Free Essay

Time and Clocks

In:

Submitted By ycognet
Words 2079
Pages 9
Making time, holding time with or without a GPS.
The most ubiquitous way to get accurate time and phase, every time, everywhere is to use a GPS disciplined oscillator (GPSDO). Over the last few years, some concerns have arisen due to the potential impact on critical infrastructure of malevolent attacks such as jamming or due to natural causes such as solar flares.
The GPS system has been designed to distribute time around the world. It gets time from a reference called a time scale. They are several time scales in the world. In the US, NIST and USNO are used for the UTC time scale and are referred to as UTC (NIST) and UTC (USNO). USNO also produces the GPS time scale. The time scales around the world are coordinated through an international agency called BIPM. USNO, NIST are all coordinated to BIPM through a mechanism called two-way time transfer.
BIPM defines International Atomic Time (TAI) from ensembling atomic clocks that are disseminated around the globe - the duration of the TAI second is kept as close as possible to the SI second. Coordinated Universal Time (UTC) is an atomic time scale derived from TAI to provide a reference scale in step with the irregular rotation of the earth. As a result of this process, the mean solar day, which is nominally 86400 seconds long, is actually getting longer when measured in SI seconds with stable atomic clocks.
It is the role of IERS (International Earth Rotation Service) to observe the self-rotation of the earth and to make sure that when the earth completes its rotation - 24 hours have elapsed…. It does the same with respect to the earth’s rotation around the sun. As the earth slows down due to tidal effects, leap seconds have been used to adjust the time periodically since the original 1/1/1970 00:00:00 epoch.
TAI is 35 seconds ahead of UTC today (dynamic value). TAI is always ahead of the GPS timescale by 19 seconds (fixed value).
In conclusion, atomic clocks are an integral element of any time scale. GPS/GNSS systems are not the only means to distribute time. Many forms of two-way time transfer techniques are being deployed today over a dedicated network, over satellites (the Ku band is generally being used) and, to some extent, over non-dedicated networks. In the latter case, some careful engineering is required as time transfer over a non-dedicated network is very sensitive to network asymmetries. (see ITSF 2013 presentation on sources of asymmetries in a fiber network). The PTP protocol as defined by ITU uses the TAI timescale whereas NTP uses UTC. These are two mechanisms of time transfer over a non-dedicated network assuming that there are no asymmetries (or that asymmetries are externally compensated).
Why frequency, phase and time matter in cellular networks.
Frequency Division Duplex (FDD) has been the dominating Radio Access Network (RAN) technology since the inception of cellular networks. It requires paired frequency bands - one for transmission and another one for reception. Time Division Duplex (TDD) uses a single frequency sharing the channel between transmission and reception and spacing them apart by multiplexing the two signals in real time. Stable, known, and accurate frequencies are fundamental to enable user equipment (UE) to connect to base stations. Worse, Doppler shift due to UE in a train or in a car will render impossible any communication unless the UE can syntonize the receiving frequencies from nearby base stations. In both cases, FDD and TDD, without this capability, UEs will be competing for the same frequencies or time slots without being aware of wrongdoing and potentially rendering the cellular network inoperative.
The accuracy of the radio frequencies being used is standardized and measured in parts per billion. A frequency stability of ± 50 ppb corresponds to a drift of ±4.32 ms per day. These frequencies are created by local oscillators within the UE and the base stations. The UE’s inexpensive local oscillator is syntonized to the radio frequency it is receiving from the cellular network. By being able to syntonize its local oscillator to the received signal coming from distant base stations, the UE can demodulate the receiving signals, decode the protocol, extract information from the payload carried by the protocol over the control plane, answer requests from the network and eventually send and receive data over the data plane.
The base station oscillator is more expensive as it has to have a very low drift (± 50 ppb). However, even this drift needs to be corrected. Depending of the quality of the oscillator and the requirements in terms of stability and accuracy, a reference or master signal is required. Traceable T1 or E1 feeds can be used as well as network protocols like NTP or SyncE. In the case of NTP, the local oscillator must be of better quality and be able to maintain its stability over a large gradient of temperatures. When using either an E1 or a T1 traceable feed as well as SyncE, the base station oscillator is syntonized to the high quality frequency extracted from the receiving signal. PTP (aka the 1588 protocol) can be also used to re-synchronize the local oscillator – the PTP protocol can support less expensive oscillators than NTP and still keep that local oscillator within the requirements due to the higher packet rate. By traceable, we mean a feed that is locked to a high quality clock (Cesium clock, GPSDO,..). Remote NTP server clocks and PTP master clocks use GPS-disciplined oscillators (GPSDO) to prevent their local oscillator from drifting.
TDD requires phase alignment between UEs and cells within the radio access network in order to avoid inverse link interference. As TDD is starting to be deployed over FDD due to its better overall spectral efficiency and the flexibility to adapt UL and DL bandwidth allocation, new deployments are moving from frequency only RANs (FDD) to frequency and phase aware RANs (TDD). When frequency and phase or time are required at the base station, then either a local GPS receiver is used and/or PTP. The NTP protocol typically can’t convey phase information with enough accuracy (NTP can carry time and phase within a sub millisecond accuracy, however, most radio networks require sub 10s of microseconds and for LTE, phase requirements are within the microsecond range).
When phase requirements are not met within the RAN, several problems can happen occur even if frequency requirements are being met. Handover from one base station to another one may not work when an access method like TDD is being used. Worse, a UE can usurp the time slot allocated to another UE (UL signals are using SF single-carrier frequency division multiple access (SD-FDMA mode)) and then can disrupt or scramble the communication.
In dense areas where LTE is being deployed, inter-symbol interferences will prevent UE’s from demodulating the DL orthogonal frequency division multiple access (OFDMA) signals from neighboring LTE small Cells (LTE base stations), rendering the network useless and wasting the capacity of the network or worst case exhausting the spectrum as the UEs will then try to connect to the remote congested macro cell instead of the neighboring small cells.
LTE Advanced requires Frequency Coordination between the small cells and the macro cells in order to mitigate interference and to boost coverage and capacity. In order to reduce delay, to minimize TDD UL/DL switching latency, to improve UL and DL available bandwidth from the small cells to the UEs by using carrier aggregation and MIMO antennas, macro cell/small cell coordination techniques have been introduced and are being leveraged within the LTE RAN. In these cases, not only phase alignment is required between the small cells and the macro cells but also absolute time accuracy. (see 3GPP Rel 12).
Where historically cellular has been dominated by FDD, over time we can expect TDD to dominate the radio network landscape as TDD is not only a technique that provides better spectral efficiency, dynamic bandwidth allocation (DL/UL ratio) but it is also the technique that maximizes the use of un-paired frequency bands and also is supported for roaming between carriers. Frequency requirements for FDD and TDD are similar and easily met with modern assistance techniques like PTP, NTP or SyncE. Frequency and phase requirements need to be carefully studied and planned when deploying HetNet RAN. GPS carries a huge installation cost and the antenna cable length has to be calibrated. Furthermore GPS is prone to jamming and spoofing and frequency assistance is required in order to defeat this threat. Most ITU and ATIS recommendations are in favor of PTP as the solution for phase and frequency.

