Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
Work Cloud
Central
Cloud
WiFi
Mobile
Personal Cloud
Central Cloud: Work/Home/Personal Cloud for Ubiquitous Coverage
Source: IEEE ISSCC Conference, 2014
2016 Synopsys, Inc.
Aggregation Layers
(Hubs/Gateways)
Remote Processing
(Cloud Based)
Google Lens
Glucose detector
Reader could be a smart phone or wearable
2016 Synopsys, Inc.
Biometric shirts
monitor your sleep
cycles working on
baby pajamas
Samsungs smart
refrigerator !
Central
Cloud
Sprinkling billions of battery powered, toxic autonomous sensors in the environment not an option
Requires use of self-contained energy harvesting and storage elements
MEMs & 3D-IC integration techniques mature
Wearable Devices
and Their Current Power Source
Battery capacity
doubles every 10 years
Battery technology not
keeping up
Application
Battery Capacity
Battery
Google Glass
570mAh
Li Polymer
1 days
300mAh
Li-Ion
2 days
210mAh
Li Polymer
4-5 days
Zinc Air
3-22 days
10
91 - 630mAh
Implantable Devices
Themes & Common Threads
In 2010: 219K people worldwide had
cochlear devices implanted
More than 1 million pacemakers and more
than 200K defibrillators are implanted
worldwide every year
11
12
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
13
Solar
Magnetic
Vibration
14
Garbage
Batteries
Glucose Fuel
Energy Harvesting
Towards Autonomous Sensors
Energy
Time
Energy
Energy
Harvester
Harvester
EnergyStore
Store
Energy
&&
management
management
EnergySource
Source
Energy
Analog++RF
RF
Analog
Sensor
Sensor
ADC
ADC
CPU
CPU
Memory
Memory
Energy harvesting is the process for collecting energy from the surrounding environment and
converting it to electricity.
Requirements for an autonomous system
Energy source must exceed energy needed by >2x for safety
storage element must take into account intermittent energy sources such as solar
total energy consumption includes harvester overhead, leakage, and dynamic power
2016 Synopsys, Inc.
15
Source of Information
Acoustic Noise
Temperature Variation
10 W/cm3
1 W/cm2
Yeatman, 2004
Ambient Light
Available
Thermoelectric
60_ W/cm3
Stevens, 1999
Vibration (Piezoelectric)
200 W/cm3
Airflow
1 W/cm2
Holmes, 2004
Push Buttons
50_J/N
Shoe Inserts
30 W/cm2
Heel Strike
7 W/cm2
Yaglioglu, 2002
Shenck & Paradiso, 2001
16
Source: www.tested.com
17
Source: www.nature.com
18
Source: UIUC
19
Micro Batteries
Up to 100 W/cm
Up to 100 mWh/cm
Has advantages (the best of) Li-Ion & Super-Caps
Small form factor ideal for implanted pace makers, etc..
2016 Synopsys, Inc.
20
100 mWh/cm
Univ. Illinois Research
21
Energy Budgeting
Towards Autonomous Sensors
Energy
Energy
Harvester
Harvester
EnergyStore
Store
Energy
&&
management
management
Analog++RF
RF
Analog
Sensor
Sensor
ADC
ADC
CPU
CPU
Memory
Memory
22
Solar die max capability and solid-state battery charging current a match
23
Energy
Energy
Harvester
Harvester
EnergyStore
Store
Energy
&&
managemen
men
manage
24
ADC
ADC
tt
Sensor
Sensor
Analog++RF
RF
Analog
CPU
CPU
Memory
Memory
25
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
26
Software
Processor
Actuators
SoC IP Requirements
Ultra low power
Wireless power charging
High reliability
Small size
Flexible electronics
(i.e. printable electronics)
