Bus-based standards benefit future systems

Linder, Matthew
September 2004
Vision Systems Design;Aug2004, Vol. 9 Issue 8, p25
Discusses the Institute of Electrical and Electronics Engineers (IEEE)-1588 standard which deals with the synchronization of clocks running on separate nodes of a distributed measurement and control system. Classification of clock nodes in the network; Features of IEEE-1588; Details of the implementation; Problems of a computer-based imaging system; Implementation issues.


Related Articles

  • A dynamic-sized nonblocking work stealing deque. Hendler, Danny; Lev, Yossi; Moir, Mark; Shavit, Nir // Distributed Computing;Feb2006, Vol. 18 Issue 3, p189 

    The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (hencheforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of choice in both industry and academia. This highly efficient scheme is based on a collection of array-based...

  • FlexRay.  // Electronic Design;1/12/2006, Vol. 54 Issue 1, p30 

    The article presents frequently asked questions related to FlexRay. One of the questions seek information on the application of FlexRay. Another question is about the physical characteristics of FlexRay. Another question is about the static and dynamic transmission. One another question is...

  • Understanding the basics. Gilmer, Brad // Broadcast Engineering;Jan2008, Vol. 50 Issue 1, p30 

    The article discusses the basics of computer network protocols. Computer network protocols consists of transaction control protocol and Internet Protocol. They almost always work together, but are actually two separate protocols. Network protocols are layered on top of each other to allow a...

  • Remote Powers of an Integrated BAS. Hollinger, Christopher A. // Heating/Piping/Air Conditioning Engineering;Jul2003 Supplement, Vol. 42, p72 

    Discusses the benefits of an integrated building automation systems. Development and application of standard computer network protocols; Optimization of control loops using current shared information; Availability of information for real time command and control. INSET: The Benefits of Systems...

  • Research and Implementation of Collision Detection Based on Modbus Protocol. Fang, Yinglan; Han, Xianfeng; Han, Bing // Journal of Engineering Science & Technology Review;2013, Vol. 6 Issue 1, p91 

    In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict...

  • Particle Swarm Optimization Based Approach for Resource Allocation and Scheduling in OFDMA Systems. Chakravarthy, Chilukuri Kalyana; Reddy, Prasad // International Journal of Communications, Network & System Scienc;May2010, Vol. 3 Issue 5, p466 

    Orthogonal Frequency-Division Multiple Access (OFDMA) systems have attracted considerable attention through technologies such as 3GPP Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX). OFDMA is a flexible multiple-access technique that can accommodate many...

  • Fluid limits for an ALOHA-type model with impatient customers. Frolkova, Maria; Foss, Sergey; Zwart, Bert // Queueing Systems;Oct2012, Vol. 72 Issue 1/2, p69 

    Random multiple-access protocols of type ALOHA are used to regulate networks with a star configuration where client nodes talk to the hub node at the same frequency (finding a wide range of applications among telecommunication systems, including mobile telephone networks and WiFi networks). Such...

  • FIXML Set for Boost from FPL Working Group. Sandman, John // Securities Industry News;7/21/2003, Vol. 15 Issue 28, p1 

    Reports on the formation of FIXML schema working group by FIX Protocol Ltd. for deployment of extensible markup language (XML) throughout the securities industry. Function of the FIXML schema; Compatibility of FIXML and the tag-equals-value version of computer network protocol Financial...

  • Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection.  // International Journal of Computer Applications;Sep2010, Vol. 6, p1 

    The article offers information on WireShark technology and its effectiveness in detecting network intrusion. It mentions its efficacy of the said technology in determining the activities of intrusive packets in several computer networks through real time network analysis. It also denotes its...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics