0% found this document useful (0 votes)
18 views11 pages

Note

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views11 pages

Note

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Downloaded From: www.EasyEngineering.

net

ww
w.E
asy
E ngi
nee
rin
g.n
et

**Note: Other Websites/Blogs Owners Please do not Copy (or) Republish


this Materials, Students & Graduates if You Find the Same Materials with
EasyEngineering.net Watermarks or Logo, Kindly report us to
[email protected]
Downloaded From: www.EasyEngineering.net
Downloaded From: www.EasyEngineering.net

EC8791-EMBEDDEDANDREAL TIME SYSTEMS

UNIT – I
INTRODUCTION TO EMBEDDED SYSTEM DESIGN
PART–A

1. Enumerate some embedded computers that are exists from the origin of the embedded
systems. (Dec 16)
Cell phones, calculators, printers, thermostats, video game consoles, CD players are some of the
embedded computers that exist from the origin of embedded systems.

2. In what way interrupts differ from exceptions? (Dec 16)


Interrupts are used to handle external events(serial ports, keyboard).The processor handles
interrupts after finishing the current instruction.Exceptions are used to handle instruction faults,

ww (division by zero, undefined opcode).Exceptions are used as a variation of interrupt, which


requires both prioritization and vectoring.

w
3. Whatisanembeddedcomputersystem?

.Ea
Any device that includes a programmable computer but is not itself intended to be a general
purpose computer is called an embedded computer system.

syE
4. Mentionthechallengesinembeddedcomputingsystemdesign. (Nov 2019)
How much hardware do we need, How do we meet deadlines, How do we minimize power
consumption, How do we design for upgradeability.

ngi
5. Mentionthereasonsthatmakesembeddedcomputingmachinesdesigndifficult.

nee
Complex testing, Limited observability and controllability, restricted development environments.

6. What is design flow? (Nov 17)

rin
The sequence of design methodology for fully and partially automated system.

7. What is bus protocol?(May 17)

g.n
Bus protocol is nothing but to transfer the information from one system in to the another system
there are two different set of bus protocol.

8. Statetheimportanceofdesignmethodology.
It allows us to keep a score board on a design ,It allows us to develop computer aided design
tools, It makes it much easier for member so far design team to communicate.
et
9. Why microprocessor is used in embedded system? (Nov 17)
Microprocessorsprovideaveryefficientwaytoimplementanembeddedsystemtheyalsomakeiteasierto
designfamiliesofproductsthatcanbebuilttoprovidevariousfeaturesetsatdifferentpricepoints.

10. What do you mean by quality and quality assurance related to embedded systems? (Dec 16)
Quality of a product or service is how well it satisfies the intended function. Quality assurance
process is vital for the delivery of a satisfactory system.

11. List the issues in hardware and software design for an embedded system.
Choosing the right platform.
Memory and processor sensitive software
Allocation of addresses to memory, program segments and devices.
Porting the issues of OS in an embedded platform.
Performance and Performance Accelerators.

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

12. List out some of the verifications requirements and specification related to the design flow
(May 17)
Choosing the right platform, Memory and processor sensitive software, Allocation of addresses to
memory, program segments and devices. Porting the issues of OS in an embedded platform,
Performance and Performance Accelerators.

13. What is good requirement analysis? (May 18)


Correctness, unambiguousness, completeness, verify ability, modifiability, traceability.

14. What are the CRC Card methodology identifiers? (Nov 18,19)
Classes, responsibilities, collaborators.

ww
15. Define Embedded Programming. (May 19)
Embedded Programming is the process of developing the software for an embedded system to
automate the system by getting the inputs and producing the corresponding outputs to actuators.

w .Ea PART– B

1. Name three mechanisms by which a CMOS microprocessor consumes power and also specify

syE
several power saving strategies are used in CMOS CPU’S. (May 17)
2. Analyze the requirements for designing a GPS moving map in embedded system design
process.(Dec 16)

ngi
3. How are the conceptual specifications and detailed specifications written in UML language to
design the model train controller?(May 18)(Nov 17,18)

nee
4. What are the several requirements of an embedded computing system design?.(May17,18)
5. Explainindetailaboutthechallengesinembeddedcomputingsystemdesign.(May 19)
6. Briefly discuss about the design methodologies for an embedded computing system and explain on
the importance of requirement analysis (Dec 16) (Nov 17,18)
rin
UNIT – II ARM PROCESSOR AND PERIPHERALS g.n
1. Write short notes on ARM Processor.
PART – A

ARM–Advanced RISC Machine (It is an32-bit Microprocessor).


1) ARMisactuallyafamilyofRISCarchitecturesthathavebeendevelopedovermanyyears.TheAR
et
Misa32-bit Reduced Instruction Set Computer (RISC) instruction set architecture
developed by Arm holdings.
2) ARM processor is mad suitable for Low power application.

2. What are the parameters used to evaluate the CPU performance?


Pipelining and Caching.

3. What are the Instruction set features usefull for embedded programming?
InstructionSetscanhaveavarietyofcharacteristics/featuresincluding:
Fixed versus variable length, Addressing modes, Number of operands, Types of operations
supported.

4. State the functions of Co-Processor(May 19)


Co-Processor is an additional computing device, which is coupled to the main processor for
execution of certain complex instructions. The Co-Processor does not execute any portion of the

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

program by itself. It comes into operation only when the processor executes a coprocessor
instruction.

5. How traps are Handled in ARM Processor (Nov 17,19)


Trap is also known as software interrupt. It is an instruction that explicitly generates an exception
condition. The processor immediately switches on to the supervisor mode to handle the trap when
encountered. The ARM processor provides SWI interrupt for software interrupts.

6. Determine the average memory access time of a machine whose hit rate is 90% with a cache
access times of 3ns and main memory access tie of 70ns. (Nov 18)
Average Access time = Hit rate * Cache Access time + Miss rate * Main Memory Access time
= 0.9*3ns + 0.1 *70 ns = 9.7ns
7. What are the basic sources of CMOS power consumption? (May 19)
The basic sources of CMOS power consumption can be given as Power Supply, Capacitive

ww Toggling and Leakage.

8. WhatisthedifferencebetweentheHarvardandVon-Neumannarchitecture? (May 18)

w HARDWARD

Program .Ea
Separate Program and Data memory
counter points
VON-NEUMANN

program
Common memory for Program and data
Program counter holds address in memory
memory
syE of an instruction

9. ListthefunctionsofARMprocessorinsupervisormode.(May18)(Nov 18)
Exception, Prioritization, Vectoring, Traps.
ngi
10. HowisARMprocessordifferentfromotherprocessors?

nee
ARMisRISC(ReducedInstructionSetComputing)architecturewhileotherprocessorbeingaCISC(Co
mputerInstructionSetComputing)

rin
one.IntheARMprocessor,arithmeticandlogicaloperationscannotbeperformdirectlyonmemorylocati
ons,whileotherprocessorsallowsuchoperationstodirectlyreferencemainmemory.

11. Whatisthepurposeofcurrentprogramstatusregister(CPSR)andZ-bit?
g.n
CPSR:Itissetautomaticallyduringeveryarithmetic,logicalorshiftingoperations.Thetop4bitsofCPSR
holdusefulinformationabouttheresult.Z-Bit:Thezero(Z)bitissetwheneverybitoftheresultiszero.

12. Define CISC


CISCreferstocomplexinstructionsetcomputers.Asthenameimplythesecomputersarehavingawidevar
et
ietyofinstructionsthatcanperformverycomplexoperations.
DefineRISC.
RISCreferstoreducedinstructionsetcomputers.Thesecomputersarehavingverysimpleinstructionswhi
charealsoveryfewerinnumber.

13.Define AMBA.
AMBA stands for Advanced Microcontroller Bus Arbitration. It consists of the AHB (Advanced
High Speed Bus) and the APB (Advanced Peripheral Bus)

14.What is LPC214x family?


LPC is a family of 32bit ARM7 Microcontrollers founded by NXP Semiconductors (formerly
known as Philips Semiconductors). All the LPC family of semiconductors have common features
namely the on chip S-RAM, on chip Flash Memory, ISP, A/D, D/A, USB, External/Internal
Timers, PWM Module, Capture/Compare Module etc.

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

15. What is a Watch dog timer?


Watch Dog timer is used to reset the processor whenever it enters into a locked state in case of
hardware fault or program error to prevent failure of the system. The timer is regularly cleared if
no errors are encountered, once the overflow of the timer occurs the system is forcefully reset.

PART – B
1. (i).How does branching and procedural has been performed in ARMprocessor.(May 17)
(ii).Explain how ARM processor uses UART module to perform serial communication.
2. (i).Explain the function of ARM processor instructions. (Nov 17)
(ii).Discusson the operation of Coprocessor used with the ARM processor
3. DiscussabouttheCPUperformanceandCPUpowerconsumption.(Nov 18)
4. Draw and explain ARM architecture in detail. (Nov 18)
5. Analyze the preference of ARM processor instruction set over CISC process (May 19)
And i) Analyse the data operations of an ARM processor.

ww ii) With neat sketches explain the ARM address translation mechanism(Nov 19)

UNIT III - EMBEDDED PROGRAMMING

w .Ea
PART – A

1. What is data flow graph and control/data flow graph (CDFG)? (Dec 16),(Nov 18)
A data flow graph is a model of a program with no conditionals.

syE
Inahighlevelprogramminglanguage,acodesegmentwithnoconditionsandoneentrypointandexitpoint.
A CDFG is the fundamental model for programs which has constructs that model both data
operations (arithmetic and other computations) and control operations (conditionals).

ngi
2. How the program validation can be done? (June ’16)

nee
Complex systems need testing to ensure that they work as they are intended. The subprograms can
be analysed and testing methods can be identified that provide reasonable amount of testing while
keeping the testing time within reasonable bounds.

3. Listoutthevariouscompilationtechniques.
rin
g.n
Therearethreetypesofcompilationtechniques:Analysisandoptimizationofexecutiontime,Powerener
gyandprogramsizeProgramvalidationandtesting.

4. Statethebasicprinciplesofbasiccompilationtechniques.
1.Compilationcombinestranslationandoptimization
2.Thehighlevellanguageprogramistranslatedintolowerlevelformofinstructions;optimizationstrytog
eneratebetterinstructionsequences3.Compilation=Translation+optimization.
et
5. Nameanytwotechniquesusedtooptimizeexecutiontimeofprogram.
InstructionleveloptimizationandMachineindependentoptimization.

6. How power can be optimized at the program level? (Nov 17)


Power optimization is done at the program level by many ways. Some of the ways can be given as
avoiding power down mode, predictive shutdown. By avoiding power down mode much power gets
saved. In predictive shutdown the power conservation is achieved by turning down the blocks when
not used.

7. Whatisthe disadvantage of nested loops in embedded programs? .(May 17)


Thedisadvantages of nested loops are it repeats the operation with n number of times with more
delay. It will reduce the system performance.

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

8. List the types of Co-verification techniques.(May 17)


Co-Verification phase is about white box testing. Techniques include statement coverage,
condition coverage, and decision coverage. - Demonstration: It is about black box testing.
Techniques include error guessing, boundary-value analysis, and equivalence partitioning.

9. Definecompilation.
Compilationcombinestranslationandoptimization.Thehighlevellanguageprogramistranslatedintoth
elowerlevelformofinstructions;optimizationstrytogeneratebetterinstructionsequences.

10. Writenoteonassembler/interpretersforembeddedsystems. (May 19)


Assemblerstranslatehighlevellanguageintomachinelanguageonebyonetranslation.Interpreterconsta
ntlyrunsandinterpretssourcecodeasasetofdirectives.

11. Definecompilerandcrosscompiler

ww Compilerissoftwareittranslateshighlevellanguageintomachinecodeormachinelanguage.Acrosscom
pilerisakindofacompilerthatrunsononetypeofmachinebutgeneratescodeforanothermachine.Afterco
mpilation,theexecutablecodeisdownloadedtotheembeddedsystembyaseriallinkorperhapsburnedina

wPROMandpluggedin.

.Ea
12. What is meant by linking and loading? (May 19)
Linking is the process of stitching several smaller pieces of the program together compiled by

syE
assembler to introduce modularity. Loading is the process of getting the starting address of the
compiled small portions of the program to run consecutively.

14. WhatismeantbyBoot-blockflash?
Bootblockflashistokeeptheboot- ngi
15. What is meant by debugging?
nee
upcodeinaprotectedblockbutitallowsupdatestoothermemoryblocksonthedevice.

The process of identifying and correcting both hardware and software errors which defies the

rin
system from intended way of operation is called debugging. Techniques used to identify and
correct the bugs are called as the debugging techniques

PART – B(C403.3)
g.n
1. Explain the various debugging techniques in the development of debugging system. (May 16,
Dec 16).
2. Discuss in detail the optimization of energy and power of an embedded system. (Dec 16) (Nov
18)
et
3. (i). Explain in detail about the compilation process in high level languages. .(May 17)(Nov 17)
(ii).What are the program level performance analysis of embedded computing system design.
4. (i)Discuss in detail about the optimization of program size of an embedded system. (May 17)
(ii)Discuss in detail various programmingmodel?(May 17,18)
5. (i)DiscussbrieflyaboutAssemblyandLinking.(May 18,Nov 19)
(ii)WhatareprogramValidationandtesting?(May 19,Nov 19)
And
(i)DescribeaboutBasiccompilationtechniques
(ii)Explainthedebuggingprocess(Nov 18)

UNITIV -REAL TIME SYSTEMS


PART – A(C403.4)
1. What are real-time systems?

