Basic Knowledge of Embedded Systems
1. Definition of Embedded Systems
(1) Definition: A dedicated computer system centered on applications, based on computer technology, with software and hardware that can be customized to meet strict requirements for functionality, reliability, cost, size, and power consumption of application systems.
(2) Four stages of embedded system development: no operating system stage, simple operating system stage, real-time operating system stage, and Internet-oriented stage.
(3) Intellectual Property Core (IP core): A functional module with intellectual property rights, specific functionality, and standardized interfaces that can be reused in multiple integrated circuit designs, which is a basic component for achieving System on Chip (SoC).
(4) IP core modules have three levels of design: behavioral, structural, and physical, which can be categorized into three types based on the description of functional behavior: soft core, firm core, and hard core.
2. Components of Embedded Systems
Includes: hardware layer, intermediate layer, system software layer, and application software layer.
(1) Hardware layer: Embedded microprocessor, memory, general device interface, and I/O interface.
Embedded core module = microprocessor + power circuit + clock circuit + memory.
Cache: Located between main memory and embedded microprocessor core, it stores the most frequently used program code and data by the microprocessor in a recent period. Its main goal is to reduce the memory access bottleneck caused by the memory to the microprocessor core, making processing speed faster.
(2) Intermediate layer (also known as Hardware Abstraction Layer HAL or Board Support Package BSP).
It separates the upper software of the system from the underlying hardware so that system upper software developers do not need to care about the specifics of the underlying hardware and can develop according to the interfaces provided by the BSP layer.
BSP has two characteristics: hardware relevance and operating system relevance.
Designing a complete BSP requires completing two parts of work:
A. Hardware initialization of the embedded system and BSP functionality.
Chip-level initialization: A purely hardware initialization process that gradually sets the embedded microprocessor from its powered-on default state to the operational state required by the system.
Board-level initialization: An initialization process that includes both hardware and software, establishing the operating environment for subsequent system initialization and application programs.
System-level initialization: A software-oriented initialization process that initializes the operating system.
B. Design hardware-related device drivers.
(3) System software layer: Composed of RTOS, file systems, GUI, network systems, and general component modules.
RTOS is the foundation and development platform for embedded application software.
(4) Application software: Composed of application programs developed based on real-time systems.
3. Real-Time Systems
(1) Definition: A system that can complete system functions and respond to external or internal, synchronous or asynchronous events within a specified or determined time.
(2) Difference: General systems typically pursue average response time and user convenience; whereas real-time systems primarily consider system behavior under worst-case scenarios.
(3) Characteristics: Time constraints, predictability, reliability, and interaction with external environments.
(4) Hard real-time (strong real-time): Refers to applications that must fully meet timing requirements; otherwise, it may cause significant safety incidents, even catastrophic loss of life and property, and ecological damage, such as in aerospace and military applications.
(5) Soft real-time (weak real-time): Refers to some applications that have timing requirements, but occasional violations of these requirements do not significantly impact the operation of the system and environment, such as monitoring systems and real-time information collection systems.
(6) Constraints of tasks include: time constraints, resource constraints, execution order constraints, and performance constraints.
4. Scheduling of Real-Time Systems
(1) Scheduling: The entire process of determining when and where each task will be executed, given a set of real-time tasks and system resources.
(2) Preemptive scheduling: Usually priority-driven scheduling, such as uCOS. The advantage is good real-time performance and fast response; the scheduling algorithm is relatively simple and can guarantee the time constraints of high-priority tasks; the disadvantage is frequent context switching.
(3) Non-preemptive scheduling: Usually time-slice allocated scheduling, which does not allow tasks to be interrupted during execution; once a task occupies the processor, it must complete execution or voluntarily relinquish it, such as in WinCE. The advantage is less context switching; the disadvantage is low effective resource utilization of the processor and poor schedulability.
(4) Static table-driven strategy: The system generates a runtime schedule based on the time constraints and relationships of each task before running, indicating the start times and running times of each task.
(5) Priority-driven strategy: Determines the execution order of tasks based on their priority levels.
(6) Classification of real-time tasks: periodic tasks, sporadic tasks, aperiodic tasks.
(7) General structural model of real-time systems: Data acquisition tasks implement the collection of sensor data, data processing tasks handle the collected data and send the processed data to the actuator management tasks for execution.
5. Architecture of Embedded Microprocessors
(1) Von Neumann architecture: Program and data share a single memory space, where program instruction storage addresses and data storage addresses point to different physical locations in the same memory, using a single address and data bus, with the same width for program and data. Examples: 8086, ARM7, MIPS…
(2) Harvard architecture: Program and data are two independent memories, each independently addressed and accessed, which is a memory structure that separates program storage and data storage. Examples: AVR, ARM9, ARM10…
(3) Comparison of characteristics between CISC and RISC.
The time P required for a computer to execute a program can be calculated using the following formula:
P = I × CPI × T
I: The number of instructions of the high-level language program compiled to run on the machine.
CPI: The average number of cycles required to execute each instruction.
T: The time for each machine cycle.
(4) The concept of pipelining: In the CPU, the serial execution process of an instruction is transformed into several sub-processes that overlap in execution within the CPU.
(5) Pipeline metrics:
Throughput: The number of results produced by the pipeline processor in a unit of time. If the time taken for each sub-process of the pipeline is not the same, the throughput should be the reciprocal of the longest sub-process.
Establishment time: The time from when the pipeline starts working until it reaches maximum throughput. If m sub-processes take the same time, t, then the establishment time T = mt.
(6) Byte order of information storage
A. Memory unit: byte (8 bits)
B. Word length determines the addressing capability of the microprocessor, i.e., the size of the virtual address space.
C. The virtual address space of a 32-bit microprocessor is 2^32, i.e., 4GB.
D. Little-endian byte order: low byte is at low address in memory, high byte is at high address in memory.
E. Big-endian byte order: high byte is at low address in memory, low byte is at high address in memory.
F. The storage order of network devices depends on the data link layer in the OSI model.
6. Basics of Logic Circuits
(1) Logic circuits are divided into: combinational logic circuits and sequential logic circuits based on whether they have storage functions.
(2) Combinational logic circuits: The output of the circuit at any moment depends only on the input signals at that moment and is independent of the state of the circuit before the input signals acted. Common logic circuits include decoders and multiplexers.
(3) Sequential logic circuits: The output of the circuit at any moment depends not only on the input at that moment but also on the state of the circuit at that time. Therefore, sequential circuits must contain memory elements. Flip-flops are the basic building blocks of sequential logic circuits. Common sequential logic circuits include registers and counters.
(4) Truth tables, Boolean algebra, De Morgan’s laws, and the concept of gate circuits.
(5) NOR (not-or) and NAND (not-and) gate circuits are called universal gate circuits and can implement any logical function.
(6) Decoder: A combinational logic network with multiple inputs and multiple outputs.
Each time an n-bit binary code is input, at most one output will be valid among m outputs.
When m = 2^n, it is a full decoder; when m < 2^n, it is a partial decoder.
(7) Due to the low output current of integrated circuits at high levels, while the output current at low levels is relatively large, when directly driving LEDs with integrated gate circuits, low-level driving methods are often used. The LCD seven-segment character display utilizes the different optical characteristics of liquid crystals with and without an external electric field to display characters.
(8) Clock signals are the basis of sequential logic, used to determine the appropriate update of states in logical units. Synchronization is the main constraint in clock-controlled systems.
(9) When selecting flip-flops, the triggering method must be considered. There are two types of triggering methods:
Level-triggered method: Simple structure, commonly used to form temporary storage registers.
Edge-triggered method: Strong anti-interference ability, commonly used to form registers, counters, etc.
7. Bus Circuits and Signal Driving
(1) A bus is a collection of various signal lines, serving as a common pathway for transmitting data, addresses, and control information between components in an embedded system. At any given time, each bus line can transmit one binary signal. Depending on the type of information transmitted by the bus, it can be divided into: data bus (DB), address bus (AB), and control bus (CB).
(2) Main parameters of the bus:
Bus bandwidth: The amount of data that can be transmitted on the bus within a certain time, generally expressed in MByte/s.
Bus width: The number of bits (bit) that the bus can transmit simultaneously, commonly referred to as the concept of bus width, such as 32-bit, 64-bit. The wider the bus width, the greater the data transfer rate per second, which means the bus bandwidth is wider.
Bus frequency: The operating clock frequency measured in MHz; the higher the operating frequency, the faster the bus speed, which also means the bus bandwidth is wider.
Bus bandwidth = Bus width × Bus frequency / 8, unit is MBps.
Common buses: ISA bus, PCI bus, IIC bus, SPI bus, PC104 bus, and CAN bus.
(3) Only devices with tri-state output can be connected to the data bus, and the commonly used tri-state gate is the output buffer.
(4) When the load connected to the bus exceeds its load capacity, a buffer or driver must be added between the bus and the load, with tri-state buffers being the most commonly used, serving the purpose of driving and isolation.
(5) Using bus multiplexing technology can achieve the sharing of data and address buses. However, it brings two issues:
A. Additional external circuits are needed to decouple the bus signals, such as address latches.
B. The bus speed is relatively lower compared to non-multiplexed bus systems.
(6) Two types of bus communication protocols: synchronous mode and asynchronous mode.
(7) Solving the bus arbitration problem is based on the concept of priority.
8. Level Conversion Circuits
(1) Digital integrated circuits can be divided into two main categories: bipolar integrated circuits (TTL) and metal-oxide-semiconductor (MOS).
(2) CMOS circuits are widely used due to their very low static power consumption, high speed, and strong anti-interference ability.
(3) The solution to the interface difficulties between TTL and CMOS circuits is to connect a pull-up resistor R between the output end of the TTL circuit and the power supply. The value of the pull-up resistor R is determined by the high-level output leakage current IOH of TTL, and different series of TTL should use different R values.
9. Basics of Programmable Logic Devices
This area of content should have a conceptual understanding overall.
10. Basics of Information Representation and Computation in Embedded Systems
(1) Carry counting system and conversion: This is relatively simple, and one should grasp how to perform conversions, as it may be a potential exam question.
(2) Representation of numbers in computers: source code, one’s complement, and two’s complement.
The one’s complement of a positive number is the same as its source code, while the one’s complement of a negative number is obtained by inverting the bits of its source code, excluding the sign bit.
The two’s complement of a positive number is the same as its source code, while the two’s complement of a negative number is obtained by adding one to its one’s complement.
For example, the source code of -98: 11100010B
One’s complement: 10011101B
Two’s complement: 10011110B
(3) Fixed-point representation: The position of the decimal point is artificially fixed and does not change.
Floating-point representation: The position of the decimal point is variable, consisting of the mantissa and the exponent.
Any binary N can be written as: N = 2^P × S. S is the mantissa, P is the exponent.
(4) Character representation: Understand the transformation between GB2318-80 Chinese standard code and internal code.
(5) Parameters of waveform quantization in speech coding (may involve simple calculation questions).
Sampling frequency: The number of samples taken in one second, reflecting the size of the interval between sampling points.
The upper limit of human hearing is 20kHz, so a sampling frequency above 40kHz is sufficient for human satisfaction.
CDs use a sampling frequency of 44.1kHz.
Measurement precision: The quantization levels of samples, with currently standard sampling levels of 8 bits and 16 bits.
Number of channels: mono and stereo. Stereo requires double the storage space.
11. Error Control Coding
(1) Based on the functionality of code groups, they can be divided into error detection codes and error correction codes. Error detection codes can automatically detect errors, such as parity check codes; error correction codes can not only detect errors but also automatically correct them, such as cyclic redundancy check codes (CRC).
(2) Parity check codes, Hamming codes, cyclic redundancy check codes (CRC).
12. Measurement Items of Embedded Systems
(1) Performance indicators: Divided into component performance indicators and comprehensive performance indicators, mainly including: throughput, real-time performance, and various utilization rates.
(2) Reliability and safety
Reliability is the most important and prominent basic requirement of embedded systems, ensuring that an embedded system can operate normally, generally measured by the Mean Time Between Failures (MTBF).
(3) Maintainability: Generally represented by the Mean Time To Repair (MTTR).
(4) Availability
(5) Power consumption
(6) Environmental adaptability
(7) Generality
(8) Safety
(9) Confidentiality
(10) Scalability
The price of cost-effectiveness, in addition to the direct purchase price of the embedded system, should also include installation costs, several years of operation and maintenance costs, and software rental fees.
13. Evaluation Methods for Embedded Systems: Measurement Method and Model Method
(1) The measurement method is the most direct and basic method, requiring two problems to be solved:
A. Determine the system parameters to be measured based on the research purpose.
B. Choose the tools and methods for measurement.
(2) There are two measurement methods: sampling method and event tracking method.
(3) The model method is divided into analytical model method and simulation model method. The analytical model method uses mathematical equations to characterize the system model, while the simulation model method dynamically expresses the state of the embedded system through running simulation programs and performs statistical analysis to derive performance indicators.
(4) The most commonly used analytical model method is the queuing model, which includes three parts: input flow, queuing rules, and service facilities.
(5) Evaluating a system using models requires solving three problems: designing the model, solving the model, and calibrating and verifying the model.
Interface Technologies
1. Flash Memory
(1) Flash memory is a type of non-volatile memory that can be divided into NOR Flash and NAND Flash based on structure.
(2) Characteristics of Flash memory:
A. Block structure: Physically divided into several blocks, with independence between blocks.
B. Erase before write: The write operation of Flash can only change data bits from 1 to 0, not from 0 to 1, so before writing to the memory, an erase operation must be executed to initialize pre-written data bits to 1. The minimum unit for an erase operation is a block, not a single byte.
C. Operation instructions: To perform a write operation, a series of special instructions (for NOR Flash) or a timing sequence (for NAND Flash) must be input to write data.
D. Bit inversion: Due to the inherent characteristics of Flash, occasional data errors may occur during the read and write process. Bit inversion is unavoidable and can only be processed through other means after the fact.
E. Bad blocks: Once a block is damaged, it cannot be repaired. The results of operations on damaged blocks are unpredictable.
(3) Characteristics of NOR Flash:
Application programs can run directly in flash memory without needing to read the code into system RAM for execution. NOR Flash has high transmission efficiency, particularly cost-effective for small capacities of 1MB to 4MB, but its low write and erase speeds greatly affect its performance.
(4) Characteristics of NAND Flash:
Can achieve very high density units, allowing for high storage density, with fast write and erase speeds, which is why all USB flash drives use NAND Flash as the storage medium. The challenge with NAND Flash is that it requires a special system interface.
(5) Differences between NOR Flash and NAND Flash:
A. NOR Flash has a slightly faster read speed than NAND Flash.
B. NAND Flash has much faster erase and write speeds than NOR Flash.
C. NAND Flash has poor random read capability and is suitable for large amounts of continuous data reading.
D. NOR Flash has an SRAM interface, allowing easy addressing of each byte internally. NAND Flash shares an 8-bit bus for address, data, and command (some products use a 16-bit bus), and each read/write operation requires complex I/O interfaces to access data serially.
E. NOR Flash typically has a smaller capacity, usually between 1MB and 8MB; NAND Flash is only used in products over 8MB. Therefore, NOR Flash is used for code storage media, while NAND Flash is suitable for data storage.
F. The maximum erase/write cycles for each block in NAND Flash is one million times, while for NOR Flash it is one hundred thousand times.
G. NOR Flash can be connected like other memory and can directly run code on it; NAND Flash requires a special I/O interface, and a driver must be written before performing other operations. This means that designers can never write to bad blocks, which implies that virtual mapping must be performed throughout the use of NAND Flash.
H. NOR Flash is used in fields that require high data reliability for code storage, communication products, and network processing, referred to as code flash memory; NAND Flash is used in fields that require high storage capacity, such as MP3 players, storage cards, USB flash drives, referred to as data flash memory.
2. RAM Memory
(1) Characteristics of SRAM:
SRAM stands for Static Random Access Memory, which retains a value as long as it is powered. It has no refresh cycle and is composed of flip-flops, resulting in low integration; each SRAM storage unit consists of six transistors, making it relatively expensive. It has a higher speed and is commonly used in high-speed cache memory.
Typically, SRAM has four types of pins:
CE: Chip select signal, active low.
R/W: Read/write control signal.
ADDRESS: A set of address lines.
DATA: A set of bidirectional signal lines for data transmission.
(2) Characteristics of DRAM:
DRAM stands for Dynamic Random Access Memory. It is a type of semiconductor memory that stores data in the form of charge. Each storage unit consists of one transistor and one capacitor, with data stored in the capacitor. The capacitor loses charge due to leakage, making DRAM devices unstable. It must be regularly refreshed to retain data.
The interface of DRAM is relatively complex, typically having the following pins:
CE: Chip select signal, active low.
R/W: Read/write control signal.
RAS: Row address strobe signal, usually connected to the high part of the address.
CAS: Column address strobe signal, usually connected to the low part of the address.
ADDRESS: A set of address lines.
DATA: A set of bidirectional signal lines for data transmission.
(3) Characteristics of SDRAM:
SDRAM stands for Synchronous Dynamic Random Access Memory. Synchronous means that the memory operates based on a synchronous clock; the internal command sending and data transmission are based on it. Dynamic means that the memory array needs to be continuously refreshed to prevent data loss. It typically operates at a main frequency of 133MHz.
(4) Characteristics of DDRAM:
DDRAM stands for Double Data Rate Synchronous Dynamic Random Access Memory, also known as DDR. DDRAM is based on SDRAM technology; SDRAM transmits data once per clock cycle, while DDR memory transmits data twice per clock cycle, once on the rising edge and once on the falling edge of the clock. Under a main frequency of 133MHz, the bandwidth of DDR memory can reach 133×64b/8×2 = 2.1GB/s.
3. Hard Drives, Optical Discs, CF Cards, SD Cards
4. GPIO Principles and Structures
GPIO is the most basic form of I/O, consisting of a group of input or output pins. Some GPIO pins can be programmed to change their working direction, typically having two control registers: data register and data direction register. The data direction register sets the direction of the port. If the pin is set to output, the data register controls the state of that pin. If the pin is set to input, the state of this input pin is controlled by the logic circuit layer on the pin.
5. A/D Interfaces
(1) A/D converters are circuits that convert analog quantities into digital quantities. There are many methods to achieve A/D conversion, with common methods including counting method, dual integration method, and successive approximation method.
(2) Counting A/D conversion method
The main components of its circuit include: comparator, counter, D/A converter, and standard voltage source.
In simple terms, the working principle is that there is a counter that starts counting from 0, incrementing by 1 each time. Each increment serves as input to the D/A converter to generate a comparison voltage VO, which is compared with the input analog voltage VIN. If VO is less than VIN, the counter continues to increment until VO is greater than VIN; at this point, the accumulated value of the counter becomes the output value of the A/D converter.
This conversion method is characterized by its simplicity, but it is relatively slow, especially when the analog voltage is high; the conversion speed becomes even slower. For example, for an 8-bit A/D converter, if the input analog value is at maximum, the counter must count from 0 to 255, performing 255 D/A conversions and voltage comparisons to complete the conversion.
(3) Dual integration A/D conversion method
The main components of its circuit include: integrator, comparator, counter, and standard voltage source.
The working principle is that the circuit first integrates the input voltage to be tested for a fixed time, then performs a reverse integration with a standard voltage at a fixed slope until it returns to the starting value. Because a fixed slope is used, the time for reverse integration is proportional to the input analog voltage value; the larger the input analog voltage, the longer the reverse integration takes to return to the starting value. By measuring the time taken for reverse integration with a standard high-frequency clock pulse, the corresponding digital value for the input analog voltage can be obtained, thus completing the A/D conversion.
This method has strong resistance to industrial frequency interference and high conversion accuracy, but the conversion speed is slow, typically less than 10Hz, and is mainly used in digital testing instruments and temperature measurements.
(4) Successive approximation A/D conversion method
The main components of its circuit include: comparator, D/A converter, successive approximation register, and reference voltage source.
The working principle is essentially a binary search method, similar to the principle of using a balance. During A/D conversion, the D/A converter increases the conversion bits from high to low, generating different output voltages, and compares the input voltage with the output voltage. First, the highest bit is set to 1, which is equivalent to comparing half of the reference voltage with the input voltage; if the input voltage is less than half of the reference voltage, the highest bit is set to 0; otherwise, it remains 1. Next, the second-highest bit is set to 1, which is equivalent to performing another binary search within the range of 1/2, and so on, approaching the target value gradually.
This method is fast and has high conversion accuracy; for an N-bit A/D converter, only M clock pulses are needed to complete the conversion, making it the most commonly used conversion method for measuring changes over tens to hundreds of microseconds.
(5) Important indicators of A/D conversion (may involve simple calculations)
A. Resolution: Reflects the ability of the A/D converter to respond to small changes in input, usually expressed as the voltage level corresponding to the least significant bit (LSB) of the digital output. An n-bit A/D converter can reflect 1/2^n of the full-scale analog input voltage.
B. Range: The range of analog input voltages that can be converted, divided into unipolar and bipolar types.
C. Conversion time: The time required to complete one A/D conversion, with its reciprocal being the conversion rate.
D. Accuracy: Accuracy and resolution are two different concepts; even with high resolution, accuracy may not be sufficient due to factors like temperature drift and linearity. Accuracy is represented in two ways: absolute accuracy and relative accuracy. Absolute accuracy is typically expressed as a fraction of the least significant bit (LSB) of the digital quantity, while relative accuracy is expressed as a percentage of the full-scale analog voltage.
For example, with a full-scale of 10V, a 10-bit A/D chip with an absolute accuracy of ±1/2 LSB would have a minimum effective unit for the least significant bit (LSB) of: 10/1024 = 9.77mV, with an absolute accuracy of 9.77mV/2 = 4.88mV, and a relative accuracy of: 0.048%.
6. Basics of D/A Interfaces
(1) D/A converters convert digital quantities into analog quantities.
(2) In integrated circuits, a T-type network is typically used to convert digital quantities into analog currents, which are then converted into analog voltages by operational amplifiers. Performing D/A conversion essentially requires these two steps.
(3) Types of D/A converters:
A. Voltage output type: Commonly used as high-speed D/A converters.
B. Current output type: Generally used with external operational amplifiers.
C. Multiplicative type: Can be used as modulators and to digitally attenuate input signals.
(4) Main indicators of D/A converters: resolution, establishment time, linearity, conversion accuracy, temperature coefficient.
7. Keyboard Interfaces
(1) Two forms of keyboards: linear keyboards and matrix keyboards.
(2) There are two methods to identify the pressed keys on a keyboard: row scanning method and row inversion method.
(3) The row scanning method is a common identification method for matrix keyboards, which is performed in two steps:
A. Identify which column key is pressed: Set all row lines to low, check if any column line is low; if a column line is low, it indicates that a key in that column is pressed; otherwise, no key is pressed.
B. If a column has a pressed key, identify which row is pressed: Set each row to low sequentially while setting the others to high, and check for changes in the columns; if a column’s level changes to low, it indicates that the key at the intersection of that row and column is pressed.
8. Display Interfaces
(1) The basic principle of LCD is to control the passage of light through different liquid crystal units by supplying power, achieving the display purpose.
(2) There are two ways to provide light sources for LCD: projection type and reflection type. Laptop LCD displays are projection type, with a light source behind the screen, so external light sources are not needed. Generally, LCDs used on microcontrollers are reflection type, requiring external power and relying on reflected light to operate. Electroluminescent (EL) is a method of providing light sources for LCDs.
(3) LCDs can be classified into three categories based on driving methods: Twisted Nematic (TN), Super Twisted Nematic (STN), and Thin Film Transistor (TFT).
(4) LCDs sold on the market come in two types: LCD display modules with driving circuits, which only require bus-driven operation; and LCD displays without driving circuits, which use controller scanning methods.
(5) Typically, when the LCD controller operates, it requests the bus through DMA, directly reading data from the specified address (display buffer) in SDRAM, which is converted into the scanning data format for the LCD display by the LCD controller and directly drives the liquid crystal display.
(6) The VGA interface is essentially an analog interface, generally adopting a unified 15-pin interface, including 2 NC signals, 3 display data buses, 5 GND signals, 3 RGB color components, 1 horizontal sync signal, and 1 vertical sync signal. The voltage levels for the color components follow the RS343 standard defined by EIA.
9. Touchscreen Interfaces
(1) Based on working principles, touchscreens can be divided into: surface acoustic wave screens, capacitive screens, resistive screens, and infrared screens.
(2) Touchscreen control uses specialized chips, such as ADS7843.
10. Audio Interfaces
(1) Basic principle: Data input from the microphone is decoded by the audio codec to complete A/D conversion, and the decoded audio data is sent to the DSP or CPU for corresponding processing via the audio controller, after which the data is sent to the audio encoder for D/A conversion and output through the speaker.
(2) There are various formats for digital audio, with the three most common being:
A. Digital audio (PCM): The data format used for CDs or DVDs, with a sampling frequency of 44.1kHz. At 16-bit precision, the PCM audio data rate is 1.41Mb/s; at 32-bit precision, it is 2.42Mb/s. A 700MB CD can store approximately 60 minutes of 16-bit PCM data format music.
B. MPEG Layer 3 audio (MP3): The audio format used by MP3 players, with stereo MP3 data rates ranging from 112kb/s to 128kb/s.
C. ATSC digital audio compression standard (AC3): The digital audio encoding standard for digital TV, HDTV, and movies, with stereo AC3 encoded data rates of 192kb/s.
(3) IIS is a commonly used serial audio digital interface for audio data encoding or decoding. The IIS bus only handles audio data, while other control signals need to be transmitted separately. IIS uses three serial buses: data line SD, word select line WS, and clock signal line SCK.
(4) When the data field width of the receiver and sender is different, the sender does not consider the receiver’s data field width. If the sender’s data field is smaller than the system field width, it pads 0 at the low end; if the sender’s data width is greater than the receiver’s width, the part exceeding the LSB is truncated. The word select WS is used to select the left and right channels, with WS=0 indicating the left channel is selected, and WS=1 indicating the right channel is selected. Additionally, WS allows the receiving device to store the previous byte and prepare to receive the next byte.
11. Serial Interfaces
(1) Serial communication refers to transmitting data one bit at a time. Compared to parallel communication, serial communication has fewer transmission lines and lower costs, making it particularly suitable for long-distance transmission; however, it is slower.
(2) There are three basic communication modes for serial data transmission: simplex, half-duplex, and full-duplex.
(3) In terms of information format, serial communication can be divided into two types: synchronous communication and asynchronous communication.
A. Asynchronous transmission: Each character is treated as independent information and transmitted according to a fixed and predetermined timing, but the timing between characters depends on the arbitrary timing between characters. In asynchronous communication, characters are transmitted frame by frame, with each frame synchronized by a start bit. The time interval between each code in a frame is fixed, while the time interval between two adjacent frames is not fixed.
B. Synchronous transmission: In synchronous mode, not only is there synchronization between characters, but also between the timing of characters, meaning that synchronous mode transmits many characters as a block of information, adding 1-2 synchronization characters before each block of information and adding appropriate error detection data after the block before transmission.
(4) Asynchronous communication must follow three regulations:
A. Character format: start bit + data + parity bit + stop bit (the parity bit can be omitted), with the low bit transmitted first.
B. Baud rate: The number of bits transmitted per second.
C. Parity bit: Odd or even parity.
a. Odd parity: The parity bit must ensure that there is an odd number of “1s” in the character.
b. Even parity: The parity bit must ensure that there is an even number of “1s” in the character.
(5) The electrical characteristics of RS-232C: negative logic.
A. On TxD and RxD: Logic 1 is -3V to -15V, and logic 0 is 3V to 15V.
B. On control lines like TES, CTS, DTR, DCD, etc.:
Effective signal (ON state) is 3V to 15V
Invalid signal (OFF state) is -3V to -15V
(6) The level conversion between TTL standard and RS-232C standard is achieved using integrated chip RS232.
(7) RS-422 serial communication interface
A. RS-422 is a unidirectional, balanced transmission specification for single machine sending and multiple machines receiving, with a transmission rate of up to 10Mb/s.
B. RS-422 uses differential transmission, also known as balanced transmission, using a pair of twisted wires.
C. RS-422 requires a termination resistor, which should have a resistance value approximately equal to the characteristic impedance of the transmission cable.
(8) RS-485 serial bus interface
A. RS-485 is a standard built on RS-422, adding multi-point and bidirectional communication capabilities, with communication distances ranging from several meters to thousands of meters.
B. RS-485 transceivers use balanced sending and differential receiving, which has the ability to suppress common mode interference.
C. RS-485 requires two termination resistors. For short distances (under 300m), termination resistors may not be necessary.
12. Parallel Interfaces
(1) The data transfer rate of parallel interfaces is 8 times faster than that of serial interfaces, with a standard parallel interface data transfer rate of 1Mb/s, commonly used to connect printers, scanners, etc., hence also called printer ports.
(2) Parallel interfaces can be divided into SPP (Standard Parallel Port), EPP (Enhanced Parallel Port), and ECP (Extended Capabilities Port).
(3) Parallel buses are divided into standard and non-standard categories. Common standard parallel buses include IEEE 488 bus and ANSI SCSI bus. MXI bus is a high-performance non-standard general-purpose multi-user parallel bus.
13. PCI Interfaces
(1) The PCI bus is a high-performance 32-bit and 64-bit bus that multiplexes addresses and data, serving as an interconnection mechanism between microprocessors and peripheral control components, and peripheral add-on boards.
(2) In terms of data width, PCI defines a 32-bit data bus, which can be expanded to 64 bits. In terms of bus speed, there are two types: 33MHz and 66MHz.
(3) Compared to the ISA bus, the PCI bus multiplexes the address bus and data bus in time, supporting plug-and-play, interrupt sharing, and other functions.
14. USB Interfaces
(1) The main features of USB bus:
A. Simple to use, plug-and-play.
B. Each USB system has a host, and a maximum of 127 devices can be connected in this USB network.
C. Wide application range, supporting multiple devices to operate simultaneously.
D. Low-cost cables and connectors, using a unified 4-pin plug.
E. Strong error correction capability.
F. Lower protocol overhead leads to high overall bus performance, suitable for the development of low-cost peripherals.
G. Supports multiple data streams and multiple message streams between the host and devices, and supports synchronous and asynchronous transmission types.
H. Bus powered, providing 5V/100mA power to devices.
(2) The USB system is described by three parts: USB host, USB device, and USB interconnection.
(3) The data transfer rates supported by the USB bus are three types: high-speed signaling bit rate of 480Mb/s; full-speed signaling bit rate of 12Mb/s; low-speed signaling bit rate of 1.5Mb/s.
(4) The USB bus cable has four wires: a pair of twisted signal wires and a pair of power wires.
(5) USB is a polling bus, with the main controller initiating all data transfers. The peripherals connected to the USB share the USB bandwidth through a token-based protocol scheduled by the host.
(6) Most bus transactions involve the transmission of three packets:
A. Token packet: Indicates what transaction is to be executed on the bus, the USB device to be addressed, and the direction of data transfer.
B. Data packet: Transmits data or indicates that there is no data to transmit.
C. Handshake packet: Indicates whether the transmission was successful.
(7) The USB data transmission model between the host and device endpoints is called a pipe. There are two types of pipes: stream and message. Message data has a structure defined by USB, while data streams do not.
(8) The transaction scheduling table allows for flow control of certain stream pipes, adjusting the data transmission rate at the hardware level using the NAK (negative acknowledgment) handshake signal to prevent buffer overflow or underflow.
(9) The most significant feature of USB devices is plug-and-play.
(10) Working principle: When a USB device is inserted into a USB endpoint, the host communicates with the device’s endpoint 0 through the default address 0. In this process, the host sends a series of standard requests to obtain descriptors, through which the host gathers all the device information of interest to know the device status and how to communicate with it. Subsequently, the host sends a Set Address request to assign a unique address to the device. After this, the host communicates with the device using the assigned address instead of the default address 0.
15. SPI Interfaces
(1) SPI is a synchronous protocol interface, where all transmissions reference a common clock generated by the host, which the receiving device uses to synchronize the reception of the serial bit stream.
(2) When multiple devices are connected to the same SPI interface, the host selects the slave device via the chip select pin of the slave.
(3) SPI primarily uses four signals: Master Out Slave In (MOSI), Master In Slave Out (MISO), Serial Clock (SCLK), and Slave Select (CS).
(4) Both the host and slave contain a serial shift register; the host initiates a data transfer by writing a byte to its SPI serial register. The register transmits the byte to the slave via the MOSI signal line, while the slave returns the contents of its shift register to the host via the MISO signal line, thereby exchanging the contents of both shift registers.
(5) Write and read operations of peripherals are completed synchronously, making SPI a very efficient protocol.
(6) If only a write operation is performed, the host can ignore the received byte; conversely, if the host wants to read a byte from the peripheral, it must send an empty byte to trigger the slave’s transmission.
16. IIC Interfaces
(1) The IIC bus is a high-performance multi-master bus with functions such as bus arbitration and synchronization of high and low-speed devices.
(2) The IIC bus requires two lines: Serial Data Line (SDA) and Serial Clock Line (SCL).
(3) Each device on the bus has a unique address for identification, and each device can act as a transmitter or receiver (depending on the device’s functionality).
(4) The IIC bus has four operational modes: master transmit, master receive, slave transmit, and slave receive.
(5) There are three types of signals during the data transmission process on IIC:
A. Start signal: SDA transitions from high to low when SCL is low.
B. Stop signal: SDA transitions from low to high when SCL is low.
C. Acknowledge signal: The receiver sends a specific low signal to the sender after receiving 8 bits of data during the ninth pulse.
(6) After the master device sends a start signal, it immediately sends a slave address to notify the slave device it will communicate with. One byte of address includes 7 bits of address information and 1 bit of transmission direction indication; if the 7th bit is 0, it indicates a write operation; if 1, it indicates a read operation.
(7) Each byte transmitted on the SDA line is 8 bits long, and there is no limit on the number of bytes transmitted at a time. The first byte following the start signal is the address field, and each transmitted byte is followed by an acknowledgment bit (ACK), with the most significant bit (MSB) of the serial data transmitted first.
(8) If the data receiver cannot accept more data, it can interrupt the transmission by holding SCL low, forcing the data sender to wait until SCL is released. This allows for synchronization of high and low-speed devices.
(9) The working process of the IIC bus: SDA and SCL are both bidirectional. When idle, SDA and SCL are both high; only when SDA goes low, followed by SCL going low, does the data transmission on the IIC bus begin. Each bit transmitted on the SDA line is sampled on the rising edge of SCL, and this bit must remain valid until SCL goes low again, after which the next bit is transmitted before SCL goes high again, indicating the end of data transmission.
17. Ethernet Interfaces
(1) The most commonly used Ethernet protocol is the IEEE802.3 standard.
(2) Transmission encoding (06 and 07 years both involved): Manchester encoding and differential Manchester encoding.
A. Manchester encoding: Each bit has a level transition in the middle; a transition from high to low represents “0”, and a transition from low to high represents “1”.
B. Differential Manchester encoding: Each bit has a level transition in the middle, using the presence or absence of a transition at the start of each code element to represent “0” or “1”; a transition indicates “0”, while no transition indicates “1”.
(3) Compared to Manchester encoding, differential Manchester encoding is simpler and offers better noise suppression performance.
(4) Data transmission characteristics of Ethernet:
A. The transmission of all data bits starts from the low bit, with the bit stream transmitted using Manchester encoding.
B. Ethernet uses a collision detection method based on bus multiplexing, which is automatically executed by hardware.
C. The length of the transmitted data includes the destination address DA + source address SA + type field TYPE + data segment DATA + padding bits, with a minimum of 60B and a maximum of 1514B.
D. Typically, Ethernet cards can receive data for three types of addresses: broadcast address, multicast address, and their own address.
E. The physical address of any two network cards is different and is unique in the world, assigned by a dedicated organization.
(5) There are two implementation methods for embedded Ethernet interfaces:
A. Embedded processor + network card chip (e.g., RTL8019AS, CS8900, etc.)
B. Processors with Ethernet interfaces.
(6) TCP/IP is a layered protocol, divided into: physical layer, data link layer, network layer, transport layer, and application layer. Each layer implements a clear function, corresponding to one or several transmission protocols, with each layer treating the protocol above it as an independent data packet. The protocols at each layer are as follows:
A. Application layer: BSD sockets.
B. Transport layer: TCP, UDP.
C. Network layer: IP, ARP, ICMP, IGMP.
D. Data link layer: IEEE802.3 Ethernet MAC.
E. Physical layer: Binary bit stream.
(7) ARP (Address Resolution Protocol)
A. The network layer uses a 32-bit address to identify different hosts (i.e., IP address), while the link layer uses a 48-bit physical address (MAC) to identify different Ethernet or token ring interfaces.
B. ARP function: Achieves the conversion from IP address to the corresponding physical address.
(8) ICMP (Internet Control Message Protocol)
A. The IP layer uses it to exchange error messages and other important control information with other hosts or routers.
B. ICMP messages are transmitted within IP packets.
C. The network diagnostic tools ping and traceroute are actually ICMP protocols.
(9) IP (Internet Protocol)
A. IP operates at the network layer and is the most core protocol in the TCP/IP protocol family.
B. All TCP, UDP, ICMP, and IGMP data are transmitted in IP packet format.
C. TTL (Time To Live field): Specifies the lifetime of the IP packet (the number of routers the packet can pass through).
D. IP provides unreliable, connectionless packet delivery service, which is efficient and flexible.
a. Unreliable: It cannot guarantee that packets will reach their destination; any required reliability must be provided by the upper layer (such as TCP). If an error occurs, IP has a simple error handling algorithm – discard the packet and send an ICMP message back to the source.
b. Connectionless: IP does not maintain any state information about subsequent packets. Each packet is processed independently. IP packets can be received out of order.
(10) TCP (Transmission Control Protocol)
TCP is a connection-oriented, reliable transport layer protocol that provides high reliability for end-to-end data communication between two hosts.
(11) UDP (User Datagram Protocol)
UDP is a connectionless, unreliable transport layer protocol that does not guarantee that packets will reach their destination; reliability is provided by the application layer. UDP has low overhead and is more suitable for low-end embedded applications compared to TCP.
(12) Ports: TCP and UDP use 16-bit port numbers to identify upper-layer users, i.e., application layer protocols, such as the TCP port number for FTP service being 21, the TCP port number for Telnet service being 23, and the UDP port number for TFTP service being 69.
18. CAN Bus Interfaces
(1) CAN (Control Area Network) bus is a multi-master serial communication bus, one of the most widely used field buses internationally, originally used for electronic control networks in automotive environments. An ideal single network formed by a CAN bus can connect any number of nodes, although in practical applications, the number of nodes is limited by the electrical characteristics of the network hardware.
(2) The bus signal is transmitted using differential voltage. Two signal lines are called CAN_H and CAN_L, with a static voltage of around 2.5V, indicating a logical 1, also called “dominant”. When CAN_H is higher than CAN_L, it indicates a logical 0, referred to as “recessive”, typically with voltage values of CAN_H = 3.5V and CAN_L = 1.5V.
(3) When both “dominant” and “recessive” bits are sent simultaneously, the final bus value will be “dominant”, which lays the foundation for CAN bus arbitration.
(4) A bit time on the CAN bus can be divided into four parts: synchronization segment, propagation time segment, phase buffer segment 1, and phase buffer segment 2.
(5) The CAN bus data frame has two formats: standard format and extended format, including: frame start, arbitration field, control field, data field, CRC field, ACK field, and frame end.
(6) The hardware interface of the CAN bus includes: CAN bus controller and CAN transceiver. The CAN controller mainly performs tasks such as timing logic conversion, for example, Philips’s SJA1000. The CAN transceiver is the physical layer chip of the CAN bus, converting TTL levels to CAN bus electrical characteristics, such as TJA1050.
19. xDSL Interfaces
(1) xDSL (Digital Subscriber Line) technology involves connecting dedicated DSL modem devices on both sides of existing subscriber telephone lines, utilizing the high-frequency bandwidth characteristics of digital signals on subscriber lines for direct digital signal transmission, bypassing the intermediate A/D conversion, thus breaking the limit of analog signal transmission at a maximum rate of 56KB/s.
(2) DSL technology is mainly divided into symmetric and asymmetric categories.
(3) xDSL is more suitable for point-to-point connection applications in enterprises, such as file transfers, video conferencing, and other data transmission tasks with similar amounts of data.
(4) ADSL is a broadband access technology developed in recent years, which utilizes twisted copper lines to provide asymmetric broadband information services in both directions to users.
(5) ADSL transmits one high-speed downstream data, one lower-speed upstream data, and one analog telephone signal simultaneously over a pair of telephone lines. The signals are allocated different frequency bands using frequency division multiplexing, with low frequencies transmitting voice, a narrow frequency band in the middle transmitting upstream channel data and control information, and the remaining high frequency band transmitting downstream channel data, images, or high-speed data.
20. WLAN Interfaces
(1) WLAN (Wireless Local Area Network) is established using wireless communication technology within a certain local range and is a product of the combination of computer networks and wireless communication technology, providing the functions of wired local area networks through wireless multi-access channels.
(2) WLAN standards: Mainly target the physical layer and medium access control layer (MAC layer), involving all wireless frequency ranges used, control interface communication protocols, and other technical specifications and standards.
A. IEEE 802.11: Defines the physical layer and MAC layer specifications, operating in the 2.4-2.4835GHz frequency band, with a maximum speed of 2Mb/s, which is the original wireless local area network standard established by IEEE.
B. IEEE 802.11b: Operating in the 2.4-2.4835GHz frequency band, with a maximum speed of 11Mb/s and a transmission distance of 50-150 inches. It operates in both point-to-point and basic modes. The data transmission rate can automatically switch between 11Mb/s, 5.5Mb/s, 2Mb/s, and 1Mb/s based on actual conditions.
C. IEEE 802.11a: Operating in the 5.15-8.825GHz frequency band, with a maximum speed of 54Mb/s/72Mb/s and a transmission distance of 10-100m.
D. IEEE 802.11g: A hybrid standard that has the transmission speed of IEEE 802.11a and better security than IEEE 802.11b, using two modulation methods to achieve compatibility with both IEEE 802.11a and IEEE 802.11b.
(3) WLAN has two types of network types: peer-to-peer networks and infrastructure networks.
21. Bluetooth Interfaces
(1) The purpose of Bluetooth technology: To enable seamless resource sharing between specific mobile phones, portable computers, and various portable communication devices within a short distance.
(2) The essence of Bluetooth technology is to establish a universal wireless air interface and its control software as an open standard. It operates in the globally common 2.4GHz ISM (Industrial, Scientific, Medical) band, with a data transmission rate of 1Mb/s, using a time-division duplex scheme to achieve full-duplex transmission, with an ideal connection range of 10cm to 10m.
(3) The Bluetooth baseband protocol combines circuit-switched and packet-switched methods.
(4) Characteristics of Bluetooth technology:
A. Short transmission distance, with a working range within 10m.
B. Uses frequency hopping spread spectrum technology.
C. Uses time-division multiplexing technology to effectively avoid issues like “collisions” and “hidden terminals”.
D. Network technology.
E. Language support.
F. Error correction technology, using FEC (Forward Error Correction) schemes.
(5) The Bluetooth interface consists of three major units: wireless unit, baseband unit, and link management and control unit.
22. 1394 Interfaces
(1) 1394, as a standard bus, can bridge communication between different industrial devices, allowing up to 63 devices to be connected on one bus.
(2) Characteristics of IEEE 1394:
A. Supports multiple bus speeds to meet different application requirements.
B. Plug-and-play, supporting hot swapping.
C. Supports both synchronous and asynchronous transmission modes.
D. Supports point-to-point communication mode; IEEE 1394 is a multi-master bus.
E. Follows the ANSI IEEE 1212 control and status register (CSR) standard, defining a 64-bit address space, capable of addressing 1024 buses with 63 nodes, each node capable of containing 256TB of memory space.
F. Supports long-distance transmission.
G. Supports fair arbitration principles, ensuring sufficient transmission bandwidth for each transmission method.
H. The six-wire cable has power lines and can transmit 8-40V DC voltage.
(3) The protocol stack of IEEE 1394 consists of three layers: physical layer, link layer, and transaction layer, with an additional management layer. The physical layer and link layer are hardware-based, while the transaction layer is primarily implemented by software.
A. The physical layer provides the electrical and mechanical interfaces for IEEE 1394, performing the function of reassembling byte streams and sending them to the destination node.
B. The link layer provides confirmation data services to the transaction layer, including addressing, data framing, and data verification.
C. The transaction layer provides services to applications.
D. The management layer defines all protocols, services, and processes used by a management node.
23. Power Interfaces
(1) DC-DC converters have three types:
A. Linear regulators: Produce voltages lower than the input voltage.
B. Switching regulators: Can increase, decrease, or invert input voltage.
C. Charge pumps: Can increase, decrease, or invert input voltage, but have limited current driving capacity.
(2) The conversion process of any transformer does not have 100% efficiency; regulators also use current (static current), which comes from the input current. The larger the static current, the greater the power consumption of the regulator.
(3) Linear regulators use decoupling capacitors at the input and output to filter, which not only helps stabilize the voltage but also helps remove momentary short-duration pulse waveform interference in the power supply.
(4) The square relationship between voltage and power consumption implies that the ideal efficient method is to execute code at a lower clock rate requiring lower voltage, rather than executing code at the highest clock rate and then switching to idle sleep.
(5) The power supply is generally considered the “heart” of the entire system, with the vast majority of electronic devices having 50%-80% of their energy-saving potential in the power supply system, making the development of new types of switching power supplies a major initiative for energy saving.
(6) Design techniques for reducing power consumption:
A. Use low-power devices, such as selecting CMOS circuit chips.
B. Use high-integration dedicated devices, and the selection of external devices should also support low-power design as much as possible.
C. Dynamically adjust the clock frequency and voltage of the processor, using low-frequency devices whenever possible.
D. Utilize “power-saving” operating modes.
E. Reasonably handle the unused pins of devices:
a. The power consumption of most digital circuits’ output ends is significantly higher when outputting low levels than when outputting high levels; design should focus on controlling the duration of low-level output, keeping it in a high-level output state when idle.
b. Extra inputs of NOT gates and NAND gates should be connected to low levels, while extra inputs of AND gates and OR gates should be connected to high levels.
c. For ROM or RAM and other devices with chip select signals, the chip select pin should not be directly grounded to avoid the device being powered on for an extended period; instead, it should be combined with the “read/write” signal, enabling it only during read/write operations.
F. Implement power management, designing external power control circuits for devices, controlling the power supply of “power-hungry” devices.
From the WeChat public account of Information Technology People