wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Embedded Operating System

profile
Vaibhav Gohil
Sep 09, 2024
0 Likes
0 Discussions
98 Reads

Embedded Operating system

All Embedded Systems are task specific. They mostly do a particular task on loop/repeatedly for their entire lifetime. These systems are designed to execute their task within a particular time interval, and thus they have to be fast enough to be up to their time limit.

They have little or no user interface like a fully automatic washing machine does its task fully once its programmed is set and stops after its work is finished with almost no user interface.

They are built to achieve a particularly good efficiency level. They are very small in size operating system, need little power

These systems can't at all be upgraded or updated. Thus, they must be really high on efficiency and reliability as they can't be updated.

Advantages

The advantages of embedded operating system are as follows −

  • Portable
  • Much faster than other operating systems
  • Less Hardware requirement
  • Highly Predictable

Disadvantages

The disadvantages of embedded operating system are as follows −

  • Less optimization
  • High modification is required
  • Customization is time taking process

Characteristics

The characteristics of the embedded operating systems are as follows −

  • All Embedded Systems are task specific. They mostly do a particular task on loop/repeatedly for their entire lifetime.
  • All embedded systems are designed to execute their task within a particular time interval, and thus they have to be fast enough to be up to their time limit.
  • They have little or no user interface like a fully automatic washing machine does its task fully once its programmed is set and stops after its work is finished with almost no user interface.
  • They are built to achieve a particularly good efficiency level. They are very small in size and, need little power.
  • These systems can't at all be upgraded or updated. Thus, they must be really high on efficiency and reliability as they can't be updated.

Roles

The roles performed by embedded operating system are as follows −

Resource allocator

  • The role of a resource allocator is to act as a manager. The basic task is to manage the resources of both the hardware and software to allocate and assign them to the specific program and user. It helps in the proper use of the OS and also supports the better execution of the programs.

Resource controller

  • The role of the resource controller is to help the programmer and the system manager in the creation and the controlling of the subsystem. This task is accomplished with the help of a certain set of commands and subroutines.

Resource monitor

  • The role of the Resource monitor is to act as a utility in the Windows Operating System to let the user monitor the use of the hardware that is, CPU, memory, disk, and network along with the software that is various file handles and modules. This task is done in real-time and the performance of the OS is improved and utilized as per the requirement.

User-friendly interface

  • The User interface, usually termed as UI is the medium with the help of which a user or person interacts with the hardware or the software to get his required task complete.
  • Now, the interface which is designed in such a manner that it does not confuse the user and the user can easily interact with the system is called a User-friendly interface.
  • If the User interface of a given software or hardware is User-friendly then it gains trust and the confidence of the user increases respectively. It is more demanded over a normal interface.

Comments ()


Sign in

Read Next

Heart Fulness Meditation

Blog banner

"Mahakali cave"

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Article on Zoho Corporation

Blog banner

Facebook marketing

Blog banner

Deadlock and Starvation

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

To travel is to live

Blog banner

Session Vulnerabilities

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Mobile Survey

Blog banner

Virtual Machine

Blog banner

Evolution of the Microprocesor

Blog banner

Danger assessment in GIS

Blog banner

Memory Management in Operating System

Blog banner

(Input/Output) in os

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Security requirements for Safe E-Payments

Blog banner

WINDOWS I/ O

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Importance Of Education.

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

EdTech (Education Technology)

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Supervised and unsupervised learning

Blog banner

File sharing

Blog banner

Principles of Concurrency

Blog banner

Steganography

Blog banner

Artificial Intelligence and I

Blog banner

How return on investment is defined in IT services

Blog banner

A small world of Sockets

Blog banner

Clarizen

Blog banner

Go Daddy

Blog banner

Multicore and Multithreading

Blog banner

A True Friendship

Blog banner

Explain website hacking issues

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Concurrency and memory

Blog banner