-Fetching 1 instruction takes 1 CPU
cycles
- Cycles:
- load, instr./load, instr./load
- Improvement : 5 1 cycles
-Area improvement:
- Instruction Fetch Unit (Queue)

Use-case measurement shows 4X cycle improvement


2016 Synopsys, Inc.

42

Standard Peripheral Implementation


Use-Case: Sensing and Communications

Data flow :
-Sensing: IO Memory
-Comms: Memory IO
-Fetching 1 IO element takes 6 CPU
cycles
- Cycles:
- load, ahb, apb, apb, ahb,
data,

=15MHz
= 5MHz

2016 Synopsys, Inc.

43

-Writing 1 IO element takes 6 CPU cycles


- Cycles:
- load, ahb, apb, apb, ahb,
data,

Closely Coupled Peripheral Implementation


Use-Case: Sensing and Communications
Data flow :
-Sensing: IO Memory
-Comms: Memory IO
-Fetching 1 IO element takes 2 CPU cycles
- Cycles:
- load, data, load, data,
- Improvement : 6 2 cycles
-Writing 1 IO element takes 2 CPU cycles
- Cycles:
- store, store, store,
- Improvement : 6 2 cycles
-Area improvement:
- Direct Memory Interface
- AHB multi-layer, APB bridge
= 5MHz

Use-case measurement shows 3X cycle improvement


2016 Synopsys, Inc.

44

Impact of Closely Coupled vs Bus-based Architectures


Minimize power consumption impact of
move from 8bit to 32bit MCUs with
tightly coupled memories & peripherals

Processor accesses the auxiliary


registers in 1 cycle instead of 4 cycles
(min) for the peripheral registers in a
bus-based system

2016 Synopsys, Inc.

45

Low Power Memory Configuration


Closely Coupled Memories (CCM) with DMA Access

APB
APB

Typical system would access memory and DMA over the Bus (higherPer1
energy)
Per1
ICCM
EM
EM DSP allows DMA to store data
in DCCM while
CPU
Memprocessor
DMAsleeps
uDMA
DSP
Per2
Per2
DMA wakes up processor when buffer is fullDCCM
with >70% energy saving
vs
LD/ST loop
After wake-up, processor hasAHB
immediate
energy)
I$/D$ access to data in DCCM (low
AHB
Per3
Per3
No energy spent in bus accesses

AHB

Lower latency processor can be set to run at lower frequency (saving power)

4x Faster

Sensor Hub Application Analysis


Analysis of processing stage after data collected
Core and bus at same frequency
Bus-based with instruction fetch queue
Benefit of CCMs and DMA in sleep modes

2016 Synopsys, Inc.

46

Increase Performance and Reduce Energy with


Application Specific Instructions
ARCs extensible architecture (APEX)
enables you to add

Core registers, auxiliary registers, condition &


status codes

Benefits
Speed up code, algorithms, and
memory/peripheral accesses
Reduce code size, latency, memory area/cost
and power

10x Cycle Reduction

User hardware (Verilog RTL)

9.6x Energy Reduction

User-defined 32-bit instructions

Energy and cycle count reduction running sensor


application software with APEX accelerators

2016 Synopsys, Inc.

47

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

48

Connected Devices at Risk of Being Attacked


Attacks Are on the Rise & Evolve Continuously
Recent Example: Baby Monitor Attack

Everyone is affected, from consumers and


enterprises, to service providers and
manufacturers
Security is crucial and needs to be addressed
at all levels, starting with the SoC

Remote
communication
attack

Replace SW
in SoC

2016 Synopsys, Inc.

49

Escalate privilege
attack in device

Latest hacks result in investigation


Companies need to be prepared to justify the
security of their products
EMBEDDED
SECURITY
is

ESSENTIA
L.

Secure Your SoC with Synopsys Security Solutions


Authenticate. Encrypt. Protect.

TEE

Software

TEE
Non-trusted
Apps

Trusted Apps
Platform Security

Non-trusted
Apps

Cryptography Library

tRoot Trusted
Apps & APIs

Rich OS

OS

Broad portfolio of scalable HW & SW


security IP solutions address evolving
threats
Solutions for implementing Trusted
Execution Environments (TEE)
ARC processors w/ HW separation

Hardware

ARC & Subsystems w/


Secure Shield

Security Protocol
Accelerators

Security Protocol
Accelerators

Cryptographic Cores

Microcontroller
SoC

2016 Synopsys, Inc.

CryptoPack

tRoot
Root of Trust
Security Modules

TRNGs

50

CPU

Microprocessor
SoC

Cryptographic Cores
TRNGs

Root of Trust Security Modules

Efficient secure authentication, data


encryption, platform security and
content protection
Certified implementations of security
standards

ARC SEM Security Processors Security at the Core


Secure Side-Channel and Tamper Resistant Processor
ARC SEM Cores
ARCv2 Instruction Set Architecture (ISA)
ARCv2 DSP ISA (SEM120D only)
Secure APEX Instruction Extension & Direct I/O

Commit

Execute
IFQ

Anti Tamper, Side Channel Resistant Pipeline


DMP
Memory

Divider

Interrupt
Controller

Secure MPU

Watchdog Timer

Secure AHB5 Bus

Secure Debug

TRNG Interface

NVM Interface

SEM110

Up to 2MB I&D Closely Coupled Memories (CCMs)

SEM120D

Up to 2MB I&D CCMs, DSP ISA + Unified MUL/MAC

2016 Synopsys, Inc.

51

Side channel protection


Uniform instruction timing

ICCM/

DCCM

Ultra-low power security processors incorporate advanced


security features to protect systems from evolving threats
SecureShield with multiple isolated execution contexts

Timing & power randomization

Tamper-resistant pipeline with in-line instruction/ data


encryption and address scrambling
Secure debug functionality
Error detection and parity on memories, registers
Integrated watchdog timer detects system failures, including
tampering
Runtime library for secure sandboxing

Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.

52

Summary
IoT content is limited by our ability to dream applications and our ability to
reliably power them
10 Trillion sensors by 2032- most will be autonomous
Abundance of Energy source
Energy harvesting and energy storage are key
Balance between energy & power density in choice of optimal power storage medium

Ultra low-power IP like ARC EM family is key


Implantable devices dictate wireless data and power transmission standards
We have barely scratched the surface

2016 Synopsys, Inc.

53

Thank You

Potrebbero piacerti anche