EC 6703 2marks QB Upto Nov 2018
EC 6703 2marks QB Upto Nov 2018
EC 6703 2marks QB Upto Nov 2018
6. List the functions of ARM processor in supervisor mode. (M / J-13) (AM – 14)
(A/M-18) (N/D -18)
The various functions of ARM processor in supervisor modes are:
• Exception
• Prioritization
• Vectoring
• Traps.
7. Enumerate various issues in real time computing. (ND – 13)
The various issues in RT computing is:
• Real -time Response
• Recovering from failures
• Working with distributed architecture
• Asynchronous communication
• Race condition and timing.
8. Write short notes on ARM processor. (ND – 13)
ARM – Advanced RISC Machine. (It is an 32-bit Microprocessor).
ARM is actually a family of RISC architectures that have been developed over many years.
The ARM is a 32-bit Reduced Instruction Set Computer (RISC) instruction set architecture
developed by Arm holdings.
ARM processor is mad suitable for Low power application.
9. What is the Instruction set features useful for embedded programming? (MJ
– 13)
Instruction Sets can have a variety of characteristics/features including:
• Fixed versus variable length
• Addressing modes
• Number of operands
• Types of operations supported.
10. What are the parameters used to evaluate the CPU performance?
(MJ – 13)
• Pipelining and
• Caching.
11. What is function of exceptions? (ND – 12)
(MJ – 15)
The function of exceptions is to stop the CPU from executing the program and produce an
error message to the user when, unexpected inputs are given as operands for any instruction.
For example, when division process is done, you cannot have the denominator as zero.
12. How is ARM processor different from other processors?
(ND – 12)
• ARM is RISC (Reduced Instruction Set Computing) architecture while other processor
being a CISC (Computer Instruction Set Computing) one.
• In the ARM processor, arithmetic and logical operations cannot be perform directly
on memory locations, while other processors allow such operations to directly reference
main memory.
13. When is application specific system processor (ASSPs) used in a embedded systems?
MJ – 12)
ASSP is a processing unit for specific task and for specific application. In embedded system
for example image compression and that is integrated through the buses with the main
processor in an embedded system.
14. What are the various in embedded system designs modeling refining (or)
partitioning? (MJ – 12)
i. Structural modeling
ii. Behavior modeling
iii. State machine modeling
iv. Process algebra modeling
v. Logic based modeling
vi. Petri-nets modeling.
15. What are the factors which governs the performance of a CPU?
Frequency of the CPU
Number of cores
Speed of memory bus
Word width
Information architecture
Size of local cache
Interrupt design (DMA / IRQ) and
Message passing.
16. How TRAPS are handled in ARM processor? (N/D – 17)
Traps are handled by the processor through the same mechanism as interrupts, although their
meaning is quite different.
17. What are the real-time requirements of embedded systems?
Hard-real time systems: where there is a high penalty for missing a deadline e.g., control
systems for aircraft/space probes/nuclear reactors; refresh rates for video, or DRAM.
Soft real-time systems: where there is a steadily increasing penalty if a deadline is missed.
e.g., laser printer: rated by pages-per-minute, but can take differing times to print a page
(depending on the \"complexity\" of the page) without harming the machine or the customer.
18. What are the basic sources of cmos power consumption? (A/M-18)
Dynamic, short-circuit, static, and leakage power
19. What is the bus protocol especially, the four –cycle hand shakes? (A/M-14) (A/M-
17)
i. Device 1 raises its output to signal an enquiry, which tells device 2 that it should get
ready to listen for data.
ii. When device 2 is ready to receive, it raises its output to signal an acknowledgement.
At this point, devices 1 and 2 can transmit or receive.
iii. Once the data transfer is complete, device 2 lowers its output, signalling that it has
received the data.
iv. After seeing that ack has been released, device 1 lowers its output.
20. Define DCC standard.
The DCC standard is given in two documents
1. Standard S-9.1, the DCC electrical standard, defines how bits are encoded on the rails
for transmission.
2. Standard S-9.2, the DCC communication standard, defines the packets that carry
information.
24. What are the parameters used to evaluate the CPU performance?
The parameters that influence the performance of a CPU are:
Pipelining
Caching
2. What are Data Flow Graph and Control/Data Flow Graph (CDFG)? [N/D-16]
A Control/Data Flow Graph uses a data flow graph as an element, adding constructs to
describe control.
3. What is the bus protocols especially, the four-cycle handshake? (A/M – 14) (A/M – 18)
o Protocols are the set of rules and conditions for the data communication. The basic
building block of most bus protocols is the four-cycle handshake.
o Handshake ensures that when two devices want to communicate. One is ready to
transmit and other is ready to receive.
o The handshake uses a pair of wires dedicated to the handshake; such as enq (meaning
enquiry) and ack (meaning acknowledge). Extra wires are used for the data transmitted
during handshake.
8. Name any two techniques used to optimize execution time of program. (N/D – 12)
Instruction level optimization
Machine independent optimization.
9. What does a linker do? (N/D – 12)
A linker allows a program to be stitched together out of several smaller pieces.
The linker operates on the object files created by the assembler and modifies the
assemble code to make the necessary links between files.
10. What are the four types of data transfer in USB? (M/J – 12)
Control transfer
Interrupt transfer
Bulk transfer
Isochronous transfer (sequence of data)
12. Difference between Harvard and von neumann architecture (A/M – 18)
13. Define CDFG. List the nodes in it. (N/D – 18)
CDFG: Control/Data Flow Graph
A CDFG uses a data flow graph as an element, adding constructs to describe control.
The nodes in CDFG are
1. Decision nodes: Describes all types of control in a sequential program
2. Data flow nodes: Encapsulates a complete data flow graph to represent a basic block.
3. Define the process states: Waiting, Ready and Executing. [A/M – 16]
Waiting: A process goes into the waiting state when it needs data that it has not yet
received or when it has finished all its work for the current period.
Ready: A process goes into ready state when it receives its required data and when
it enters a new period.
Executing: A process can go into the executing state only when it receives its
required data and when it enters a new period.
4. What are the strategies used for the power optimization in multiprocessing?
[A/M – 16]
The RTOS and system architecture can use static and dynamic power management
mechanisms to help manage the system’s power consumption. A power management
policy is a strategy for determining when to perform certain power management
operations. A power management policy in general examines the state of the system to
determine when to take actions. However, the strategy of the policy should be designed on
the characteristics of the static and dynamic power management.
5. What is a semaphore? (N/D – 15)
Any process that wants to access the memory must use the semaphore to ensure that
no other process is actively using it. As shown below the semaphore names by
tradition are P ( ) to gain access to the protected memory and V ( ) to release it.
10. What are the major inter process communication mechanism? (A/M - 14)
Shared memory communication
Message passing.
11. Define – Context switching. (A/M - 14), (N/D - 13), (N/D - 12) (A/M-18)
A context switch is the computing process of storing and restoring of a CPU so that
execution can be resumed from the same point at a later time.
The context switching is an essential feature of multitasking operation system.
12. Define – Processes (N/D - 13)
A process is a single execution of a program. If we run the same program two
different times, we have created two different processes. Each process has its own
state that includes not only its register but also all of its memory.
15. What are the three conditions that must be satisfied by the re-entrant function?
(M/J - 12)
A function is called re-entrant function when the following three conditions are
satisfied:
All the arguments pass the values and some of the argument is a
pointer whenever a calling function calls it.
When an operation is not atomic, the function should not operate on any
variable, which is declared but passed by reference not passed by argument s
in to the function.
That function does not call any other function that is not itself re-entrant.
16. What is meant by priority inversion? (A/M-17)
The lowest priority process is executing while the highest priority process is waiting,
when the lowest priority process acquires semaphore and enters in to a critical section
which is shared and expected by higher priority process.
17. Define: Multitasking. (N/ D -14) (N/ D -18)
Multitasking, in an operating system, is allowing a user to perform more than one
computer task (such as the operation of an application program) at a time. The operating
system is able to keep track of where you are in these tasks and go from one to the other
without losing information.
18. What are the power optimization strategies used for processes? (A/M-13) (A/M-14)
Avoiding a power-down mode can cost unnecessary power.
Powering down too soon can cause severe performance penalties.
Re-entering run mode typically costs a considerable amount of time.
Predictive shutdown.
Usage of ACPI – Advanced configuration and power interface.
21. What are the three entities of Interrupt handling in Windows CE?
Interrupt handling is divided among three entities:
• The interrupt service handler (ISH) is a kernel service that provides the first
response to the interrupt.
• The ISH selects an interrupt service routine (ISR) to handle the interrupt. The ISH
runs in the kernel with interrupts turned off; as a result, it should be designed to do as
little direct work as possible.
• The ISR in turn calls an interrupt service thread (IST) which performs most of the
work required to handle the interrupt. The IST runs in the OAL and so can be
interrupted by a higher-priority interrupt.
3. List the OSI layers from lowest to highest level of abstraction. (A/M – 14)
The OSI layers from lowest to highest level of abstraction are described below:
i. Physical layer ii. Data link layer iii. Network layer iv. Transport layer v. Session layer
vi. Presentation layer vii. Application layer.
4. What is a distributed embedded architecture? (A/M – 14)
In a distributed embedded system several processing elements are connected by a
network that allows them to communicate. More than one computer or group of
computer and PEs are connected via network that forms distributed embedded
systems.
To improve the error detection capability, the CAN FD protocol has introduced fixed stuff-bits in
the CRC field
9. List out some verification requirements related to design flow. (A/M-17)
• Name
• Purpose
• Inputs and outputs
• Functions
• Performance
• Manufacturing cost
• Power
• Physical size and weight.
11. List the difference between multistage and direct network. (N / D- 18)
A multistage network is a network for interconnecting a set of nodes through a switching fabric.
These nodes can either be programmable computers or memory blocks. The switching fabric
consists of a set of switches interconnected to form a topology with defined connection points for
the nodes.
12. What is the role played by the accelerator in the design of embedded system?
(N / D- 12) (A / M- 18)
An accelerator is attached to CPU buses to quickly execute certain key functions. Accelerators
can provide large performance increases for applications with computational kernels that spend a
great deal of time in a small section of code. Accelerators can also provide critical speedups for
low-latency I/O functions.
13. What are the goals of design process in embedded systems?
Perform a single specific task.
Time bounded.
Contains atleast one programmable unit. (micro-controller)
Runs a single program.
Minimum cost
MPEG audio puts header in each of the frame, so that they can
be decoded separately.
8. Why most designers use FOSS tools in embedded system development? (N/D
– 12)
Most o f the designers use FOSS tools in embedded system
development because,
It makes sofware portable.
It speeds up the development process
It provides good foundation for system development activities.