If a periodic process in the on-board train protection system is used to collect data from the trackside transmitter, how often must it be scheduled to ensure that the system is guaranteed to collect information from the transmitter? Explain how you arrived at your answer.
What will be an ideal response?
If a periodic process in the on-board train protection system is used to
collect data from the trackside transmitter, how often must it be scheduled
to ensure that the system is guaranteed to collect information from the
transmitter? Explain how you arrived at your answer.To estimate the period of the process for trackside information collection, we must
be able to ensure that the process will always be scheduled during the period can
access the trackside information and collect information before it passes out of
range of the transmitter. Here we use the maximum train speed (50 m/sec), the
transmission time (50 ms) and the fact that the train must be within 10 m of the
transmitter before it can collect information.
Simplistically, the train is within 10 m of a transmitter for 400 ms assuming
that the distance between the train and the transmitter is negligible. It takes 50 ms
to collect the information so collection must start within 350 ms of entering a
segment. Therefore, if the process collecting data from the transmitter is scheduled
3 times/second, it ought to always be able to collect transmitter data.
You might also like to view...
Evaluate ( 00001000 & 11000101 ) ^ ( 11110000 ).
a. 00001101 b. 11000000 c. 00111101 d. 11110000
When you see double chevrons on the Address bar, you know the entire path is being displayed
Indicate whether the statement is true or false
A union is a construct that combines two structures while eliminating any duplicate fields.
Answer the following statement true (T) or false (F)
An attack that is using interference as its main attack to impede network traffic is which of the following?
A. Introducing too much data to a targets memory allocation B. Utilizing a previously unknown security flaw against the target C. Using a similar wireless configuration of a nearby network D. Inundating a target system with SYN requests