This commit is contained in:
2026-01-25 17:17:08 +01:00
parent edd3e96591
commit 0daead7821
21 changed files with 1636 additions and 11 deletions

View File

@@ -0,0 +1,36 @@
# 3. OTA Strategy
## Overview
Over-the-Air (OTA) updates are critical for maintaining and improving industrial devices in the field. The ASF strategy focuses on safety, reliability, and automatic recovery from failed updates.
## Partition Layout
For a device with **8MB of flash**, the following partition layout is recommended to support safe OTA updates:
| Partition | Size | Purpose |
| :--- | :--- | :--- |
| **bootloader** | - | Initial boot code |
| **partition_table** | - | Defines the flash layout |
| **factory** | - | Optional minimal rescue firmware |
| **ota_0** | 3.5 MB | Primary application slot |
| **ota_1** | 3.5 MB | Secondary application slot for updates |
| **nvs** | 64 KB | Encrypted Non-Volatile Storage for config |
| **phy_init** | - | Physical layer initialization data |
| **coredump** | 64 KB | Storage for crash logs and debugging |
## OTA Policy
A formal policy ensures that updates are downloaded correctly and that the system can roll back if the new firmware is unstable.
| Step | Rule |
| :--- | :--- |
| **Download** | Conducted via HTTPS or MQTT in chunks. |
| **Chunk Size** | 4096 bytes (optimized for flash page size). |
| **Integrity** | Verified using a full image SHA-256 hash. |
| **Validation** | System must boot and send a health report. |
| **Confirmation** | The application must confirm stability within 60 seconds. |
| **Failure** | Automatic rollback to the previous known-good version. |
### Closing the Gaps
This strategy directly addresses the following gaps:
* **GAP-OTA-001:** Reliable image delivery.
* **GAP-OTA-002:** Integrity and authenticity verification.
* **GAP-OTA-003:** Safe rollback mechanisms.