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

Real-time systems are systems that are bounded to give the response within a predefined period
which is called as deadline. The deadline for the system is fixed considering the responsivity and
the constraints of the system.

2. What is Hard Real-Time?


Hard Real-time is applied in systems, where missing a deadline causes failure of the system. It is
mainly followed in critical systems.

3. What is Soft Real-Time?


Soft Real-time is applied in systems, where missing a deadline causes degraded performance of
the system. It is mainly followed in critical systems.

4. Define Sampling Period.


The length T of time between any two consecutive instants where samples are collected from the

ww incoming signals namely sensor data or any other electrical signal is called as sampling period.
The sampling period plays a key role in the effective functionality of the system

5.
w Define Multi Rate Systems

.Ea
Multi Rate systems are systems that have more than one degree of freedom. Its state is defined by
multiple state variables. In multi rate systems multiple processes run at different rates having
different instantiation times and different deadlines.

6. What is Dead-beat Control? syE


A discrete-time control scheme that has no continuous-timeequivalence is deadbeat control. In

ngi
response to a step change in the reference input, a dead-beat controller brings the system to
desired state by exerting on the system a fixed number of control commands.

7. What is a Deadline?
nee
A deadline for a process is given as the time instant at which the process needs to be completed

rin
with its execution. The deadline is fixed based on the execution time of the process.

8. Define Release Time.

g.n
Release time of a process is given as the time instant at which the process becomes ready for
execution. The process can only be taken for execution when the release time is met. Based on

9.
data dependencies further delay in execution of the process can happen.

What is meant by response time?


et
The response time of a process is given as the length of time from the release time of the process
to the instant when it gets completed.

10. Define Relative Deadline.


The maximum allowable response time of the process can be given as the relative deadline of the
process.Relative deadline of a process is considered when multiple process executions are
happening simultaneously.

11. What is meant by tardiness of a job?


The tardiness of a job measures how late it completes respective to its deadline. Its tardiness is
zero if the job completes 0at or before its deadline.

12. What are sporadic or aperiodic jobs?


The jobs which are triggered on the occurrence of external event are called as sporadic or
aperiodic jobs. The release times of these jobs are not known until the triggering event occurs.

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

13. Define Periodic Task Model


A periodic task model can be defined as the workload model whose occurrence is deterministic
in nature. The scheduling algorithms for these models have better performance and well
understood behaviour.

14. Define criticality of jobs.


Criticality of jobs or importance of jobs can be given as the positive number that indicates how
critical the job is with respect to other jobs. More critical the job is the bigger the criticality
number of the job becomes.

15. What is called as a scheduler?


The model which executes the scheduling algorithmsand resource access controls of the jobs is
called as a scheduler.
PART–B

ww
1.
2.
Explain in detail the Air Traffic Control System Hierarchy with relevant diagrams.
Explain about the radar signal processing and tracking system.
3.
4.
5.
w Compare hard real time vs soft real time systems in detail.

.Ea
Explain with relevant diagrams the model of real-time systems.
Explain in detail about Least Slack Time or Minimum Laxity First Algorithm, also with example
give the scheduling of processes done by the algorithm.
6.
syE
Explain about Clock Driven scheduling by formulation a network flow graph.
UNIT V-PROCESSES AND OPERATING SYSTEMS
PART A

1. Definetasks and processes.(Dec 16) ngi


structure of the program. Process
nee
Tasks are part of system functionality whose application level organization is reflected in the
isasingleexecutionofaprogram
itsownstatethatincludesnotonlyitsregistersbutalsoitsmemory.
having

rin
2. Write about scheduling states present in the embedded system design./ Define the various
process states. (Dec 16)

g.n
1) A process can be in any one of these three scheduling states. They are:Waiting state- A process
waiting for data from an I/O device or another process. 2) Ready state-Anyprocess that could
execute, 3)Executing- a process having all its data and ready to run and is selected by the
scheduler.

3. What are the strategies used for power optimization in multi-processing? (June ’16)
et
Multiprocessing for low power embedded computing requires Several processors running at
slower clock rates consuming less power than a single large processor. Performance scales
linearly with power supply voltage but power scales with V2

4. Definekernel.
The kernel is the part of OS that determines processing time, activated by timer. The length of
timer is called time quantum.

