Assignment Set I
Assignment Set I
2. What is an actuator? Give a brief description of the working principle of the Microphone.How
it can convert sound energy to electrical energy?
Microphones work as transducers, converting sound waves (mechanical wave energy) into audio
signals (electrical energy). The microphone diaphragm vibrates as it's subjected to sound waves
and creates a coinciding audio signal via electromagnetic or electrostatic principles that will be
outputted.
Sound energy is converted to electrical energy by the application of electromagnetic induction.
The sound waves impose pressure on the conductor that pinches the conductor to generate electric
current. The vibration produced by the sound waves oscillates the molecules back and forth and the
mobility of charges generated electricity.
The possible need for the embedded product may come from the manufacturer, or even
customers, in how they think the larger product should work. Engineers will want to brainstorm
how the embedded product could work and the benefits it would bring. They will also want to get a
sense of the price customers or manufacturers will pay for the embedded product.
Engineers will determine everything the product needs to work as intended. Questions they’ll ask
include: What functions does it need to complete? What are size, weight, and cost limits? They will
also need to decide the specific hardware the product will use.
Engineers should create a document detailing the technical specifications for the product. Those will
include functions the product must complete, environmental conditions and manufacturing
requirements, among other things.
Some embedded products require simple displays to give users information about it's operation. As
part of assessing a product's specifications, engineers will want to determine whether the product
needs a user display. If required, you'll need to design a graphical user interface.
Develop a prototype
At this point, it’s useful to build a basic prototype to assess the hardware, identify necessary
components, and how they might work together.
During this step, engineers design the overall architecture on which the product will work. Questions
they’ll address include:
Attack replication
As embedded devices are mass produced, the same version of devices have the same design and
built as other devices in the lot. Considering this, there will be millions of identical embedded
devices. If someone is able to successfully hack any of the devices from the lot, the attack can be
easily replicated across the rest of the devices.
Dependability
Many critical aspects such as utility grids, transportation infrastructure, and communication
systems are controlled by embedded systems. The modern society relies upon several facilities,
many of them, in turn, rely on embedded devices. Cyberattacks would lead to an interruption in
the functioning of embedded systems, which may have some catastrophic consequences.
Embedded devices have a much longer lifespan as compared to PCs. One can easily spot embedded
devices in the field that are a decade old, still running on the same system. So, when a
manufacturer plans to develop an embedded system, they need to consider the potential threats
that may arise in the next two decades. On top of developing a system that is secure against
current threats, manufacturers need to match the security requirements of the future, which is a
great challenge in itself.
Industrial protocols
Embedded systems follow some set of industrial protocols that are not protected or recognized by
enterprise security tools. Enterprise intrusion detection system and firewalls can save the
organizations from enterprise specific threats, but are not capable of providing security against
industrial protocol attacks.
Remote deployment
Numerous embedded devices are deployed in the field, outside the enterprise security perimeter.
Therefore, these remote or mobile devices may be directly connected to the internet, without the
security layers provided in the corporate environment.
All the above-mentioned challenges need to be addressed during the embedded device design and
development, considering both hardware and firmware aspects. Only if the embedded device is
secure, it will be able to run the intended tasks.
Wrapping Up
The question isn’t if an embedded device is secure, the question is if an embedded device is secure
enough. Different embedded devices require a different level of security, depending on the function it
carries out.
The level of embedded security needs to be considered in the early phase of device design. Instead of
relying on the enterprise security tools, embedded devices should come with a security system, so they
can stand up against threats even outside the enterprise security perimeter.
eInfochips has a vast experience in creating secure and robust embedded devices. For developing a
secure embedded system for your business, contact our team.
A COTS product is usually a computer hardware or software product tailored for specific uses and
made available to the general public. Such products are designed to be readily available and user
friendly. A typical example of a COTS product is Microsoft Office or antivirus software. A COTS
product is generally any product available off-the-shelf and not requiring custom development
before installation.
Compared to COTS, a custom designed product is typically more expensive and not as dependable.
This is because the product is industrialized from scratch in minimal time with a limited budget.
COTS that is modified by a purchaser, vendor or other party to meet customer requirements
become modified off-the-shelf (MOTS). Generally once a COT is modified, it is the responsibility of
the consumer to manage changes to the product.
6. Classify different embedded systems.
7. Briefly describe with examples small-scale, medium scale and large-scale embedded
systems.
11. Within the domain of an embedded system, they have many functionalities. Explain with
examples.
12. What are the different data communication methods used in embedded systems?
Briefly describe.
13. Explain the current trends and challenges in the field of
embedded systems.
16 . With a neat diagram explain the architecture of 8051.
CPU (Central Processing Unit): CPU act as a mind of any processing machine. It synchronizes and
manages all processes that are carried out in microcontroller. User has no power to control the
functioning of CPU. It interprets the program stored in ROM and carries out from storage and then
performs it projected duty. CPU manage the different types of registers available in 8051
microcontroller.
