2016 Summer Model Answer Paper
2016 Summer Model Answer Paper
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page1 of 29
________________________________________________________________________________________________________
RISC CISC
1.Reduced instruction set computer 1.Complex instruction set computer.
2.Instruction set is simple and limited. 2.Instruction set is very large.
3.Instruction set is not flexible, hence the 3.Instruction set is flexible, hence the program
program is long. is short
4.Provides few addressing modes normally 4.Provides many addressing modes
register.
5.Large memory is required 5.Less memory required
6.Provides large number of registers 6.No. of registers are less.
7.Processor architecture & control unit is 7.Processor architecture and control unit is
simple complicated.
8.Instruction are shorter, hence execution 8.Instructions are lengthy hence execution
speed is fast. speed is slow.
9.External memory is accessed rarely 9.External memory is accessed frequently
10.Each instruction required few bus cycle. 10.Each instruction requires many bus cycle.
e. g. ARM, ATMEL, AVR, MIPS, PIC, Interx86, Motorola, 68000 series.
POWER PC, SUNSPARC, i960, etc.
ii) List any four software development tools used in an embedded system and state the
function of each .
Ans:
(List :02M and Function of any four tools: ½ M each)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page2 of 29
________________________________________________________________________________________________________
Software development tools:
Compiler
Cross assembler
Cross compiler
Locators
Loaders
Simulators
Debugger
Integrated development environment (IDE)
Explanation :
Compiler:
It is a computer program that transforms the source code written in a programming or source
language into another computer language i.e. target language i.e. binary code known as object code.
Cross assembler:
It is useful to convert object codes for microcontrollers or processor to other codes for another
microcontrollers or processor and vice versa.
Cross compiler:
It is used to create executable code other than one on which the compiler is run. They are used to
generate executable for embedded systems or multiple platforms.
Linker/Locator:
It is used for relocation process.
It is done during compilation also it can be done at run time by a relocating loader.
It is a program that takes one or more objects generated by compiler and combines them into a single
executable program.
Simulators:
A simulator is the s/w that simulates an h/w unit like emulator, peripheral, network and I/O devices
on a PC.
It defines a processor or processing device as well as various versions for the target system.
Monitors the detailed information of as source code part with labels and symbols
during the execution for each single step.
Provides the detailed information of the status of memory RAM and simulated ports, simulated
peripheral devices of the defined target system.
Integrated Development Environment (IDE):-
An IDE is a software application that provides comprehensive facilities to computer
programmers for software development. An IDE consists of:
A source code editor.
A compiler and or interpreter.
Build automation tools.
A debugger.
IDE is dedicated to a specific programming language, allowing a feature set that most closely matches
the programming paradigms [model] of the language. IDE’s typically present a single program in which all
development is done. This program typically provides many features for authoring, modifying, compiling,
deploying, and debugging software.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page3 of 29
________________________________________________________________________________________________________
iii) Draw the format of I2C and explain each field in brief.
Ans:-
(Format- 02M,Explanation-02M)
OR
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page4 of 29
________________________________________________________________________________________________________
i) Draw block diagram of embedded system and describe any four hardware units of embedded
system.
Ans:-
(Block diagram of embedded system-02M, description of any four hardware units- 01M each.)
Block diagram:
OR
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page5 of 29
________________________________________________________________________________________________________
Processor:
The processor is the heart of embedded system. The selection of processor is
based on the following consideration
Instruction set
Maximum bits of operation on single arithmetic and logical operation
Speed
Algorithms processing and capability
Types of processor( microprocessor, microcontroller, digital signal
processor, application specific processor, general purpose processor)
Power source:
Internal power supply is must. Es require from power up to power down to start
time task. Also it can run continuously that is stay “On’ system consumes total
power hence efficient real time programming by using proper ‘wait’ and ‘stop’
instruction or disable some unit which are not in use can save or limit power
consumption.
Memories:
Pre-emptive multitasking :
In pre-emptive multitasking the highest priority task always given the CPU time .
If lower priority task is presently running and higher priority task is in ready to run state then the
running task is pre-empted and the higher priority task is executed .
The Kernel restore the state of current task and pass control of the CPU to the higher priority task.
Again after some time the high priority task may releases the CPU and the low priority task
executed.
It is used in commercial embedded systems.
OR
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page7 of 29
________________________________________________________________________________________________________
PREEMPTIVE KERNEL
Low Priority Task
(1) (2) ISR
High Priority Task
(4)
(3)
(5)
ISR makes the high
Priority task ready
Time
(6)
(7)
d) Write C program to read the status of key connected to P1.3.If the key is pressed, turn on the
LED connected to P3.5 for 20 msec.
Ans:-
(Correct program 04M)
#include <reg51.h>
void delay(unsigned int);
Sbitsw =P1^3;
Sbit led=P3^5;
void main(void)
{
P1=0xFF; //make P1 input port
led = 0
while (1)
{
if sw=0
{
led=1;
Delay(20);
led=0;
}
}
}
voiddelay (unsigned inti)
{
Unsignedintx,y;
for(x=0;x<i; x++)
for (y=0;y<1275;y++);
}
In this example, task #1 wants the scanner while holding the printer. Task #1 cannot proceed until
both the printer and the scanner are in its possession.
Task #2 wants the printer while holding the scanner. Task #2 cannot continue until it has the printer
and the scanner.
Because neither task #1 nor task#2 is willing to give up what it already has, the two tasks are now
deadlocked because neither can continue.
ii) Memory:
Designer has to make an estimate of the memory requirement and must make provision for
expansion.
In a system, there are different types of memories: RAM, ROM, EPROM, PROM, etc.
Secondary storage devices like HDD can be embedded into the system like mobile.
Flash memory can be used instead of secondary memory. Hence, we can load NT in embedded
system. E.g. Embedded Linux Os can be loaded into wristwatches.
iii) Reliability:
• It is measure of how much % you can rely upon the proper functioning of system.
• Mean Time Between Failure (MTBF) and Mean Time To Repair (MTTP) are used in determining
reliability.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page11 of 29
________________________________________________________________________________________________________
• MTBF gives the frequency of failures in hours/weeks/months.
• MTTR specifies how long the system is allowed to be out of order following a failure.
iv) Safety:
• It deals with possible damages that can happen to the operators, public and the environment due to
breakdown of embedded system,
• Or due to the emission of radioactive or hazardous materials from embedded products.
• The probability that the system will not cause harm.
• Safety analysis is a must in product engineering to evaluate the anticipated damages and determine
best course of action.
Pin names:-
Pin Name Dir Notes/Description
No.
1 DCD IN Data Carrier Detect. Raised by DCE when modem synchronized.
2 RD IN Receive Data (a.k.aRxD, Rx). Arriving data from DCE.
3 TD OUT Transmit Data (a.k.aTxD, Tx). Sending data from DTE.
4 DTR OUT Data Terminal Ready. Raised by DTE when powered on. In auto-
answer mode raised only when RI arrives from DCE.
5 SGND - Ground
6 DSR IN Data Set Ready. Raised by DCE to indicate ready.
7 RTS OUT Request To Send. Raised by DTE when it wishes to send. Expects
CTS from DCE.
8 CTS IN Clear To Send. Raised by DCE in response to RTS from DTE.
9 RI IN Ring Indicator. Set when incoming ring detected - used for auto-
answer application. DTE raised DTR to answer.
Interfacing :-
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page12 of 29
________________________________________________________________________________________________________
Ans P3=0X6C
Message queues -
A message queue is an object used for inter task communication through which task send or
receive messages placed in a shared memory.
The queue may follow:
1) First In First Out (FIFO)
2) Last in First Out(LIFO) or
3) Priority (PRI) sequence.
Usually, a message queue comprises of an associated queue control block (QCB), name, unique ID,
memory buffers, queue length, maximum message length and one or more task waiting lists. A
message queue with a length of 1 is commonly known as a mailbox.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page13 of 29
________________________________________________________________________________________________________
Pipes –
A pipe is an object that provide simple communication channel used for unstructured data exchange
among tasks. A pipe does not store multiple messages but stream of bytes. Also, data flow from a pipe
cannot be prioritized.
Remote procedure call (RPC) -
It permits distributed computing where task can invoke the execution of another task on a remote
computer.
d) Define embedded system. List any two advantages and disadvantage if embedded system.
Ans:- (Definition 02M, Advantage ½ M each point, disadvantage ½ M each point)
Definition:-
An Embedded system is a combination of computer hardware and software. As with any electronic
system, this system requires a hardware platform and that is built with a microprocessor or microcontroller.
The Embedded system hardware includes elements like user interface, Input/output interfaces, display
and memory, etc. Generally, an embedded system comprises power supply, processor, memory, timers,
serial communication ports and system application specific circuits.
2) Cost:
The streamline make-up of most embedded system allows their parts to be smaller less expensive to
produce.
3) Accessibility:
If something goes wrong with certain embedded systems they can be too inaccessible to repair. This
problem is addressed in the design stage, so by programming an embedded system. So that it will not affect
related system negatively when malfunctioning.
4) Maintenance:
Embedded systems are easier to maintain because the supplied power is embedded in the system and
does not required remote maintenance.
5) Redundancies:
Embedded system does not involve the redundant programming
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page14 of 29
________________________________________________________________________________________________________
Disadvantages (any two):-
1. Difficult to change configurations and features: -
Once an embedded system is deployed (or finalized), it will be difficult to change its
configuration - both its hardware and software. Remote update of software is possible provided the
capability is included. Hence, proper requirement analysis is a must before deployment. Hardware
configuration change will be much more trickier which may require existing boards be completely
replaced. I have seen this happen and it is not pretty.
2. Issue of scalability:-
Because it is difficult to change configuration, an embedded system cannot be easily scaled
up as demand/scope changes. Said so, embedded systems can be designed to scale up for example
using expansion ports or networking etc. This means it must be decided before hand during design
phase for scale up provisions.
3. Limitation of hardware:-
With a limited memory or computing capability in most embedded systems, there is always a
limitation (or an upper limit) on our software design(upgrade). Be always aware of "Memory" and
"Speed".
e) Write a ‘C’ program to transfer the message “MSBTE” serially at 9600 baud rate continuously
Ans:-
(04M for program with comments)
NOTE: Student may use another method for program any other correct method can be consider
#include <reg51.h>
void main(void)
{
unsigned char text[ ] = “MSBTE”; initialize array
TMOD = 0x20; Initialize timer 1 in mode2
TH1 = 0xFD; baud rate 9600
SCON = 0x50; start serial communication ( 8bit , 1 stop bit , REN )
TR1 = 1; start timer 1
for(i=0;i<6;i++) Read array and transmit serially till end
{
SBUF = text[i];
while(TI==0); check interrupt
TI = 0; clear interrupt
}
}
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page15 of 29
________________________________________________________________________________________________________
i) Draw the format of SCON register and explain all the bits
Ans:-
(Format 02M, explanation 02M)
SCON Register format:
Explanation:
SM0, SM1 bits in SCON are used to define the type of the serial communication, baud rate and
framing.
SM2 –
Bit is used for multiprocessor communication. Set or cleared by the program to enable
multiprocessor communications in mode 2 and 3. When set to 1 an interrupt is generated if bit 9 of
the received data is a 1; no interrupt is generated if bit 9 is 0;
REN –
Receiver enable bit. To accept reception of data this bit must be 1;
TB8 –
Transmitted bit 8.
RB8 –
Received bit 8.
TI –
Transmit interrupt flag. This will be enabled when all bits in the transmitted buffer is shifted
out.
RI –
Receive interrupt flag. This will be enabled when a character is received in the receiver
buffer.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page16 of 29
________________________________________________________________________________________________________
ii) List four features of each of the following:
1) Bluetooth
2) Zigbee
Ans:- (Bluetooth features ½ M each, Zigbee features ½ M each)
1) Bluetooth features (any 4):-
IEEE Standard 802.15.1
Frequency (GHz) 2.4
Maximum raw bit rate (Mbps) 1-3
Typical data throughput (Mbps) 0.7-2.1
Maximum (Outdoor) Range (Meters) 10 (class 2), 100 (class 1)
Relative Power Consumption Medium
Example Battery Life in Days
Network Size 7
Cost Low
.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page17 of 29
________________________________________________________________________________________________________
Stand-alone embedded systems do not require a host system like a computer, it works by itself. It
takes the input from the input ports either analog or digital and processes, calculates and converts the
data and gives the resulting data through the connected device-Which either controls, drives and displays
the connected devices. Examples for the stand alone embedded systems are mp3 players, digital
cameras, video game consoles, microwave ovens and temperature measurement systems.
i) Write a ‘C’ program to generate a square wave of 100Hz on P1.3. Also draw the output
Observed on P1.3
Ans :-( Calculation 02M, program 03M, neat square waveform as output clearly marking Ton and Toff 01 M)
Assume Crystal value = 12 MHz (Crystal value can be assumed as 11.0592MHz also)
Look at the following steps for 100 Hz frequency calculations with 12 MHz
The period of the square wave = 1 / 100Hz
= 0.01 s.
=10mSec
The high or low portion of the square wave = Time period / 2
= 10ms / 2
= 5mSec.
Timer clock Frequency is = XTAL / 12
= 12 MHz / 12
= 1 MHz
Timer clock period is = 1/ Timer Frequency
= 1 / 1 MHz
= 1 µSec
Counter = Delay / timer clock period
=5mSec / 1 µSec
= 5000
=50X100
Timer Reload value = Maximum Count – Counter
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page19 of 29
________________________________________________________________________________________________________
= 65536 – 5000
= (60536)d
Timer Reload value in HEX = (60536)d
= (EC78) h.
TL0 = 0x78 and TH0 = 0xEC.
//C language program to generate square wave over Port Pin P1.3 using timer0
#include <Intel\8052.h>
#include <standard.h>
Void T0M1delay (void); //Timer 0, Mode 1(16 bit timer)
SBIT OUTPUT P1^3; // Initialize Port pin P1.3 as output
Void main ()
{
While (1)
{
}
void T0M1delay () // Timer 0, Mode 1(16 bit timer) - delay of 5mSec
{
TMOD = 0x01; // Timer 0, Mode 1(16 bit timer)
TL0 = 0x78; //Load TL0 = 78h
TH0 = 0xEC; //Load TH0 = ECh
TR0 = 1; //Run the timer 0
while (TF0 = = 0); // Wait for TF0 to overflow
TR0 = 0; //Stop the timer 0
TF0 = 0; //Clear TF0
}
OR
Alternate Method
For Mode 1
(65535-count+1) X1.085 microsec = 5msec
65536-count = 5msec / 1.085 microsec = 4608.29
count = 65536-4608.29 = 60927.71 = EE00 H
ie TL0=00 H and TH0 = EEH
Program:
#include <reg51..h>
void T0M1delay (void); //Timer 0, Mode 1(16 bit timer)
sbitoutbit = P1^3; // Initialize Port pin P1.3 as output
void main (void)
{
while (1)
{
outbit = ~ outbit; // toggle P1.3
T0M1delay (); // delay of 5mSec
}
}
void T0M1delay (void) // Timer 0, Mode 1(16 bit timer) - delay of 5mSec
{
TMOD = 0x01; // Timer 0, Mode 1(16 bit timer)
TL0 = 0x00; //Load TL0 = CEh
TH0 = 0xEE; //Load TL0 = FFh
TR0 = 1; //Run the timer 0
while (TF0 = = 0); // Wait for TF0 to overflow
TR0 = 0; //Stop the timer 0
TF0 = 0; //Clear TF0
}
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page21 of 29
________________________________________________________________________________________________________
ii) Draw the circuit diagram to interface LCD with 89C51. Write ‘C’ program to send letters ‘M’
, ‘D’, and ‘E’ to the LCD display
Ans:-
( interfacing 02M, program : 04)
Note: Student may use any other method
#include<reg51.h>
sbitrs=P3^4;
sbitrw=P3^2;
sbit en=P3^3
void delay(unsigned int);
voidlcdcmd(unsigned char);
voidlcddta(unsigned char);
void main()
{
rs=0;
rw=0;
en=0;
lcdcmd(0x38);
delay(10);
lcdcmd(0x0e);
delay(10);
lcdcmd(0x06);
delay(10);
lcdcmd(0x01);
delay(10);
lcdcmd(0x80);
delay(10);
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page22 of 29
________________________________________________________________________________________________________
lcddta('M');
delay(10);
lcddta('D');
delay(10);
lcddta('E');
delay(10);
while(1)
{
}
}
voidlcddta(unsigned char dta)
{
rs=1;
rw=0;
P1=dta;
en=1;
delay(2);
en=0;
}
voidlcdcmd(unsigned char cmd)
{
rs=0;
rw=0;
P1=cmd;
en=1;
delay(2);
en=0;
}
void delay(unsigned int t)
{
Unsignedintx,y;
for(x=0;x<=t;x++)
for(y=0;y<=1275;y++);
}
a) State any four data types used in embedded system, with their value range.
