Module_1_Embedded_system..
Module_1_Embedded_system..
Text Books
Shibu K V, “Introduction to Embedded Systems”, Tata McGraw Hill Education
• The classification based on deterministic system behaviour is applicable for ‘Real Time’ systems. The
application/task execution behaviour for an embedded system can be either deterministic or non-
deterministic.
• Based on the execution behaviour, Real Time embedded systems are classified into Hard and Soft.
• Embedded Systems which are ‘Reactive’ in nature (Like process control systems in industrial control
applications) can be classified based on the trigger.
This classification is based on the order in which the embedded processing systems evolved from the first
version to where they are today.
First Generation:
The early embedded systems were built around 8 bit microprocessors like 8085 and Z80, and 4bit
microcontrollers. Simple in hardware circuits with firmware developed in Assembly code. Digital telephone
keypads, stepper motor control units etc, are examples of this.
Second Generation:
These are embedded systems built around 16 bit microprocessors and 8 or 16 bit microcontrollers, following the
first generation embedded systems. The instruction set for the second generation processors/controllers were
much more complex and powerful than the first generation processors/controllers. Some of the second
generation embedded systems contained embedded operating systems for their operation. Data Acquisition
Systems, SCADA systems, etc. are examples of second generation embedded systems.
Fourth Generation:
The advent of System on Chips (SoC), reconfigurable processors and multicore processors are bringing high
performance, tight integration and miniaturization into the embedded device market. The SoC technique
implements a total system on a chip by integrating different functionalities with a processor core on an
integrated circuit. The fourth generation embedded systems are making use of high-performance real time
embedded operating systems for their functioning. Smart phone devices, mobile internet devices (MIDs), etc.
are examples of fourth generation embedded systems.
The application areas and the products in the embedded domain are countless. A few of the important domains and
products are listed below:
(1) Consumer electronics: Camcorders, cameras, etc.
(2) Household appliances: Television, DVD players, washing machine, fridge, microwave oven, etc.
(3) Home automation and security systems: Air conditioners, sprinklers, intruder detection alarms, closed circuit
television cameras, fi re alarms, etc.
(4) Automotive industry: Anti-lock breaking systems (ABS), engine control, ignition systems, automatic navigation
systems, etc.
(5) Telecom: Cellular telephones, telephone switches, handset multimedia applications, etc.
(6) Computer peripherals: Printers, scanners, fax machines, etc.
(7) Computer networking systems: Network routers, switches, hubs, firewalls, etc.
(8) Healthcare: Different kinds of scanners, EEG, ECG machines etc.
(9) Measurement & Instrumentation: Digital multimeters, digital CROs, logic analysers PLC systems, etc.
(10) Banking & Retail: Automatic teller machines (ATM) and currency counters, point of sales (POS)
(11) Card Readers: Barcode, smart card readers, hand held devices, etc.
(12) Wearable Devices: Health and Fitness Trackers, Smartphone Screen extension for notifi cations, etc.
(13) Cloud Computing and Internet of Things (IOT)
Embedded systems are used in various domains like consumer electronics, home automation,
telecommunications, automotive industry, healthcare, control & instrumentation, retail and banking
applications, etc. Within the domain itself, according to the application usage context, they may have different
functionalities. Each embedded system is designed to serve the purpose of any one or a combination of the
following tasks:
(1) Data collection/Storage/Representation
(2) Data communication
(3) Data (signal) processing
(4) Monitoring
(5) Control
(6) Application specific user interface
• Little-endian means the lower-order byte of the data is stored in memory at the lowest address, and the
higher-order byte at the highest address. (The little end comes first.)
Little-Endian operation
• Big-endian means the higher-order byte of the data is stored in memory at the lowest address, and the
lower-order byte at the highest address. (The big end comes first.)
Big-Endian operation
• Masked ROM is a one-time programmable device. Masked ROM makes use of the hardwired technology for
storing data. The device is factory programmed by masking and metallization process at the time of
production itself according to the data provided by the end user.
• The primary advantage of this is low cost for high volume production. They are the least expensive type of
solid state memory. Different mechanisms are used for the masking process of the ROM, like
(1) Creation of an enhancement or depletion mode transistor through channel implant.
(2) By creating the memory cell either using a standard transistor or a high threshold transistor. In the high
threshold mode, the supply voltage required to turn ON the transistor is above the normal ROM IC operating
voltage. This ensures that the transistor is always off and the memory cell stores always logic 0.
• Masked ROM is a good candidate for storing the embedded firmware for low cost embedded devices. Once
the design is proven and the firmware requirements are tested and frozen, the binary data (The firmware cross
compiled/assembled to target processor specific machine code) corresponding to it can be given to the
MROM fabricator.
• The limitation with MROM based firmware storage is the inability to modify the device firmware against
firmware upgrades. Since the MROM is permanent in bit storage, it is not possible to alter the bit information.
• OTPs are not useful and worth for development purpose. During the development phase, the code
is subject to continuous changes and using an OTP each time to load the code is not economical.
• Erasable Programmable Read Only Memory (EPROM) gives the flexibility to re-program the same
chip.
• EPROM stores the bit information by charging the floating gate of an FET. Bit information is
stored by using an EPROM programmer, which applies high voltage to charge the floating gate.
• EPROM contains a quartz crystal window for erasing the stored information. If the window is
exposed to ultraviolet rays for a fixed duration, the entire memory will be erased.
• Even though the EPROM chip is flexible in terms of re-programmability, it needs to be taken out
of the circuit board and put in a UV eraser device for 20 to 30 minutes. So it is a tedious and time-
consuming process.
• As the name indicates, the information contained in the EEPROM memory can be altered by using
electrical signals at the register/ Byte level.
• They can be erased and reprogrammed in-circuit. These chips include a chip erase mode and in this
mode they can be erased in a few milliseconds. It provides greater flexibility for system design.
• The only limitation is their capacity is limited when compared with the standard ROM (A few
kilobytes).
• FLASH is the latest ROM technology and is the most popular ROM technology used in today’s
embedded designs.
• FLASH memory is a variation of EEPROM technology.
• It combines the re-programmability of EEPROM and the high capacity of standard ROMs. FLASH
memory is organized as sectors (blocks) or pages.
• FLASH memory stores information in an array of floating gate MOSFET transistors. The erasing
of memory can be done at sector level or page level without affecting the other sectors or pages.
• Each sector/page should be erased before re-programming.
• The typical erasable capacity of FLASH is of the order of a few 1000 cycles.
• SST39LF010 from Microchip (www.microchip.com) is an example of 1Mbit (Organized as 128K
x8) Flash memory with typical endurance of 100,000 cycles.
• An embedded system is in constant interaction with the Real world and the controlling/ monitoring
functions executed by the embedded system is achieved in accordance with the changes happening to
the Real world.
• The changes in system environment or variables are detected by the sensors connected to the input port
of the embedded system.
• If the embedded system is designed for any controlling purpose, the system will produce some changes
in the controlling variable to bring the controlled variable to the desired value.
• It is achieved through an actuator connected to the output port of the embedded system.
• If the embedded system is designed for monitoring purpose only, then there is no need for including
an actuator in the system.
• For example, take the case of an ECG machine. It is designed to monitor the heart beat status of a
patient and it cannot impose a control over the patient’s heart beat and its order. The sensors used here
are the different electrode sets connected to the body of the patient. The variations are captured and
presented to the user (may be a doctor) through a visual display or some printed chart.
• A sensor is a transducer device that converts energy from one form to another for any measurement
or control purpose.
Actuators
• Actuator is a form of transducer device (mechanical or electrical) which converts signals to corresponding
physical action (motion).
• Actuator acts as an output device.
• For example, in ‘Wearable devices’ , certain smartwatches use Ambient Light Sensor to detect the
surrounding light intensity and uses an electrical/ electronic actuator circuit to adjust the screen brightness for
better readability.
• The I/O subsystem of the embedded system facilitates the interaction of the embedded system with
the external world.
• The interaction happens through the sensors and actuators connected to the input and output ports
respectively of the embedded system.
• The sensors may not be directly interfaced to the input ports, instead they may be interfaced
through signal conditioning and translating systems like ADC, optocouplers, etc.
• In embedded application, the Relay unit acts as dynamic path selector for signals and power.
• The Relay unit contains a relay coil made up of insulated wire on a metal core and a metal armature with
one or more contacts.
• Relay works on electromagnetic principle.
• When a voltage is applied to the relay coil, current flows through the coil, which in turn generates a
magnetic field.
• The magnetic field attracts the armature core and moves the contact point.
• The movement of the contact point changes the power/signal flow path.
• Figure given below illustrates the widely used relay configurations for embedded applications.
• Most of the industrial relays are bulky and require high voltage to operate.
• Special relays called 'Reed' relays are available for embedded application requiring switching of
low voltage DC signals.
• It is an input device.
• Push button switch comes in two configurations, namely 'Push to Make’ and 'Push to Break’.
• In the 'Push to Make' configuration, the switch is normally in the open state and it makes a
circuit contact when it is pushed or pressed.
• In the 'Push to Break' configuration, the switch is normally in the closed state and it breaks
the circuit contact when it is pushed or pressed.
• The push button stays in the 'closed' (For Push to Make type) or 'open' (For Push to Break
type) state as long as it is kept in the pushed state and it breaks/makes the circuit connection
when it is released.