Explore chapters and articles related to this topic
MIL-STD-1553B Digital Time Division Command/Response Multiplex Data Bus
Published in Cary R. Spitzer, Uma Ferrell, Thomas Ferrell, Digital Avionics Handbook, 2017
The standard tightly defines the criteria for the validation of a message. All words must meet certain checks (i.e., valid sync, Manchester encoding, number of bits, and odd parity) for each word and each message to be valid. But what about the contents of the DW? MIL-STD-1553 provides the checks to insure the quality of the data transmission from terminal to terminal, sort of a “data in equals data out,” but is not responsible for the validation tests of the data itself. This is not the responsibility of the 1553 terminal electronics, but of the subsystem. If bad data are sent, then “garbage in equals garbage out.” But the standard does not prevent the user from providing additional levels of protection. The same techniques used in digital computer interfaces (i.e., disk drives and serial interfaces) can be applied to 1553. These techniques include checksums, cyclic redundancy check (CRC) words, and error detection/correction codes. Section 80 of MIL-HDBK-1553A that covers DW formats even offers some examples of these techniques.
Twenty-first century transport: SNG over IP
Published in Jonathan Higgins, Satellite Newsgathering, 2012
However if an acknowledgment is not received within a practical ‘round-trip time’ (RTT), a timer at the originating TCP node will cause a timeout. The data is then assumed to have been lost and it will then be re-transmitted. TCP also checks that no bytes are damaged by using a checksum computed at the originating node for each block of data before it is sent, and then re-checked by the receiving node. A checksum is a way of detecting errors by adding up all the bytes in the packet and transmitting the summed result at the end of the packet.
Digital Signage Broadcasting
Published in Lars-Ingemar Lundström, Digital Signage Broadcasting, 2013
The multicasting server does several steps of processing. First it detects if a new file shows up in the FTP server upload folder. If so, the file is transferred to the multicasting server to be inserted into a noncontinuous multicasting distribution channel (Figure 7.26). But before creating one or more multicasting IP channels, additional data are inserted, including error protection and data related to addressing of the multicasting streams. A checksum-based process is used to validate that the packets are correctly received at the other end.
A Security Model for Web-Based Fuzzy-Logic Direct Torque Control of Induction Motor Drive
Published in IETE Journal of Research, 2022
The essential technology contributing virtually to all automated network and computer security applications is known as encryption. Encryption was primarily used for military, espionage, and in e-commerce industry. Some of the uses of encryption of information are: Encryption protects data integrity from being hacked or modified. Data integrity is to be maintained while transferring data. Checksum and hash-function techniques provide data integrity.Users are authenticated by RSA and Digital Signature Algorithm (DSA) methods.Secrecy is retained by algorithms such as Triple-DES and Blowfish algorithm for maintaining confidentiality.