Posts

Showing posts from 2022

Financial Advice

Image
  An emergency fund should be greater than 6th month of living expenses. Invest 15% of income for the Retriment fund.  Loan Pre-Payment Benefits: Long-term loans like home loans allow you to take part in pre-payments. In a rising interest rate environment, rethink your home loan repayment strategy and consider making pre-payments to save on rising interest costs. Just an extra few thousand every month can reduce your interest payout over the long term. “Prepaying your home loan as and when funds are available can do wonders and shorten your ballooning loan tenor,” says Shetty. For example, if you pay 5 per cent of the loan balance every year, you can pay off your 20-year loan in 12 years. Prepaying one additional EMI every year can close your loan in just 17 years, and if you increase your EMI by 5 per cent every year, you can finish your loan in less than 13 years. A 10 per cent increase in your EMI every year can close your loan in about ten years. Lastly, consider refinanci...

Infineon Tri core Architecutre

Image
Architectural Registers The TriCore architectural registers consist of 32 General-Purpose Registers (GPRs), two 32-bit registers with program status information (PCXI and PSW), and a Program Counter (PC). Four GPRs have special functions:  D15 is used as an implicit data register A10 is the stack pointer (SP) A11 is the return address register  A15 is the implicit base address register  PCXI, PSW, and PC are Core Special Function Registers (CSFRs). The PCXI and PSW registers contain status flags, previous execution and protection information. Memory model: The TriCore architecture can access up to 4 Gbytes of unified program and I/O (Input/ Output) memory. The address width is 32-bits. The address space is divided into 16 regions or segments (0 through 15). Each segment is 256-Mbytes. The upper four bits of an address select the specific segment. The first 16-Kbytes of each segment can be accessed using either absolute addressing or absolute bit addressing with the bit se...

Write 1 on Pin 16 in ODR Register using 5 ways

 Write 1 on Pin 16 in ODR Register  using 5 ways 1. Using numeric memory Address directly # define GPIO_ODR_ADDRESS 0X00010004 Void main() {  *(volatile uint32_t*)  GPIO_ODR_ADDRESS |= 1<16; } 2. Casting an address to a pointer # define GPIO_ODR ((volatile uint32_t*) GPIO_ODR_ADDRESS ) Void main() {  * GPIO_ODR |= 1<16; } 3. Casting to a pointer and then dereferencing it # define GPIO_ODR *((volatile uint32_t*) GPIO_ODR_ADDRESS ) Void main() {    GPIO_ODR |= 1<16; } 4. Use structure union and pointer for one register # define GPIO_ODR *((volatile uint32_t*) GPIO_ODR_ADDRESS ) #pragma pack(1) struct SGPIO_ODR_t {     uint32_t pin0:1;     uint32_t pin1:1;     uint32_t pin2:1;     uint32_t pin3:1;     uint32_t pin4:1;     ...     ...      ... } union U_ODR  {     struct SGPIO_ODR_t S_ODR;     uint32_t ODR; } volatile union U_ODR *GPIO_ODR...

Cryptography and Encryption Basics - II

Image
Cryptography and Encryption Basics - II RC4  RSA cryptography Key Exchange: Diffie-Hellman Key Exchange: Key Escrow; Trust Module: Public Key Infrastructure (PKI) and Digital Certificates:   Hash Functions: Digital signature:  Digital signatures are related to encryption, but do not mean a message is in encrypted. A digital signature is a verification of the authenticity of the digital message or documents. The digital signature makes sure that the message was created by a known sender, and the message was not altered in transit.  Digital Certificates: 

Cryptography and Encryption Basics - I

Image
Cryptography and Encryption Basics I What is encryption Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized can't.  Converts information from plain text into encrypted ciphertext. But how...? Encryption used algorithm! An algorithm is a procedure that the encryption process follows. The specific algorithm is called the ciper or code. there are many types so encryption algorithms. The encryption's goal and level of security determine the most effective solution. Triple DES, RSA and Blowfish are some examples of encryption algorithms or Ciphers. What is Decryption? Decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.  converts information from encrypted ciphertext into plain text  Basic Example  Private key vs Public Key Private Key (symmetric key): This means that ...

UDS Protocol Interview Question

UDS Protocol Interview Question  Functional Group in UDS Diagnostic and communicatio management Data Transmission Stored Data Transmission Input/Output Control Remote Activation of Rountine Upload / Download Total (27 )services untill 2020,As Per ISO 14229 2020 there are (28) services. Why it is called UDS Unified       - Term 'Unified' in this context mens  that it is an international and not a Company- Specific Standard Diagnostic - Finding Root cause Service       - checking with existing content What are the types of request in UDS Valid request  Invalid request What are types for Responce in UDS. Positive responce Negative Responce What are type of NRC ISO Specific (0x12,0x13,0x22) ISO Reserved or Manufacture Specific (0x32,0x84 etc) What are the commonly used NRC 0x12 0x13 0x22 0x24 0x33 In Default which session will be active UDS supports different Operating session, which can be changed using the "Diagnostic Session control". Dependi...

Embedded C

Why use C? ‘C’ is a ‘mid-level’, with ‘high-level’ features (such as support for functions and modules) and ‘low-level’ features (such as good access to hardware via pointers) It is efficient Good, well-proven compilers are available for every embedded processor What is Embedded 'C'? Embedded C is an extension of the C language to support Embedded processors The aim is to provide portability and access to common performance-increasing features of processors The Embedded C specification for fixed-point, named address spaces, and named registers gives the programmer direct access to features in the target processor, thereby significantly improving the performance of applications Regular/college-level 'C' programming is different from Embedded System Programming because: An Embedded Micro has limited memory (ROM / RAM) Memory Area is assigned a set of fixed locations for different purposes. ANSI C has no proper support for accessing such locations. Execution Speed is very ...

Lauterbach

 T32  https://www.youtube.com/watch?v=RArL2E7pxbQ