2016 Synopsys, Inc.
27
Storage
RF
28
eg
rity
In t
Ph
Ta ysica
m
Pro per l
tec
tio
n
Authentication
Target hackers
broke in via HVAC
system
n
tio
ec
rot
t P
tio
n
ten
TEE
or
iza
n
Co
Mesh network:
fully connected network with ample
redundancy
Da
ta
Au
th
ta
Da ption
cry
En
Ide
o
ati
c
i
tif
Rings smart
doorbell can
leave your house
vulnerable to
attacks
10/100/1G
10/100/1G Enet
Enet
MIPI
MIPI
GPU
UART
System
System Logic
Logic
LPDDR2/3
LPDDR2/3
Ext
Ext Flash
Flash
Memory
Memory
Controller
Controller
Application
Application
Processor
Processor
ARC
ARC HS38
HS38
SDMMC
SDMMC
Radio
Radio (ISM,
(ISM, 802.15.4,
802.15.4, Bluetooth
Bluetooth Smart)
Smart)
Radio
Radio (Bluetooth
(Bluetooth Smart
Smart // 802.15.4)
802.15.4)
UART
UART
SPI
SPI
NVM
ROM
ADC
PWM
PWM //
Timers
Timers
AAstripped
strippeddown
downApps
AppsProcessor
Processor
65nm
to
28nm
(some
65nm to 28nm (some40nm)
40nm)
Linux,
Android
Linux, Android
Google
Googleglass,
glass,Nest,
Nest,Video
VideoCams
Cams
29
Internal
Internal Flash
Flash
System
System Logic
Logic
Power
Power
ARC
ARC EM
EM
Processor
Processor
USB
USB Host
Host
OTG
OTG w/
w/
Charge
Charge
Detect
Detect
I2C
I2C
SPI
SPI
NVM
NVM
ROM
ROM
MTP
MTP // EEPROM
EEPROM
GPIO
GPIO
GPIO
GPIO
I2C
I2C
Audio
Audio
Sensor Subsystem
SRAM
SRAM
USB
USB 2.0
2.0 Host
Host
OTG
OTG w/
w/
Charge
Charge Detect
Detect
ARC EMxx
Sensor Subsystem
Sensor Subsystem
ARC
ARC EM
EM
Co-Processor
Co-Processor
ROM
ROM
SRAM
SRAM
ADC
ADC //
DAC
DAC // PWM
PWM
// Timers
Timers
Comparator
Comparator
Sensor
Sensor
ARC
ARC EM
EM Processor
Processor
SRAM
SRAM
ADC
ADC //
I2C
I2C
SPI
SPI
IP:
IP: Power,
Power,Audio,
Audio,Sensor
Sensor
180nm
some
130/110/90nm
180nm some 130/110/90nm
RTOS:
RTOS:None,
None,Limited
LimitedRTOS
RTOS
Tire
sensors,
accelerometers
Tire sensors, accelerometers
Comparator
Comparator
Smart Home/Building
Smart City
Portable
Medical
Laundry
HVAC
WildFire
Monitor
Earthquake
Monitor
Fitness
Monitors
Head Phones
Sprinkler
System
Garage Door
Flood / Water
Monitoring
Metering
Payment
Security
Access
Surveillance
Cameras
Security
Locks
Street
Lighting
Maintenance
Services
Beacons
Defacto
Standard
LTE-M
NB-IoT
LTE-M2
30
Mobile Phone
Integration
Relative
Power
(Tx/Rx)
1st Release
BLE
4.2
Security &
Internet
Connect
Health
Low
5.0
Mesh & Long
Range
Medium
802.11b
802.11g/a
802.11n
802.11ac
802.11ah* (900MHz)
High
LTE-M1
LTE-M2 /
NB-IoT
Requires
Custom Hub
31
Medium
/ Low
IPv6
Security
Home Automation
Low
Metering
Factory Automation
Energy Harvesting
* 802.11ah is new, may not be integrated into mobile
phone due to new radio requirements
Full qualification
Membership of Bluetooth SiG & Thread Group
32
5G for Cellular
AFE to support 5G applications.
