0% found this document useful (0 votes)
24 views

Embedded System Design (1)

Uploaded by

Tamal Singha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Embedded System Design (1)

Uploaded by

Tamal Singha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

16EIT61 – EMBEDDED SYSTEM DESIGN

Question Bank 8. Draw the simple view of organization of processor and memory in a system.
Unit-1
1. What is an embedded system? What are the components of embedded system?
An embedded system employs a combination of hardware & software (a
"computational engine") to perform a specific function; is part of a larger system that may
not be a "computer"; works in a reactive and time-constrained environment.
The three main components of an embedded system are
 Hardware
 Main application software
 RTOS
System:
A way of doing one or more tasks according to a program.
2. What are the applications of an embedded system?
Embedded Systems: Applications:
• Consumer electronics, e.g., cameras, camcorders, etc.,
• Consumer products, e.g., washers, microwave ovens, etc.,
• Automobiles (anti-lock braking, engine control, etc.,)
• Industrial process controllers & avionics/defense applications
Question Bank • Computer/Communication products, e.g., printers, FAX machines, etc.,
3. What are the main components of an embedded system?
Embedded System Design Three main components of embedded systems: 9. Differentiate between timers and counters.
1. The Hardware
2. Application Software
3. RTOS
4. Define embedded microcontroller.
An embedded microcontroller is particularly suited for embedded applications to
perform dedicated task or operation.
Example: 68HC11xx, 8051, PIC, 16F877, etc.,
5. What are the various classifications of embedded systems?
1. Small scale embedded systems
2. Medium scale embedded systems 10. Draw and compare von-Neumann and Harvard architecture.
3. Sophisticated embedded systems
6. What are the two essential units of a processor on an embedded system?
1. Program flow control unit (CU)
2. Execution unit (EU)
7. Classify the processors in embedded system?
1. General purpose processor
DEPARTMENT OF  Microprocessor
 Microcontroller
ELECTRONICS AND INSTRUMENTATION
 Embedded processor
ENGINEERING  Digital signal processor
 Media processor
2. Application specific system processor
3. Multiprocessor system using GPP and ASSP GPP core

11. Define interrupt latency? How to avoid it. 18. What is watch dog timer? • Design for upgradeability
Watch dog timer is a timing device that resets after a predefined timeout. 29. Give the steps in embedded system design?
The interrupt latency refers to the amount of time taken by a system to respond to
19. What are the two essential units of a processor on a embedded system? • Requirements
an interrupt. • Program Flow control Unit • Specifications
Following factors causes interrupt latency:
• Execution Unit • Architecture
o Interrupt disabling 20. What does the execution unit of a processor in an embedded system do? • Components
o Longer time taken by higher priority interrupts
The EU includes the ALU and also the circuits that execute instructions for a program • System integration
o Time taken by processor for bookkeeping
control task. The EU has circuits that implement the instructions pertaining to data transfer 30. What are the functions of memory?
o Time taken by processor for context saving
operations and data conversion from one form to another. The memory functions are
Methods for avoiding it:
21. Define device driver. • To provide storage for the software that it will run.
Using multiple arrays for critical data’s. , Using circular queues A device driver is software for controlling, receiving and sending byte or a stream of bytes • To store program variables and the intermediate results
12. List the important considerations when selecting a processor. from or to a device. • Used for storage of information
 Instruction set 22. Give some examples for small scale embedded systems. 31. Define RAM?
 Maximum bits in an operand • ACVM RAM refers Random Access Memory. It is a memory location that can be
• Stepper motor controllers for a robotic system accessed without touching the other locations.
 Clock frequency
• Washing or cooking system 32. What is data memory?
 Processor ability
• Multitasking toys When the program is executing, to save the variable and program stack, this type
13. Name some of the hardware parts of embedded systems?
23. Give some examples for medium scale embedded systems of memory is used
 Power source
• Router, a hub and a gateway 33. What is code memory?
 Clock oscillator circuit
• Entertainment systems The program code can be stored by using this area. The ROM is used for this purpose.
 Timers
• Banking systems 34. What are the uses of timers?
 Memory units
• Signal tracking systems The time intervals can be completed Precise hardware delays can be calculated The
 DAC and ADC
24. Give some examples for sophisticated embedded systems timeout facilities are generated
 LCD and LED displays • Embedded system for wireless LAN 35. Give short notes on RAM processor?
 Keyboard/Keypad • Embedded systems for real time video It is said to be the family of RISC architecture. The ARM instructions are written
14. What are the various types of memory in embedded systems? • Security products one per line, starting after the first column.
• RAM internal External • ES for space lifeboat. 36. What are the data types supported by RAM?
• ROM/PROM/EEPROM/Flash 25. What are the requirements of embedded system? • Standard ARM word is 32 bit long
• Cache memory • Reliability • Word is splitted into 4 8 bit bytes
15. What are the important embedded processor chips? • Low power consumption 37. What are the 3 types of operating modes?
 ARM 7 and ARM 9 • Cost effectiveness • Normal mode
 i 960 • Efficient use of processing power • Idle mode
 AMD 29050 26. Give the characteristics of embedded system? • Power down mode
16. Name some DSP used in embedded systems? • Single-functioned
 TMS320Cxx • Tightly constrained 38. Define machine cycle.
 SHARC • Reactive and real time Machine cycle is defined as the time required to complete one operation of accessing
 5600xx 27. What are the design metrics? memory, I/O, or acknowledging an external request. This cycle may consist of three to six
17. What are the points to be considered while connecting power supply rails with • Power T-states.
embedded system? • Size Part-B
• A processor may have more than two pins of Vdd and Vss supply should separately • NRE cost
power the external I/O driving ports, timers, and clock and • Performance 1. Describe in detail about the data transfer mechanism using DMA in Embedded System.
• From the supply there should be separate interconnections for pairs of Vdd and Vss 28. What are the challenges of embedded systems? 2. Explain in detail about device driver and Interrupt servicing Mechanism in an embedded
pins analog ground analog reference and analog input voltage lines. • Hardware needed device.
• Meeting the deadlines 3. Write the types of timers and explain any two types of timers.
• Minimizing the power consumption 4. Explain the basic processors and hardware units in the embedded system.

5. How to select the processor based upon its architecture and applications? 7. What is I2C? 16. Define the term carrier sense in CSMA/CD?
6. Explain in brief about various memories used in embedded systems. I2C is a serial bus for interconnecting ICs .It has a start bit and a stop bit like an UART. It All the nodes can distinguish between idle and a busy-link and “collision detect”
7. Explain in detail about interrupt latency and their solutions. has seven fields for start,7 bit address, defining a read or a write, defining byte as means that a node listens as it transmits and can therefore detect when a frame it is
acknowledging byte, data byte, NACK and end. transmitting has interfered (collided) with a frame transmitted by another node.
Unit-2 8. What is a CAN bus? Where is it used? 17. Define Bluetooth?
CAN is a serial bus for interconnecting a central Control network. It is mostly used in Bluetooth fills the niche of very short-range communication between mobile
1. Explain the electrical specifications of RS232. automobiles. It has fields for bus arbitration bits, control bits for address and data length phones, PDAs, notebook computers, and other personal or peripheral devices. For example,
• The electrical characteristics of RS232 define the specifications related to voltage data bits, CRC check bits, acknowledgement bits and ending bits. Bluetooth can be used to connect mobile phones to a headset, or a notebook computer to a
levels, line impedance and rate of change of signal levels. 9. State the special features on I2C? printer.
• The logic ‘1’ in RS232 is described as being in the voltage range of -15V to -3V and • Low cost 18. What are the features of SPI?
logic ‘0’ is described as the voltage range of +3V to +15V i.e. low level voltage is logic • Easy implementation • SPI has programmable clock rates
‘1’ and high level voltage is logic ‘0’. • Moderate speed (upto 100 kbps). • Full-duplex mode
• The line impedance i.e. impedance of the wire between the DTE and DCE devices is 10. What are disadvantages of I2C? • Crystal clock frequency is 8MHz
specified to be around 3Ω to 7Ω. • Slave hardware does not provide much support • Open drain or totempole output from master to slave
2. List the two major states in the operation of Bluetooth. • Open collector drivers at the master leads to be confused 19. What are the four types of data transfer used in USB?
The major states in the operation of Bluetooth are 11. What is USB? Where is it used? • Controlled transfer
 Standby state USB is a serial bus for interconnecting a system. It attaches and detaches a device from the • Bulk transfer
 Connection state network. It uses a root hub. Nodes containing the devices can be organized like a tree • Interrupt driven data transfer
3. What is a CAN bus? Where is it used? structure. It is mostly used in networking the IO devices like scanner in a computer system. • Iso-synchronous transfer
CAN is a serial bus for interconnecting a central Control network. It is mostly used in 12. What are the features of the USB protocol?
automobiles. It has fields for bus arbitration bits, control bits for address and data length A device can be attached, configured and used, reset, reconfigured and used, share the Part-B
data bits, CRC check bits, acknowledgement bits and ending bits. bandwidth with other devices, detached and reattached. 1. Explain the various features in USB communication protocol
4. I2C bus frame format: 13. List the functions performed by the physical layer of 802.3 standard? 2. With neat sketches explain about Bluetooth technology.
With I2C, data is transferred in messages. Messages are broken up into frames of Ans. Functions of physical layer are: 3. Describe the frame format and working of I2C Protocol with features.
data. Each message has an address frame that contains the binary address of the slave, and i) Data encoding/decoding (To facilitate synchronization and efficient transfer of signal 4. Describe the CAN protocol bringing out the architecture, message formats and error
one or more data frames that contain the data being transmitted. The message also through the medium). detection on detail.
includes start and stop conditions, read/write bits, and ACK/NACK bits between each data ii) Collision detection (It detects at the transmit side) 5. Explain the encoding method, frame format, network access protocol used by Ethernet
frame: iii) Carrier sensing (Channel access senses a carrier on the channel at both the transmit and standard
receive sides) Unit-3
iv) Transmit/receive the packets (Frame transmitted to all stations connected to the 1. What is Computational Model?
channel) A computational Model which describes the system behaviour by providing
v) Topology and medium used (Mediums are co-axial cable, twisted pair and fiber optic set of objects, rules for composing those objects and execution semantics of the
cable) composed object.
14. Why do you require a limit on the minimum size of Ethernet frame?
2. List out the different Real time models or Computational Model.
Ans. To detect collision, it is essential that a sender continue sending a frame and at the
5. Define the term carrier sense in CSMA/CD?  Sequential Programming Model
same time receives another frame sent by another station. Considering maximum delay
Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is the protocol for carrier with five Ethernet segments in cascade, the size of frame has been found to be 64 bytes  Concurrent process model
transmission access in Ethernet networks. On Ethernet, any device can try to send a frame  Data flow model
such that the above condition is satisfied.
at any time. Each device senses whether the line is idle and therefore available to be used. If  State machine model
15. What are the different types of cabling supported by Ethernet standard?
it is, the device begins to transmit its first frame. If another device has tried to send at the Ans. Types of cabling are:  Object oriented model
same time, a collision is said to occur and the frames are discarded. Each device then waits i) 10 BASE 5 - Maximum cable length is 500 meters using 4” diameter coaxial cable. 3. What is the difference between Model and languages?
a random amount of time and retries until successful in getting its transmission sent. ii) 10 BASE 2 - Maximum cable length is 185 meters using 0.25” diameter CATV cable. Model: i. describes the behaviour of the system
6. What are the features of the USB protocol? ii. A model is a Conceptual Notation
iii) 10 BASE T - Maximum cable length is 100 meters using twisted-pair cable (CAT-3 UTP).
A device can be attached, configured and used, reset, reconfigured and used, share the Eg: Sequential Programming Model
iv) 10 BASE FL - Maximum cable length is 2 Km using multimode fiber optic cable
bandwidth with other devices, detached and reattached. Language: i. Language captures the Models
(125/62.5 micrometer).

ii. Language captures that concept in a concrete form 23. What is FSMD? 23. What are the advantages of data flow model?
Ex: C language captures the sequential programming language.  It is an execution of finite state machine model Main advantage of this model is that rather than translating to a concurrent
 It describes the system behaviour by supporting more complex data types and process. Model for implementation, we can instead statically schedule the nodes to
variables with data path produce a sequential program model.
4. Define State Machine Model 24. What is HCSM?
a. Describe the system behaviour based on the states and states function  HCSM- Hierarchial/Concurrent State Machine Model 24. State the difference between FSM and FSMD models.
b. Mostly consist of Monitoring Control Inputs and reaching by setting control  It is an extension to the state machine model • An FSMD is a digital system composed of a finite-state machine, which controls the
inputs  It supports Hierarchial and currency process program flow, and a datapath, which performs data processing operations.
c. Used for control dominated system  It is a decomposition of a state into much concurrent state or to group many • FSMDs are essentially sequential programs in which statements have been
5. Define sequential Programming Model: concurrent states into a new hierarchial state. scheduled into states, thus resulting in more complex state diagrams.
Sequential programming model which describes the system behaviour by 25. What are the operations defined by the concurrent process? • FSMs do not use variables or arithmetic operations/conditions, thus FSMDs are
providing a set of statements, rules for putting statement one after another and  Processes create more powerful than FSMs.
semantics stating how the statements are executed one at a time.  Processes terminate • The FSMD level of abstraction is often referred to as the register-transfer level.
6. Define concurrent process Model?  Process suspend
 Concurrent Process Model which supports description of Multiple Sequential  Process resume 25. What are the advantages of data flow model?
Programming running concurrently 26. What do you mean by Process suspend and resume : Main advantage of this model is that rather than translating to a concurrent
 It describes the functionality of the system in two or more concurrent executing Process suspend suspends the execution of an already created process process. Model for implementation, we can instead statically schedule the nodes to
subtasks i.e Once a process has started to execute, another process need to to stop it without produce a sequential program model.
 Applicable for multiple tasking system terminating
7. Define Dataflow model Process Resume allowing executing the suspended process PART-B
o Used commonly for data dominated system 27. What do you mean by process create and terminate? 1. Explain the design concept of an Elevator control mechanism using a sequential model.
o Here the Model describes the system behaviour consists mostly of Process Create creates a new process, initializes any association data and starts 2. Write the steps involved in describing a system’s behavior as a state Machine.
transforming streams of Input data into streams of output data execution of that process. 3. Write a brief note on concurrent process model and communication among the process.
8. Define Object oriented Model Process terminate terminates an already executing process and destroy all the data
Provides elegant means for breaking complex software into simpler well defined pieces. associated with the process. 4. Explain the HCFSM model in a elevator control system.
9. What is Finite State Machine Model? 28. Define deadlock? 5. Explain the Synchronization among process with examples.
It is a Computational Model which describes the system behaviour based on Deadlock is the name given to the condition where two or more processes are 6. Explain in brief about the following.
the finite no of possible states in the system.System can exits only one of the state at an blocked waiting for each other to unlock critical section of codes.
instance. a) FSM
29. How the processes communicate through message passing?
10. What are the steps involved in describing a system’s behaviour as a state a. Data is exchanged between two process by mean of Explicit fashion b) FSMD
Machine? b. Process wants to send data to another process by means of “Send” operation. c) HCFSM and state charts
 List all the possible states, giving each descriptive name c. Process wants to receive the data from another process by means f receive
7. Explain in brief about the following
 Declare all the variables operation
 For each state, list all the possible transitions, with associated conditions to other 30. What is busy waiting? a) PSM
state The waiting processes is simply executing loops, instead of being blocked until the b) Concurrent process model.
 For each state, and/or transition, list the associated actions condition is met, hence making CPU available for computation is called busy waiting.
d) Data flow model
 For each state, ensure that existing transition conditions are exclusive, meaning that 20. What is condition variable?
two conditions could be true simultaneously, and complete, meaning that one of the A condition variable is a object that permits two kind of operation called signal and 8. Explain in detail about Concurrent process and its implementation.
conditions is true at any time. wait to achieve synchronization among process.
21. What is data flow graph?
11. What were the types of Finite state Machine Model? A Diagram which graphically represents the data flow are called as Data flow graph.
 Hierarchial/ Concurrent state machine model 22 What is control data flow graph?
 Program state machine model Control data flow graph is a diagram which graphically represents the
 Finite state machine model with data path model(FSMD) condition and the program along a condition dependent path.
7. How does the scheduler know when a task has become blocked or unblocked? 18. Define Socket.
Unit-4 It provides the logical link using a protocol between the tasks in a client server or peer to
The RTOS provides a collection of functions that track can call to tell the scheduler what
peer environment.
1. Define multitasking. events they wait for and to signals that event has happened.
Multitasking is the process of scheduling and switching the CPU between several tasks. A 9. Define task and Task state. 19. Define Remote Procedure Call.
single CPU switches its attention between several sequential tasks. A task is a set of computations or actions that processes on a CPU under the control of a A method used for connecting two remotely placed methods by using a protocol. Both
scheduling kernel. It also has a process control structure called a task control block that systems work in the peer to peer communication mode and not in the client server mode.
It maximizes the utilization of the CPU and also provides modular construction of
saves at the memory. It has a unique ID. It has states in the system as follows: idle, ready,
application.
running, blocked and finished. 20. What are the goals of RTOS?
2. What is RTOS?  Facilitating easy sharing of resources
A Real time operating system is a multitasking operating system for response 10. Define Task Control Block (TCB)  Facilitating easy implantation of the application software
time controlled and event controlled process which has real time programming constrains A memory block that holds information of program counter, memory map, the signal  Maximizing system performance
to solve dispatch table, signal mask, task ID, CPU state and a kernel stack.  Providing management functions for the processes, memory, and I/Os and for other
functions for which it is designed.
3. When RTOS necessary and when it is not necessary in the Embedded system?
11. Define Inter process communication.  Providing management and organization functions for the devices and files and file
 An RTOS is necessary when scheduling of Multilpe processors
An output from one task passed to another task through the scheduler and use of signals, like devices.
 An RTOS is must to monitor the processors that are response controlled and event
exception, semaphore, queues, mailbox, pipes, sockets, and RPC.  Portability
controlled processors.
 Interoperability
 RTOS may not necessary in small scale Embedded system. 12. What is shared data problem?
 Providing common set of interfaces.
If a variable is used in two different processes and another task if interrupts before the
21. List the functions of a kernel.
4. Compare OS and RTOS. operation on that data is completed then the value of the variable may differ from the one
expected if the earlier operation had been completed .This ids known as shared data  Process management
OS RTOS problem.  Process creation to deletion
 Processing resource requests
1. It is an OS for systems do not have 1. it is a OS for systems which has time 13. Define Semaphore.  Scheduling
any time and deadline constrains. deadlines and real time dead lines Semaphore provides a mechanism to let a task wait till another finishes. It is a way of  IPC
2. Application programs take control synchronizing concurrent processing operations. When a semaphore is taken by a task  Memory management
2. control is given first to OS
first. then that task has access to the necessary resources. When given the resources unlock.  I/O management
3. Protects themselves from application 3. RTOS can’t protect themselves from Semaphore can be used as an event flag or as a resource key.  Device management
application programs.
22. What are the two methods by which a running requests resources?
4. it needs large memory space
4. it needs less memory space 14. Define Mutex.  Message
EX: Windows, Linux, etc.., A phenomenon for solving the shared data problem is known as semaphore. Mutex is a  System call
EX:µC/OS-II, PSOS,VRTx, Vx works semaphore that gives at an instance two tasks mutually exclusive access to resources. 23. What are the functions of device manager?
5. Describe in brief about types of RTOS.  Device detection and addition
15. What is Priority inversion?  Device deletion
Preemptive RTOSin this type of RTOS, new higher priority task will gain control of the
A problem in which a low priority task inadvertently does not release the process for a  Device allocation and registration
CPU only when the current task gives up the CPU.
higher priority task.
 Detaching and deregistration
Non Preemptive RTOS In this type of RTOS, if any higher priority task or ISR is ready  Device sharing
to run, the current task is preempted (suspended) and higher task is immediately given 16. Define Message Queue.
24. List the set of OS command functions for a device
the control of CPU. A task sending the multiple FIFO or priority messages into a queue for use by another task
 Create and open
using queue messages as an input.
6. What is Task scheduler?  Write
A part of the RTOS called the scheduler keeps the track the state of which one task  Read
17. Define Mailbox and Pipe.
should go into the running state.  Close and delete
A message or message pointer from a task that is addressed to another task.

25. What is a thread?  A message pipe is a device for use by the task for sending the message and another 39. What is shared data problem?
A thread otherwise called a lightweight process (LWP) is a basic unit of CPU utilization, it task using the device to receive the message as stream. A pipe is a unidirectional If a variable is used in two different processes and if another task interrupts before the
comprises of a thread id, a program counter, a register set and a stack. It shares with other device. operation on that data completed then the shared data problem arises.
threads belonging to the same process its code section, data section, and operating system 40. What is reentrant function? Write the rules that decide whether the given
resources such as open files and signals. 32. What is semaphore? Mention its uses. function is reentrant or not.
Definition: Definition: A function that works properly even if it is called by more than one task is
26. Define Synchronization. A special variable operated by the OS functions which are used to take note of certain called reentrant function.
Message passing can be either blocking or non-blocking. Blocking is considered to be actions to prevent another task or process from proceeding further. Rules: 1. a reentrant function may not use variables in non atomic way.
synchronous and non-blocking is considered to be asynchronous. Uses: 2. A reentrant function may not call any other functions that are not themselves
• Semaphore act as a resource key for avoiding shared data problem reentrant.
27. Define Inter process communication. • Used as an event signaling or notifying variable 3. It may not use hardware’s in non atomic way.
Inter-process communication (IPC) is a set of techniques for the exchange of data among • Way of synchronizing concurrent processing operation
multiple threads in one or more processes. Processes may be running on one or more 41. What are the ways to eliminate Shared Data problem?
computers connected by a network. IPC techniques are divided into methods for message 33. What are the types of semaphores?  Disabling interrupts
passing, synchronization, shared memory, and remote procedure calls (RPC). The method  Mutex- Mutually Exclusive semaphore  Using semaphores
of IPC used may vary based on the bandwidth and latency of communication between the  P & V semaphore- signal and wait semaphore  Disabling scheduler
threads, and the type of data being communicated.  Counting semaphore  Using volatile keyword
 Binary semaphore
28. What is priority inheritance?
Priority inheritance is a method for eliminating priority inversion problems. Using this 34. What are the problems of semaphore? 42. Mention some task scheduling algorithms.
programming method, a process scheduling algorithm will increase the priority of a Priority inversion problem – main problem  Cooperative task scheduling
process to the maximum priority of any process waiting for any resource on which the Dead lock problem  Preemptive task scheduling
process has a resource lock. Forgetting to take semaphore, to release semaphore, taking wrong semaphopre  Cyclic and Round Robin scheduling
 Rate monotonic task scheduling
29. What are the various scheduling criteria for CPU scheduling? 35. What is priority inversion and Deadlock situations?  Earliest deadline first scheduling
The various scheduling criteria are Priority inversion: it is a problem in which a low priority task inadvertently does not
 CPU utilization release the process for a higher priority task. An OS can take care of this by appropriate 43. Define process, thread and Task?
 Throughput provisions. Process: it is defined as a sequentially executable codes or program and its state. It is a
 Turnaround time Deadlock situation: it is a situation in which a task waits for the release of heavy weight entity.
 Waitingtime semaphore from a task and another different task waiting for another semaphore release Thread: a thread is a process or sub process within a process that has its own PC, SP, stack
 Response time to run. None of these is able to proceed further due to circular dependency. and own priority parameters for its scheduling by thread scheduler.
Task: it is defined as a sequentially executable codes or program that runs on a CPU, under
30. Define deadlock. 36. What is IPC? Mention the two different ways available for it. state control of kernel of an RTOS.
A process requests resources; if the resources are not available at that time, the process The process of a task or ISR to communicate information to another task is called inter
enters a wait state. Waiting processes may never again change state, because the process or inter task communication. It can be done in two ways. 44. What are the task states? Draw the state diagram of task?
resources they have requested are held by other waiting processes. This situation is called 1. Data sharing  Running state – Microprocessor is executing the instruction that make up this task.
a deadlock. 2. Message passing  Ready state- ready to execute the task.
37. What is Task scheduler?  Blocked state- Task hasn’t got anything to do right now, even if the microprocessor
31. What is mailbox, message queue and message pipe? A part of the RTOS called the scheduler keeps the track the state of which one task become available.
 A mail box is a pointer sized variable through which a message from a task is should go into the running state.
addressed for another tasks.
 A message queue is basically collection of mail boxes. It is IPC function offered by RTOS 38. How does the scheduler know when a task has become blocked or unblocked?
and is used to one or more message to a task. The RTOS provides a collection of functions that track can call to tell the scheduler what
events they wait for and to signals that event has happened.