Interrupts: Interrupts is a sub-routine call that given by the microcontroller when some other program
with high priority is request for acquiring the system buses the n interrupts occur in current running
program.
Memory: For operation Micro-controller required a program. This program guides the microcontroller
to perform the specific tasks. This program installed in microcontroller required some on chip memory
for the storage of the program.
Microcontroller also required memory for storage of data and operands for the short duration. In
microcontroller 8051 there is code or program memory of 4 KB that is it has 4 KB ROM and it also
comprise of data memory (RAM) of 128 bytes.
Bus : Bus is a group of wires which uses as a communication canal or acts as means of data transfer.
The different bus configuration includes 8, 16 or more cables. Therefore, a bus can bear 8 bits, 16 bits
all together.
It can be treated as CCD sensor, which is used in the digital and video cameras for taking images and
recording videos through photoelectric effect. It is used for converting the captured light into digital
data, which is recorded by the camera.
It can be defined as a light-sensitive integrated circuit imprinted on a silicon surface to form light-
sensitive elements called pixels, and each pixel is converted into an electrical charge.
It is termed as a discrete-time device used for continuous or analog signal sampling at discrete
times.
c) Cache memory and Cache controller
d) Cache Memory is a special very high-speed memory. It is used to speed up and synchronizing
with high-speed CPU. Cache memory is costlier than main memory or disk memory but
economical than CPU registers. Cache memory is an extremely fast memory type that acts as a
buffer between RAM and the CPU. It holds frequently requested data and instructions so that
they are immediately available to the CPU when needed.
e) Cache memory is used to reduce the average time to access data from the Main memory. The
cache is a smaller and faster memory which stores copies of the data from frequently used main
memory locations. There are various different independent caches in a CPU, which store
instructions and data.
f) FPGA
e)UART
f) JTAG
18. What are the types of Embedded Systems?
19. What is an actuator? Give a brief description of the working principle of the Microphone.How it
can convert sound energy to electrical energy?
20.Write short notes on RFID and RTC.
21. How does DSP differ from a general processor?
It accomplishes this task by requiring it be serviced/reset periodically, before its timer expires,
otherwise known as "kicking the dog."
If the watchdog timer does expire, the entire system is then reset, which in turn, at least momentarily,
removes the system from the state of software or hardware fault.
On the other hand, a standard hardware timer is typically employed to accomplish a myriad of other
system tasks.
It too can be loaded with a predetermined value which when incremented by a predetermined clock
source, eventual rolls over to zero, raising a flag.
The flag can in turn be polled or configured to trigger an interrupt which in turn can run an interrupt
service routine (ISR) to perform a specific periodic task.
A standard hardware timer can often be utilized to count the occurrence of a specific event or record
the duration of time between the occurrence of events.
23. Define embedded systems.
As its name suggests, Embedded means something that is attached to another thing. An embedded
system can be thought of as a computer hardware system having software embedded in it. An
embedded system can be an independent system or it can be a part of a large system. An embedded
system is a microcontroller or microprocessor based system which is designed to perform a specific
task. For example, a fire alarm is an embedded system; it will sense only smoke.
An embedded system has three components −
• It has hardware.
• It has application software.
• It has Real Time Operating system (RTOS) that supervises the application software and
provide mechanism to let the processor run a process as per scheduling by following a
plan to control the latencies. RTOS defines the way the system works. It sets the rules
during the execution of application program. A small scale embedded system may not
have RTOS.
So we can define an embedded system as a Microcontroller based, software driven, reliable, real-time
control system.
Characteristics of an Embedded System
• Single-functioned − An embedded system usually performs a specialized operation and
does the same repeatedly. For example: A pager always functions as a pager.
• Tightly constrained − All computing systems have constraints on design metrics, but
those on an embedded system can be especially tight. Design metrics is a measure of
an implementation's features such as its cost, size, power, and performance. It must be
of a size to fit on a single chip, must perform fast enough to process data in real time
and consume minimum power to extend battery life.
• Reactive and Real time − Many embedded systems must continually react to changes
in the system's environment and must compute certain results in real time without any
delay. Consider an example of a car cruise controller; it continually monitors and reacts
to speed and brake sensors. It must compute acceleration or de-accelerations
repeatedly within a limited time; a delayed computation can result in failure to control
of the car.
• Microprocessors based − It must be microprocessor or microcontroller based.
• Memory − It must have a memory, as its software usually embeds in ROM. It does not
need any secondary memories in the computer.
• Connected − It must have connected peripherals to connect input and output devices.
• HW-SW systems − Software is used for more features and flexibility. Hardware is used
for performance and security.
Advantages
• Easily Customizable
• Low power consumption
• Low cost
• Enhanced performance
Disadvantages
• High development effort
• Larger time to market
Basic Structure of an Embedded System
The following illustration shows the basic structure of an embedded system −
• Sensor − It measures the physical quantity and converts it to an electrical signal which
can be read by an observer or by any electronic instrument like an A2D converter. A
sensor stores the measured quantity to the memory.
• A-D Converter − An analog-to-digital converter converts the analog signal sent by the
sensor into a digital signal.
• Processor & ASICs − Processors process the data to measure the output and store it to
the memory.
• D-A Converter − A digital-to-analog converter converts the digital data fed by the
processor to analog data
• Actuator − An actuator compares the output given by the D-A Converter to the actual
(expected) output stored in it and stores the approved output.
Same physical memory address is used for Separate physical memory address is used for
instructions and data. instructions and data.
There is common bus for data and instruction Separate buses are used for transferring data and
transfer. instruction.
CPU can not access instructions and read/write at CPU can access instructions and read/write at the
the same time. same time.
It is used in personal computers and small It is used in micro controllers and signal
computers. processing.
25. Explain FPGA architecture with a proper diagram.
Field Programmable Gate Array (FPGA) is an integrated circuit that consists of internal
hardware blocks with user-programmable interconnects to customize operation for a specific
application. The interconnects can readily be reprogrammed, allowing an FPGA to
accommodate changes to a design or even support a new application during the lifetime of
the part.
FPGA Architecture
Depending on the manufacturer, the CLB may also be referred to as a logic block (LB), a logic
element (LE) or a logic cell (LC).
An individual CLB (Figure 2) is made up of several logic blocks. A lookup table (LUT) is a
characteristic feature of an FPGA. An LUT stores a predefined list of logic outputs for any
combination of inputs: LUTs with four to six input bits are widely used. Standard logic functions
such as multiplexers (mux), full adders (FAs) and flip-flops are also common.
Figure 2: A simplified CLB: The four-input LUT is formed from two three-input units. (Image
source: Wikipedia)
The number and arrangement of components in the CLB varies by device; the simplified
example in Figure 2 contains two three-input LUTs (1), an FA (3) and a D-type flip-flop (5), plus
a standard mux (2) and two muxes, (4) and (6), that are configured during FPGA programming.
This simplified CLB has two modes of operation. In normal mode, the LUTs are combined with
Mux 2 to form a four-input LUT; in arithmetic mode, the LUT outputs are fed as inputs to the FA
together with a carry input from another CLB. Mux 4 selects between the FA output or the LUT
output. Mux 6 determines whether the operation is asynchronous or synchronized to the FPGA
clock via the D flip-flop.
Current-generation FPGAs include more complex CLBs capable of multiple operations with a
single block; CLBs can combine for more complex operations such as multipliers, registers,
counters and even digital signal processing (DSP) functions.
27. Explain the functionalities of RS232 and RS485 standard serial interfaces.
28. Explain sensors and actuators with examples.
Ans:-
Sensor:-
Embedded sensors are actually part of embedded computers placed in the physical real world that
interact with the surrounding environment. With modern hardware advances in sensors and
software components, embedded sensors are an active and growing area of embedded
computing, and one can witness their expanding applications in many areas.
For example, embedded sensor module MICA2 Mote is a popular wireless measurement system
used for enabling low-power, wireless sensor networks. It supports 868/916MHz, 433/315MHz
multi-channel transceivers with extended range. It can be interfaced to measure light,
temperature, RH, barometric pressure, acceleration/seismic, acoustic, magnetic and other
parameters.
Actuators:-
An actuator is a component of a machine that is responsible for moving and controlling a
mechanism or system, for example by opening a valve. In simple terms, it is a "mover". An
actuator requires a control device (controlled by control signal) and a source of energy.
29. Write short notes on USB and SOC ( System on chip).
Universal Serial Bus (USB) is an industry-standard that establishes specifications for connectors,
cables, and protocols for communication, connection, and power supply between personal
computers and their peripheral devices. There have been 3 generations of USB specifications:
1. USB 1.x
2. USB 2.0
3. USB 3.x
USB 2.0 has multiple updates and additions. The USB Implementer Forum (USB IF) currently
maintains the USB standard and it was released in 1996.
USB was designed to standardize the connection of peripherals like pointing devices, keyboards,
digital still, and video cameras. But soon devices such as printers, portable media players, disk
drives, and network adaptors to personal computers used USB to communicate and to supply
electric power. It is commonplace to many devices and has largely replaced interfaces such as serial
ports and parallel ports. USB connectors have replaced other types of battery chargers of portable
devices with themselves.
Advantages of USB –
The Universal Serial Bus was designed to simplify and improve the interface between personal
computers and peripheral devices when compared with previously existing standard or ad-hoc
proprietary interfaces.
1. The USB interface is self-configuring. This means that the user need not adjust settings
on the device and interface for speed or data format, or configure interrupts,
input/output addresses, or direct memory access channels.
2. USB connectors are standardized at the host, so any peripheral can use any available
receptacle. USB takes full advantage of the additional processing power that can be
economically put into peripheral devices so that they can manage themselves. USB
devices mostly do not have user-adjustable interface settings.
3. The USB interface is hot pluggable or plug and plays, meaning devices can be exchanged
without rebooting the host computer. Small devices can be powered directly from the
USB interface thus removing extra power supply cables.
4. The USB interface defines protocols for improving reliability over previous interfaces and
recovery from common errors.
5. Installation of a device relying on the USB standard minimal operator action is required.
Disadvantages of USB –
1. USB cables are limited in length.
2. USB has a strict “tree” topology and “master-slave” protocol for addressing peripheral
devices. Peripheral devices cannot interact with one another except via the host, and
two hosts cannot communicate over their USB ports directly.
3. Some very high-speed peripheral devices require sustained speeds not available in the
USB standard.
4. For a product developer, the use of USB requires the implementation of a complex
protocol and implies an intelligent controller in the peripheral device.
5. Use of the USB logos on the product requires annual fees and membership in the
organization.
SoC stands for System on Chip it is a small integrated chip that contains all required components and
circuits of a particular system. However, SBC stands for Single Board Computer it is a whole
computer constructed on a single printed circuit board that contains Memory, Microprocessor, I/O
devices, and other functions which are required for a functional computer. In this article, we are
going to see the basic difference between SoC and SBC.
System on chip (SoC)
The Blocks of SoC contain memory, oscillator, voltage regulator, ADC, DAC, processor, power
management unit, USB, and UART. Here is the block diagram of SoC:
The processor is the heart of SoC, usually, SoC has multiple co-processors. It can be a
microcontroller, microprocessor, or DSP. SoC contains memory for storage. It may have RAM, ROM,
EEPROM, or Flash memory. SoC also has GPU. Universal Asynchronous Receiver Transmitter (UART)
is included in SoC which is used to transmit or receive serial data. voltage regulators, oscillators,
clocks, and ADC/DAC are also part of SoC.
Advantages of SoC
• It is small in size and includes many features and functions.
• It consumes low power.
• SoC is flexible in terms of size, and power factor.
• It is cost-effective.
Disadvantages of SoC
• Time-consuming designing process. usually, the designing process of SoC takes six to
twelve months.
• Visibility of SoC is limited.
Applications of SoC
• Used in smartphones, smartwatches, tablets, and computers.
• Internet of Things applications such as home automation.
• Embedded systems applications especially where the microcontroller is used.
It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data over
smaller distances. This technology was invented by Ericson in 1994. It operates in the unlicensed,
industrial, scientific and medical (ISM) band from 2.4 GHz to 2.485 GHz. Maximum devices that can
be connected at the same time are 7. Bluetooth ranges up to 10 meters. It provides data rates up to
1 Mbps or 3 Mbps depending upon the version. The spreading technique that it uses is FHSS
(Frequency-hopping spread spectrum). A Bluetooth network is called a piconet and a collection of
interconnected piconets is called scatternet.
Bluetooth Architecture:
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8
active nodes which are present at a distance of 10 meters. The communication between the primary
and secondary nodes can be one-to-one or one-to-many. Possible communication is only between
the master and slave; Slave-slave communication is not possible. It also has 255 parked nodes, these
are secondary nodes and cannot take participation in communication unless it gets converted to the
active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or we
can say primary in another piconet. This kind of node can receive a message from a master in one
piconet and deliver the message to its slave in the other piconet where it is acting as a slave. This
type of node is referred to as a bridge node. A station cannot be mastered in two piconets.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is
equivalent to the MAC sublayer in LANs. It performs the connection establishment
within a piconet.
3. Link Manager protocol layer: It performs the management of the already established
links which includes authentication and encryption processes. It is responsible for
creating the links, monitoring their health, and terminating them gracefully upon
command or failure.
4. Logical Link Control and Adaption Protocol layer: It is also known as the heart of the
Bluetooth protocol stack. It allows the communication between upper and lower layers
of the Bluetooth protocol stack. It packages the data packets received from upper layers
into the form expected by lower layers. It also performs segmentation and multiplexing.
5. SDP layer: It is short for Service Discovery Protocol. It allows discovering the services
available on another Bluetooth-enabled device.
6. RF comm layer: It is short for Radio Frontend Component. It provides a serial interface
with WAP and OBEX. It also provides emulation of serial ports over the logical link
control and adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony service. The basic
function of this layer is call control (setup & release) and group management for gateway
serving multiple devices.
10. Application layer: It enables the user to interact with the application.
Advantage:
• Low cost.
