Lesson Objectives Aims To understand the purpose of embedded systems

Slides:



Advertisements
Similar presentations
P2 – Describe the purpose of different types of computer systems
Advertisements

Copyright©2008 N.AlJaffan®KSU1 Introduction to Computers Chapter 1 Created By: N.AlJaffan Modified By:S.Abudawood.
Computer Networks.
C LIENT /S ERVER AND P EER TO P EER National 4/5 Computing Science.
MOBILE ACCESS TO THE INTERNET. Starter task In groups of 2 of 3, list as many mobile devices you can think of that can connect to the internet.
By the end of the lesson you will: 1.Be able to identify different types of computers 2.Be able to explain the advantages and disadvantages of different.
Introduction to Computers Copyright©2008 N.AlJaffan®KSU 1 Chapter 1.
Chapter 6 – Effect of ICT on Patterns of Employment Starter Task – Discuss this statement and the video? Last Lesson: - Trustworthiness of Information.
Introduction to Computer
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
1 Chapter 1.  What Is A Computer ? Computer is an electronic device, operating under the control of instructions stored in its own memory, that can accept.
Section 4.2 AQA Computing A2 © Nelson Thornes 2009 Types of Operating System Unit 3 Section 4.1.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Home Networking. The Smith Family This is the house the Smiths live in. Can you spot their digital devices?
By Brad kattler. Which is better The Answer They are both the same.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Network Topologies.
 Inverters come in all shapes and sizes, but mainly two types –  Modified Sine Wave  Pure Sine Wave.
Copyright © 2016 – Curt Hill The Digital World Understanding the challenges of this world.
Copyright©2008 N.AlJaffan®KSU1 Introduction to Computers Created By: N.AlJaffan Modified By: N.AlShehri Chapter 1.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Computer Networks – the basics Week 1 Lesson 1. In this project, you will be learning about the computer networks which we use every day – when we log.
“Candidates were not advantaged by defining every type of operating system provided as examples in the explanatory notes of the standard. Candidates who.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Discovering Computers 2009 Chapter 1 Introduction to Computers.
Introduction to Computers
OCR GCSE Computer Science Teaching and Learning Resources
CompSci 280 S Introduction to Software Development
AREAS OF APPLICATION Mechatronics is the synergistic combination of mechanical and electrical engineering, computer science, and information technology,
Unit 3 Virtualization.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Secure Hyperconnectivity with TeamViewer and Windows technologies
Networks 1 Key Revision Points.
Lesson Objectives Aims You should be able to:
Introduction to Computers
Prepared by: Celeste Ng Updated: May, 2017.
How SCADA Systems Work?.
Computer Hardware-Meeting the machine
Local Area and Wide Area Networks
Introduction to Computers
Types of Internet Access
MOBILE DEVICE OPERATING SYSTEM
Introduction to Computers
Mobile Website vs. Mobile App
AS PER OBE SYLLABUS DTE KARNATAKA SHANTHU M.Tech SAI JAYANI ACADEMY (R) SIXTH SEMESTER Diploma in ELECTRONICS AND COMMUNICATION ENGINEERING.
Introduction to Computers
Session III Architecture of PLC
Introduction to Computers
Programmable Logic Controllers (PLCs) An Overview.
Local Area and Wide Area Networks
Lesson Objectives Aims
Introduction to Computers
Lesson Objectives Aims
Networks 1 Key Revision Points.
Distributed computing using the internet
Ubiquitous Computing By: Patrick Yienger.
Introduction to Computers
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Computer Systems Key Revision Points.
IOT Acronym as “Internet Of Things”
Chapter 3 – Operating Systems
Journey of Computer and Information Technology
Client/Server and Peer to Peer
National 4/5 Computing Science
Objectives Explain the purpose and give examples of embedded systems.
Computer Systems Unit 1 – Lesson 1 Starter
Introduction to Computers
Presentation transcript:

Lesson Objectives Aims To understand the purpose of embedded systems To be able to give examples of embedded systems

Embedded Systems A computer system that is built in to another device A combination of hardware and software Custom built for a specific purpose Designed to perform a single, well defined task

Embedded Systems Unlike a general purpose computer (PC, tablet, phone) an embedded system does not usually have an operating system They may have very limited interfaces (maybe only a numeric display) Usually rely heavily on data from sensors

There are literally thousands. Some examples: Cruise Control Washing machines Dish washers TV set top boxes Heating controls

Advantages Usually small which means cheap to manufacture Very reliable (when did your dish washer last crash?) Will be perfectly suited/customised for the particular purpose it’s made for

Disadvantages Very expensive to create and develop Can be used in safety critical environments so must be heavily tested Can be very complex systems (usually) cannot be easily updated

Security Embedded systems have been given a super exciting buzz word name: IoT devices! All this means is lots of very pointless devices are being made that connect to the internet Which has some implications…

IoT Security is a huge one Silly default passwords No encryption Open to misuse without a user knowing What happens if the service is removed?! Not such a smart device any more!

Review/Success Criteria