5. How Does the Internet of Things (IoT) Work?


Answer: The IoT is not separate from the Internet, but rather, a potentially huge
Unit-5 extension and expansion of it. The ?things? that form the basis of the IoT are objects. They
could be virtually anything? streetlights, thermostats, electric meters, fitness trackers,
1. What is a “Thing” in the context of Internet of Things (IoT)? factory equipment, automobiles, unmanned aircraft systems (UASs or drones), or even
Answer: The “Thing” commonly referred to by the concept of the Internet of Things is any cows or sheep in a field. What makes an object part of the IoT is embedded or attached
item that can contain an embedded, connected computing device. A “Thing” in the IoT computer chips or similar components that give the object both a unique identifier and
could be a shipping container with an RFID tag or a consumer’s watch with a WiFi chip Internet connectivity. Objects with such components are often called “smart”?such as
that sends fitness data or short messages to a server somewhere on the Internet. smart meters and smart cars.
45. What are the consequences of task states?
 A task should be running just before it is blocked.
2. How the Internet of Things (IoT) makes a difference to the businesses? 6. What is the difference between the Internet of Things (IoT) and Machine to
 All tasks are blocked and scheduler idles forever (not desirable!)
Answer: Businesses focus on getting products to the marketplace faster, adapting to Machine (M2M)?
 Two or more tasks with same priority levels in Ready state (time-slice, FIFO)
regulatory requirements, increasing efficiency, and most importantly, persisting to Answer: Generally speaking, M2M could be considered a subset of IoT. M2M is like a line
 The shuffling of tasks between the ready and running state is entirely work of the
innovate. With a highly mobile workforce, evolving customer, and changing supply chain connecting 2 points, and IoT is like a network, a system composed of lots of M2M and
scheduler.
demand, the IoT can move your enterprise forward, starting today. triggering lots of interactions/activities.
46. What are the features of the task?
Giving a simple definition to M2M which is transferring data from one machine to another
 Task has unique ID.
3. What are the major Previacy and Security Issues in case of Internet Of Things one. It’s been used everywhere in our daily life. For example, entrance security. Just like
 Task has a process structure called task control block saves at the memory (IoT)? using your employee card to unlock a door. When the security detector receives the ID
 Multitasking operations are by context switching between the various tasks. Answer: Cyberattacks may also compromise privacy, resulting in access to and from the employee card and then unlock the door once the ID is approved. This is M2M.
exfiltration of identifying or other sensitive information about an individual. For example,
PART-B an intrusion into a wearable device might permit exfiltration of information about the 7. What is difference between Wireless Sensor Network (WSN) and Internet of
1. Explain the cooperative scheduling and round robin scheduling with a suitable diagram. location, activities, or even the health of the wearer. Things (IoT) network (sensor)?
2. Explain any three types of inter process communication functions between the tasks. In addition to the question of whether security measures are adequate to prevent such Answer: About WSN:
3. Explain in detail about semaphores and its applications. intrusions, privacy concerns also include questions about the ownership, processing, and Wireless sensor network is the foundation of IoT applications.
4. Explain in detail about shared data problem and its possible solutions. use of such data. With an increasing number of IoT objects being deployed, large amounts
5. Explain in detail about semaphores and its applications. of information about individuals and organizations may be created and stored by both WSN is the network of motes, formed to observe, to study or to monitor physical
6. List out various problems associated with semaphores. Discuss with suitable examples private entities and governments. parameters of desired application.
about priority inversion and dead lock situations. With respect to government data collection, the U.S. Supreme Court has been reticent
7. What is IPC? Mention the two methods available for it. Explain in detail about message about making broad pronouncements concerning society?s expectations of privacy under 8. What is IoT?
queues. the Fourth Amendment of the Constitution while new technologies are in flux, as reflected Answer: IoT stands for Internet of Things. It is basically a network using which things can
8. Discuss in detail about the following. in opinions over the last five years. communicate with each other using internet as means of communication between them.
1. Timer function events. All the things should be IP protocol enabled in order to have this concept possible. Not one
2. Memory management functions. 4. What are the top 5 Machine-to-Machine (M2M) applications in the world? but multiple technologies are involved to make IoT a great success.
Answer: 1. Asset Tracking and/or Monitoring in some form or another (Stolen Vehicles,
Fleet, Construction Equipment, Wood Pellets, Tank level monitoring, etc.) seems to be the 9. How does the Internet of Everything relate to the Internet of Things?
biggest. Low data requirements, high volumes of devices, etc. It isn’t hot or particularly Answer: The “Internet of Everything” builds on the foundation of the “Internet of Things”
exciting, but it is changing the world in subtle ways and very quickly. New business by adding network intelligence that allows convergence, orchestration and visibility
models will spring from this. across previously disparate systems.
2. Insurance Telematics is huge as if offers Insurance companies the opportunity to cut
risk and drive better/more attractive pricing. 10. What are the important Components of Internet of Things?
3. Utilities/Automated Meter Reading/Smart Grids – lots of regulation and investment into Answer: Many people mistakenly think of IoT as an independent technology.
this at the moment. There a lots of national solutions as the requirements and business Interestingly, internet of things is being enabled by the presence of other independent
case are driven in very diverse ways. technologies which make fundamental components of IoT.
The fundamental components that make internet of things a reality are:-

1. Hardware-Making physical objects responsive and giving them capability to retrieve


data and respond to instructions
2. Software – Enabling the data collection, storage, processing, manipulating and
instructing
3. Communication Infrastructure – Most important of all is the communication
infrastructure which consists of protocols and technologies which enable two physical
objects to exchange data.

11. Application of IoT:


 Smart home
 Connected car
 Smart city
 Smart Retail
 Connected Health
 Smart grids
 Smart Farming

PART_B

1. Explain the Physical Design of IoT and Logical Design of IoT with function block
diagram.
2. Write the case study on IoT based Weather monitoring with examples.
3. Write the case study on IoT based Smart Irrigation with examples.

**********************

You might also like