当前位置:网站首页>10. Tencent cloud IOT device side learning - firmware upgrade
10. Tencent cloud IOT device side learning - firmware upgrade
2022-06-24 07:43:00 【fancyxu】
The main purpose of this series is to record the learning notes of Tencent cloud Internet of things device , And on the device side SDK Make a supplementary explanation .
brief introduction
Firmware upgrade is basically a necessary function of IOT devices , The firmware upgrade function is in IoT Hub and IoT Explorer All supported . In fact, it can be seen as two parts :
- Control messages : Interact with Tencent cloud IOT platform , This includes getting firmware download information , Realize the logic of interaction
- Firmware data : Interact with Tencent cloud object storage platform , Pull the actual firmware data
The general process is as follows :
Development considerations
Firmware upgrade is a very sensitive operation , To achieve a stable firmware upgrade, you generally need to do the following :
- Firmware verification : Developers need to verify the downloaded firmware on the device side ( Not only here md5 check , The equipment supplier's own calibration shall also be included , because md5 Only the correctness of the document can be guaranteed , There is no guarantee that the firmware itself is faulty ), To avoid accidents .
- Breakpoint continuation : For weak network scenarios or devices with large firmware , You need to do a good job of breakpoint continuation , Ensure the success rate of downloading , That is to save the breakpoint information in the corresponding storage after each download ( It's usually flash in , There are also placed in ram in , Only for breakpoints in the boot scenario ).SDK This feature is already supported .
- Firmware backup : Routinely , The firmware to be upgraded is stored in the backup area , When the equipment is powered on , Read the firmware from the backup area through the program to upgrade , Because the backup area is read-only , So even if there are abnormal conditions such as power failure in the midway , It can also ensure the availability of the equipment .
- Multi firmware : In fact, there is no essential difference between multi firmware and single firmware , Because the firmware upgrade is for files , Information can be added to the file to split a single file into multiple firmware . Of course , Another way is to use resources to download ( Subsequent articles will mention ), This is also one of the important features supported by Tencent cloud Internet of things .
边栏推荐
- Selector (>, ~, +, [])
- A summary of the posture of bouncing and forwarding around the firewall
- Tidb operator source code reading (IV) control cycle of components
- Win11 points how to divide disks? How to divide disks in win11 system?
- 图形技术之坐标转换
- Global and Chinese market of water massage column 2022-2028: Research Report on technology, participants, trends, market size and share
- 《canvas》之第1章 canvas概述
- 屏幕截图推荐—Snipaste
- 阿里云全链路数据治理
- opencvsharp二值图像反色
猜你喜欢
![选择器(>,~,+,[])](/img/7e/2becfcf7a7b2e743772deee5916caf.png)
选择器(>,~,+,[])

How to turn on win11 notebook power saving mode? How to open win11 computer power saving mode
![[mrctf2020] thousand layer routine](/img/8e/d7b6e7025b87ea0f43a6123760a113.png)
[mrctf2020] thousand layer routine

只显示两行,超出部分省略号显示

Only two lines are displayed, and the excess part is displayed with Ellipsis

Win10 build webservice

Ultra wideband pulse positioning scheme, UWB precise positioning technology, wireless indoor positioning application

How can win11 set the CPU performance to be fully turned on? How does win11cpu set high performance mode?

Blue Bridge Cup seven segment code (dfs/ shape pressing + parallel search)

How to open the soft keyboard in the computer, and how to open the soft keyboard in win10
随机推荐
RDD的执行原理
A case of bouncing around the system firewall
Anaconda 中使用 You Get
Counter attack from outsourcing to big factories! Android has been developed for 5 years, and after a year of dormancy, it has tried to become an offer harvester. Tencent has a fixed salary of 20*15
鸿蒙os开发三
Shell script for MySQL real-time synchronization of binlog
Only two lines are displayed, and the excess part is displayed with Ellipsis
Group policy disables command prompt bypass
bjdctf_ 2020_ babystack
Detailed explanation of PHP data serialization test example
UTC、GMT、CST
Tidb operator source code reading (IV) control cycle of components
Alibaba cloud full link data governance
屏幕截图推荐—Snipaste
Global and Chinese market of bed former 2022-2028: Research Report on technology, participants, trends, market size and share
10 common malware detection and analysis platforms
What is a CC attack? How to judge whether a website is attacked by CC? How to defend against CC attacks?
Knowledge points of 2022 system integration project management engineer examination: ITSS information technology service
Selector (>, ~, +, [])
How to realize multi protocol video capture and output in video surveillance system?