5. DefineCPUutilization.(Nov 19)
ItisameasureoftheefficiencyoftheCPU.ItistheratiooftheCPUtimethatisbeingusedforusefulcomputati
onstothetotalavailableCPUtime.

6. Definecontextswitching.(May 18)

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

Thesetofregistersthatdefineaprocessareknownasitscontextandswitchingfromoneprocessregistersett
oanotherisknownascontextswitching.

7. Defineratemonolithicscheduling. (Nov 18)


Itisastaticschedulingpolicywhichdefinesthatfixedprioritiesaresufficienttoefficientlyschedulethepro
cessesinmanysituations.

8. Definepriorityinversion..(May 17,19)
Itisasituationinwhichthelowpriorityprocessblockstheexecutionofahigherpriorityprocessbykeepingh
oldofitsresources.

9. State the major functions of POSIX RTOS. (Nov 17)


It is a Linux based OS. It has dual kernel based OS Core. It uses concepts like the Semaphores,
Message Queue etc.

ww
10. DefineMultitasking.(Nov 18) (Nov 19)
Thecapabilityoftheprocessortoexecutemultipletaskssimultaneouslywithhinderingtheoutcomeofeac

whtaskwithrespecttotimecanbegivenasmultitasking.

.Ea
11. Definemulti-processingsystems. (Nov 19)
SysteminwhichthereismorethanoneCPUiscalledasmultiprocessingsystem.Thesimultaneousprocess

syE
ingofanumberofdifferentprocessesbydifferentprocessorsatthesametimeistermedasmultiprocessing.

14. List the advantages and limitations of Priority based process scheduling. (Nov 17)(May 19)

ngi
Advantages of Priority based scheduling can be given as
i) Since process priorities are taken into consideration the execution slot is given to the
process with the highest priority.

nee
ii) Efficiency of the scheduling is greatly increased as dead slots or idle slots are removed.
Limitations of Priority Based Scheduling

rin
It is done as two types as static and dynamic. The static scheduling requires less hardware
resources but the CPU utilization is less but dynamic scheduling uses more hardware resources
but the CPU utilization is better than the other.

13. Whatisadistributedembeddedarchitecture give the block diagram?(Nov 17)(May 18) g.n


Inadistributedembeddedsystemseveralprocessingelementsareconnectedbyanetworkthatallowsthem
tocommunicate.MorethanonecomputerorgroupofcomputerandPEsareconnectedvianetworkthatfor
msdistributedembeddedsystems.
et

S – Sensors, A- Actuators

14. Distinguishmultistagenetworkfromdirectnetwork. (Nov 18)


Multistagenetwork:Multistagenetworktransmitsmessagesfromsourcetodestinationviasomeinterme
diateroutingnodestoguidethedatapackets.

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

Directnetwork:Indirectnetworkmessagegofromsourcetodestinationwithoutgoingthroughanymemor
yelementorintermediatenodes.

15. Distinguishsinglehopnetworkfrommultihopnetwork.(Nov 19)


Insinglehopnetworkamessageisreceivedatitsdestinationdirectlyfromthesourcewithoutgoingthrough
anyothernetworknode.Inmultihopnetworkmessagesareroutedthroughnetworknodestogettotheirdest
inations.

16. What is MPSoCs?


A multiprocessor system –on-chip that uses multiple cores usually targeted for embedded system.

PART B
1. Explain with a neat diagram inter process communication.(May 16,17,19)(Nov 17, 18)
2. Explain the real time operating system called Windows CE and POSIX in detail. (Nov 17, 18,19)

ww
3.

4.
(i) Explain in detail earliest deadline first scheduling. .(May 17)
(ii) Discuss in detail multi-tasking and multi-processing.(Dec 16),(May 18)
Discuss the various scheduling policies with example. (May 18), (June 16)
5.

6.
w Explain how multiple processes are handled by Preemptiverealtime operating system.(Nov

.Ea
17)(May 19)(Nov 19)
Discuss in detail about several interconnected networks especially used for distributed embedded
computing. (May 16,18)(Nov 18,19)

syE*******************

ngi
nee
rin
g.n
et

Downloaded From: www.EasyEngineering.net


Downloaded From: www.EasyEngineering.net

ww
w.Ea
syE
ngi
nee
rin
g.n
et

Downloaded From: www.EasyEngineering.net

You might also like