Sie sind auf Seite 1von 22

DHANALAKSHMI COLLEGE OF ENGINEERING

EC 6703- EMBEDDED AND REAL TIME SYSTEMS


Electronics and Communication Engineering Seventh Semester
(Regulations 2013)
UNIT-1 INTRODUCTION TO EMBEDDED COMPUTING AND ARM
PROCESSORS
Part A
1. Enumerate some embedded computers that are exists from origin of the embedded
systems. [N/D -16]
Every home has several examples of embedded computers. Any appliance that has a digital
clock, for instance, has a small embedded micro-controller that per forms no other task than
to display the clock.
2. In what way Interrupts differ from Exceptions? [N/D-16]
Interrupts and exceptions both alter program flow. The difference being, interrupts are used
to handle external events (serial port, keyboard) and exceptions are used to handle instruction
fault, (division by zero, undefined opcode). Interrupts are handled by the processor after
finishing the current instruction.
3. What is the purpose of supervisor mode? (M / J - 13)(N/D – 14)
A CPU execution mode with unlimited privileges. Control of the memory management unit
(MMU) is typically reserved for supervisor mode to avoid the obvious problems that could
occur when program bugs cause inadvertent changes in the memory management registers.
4. State the functions of coprocessor. (N/D – 14)
a. Co-processor provides flexibility at the instruction set level.
b. Co-processors are able to perform load and store operations on their own registers.
c. They can also move data between the co-processor registers and main ARM registers.
5. Differentiate top-down and bottom-up design. (AM – 14) (M / J-15)

Top-down Design Bottom-up Design


Proceeds from the abstract entity Proceeds from the concrete design to
to get to the concrete design. get to the abstract entity.
It is most often used in designing It is used in a reverse engineering
brand new system. design. (i.e.) when one is trying to
figure out what somebody else
designed in an existing system.

6. List the functions of ARM processor in supervisor mode. (M / J-13) (AM – 14)
(A/M-18) (N/D -18)
The various functions of ARM processor in supervisor modes are:
• Exception
• Prioritization
• Vectoring
• Traps.
7. Enumerate various issues in real time computing. (ND – 13)
The various issues in RT computing is:
• Real -time Response
• Recovering from failures
• Working with distributed architecture
• Asynchronous communication
• Race condition and timing.
8. Write short notes on ARM processor. (ND – 13)
ARM – Advanced RISC Machine. (It is an 32-bit Microprocessor).
ARM is actually a family of RISC architectures that have been developed over many years.
The ARM is a 32-bit Reduced Instruction Set Computer (RISC) instruction set architecture
developed by Arm holdings.
ARM processor is mad suitable for Low power application.
9. What is the Instruction set features useful for embedded programming? (MJ
– 13)
Instruction Sets can have a variety of characteristics/features including:
• Fixed versus variable length
• Addressing modes
• Number of operands
• Types of operations supported.
10. What are the parameters used to evaluate the CPU performance?
(MJ – 13)
• Pipelining and
• Caching.
11. What is function of exceptions? (ND – 12)
(MJ – 15)
The function of exceptions is to stop the CPU from executing the program and produce an
error message to the user when, unexpected inputs are given as operands for any instruction.
For example, when division process is done, you cannot have the denominator as zero.
12. How is ARM processor different from other processors?
(ND – 12)
• ARM is RISC (Reduced Instruction Set Computing) architecture while other processor
being a CISC (Computer Instruction Set Computing) one.
• In the ARM processor, arithmetic and logical operations cannot be perform directly
on memory locations, while other processors allow such operations to directly reference
main memory.
13. When is application specific system processor (ASSPs) used in a embedded systems?
MJ – 12)
ASSP is a processing unit for specific task and for specific application. In embedded system
for example image compression and that is integrated through the buses with the main
processor in an embedded system.

14. What are the various in embedded system designs modeling refining (or)
partitioning? (MJ – 12)
i. Structural modeling
ii. Behavior modeling
iii. State machine modeling
iv. Process algebra modeling
v. Logic based modeling
vi. Petri-nets modeling.

15. What are the factors which governs the performance of a CPU?
 Frequency of the CPU
 Number of cores
 Speed of memory bus
 Word width
 Information architecture
 Size of local cache
 Interrupt design (DMA / IRQ) and
 Message passing.
16. How TRAPS are handled in ARM processor? (N/D – 17)
Traps are handled by the processor through the same mechanism as interrupts, although their
meaning is quite different.
17. What are the real-time requirements of embedded systems?
Hard-real time systems: where there is a high penalty for missing a deadline e.g., control
systems for aircraft/space probes/nuclear reactors; refresh rates for video, or DRAM.
Soft real-time systems: where there is a steadily increasing penalty if a deadline is missed.
e.g., laser printer: rated by pages-per-minute, but can take differing times to print a page
(depending on the \"complexity\" of the page) without harming the machine or the customer.
18. What are the basic sources of cmos power consumption? (A/M-18)
Dynamic, short-circuit, static, and leakage power
19. What is the bus protocol especially, the four –cycle hand shakes? (A/M-14) (A/M-
17)
i. Device 1 raises its output to signal an enquiry, which tells device 2 that it should get
ready to listen for data.
ii. When device 2 is ready to receive, it raises its output to signal an acknowledgement.
At this point, devices 1 and 2 can transmit or receive.
iii. Once the data transfer is complete, device 2 lowers its output, signalling that it has
received the data.
iv. After seeing that ack has been released, device 1 lowers its output.
20. Define DCC standard.
The DCC standard is given in two documents
1. Standard S-9.1, the DCC electrical standard, defines how bits are encoded on the rails
for transmission.
2. Standard S-9.2, the DCC communication standard, defines the packets that carry
information.

21. What is the purpose of SVC mode?


A CPU execution mode with unlimited privileges. Control of the memory management
unit (MMU) is typically reserved for supervisor mode to avoid the obvious problems that
could occur when program bugs cause inadvertent changes in the memory management
registers.

22. State the functions of coprocessor.


A coprocessor is a computer processor used to supplement the functions of the primary
processor (the CPU). Operations performed by the coprocessor may be floating
point arithmetic, graphics, signal processing, string processing, encryption or I/O
Interfacing with peripheral devices.

23. How ARM processor is differ from other processor?


 In ARM processors implementation of pipelining is easier.
 Co-processors can be interfaced easily.
 DSP enhanced instruction set is available.
 Single Input Multiple Output (SIMO) instruction set for multimedia processing is
available.
 Straight away one can execute java byte codes.
 Thumb instruction mode is available.

24. What are the parameters used to evaluate the CPU performance?
The parameters that influence the performance of a CPU are:
 Pipelining
 Caching

25. What are the entries of a requirement form?


 Name
 Purpose
 Inputs and outputs
 Functions
 Performance
 Manufacturing cost
 Power
 Physical size and weight.

26. What is meant by specification?


This is a bridge between Customer and Architect. It conveys the customer’s needs. These
needs are properly used in the design process.

27. Give the characteristics of embedded system.


 Perform a single specific task.
 Time bounded.
 Contains atleast one programmable unit. (micro-controller)
 Runs a single program.
 Minimum cost

28. What is RISC?


RISC or Reduced Instruction Set Computer is a type of microprocessor architecture that
utilizes a small, highly – optimized set of instructions, rather than a more specialised set
of instructions often found in other types of architectures.

29. Give the steps in embedded system design.


 Requirements
 Specifications
 Architecture
 Components
 System Integration

30. In what way interrupt differ from exception?


Interrupts and exceptions both alter the program flow. The difference being, interrupts are
used to handle external events (serial port, keyboard) and exceptions are used to handle
instruction fault, (division by zero, undefined opcode). Interrupts are handled by the
processor after finishing the current instruction.