Some Q&A
What is the difference between “spoofing” and “jamming?” 1) They are both illegal! 2) Jamming consists of sending a strong signal that saturates with noise the band being used by the satellites for broadcasting data to the GPS receivers on Earth. This is a very basic attack. Holding time can be done by the local oscillator or by some sort of PTP assistance that offsets the drift of the local oscillator if the jamming lasts. 3) Spoofing is the faking of a rogue / fake satellite that makes the GPS receiver believe that it is not where it should be. Several techniques can be used to counter such an attack. First, a base station doesn’t move so any detection of a displacement should be considered as an alert. Second, a stable oscillator such as an atomic clock will prevent a rogue attack on the time (see http://www.army.mil/article/88361/Miniaturized_atomic_clock_to_support_Soldiers_in_absence_of_GPS/).
How does a GPS receiver decode times from satellites? 1) A GPS receiver receives signals from 4 different satellites (at least) – there are 4 unknowns - the coordinates: which are the geodetic coordinates x,y,z and the time t. 2) GPS satellites orbiting around the earth complete a rotation in half a sidereal day (a little bit less than 12 hours), broadcast a frequency reference f, time, and information related to their positions/trajectories. 3) As satellites are rotating around the Earth, the frequency reference f is Doppler shifted. Once the GPS signals are isolated from the noise, the GPS receiver locks to the frequency reference of each satellite, decodes the data and then starts to process all data that are broadcasted by the satellites in view. 4) In order to get an accurate position and an accurate time, the GPS receiver has to cancel out the propagation time from the satellites through the ionosphere and atmosphere and through trilateration, in order to identify where on earth it is located. As Earth is not perfectly spherical, a model of Earth is being used to do a correct assessment of the location.
How does a time scale work? 1) To make time, you need a very stable frequency. Atomic clocks such as Maser sources, Cesium sources or Rubidium sources provide very stable frequencies that are locked to atomic resonances. 2) For greater stability, these sources are ensembled – the resulting source will have a factor of improvement that is proportional to the square root of the number of sources being ensembled. 3) Then the system is initialized to a reference (can be BIPM or even a local accurate GPS receiver once in a while) and then is able to keep time in a free-wheeling mode for a very long period of time (months, years) with a very high accuracy.
How LTE FDD and TDD differ? 1) FDD used paired frequencies, one for transmission and one for receiving. TDD is using a single frequency for transmitting and receiving 2) Uplink (UL) and downlink (DL) are divided into radio frame, each 10 ms in length. The frame consists of two "half-frames" of equal length, with each half-frame consisting of 10 slots or 8 slots plus 3 special fields: the downlink pilot time slot (DwPTS), the guard period (GP) and the uplink pilot time slot (UpPTS). Each slot is 0.5 ms in length and two consecutive slots form exactly one subframe. The length of the individual special fields depend on the uplink/downlink configuration selected by the network, but the total length of the three fields remains constant at 1 ms. This resource structure is the same for both TDD and FDD. 3) TDD doesn’t use guard band between paired frequencies but a guard interval of time to allow the switching between DL and UL

