module 1_ ES notes
module 1_ ES notes
BEC601
Introduction to Embedded System
E.g. Electronic Toys, Mobile Handsets, Washing Machines, Air Conditioners, Automotive
Control Units, Set Top Box, DVD Player etc…
➢ The Embedded System and the General-purpose computing system are at two extremes.
➢ The embedded system is designed to perform a specific task whereas as per definition the
general-purpose computer is meant for general use. It can be used for playing games,
watching movies, creating software, work on documents or spreadsheets etc.
➢ Following are certain specific points that differentiates between embedded systems and
general-purpose computers:
• Based on generation
• Complexity & performance requirements
• Based on deterministic behavior BEC601
• Based on triggering
Based on generation
First Generation:
➢ The early embedded systems built around 8bit microprocessors like 8085 and Z80 and 4bit
microcontrollers.
➢ Examples: Digital telephone keypads.
Second Generation:
➢ Embedded Systems built around 16 bit microprocessors and 8 or 16bit microcontrollers,
following the first generation embedded systems.
➢ Examples: SCADA systems
Third Generation:
➢ Embedded Systems built around high performance 16/32 bit
Microprocessors/controllers.
➢ Application Specific Instruction set processors like Digital Signal Processors (DSPs), and
Application Specific Integrated Circuits (ASICs).
➢ Examples: Robotics, Media, etc.
Fourth Generation:
➢ Embedded Systems built around System on Chips (SoCs), Re configurable processors and
multicore processors.
➢ Highly complex & very powerful.
➢ Examples: Smart Phones.
Medium-scale:
Large-scale:
Based on triggering
Embedded systems which are “Reactive” in nature can be classify based on triggering.
Reactive systems can be:
➢ Event triggered
➢ Time triggered
Data Collection/Storage/Representation
➢ Embedded system designed for the purpose of data collection performs acquisition of data
from the external world.
➢ Data collection is usually done for storage, analysis, manipulation and transmission.
➢ Data can be analog or digital.
➢ Embedded systems with analog data capturing techniques collect data directly in the form
of analog signal whereas embedded systems with digital data collection mechanism
converts the analog signal to the digital signal using analog to digital converters.
➢ If the data is digital it can be directly captured by digital embedded system.
➢ A digital camera is a typical example of an embedded System with data
collection/storage/representation of data.
➢ Images are captured and the captured image may be stored within the memory of the
camera. The captured image can also be presented to the user through a graphic LCD unit.
Data communication
➢ Embedded data communication systems are deployed in applications from complex
➢ satellite communication to simple home networking systems.
➢ The transmission of data is achieved either by a wire-lin medium or by a wire-less
➢ medium. Data can either be transmitted by analog means or by digital means.
➢ Wireless modules-Bluetooth, Wi-Fi.
➢ Wire-line modules-USB, TCP/IP.
➢ Network hubs, routers, switches are examples of dedicated data transmission
➢ embedded systems.
Data signal processing
➢ Embedded systems with signal processing functionalities are employed in applications
demanding signal processing like speech coding, audio video codec, transmission
applications etc.
➢ A digital hearing aid is a typical example of an embedded system employing data
processing. Digital hearing aid improves the hearing capacity of hearing impaired
person.
Monitoring
➢ All embedded products coming under the medical domain are with monitoring
functions. Electro cardiogram machine is intended to do the monitoring of the
heartbeat of a patient but it cannot impose control over the heartbeat.
➢ Other examples with monitoring function are digital CRO, digital multi-meters, and
logic analysers.
BEC601
Control
➢ Embedded systems with control functionalities are used for imposing control over some
variables according to the changes in input variables.
➢ A system with control functionality contains both sensors and actuators
➢ Sensors are connected to the input port for capturing the changes in environmental
variable and the actuators connected to the output port are controlled according to the
changes in the input variable.
➢ Air conditioner system used to control the room temperature to a specified limit is a
typical example for control purpose.
‘Smart’ running shoes from Adidas – The Innovative bonding of Life Style with Embedded
Technology
Embedded systems are basically designed to regulate a physical variable (such Microwave Oven)
or to manipulate the state of some devices by sending some signals to the actuators or devices
connected to the output port system (such as temperature in Air Conditioner), in response to the
input signal provided by the end users or sensors which are connected to the input ports. Hence
the embedded systems can be viewed as a reactive system.
The control is achieved by processing the information coming from the sensors and user interfaces
and controlling some actuators that regulate the physical variable. Keyboards, push button,
switches, etc. are Examples of common user interface input devices and LEDs, LCDs,
Piezoelectric buzzers, etc examples for common user interface output devices for a typical
BEC601
embedded system. The requirement of type of user interface changes from application to
application based on domain.
Some embedded systems do not require any manual intervention for their operation. They
automatically sense the input parameters from real world through sensors which are connected at
input port. The sensor information is passed to the processor after signal conditioning and
digitization. The core of the system performs some predefined operations on input data with the
help of embedded firmware in the system and sends some actuating signals to the actuator connect
connected to the output port of the system.
The memory of the system is responsible for holding the code (control algorithm and other
important configuration details). There are two types of memories are used in any embedded
system. Fixed memory (ROM) is used for storing code or program. The user cannot change the
firmware in this type of memory. The most common types of memories used in embedded systems
for control algorithm storage are OTP, PROM, UVEPROM, EEPROM and FLASH. An
embedded system without code (i.e. the control algorithm) implemented memory has all the
peripherals but is not capable of making decisions depending on the situational as well as real
world changes.
Memory for implementing the code may be present on the processor or may be implemented as a
separate chip interfacing the processor. In a controller based embedded system, the controller may
contain internal memory for storing code such controllers are called Micro-controllers with on-
chip ROM, eg. Atmel AT89C51.
Microprocessor:
Microcontroller:
➢ A highly integrated silicon chip containing a CPU, scratch pad RAM, Special and General-
purpose Register Arrays, On Chip ROM/FLASH memory for program storage, Timer and
Interrupt control units and dedicated I/O ports
➢ Microcontrollers can be considered as a super set of Microprocessors
➢ Microcontroller can be general purpose (like Intel 8051, designed for generic applications
and domains) or application specific (Like Automotive AVR from Atmel Corporation.
Designed specifically for automotive applications)
➢ Since a microcontroller contains all the necessary functional blocks for independent
working, they found greater place in the embedded domain in place of microprocessors
➢ Microcontrollers are cheap, cost effective and are readily available in the market
➢ Texas Instruments TMS 1000 is considered as the world’s first microcontroller
BEC601
Microprocessor Vs Microcontroller
➢ DSP are powerful special purpose 8/16/32 bit microprocessor designed to meet the
computational demands and power constraints of today’s embedded audio, video and
communication applications. DSP are 2 to 3 times faster than general purpose
microprocessors in signal processing applications.
➢ This is because of the architectural difference between DSP and general purpose
microprocessors.
➢ DSPs implement algorithms in hardware which speeds up the execution whereas general
purpose processor implement the algorithm in software and the speed of execution
depends primarily on the clock for the processors.
➢ DSP includes following key units:
i. Program memory: It is a memory for storing the program required by DSP to process
the data. ii. Data memory: It is a working memory for storing temporary variables and
data/signal to be processed. iii. Computational engine: It performs the signal processing
in accordance with the stored program memory computational engine incorporated many
specialized arithmetic units and each of them operates simultaneously to increase the
execution speed. It also includes multiple hardware shifters for shifting operands and saves
execution time. iv. I/O unit: It acts as an interface between the outside world and DSP.
It is responsible for capturing signals to be processed and delivering the processed signals.
➢ Examples: Audio video signal processing, telecommunication and multimedia applications.
SOP(Sum of Products) calculation, convolution, FFT(Fast Fourier Transform),
DFT(Discrete Fourier Transform), etc are some of the operation performed by DSP.
17EC62
Program
CPU Data Memory
Memory
➢ Endianness specifies the order in which the data is stored in the memory by processor
operations in a multi byte system (Processors whose word size is greater than one byte).
Suppose the word length is two byte then data can be stored in memory in two different
ways
• Higher order of data byte at the higher memory and lower order of data byte at
location just below the higher memory
• Lower order of data byte at the higher memory and higher order of data byte at
location just below the higher memory
➢ Little-endian means the lower-order byte of the data is stored in memory at the lowest
address, and the higher-order byte at the highest address. (The little end comes first)
➢ Big-endian means the higher-order byte of the data is stored in memory at the lowest
address, and the lower-order byte at the highest address. (The big end comes first.)
17EC62
➢ The RISC processor instruction set is orthogonal and it operates on registers. The
memory access related operations are performed by the special instructions load and store.
If the operand is specified as memory location, the content of it is loaded to a register
using the load instruction.
➢ The instruction store stores data from a specified register to a specified memory location
2
R1 R2 R3
1 3 3 1
load R1, x
load R2, y 2
x 00 add R3, R1, R2 3
y 7F ALU 3
store R3, z 4
z 23
4
➢ The conventional instruction execution by the processor follows the Fetch-Decode-
Execute sequence
➢ During the decode operation the memory address bus is available and it is possible to
effectively utilize it for an instruction fetch, the processing speed can be increased
➢ In its simplest form instruction pipelining refers to the overlapped execution of
instructions
ASICs can be pre-fabricated for a special application or it can be custom fabricated by using the
components from a re-usable „building block‟ library of components for a particular customer
applicationn
➢ Fabrication of ASICs requires a non-refundable initial investmet (Non Recurring
Engineering (NRE) charges) for the process technology and configuration expenses
➢ If the Non-Recurring Engineering Charges (NRE) is born by a third party and the
Application Specific Integrated Circuit (ASIC) is made openly available in the market, the
ASIC is referred as Application Specific Standard Product (ASSP)
➢ The ASSP is marketed to multiple customers just as a general-purpose product , but to a
smaller number of customers since it is for a specific application.
FPGAs:
➢ FPGAs offer the highest amount of logic density, the most features, and the highest
performance.
➢ These advanced FPGA devices also offer features such as built-in hardwired processors
(such as the IBM Power PC), substantial amounts of memory, clock management systems,
and support for many of the latest, very fast device-to-device signaling technologies
➢ FPGAs are used in a wide variety of applications ranging from data processing and storage,
to instrumentation, telecommunications, and digital signal processing
CPLDs:
➢ CPLDs, by contrast, offer much smaller amounts of logic - up to about 10,000 gates
➢ CPLDs offer very predictable timing characteristics and are therefore ideal for critical
control applications
➢ CPLDs such as the Xilinx CoolRunner series also require extremely low amounts of power
and are very inexpensive, making them ideal for cost-sensitive, battery-operated, portable
applications such as mobile phones and digital handheld assistants
Commercial off the Shelf Component (COTS)
Memory
➢ Memory is an important part of an embedded system. The memory used in embedded
system can be either
1. Program Storage Memory (ROM)
2. Data memory (RAM)
➢ Certain Embedded processors/controllers contain built in program memory and data
memory and this memory is known as on-chip memory
➢ One-time programmable memory. Uses hardwired technology for storing data. The device
is factory programmed by masking and metallization process according to the data
provided by the end user
➢ The primary advantage of MROM is low cost for high volume production. They are the
least expensive type of solid-state memory
➢ Different mechanisms are used for the masking process of the ROM, like
17EC62
PROM / OTP
EPROM
➢ Erasable Programmable Read Only (EPROM) memory gives the flexibility to re-
program the same chip
➢ EPROM stores the bit information by charging the floating gate of an FET
➢ Bit information is stored by using an EPROM Programmer, which applies high voltage
to charge the floating gate
➢ EPROM contains a quartz crystal window for erasing the stored information. If the
window is exposed to Ultra violet rays for a fixed duration, the entire memory will be
erased
➢ Even though the EPROM chip is flexible in terms of re-programmability, it needs to
be taken out of the circuit board and needs to be put in a UV eraser device for 20 to
30 minutes
EEPROM
➢ Erasable Programmable Read Only (EPROM) memory gives the flexibility to re-program
the same chip using electrical signals
➢ The information contained in the EEPROM memory can be altered by using electrical
signals at the register/Byte level
➢ They can be erased and reprogrammed within the circuit
➢ These chips include a chip erase mode and in this mode they can be erased in a few
milliseconds
➢ It provides greater flexibility for system design
➢ The only limitation is their capacity is limited when compared with the standard ROM (A
few kilobytes).
FLASH
17EC62
➢ Static RAM stores data in the form of Voltage. They are made up of flip-flops
➢ In typical implementation, an SRAM cell (bit) is realized using 6 transistors (or 6
MOSFETs). Four of the transistors are used for building the latch (flip-flop) part of the
memory cell and 2 for controlling the access.
➢ Static RAM is the fastest form of RAM available. SRAM is fast in operation due to its
resistive networking and switching capabilities
17EC62
➢ Dynamic RAM stores data in the form of charge. They are made up of MOS transistor
gates
➢ The advantages of DRAM are its high density and low cost compared to SRAM
➢ The disadvantage is that since the information is stored as charge it gets leaked off with
time and to prevent this, they need to be refreshed periodically
➢ Special circuits called DRAM controllers are used for the refreshing operation. The
refresh operation is done periodically in milliseconds interval
Bit Line B
Word Line
Sensor:
➢ A transducer device which converts energy from one form to another for any measurement
or control purpose. Sensors acts as input device Eg. Hall Effect Sensor which measures
the distance between the cushion and magnet in the Smart Running shoes from adidas
➢ Example: IR, humidity , PIR(passive infra red) , ultrasonic , piezoelectric , smoke sensors
Actuator:
➢ The I/O subsystem of the embedded system facilitates the interaction of the embedded
system with external world
➢ The interaction happens through the sensors and actuators connected to the Input and
output ports respectively of the embedded system
➢ The sensors may not be directly interfaced to the Input ports, instead they may be
interfaced through signal conditioning and translating systems like ADC, Optocouplers
etc.
17EC62
➢ LED is a p-n junction diode and contains a CATHODE and ANODE For functioning
the anode is connected to +ve end of power supply and cathode is connected to –ve end
of power supply.
➢ The maximum current flowing through the LED is limited by connecting a RESISTOR in
series between the power supply and LED as shown in the figure below
➢ The Anode of LED is connected to the port pin and cathode to Ground : In this approach
the port pin sources the current to the LED when it is at logic high(ie. 1).
➢ The Cathode of LED is connected to the port pin and Anode to Vcc : In this approach
the port pin sources the current to the LED when it is at logic high (ie. 1). Here the port
pin sinks the current and the LED is turned ON when the port pin is at Logic low (ie. 0)
➢ The 7 – segment LED display is an output device for displaying alpha numeric characters
➢ It contains 8 light-emitting diode (LED) segments arranged in a special form. Out of the
8 LED segments, 7 are used for displaying alpha numeric characters
➢ The LED segments are named A to G and the decimal point LED segment is named as
DP
➢ The LED Segments A to G and DP should be lit accordingly to display numbers and
characters
➢ The 7 – segment LED displays are available in two different configurations, namely;
Common anode and Common cathode
➢ In the Common anode configuration, the anodes of the 8 segments are connected
commonly whereas in the Common cathode configuration, the 8 LED segments share a
common cathode line
17EC62
➢ Based on the configuration of the 7 – segment LED unit, the LED segment anode or
cathode is connected to the Port of the processor/controller in the order, A‟ segment to
the Least significant port Pin and DP segment to the most significant Port Pin.
➢ The current flow through each of the LED segments should be limited to the maximum
value supported by the LED display unit
Anode Common Cathode LED Display
DP G F E D C B A
Common Anode LED Display Cathode
Vcc
Microcontroller Opto-Coupler
IC MCT2M IC MCT2M
M
GND
GND
Unipolar: A unipolar stepper motor contains two windings per phase. The direction of rotation
(clockwise or anticlockwise) of a stepper motor is controlled by changing the direction of current
flow. Current in one direction flows through one coil and in the opposite direction flows through
the other coil. It is easy to shift the direction of rotation by just switching the terminals to which
the coils are connected.
Bipolar: A bipolar stepper motor contains single winding per phase. For reversing the motor
rotation the current flow through the windings is reversed dynamically. It requires complex
circuitry for current flow reversal.
Port Pins
Driver IC
Microcontroller
ULN2803
Vcc
GND Vcc
➢ An electro mechanical device which acts as dynamic path selectors for signals and power.
➢ The Relay unit contains a relay coil made up of insulated wire on a metal core and a metal
armature with one or more contacts.
➢ Relay works on electromagnetic principle.
➢ When a voltage is applied to the relay coil, current flows through the coil, which in turn
generates a magnetic field
➢ The magnetic field attracts the armature core and moves the contact point.
➢ The movement of the contact point changes the power/signal flow path.
➢ The Relay is normally controlled using a relay driver circuit connected to the port pin of
the processor/controller
Relay Coil
Relay Coil
Relay Coil
Freewheeling Diode
Relay Coil
Load
Pin
➢ PPI devices are used for extending the I/O capabilities of processors /controllers
➢ 8255A is a popular PPI device for 8 bit processors/controllers
➢ 8255A supports 24 I/O pins and these I/O pins can be grouped as either
(i) Three 8-bit parallel ports (Port A, Port B and Port C) or
(ii) Two 8 bit parallel ports (Port A and Port B) with Port C
in any one of the following configurations
▪ As 8 individual I/O pins
▪ Two 4bit Ports namely Port CUPPER (CU) and Port CLOWER (CL)
➢ The Configuration of ports is done through the Control Register of 8255A
Processor/
82C55A
Controller Data Bus D0….D7 D0….D7
Data Bus Port
Pins 34 to 27
Latch
A0 Pin 9
(Eg: 74LS373) PA0….PA7
A1 Pin 8
Port A
ALE
A2….A7 PB0….PB7
Port B
Higher Order
Address Bus Address Bus Address
CS\ Pin 6
(A8….A15) decoder PC0….PC7
Port C
RD\ RD\ Pin 5
WR\ WR\ Pin 36
RESET OUT RESET Pin 35
Communication Interface
The following bus interface diagram illustrates the connection of master and slave devices on the
I2C bus
➢ The I2C bus interface is built around an input buffer and an open drain or collector
transistor.
➢ When the bus is in the idle state, the open drain/collector transistor will be in the floating
state and the output lines (SDA and SCL) switch to the 'High Impedance' state.
➢ For proper operation of the bus, both the bus lines should be pulled to the supply voltage
(+5 V for TTL family and +3.3V for CMOS family devices) using pull-up resistors.
➢ With pull-up resistors, the output lines of the bus in the idle state will be 'HIGH'
➢ The address of a I2C device is assigned by hardwiring the address lines of the device to
the desired logic level. Done at the time of designing the embedded hardware.
➢ The sequence of operations for communicating with an I2C slave device is listed below:
1. The master device pulls the clock line (SCL) of the bus to 'HIGH'
2. The master device pulls the data line (SDA) 'LOW', when the SCL line is at logic
'HIGH' (This is the 'Start' condition for data transfer)
3. The master device sends the address (7 bit or 10 bit wide) of the 'slave' device to
which it wants to communicate, over the SDA line.
▪ Clock pulses are generated at the SCL line for synchronizing the bit
reception by the slave device.
▪ The MSB of the data is always transmitted first.
▪ The data in the bus is valid during the 'HIGH' period of the clock signal
4. The master device sends the Read or Write bit (Bit value = 1 Read operation; Bit
value = 0 Write operation) according to the requirement
5. The master device waits for the acknowledgement bit from the slave device whose
address is sent on the bus along with the Read/ Write operation command.
Slave devices connected to the bus compares the address received with
the address assigned to them
6. The slave device with the address requested by the master device responds by
sending an acknowledge bit (Bit value 1) over the SDA line
7. Upon receiving the acknowledge bit, the Master device sends the 8 bit data to the
slave device over SDA line, if the requested operation is 'Write to device’.
If the requested operation is 'Read from device', the slave device sends data to
the master over the SDA line
8. The master device waits for the acknowledgement bit from the device upon byte
transfer complete for a write operation and sends an acknowledge bit to the Slave
device for a read operation
9. The master device terminates the transfer by pulling the SDA line 'HIGH' when
the clock line SCL is at logic 'HIGH' (Indicating the 'STOP' condition)
Serial Peripheral Interface (SPI) Bus:
➢ The Serial Peripheral Interface Bus (SPI) is a synchronous bi-directional full duplex four
wire serial interface bus.
➢ The concept of SPI is introduced by Motorola.
➢ SPI is a single master multi-slave system. It is possible to have a system where more than
one SPI device can be master, provided the condition only one master device is active at
any given point of time, is satisfied.
➢ SPI requires four signal lines for communication.
▪ Master Out Slave In (MOSI): Signal line carrying the data from master to slave
device. It is also known as Slave Input/Slave Data In (SI/SDI)
▪ Master In Slave Out (MISO): Signal line carrying the data from slave to master
device. It is also known as Slave Output (SO/SDO)
▪ Serial Clock (SCLK) : Signal line carrying the clock signals
▪ Slave Select (SS/) : Signal line for slave device select. It is an active low
signal
➢ The bus interface diagram shown in the figure illustrates the connection of master and
slave devices on the SPI bus.
➢ The master device is responsible for generating the clock signal.
➢ Master device selects the required slave device by asserting the corresponding slave
device’s slave select signal ‘LOW’. The data out line (MISO) of all the slave devices when
not selected floats at high impedance state
➢ The serial data transmission through SPI Bus is fully configurable.
➢ The Serial Peripheral Control Register holds the various configuration parameters like
master/slave selection for the device, baudrate selection for communication, clock signal
control etc. The status register holds the status of various conditions for transmission and
reception.
➢ SPI works on the principle of ‘Shift Register’. The master and slave devices contain a
special shift register for the data to transmit or receive. The size of the shift register is
device dependent. Normally it is a multiple of 8.
➢ During transmission from the master to slave, the data in the master’s shift register is
shifted out to the MOSI pin and it enters the shift register of the slave device through the
MOSI pin of the slave device. At the same time the shifted out data bit from the slave
device’s shift register enters the shift register of the master device through MISO pin
1- Wire Interface
Universal Serial Bus (USB) is a wired high speed serial bus for data communication. The first
version of USB (USB 1.0) was released in 1995.
The USB communication system follows a star topology with a USB host at the centre and one or
more USB peripheral devices/USB hosts connected to it.
A USB host can support connections up to 127, including slave peripheral devices and other USB
hosts.
Figure illustrates the star topology for USB device connection.
➢ USB transmits data in packet format. Each data packet has a standard format. The USB
communication is a host initiated one.
➢ The USB host contains a host controller which is responsible for controlling the data
communication, including establishing connectivity with USB slave devices, packetizing
and formatting the data.
➢ There are different standards for implementing the USB Host Control interface:
• Open Host Control Interface (OHCI)
• Universal Host Control Interface (UHCI)
➢ The physical connection between a USB peripheral device and master device is
established with a USB cable.
➢ The USB cable supports communication distance of up to 5 metres.
➢ The USB standard uses two different types of connector at the ends of the USB cable for
connecting the USB peripheral device and host device.
➢ 'Type A' connector is used for upstream connection (connection with host) and Type B
connector is used for downstream connection (connection with slave device).
➢ The USB connector present in desktop PCs or laptops are examples for 'Type A' USB
connector.
➢ Both Type A and Type B connectors contain 4 pins for communication.
➢ The table given below illustrates the pin details for 4, 6 and 9 pin connectors.
➢ There are two differential data transfer lines A and B per connector.
➢ In a 1394 cable, normally the differential lines of A are connected to B (TPA+ to TPB+
and TPA– to TPB– ) and vice versa.
➢ 1394 is a popular communication interface for connecting embedded devices like Digital
Camera, Camcorder, Scanners to desktop computers for data transfer and storage.
➢ IEEE 1394 doesn't require a host for communicating between devices. For example, you
can directly connect a scanner with a printer for printing.
Infrared (IrDA)
➢ Infrared (IrDA) is a serial, half duplex, line of sight based wireless technology for data
communication between devices.
➢ It is in use from the olden days of communication and you may be very familiar with it.
E.g.: The remote control of TV, VCD player, etc. works on Infrared.
➢ Infrared communication technique uses infrared waves of the electromagnetic spectrum
for transmitting the data.
➢ It supports point-point and point-to-multipoint communication, provided all devices
involved in the communication are within the line of sight.
➢ The typical communication range for IrDA lies in the range 10 cm to 1 m. The range can
be increased by increasing the transmitting power of the IR device.
➢ IR supports data rates ranging from 9600bits/second to 16Mbps.
➢ Depending on the speed of data transmission IR is classified into:
• Serial IR (SIR) – supports data rates ranging from 9600bps to 115.2kbps.
• Medium IR (MIR) – supports data rates of 0.576Mbps and 1.152Mbps.
• Fast IR (FIR) – supports data rates up to 4Mbps.
• Very Fast IR (VFIR) – supports high data rates up to 16Mbps.
• Ultra Fast IR (UFIR) – targeted to support a data rate up to 100Mbps.
➢ IrDA communication involves a transmitter unit for transmitting the data over IR and a
receiver for receiving the data.
➢ Infrared Light Emitting Diode (LED) is the IR source for transmitter and at the receiving
end a photodiode acts as the receiver.
➢ Both transmitter and receiver unit will be present in each device supporting IrDA
communication for bidirectional data transfer. Such IR units are known as 'Transceiver’.
➢ Certain devices like a TV remote control always require unidirectional communication and
so they contain either the transmitter or receiver unit. The remote control unit contains
the transmitter unit and TV contains the receiver unit.
➢ Infrared Data Association (IrDA) is the regulatory body responsible for defining and
licensing the specifications for IR data communication.
➢ IR communication has two essential parts: a physical link part and a protocol part.
➢ The physical link is responsible for the physical transmission of data between devices
supporting IR communication. Protocol part is responsible for defining the rules of
communication.
➢ The physical link works on the wireless principle making use of Infrared for
communication.
➢ IrDA is a popular interface for file exchange and data transfer in low cost devices.
➢ IrDA was the prominent communication channel in mobile phones before Bluetooth's
existence.
Bluetooth (BT)
➢ Bluetooth is a low cost, low power, short range wireless technology for data and voice
communication.
➢ Bluetooth was first proposed by Ericsson in 1994.
➢ Bluetooth operates at 2.4GHz of the Radio Frequency spectrum and uses the Frequency
Hopping Spread Spectrum (FHSS) technique for communication.
➢ It supports a data rate of up to 1Mbps and a range of approximately 30 feet for data
communication.
➢ Bluetooth communication has two essential parts – a physical link part and a protocol part.
➢ The physical link is responsible for the physical transmission of data between devices
supporting Bluetooth communication. The protocol part is responsible for defining the
rules of communication.
➢ The physical link works on the wireless principle making use of RF waves for
communication.
➢ Bluetooth enabled devices essentially contain a Bluetooth wireless radio for the
transmission and reception of data.
➢ The rules governing the Bluetooth communication is implemented in the 'Bluetooth
protocol stack’. The Bluetooth communication IC holds the stack.
➢ Each Bluetooth device will have a 48 bit unique identification number.
➢ Bluetooth communication follows packet-based data transfer.
➢ Bluetooth supports point-to-point (device to device) and point-to-multipoint (device to
multiple device broadcasting) wireless communication.
➢ The point-to-point communication follows the master-slave relationship. A Bluetooth
device can function as either master or slave.
➢ When a network is formed with one Bluetooth device as master and more than one device
as slaves, it is called a Piconet. A Piconet supports a maximum of seven slave devices.
➢ Bluetooth is the favourite choice for short range data communication in handheld
embedded devices.
➢ Bluetooth technology is very popular among cell phone users as they are the easiest
communication channel for transferring ringtones, music files, pictures, media files, etc.
between neighbouring Bluetooth enabled phones.
➢ The Bluetooth standard specifies the minimum requirements that a Bluetooth device must
support for a specific usage scenario.
➢ The specifications for Bluetooth communication is defined and licensed by the standards
body 'Bluetooth Special Interest Group (SIG)'.
Wi-Fi
➢ Wi-Fi or Wireless Fidelity is the popular wireless communication technique for networked
communication of devices.
➢ Wi-Fi follows the IEEE 802.11 standard.
➢ Wi-Fi is intended for network communication and it supports Internet Protocol (IP) based
communication.
➢ It is essential to have device identities in a multipoint communication to address specific
devices for data communication.
➢ In an IP based communication each device is identified by an IP address, which is unique
to each device on the network.
➢ Wi-Fi based communications require an intermediate agent called Wi-Fi router/Wireless
Access point to manage the communications.
➢ The Wi-Fi router is responsible for restricting the access to a network, assigning IP address
to devices on the network, routing data packets to the intended devices on the network.
➢ Wi-Fi enabled devices contain a wireless adaptor for transmitting and receiving data in the
form of radio signals through an antenna.
➢ The hardware part of it is known as Wi-Fi Radio.
➢ Wi-Fi operates at 2.4 GHz or 5 GHz of radio spectrum and they co-exist with other ISM
band devices like Bluetooth.
➢ Figure illustrates the typical interfacing of devices in a Wi-Fi network.
➢ For communicating with devices over a Wi-Fi network, the device when its Wi-Fi radio is
turned ON, searches the available Wi-Fi network in its vicinity and lists out the Service Set
Identifier (SSID) of the available networks.
➢ If the network is security enabled, a password may be required to connect to a particular
SSID.
➢ Wi-Fi employs different security mechanisms like Wired Equivalency Privacy (WEP),
Wireless Protected Access (WPA), etc. for securing the data communication.
➢ Wi-Fi supports data rates ranging from 1 Mbps to 1.73 Gbps depending on the standards
(802.11a/b/g/n) and access/modulation method.
➢ Depending on the type of antenna and usage location (indoor/outdoor),Wi-Fi offers a
range of 100 to 300 feet.
ZigBee
➢ ZigBee is targeted for low power, low cost, low data rate and secure applications for
Wireless Personal Area Networking (WPAN)
➢ The ZigBee specifications support a robust mesh network containing multiple nodes. This
networking strategy makes the network reliable by permitting messages to travel through
a number of different paths to get from one node to another.
➢ ZigBee operates worldwide at the unlicensed bands of Radio spectrum, mainly at 2.400 to
2.484 GHz, 902 to 928 MHz and 868.0 to 868.6 MHz
➢ ZigBee Supports an operating distance of up to 100 meters and a data rate of 20 to
250Kbps
➢ ZigBee is primarily targeting application areas like Home & Industrial Automation, Energy
Management, Home control/security, Medical/Patient tracking, Logistics & Asset tracking
and sensor networks & active RFID
➢ In the ZigBee terminology, each ZigBee device falls under any one of the following ZigBee
device category:
➢ ZigBee Coordinator (ZC)/Network Coordinator. The ZigBee coordinator acts as the root
of the ZigBee network. The ZC is responsible for initiating the ZigBee network and it has
the capability to store information about the network.
➢ ZigBee Router (ZR)/Full function Device (FFD) Responsible for passing information
from device to another device or to another ZR.
➢ ZigBee End Device (ZED)/Reduced Function Device (RFD): End device containing
ZigBee functionality for data communication. It can talk only with a ZR or ZC and doesn't
have the capability to act as a mediator for transferring data from one device to another.
➢ The specifications for ZigBee is developed and managed by the ZigBee Alliance, a non-
profit consortium of leading semiconductor manufacturers, technology providers, OEMs
and end users worldwide.
➢ General Packet Radio Service (GPRS) is a communication technique for transferring data
over a mobile communication network like GSM.
➢ Data is sent as packets in GPRS communication.
➢ The transmitting device splits the data into several related packets.
➢ At the receiving end the data is re-constructed by combining the received data packets.
GPRS supports a theoretical maximum transfer rate of 171.2 kbps.
➢ In GPRS communication, the radio channel is concurrently shared between several users
instead of dedicating a radio channel to a cell phone user.
➢ The GPRS communication divides the channel into 8 timeslots and transmits data over
the available channel.
➢ GPRS supports Internet Protocol (IP), Point to Point Protocol (PPP) and X.25 protocols
for communication.
➢ GPRS is mainly used by mobile enabled embedded devices for data communication.
➢ The device should support the necessary GPRS hardware like GPRS modem and GPRS
radio.
➢ To accomplish GPRS based communication, the carrier network also should have support
for GPRS communication.
➢ GPRS is an old technology and it is being replaced by new generation data communication
techniques like EDGE, High Speed Downlink Packet Access (HSDPA), Long Term
Evolution (LTE), etc. which offers higher bandwidths for communication.
Embedded Firmware
➢ Embedded firmware refers to the control algorithm (Program instructions) and or the
configuration settings that an embedded system developer dumps into the code (Program)
memory of the embedded system.
➢ It is an un-avoidable part of an embedded system.
➢ There are various methods available for developing the embedded firmware:
1. Write the program in high level languages like Embedded C/C++ using an Integrated
Development Environment (IDE). The IDE will contain an editor, compiler, linker,
debugger, simulator, etc. IDES are different for different family of
processors/controllers. For example, Keil µVision 4 IDE is used for all family
members of 8051 microcontroller, since it contains the generic 8051 compiler C51.
2. Write the program in Assembly language using the instructions supported by your
application's target processor/controller.
➢ The program written in high level language or assembly code should be converted into a
processor understandable machine code before loading it into the program memory.
➢ The process of converting the program written in either a high level language or
processor/controller specific Assembly code to machine readable binary code is called
'HEX File Creation’.
➢ The methods used for 'HEX File Creation' is different depending on the programming
techniques used. If the program is written in Embedded C/C++ using an IDE, the cross
compiler included in the IDE converts it into corresponding processor/controller
understandable 'HEX File’. If Assembly language based programming technique is used,
the utilities supplied by the processor/controller vendors can be used to convert the source
code into 'HEX File’. Also, third party tools are available, which may be of free of cost,
for this conversion.
➢ For a beginner in the embedded software field, it is strongly recommended to use the high
level language based development technique. Writing codes in a high level language is easy.
➢ The code written in high level language is highly portable. The same code can be used to
run on different processor/controller with little or less modification. The only thing you
need to do is re-compile the program with the required processor's IDE, after replacing
the include files for that particular processor.
➢ The programs written in high level languages are not developer dependent. Any skilled
programmer can trace out the functionalities of the program by just having a look at the
program. It will be much easier if the source code contains necessary comments and
documentation lines. It is very easy to debug and the overall system development time will
be reduced to a greater extent.
➢ The embedded software development process in assembly language is tedious and time
consuming.
➢ The developer needs to know about all the instruction sets of the processor/controller or
at least he should carry an instruction set reference manual with him.
➢ A programmer using assembly language technique writes the program according to his
view and taste. Often, he may be writing a method or functionality which can be achieved
through a single instruction as an experienced person's point of view, by two or three
instructions in his own style. So, the program will be highly dependent on the developer.
➢ It is very difficult for a second person to understand the code written in Assembly even if
it is well documented.
➢ Two types of control algorithm design exist in embedded firmware development:
The first type of control algorithm development is known as the infinite loop or 'super
loop' based approach, where the control flow runs from top to bottom and then jumps
back to the top of the program in a conventional procedure. It is similar to the while (1) {
}; based technique in C.
➢ The second method deals with splitting the functions to be executed into tasks and running
these tasks using a scheduler which is part of a General Purpose or Real Time Embedded
Operating System (GPOS/RTOS).
➢ The other system components refer to the components/circuits/ICs which are necessary
for the proper functioning of the embedded system.
➢ Some of these circuits may be essential for the proper functioning of the
processor/controller and firmware execution. E.g.: Watchdog timer, Reset IC (or passive
circuit), brown-out protection IC (or passive circuit), etc.
➢ Some of the controllers or SoCs integrate these components within a single IC and doesn't
require such components externally connected to the chip for proper functioning.
Reset Circuit
➢ The reset circuit is essential to ensure that the device is not operating at a voltage level
where the device is not guaranteed to operate, during system power ON.
➢ The reset signal brings the internal registers and the different hardware systems of the
processor/controller to a known state and starts the firmware execution from the reset
vector. Normally from vector address 0x0000 for conventional processors/controllers.
➢ The reset signal can be either active high or active low.
➢ Since the processor operation is synchronised to a clock signal, the reset pulse should be
wide enough to give time for the clock oscillator to stabilise before the internal reset state
starts.
➢ The reset signal to the processor can be applied at power ON through an external passive
reset circuit comprising a Capacitor and Resistor or through a standard Reset IC like
MAX810 from Maxim Dallas.
➢ Select the reset IC based on the type of reset signal and logic level (CMOS/TTL) supported
by the processor/controller in use.
➢ Some microprocessors/controllers contain built-in internal reset circuitry and they don't
require external reset circuitry.
➢ Figure illustrates a resistor capacitor based passive reset circuit for active high and low
configurations.
➢ The reset pulse width can be adjusted by changing the resistance value R and capacitance
value C.
Oscillator Unit
➢ Real-Time Clock (RTC) is a system component responsible for keeping track of time.
➢ RTC holds information like current time (In hours, minutes and seconds) in 12 hours/24
hour format, date, month, year, day of the week, etc. and supplies timing reference to the
system.
➢ RTC is intended to function even in the absence of power.
➢ RTCs are available in the form of Integrated Circuits from different semiconductor
manufacturers like Maxim/Dallas, ST Microelectronics etc.
➢ The RTC chip contains a microchip for holding the time and date related information and
backup battery cell for functioning in the absence of power, in a single IC package.
➢ The RTC chip is interfaced to the processor or controller of the embedded system.
➢ For Operating System based embedded devices, a timing reference is essential for
synchronizing the operations of the OS kernel.
➢ The RTC can interrupt the OS kernel by asserting the interrupt line of the
processor/controller to which the RTC interrupt line is connected.
➢ The OS kernel identifies the interrupt in terms of the Interrupt Request (IRQ) number
generated by an interrupt controller.
➢ One IRQ can be assigned to the RTC interrupt and the kernel can perform necessary
operations like system date time updation, managing software timers, etc. when an RTC
timer tick interrupt occurs.
➢ The RTC can be configured to interrupt the processor at predefined intervals or to
interrupt the processor when the RTC register reaches a specified value (used as alarm
interrupt).
Watchdog Timer
➢ A watchdog timer, or simply a watchdog, is a hardware timer for monitoring the firmware
execution and resetting the system processor/microcontroller when the program
execution hangs up.
➢ Depending on the internal implementation, the watchdog timer increments or decrements
a free running counter with each clock pulse and generates a reset signal to reset the
processor if the count reaches zero for a down counting watchdog, or the highest count
value for an up counting watchdog.
➢ If the watchdog counter is in the enabled state, the firmware can write a zero (for up
counting watchdog implementation) to it before starting the execution of a piece of code
(which is susceptible to execution hang up) and the watchdog will start counting.
➢ If the firmware execution doesn't complete due to malfunctioning, within the time required
by the watchdog to reach the maximum count, the counter will generate a reset pulse and
this will reset the processor.
➢ If the firmware execution completes before the expiration of the watchdog timer you can
reset the count by writing a 0 (for an up counting watchdog timer) to the watchdog timer
register.
➢ Most of the processors implement watchdog as a built-in component and provides status
register to control the watchdog timer (like enabling and disabling watchdog functioning)
and watchdog timer register for writing the count value.
➢ If the processor/controller doesn't contain a built-in watchdog timer, the same can be
implemented using an external watchdog timer IC circuit.
➢ The external watchdog timer uses hardware logic for enabling/disabling, resetting the
watchdog count, etc. instead of the firmware based 'writing' to the status and watchdog
timer register.
➢ The Microprocessor supervisor IC DS1232 integrates a hardware watchdog timer in it.
➢ In modern systems running on embedded operating systems, the watchdog can be
implemented in such a way that when a watchdog timeout occurs, an interrupt is generated
instead of resetting the processor.
➢ The interrupt handler for this handles the situation in an appropriate fashion.
➢ Figure illustrates the implementation of an external watchdog timer based microprocessor
supervisor circuit for a small scale embedded system.