Method to Minimize the Clock Skew and Uniform Clock Distribution using Parallel Port in Pipe Line Based Multi Channel DMA Request Terminal for Frequency Measurement
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
This paper presents a new wide-range digital speed measurement method with jitter removal technique and using the direct memory access (DMA) terminal count register (TCR). Our work also supports a multi node interfacing from different measure ends. The multiple measure ends are interfaced with DMA channels through pipelines to improve hit ratio. Here hit ratio indicates the exact identification of encoder pulses without any fail or miss. But the conventional pipeline system is facing problems due to improper synchronization of clock pulses. This is a universal problem in all the digital systems mostly called jitter or skew. Here a new system is implemented in the path of the clock to remove or reduce the clock skew. The jitter is also introduced in the pipeline due to different clock paths to the parallel pipelines. While one pipeline access the encoder pulses the remaining pipelines remain in idle state as single clock pulse is used to fed encoder pulses. And it creates a big challenge if multiple clock pulses are given to individual pipeline systems. This can be overcome using parallel ports as clock signals. The DMA method is based on both pulses counting in the constant sampling time at terminal count stop pin of a DMA controller. The hardware configuration and algorithms for a microcontroller implementation are also presented. The proposed method is suitable in systems using microcontrollers with MA controller and timers. Limitations and sources of errors are discussed in details. The DMA Terminal count register method is suitable for real-time speed control systems
A comparison between Public key authority and certification authority for distribution of public key
The key management of public key defines two aspects first one is the distribution of public key and the second one is the use of public key to distribute secret keys for encryption. In this paper we are presenting the...
Outlier Detection for Multidimensional Medical Data
The knowledge-rich nature of the Medical Information domain has made it an ideal environment where knowledge on data mining should have to be unearthed from large data collection for dialysis’ of growing unknown diseases...
Application of Free and Open source software and its Impact on society
Free and open source software is one of the effective tool that can make the world self-dependent. It facilitates the design and use of your own software. This can also lead to economic liberty as the FOSS...
A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core bankin...
An Approach to Shortest Path Technique for BGP Using OSPF
The routing of traffic between Internet domains, or Autonomous Systems (ASs), a task known as interdomain routing, is currently handled by the Border Gateway Protocol (BGP). In this paper, we address interdomain routing...