Similar Documents

Free Essay

Management Situations

...the flip side if you are confident in this employee and know he is able to produce good work you really have nothing to worry about. If an employee built us a system we would be giving all the authority of the system to the employee. This employee would be required to keep track of time punches, labor expenses, etc. An in house employee would give managers quick responses throughout times of operation. A con would be giving the employee the power to make the necessary purchases, as well as putting the burden of the system on his shoulders, such as in cases where the system requires maintenance. This is something you would want to work out with the employee before hand, just so you could make sure the employee is not overspending. You would also want to make sure the employee keeps all receipts in case something went wrong with a component and the software needed some maintenance. As stated in the description time clock manufacturers, and software development companies are offering affordable rates on new products, increasing the number of in house builds. Some cons associated with the new technologies are, time and money. It will cost more to build and implement the system, and also take time for the employees to get use to the new methods, especially the older employees. A good way to go about this would be to leave your old system running, while building the prototype which is known as a smaller scale representation or working model of the users’ requirements or the...

Words: 878 - Pages: 4

Free Essay

Nt1110 Cmos

...these settings. In order to remember its settings, the PC uses a small battery powered memory called CMOS. As you perform different hardware upgrades, you might want to update the CMOS settings. When storing your PC’s hardware settings, the CMOS keeps track of the systems date and time. PC’s normally uses its CMOS settings only when it boots up. Depending on the PC type, the way to access the CMOS settings will vary. When first turning on your PC, the PC performs a self-test of the hardware components. During the self-test, the PC displays the count of its working memory. Normally, you will access your system’s CMOS settings by pressing a specific set of keys for example DEL, EXS, CTRL-ALT-ENTER, CTRL-ALT-INS, CTRL-ALT-ESC. But like I said it will vary. If the PC starts successfully, you can normally ignore the PC’s CMOS settings. However, if you add memory to your system or install a new or different disk drive, you may need to update a CMOS setting. Depending on your system type, you may be able to use a CMOS setting to password protect your system. When you assign a password to your system in this way, your system will require you to type in a password each time it starts. If...

Words: 550 - Pages: 3

Free Essay

Question 2 and 3

...Quantity | Total | | Prolink Laser Mouse | 109.90 | 2 | 219.80 | | Netgear Router | 215.90 | 1 | 215.90 | | Microsoft Keyboard | 59.90 | 1 | 59.90 | | Samsung 24” LCD | 630.00 | 1 | 630.00 | | Grand Total | | | 1125.60 | | Question 2 Question 3 How to replace the CMOS battery Issue: How to replace the CMOS battery. Cause: Like any battery the computer CMOS battery can fail or lose its charge. Solution: If your computer is losing its time or date settings, or you are receiving a message CMOS Read Error, CMOS checksum error, or CMOS Battery Failure, first attempt to leave the computer on for 24 hours. In some cases this can charge the battery and resolve your issue. This often resolves CMOS battery related issues when a computer has been left off for several months. If this does not resolve your issue follow the below steps. (1) Write down all system settings * Ensure that the information within your CMOS, if not already lost, is written down. If you're getting a CMOS error message or your time is not being saved your settings are already lost. Getting into the CMOS setup can be found on document CH000192. (2) Locate your CMOS battery * Open the computer case and find the battery on the computer motherboard, verify that it will be accessible and that it can be removed. Most computers today use a coin cell CMOS battery as shown in the image to the right. * If you are unable to locate your CMOS battery you will need to refer to your motherboard...

Words: 710 - Pages: 3

Free Essay

Synchronous Ethernet and Ieee 1588v2 Technology White Paper

...Synchronous Ethernet and IEEE 1588v2 Technology White Paper Issue Date 01 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://enterprise...

Words: 5689 - Pages: 23

Premium Essay

Shot Clock In High School Basketball

...The final seconds of the clock began to tick away. The Idaho Girls Basketball State Championship was disappearing faster than it came. A screeching buzz signaled the end of the game. of the final buzzer sounded. That was it. Borah and Boise had reached the pinnacle of high school basketball, but their seasons, contrary to a movie-like moment, now ended in a very dreary, anticlimactic fashion. The orange glowing lights on the display hanging in the center of the gym indicated the meager final score: seventeen to seven (Lycklama). After a full thirty-two minutes of play, the two teams from this factual recount managed only twenty-four combined points (Lycklama). This extreme instance in history reveals a prominent issue regarding the rules of Idaho high school basketball. The lack of a shot clock in high school causes problems that would otherwise be solved...

Words: 1162 - Pages: 5

Premium Essay

Pt1420 Unit 8

...and order numbers to 60 before they can read time on the digital clock. Meanwhile time is often referred to in fractional terms on analog clocks it will be helpful if children have an understanding of halves and fourths. Directing children's attention to the clock How many big numbers are on the clock? Ensure children point to the hour hand. Telling the children that when, the hour hand moves from one number to the next number, one hour has passed. Ask the children what can you do in an hour? Have children point to the minute’s hand. By tell them that when the minute hand moves from one tick mark to the next, passing one minute. Again ask them what can they do in a minute?...

Words: 460 - Pages: 2

Free Essay

Flip Flops and Latches

...• Review flip-flop clock parameters. • Introduce the transparent D-latch. • Discuss flip-flop asynchronous inputs. 2 Sequential Logic & The Flip-Flop Inputs . . Combinational Logic Gates . . Outputs Clock Memory Elements (Flip-Flops) 3 D Flip-Flop: Excitation Table D D Q CLK   Q 0 1 Q 1 0 0 1 CLK Q  : Rising Edge of Clock 4 D Flip-Flop: Example Timing Q=D=1 Q=D=0 Q=D=0 No Change Q=D=1 Q=D=1 No Change Q=D=0 Q=D=0 No Change Q D CLK 5 J/K Flip-Flop: Excitation Table J J CLK K Q K 0 1 0 1 CLK     Q Q0 No Change Clear Set Toggle 0 Q 0 1 1 0 1 Q0  : Rising Edge of Clock Q : Complementof Q 6 J/K Flip-Flop: Example Timing SET TOGGLE TOGGLE CLEAR NO CHANGE SET NO CHANGE Q J K CLK 7 Clock Edges Positive Edge Transition 1 0 1 0 Negative Edge Transition 8 POS & NEG Edge Triggered D Positive Edge Trigger D D Q CLK   Q 0 1 Q 1 0 0 1 CLK Q  : Rising Edge of Clock Negative Edge Trigger D D Q CLK   Q 0 1 Q 1 0 9 0 1 CLK Q  : Falling Edge of Clock POS & NEG Edge Triggered J/K Positive Edge Trigger J J CLK K Q K 0 1 0 1 CLK     Q Q0 0 0 1 1 0 1 Q0 Q  : Rising Edge of Clock Negative Edge Trigger J J CLK K Q K 0 1 0 CLK    Q Q0 0 0 1 0 1 Q0 10 Q 1 1   : Rising Edge of Clock Flip-Flop Timing ...

Words: 714 - Pages: 3

Free Essay

Exam 2

...------------------------------------------------- Top of Form Submission View Your quiz has been submitted successfully. Question 1 | | 0 / 2 points | The maxterm  expression for the function g(A,B,C) given: g(A,B,C) = A'B + BC + AB'C   | | a)  | ∏M(2,3,5,7) | | | | b)  | ∏M(0,1,6)  | | | | c)  | ∏M(0,1,4,6) | | | | d)  |  None of the above | | Question 2 | | 0 / 4 points | For the function: f(A,B,C,D) = A'B + BC'D' What would be the canonical sum of products expansion?  | | a)  | f(A,B,C,D)= A'BC'D'+A'BC'D+A'BCD'+ A'BCD + AB'CD'+ABCD'+ ABCD | | | | b)  | f(A,B,C,D)= A'BC'D'+A'BC'D+A'BCD'+ A'BCD + ABC'D' | | | | c)  | f(A,B,C,D)= A'BC'D'+C'D+A'BCD'+ A'BCD + ABC'D'+ BC'D+BCD'+ CD | | | | d)  | The function is already expressed in canonical form | | Question 3 | | 3 / 3 points | The simplified product-of-sums expressions may be easily implemented into actual logic circuits using all ________ with little or no increase in circuit complexity. | | OR gates | | | AND gates | | | NOR gates | | | multiple-input inverters | Question 4 | | 2 / 2 points | Simplifying logic circuits results in: | | fewer potential faults. | | | fewer connections. | | | fewer gates. | | | all of the above | Question 5 | | 0 / 3 points | Given  F1 = Π M(0, 4, 5, 6) and F2 = Π M(0, 4, 7) the maxterm expression for F1F2 is: | | F1F2 = Π M(0, 4, 5, 6, 7) | | | F1F2 = Π M(1, 2, 3) | ...

Words: 1410 - Pages: 6

Free Essay

Test

...leading or trailing edge of the clock. If I ask a man to bring 6-bags of wheat, each weighing 100 kg, he may take 6-times to perform this task in going and bringing it. A stronger man might perform the same task in 3times only. Thus, it depends on the strength of the man to finish the job quickly or slowly. Here, we can assume both weaker and strong men as machine. The weaker man has taken 6-machine cycle (6-times going and coming with one bag each time) to execute the job where as the stronger man has taken only 3-machine cycle for the same job. Similarly, a machine may execute one instruction in as many as 3-machine cycles while the other machine can take only one machine cycle to execute the same instruction. Thus, the machine that has taken only one machine cycle is efficient than the one taking 3-machine cycle. Each machine cycle is composed of many clock cycle. Since, the data and instructions, both are stored in the memory, the µP performs fetch operation to read the instruction or data and then execute the instruction. The µP in doing so may take several cycles to perform fetch and execute operation. The 3-status signals : IO / M , S1, and S0 are generated at the beginning of each machine cycle. The unique combination of these 3-status signals identify read or write operation and remain valid for the duration of the cycle. Table-5.1(a) shows details of the unique combination of these status signals to identify different machine cycles. Thus, time taken by any...

Words: 3904 - Pages: 16

Premium Essay

Systems Analysis, Design, and Integration

...Analysis 13 Investment 13 Savings 13 Timing 13 Strategic Fit 13 Economic Impact 13 Operational Model 13 Cultural Fit 13 Risk Management 14 Recommendation 14 Integration and Deployment Plan 15 Work Breakdown Structure 15 References 17 System or Application Overview Brief Description This document will be used to track the Requirements, Design and Implementation of a Time Card System. This system will be used to track the time 20 different employees spend working on different projects. It will also allow managers to run reports allowing them to track time by either employee or project. Intended Users This system will be used by both employees and managers. Employees will need to clock in to the current project, clock out, and change projects. Managers will also be able to clock both themselves and employees into projects, but also run reports. Project Initiator This system has been requested by the Managers at a small business. They need to keep track of how much time is being spend on different projects. This system will be different from the actual time clock used to figure pay and hours worked. This system will track how...

Words: 3357 - Pages: 14

Premium Essay

Dali

...of brittle legs which were vastly elongated in order to substantially distort reality and strengthen the symbolism in his painting. Although Dali was a great artist, it was his unusual way of thinking and deep concern for dreams that gained him the most notoriety. Salvador Dali was born in 1904 in Figueres, Spain. In 1921, his mother passed away, and drew Dali closer to the arts. At first influenced by futurism, in 1924 Dalí came under the influence of the Italian painter de Chirico while in art school in Spain and by 1929 he had become a leader of Surrealism. His precisely realistic style enhances the obsessively nightmarish effect of many of his paintings. Among his best-known works is Persistence of Memory with its strangely melting clocks. In 1940 Dalí escaped from Nazi-occupied France and emigrated to the United States. He wrote The Secret Life of Salvador Dalí and also made surrealist ventures in films, advertising, and the ballet. A self-proclaimed genius, Dalí was certainly a multitalented artist–a superb draftsman whose wildly inventive imagination has left a strong impression on contemporary culture. However, his publicity-seeking antics,...

Words: 1347 - Pages: 6

Free Essay

Big Ben

...Big Ben Big Ben is the nickname for the great bell of the clock at the north end of the Palace of Westminster in London, and often extended to refer to the clock and the clock tower, officially named the Elizabeth Tower, as well. Elizabeth Tower holds the largest four-faced chiming clock in the world and is the third-tallest free-standing clock tower. The bell, first named 'Great Edward' and later known as 'Great Tom', struck on the hour. The tower was completed in 1858 and has become one of the most prominent symbols of both London and England. The Clock Dials The ornate decoration on the Elizabeth Tower's upper floors owes much to Augustus Welby Pugin's influence on the main architect, Sir Charles Barry. The two architects collaborated successfully on the Palace of Westminster's neo-Gothic style which is displayed to great effect on the clock dials. The hour figure of four o'clock is shown by the Roman numeral IV, rather than IIII, as is more commonly used on clock dials. Under each clock dial there is a Latin inscription carved in stone: "Domine Salvam fac Reginam nostrum Victoriam primam" which means "O Lord, save our Queen Victoria the First." Significant of the Great Bell The clock has become a symbol of the United Kingdom and London, particularly in the visual media. When a television or film-maker wishes to indicate a generic location in Britain, a popular way to do so is to show an image of the tower. Malfunctions, breakdowns, and other outages - 1916: for two...

Words: 639 - Pages: 3

Free Essay

Ecet 340 Week 6 Homework 6

...decimal) have transpired between these two events? 3. What is the maximum time possible before the free-running counter overflows when the e MHz? 4. Two input capture events occur at 0x1037 and 0x002A. If the prescaler bits PR[2:1:0] are set to 101 and the e clock is 24 MHz, how much time as transpired between the two events? 5. Calculate the count that should appear in the timer capture register TC0 if a 125 kHz rectangular wave is inputted on timer pin PT0 while TCTL4 is preset for falling edge detection. Assume a 24 MHz e-clock, TMSK2 was programmed with the value $02, and the count of the 1st edge event has already been subtracted off from TC0. 6. Write down the name of the HC12 timer register that should be polled through software to determine whether or not an active input edge has been captured on one of the port T pins. 7. What is the duty cycle of a signal produced by the PWM when and ? a. 28.0% b. 29.8% c. 50.0% d. 72.0% 8. What values are required for period and duty cycle to generate a 6.0 kHz, 95% duty cycle waveform using the PWM function? Assume e-clock frequency is 24 MHz. 9. What is the slowest clock signal that can be generated from the PWM output using the 16-bit counter mode with pre-scaling and scaling? Assume e-clock frequency is 24 MHz. 10. Write down the C statements needed to program PWM channel 0 to output a 12.5 kHz left-aligned wave with 30% duty cycle. Assume e-clock frequency is 24 MHz. ECET 340 Week 6 HomeWork 6 Purchase here ...

Words: 1661 - Pages: 7

Premium Essay

Naked Bum Analysis

...person on Tumblr who asked the question If a clock could count down to the moment you meet your soulmate, would you want to know? Although I did not see the actual post. I only saw it while surfing through Pinterest one lazy Sunday afternoon. (Awesome stories with the same question as the writing prompt on this link: https://www.pinterest.com/pin/549509592007761212/)....

Words: 709 - Pages: 3

Premium Essay

Clock

...“GOOD MORNING PILLOW” Alarm clock was invented to wake up the person at a specific time but sometimes it is not that effective. The problem here is not in the alarm clock it’s in the person. People usually set their alarm clocks according to time they need to wake up but instead of getting up on bed they just ignore the irritating sounds of the alarm clock because of tiredness or they just only want to get more sleep. So that there is a lot of innovation of alarm clock today on how people can quickly go out to their beds one of best example is the Clocky Alarm Clock, this clock works like a normal alarm clock until you press snooze. As soon as you snooze it rolls itself off the table and hides someplace in your room. Once it finds a good hiding spot and stops moving the alarm goes off again until you get out of bed to find it and to shut it off. We, the group of researchers also have an idea also about this matter this is what we call Good morning pillow. Good morning pillow works like a normal alarm clock but instead of irritating sounds that will welcome your morning, it’s a light that will flash in your face, and this light will help to stimulate you to start a new and a happy morning. And since some people wants to hear music in the morning we also provide a mp3 player in this...

Words: 255 - Pages: 2