element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Single-Board Computers
  • Products
  • Dev Tools
  • Single-Board Computers
  • More
  • Cancel
Single-Board Computers
Forum Wanted: sub-$10 *networked* boards
  • Blog
  • Forum
  • Documents
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Single-Board Computers to participate - click to join for free!
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • Replies 25 replies
  • Subscribers 60 subscribers
  • Views 1884 views
  • Users 0 members are here
  • discovery
  • freescale
  • $10
  • networking
  • iot
  • st
  • launchpad
  • freedom
  • ti
Related

Wanted: sub-$10 *networked* boards

morgaine
morgaine over 11 years ago

The early part of this decade witnessed the rise of a new commercial phenomenon, the bringing to market of many sub-$10 evaluation, prototyping and hobbyist boards.  Although the terminology and market positioning has varied depending on the company, they're really all the same thing --- boards for enthusiasts, which serve the purposes of industrial evaluation equally well and also play a valuable company PR and device promotion role.  It's all one category really, and it's very sensible to roll these diverse purposes into one because of economies of scale, inventory reduction, and audience synergy.

 

Probably the greatest mindshare in this $10 (ballpark) area has been obtained by three companies so far:

 

  • Freescale with its Freedom boards FRDM-KL25Z and FRDM-KL46Z, featuring low-power Cortex-M0+.
  • ST with its STM32Fx-Discovery range, often given away free, featuring high performance Cortex-M4.
  • TI with its LaunchPad ranges, covering MSP430 (low power), C2000 (DSP), and Tiva/Hercules (ARM).

 

These devices are all, to summarize the $10 scene in a word, awesome. image  And that's probably understating it.

 

However, there is something missing from this excellent picture.  It's a very important thing, and it's very bad that it is missing:  networking.  This new millennium was built on a solid foundation of networking created in the latter part of the preceding one.  IP networking has so permeated our civilization today that its absence is as inconceivable as life without the telephone would have been in the preceding decades.  And yet despite this, the above three pillars of awesomeness live on isolated islands of non-communication.

 

Yes I know, it's quite easy to integrate them into an IP network, either through USB-based NICs or wifi adapters or using a small I2C-connected Ethernet or wifi board, or even Bluetooth or NFC, or even using SLIP over RS232 from days gone by.  But that's not the point.  The point is that they are not inherently connected, and so they have to be brought in from the cold.  This is more regrettable than it appears at first glance for several reasons.  It's a barrier to instant networking, it costs a lot more (there's a dollar penalty owing to unnecessary overheads), networking is not directly supported in the otherwise-awesome board's software, the add-ons dilute the manufacturer's own device promotion, and to be blunt, it's just annoying and not forward-looking.

 

I would recommend to manufacturers in this $10 (ballpark) space that 2014 be their year for networking everything in sight.  There's even a marketing angle for it --- the Internet of Things has acquired quite a lot of meme-space recently, and it's always a better idea to ride a wave rather than to stand in its way.  Sub-$10 networked boards would be extraordinarily synergistic to the IoT concept --- it shouldn't surprise anyone if hundreds of millions of a single board are sold, because $10 falls wells under the price-worry radar in the West at least.  I suspect the main limitation on sales would be effectiveness of promotion/advertising producing awareness, and not the price.

 

Come on Freescale, ST and TI (strictly in alphabetical order), add networking into this extremely cost-constrained niche, even if it's only 10Mbps.  You can do it.  And the rest of you manufacturers, don't worry about the incumbents ruling the roost.  Word of mouth and reblogging is the primary form of advertising today (I'm even doing it right here), and if you provide the goods, we'll spread the interest.

 

Morgaine.

  • Sign in to reply
  • Cancel

Top Replies

  • morgaine
    morgaine over 11 years ago in reply to johnbeetem +1
    John Beetem wrote: Morgaine Dinova wrote: Yes you do! Oh no, I don't Touche'! < Rest of infinite-length cultural exchange elided through Run-Length Encoding. > There are two kinds of…
  • Former Member
    Former Member over 11 years ago in reply to morgaine +1
    Morgaine Dinova wrote: Your TV and TV usage would benefit enormously from full-capability IP networking. Actually it would be highly detrimental. As it would require owning a TV to begin with …
  • Former Member
    Former Member over 11 years ago in reply to morgaine +1
    Morgaine Dinova wrote: There are in the universe these beings called "engineers", and they're not all stupid. In fact, many of them can focus on issues very clearly and ensure that certain requirements…
Parents
  • johnbeetem
    johnbeetem over 11 years ago

    USB hardware is very cheap (no magnetics, low power) and usually present all but the cheapest SoCs, so why not do IP over USB directly without messing around with Ethernet?  With 10baseT and higher you need an Ethernet hub or switch anyway, and you could fairly easily make an IPoUSB bridge/router that has a bunch of USB host ports to connect to your devices plus an Ethernet up-link.  The b/router would perform the polling needed to see if devices have upstream IP packets.

