SlideShare a Scribd company logo
Ararat Private Technical Institute
Dep. of Computer systems
Operating System | Second Stage
Embedded Systems
2022-2023
Author: Lecturer:
Ahmed N. Younis Mrs. Zina Bibo
-
1
Main Content Page
Introduction............................................................................................................................2
Designing................................................................................................................................2
Programming requires...........................................................................................................3
Testing reliability....................................................................................................................3
Challenges Development.......................................................................................................4
Future of Embedded Systems...............................................................................................5
References..............................................................................................................................6
-
2
Introduction
Embedded systems are a combination of hardware and software that perform specific
functions within larger systems. They are designed to be reliable, efficient, and low-cost while
still providing the necessary functionality.
Embedded systems are used in a variety of applications, including automotive, medical
devices, and consumer electronics. With the increasing demand for smart devices, the use of
embedded systems is becoming more widespread. Its components follow a set of rules to
show time. If one of its parts fails, the watch will stop working. So we can say, in a system, all
its subcomponents depend on each other. [1]
Designing
The design of embedded systems involves selecting the appropriate hardware and software
components to meet the requirements of the application. This includes choosing
microcontrollers, sensors, communication modules, and power sources.
Once the components have been selected, they must be integrated into a cohesive system.
This involves designing the circuit board layout, writing firmware code, and testing the system
to ensure it meets the desired specifications.
As its name suggests, Embedded means something that is attached to another thing. An
embedded system can be thought of as a computer hardware system having software
embedded in it. An embedded system can be an independent system or it can be a part of a
large system. An embedded system is a microcontroller or microprocessor based system
which is designed to perform a specific task. For example, a fire alarm is an embedded
system; it will sense only smoke. [2]
An embedded system has three components:
-It has hardware.
-It has application software.
-It has Real Time Operating system (RTOS) that supervises the application software and
provide mechanism to let the processor run a process as per scheduling by following a plan
-
3
Programming requires
Programming embedded systems requires knowledge of both hardware and software.
Firmware code is typically written in C or C++, and must be optimized for size, speed, and
power consumption.
Debugging embedded systems can be challenging due to the limited resources available for
debugging. Techniques such as print statements, LED indicators, and logic analyzers are
commonly used to debug embedded systems.
Experience in or ability to learn communication protocols. Relevant protocols to have at least
an understanding of include I2C, Serial Peripheral Interface (SPI), USB, General-purpose
input/output (GPIOs), Controller Area Network (CAN bus), Recommended Standard 232
(RS232), one-wire, Recommended Standard 485 (RS485). [3]
Testing reliability
Testing embedded systems is critical to ensuring their reliability and functionality.
Testing can be done at various stages of the development process, including unit
testing, integration testing, and system testing.
Automated testing is often used to improve efficiency and reduce errors. Techniques
such as boundary value analysis, equivalence partitioning, and stress testing can help
identify potential issues in the system.
Use the environment simulator for simulating different operational scenarios of the
hardware. Based on the operational scenarios, we predict the reliability and availability
of the system using the test results. Four important aspects covered in this prediction
approach are: 1) developing a method for system reliability and availability prediction
using environment modeling and simulation technique, 2) considering software-related
hardware and hardware-related software interaction failures. [4]
-
4
Challenges Development
Developing embedded systems can be challenging due to the complexity of the
hardware and software. Additionally, there are often constraints on resources such as
memory, processing power, and energy consumption.
Another challenge is ensuring the security of embedded systems, especially in
applications such as medical devices and industrial control systems. Cybersecurity
threats must be considered throughout the development process to prevent
unauthorized access or malicious attacks.
Mostly Embedded systems are present everywhere. We use it in our everyday life
unknowingly as in most cases it is integrated into the larger systems. So here are some
of the application areas of embedded systems:
 Home appliances
 Transportation
 Health care
 Business sector & offices
 Defense sector
 Aerospace
 Agricultural Sector
-
5
Future of Embedded Systems
Android is an open source operating system whose codes developers can change to build
customized User Interface. App developers building applications for this platform can get
access to the core codes.
Users with Android are spoilt for choice of smartphone devices of different prices. There is
something for people across all budget spectrum when it comes to smartphones running on
Android. A wide range of devices run on this OS including smartphones, tablets, watches,
audio players, TVs and PCs.
One of the biggest advantages of using devices running on Android platform is that it supports
expandable memory. Other devices on the other hand do not support external memory
expansion by adding memory card to the phone.
It is given to users the freedom to download 3rd party widgets and also display their content
on the home screen. [5]
-
6
References
1. https://www.sciencedirect.com/science/article/abs/pii/S1569190X20301763
2. https://www.embedded.com/self-testing-in-embedded-systems-hardware-failure/
3. https://ieeexplore.ieee.org/document/5541047
4. https://en.wikipedia.org/wiki/Embedded_system
5. https://www.coursera.org/learn/introduction-embedded-systems

More Related Content

Similar to Embedded System.pdf

Software Engineering
 Software Engineering  Software Engineering
Software Engineering
JayaKamal
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile Device
IRJET Journal
 
ARDUINO EMBEDDED SYSTEM
ARDUINO EMBEDDED SYSTEMARDUINO EMBEDDED SYSTEM
ARDUINO EMBEDDED SYSTEM
Vishal GARG
 
ES-Basics.pdf
ES-Basics.pdfES-Basics.pdf
ES-Basics.pdf
Srisurya26
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital Age
IJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
IJCSEA Journal
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptx
SattiBabu16
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino board
IRJET Journal
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
IRJET Journal
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
Rick Vogel
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
SamehMostafa33
 
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
rohithraj3101
 
What You Need to Know About Embedded Software Development Company.docx
What You Need to Know About Embedded Software Development Company.docxWhat You Need to Know About Embedded Software Development Company.docx
What You Need to Know About Embedded Software Development Company.docx
AdequateInfosoft1
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
Amr E. Mohamed
 
Application Development for the Embedded Systems
Application Development for the Embedded SystemsApplication Development for the Embedded Systems
Application Development for the Embedded Systems
Logic Fruit Technologies
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
 

Similar to Embedded System.pdf (20)

Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile Device
 
ARDUINO EMBEDDED SYSTEM
ARDUINO EMBEDDED SYSTEMARDUINO EMBEDDED SYSTEM
ARDUINO EMBEDDED SYSTEM
 
ES-Basics.pdf
ES-Basics.pdfES-Basics.pdf
ES-Basics.pdf
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital Age
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptx
 
IoT Based home automation system using Arduino board
IoT Based home automation system using Arduino boardIoT Based home automation system using Arduino board
IoT Based home automation system using Arduino board
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
The Comprehensive Guide to Embedded Systems Architecture: Building Blocks, De...
 
What You Need to Know About Embedded Software Development Company.docx
What You Need to Know About Embedded Software Development Company.docxWhat You Need to Know About Embedded Software Development Company.docx
What You Need to Know About Embedded Software Development Company.docx
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 
Application Development for the Embedded Systems
Application Development for the Embedded SystemsApplication Development for the Embedded Systems
Application Development for the Embedded Systems
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Embedded System.pdf

  • 1. Ararat Private Technical Institute Dep. of Computer systems Operating System | Second Stage Embedded Systems 2022-2023 Author: Lecturer: Ahmed N. Younis Mrs. Zina Bibo
  • 2. - 1 Main Content Page Introduction............................................................................................................................2 Designing................................................................................................................................2 Programming requires...........................................................................................................3 Testing reliability....................................................................................................................3 Challenges Development.......................................................................................................4 Future of Embedded Systems...............................................................................................5 References..............................................................................................................................6
  • 3. - 2 Introduction Embedded systems are a combination of hardware and software that perform specific functions within larger systems. They are designed to be reliable, efficient, and low-cost while still providing the necessary functionality. Embedded systems are used in a variety of applications, including automotive, medical devices, and consumer electronics. With the increasing demand for smart devices, the use of embedded systems is becoming more widespread. Its components follow a set of rules to show time. If one of its parts fails, the watch will stop working. So we can say, in a system, all its subcomponents depend on each other. [1] Designing The design of embedded systems involves selecting the appropriate hardware and software components to meet the requirements of the application. This includes choosing microcontrollers, sensors, communication modules, and power sources. Once the components have been selected, they must be integrated into a cohesive system. This involves designing the circuit board layout, writing firmware code, and testing the system to ensure it meets the desired specifications. As its name suggests, Embedded means something that is attached to another thing. An embedded system can be thought of as a computer hardware system having software embedded in it. An embedded system can be an independent system or it can be a part of a large system. An embedded system is a microcontroller or microprocessor based system which is designed to perform a specific task. For example, a fire alarm is an embedded system; it will sense only smoke. [2] An embedded system has three components: -It has hardware. -It has application software. -It has Real Time Operating system (RTOS) that supervises the application software and provide mechanism to let the processor run a process as per scheduling by following a plan
  • 4. - 3 Programming requires Programming embedded systems requires knowledge of both hardware and software. Firmware code is typically written in C or C++, and must be optimized for size, speed, and power consumption. Debugging embedded systems can be challenging due to the limited resources available for debugging. Techniques such as print statements, LED indicators, and logic analyzers are commonly used to debug embedded systems. Experience in or ability to learn communication protocols. Relevant protocols to have at least an understanding of include I2C, Serial Peripheral Interface (SPI), USB, General-purpose input/output (GPIOs), Controller Area Network (CAN bus), Recommended Standard 232 (RS232), one-wire, Recommended Standard 485 (RS485). [3] Testing reliability Testing embedded systems is critical to ensuring their reliability and functionality. Testing can be done at various stages of the development process, including unit testing, integration testing, and system testing. Automated testing is often used to improve efficiency and reduce errors. Techniques such as boundary value analysis, equivalence partitioning, and stress testing can help identify potential issues in the system. Use the environment simulator for simulating different operational scenarios of the hardware. Based on the operational scenarios, we predict the reliability and availability of the system using the test results. Four important aspects covered in this prediction approach are: 1) developing a method for system reliability and availability prediction using environment modeling and simulation technique, 2) considering software-related hardware and hardware-related software interaction failures. [4]
  • 5. - 4 Challenges Development Developing embedded systems can be challenging due to the complexity of the hardware and software. Additionally, there are often constraints on resources such as memory, processing power, and energy consumption. Another challenge is ensuring the security of embedded systems, especially in applications such as medical devices and industrial control systems. Cybersecurity threats must be considered throughout the development process to prevent unauthorized access or malicious attacks. Mostly Embedded systems are present everywhere. We use it in our everyday life unknowingly as in most cases it is integrated into the larger systems. So here are some of the application areas of embedded systems:  Home appliances  Transportation  Health care  Business sector & offices  Defense sector  Aerospace  Agricultural Sector
  • 6. - 5 Future of Embedded Systems Android is an open source operating system whose codes developers can change to build customized User Interface. App developers building applications for this platform can get access to the core codes. Users with Android are spoilt for choice of smartphone devices of different prices. There is something for people across all budget spectrum when it comes to smartphones running on Android. A wide range of devices run on this OS including smartphones, tablets, watches, audio players, TVs and PCs. One of the biggest advantages of using devices running on Android platform is that it supports expandable memory. Other devices on the other hand do not support external memory expansion by adding memory card to the phone. It is given to users the freedom to download 3rd party widgets and also display their content on the home screen. [5]
  • 7. - 6 References 1. https://www.sciencedirect.com/science/article/abs/pii/S1569190X20301763 2. https://www.embedded.com/self-testing-in-embedded-systems-hardware-failure/ 3. https://ieeexplore.ieee.org/document/5541047 4. https://en.wikipedia.org/wiki/Embedded_system 5. https://www.coursera.org/learn/introduction-embedded-systems