Ans:- ( 01M each with their correct range)
Note:-Any four data types with their correct ranges
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page23 of 29
________________________________________________________________________________________________________
The Keil or SPJ C compiler provides several new data types to support a microcontroller and embedded
systems applications:
b) List the serial and wireless communication protocols. And describe 802.11
Ans:- (List -02M and describe 802.11 – 02M)
Serial Communication protocols:
1. Inter-Integrated Circuit bus [I2C ]
2. Controlled Area Network [CAN]
3. Universal Serial Bus [USB]
4. Serial Peripheral Interface [SPI]
5. Synchronous Serial Protocol [SSP]
802.11 Wi-Fi:
Wi-Fi is a local area wireless technology that allows an electronic device to exchange data or
connect to the internet using 2.4 GHz UHF and 5 GHz SHF radio waves.
The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are
based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page24 of 29
________________________________________________________________________________________________________
However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in
general English as a synonym for "WLAN". Only Wi-Fi products that complete Wi-Fi Alliance
interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" trademark
Many devices can use Wi-Fi, e.g., personal computers, video-game consoles, smartphones,
digital cameras, tablet computers and digital audio players. These can connect to a network
resource such as the Internet via a wireless network access point. Such an access point (or
hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot
coverage can comprise an area as small as a single room with walls that block radio waves, or as
large as many square kilometers achieved by using multiple overlapping access points.
The Modulation techniques used are either OFDM,DSSS or FHSS. 802.11n supports a data
transfer rate of up to 600 Mbps, the data transfer rate of 802.11b is 11Mbps
Advantages:
1. Convenient due to wireless nature.
2. Mobility.
3. Productivity as an employees’ work can be accomplished from any convenient location.
4. Easy Deployment.
5. Expandability: No additional wiring required for more number of clients.
Disadvantages:
1. Security: Some of the more commonly utilized encryption methods are less secure.
2. Range insufficient for larger structure.
3. Less Reliability as wireless networking signals are subject to a wide variety of interference.
4. Low speed.
d) State the methods of task synchronization. Describe semaphore with suitable example.
Ans: (list methods -01M; Semaphore – 01M; example- 02M)
The methods of task synchronization are:
Semaphore
Message queue.
Mutual exclusion.
Dead lock.
Mailboxes.
Message Queues.
Semaphore:
A semaphore is a single variable that can be incremented or decremented between zero and
some specified maximum value. The value of the semaphore can communicate state information. A
mail box flag is an example of a semaphore. The flag can be raised to indicate a latter is waiting in
the mailbox. A semaphore is a means of protecting a resource/data shared between threads. It is a
token based mechanism for controlling when a thread can have access to the resource/data.
Usually a semaphore handle will be able to be received from the system by name/id.
Semaphores are used for two purposes
1) Process Synchronization
2) Critical Section problem / Mutual Exclusion
In process P1
{
// Execute whatever you want to do
// before executing P2
S1;
signal(Sem);
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page26 of 29
________________________________________________________________________________________________________
}
in process P2
{
wait(Sem);
S2;
}
OR:
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page27 of 29
________________________________________________________________________________________________________
Sr No Parameters CAN I2 C
1. Data transfer Asynchronous with 250 Kbps up- Synchronous with 3speeds
rate to 1Mbps 100Kbps, 400 Kbps and 3.4Mbps
2. Number of 08 [including 7 bits of frame end 07
fields and 3 bits of inter frame gap].
3. Addressing bit 11 bit 7-bit 0r 10 bit address
4. Applications Copiers, Telescopes, Medical To interface devices like watch
instruments, Elevator controllers, dog, Flash and RAM memory,
Automobile industry Real time clock , Microcontrollers
c) Draw the labeled interfacing diagram of ADC 0808 with 89C51microcontroller show the
handshake signals clearly.
Ans:- (any one relevant diagram with handshake signals – 04M)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER– 16 EXAMINATION
Subject Code: 17658 Model Answer Page29 of 29
________________________________________________________________________________________________________
e) Write Logical operators in C for AND, OR, Ex-OR and NOT for 89C51 and state one example of
each.
Ans:- (01M each with correct example)