Data autonomous transmission, Basic Computer Science

Assignment Help:

DATA AUTONOMOUS TRANSMISSION:

This could be the possible replacement for the ARINC 429 standard and will be annotated the standard - ARINC 629. In the DATAC system, the control function is distributed among all the participating terminals present on the bus. These terminals autonomously determine the transmission of data on the bus by means of a protocol termed Carrier Sense/Multiple Access-Clash Avoidance (CS/MA-CA). In simple terms the protocol guarantees access to any participating terminal, but prevents any terminal from access to the bus before all other terminals have had an opportunity to transmit data.


Data transmission by DATAC comprises strings of data words accompanied by a label and address data. The data length is 16 bits as for Mil Std 1553B, however DATAC offers more flexibility in terms of the number of terminals; 120 terminals may be supported in lieu of the maximum 31 offered by Mil Std 1553B.

DATAC will use serial Manchester bi-phase, 1 - 2 MHz data transmission over twisted wire. Note; The 629 data bus is an unscreened cable.

 


Related Discussions:- Data autonomous transmission

Unix, How do I change file permissions? Every time I execute chmod commands...

How do I change file permissions? Every time I execute chmod commands it tells me permission denied.

Data communications, Data communication as a need developed in the 1960s wi...

Data communication as a need developed in the 1960s with the interconnection of peripheral devices to mainframe computers. Within the immediate vicinity of the mainframe computer t

Three specific sections of the microprocessor, • CPU Structure This section...

• CPU Structure This section, with a simplified model of a central processing unit as an instance, takes you through the role of each of the major basic parts of the CPU. It also l

Microprocessor, how does microprocessor interpret with the burglar alarmn

how does microprocessor interpret with the burglar alarmn

Text, text graphics audio video

text graphics audio video

Distinguish between passive and active attacks, QUESTION (a) Distinguis...

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Explain the operations of alu, Question 1 Explain the operations of ALU ...

Question 1 Explain the operations of ALU Question 2 Write down the Booth's Multiplication Algorithm with an example Question 3 Explain the characteristics of memor

Server programs, Server Programs:   Server programs are dedicated compu...

Server Programs:   Server programs are dedicated computer programs that run as services and serve the needs or requests of other programs. These services may run on a dedicated

Cai, What is CAI? Explain its pitfalls.

What is CAI? Explain its pitfalls.

Data transmission, Data transmission: Most digital communication data i...

Data transmission: Most digital communication data is transmitted in a serial form, that is, only one bit at a time. Transmission of data in serial form means each bit is tran

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd