0% found this document useful (0 votes)
17 views

Chapter 7 Part 2 Embedded System

embedded system for emerging technology

Uploaded by

meti bekele
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Chapter 7 Part 2 Embedded System

embedded system for emerging technology

Uploaded by

meti bekele
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Embedded System

• Embedded:- something that is attached to another thing.


• An embedded system
- a computer hardware system having software embedded in it.
- It can be an independent system or it can be a part of a large
system.
- It is a microcontroller or microprocessor based system which
is designed to perform a specific task.
- It is a controller with a dedicated function within a larger
mechanical or electrical system, often with real-time
computing constraints.
- It is embedded as part of a complete device often including
hardware and mechanical parts.
- 98% of all microprocessors manufactured are used in
embedded systems.
1
,,,Cont’d
• They use both microcontrollers and microprocessors, as
well as specially designed processors such as digital signal
processors (DSP).
Microprocessor is an IC which has only the CPU inside them i.e. only the
processing powers such as Intel's Pentium 1,2,3,4, core 2 duo, i3, i5 etc. ...
Microcontroller has a CPU, in addition with a fixed amount of RAM,
ROM and other peripherals all embedded on a single chip.
• Examples of embedded systems
- Washing machines - GPS receivers
- Printers - Mp3 player
- Calculators - TV remote
- Automobiles - Traffic lights
- Cameras - and more. 2
- Industrial machines
,,,Cont’d

• An embedded system has three components


1. It has hardware.
2. It has application software.
3. It has Real Time Operating system (RTOS)
- Supervises the application software.
- It defines the way the system works.
- It sets the rules during the execution of
application program.

3
,,,Cont’d
Characteristics of an Embedded System
• Single-functioned:- It usually performs a specialized operation and
does the same repeatedly.
• Reactive and Real time:- It continually react to changes in the
system's environment and compute certain results in real time
without any delay.
• Microprocessors based:- It must be microprocessor or
microcontroller based.
• Memory :- It must have a memory, as its software usually embeds
in ROM. It does not need any secondary memories in the computer.
• Connected:- It must have connected peripherals to connect input
and output devices.
• HW-SW systems:- Software is used for more features and
flexibility. Hardware is used for performance and security.
4
,,,Cont’d

Advantages and disadvantages of embedded system


Advantages of Embedded
➢ Easily Customizable
➢ Low power consumption
➢ Low cost
➢ Enhanced performance

Disadvantages of Embedded systems


➢ High development effort
➢ Larger time to market

5
,,,Cont’d
Basic Structure of an Embedded System

 Sensor
It measures the physical quantity and converts it to an electrical signal
which can be read by an observer or by any electronic instrument like
an A2D converter.
A sensor stores the measured quantity to the memory. 6
,,,Cont’d

A-D Converter − An analog-to-digital converter converts


the analog signal sent by the sensor into a digital signal.
Processor & ASICs − Processors process the data to
measure the output and store it to the memory.

ASIC:- Application Specific Integrated Circuit


D-A Converter − A digital-to-analog converter converts the
digital data fed by the processor to analog data
Actuator − An actuator compares the output given by the D-
A converter to the actual (expected) output stored in it and
7
Cybersecurity
• It is the protection of computer systems from the
theft of or damage, disruption or misdirection of the
services they provide.
( hardware, software, or electronic data )
• The field is becoming more important due to
increased reliance on computer systems and the
various devices that constitute the Internet of Things.
• Due to its complexity, both in terms of politics and
technology, cybersecurity is also one of the major
challenges in the contemporary world.
8
,,,Cont’d
• Cybersecurity is often confused with information security
 Cybersecurity focuses on protecting computer systems
from unauthorized access or being otherwise damaged or
made inaccessible.
 Information security is a broader category that looks to
protect all information assets (hard copy or in digital
form)
• Cybercrime describes an unlawful activity in which computer
or computing devices are used as a tool or/and target of
criminal activity.
• It is often committed by the people of destructive and criminal
mindset either for revenge, greed or adventure.
• Combating cybercrime is a multi-disciplinary affair that spans
hardware and software through to policy and people all of it
aimed at both preventing cybercrimes occurring in the first
place, and minimizing its impact when it does. 9
,,,Cont’d
Cybersecurity measures
Some security measures to be taken to prevent cybercrimes:
Staff awareness training
- Human error is the leading cause of data breaches
- So equip staff with the knowledge to deal with the threats they face.
Application security
- Web application vulnerabilities are a common point of intrusion for
cybercriminals.
- As applications play an increasingly critical role in business, it is
vital to focus on web application security.
Network security
- It is the process of protecting the usability and integrity of your
network and data.
- This is achieved by conducting a network penetration test, which
scans your network for vulnerabilities and security issues.
10
Leadership commitment ,,,Cont’d
- It is the key to cyber resilience.
- Without it, it is very difficult to establish or enforce effective processes.
- Top management must be prepared to invest in appropriate cybersecurity
resources, such as awareness training.
Password management
- You should implement a password management policy that provides guidance
to ensure staff create strong passwords and keep them secure.
- passwords must meet the following guidelines , except where technically
infeasible:
 at least eight (8) alphanumeric characters
 cannot consist of easily guessed or obtained personal information
 Social Security or credit card numbers must ​never​ be used
 should not be inserted into email messages
 Don’t use the same password for different accounts
 Recommended to change frequently
 Don’t share with any one 11
,,,Cont’d
Types of cybersecurity threats
 Ransomware
 a malicious software designed to extort money by blocking access to files
or the computer system until the ransom is paid.
 Paying the ransom does not guarantee that the files will be recovered or the
system restored.
 Malware
 a software designed to gain unauthorized access or to cause damage to a
computer
 Social engineering
 It is a tactic that adversaries use to trick you into revealing sensitive
information.
 They can solicit a monetary payment or gain access to your confidential
data.
Phishing
 It is the practice of sending fraudulent emails that resemble emails from
reputable sources.
 The aim is to steal sensitive data like credit card numbers and login
information. 12


,,,Cont’d
Benefits of cybersecurity

Benefits of utilizing cybersecurity include:


 Business protection against malware, ransomware, phishing,
and social engineering.
 Protection for data and networks.

 Prevention of unauthorized users.

 Improves recovery time after a breach.

 Protection for end-users.

 Improved confidence in the product for both developers and


customers. 13
,,,Cont’d

Cybersecurity vendors
Vendors in cybersecurity fields will typically use
endpoint, network and advanced threat protection
security as well as data loss prevention.
Three commonly known cybersecurity vendors

include Cisco, McAfee, and Trend Micro .

14
Additive manufacturing (3D Printing)
• It is a process that creates a physical object from a digital
design.
• It is opposite of subtractive manufacturing
 An object is created by cutting away at a solid block of
material until the final product is complete.
• In additive manufacturing
 We add materials for a certain object to create the final design needed.
 It uses computer-aided design to build objects layer by layer.
 Converts a 3D design data to a real life components by
depositing several layers of material.
 The industrial version of 3D printing
 Scientific name of 3D printing
15
,,,Cont’d
3D Printing: It's All About the Printer
- When MIT invented binder jet printing in the 1980s, they wrote:
“three-dimensional printing is a process under development at MIT
for the rapid and flexible production of prototype parts, end-use
parts, and tools directly from a CAD model.”
- Today our concept of “3D printing” is much broader, but
- the term is often associated with filament-based plastic printers, which
are the pride and joy of many a hobbyist and self-described maker
 A normal Inkjet printer creates a document by depositing ink on a paper.
 A 3D printer creates a physical object by depositing many layers of
materials on a print bed.
 Additive manufacturing machines build a 3-D object that is fixed .
 4-D printing creates 3-D objects that have the ability to change or
transform over time, without human interaction.
16
,,,Cont’d
Additive Manufacturing: A Bytes-to-Parts Supply Chain
 To create an object using AM, first create a design.
 By computer aided design, or CAD, software, or
 By taking a scan of the object someone wants to print.
 Software then translates the design into a layer by layer
framework for the AM machine to follow.
 This is sent to the 3-D printer, which begins creating the
object immediately.
 Materials needed polymers, plastic, metals, and other
materials that can be sprayed through a nozzle or
aggregated in a vat.

17
Thank You Very Much!!!

18

You might also like