You are on page 1of 18
Modus —t 2) (a) Bua aad) explain ter pyme gular Mie. GA i'l diag nam oh ain ambedded dyhewa akichitesturce - (6) = Srp duviens [inka city r divign dings hte {a = | eee ae | Suey eer ee ee ee a O/p devices \fe daviees, dine ok OPeapot= the prcersex Js Ae teait oh embedded hypshew The Ackeckion of ~prsewrsos is Aored en the JoUleasing towiduuotion © OPndruclion ack. @ Maximum bids of &pexation en aingle wudhmeH ec amd Jegieal epanotion 5 OSpad . OMe escdhons “precuring and capably i a OT gps sf puroeres( Posen ene a pricrecmets.,. igdal Bignal bsccrron, abblicalion rypeeilie prowmen, al “Pe a... : athe pris — Ofc See Drdunal pour nupple ds must. Bs deg ule trom pont up she pou deusn te starct die dark Oct [eli Cinoschs:— Tu cask hf ayaa fo fo oe cru machine aydes clack a Rial ste Hime BO erie, yok: lok wllcegimigtag io! em MAX | ANANYA Module-J (2080) ae) Sole land wrblain the borie yenualiaad bio ck Maguar ‘a an Aah eocbedded ruption cnelit ectute . (A) —> 2049 OW - ; a a and dircius with Mannan Abe anelitedinu of a amd C2$e embedded ayphaind (4 Rose Rose Aschichechine Redued Dishicetion Set Campilne (RISC) Hs a mremepuoerrior dot Js dostaned te capuiy cuit few ivotuucliows ad a slwilas dint Boned an vmnall exvomands, , Alert chips mad few Juavtows , whieh makes tu tuansitens, Jneypumblve Se dari gn ond pucduce « r Fecktine of RESO Othe demand Lore decoding ds Joss, @ fas data hypo dn Nradesosre S @ frenenal — purport sag his Dadoudt eal . ® Unifasun Uwhuchon seb. Simple ing w { Ale, while a Rog bs oe i tn Me Homm, RIIC m J y Jat % she Combitas pa domme eliminate dud Chorsiclointies got 0 Ow cu de sornce ten ty. DSimploe immruction benw Almble totruclo, deogding » odlvy e ® ee unduvige Meek ed bears elas jceaittos~ aie adduumig : fous dota dup «AD A pipeline aanbe aelieved . Case Auchite clue — : ota vs oPU driqn plo, | lew Dyitiruoltod Gok @ @ di b om dangle cc Gusts reed dim ureeuting omelet — sep Shennttons « ( Cage comp ctines thetye: “een pueguanmh « BE has Alan, neumlos of combeund inaiiuell out, uslich take a None Hut. Ae -pdforun Hui, a rtngle puch of inpuenons isp xct. ci.) wm avvenal hepa § ack dwstuuetion at has am Additional | shan Seo porate ivitiieltens , Maximum Ariel ony any Spied din shuse: de. don mocline cycles: Mr C98 ce , inthiuetion pipelining bs net seanily twiplomeinted : Late 90M 70/488, VAx44]a0, Datil Goqge Chouadluscistics = (D) Commplen twitiuetion, lente lex Jntiuotion ducsdivg - e Odratinctiows au langue shan CE Word rise. ® Dyxtructon at ales oma se Ahan a png SE f saabyhsie. om e de qc nected - : y ra tems numbix of qureial< purpose gpasectons aah parfeuoned dn wares doy! “ @ Compler Add suming Mads D Masu data ichypes | 12 | Enumerate functional requirements of embedded system t Functional requirements for embedded systems can vary depending on the specific application, but some common functional requirements include: 1. Real-time performance: The ability to respond to external events and execute specific tasks within a specific time frame. 2. Input/Output (I/O) handling: The ability to accept input from sensors and other external devices, process the input, and control output devices such as actuators and displays. SS displays. 3. Memory management: The ability to efficiently manage the limited memory resources of the embedded system. 4. Communication: The ability to communicate with other devices or systems, such as over a network or serial interface. 5. Power management: The ability to efficiently manage the limited power resources of the embedded system. 6. Error handling: The ability to detect and handle errors and exceptions that may occur during the operation of the system. 7. Security: The ability to protect the svstem from unauthorized 10. 11. 12. the system from unauthorized access or tampering. . Scalability: The ability to easily add new features or functionality to the system. . Reliability: The ability to perform its intended function without failure for a specified period of time. Maintainability: The ability to easily maintain and update the system over its lifetime. Portability: The ability to easily adapt the system to different hardware and software platforms. Cost-effectiveness: The ability to meet the functional requirements within the budget constraints. Write a set of RISC instructions to load two registers with data and then add the data present in the registers Here is a set of RISC (Reduced Instruction Set Computer) instructions that can be used to load two registers with data and then add the data present in the registers: (2) Copy code ; Load register R1 with data value Cha ; Load register R2 with data value LUI R2, ; Add the contents of R1 and R2 and store the result in R3 R3 R3, R1, R2 The first instruction is LUI (Load Upper Immediate) it loads the upper bits of the data value into the specified register. In this case, the value 0x1234 is loaded into register R1. The second instruction is also LUI it loads the upper bits of the data value into the specified register. In this case, the value 0x5678 is loaded into register R2. The third instruction is ADD (Add) it adds the contents of two registers and stores the result in the specified register. In this case it adds the contents of R1 case, it adds the contents of R1 and R2 and stores the result in R3. These instructions are specific to a certain RISC architecture, and the exact instructions and syntax may vary depending on the specific processor architecture. Additionally, these instructions may not be available on all RISC architectures and some architectures may have different instructions to perform the same functionality. 1: | What are ASICs? When are ASICs used in an embedded system? ASICs (Application Specific Integrated Circuits) are integrated circuits that are specifically designed and manufactured for a specific application or use case. Unlike general-purpose microcontrollers and processors, ASICs are tailored to the specific requirements of the application and can be optimized for performance, power consumption, and cost. ASICs are commonly used in embedded systems when: 1. High performance is required: ASICs can be optimized for Vv ASICs can be optimized for performance by utilizing custom logic gates and specialized circuits, which can provide faster and more efficient execution of the embedded system's tasks. 2. Low power consumption is required: ASICs can be designed to consume less power than general-purpose microcontrollers and processors, which can extend the battery life of the embedded system. 3. Cost-effectiveness is required: ASICs can be manufactured in high volume at a lower cost than general-purpose microcontrollers and nraracenre wthich can mala ee processors, which can make them a cost-effective solution for embedded systems. 4. Custom functionality is required: ASICs can be tailored to the specific requirements of the application, which can allow the embedded system to have custom functionality that is not available on general- purpose microcontrollers and processors. 5. Security is required: ASICs can incorporate specific security features and protocols that can protect the embedded system from unauthorized access and tampering. It's important to note that ASICs SaaS 5. Security is required: ASICs can incorporate specific security features and protocols that can protect the embedded system from unauthorized access and tampering. It's important to note that ASICs are a specialized solution that is appropriate for certain types of embedded systems, but not for all. They can be more expensive to design and develop compared to using general-purpose microcontrollers and processors, and the design process requires specialized expertise. How would you implement pipelining technique to execute instructions in an RISC Architecture Pipelining is a technique used to improve the performance of a processor by allowing multiple instructions to be executed simultaneously in different stages of the pipeline. In a RISC (Reduced Instruction Set Computer) architecture, pipelining can be implemented by dividing the instruction execution process into several stages, such as fetch, decode, execute, and writeback, and allowing different instructions to be executed in parallel in each stage. Here is a general overview of how v —_———— a... Here is a general overview of how pipelining can be implemented in a RISC architecture: 1. Fetch: In this stage, the instruction to be executed is fetched from memory and loaded into an instruction register. 2. Decode: In this stage, the instruction is decoded to determine the operation to be performed, and the operands are identified. 3. Execute: In this stage, the operation specified by the instruction is executed, and the results are computed. 4. Writeback: In this stage, the results of the instruction are written back to memory or a ee written back to memory or a register. 5. Repeat: The pipeline then repeats the process by fetching the next instruction and moving it through the pipeline. Each instruction is moved through the pipeline stages simultaneously and each stage performs its operation on the instruction. This allows multiple instructions to be executed in parallel, which can significantly improve the performance of the processor. It's important to note that the implementation of pipelining in RISC architecture may vary It's important to note that the implementation of pipelining in RISC architecture may vary depending on the specific architecture. Additionally, to achieve optimal performance, it's also important to consider hazards such as data dependency and structural hazards, and to include specific instructions and mechanisms to handle them.

You might also like