• Easy to use.
• It can also penetrate through walls.
• It creates an Ad-hoc connection immediately without any wires.
• It is used for voice and data transfer.
Disadvantages:
Applications:
Radio Frequency Identification (RFID) is a method that is used to track or identify an object by radio
transmission uses over the web. Data digitally encoded in an RFID tag which might be read by the
reader. This device work as a tag or label during which data read from tags that are stored in the
database through the reader as compared to traditional barcodes and QR codes. It is often read
outside the road of sight either passive or active RFID.
Kinds of RFID :
There are many kinds of RFID, each with different properties, but perhaps the most fascinating
aspect of RFID technology is that most RFID tags have neither an electric plug nor a battery. Instead,
all of the energy needed to operate them is supplied in the form of radio waves by RFID readers. This
technology is called passive RFID to distinguish it from the(less common) active RFID in which there
is a power source on the tag.
UHF RHID ( Ultra-High Frequency RFID ). It is used on shipping pallets and some driver’s licenses.
Readers send signals in the 902-928 MHz band. Tags communicate at distances of several meters by
changing the way they reflect the reader signals; the reader is able to pick up these reflections. This
way of operating is called backscatter.
HF RFID (High-Frequency RFID ). It operates at 13.56 MHz and is likely to be in your passport, credit
cards, books, and noncontact payment systems. HF RFID has a short-range, typically a meter or less
because the physical mechanism is based on induction rather than backscatter.
There are also other forms of RFID using other frequencies, such as LF RFID(Low-Frequency RFID),
which was developed before HF RFID and used for animal tracking
There are two types of RFID :
1. Passive RFID –
In this device, RF tags are not attached by a power supply and passive RF tag stored their
power. When it is emitted from active antennas and the RF tag are used specific
frequency like 125-134MHZ as low frequency, 13.56MHZ as a high frequency and
856MHZ to 960MHZ as ultra-high frequency.
2. Active RFID –
In this device, RF tags are attached by a power supply that emits a signal and there is an
antenna which receives the data.
Features of RFID :
• An RFID tag consists of two-part which is an microcircuit and an antenna.
• This tag is covered by protective material which acts as a shield against the outer
environment effect.
• This tag may active or passive in which we mainly and widely used passive RFID.
Application of RFID :
• It utilized in tracking shipping containers, trucks and railroad, cars.
• It uses in Asset tracking.
• It utilized in credit-card shaped for access application.
• It uses in Personnel tracking.
• Controlling access to restricted areas.
• It uses ID badging.
• Supply chain management.
• Counterfeit prevention (e.g., in the pharmaceutical industry).
Advantages of RFID :
• It provides data access and real-time information without taking to much time.
• RFID tags follow the instruction and store a large amount of information.
• The RFID system is non-line of sight nature of the technology.
• It improves the Efficiency, traceability of production.
• In RFID hundred of tags read in a short time.
Disadvantages of RFID :
• It takes longer to program RFID Devices.
• RFID intercepted easily even it is Encrypted.
• In an RFID system, there are two or three layers of ordinary household foil to dam the
radio wave.
• There is privacy concern about RFID devices anybody can access information about
anything.
• Active RFID can costlier due to battery.
12. What are the specific features of an embedded system processor?
A microcontroller is a single-chip VLSI unit (also called microcomputer) which, although having limited
computational capabilities, possesses enhanced input/output capability and a number of on-chip
functional units.
Microcontrollers are particularly used in embedded systems for real-time control applications with
on-chip program memory and devices.
Features:
Single task oriented. For example, a washing machine is designed for washing clothes only.
RAM, ROM, I/O Ports, and Timers cannot be added externally. These components are to be
embedded together on a chip and are fixed in numbers.
Fixed number for memory or I/O makes a microcontroller ideal for a limited but specific task.
Microcontrollers are lightweight and cheaper than a microprocessor.
A microcontroller-based system consumes less power and takes less space.
Flash Memory
Flash memory is an evolving technology that’s finding its way into our lives on an increasing scale.
Flash-memory technology is ubiquitous. Like most things associated with computers, non-volatile
storage sticks have a specific set of benefits and drawbacks. Having a basic idea of those parameters
allows the buyer to form a more informed choice about which is best for his or her needs.
Flash memory may be a quite Erasable Read Only Memory (EEROM) which has the potential to clear
and rewrite data. It’s non-volatile meaning it can hold data even without the presence of power,
supported the way of addressing read/write data, non-volatile storage is of two types. Those are the
NAND non-volatile storage and NOR non-volatile storage.
Non-volatile storage is made using solid-state chips. Each of those chips contains an array of non-
volatile storage cells. Rather than a traditional electrochemical method, non-volatile storage uses
semiconductors for storing data. Non-volatile storage is one and the only sort of semiconductor
memory making it one of the important sorts of data-storage medium. While non-volatile storage
has gained immense popularity there are some drawbacks that limit its universal adoption. These
factors must be considered before using this data-storage medium.
Advantages of non-volatile storage :
1. Speed –
Non-volatile storage posses high transferring speeds. Compared to a standard hard disc
drive, non-volatile storage does read/write function at a quick rate.
2. Drives –
Still tops in terms of performance.
3. Durability –
Non-volatile storage doesn’t contain any moving parts. It solely depends on
electrochemical processes, having no moving parts means it’s more durable also.
4. Form Factor –
Most of the flash memories come in several forms. More or same capacity are often
packed in smaller units, making it require less space to accommodate data storage.
5. Reliability –
Over the span of the last 70 years, hard disc drives are continually improved in terms of
reliability. Still, flash memories outrank them. This is often again due to the very fact that
it lacks moving parts. The reliability of flash memories makes it recommended to be
utilized in mobile devices.
6. Efficiency –
Non-volatile storage requires no physical parts for its operations. Hence, there’s a very
less number of energy required for its functioning. And also thanks to this fact there’s no
noise produced also.
7. Portability –
Another advantage of flash memories is that it’s highly portable. Therefore, they’re
mostly utilized in devices that are small and lightweight weighted. Examples like USB
memory sticks and camera flash cards.
Disadvantages of non-volatile storage :
1. Cost –
Supported the value per gigabyte basis, flash memories are always expensive than
traditional hard disc drives. This is often because hard disc drives are less costly to
manufacture and have been for a very while. Therefore, usually business of small
budgets prefer HDDs over other sorts of flash memories.
2. Effectiveness –
Many NAND drives make efficient use of the process of Program/Erase to storing data.,
this process eventually wears and tears down the flash drives. As a result flash memories
don’t have the potential to carry up heavy write loads.
3. Lifetime –
Although flash memories are more durable than a standard hard disc drive, it doesn’t
possess an infinite lifetime. It goes on decreasing when applied high voltages across
transistors. However, most flash memories won’t affect until completing a minimum of
10000 rewrites.
4. Capacity –
Generally, most or all of the flash memories do have a drag reaching higher capacity as
hard disc drives. Only Solid State Drives which are of flash memories comes with higher
capacities. But that too under rare circumstances. SSDs also have a drag reaching 1TB in
size. Besides this, all the flash memories with greater capacities tend to urge
performance issues. Therefore, capacity is usually a priority in flash memories.
5. Editing –
Works Another drawback of flash memories is that it rewrites data in block units. If it’s
done one by one for every byte, it can take a considerably long amount of your time.
Thanks to this the editing time has been hampering significantly. However, this process
doesn’t make sure that each block is often edited specifically.
6. Physical Damages –
Flash memories especially those are by memory cards are susceptible to damages. They
will be easily smashed or lost. Sometimes electronic corruption can make the cardboard
unreadable. Likewise, the difficulty is often addressed to SSDs too. They will be damaged
if handled improperly.
15.Compare CISC and RISC.
RISC CISC
Can perform only Register to Register Can perform REG to REG or REG to MEM or MEM to
Arithmetic operations MEM
An instruction fit in one word Instructions are larger than the size of one word
A large number of instructions are present in Very few instructions are present. The number of
the architecture. instructions is generally less than 100.
Some instructions with long execution times. No instruction with a long execution time due to a
These include instructions that copy an very simple instruction set. Some early RISC
entire block from one part of memory to machines did not even have an integer multiply
another and others that copy multiple instruction, requiring compilers to implement
registers to and from memory. multiplication as a sequence of additions.
Before moving forward with pipelining, check these topics out to understand the concept better :
• Memory Organization
• Memory Mapping and Virtual Memory
• Parallel Processing
Pipelining is a technique where multiple instructions are overlapped during execution. Pipeline is
divided into stages and these stages are connected with one another to form a pipe like structure.
Instructions enter from one end and exit from another end.
In pipeline system, each segment consists of an input register followed by a combinational circuit. The
register is used to hold data and combinational circuit performs operations on it. The output of
combinational circuit is applied to the input register of the next segment.
Pipeline system is like the modern day assembly line setup in factories. For example in a car
manufacturing industry, huge assembly lines are setup and at each point, there are robotic arms to
perform a certain task, and then the car moves on ahead to the next arm.
Types of Pipeline
1. Arithmetic Pipeline
2. Instruction Pipeline
Arithmetic Pipeline
Arithmetic pipelines are usually found in most of the computers. They are used for floating point
operations, multiplication of fixed point numbers etc. For example: The input to the Floating Point
Adder pipeline is:
X = A*2^a
Y = B*2^b
Here A and B are mantissas (significant digit of floating point numbers), while a and b are exponents.
