Data autonomous transmission, Basic Computer Science

Assignment Help:

DATA AUTONOMOUS TRANSMISSION:

This could be the possible replacement for the ARINC 429 standard and will be annotated the standard - ARINC 629. In the DATAC system, the control function is distributed among all the participating terminals present on the bus. These terminals autonomously determine the transmission of data on the bus by means of a protocol termed Carrier Sense/Multiple Access-Clash Avoidance (CS/MA-CA). In simple terms the protocol guarantees access to any participating terminal, but prevents any terminal from access to the bus before all other terminals have had an opportunity to transmit data.


Data transmission by DATAC comprises strings of data words accompanied by a label and address data. The data length is 16 bits as for Mil Std 1553B, however DATAC offers more flexibility in terms of the number of terminals; 120 terminals may be supported in lieu of the maximum 31 offered by Mil Std 1553B.

DATAC will use serial Manchester bi-phase, 1 - 2 MHz data transmission over twisted wire. Note; The 629 data bus is an unscreened cable.

 


Related Discussions:- Data autonomous transmission

Reasons for recommendation free and open source software, For multi-nationa...

For multi-national business IT system, free and open source software (FOSS) is recommended over a proprietary system. The reasons for this recommendation are: 1. Security I

Unix, Shell Scriptiong

Shell Scriptiong

Php, Which of the following is NOT a type of SQL constraint?

Which of the following is NOT a type of SQL constraint?

Types of chat room, Types of chat room: Java Chat rooms: The most comm...

Types of chat room: Java Chat rooms: The most common and popular chat scripts are based on java which is object oriented language. Java is freely available and comes with virt

Input and output devices, Input and Output Devices : The most common input...

Input and Output Devices : The most common input devices that you will see in your PC are the keyboard and the mouse. The keyboard of the computer looks like the keyboard o

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

What is Load and store the assembly programs?, It would not emerge practica...

It would not emerge practical to type an entire program each time it is required, and to avoid this it is possible to store a program on the disk, with the vast advantage that by b

Visual basics, Assume that s is a string variable  that is supposed to con...

Assume that s is a string variable  that is supposed to contain a value to be converted to integer. Write a fragment of code that converts the value to integer variable  and displ

Explanation of different graphics applications, Problem 1 What are grap...

Problem 1 What are graphic applications? Explanation of different graphics applications Problem 2 Open the case cover of your CPU of your computer system and l

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd