External communication interfaces, Computer Engineering

Assignment Help:

External interface is interface between I/O interface and peripheral devices. Interface can be characterised into 2 main categories: (a) parallel interface and (b) serial interface.

In parallel interface multiple bits can be moved concurrently. Parallel interface is generally used for high-speed peripherals like tapes and disks. Dialogues which occur across interface include exchange of control information and data.

In serial interface just one line is used to transmit data so just one bit is transferred at a time. Serial printers are used for serial printers and terminals. With a fresh generation of high-speed serial interfaces so parallel interfaces are becoming less common.

In both cases I/O interface should engage in a dialogue with peripheral. Dialogue for a write or read operation is as follows:

  • A control signal is transmitted by I/O interface to peripheral requesting permission to send (for write) or receive (for read) data.
  • Peripheral acknowledges request.
  • Data are transferred from I/O interface to peripheral (write) or from peripheral to I/O interface (read).
  • Peripheral admits receipt of data.

Connection between an I/O interface in a computer system and external devices can be either P2P or multipoint. A P2P (point-to-point) interface provides a dedicated line between I/O interface and external device. For illustration keyboard, printer and external modems are point-to-point links. The most ordinary serial interfaces are RS-232C and EIA-232. 

Multipoint external interface used to support external mass storage devices (like disk and tape drives) and multimedia devices (like CD-ROM, video, audio).


Related Discussions:- External communication interfaces

What are the characteristics of the e-cash, What are the characteristics of...

What are the characteristics of the E-Cash? These kinds of payments, turning the Internet within a transaction oriented forum, need mediums which are easy and cheap (through a

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Very long instruction word architecture, Superscalar architecture was desig...

Superscalar architecture was designed to increase the speed of the scalar processor. But it has been realized it's not easy to apply. Subsequent are a number of problems faced in t

Functions to remove common walls, We must also be able to remove common wal...

We must also be able to remove common walls between two cells. Write the function removewalls that accepts two cells and removes the wall that is common between the two (hint: any

How do you import data from one more access database, The process of import...

The process of importing data from one more Access database follows these common steps they are. ? Preparing the document for import operation and make ensure that extensions ar

Find a connection factory, Why do I get an exception when trying to find a ...

Why do I get an exception when trying to find a connection factory? Ans) The exception is regularly something like java.io.InvalidClassException or java.lang.NoClassDefFoundErro

Compare memory mapped i/o with i/o mapped i/o, Compare memory mapped I/O wi...

Compare memory mapped I/O with I/O mapped I/O. Memory Mapped I/O Scheme: In this scheme there is only one address space. Address space is stated as all possible addresses tha

Performance of caches - computer architecture, Performance of caches: ...

Performance of caches:       Amdahl's Law regarding overall speed up:                  Alternatively, CPU stall can be considered:

How two domain servers having same set of names, Does it makes sense for tw...

Does it makes sense for two domain servers to contain exactly the same set of names? Why or why not? Yes. This is very advantageous for 2-domain servers having same set of name

Explain that datagram cannot be larger than mtu of a network, "A datagram c...

"A datagram cannot be larger than the MTU of a network over which it is sent." Is the statement true or false? Explain with the help of a suitable example. All hardware technol

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd