Embedded development learning is a continuous process of accumulation and summarization. Here are thirteen rules for embedded development learning summarized by a senior embedded development engineer; you may find them helpful:
I. Redundancy Rule
Once an embedded system has sufficient redundancy, the system's "initial sensitivity" has a negligible impact on its "final calculation result".
II. Real-time Law
The computational results of an embedded system depend not only on the correctness of the system's logical operations, but also on the computation time of those results.
III. The Law of Limited Resources
Embedded computing not only requires fast and consistent computation from the network, but also demands that the system be able to store its executable code and data in a “common” and “small” space in an orderly manner.
IV. Structural Laws
For embedded systems, the trend of structural complexity indicates that: a) the simpler the system structure, the more efficient it is (The [filtered] is the best); b) the more complex the system structure, the more stable it is (More complex is more stable).
V. Robustness Law
Embedded computing not only requires the system to perform calculations quickly and efficiently, but also requires the system to continue to operate normally even when some computing units malfunction.
VI. Conservation Law
If you want to preserve a certain system function in an embedded system, it is best to regard all other functions as "sacred and inviolable"; removing (extinct) or creating (intruding) a system function will inevitably cause a major change in the overall (cluster) structure and its dynamic performance.
VII. Organizational Principles
The most important aspect of the embedded Internet is often not the characteristics of individual devices within the network, but rather the overall order existing within the network—that is, network order. In a highly redundant network, the individual function of a device can no longer be the main factor affecting the overall system performance; instead, the main factor is the characteristics of all nodes and the connections they form.
VIII. The Laws of Network Sexuality
A network consisting of a group of interacting embedded Internet nodes often exhibits properties that are not significantly related to the properties of individual nodes. (Embedded technology training QQ: 754634522)
IX. The Law of Simplicity
When an embedded system is simplified, the interactions between the remaining functions of the system become stronger; when the system's functions are simplified, the probability of an external intruder succeeding becomes greater.
10. The Law of Immunity
The immune system of the embedded Internet should be a biomimetic mechanism. Immune function is a "feedforward" system, so the system should have predictive capabilities, so that it can "fight a large poison with a small one".
XI. The Law of Integration
Embedded Internet is a complex network. By analyzing the complex network structure using simple "components", the system can be interpreted as the "whole" by isolated "components", or the system can be expressed as the "global" by "nodes".
12. The Cost-Effectiveness Rule
If system A is an embedded system of system B, i.e., B(a), then the cost of system A should not exceed 10% of the cost of system B, while the cost of system B(a) should be greater than the sum of the costs of system A and system B, and the cost-effectiveness of system B(a) should be improved by 30%.
Thirteen, the Law of Message
Guaranteed Query Messages: These messages have strict time-sensitive or near-normal system operation requirements, demanding a time guarantee from the system. That is, once an activity or task triggered by this type of message is executed, its time constraint will be guaranteed by the system within a defined time interval. Optimal Performance Messages: These messages typically have soft time constraints, meaning their time constraints are determined by the time sequence of the activity or task itself, and their time constraint requirements can be met without system guarantees.
Disclaimer: This article is a reprint. If it involves copyright issues, please contact us promptly for deletion (QQ: 2737591964). We apologize for any inconvenience.