Giga-SPS data converters, 28nm and below
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
33
34
Code size
Memory footprint, active memory power, I-cache miss rate
Data types
Fractional Q31, Q15
DSP instructions
MUL/MAC, Rounding & saturation. Vector operations, Complex, Single and dual accumulators
Improved latency and energy efficiency for Voice Control, Speech Playback,
Inertial sensor processing
2016 Synopsys, Inc.
35
36
Conclusions
XY option for higher DSP performance &
lower energy
1 MAC/cycle Performance: Area Sweet Spot
XY delivered highest performance within the rigid power/area constraints set by the
ARCv2EM Development
2016 Synopsys, Inc.
37
38
Address generation
Implicit loads
MAC operations
Rounding & saturation
1 x 32x32 MAC/cycle
2 x 16x16 MAC/cycle
EM5D / EM7D
EM4 / EM6
Address generation
Implicit loads
MAC operations
Rounding & saturation
EM9D / EM11D
with 32-bit XY
23x+
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
39
Bus-Free Subsystems
Leveraging Closely Coupled Memories and Peripherals
Bus-less
sensor
hub implementation
ARC + APEX
integrated
embedded
system
Removing the bus architecture reduces cycle count, area, and energy
40
Confidential
Data flow:
-Memory CPU Memory
-Fetching 1 data element takes 4 CPU
cycles
- Cycles:
- load, ahb, ahb, data, load,
ahb,
=15MHz
= 5MHz
41
=15MHz
= 5MHz
Data flow:
-Memory CPU Memory
-Fetching 1 data element takes 1 CPU
cycles
- Cycles:
- load, data/load, data/load,
- Improvement: 4 1 cycles
-Fetching 1 instruction takes 1 CPU
cycles
- Cycles:
- load, instr./load, instr./load
- Improvement : 5 1 cycles
-Area improvement:
- Instruction Fetch Unit (Queue)
42
Data flow :
-Sensing: IO Memory
-Comms: Memory IO
-Fetching 1 IO element takes 6 CPU
cycles
- Cycles:
- load, ahb, apb, apb, ahb,
data,
=15MHz
= 5MHz
43
44
45
APB
APB
Typical system would access memory and DMA over the Bus (higherPer1
energy)
Per1
ICCM
EM
EM DSP allows DMA to store data
in DCCM while
CPU
Memprocessor
DMAsleeps
uDMA
DSP
Per2
Per2
DMA wakes up processor when buffer is fullDCCM
with >70% energy saving
vs
LD/ST loop
After wake-up, processor hasAHB
immediate
energy)
I$/D$ access to data in DCCM (low
AHB
Per3
Per3
No energy spent in bus accesses
AHB
Lower latency processor can be set to run at lower frequency (saving power)
4x Faster
46
Benefits
Speed up code, algorithms, and
memory/peripheral accesses
Reduce code size, latency, memory area/cost
and power
47
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
48
Remote
communication
attack
Replace SW
in SoC
49
Escalate privilege
attack in device
ESSENTIA
L.
TEE
Software
TEE
Non-trusted
Apps
Trusted Apps
Platform Security
Non-trusted
Apps
Cryptography Library
tRoot Trusted
Apps & APIs
Rich OS
OS
Hardware
Security Protocol
Accelerators
Security Protocol
Accelerators
Cryptographic Cores
Microcontroller
SoC
CryptoPack
tRoot
Root of Trust
Security Modules
TRNGs
50
CPU
Microprocessor
SoC
Cryptographic Cores
TRNGs
Commit
Execute
IFQ
Divider
Interrupt
Controller
Secure MPU
Watchdog Timer
Secure Debug
TRNG Interface
NVM Interface
SEM110
SEM120D
51
ICCM/
DCCM
Agenda
The Swarm Around the Cloud A Connected Network
Powering The Swarm
IP Considerations for IoT
Configuring a processor to meet evolving requirements
Processor architecture techniques to increase energy efficiency
Security
Summary
2016 Synopsys, Inc.
52
Summary
IoT content is limited by our ability to dream applications and our ability to
reliably power them
10 Trillion sensors by 2032- most will be autonomous
Abundance of Energy source
Energy harvesting and energy storage are key
Balance between energy & power density in choice of optimal power storage medium
53
Thank You