Registers are used for storing the intermediate results between the above operations.
Instruction Pipeline
In this a stream of instructions can be executed by overlapping fetch, decode and execute phases of an
instruction cycle. This type of technique is used to increase the throughput of the computer system.
An instruction pipeline reads instruction from the memory while previous instructions are being
executed in other segments of the pipeline. Thus we can execute multiple instructions simultaneously.
The pipeline will be more efficient if the instruction cycle is divided into segments of equal duration.
17. Write short notes on IDE tools and the CCD sensor.
Ans:- IDE Tools:-
Integrated development environments (IDE) are applications that facilitates the development of
other applications. Designed to encompass all programming tasks in one application, one of the
main benefits of an IDE is that they offer a central interface with all the tools a developer needs,
including:
Code editor: Designed for writing and editing source code, these editors are distinguished from
text editors because work to either simplify or enhance the process of writing and editing of code
for developers
Compiler: Compilers transform source code that is written in a human readable/writable language
in a form that computers can execute.
Debugger: Debuggers are used during testing and can help developers debug their application
programs.
Build automation tools: These can help automate developer tasks that are more common to save
time.
CCD Sensor:-
CCDs are utilized for diverse applications, including single-cell imaging, detection of molecules in
cells and real samples, and the development of point-of-care testing, and are highly specific and
provide ultra-sensitive detection. The signal collection is the last step in developing an ideal ECL
system.
18. Why embedded systems are termed real-time systems? Explain the concept with thehelp
of examples.
Real-time System is a system which is used for performing some specific tasks. It is a computational
system which is used for various hard and soft real-time tasks. These specific tasks are related with
time constraints. The tasks assigned to real-time systems need to be completed in given time
interval. Embedded Systems are integrated systems which are formed by the combination of
computer hardware and software for a specific function. It can be said as a dedicated computer
system which has been developed for some particular reason. But it is not our traditional computer
system or general purpose computers, these are the Embedded systems which may work
independently or attached to a larger system to work on few specific functions. These embedded
systems can work without human intervention or with a little human intervention. The embedded
systems which are designed to perform real-time tasks are known as Embedded Real-time Systems
or Real-time Embedded Systems. Types of Embedded Real-time System : There are two types of
Embedded real-time systems :
• Hard Embedded Real-time System – These are embedded real-time systems which are
used to perform hard real-time tasks. These systems are designed in a very complicated
way. These are accurate systems.
• Soft Embedded Real-time System – These are embedded real-time systems which are
used to perform soft real-time tasks. These are simple designed systems and there are
chances of inaccuracy.
Structure of Embedded Real-time System : In an embedded real-time system, different components
of system are naturally widely distributed. Hard and soft both real-time embedded systems have
same structure. The structure of a real-time system includes various hardware and software devices
embedded in such way that specific tasks can be performed in time constraints allowed. Following
diagram represents the structure of Embedded Real-time System
:
1. Actuator – Actuator is the device which is reverse of sensor. The actuator is used to
convert electrical events into physical signals while the sensor is used to do the reverse
job. It may convert electrical signals into physical events or characteristics according to
the requirement of the user. It takes input from the system and gives output to the
environment. The output obtained from actuator may be in form of any physical action.
Some of commonly used actuators are heaters and motors.
2. Sensor – Sensor is the exact reverse of actuator. Sensor is used to sense environment
from time to time. It is used to convert physical events or characteristics into electrical
signals. This is a hardware device that takes input from environment and gives output to
system. The sensed data from environment is processed to determine corrective actions
necessary.
Watchdog is initially loaded with certain value. This value is calculated based on timeout time of
watchdog (Further section it is been shown how to calculate counter value based on timeout value).
Before timeout time, system should reset the counter.
e.g. If your system if performing 3 tasks periodically and to perform 3 tasks is takes 500 ms. Then
timeout time is considered as 600 ms (considering worst case scenario), counter value is calculated
with respect to 600 ms and loaded into watchdog.
Following figures shows watchdog hardware. Input to watchdog hardware is clock. Based on every
clock tick watchdog internal counter increments. Then there is comparator which compares count
value with loaded count value (timeout value) and if count matches watchdog hardware generates and
reset signal.
21. What are the advantages offered by an FPGA for designing an embedded system?
The main advantage of an FPGA, over the equivalent discrete circuit or an Application Specific IC
(ASIC) is the ability to easily change its functionality after a product has been designed.
In addition FPGA require a smaller board space and can be more energy efficient than the
equivalent discrete circuit.
FPGA are more flexible than a Complex Programmable Logic Device (CPLD) as they, generally,
include a greater amount of both logic blocks and programmable interconnects.
FPGA have a lower associated development cost than an ASIC. Whilst an ASIC can perform the
same operations as an FPGA and are specific to the application, they cannot be reprogrammed.
