External communication interfaces, Computer Engineering

Assignment Help:

External interface is interface between I/O interface and peripheral devices. Interface can be characterised into 2 main categories: (a) parallel interface and (b) serial interface.

In parallel interface multiple bits can be moved concurrently. Parallel interface is generally used for high-speed peripherals like tapes and disks. Dialogues which occur across interface include exchange of control information and data.

In serial interface just one line is used to transmit data so just one bit is transferred at a time. Serial printers are used for serial printers and terminals. With a fresh generation of high-speed serial interfaces so parallel interfaces are becoming less common.

In both cases I/O interface should engage in a dialogue with peripheral. Dialogue for a write or read operation is as follows:

  • A control signal is transmitted by I/O interface to peripheral requesting permission to send (for write) or receive (for read) data.
  • Peripheral acknowledges request.
  • Data are transferred from I/O interface to peripheral (write) or from peripheral to I/O interface (read).
  • Peripheral admits receipt of data.

Connection between an I/O interface in a computer system and external devices can be either P2P or multipoint. A P2P (point-to-point) interface provides a dedicated line between I/O interface and external device. For illustration keyboard, printer and external modems are point-to-point links. The most ordinary serial interfaces are RS-232C and EIA-232. 

Multipoint external interface used to support external mass storage devices (like disk and tape drives) and multimedia devices (like CD-ROM, video, audio).


Related Discussions:- External communication interfaces

Addition of array elements using two processors, Q. Addition of array eleme...

Q. Addition of array elements using two processors? In this example we have to find sum of all elements of an array A of size n. We will divide n elements in 2 groups of roughl

Subsequent step in karnaugh map, The subsequent step in Karnaugh map is to ...

The subsequent step in Karnaugh map is to map truth table in the map. Mapping is done by putting a 1 in respective square belonging to 1 value in truth table. This mapped map is us

What is configuration, What is configuration?  Turing  machine  compute...

What is configuration?  Turing  machine  computes,  changes  occur  in  the  current  state,  the  current  tap contents  and  the  current  head  location. A  setting  of  the

Example of asymptotic notations, Q. Example of asymptotic notations? Th...

Q. Example of asymptotic notations? The function f (n) belongs to the set  (g(n)) if there exists positive constants c such that for satisfactorily large values of n we have 0

Describe the structure of a neuron - artificial intelligence, 1. Figure 1 b...

1. Figure 1 below shows the truth table for five different functions. Each truth table shows the inputs x1, x2 and the desired output d. (a) Write down which of these functions

Define target _blank, TARGET = "_blank" "_blank" opens new document in...

TARGET = "_blank" "_blank" opens new document in a new window. Run the code given in Figure and check how it works. This value doesn't require the use of any frames. "_blank"

The javascript validation not run on the asp.net, Why The JavaScript Valida...

Why The JavaScript Validation Not Run on the Asp.Net? The Asp.Net Button Is post backed on the server & not yet Submit & when it goes to the server its states is lost so if we

Incorporate exception handling, Assignment (to be published later) will req...

Assignment (to be published later) will require you to extend the menu-driven application developed in Assignment 2B, to incorporate the recording details of the doctors who will b

How to get the column count of a report, How to get the column count of a r...

How to get the column count of a report? SY-LINSZ system variable gives the column count (line size) and SY-LINCT for line count.

Explain about RISC architecture, Q. Explain about RISC ARCHITECTURE? Le...

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd