• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Microcontrollers Features and example of the type of application its best suited.

Extracts from this document...


Microcontrollers Features and example of the type of application its best suited 87C51FB microcontroller This is an 8-bit chip microcontroller that has been improved from the 87C51FA. Its features make it a powerful microcontroller, which is ideal for applications such as pulse width modulation, high-speed I/O and up/down counting capabilities. The suitable application for 87C51FB microcontroller would be windshield wiper system, because of its adequate program memory and RAM. It has on board Program Array Counter (PCA), which enables it to capture input and output pulse width modulation. The input capture feature is needed in order for pulse width measurement to work with capacitive sensors (used to detect rain on the windshield). The 87C51FB offers a controlled variable speed of the wipers. The Features: > 12 MHz Operation > Three 16-bit Timer/Counters > 7 Interrupt Sources, with 4-level interrupt priority > Programmable Counter Array (PCA) ...read more.


are built into the 68HC11 microcontroller. The application best suited for 68HC11 microcontroller is an emergency communicator system application because it - Records a set of personalised emergency messages. - Dial customised telephone number(s) when triggered by a pushbutton, monitor, sensors etc. - Monitor call status and delivers recorded massages. The Features: > Power saving STOP and WAIT modes > Synchronous Serial Peripheral Interface (SPI) > 8-channel 8-bit Analog-to-digital (A/D) converter > HCMOS > EEPROM > Clock monitor > Parallel input/output > Highest priority interrupt > 16-bit Timer system Features applied to the emergency communicator system > HCMOS Low power - operates on battery backup Noise immunity - operates in surroundings with telephone line and (possibly) radio transmitters > EEPROM Calibration table -look up values for dial tones, ring back signals, busy signals etc. User parameters - a list of telephone numbers to call in a case of different emergencies System configuration - the locality of the emergency message ...read more.


is one of the most commonly used, these are relatively cheap, encompass decent tools, and also presents a good possibility of upgrading to larger and more capable parts. Intel is the first company that is responsible for the 8051 family, other companies has taken up the idea and largely produces these microcontrollers, such as Atmel, Dallas Semiconductors, and Philips The suitable application for 80251 microcontrollers would be a cellular phone application. Because of the features it has which is similar to a cellular phone: > UART (Universal Asynchronous Receiver Transmitter) To transfer data, to and from the serial port > Watchdog Timer To reset processor after a specified interval when activated, and provides a means of gracefully recovering from system problems > Interrupt Handler To provide a means of interrupt polling and handle real-time interrupt that may occur. > Power Monitoring and Management This mode is very useful in terms of reducing power consumption when the processor is idle. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computing Project

    Films Table (Design View) Loans Table (Deign View) Usernames and Passwords Table (Design View) 3. Details of SQL Used Overdue Loans Query SELECT [Loans Table].MemberID, [Loans Table].DVDId, [Films Table].FilmTitle, [Loans Table].DateBorrowed, [Loans Table].DateBack, [Loans Table].LoanID, [Loans Table].Price FROM [Members Table] INNER JOIN ([Films Table] INNER JOIN [Loans Table] ON [Films Table].DVDId = [Loans Table].DVDId)

  2. Computing Project

    Process to calculate Total spent so far =([Total lessons])*([Price Per lesson]) Produce report of students ready for test Search through student details with criteria field Ready students to find matching records. If there are no matching records output an error message to the user.

  1. Different Control Sensors

    * Industrial controls, * Communication, * Ordnance, * Ground support equipment Different types of rotary switches are used in a variety of electric devices. They are in the form of at least two parts and have a rotatable switching means arranged in a grouping and a rotary knob having a

  2. Asynchronous and Synchronous

    The bit rate is then combined to include these two extra bits and this is called the baud rate, this would then be 10 bits a second (8+2). Start bit Stop bit Parity bit Asynchronous and Synchronous Asynchronous communications do not depend on the synchronisation of a transmitter or a clock.

  1. AQA Computing CPT3

    error message will display, such as "Price Is Too High, Must Be Below �5.00". The price per litre displays on the customer and cashier interfaces will change immediately after the price has been adjusted. Button Identifiers Button Identifiers Name Button Name Function Start Dispensing 'Lift Nozzle & Start Dispensing' This

  2. Smart Card System

    emerging needs of the smart card market through the development of highly secure and open platforms. The aim of the project is to develop new platforms that will offer: * Advanced VLSI, sub micron chips for embedding in plastic cards; * High levels of security against a broad range of

  1. Flexible Architectures in Communication Security Application

    We present analysis of a 0.25um physical design that runs the standard Rijndael cipher algorithm 2.25 times faster than a 600MHz Alpha 21264 processor. Moreover, our implementation requires 1/100th the area and power in the same technology. We demonstrate that the performance of our design rivals a state-of-the-art dedicated hardware implementation of the 3DES (triple DES)

  2. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    The Application layer includes the Wireless Application Environment (WAE) and Wireless Telephony Application (WTA), which are the topmost layers in the protocol. They are the main interfaces to the client devices and specify a markup language, a scripting language, and a telephony interface. WAE and WTA impose a few, simple and basic requirements on the client device.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work