     

    I thought something like this might be a nice way to network a classroom filled with RasPi Model A boards.

     

    I've heard lots of talk about the Internet of Digital Things (IDioT), but I haven't seen standards or chips for handling the 'torking (my first neologism for 2014, an abbreviation of "networking" based on its common Internet mis-spelling "newtorking").

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • morgaine
    morgaine over 11 years ago in reply to johnbeetem

    Regarding Internet of Things, stripping off all the frills and hype and decoration (we're pretty immune to hype anyway here, fingers crossed), it's just IPv6 on everything at extremely low cost through integration.  Viewed that way, IoT documentation is already 100%.  (IoT organizations typically push IoT middleware, but that's actually just decoration around what is no more than plain IP.)

     

    Note: IoT on IPv4 is just a wave to the past so that the poor old 98% of IP users don't feel too disenfranchised. image

     

    Note that my $10 goal doesn't come even close to embracing IoT in a proper way.  The aim should be sub-$1 if networking is to be omnipresent in everything that isn't by design isolated permanently.  (There are many extremely important applications where such isolation by design is important, indeed crucial, particularly in this post-Snowden era).  Sub-$1 IoT devices are perfectly possible even today, given that many microcontroller families have members that cost a fraction of a dollar.  But for 2014, I'm happy to aim towards just the relatively unambitious $10 niche.

     

    So, don't get hung up by IoT vendor machinations and nods to the past.  It's just highly integrated IPv6.

     

    Morgaine.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • johnbeetem
    johnbeetem over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

     

    John Beetem wrote:

     

    I absolutely don't want my TV, my car, my bicycle, my furnace, my cats, my glasses, or my wristwatch networked to anything.

    Yes you do! 

    In the spirit of the holiday pantomime, I will reply: Oh no, I don't (with children's chorus).

     

    While I appreciate your reply -- and expected some of the arguments -- my philosophy regarding networking is this:

    There are two kinds of devices: isolated devices and hackable devices.

    I don't want any of the items in my list to be hackable.  I don't want hackers monitoring what I'm watching on TV, I don't want hackers to steal my car using a smart phone, I don't want hackers to use a defect in my furnace's software to blow up my house, I don't want anyone seeing what I'm seeing through my glasses, and I don't want my wristwatch watching me.  I'm perfectly happy with the function of those items of technology as they are -- except that I'd prefer an electric car, but I'm only 8 years into my current car so I'll have to wait another 7 years or so.  Networking them adds worry and no benefit.

     

    In case you're wondering: no, I don't have a cell phone.  Neither does RMS.  Also, my TV/DVD remotes work fine.  Since I've actually used a "tuning fork" remote (it was pretty cool to an approx-8-year-old) I don't find current ones all that primitive image

     

    JMO/YMMV

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • morgaine
    morgaine over 11 years ago in reply to johnbeetem

    John Beetem wrote:

    Morgaine Dinova wrote:

     

    Yes you do! 

    Oh no, I don't

    Touche'! imageimage

     

    < Rest of infinite-length cultural exchange elided through Run-Length Encoding. image >

     

    There are two kinds of devices: isolated devices and hackable devices.

     

    That's actually very accurate, and insightful.

     

    But wait, what's an "isolated" device?  The NSA is crossing air gaps these days with quite awesome (in the sense of "psychopathic") side-channel attacks.  We're going to have to modify your observation just a little:

    There are two kinds of devices: output-only devices and hackable devices.

    (Fully isolated devices aren't actually in your universe, so we needed to make the tenet more useful.)

     

    This shackles us a bit, umph!  (And I'm not yet ready to deal with the related reports of SoC hardware containing hacks or deliberate weakening of security at gate level, which may reduce everything to "hackable".  Yes, we have to deal with this issue, but one thing at a time.)

     

    Output-only isn't a complete barrier to powerful networking, it just requires understanding that protocol data received back during a protocol exchange doesn't need to feed back to the source of the payload.  As an example from years gone by, when a DTE receives CTS from a DCE to indicate that it can send the DCE data, the CTS clearly has limited potential to affect the payload because RTS/CTS is side-channel signaling.  This continues to be true when in-channel flow-control is used and a stop byte is sent back from the DCE to hold off DTE transmission -- the start/stop machinery can be completely separate from the source of the data, and hence intrinsically isolated from operation of the DTE equipment.  It's true that the messaging can be subverted by MITM or other means so that the external world sees the wrong information, but at least your networked but output-only furnace won't be told to burn your house to the ground.

     

    Exactly the same is true in an IP instead of RS232 scenario.

     

    Moving to the case of bidirectional monitoring and full control, the situation isn't as bleak as it might seem from the unfortunately true observation that "everything connected is hackable".  There are in the universe these beings called "engineers", and they're not all stupid.  In fact, many of them can focus on issues very clearly and ensure that certain requirements are met, provably so, such as isolation requirements at one level despite equipment being connected at a lower level.  And yeah, that's what we're here for, to safeguard the world from itself.

     

    There's a lot to be said for caution, especially after a very worrying 2013, but I think we're very far away from giving up and admitting defeat just because there are bad people out there wanting to subvert our equipment.  It's an arms race, I agree, but with good design and avoiding development that blindly embraces "cool", we aren't yet bludgeoned into a corner of hopelessness.

     

    Morgaine.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • Former Member
    Former Member over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

    • Your TV and TV usage would benefit enormously from full-capability IP networking.

    Actually it would be highly detrimental. As it would require owning a TV to begin with image

    • Your central heating furnace can work far more efficiently when networked to sensors throughout the house, and even more efficiently when it can control radiators and hot air ducts to direct heat where needed.  In fact it's always connected to at least one thermostat if it was manufactured in the last millennium, and IP networking just adds greater capability to it, for your benefit.

    While I might agree in principle that it would be useful to have heating networked to various sensors in order to make things more efficient, I most certainly want that network fully isolated from everything else, especially the internet.  The idea that someone could compromise the system, turn the heating off causing burst pipes and all sorts of damage isn't a good one. Equally someone could turn it on causing large and unwanted energy bills.

    There's a range of other similar things where the idea of networking is really good, but the likely abuse of that capability is a problem.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • Former Member
    Former Member over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

    There are in the universe these beings called "engineers", and they're not all stupid.  In fact, many of them can focus on issues very clearly and ensure that certain requirements are met, provably so, such as isolation requirements at one level despite equipment being connected at a lower level.  And yeah, that's what we're here for, to safeguard the world from itself.

    From an engineering perspective I agree. Unfortunately engineers are regularly overruled for 'business' reasons, or simply not given the time/budget to do the right thing, or even forced to implement requirements that are detrimental to the end users security/privacy.

    Then there's the problem of governments deliberately subverting things which is difficult to deal with.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • morgaine
    morgaine over 11 years ago in reply to Former Member

    Agreed on all points.  Indeed I mentioned every single one earlier.

     

    But don't throw the baby out with the bathwater.  Network defeatism isn't called for yet.  There's a lot that good engineers can do to reduce risks to almost nothing through effective design with security as a #1 requirement.  The main difficulty may be to summon up the courage to tell management that no, low-cost insecure crap and wishful thinking is not a design option for us.  Yes, it can have a personal cost, but knowingly doing wrong does as well.

     

    Morgaine.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • johnbeetem
    johnbeetem over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

     

    The main difficulty may be to summon up the courage to tell management that no, low-cost insecure crap and wishful thinking is not a design option for us.  Yes, it can have a personal cost, but knowingly doing wrong does as well.

    One disagreement I had with management at one of my favorite jobs was that he wanted to toss out our in-house software, for which we had full source code and institutional knowledge, and replace it with a standard RTOS and purchased comm stacks.  The salesmen of said products assured him that it was trivial to merge them into our product.  I managed to stave off this catastrophe while I was with the company, but when I left to try some new things they went with the RTOS plus purchased stacks and a few years later actually had it working image

     

    However, usually management wins the battle right away and you're stuck with a purchased product with opaque stacks.  Go try to find the security flaws in those suckers, even if you have the 3 million lines of source code.

     

    Regarding provability of software: good luck.  I took John McCarthy's Recursive Programming and Proving course at Stanford (though not from Dr. McCarthy himself).  One of the nastiest assignments was proving that two versions of a simple list reverse function were equivalent.  I suppose software proving has improved a little since then, but the cleverness of hackers has improved much more from what I can tell.  JMO/YMMV

     

    I've always enjoyed reading "locked room" mysteries, where the victim has apparently committed suicide in a room locked from the inside.  However, it's always a case of murder, a fiendishly clever murder, and there's always a physical opening somewhere.  It's not a truly "locked room" unless there is no opening whatsoever, no matter how small.  The master of these mysteries is John Dickson Carr, who also wrote as Carter Dickson.

     

    Using the same cleverness, a hacker can get in though amazing openings.  But there's no reason to leave doors and windows wide open.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • morgaine
    morgaine over 11 years ago in reply to johnbeetem

    Haha, indeed.  Alas, managers are often easily deceived by snake oil merchants, especially those that say "Just pay us X and we'll handle all your problems".  Also, the prospect of blaming an external third party is very enticing compared to accepting that your own team is at fault and that therefore you carry part of the blame.  As a contractor, I've met so many different managers that I recognize that there is no simple reason for management "doing the wrong thing", and they're certainly not all clueless.  Some are extremely alert, well informed and very reasonable, and still do the wrong thing ("wrong" meaning that something or someone is harmed, unnecessarily).  It's complex.

     

    John Beetem wrote:

     

    Regarding provability of software: good luck.

    Oh I know! image  I taught EE final years Software Engineering, and I tried to highlight the (very severe!) limits of our capability, and the fact that there is no silver bullet so a defensive approach is needed at every step.  Engineers seem to understand this intrinsically anyway, possibly because error detection, negative feedback and correction are so engrained in the engineering psyche.  CompSci students have less of this worldview --- it's not quite as bad as "if it compiles, it'll work", but there is an element of uncalled-for optimism there.  Z and VDM may have increased that fantasy a while ago, but not in my class. image

     

    But by the same token, there are very good if slightly tarnished bullets of commonsense, and it's trivial to prove mathematically in one line that hacked state X and equipment state Y are disjoint when there is no path between them.  Of course this just passes the buck to the premise, but if that's "obvious" by inspection then commonsense wins.  I'm not defeatist on this at all, because all that's needed is to raise the stakes into "highly unlikely" territory.  It's something that cryptographers don't appreciate being pointed out, but cryptographic security is just security by obscurity with a very low probability of hitting gold by guessing because the space is so large.  It's not intrinsically more secure than obscurity, but just stacks the odds extremely highly in our favour ... as long as you're not using an NSA-endorsed random number generator.

     

    Using the same cleverness, a hacker can get in though amazing openings.  But there's no reason to leave doors and windows wide open.

     

    +1.

     

    Morgaine.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Cancel
  • Former Member
    Former Member over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

     

    but cryptographic security is just security by obscurity with a very low probability of hitting gold by guessing because the space is so large.  It's not intrinsically more secure than obscurity, but just stacks the odds extremely highly in our favour

    cryptography is Snake Oil..  Even if you can prove the cryptography itself is sound, there's always a 'management' decision lurking in the wings that renders it moot.  Debian ssh key problems, WPS, MD5 collisions, RSA weaknesses, Virtual machine cache timing side channel attacks to recover private keys from a different VM on the same physical hardware.  History is littered with the failures.

    Ultimately it's the illusion of security that it provides that's a problem. People assume they're safe

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • morgaine
    morgaine over 11 years ago in reply to Former Member

    selsinork wrote:

     

    cryptography is Snake Oil.

     

    I know what you mean, but careful with putting it just that bluntly because those who don't know the details might think you mean that crypto doesn't work as advertised, and then they won't use it and chaos will ensue.  It's exactly as you say though, that side channels and poor key management and bad policies (and NSA shenanigans) can undermine the properly working crypto.

     

    Ultimately it's the illusion of security that it provides that's a problem. People assume they're safe

     

    It's what Schneier meant when he said that you can't buy security, because it's a process.  Unless you go through the process diligently, all you have is an illusion of security.

     

    Morgaine.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
  • Former Member
    Former Member over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

     

    I know what you mean, but careful with putting it just that bluntly because those who don't know the details

    People don't know the details, mostly they don't care either, they see a padlock in the browser and have been trained to associate that with an idea. Whether the idea is true or not isn't relevant.

    Even the most superficial look at the details is troubling.

    Of course none of that means cryptography is worthless. But does mean that people need to be aware of the pros and cons and understand at least some of the details.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
Reply
  • Former Member
    Former Member over 11 years ago in reply to morgaine

    Morgaine Dinova wrote:

     

    I know what you mean, but careful with putting it just that bluntly because those who don't know the details

    People don't know the details, mostly they don't care either, they see a padlock in the browser and have been trained to associate that with an idea. Whether the idea is true or not isn't relevant.

    Even the most superficial look at the details is troubling.

    Of course none of that means cryptography is worthless. But does mean that people need to be aware of the pros and cons and understand at least some of the details.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Cancel
Children
No Data
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube