wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Embedded Operating System

profile
Vaibhav Gohil
Sep 09, 2024
0 Likes
0 Discussions
98 Reads

Embedded Operating system

All Embedded Systems are task specific. They mostly do a particular task on loop/repeatedly for their entire lifetime. These systems are designed to execute their task within a particular time interval, and thus they have to be fast enough to be up to their time limit.

They have little or no user interface like a fully automatic washing machine does its task fully once its programmed is set and stops after its work is finished with almost no user interface.

They are built to achieve a particularly good efficiency level. They are very small in size operating system, need little power

These systems can't at all be upgraded or updated. Thus, they must be really high on efficiency and reliability as they can't be updated.

Advantages

The advantages of embedded operating system are as follows −

  • Portable
  • Much faster than other operating systems
  • Less Hardware requirement
  • Highly Predictable

Disadvantages

The disadvantages of embedded operating system are as follows −

  • Less optimization
  • High modification is required
  • Customization is time taking process

Characteristics

The characteristics of the embedded operating systems are as follows −

  • All Embedded Systems are task specific. They mostly do a particular task on loop/repeatedly for their entire lifetime.
  • All embedded systems are designed to execute their task within a particular time interval, and thus they have to be fast enough to be up to their time limit.
  • They have little or no user interface like a fully automatic washing machine does its task fully once its programmed is set and stops after its work is finished with almost no user interface.
  • They are built to achieve a particularly good efficiency level. They are very small in size and, need little power.
  • These systems can't at all be upgraded or updated. Thus, they must be really high on efficiency and reliability as they can't be updated.

Roles

The roles performed by embedded operating system are as follows −

Resource allocator

  • The role of a resource allocator is to act as a manager. The basic task is to manage the resources of both the hardware and software to allocate and assign them to the specific program and user. It helps in the proper use of the OS and also supports the better execution of the programs.

Resource controller

  • The role of the resource controller is to help the programmer and the system manager in the creation and the controlling of the subsystem. This task is accomplished with the help of a certain set of commands and subroutines.

Resource monitor

  • The role of the Resource monitor is to act as a utility in the Windows Operating System to let the user monitor the use of the hardware that is, CPU, memory, disk, and network along with the software that is various file handles and modules. This task is done in real-time and the performance of the OS is improved and utilized as per the requirement.

User-friendly interface

  • The User interface, usually termed as UI is the medium with the help of which a user or person interacts with the hardware or the software to get his required task complete.
  • Now, the interface which is designed in such a manner that it does not confuse the user and the user can easily interact with the system is called a User-friendly interface.
  • If the User interface of a given software or hardware is User-friendly then it gains trust and the confidence of the user increases respectively. It is more demanded over a normal interface.

Comments ()


Sign in

Read Next

Explain Kernel in OS

Blog banner

DATA VAULT

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

PYTHON

Blog banner

Memory Management

Blog banner

Risk mitigation and management

Blog banner

ASANA- A Management System.

Blog banner

AOL Mail

Blog banner

Be kind person

Blog banner

Blockchain in IoT Applications

Blog banner

Teenagers of Today

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

STARVATION

Blog banner

Ethical Hacking

Blog banner

Tableau

Blog banner

Game via listing method

Blog banner

Comprehensive Bitcoin Mining - Aarti Dabholkar

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Data Mining

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

IT security management

Blog banner

Education: Key to your Prosperity

Blog banner

RAID

Blog banner

Buffer Overflow

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

MYNTRA

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

CoWIN

Blog banner

5 Common Faults In Construction Tenders

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Multiprocessor and Multicore Organization

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Deadlock in Operating System

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

A book review

Blog banner

RAID

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Deadlocks in Operating System

Blog banner

Self managing devices

Blog banner