FPGA will have a lower time-to-market than an ASIC and also will have a lower non-recurring
engineering (NRE) cost.
With RISC, a central processing unit (CPU) implements the processor design principle of
simplified instructions that can do less but can execute more rapidly. The result is improved
performance. A key RISC feature is that it allows developers to increase the register set and
increase internal parallelism by increasing the number of parallel threads executed by the CPU
and increasing the speed of the CPU's executing instructions. ARM, or “Advanced RISC
Machine” is a specific family of instruction set architecture that’s based on reduced
instruction set architecture developed by Arm Ltd. Processors bas ed on this architecture are
common in smartphones, tablets, laptops, gaming consoles and desktops, as well as a growing
number of other intelligent devices.
34. There are different types of memory storage devices like EEPROM, Flash memory, SRAM,
and DRAM. Which memory storage is widely used in PCs and Embedded Systems?
Ans:- DRAM is used in PCs and Embedded systems because of its low cost. SRAM, flash memory
and EEPROM are more costly than DRAM.
35. Total power dissipation is reduced by (i) reducing operating voltages, (ii) operating at lower
clock frequency if processes meet the deadlines (iii) use of wait and stop instructionswhen the
system is inactive or idle (iv) use of cache disabling instructions (v) optimizing theamount and
type of hardware required for the system
(a) all except v (b) i, ii and iii (c) all except iv (d) all
ans : D all
36. Which is the heart of an embedded system?
a) Interrupt controller b) Processor c) I/O devices d) Power supply
Ans : B processor
37. List two live examples of embedded systems use.
Digital cameras.
Digital wristwatches.
MP3 players.
Appliances, such as refrigerators, washing machines, and microwave ovens.
Temperature measurement systems.
Calculators.
40. Mention what are buses used for communication in embedded system.
A field bus is a part of a system which provides the communication between several components in
that system (for example an actuator or a sensor).
41. Explain what is the need for an infinite loop in embedded systems.
One of the most fundamental differences between programs developed for embedded systems and
those written for other computer platforms is that the embedded programs almost always end with an
infinite loop. Typically, this loop surrounds a significant portion of the program’s functionality—as it
does in the Blinking LED program. The infinite loop is necessary because the embedded software’s job
is never done. It is intended to be run until either the world comes to an end or the board is reset,
whichever happens first.
In addition, most embedded systems have just one piece of software running on them. And
although the hardware is important, it is not a digital watch or a cellular phone or a microwave
oven without that embedded software. If the software stops running, the hardware is rendered
useless. So the functional parts of an embedded program are almost always surrounded by an
infinite loop that ensures that they will run forever.
This behavior is so common that it’s almost not worth mentioning. And I wouldn’t, except that
I’ve seen quite a few first-time embedded programmers get confused by this subtle difference. So
if your first program appears to run, but instead of blinking the LED simply changes its state once,
it could be that you forgot to wrap the calls to toggleLed and delay in an infinite loop.
A real-time embedded system is a particular version of an embedded system that works on the basis
of real-time computing represented by a dedicated type of operating system — RTOS.
Its working principles are as follows:
• Quick response to external factors: an embedded system must work within fixed time
constraints.
• Predictability: an embedded system must be deterministic or predictable, meaning that no
deviations are allowed.
• The deadline is above all: meeting the deadline is more important than other performance
characteristics.
• Operational failures may lead to catastrophe: if a task does not meet time limits, it
negatively affects users and may even lead to fatal results.
43. What are the major components of an embedded system?
Ans: 1. Power supply:-
For the embedded system the power supply is the key component to provide the power to the
embedded system circuit. Usually, the embedded system requires 5 V supply or can be range
from 1.8 to 3.3. V. The power supply source can be battery or can be provided by a wall adaptor.
The power supply is selected as per user requirements and application requirements.
2.Processor:-
For any embedded system the processor acts as the brain of the system. The processor is
responsible for deciding the performance of the embedded system. In the market there are
multiple types of processors available and can be selected as per user requirement. The
embedded system can act as a microcontroller and microprocessor.
3.Memory:-
As there are different microcontrollers is used in the embedded system the memory is present
in the microcontroller itself. There are basically two types of memory RAM(Random access
memory) and ROM (Read-only memory).
4.Timers counters:-
In some of the applications there is always a requirement of delay that needed to provide in the
application.
5.Communication ports:-
The communication port is the type of interface that is used to communicate with other types of
embedded systems.
6. Output and Input:-
When the embedded system is used the input is needed to interact with the system. The input
to the embedded system can be provided by the sensor or by the user itself. The processor used
in the embedded system can be based on input and output.
7. Circuits used in application:-
The selection of the circuit is completely dependent on the application used for the embedded
systems.
44. Discuss some options for wireless communication between embedded devices.
56. When is a message used and when does a system call for seeking access to system
resources?