Embedded software for extreme requirementsPreprocess 20 Terabytes of Raw Data in the Satellite
From
| Translated by AI
4 min Reading Time
The preprocessing of large amounts of data on-site is not only a complex task for software systems. The required AI algorithms are supposed to work both on high-performance edge computing systems and on embedded platforms in satellites and ground stations.
Agent BigEarth is based on a novel combination of several AI modules working together as specialised subagents.
(Image: BIFOLD)
What used to run on mainframes often has to work on resource-constrained embedded platforms today: from AI inference in satellites to complex routing algorithms in network hardware. The question is how to optimise compute-intensive algorithms so that they function reliably even on embedded systems with limited computing power and energy budgets. Two current research projects at TU Berlin demonstrate exemplary solution approaches.
Prof. Dr. Begüm Demir, head of the Remote Sensing Department and research group leader at BIFOLD (Berlin Institute for the Foundations of Learning and Data) at TU Berlin, as well as Prof. Dr. Stefan Schmid, head of the Internet Architecture and Management Department, each won one of the prestigious Proof of Concept Grants from the European Research Council (ERC). These grants bridge the gap between fundamental research and practical application, contributing to the translation of groundbreaking research results into concrete societal or economic benefits.
Both projects pose special challenges for embedded software development: the development of a digital, AI-supported assistant requires the optimisation of complex algorithms for resource-constrained embedded platforms, while automated tools for resilient communication networks demand real-time capable embedded networking software. Each of the grants is endowed with €150,000 (approx. 178,000 USD).
AI inference at the edge for satellite data
With the AI agent Agent BigEarth planned by Begüm Demir, the use of satellite data is reaching a turning point. At the same time, it poses a complex embedded software challenge. The BIFOLD scientists aim to develop Agent BigEarth to make large volumes of complex satellite data accessible not only to experts but also to interested laypeople. Particularly demanding: the AI modules should function on both high-performance edge computing systems and embedded platforms in satellites and ground stations.
Copernicus delivers around 20 terabytes of high-resolution Earth observation data daily with its Sentinel satellites. These massive data volumes require highly optimised embedded software for preprocessing directly on the satellite itself, as a complete transmission to Earth is not practical. The challenge for embedded developers: AI algorithms must run on ARM-based satellite computers with severely limited resources (power consumption, memory, computing power).
Europe’s security landscape is changing rapidly
(Source: VCG)
As defence budgets rise and EU programmes expand, civil technology providers are becoming vital contributors to Europe’s strategic autonomy. The event will act as a neutral platform for dialogue between technology suppliers, integrators, and decision-makers shaping the next generation of European defence capabilities and aims to open doors between civil industry and defence procurement, providing practical insights.
Technically, Agent BigEarth is based on a novel combination of multiple AI modules that collaborate as specialised subagents. This is also referred to as a classic embedded architecture pattern. The individual modules take on different tasks and are implemented as separate tasks or threads, coordinated via inter-process communication (IPC). A central control element functions as a real-time scheduler, coordinating operations and ensuring that complex requests are processed even under strict real-time requirements.
Embedded-specific challenges:
Memory Management: Efficient memory management for large image data.
Power Optimisation: Adaptive algorithms based on available satellite energy.
Fault Tolerance: Robust software for the harsh space environment.
Real-Time Constraints: Deterministic response times for time-critical Earth observation.
"If the implementation succeeds, Agent BigEarth could take a pioneering role for Europe in AI-supported environmental information," says Begüm Demir. Particularly interesting for embedded developers: The developed optimisation techniques can be applied to other resource-constrained AI applications.
Embedded networking under extreme conditions
Communication networks are a critical infrastructure of our digital society, whose embedded software components must operate under the toughest demands. In large networks, it is unavoidable that connections between network nodes fail. In such cases, the embedded routing software must find and configure alternative paths within microseconds. However, configuring these rerouting mechanisms is extremely complex and error-prone, as the embedded network processors only have a local view of the entire system.
With his ERC Proof of Concept Grant, Stefan Schmid is developing automated software tools that run directly on embedded network processing units and SDN controllers. These tools enhance the resilience of rerouting mechanisms against the simultaneous failure of multiple connections while meeting strict real-time constraints.
Recursive algorithms for embedded network processors
A link failure can result in communication traffic initially being redirected in another direction, away from the actual destination. Such rerouting can be recursive. On the alternative backup path, another link failure may require finding yet another alternative path.
(Image: Stefan Schmid)
The software tools are based on a recursive approach: similar to a back-pass play in football, embedded routing algorithms initially transport data packets in a different direction if all direct connections to the destination have failed. The particular challenge: these decisions must be made by distributed embedded systems in real time, without a global network view.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
Embedded software requirements:
Deterministic Execution: Routing decisions within guaranteed time windows.
Memory-Efficient Data Structures: Optimised routing tables for embedded RAM.
Distributed Coordination: Synchronisation between embedded network nodes without a central instance.
Fault-Tolerant Programming: Software must function even in the event of partial hardware failures.
The working group of Professor Schmid is also cooperating with that of Prof. Dr. Jiri Srba from Aalborg University in Denmark and is developing implementations specifically optimised for embedded network hardware.
Simulation and verification on embedded target platforms
The approach also enables efficient "what-if analyses" directly on the embedded target platforms: a system operator can verify through such in-system simulations whether a current network configuration would function even in case of failures, without endangering the productive system. "Our development will provide the concrete foundation for application-ready software that could be immediately deployed on existing embedded hardware," says Stefan Schmid.
Conclusion: Both projects exemplify how complex algorithms and AI systems can be implemented on resource-constrained systems through smart embedded software architectures: from satellite computers to network processors. (heh)