Skip to main content

System on a Chip (SOC) - What it means



The Driving Force....

Microprocessor and Microcontrollers are central to all electronic devices in market today. They form the central brain which coordinates the symphony of processes, be it Data storage, Memory retrieval, Machine learning or Artificial intelligence. 

This mediates a constant demand for performance and agility. Here is the main relevance of System on a chip (SOC). It is a term denoting a specific architecture, where many components are encompassed on a single chip. 

Early 70s, Mainframe Servers contained a Central Processing Unit (CPU), Memory, Cache, Audio/Video converters, all existing as separate devices. They were then soldered onto a single motherboard. This layout drastically reduced processor efficiency, while increasing size. 

The approach was also inherently expensive, which is why personal computers were considered Sci Fi fiction, then.

However, coming to the 80s, there came a giant step in chip fabrication process. More for less became the norm, and wafer manufacturing focused on compressing essential components into a single framework. 

Now with modern lithography/UV techniques, a chip contains within it all the needed components. This includes Memory, USB controller, GPU (Graphical Processing Unit), Wi-Fi, and Bluetooth modules. 

Recently to facilitate Artificial Intelligence, NPU (Neural Processing Units) are also introduced into the architecture.



  

This new chip design reduced space constraints, increased performance and speed. All the while, not compromising on system functionality.

Special use cases include consumer electronics, automotive systems, multimedia, game consoles and medical devices.

However, there are certain disadvantages which include

  • Higher point of failure. Since most essential components reside on a single chip, any error in one area, causes the entire system to crash.
  • More complex. Integrating more components within a single package can be tedious to design. So, it can delay the time period from production to market. 




Additional Information:


Comments

Popular posts from this blog

Man In The Middle Attack - EavesDropping in the Digital World

    This is a term used to describe a cyber attack where a hacker acts as middleman, during data transfer between user and an application. The app can be a financial or an E commerce website, Software as a Service (SaaS) etc. The hacker can intercept data passed via the browser to the website, and collect sensitive information such as account and credit card details, user login etc. To put it into context, it is like a postman who reads all the letters addressed to you, then reseals the same, on delivery. This way no one suspects a foul play.   Interception This is the first phase of the attack. Here the hacker establishes a connection with the target device whether a PC, Laptop or Smart phone. This is done   through various methods   like   Free WiFi  : Here a WiFi hot spot is set up  which is not password protected. When a user logs in to the network, they are in essence connecting to the hacker's system. Now any data transfer occurs via this co...

Internet of Things-Connection Redefined

  Imagine driving home after a long day of work. En route the car instructs the residence to automatically turn on the lights, prepare a hot bath, and download the latest Netflix series. While this may seem like a line from a SciFi script, the future is more realistic than ever. Welcome to the world of IoT or Internet of Things. Though not as popular as its famous counterpart, Artificial Intelligence, its penetration into the consumer market is indeed extensive. What is IoT...... It is the term used to describe a   device, or set of devices which are connected to the internet,   and also communicate with each other. They can share data obtained from various sensors to a central hub, analyze it using  AI, and take appropriate actions. For example, a smart thermostat can read the room temperature, analyze the same, and adjust the heating system without any human intervention. Another example would be a smart camera which provides video footage when a movement is detect...

Bluetooth - You are Connected

       We are entering the era of Internet of Things (IoT) devices, where each device connects remotely to one another, and the world wide web. This makes them smart in the way of integration to Artificial Intelligence, Machine learning and Data analysis. There are number of network protocols that facilitate this peer to peer communication be it ZigBee, Matter etc. More on that later.    What is Bluetooth  Invented  in 1994 by Ericsson and widely used, Bluetooth allows for short distance communication, within 10 meter radius. The data speed is between 1 Mbps and 3 Mbps. The bandwidth is in the range of 2.4 GHz to 2.485 GHz.   Frequency Hopping Unfold Spectrum This is the underlying tech used in Bluetooth. Data signals by default have low frequency, and high bandwidth. This makes them prone to distortion, affecting long distance transmission. Also the receiving antennas  have to be large in size which is a limitation for mobile phone...