UNIT-II EMBEDDED COMPUTING PLATFORM DESIGN


Part A

1. Compare Static and Dynamic RAM. [N/D-16]

Static RAM (SRAM) Dynamic RAM (DRAM)


It uses transistor to store a It uses a separate capacitor to
single bit of data. store each bit of data.
It does not need periodic It needs periodic refreshment to
refreshment to maintain data. maintain the charge in the
capacitor for data.
They are used in cache They are used in main memory.
memory.
SRAM are faster than DRAM. DRAM is slower than SRAM.
Structure of SRAM is complex. Structure of DRAM is simple.
SRAM are expensive as DRAM are less expensive as
compared to DRAM. compared to SRAM.

2. What are Data Flow Graph and Control/Data Flow Graph (CDFG)? [N/D-16]
A Control/Data Flow Graph uses a data flow graph as an element, adding constructs to
describe control.
3. What is the bus protocols especially, the four-cycle handshake? (A/M – 14) (A/M – 18)
o Protocols are the set of rules and conditions for the data communication. The basic
building block of most bus protocols is the four-cycle handshake.
o Handshake ensures that when two devices want to communicate. One is ready to
transmit and other is ready to receive.
o The handshake uses a pair of wires dedicated to the handshake; such as enq (meaning
enquiry) and ack (meaning acknowledge). Extra wires are used for the data transmitted
during handshake.

4. What is a data flow graph? (A/M – 14)


A data flow graph is a model of a program with no conditions. In a high
level programming language, a code segment with no conditions and one entry point and
exit point.

5. What are CPU buses? (N/D – 13) (M/J – 13)


 Data bus
 Address bus
 Control bus
 System bus.

6. List out the various compilation techniques. (N/D – 13)


There are three types of compilation techniques:
• Analysis and optimization of execution time.
• Power energy and program size
• Program validation and testing.

7. State the basic principles of basic compilation techniques. (M/J – 13)


 Compilation combines translation and optimization.
 The high level language program is translated in to lower level form of instructions;
optimizations try to generate better instruction sequences.

Compilation = Translation + optimization

8. Name any two techniques used to optimize execution time of program. (N/D – 12)
 Instruction level optimization
 Machine independent optimization.
9. What does a linker do? (N/D – 12)
 A linker allows a program to be stitched together out of several smaller pieces.
 The linker operates on the object files created by the assembler and modifies the
assemble code to make the necessary links between files.

10. What are the four types of data transfer in USB? (M/J – 12)
 Control transfer
 Interrupt transfer
 Bulk transfer
 Isochronous transfer (sequence of data)

11. Give the limitation of polling techniques. (M/J – 12)


 It is wasteful of the processors time, as it needlessly checks the status of all devices all
the time.
 It is inherently slow, as it checks the status of all input/output devices before it comes
back to check any given one again.
 Priority of the device cannot be determined frequently.

12. Difference between Harvard and von neumann architecture (A/M – 18)
13. Define CDFG. List the nodes in it. (N/D – 18)
CDFG: Control/Data Flow Graph
A CDFG uses a data flow graph as an element, adding constructs to describe control.
The nodes in CDFG are
1. Decision nodes: Describes all types of control in a sequential program
2. Data flow nodes: Encapsulates a complete data flow graph to represent a basic block.

14.Define boot-block flash.


Most flash memories today allow certain blocks to be protected. A common application is
to keep the boot-up code in a protected block but allow updates to other memory blocks
on the device. As a result, this form of flash is commonly called as boot-block flash.
15.What is meant by SIMMs and DIMMs?
SIMM: Single In-line Memory Modules
DIMM: Double In-line Memory Modules
A SIMM or DIMM is a small circuit board that fits into a standard memory socket. A
DIMM has two sets of leads compared to SIMM’s one.
16.What is meant by PCI?
PCI: Peripheral Component Interconnect
PCI uses high speed data transmission techniques and efficient protocols to achieve high
throughput. The original PCI standard operates at a rate of 33 MHz which could achieve
a maximum transfer rate of 264Mbps using 64 bit transfers. The revised PCI standard
operates at a rate of 66MHz, giving a maximum transfer rate of 524 Mbps with 64 – bit
wide transfers.
17.Define BIOS.
BIOS: Basic Input/Output System
The software is designed to load the complete operating system from some other
device(disk, network…) and it may also provide low-level hardware interfaces. The low-
level software is called BIOS.
18.What is meant by USB and IEEE 1394?
USB(Universal Serial Bus) and IEEE 1394 are the two major high – speed serial buses.
Both of these buses offer high transfer rates using simple connectors. They also allow
devices to be chained together so that users don’t know about the order of devices on the
bus or other details of connection.
19.What is assembler, loader?
Assembler: when translating assembly code into object code, the assembler must translate
opcodes and format the bits in each instruction and translate labels into addresses.
Loader: the program that brings the main program into memory for execution called
loader.
20. List out how the program level performance is measured.
The 3 types of performance measures on programs are,
Average -case execution time.
Worst -case execution time.
Best -case execution time.
21. List out the several factors that contribute to the energy consumption of the system.
Energy consumption varies from instruction to instruction.
The sequence of instructions has some influence.
The opcode and the locations of the operands also matters.
22. What are the types of testing strategies?
Black-box methods generate tests without looking at the internal structure of the
program.
Clear – box (white - box) methods generate tests based on the program structure.

UNIT III PROCESSES AND OPERATING SYSTEMS UNIT-3


Part A

1. Define tasks and processes. [N/D-16]


.
Tasks: it is a set of computations or actions that process on a CPU under a control of the
scheduling kernel. It has process structure called task control block that serves at the
memory. It has unique id and states.
Processes: it is computational unit that process on a CPU under the control of a scheduling
kernel of an operating system. It has a process structure called process control block at the
memory
2. Write about scheduling states present in the embedded system design.
[N/D-16]
A process is in one of three basic scheduling states: waiting, ready, or executing.
There is at most one process executing on the CPU at any time.

3. Define the process states: Waiting, Ready and Executing. [A/M – 16]

Waiting: A process goes into the waiting state when it needs data that it has not yet
received or when it has finished all its work for the current period.
Ready: A process goes into ready state when it receives its required data and when
it enters a new period.
Executing: A process can go into the executing state only when it receives its
required data and when it enters a new period.

4. What are the strategies used for the power optimization in multiprocessing?
[A/M – 16]
The RTOS and system architecture can use static and dynamic power management
mechanisms to help manage the system’s power consumption. A power management
policy is a strategy for determining when to perform certain power management
operations. A power management policy in general examines the state of the system to
determine when to take actions. However, the strategy of the policy should be designed on
the characteristics of the static and dynamic power management.
5. What is a semaphore? (N/D – 15)
Any process that wants to access the memory must use the semaphore to ensure that
no other process is actively using it. As shown below the semaphore names by
tradition are P ( ) to gain access to the protected memory and V ( ) to release it.

6. Which should have lower over-head a pre-emptive or co-operative context switch


mechanism? (N/D – 15)
Pre-emptive switching uses interrupt service routine hence overheads during switching
increases than co-operative switching. A preemptive policy should have lower overhead
because when a new process arrives or interrupt occurs preemptive policies may incur
greater overhead which is desirable to maximize CPU utilization time and throughput, and
to minimize turnaround time, waiting time and response time.
7. How is a Real Time Operating Systems uniquely different than a general purpose
OS?
An RTOS is used for time critical systems. Example: VxWorks, uCos etc.A general
purpose OS is used for systems/applications that are not time critical. Example:
Windows, Linux, Unix etc.
8. Define: Multitasking. (N/D – 14)
Multitasking is the use of two or more central processing units (CPUs) within a single
computer system. The term also refers to the ability of a system to support more than
one processor and/or the ability to allocate tasks between them.

9. Give any two properties of Operating Systems. (N/D – 14)


Some of the properties of Operating Systems are
 Reliability,
 Predictability,
 Performance,
 Compactness and
 Scalability.

10. What are the major inter process communication mechanism? (A/M - 14)
 Shared memory communication
 Message passing.

11. Define – Context switching. (A/M - 14), (N/D - 13), (N/D - 12) (A/M-18)
A context switch is the computing process of storing and restoring of a CPU so that
execution can be resumed from the same point at a later time.
The context switching is an essential feature of multitasking operation system.
12. Define – Processes (N/D - 13)
A process is a single execution of a program. If we run the same program two
different times, we have created two different processes. Each process has its own
state that includes not only its register but also all of its memory.

13. List the process of scheduling policies. (M/J - 13)


 Cyclostatic scheduling
 Time division multiple access scheduling
 Round robin scheduling.

14. What is the use of interrupts service routines?(M/J - 12)


 Input/output data transfer for peripheral devices.
 Input signals to be used for timing purpose.
 Real time executives/multitasking
 Event driven program.

15. What are the three conditions that must be satisfied by the re-entrant function?
(M/J - 12)
A function is called re-entrant function when the following three conditions are
satisfied:
 All the arguments pass the values and some of the argument is a
pointer whenever a calling function calls it.
 When an operation is not atomic, the function should not operate on any
variable, which is declared but passed by reference not passed by argument s
in to the function.
 That function does not call any other function that is not itself re-entrant.
16. What is meant by priority inversion? (A/M-17)
The lowest priority process is executing while the highest priority process is waiting,
when the lowest priority process acquires semaphore and enters in to a critical section
which is shared and expected by higher priority process.
17. Define: Multitasking. (N/ D -14) (N/ D -18)
Multitasking, in an operating system, is allowing a user to perform more than one
computer task (such as the operation of an application program) at a time. The operating
system is able to keep track of where you are in these tasks and go from one to the other
without losing information.

18. What are the power optimization strategies used for processes? (A/M-13) (A/M-14)
 Avoiding a power-down mode can cost unnecessary power.
 Powering down too soon can cause severe performance penalties.
 Re-entering run mode typically costs a considerable amount of time.
 Predictive shutdown.
 Usage of ACPI – Advanced configuration and power interface.

19. Define Inter process Communication. (A/M-14)


An output from one task passed to another task through the scheduler and use of signals,
exception, semaphore, queues, mailbox, pipes, sockets, and RPC.

20. What is RMS? (N/ D -18)


It is a priority assignment algorithm used in real-time operating systems (RTOS) with a static-
priority scheduling class. The static priorities are assigned according to the cycle duration of
the job, so a shorter cycle duration results in a higher job priority.

21. What are the three entities of Interrupt handling in Windows CE?
Interrupt handling is divided among three entities:
• The interrupt service handler (ISH) is a kernel service that provides the first
response to the interrupt.
• The ISH selects an interrupt service routine (ISR) to handle the interrupt. The ISH
runs in the kernel with interrupts turned off; as a result, it should be designed to do as
little direct work as possible.
• The ISR in turn calls an interrupt service thread (IST) which performs most of the
work required to handle the interrupt. The IST runs in the OAL and so can be
interrupted by a higher-priority interrupt.

UNIT-IV SYSTEM DESIGN TECHNIQUES AND NETWORKS


Part A

1. What do you mean by quality and quality assurance related to embedded


systems? [N/D -16]
The quality of a product or service can be judged by how well it satisfies its intended function.
A product can be of low quality for several reasons, such as it was shoddily manufactured, its
components were improperly designed, its architecture was poorly conceived, and the
product’s requirements were poorly understood.
Quality must be designed in. the bugs cannot be tested enough to deliver a high- quality
product. The quality assurance (QA) process is vital for the delivery of a satisfactory system.

2. Give examples of internet enabled system. [N/D-16]

3. List the OSI layers from lowest to highest level of abstraction. (A/M – 14)
The OSI layers from lowest to highest level of abstraction are described below:
i. Physical layer ii. Data link layer iii. Network layer iv. Transport layer v. Session layer
vi. Presentation layer vii. Application layer.
4. What is a distributed embedded architecture? (A/M – 14)
In a distributed embedded system several processing elements are connected by a
network that allows them to communicate. More than one computer or group of
computer and PEs are connected via network that forms distributed embedded
systems.

5. What are the merits of embedded distributed architecture? (Nov/Dec 2012)


 Error identification is easier.
 It has more cost effective performance.
 Deadliness for processing the data is short.

6. Differentiate counter semaphore and binary semaphores. (May/June 2012)

Counter semaphores Binary semaphores


Which allows an arbitrary resource count Which are restricted to values
called counting. of 0 and 1 are called binary.
Synchronization of object that can Synchronization by two states
have (a) Not taken (b) Taken.
arbitrarily large number of states.

7. What is priority inheritance? (May/June 2012)


Priority inheritance is a method of eliminating priority inversion, using this a
process scheduling algorithm will increase the priority of a process to the maximum priority
of any process waiting for any resource on which the process has a resource lock.

8. What is role of CRC bit in can bus?(A/M-17)

To improve the error detection capability, the CAN FD protocol has introduced fixed stuff-bits in
the CRC field
9. List out some verification requirements related to design flow. (A/M-17)
• Name
• Purpose
• Inputs and outputs
• Functions
• Performance
• Manufacturing cost
• Power
• Physical size and weight.

10. Write the special characteristics of CRC cards. (N / D- 18)


CRC stands for Class, Responsibilities, and Collaborators
 A useful and popular technique for OO paradigm
 An index card annotated in a group setting to represent a class of objects, its behavior,
and its interactions
 Created in informal brainstorming sessions, wherein functions of the applications to be
modeled are simulated and the outcome is recorded on the cards.

11. List the difference between multistage and direct network. (N / D- 18)
A multistage network is a network for interconnecting a set of nodes through a switching fabric.
These nodes can either be programmable computers or memory blocks. The switching fabric
consists of a set of switches interconnected to form a topology with defined connection points for
the nodes.

12. What is the role played by the accelerator in the design of embedded system?
(N / D- 12) (A / M- 18)
An accelerator is attached to CPU buses to quickly execute certain key functions. Accelerators
can provide large performance increases for applications with computational kernels that spend a
great deal of time in a small section of code. Accelerators can also provide critical speedups for
low-latency I/O functions.
13. What are the goals of design process in embedded systems?
 Perform a single specific task.
 Time bounded.
 Contains atleast one programmable unit. (micro-controller)
 Runs a single program.
 Minimum cost

14. Define Concurrent engineering.


Concurrent engineering, also known as simultaneous engineering, is a method of designing and
developing products, in which the different stages run simultaneously, rather than consecutively.

15. What is mean by PCB?


The process control block stores the register content also known as execution content of the
processor when it was blocked from running. This execution content architecture enables the
operating system to restore a process's execution context when the process returns to the running
state.

16. Define Mutex.


A mutual exclusion object (mutex) is a program object that allows multiple program threads to
share the same resource, such as file access, but not simultaneously.

17. Define Semaphore.


A semaphore is a synchronization construct that can be used to provide mutual exclusion and
conditional synchronization. From another perspective, a semaphore is a shared object that can
be manipulated only by two atomic operations, P and V.

18. What is deadloack situation?


A deadlock is a situation in which two computer programs sharing the same resource are
effectively preventing each other from accessing the resource, resulting in both programs ceasing
to function. The earliest computer operating systems ran only one program at a time.
19. Define message Queue.
A message queue is a queue of messages sent between applications. It includes a sequence of
work objects that are waiting to be processed.

20. What is shared data problem?


The shared data problem occurs when several functions (or ISRs or tasks) share a variable.
Shared data problem can arise in a system when another higher priority task finishes an operation
and modifies the data or a variable before the completion of previous task operations.
UNIT-V CASE STUDY
Part A
1. Specify the MPEG layer 1 data frame format set for the audio player
application. [N/D - 16]

MPEG audio puts header in each of the frame, so that they can
be decoded separately.

2. What are the classes in data compressor? [N/D-16]


3. What is a PDA? (A/M – 14)
PDA (Personal Digital Assistant) is a device that can be used to receive,
display and transcribe information. PDA can run a wide variety of
applications.

4. What is a set-top box or STB or STU? (A/M – 14)


A set top box (STB) or set top unit (STU) is an information appliance
device that generally contains a tuner and connects to a television set
and an external source of signal, turning the source signal into content in a
form that can then be displayed on the television screen or other display
device.
Uses: Cable television and satellite television system.

5. Write short notes on H/W and S/W co-design. (N/D – 13)


Embedded systems architecture design is the task of selecting and
programming a suitable configuration of components for a required system
application. Building an embedded system is not an easy task. Every
embedded system consists of an embedded hardware and embedded
software.
So software and hardware plays a main role in design of embedded
system architecture.
Need For Co-Design :
 Co-design refers to parallel or concurrent development of hardware and software for
an embedded system.
 Co-design reduces the overall design and development cycle of the embedded
system.
 It helps the designer to find the bugs at early stage.
 It also reduces the number of errors, particularly at the hardware-software interface
level.
6. What are FOSS tools for embedded systems? (N/D – 13) (M/J – 13)
GNU Compiler Collection (GCC) and GNU debugger (GDB) are the most
popular FOSS (Free and open source) tools used in embedded systems.

7. List the major components in the Personal Digital Assistant System?


(M/J 2013)
 Process or memory
 Connectivity
 Power management unit
 User interface.

8. Why most designers use FOSS tools in embedded system development? (N/D
– 12)
Most o f the designers use FOSS tools in embedded system
development because,
 It makes sofware portable.
 It speeds up the development process
 It provides good foundation for system development activities.

9. What is signal servicing function? (M/J – 12)


The signal service is a bureau of the government organized to collect from
the whole country simultaneously report to local metrological condition
upon comparison of which at certain office, predictions concerning the weather
are telegraphed to various sections also known as signal publicity display.

10. Give the steps to destroy a message queue. (M/J – 12)


First delete the entire element in a message queue.
Check if Front = rear = -1, then queue is empty.
Otherwise, now call a delete routine to destroy a message queue.

11. List out the advantages of set-top-box. (A/ M-14) (N/D-13)

The advantages of set-top box are:


 Digitization of video signals (HD quality).
 Number of channels increased to a great extent.
 Huge improvement in picture quality.
 No sorts of disturbance.
 We can watch what we want.

12. What is data compressor? (A/M-18)


Data compressor is a system that do the process of modifying, encoding or converting the
bits structure of data in such a way that it consumes less space on disk.

13. Define software MODEM.


A software modem is a low-cost alternative to a standard hardware-based modem. While
hardware modems contain all the parts necessary to connect to the internet, the software
version transfers some of that work to the computer's processor.
14. Define SOC.
Embedded systems are being designed on a single silicon chip called system on chip.
SOC is a new design innovation for embedded system Ex. Mobile phone.
15. Write the requirement form for an alarm clock. (A/M-17)

16. What is the advantages of video accelerator? (A/M-17)


This provides for an unusual level of programmability and flexibility.

17. State the features of FSK detection scheme in Modem? (N/D-18)


FSK modulation scheme, it is sufficient to detect signal transitions and to sample the
input signal in the middle between two transitions. For more efficient schemes, special
encodings like Manchester or NRZI (non-return-to-zero inverted) codes are used to
ensure that the clock signal can be recovered reliably.

18. Which compression technique is used in telephone answering machine? (N/D-18)


The compression scheme we will use is known as adaptive differential pulse code
modulation (ADPCM).

19. What do you mean by hardware accelerator?


An accelerator is attached to CPU buses to quickly execute certain key functions.
Accelerators can provide large performance increases for applications with computational
kernels that spend a great deal of time in a small section of code. Accelerators can also
provide critical speedups for low-latency I/O functions.

20. Define Data Compression.


Reducing the 'electronic space' (data bits) used in representing a piece of information, by
eliminating the repetition of identical sets of data bits (redundancy) in an audio/video,
graphic, or text data file.

Das könnte Ihnen auch gefallen