• Home
  • Tutorials
  • Ten Daily Electronic Common Sense-Section 37

    What are the common features of PMP currently?

    At present, the more common functions of PMP include: MPEG. 4 Play, TV program recording, MP3/WMA audio playback, recording, picture display, game and storage functions (HDD/CF/SD), etc.

    What is the detection method of the electromagnetic pulse type crank position sensor?

    1. Open circuit detection method.
      • Turn off the ignition switch, unplug the sensor plug, and measure the resistance of the sensor coil with a multimeter R×10.
      • The measured value should be in accordance with the original regulations, check the relevant information for details, the resistance value is generally 300 ~ 1500Q.
    2. On the road detection method.
      • Use the multimeter AC voltage block to detect its output voltage, it should be higher than 0.1V when starting; it should be 0.4~0.8V when running.
      • Use a frequency meter to detect its operating frequency.
      • Use an oscilloscope to check the output signal waveform.
      • If a voltage signal can be detected on the sensor, but no signal can be detected on the ECU connector, check the wire and connector between the sensor and the ECU.

    What are the points that the combiner can accomplish?

    • Send wireless signals from multiple input ports to the same output port.
    • Avoid the mutual influence between the wireless signals of each port.

    What is the function of the TCP/IP network control system?

    Realize the functions of remote control and invocation of all network lighting equipment and remote monitoring of the running status of the system.

    When the master or slave host provides a long-term key to the link layer, the following three conditions may occur:

    If this procedure is performed after the encryption procedure is suspended and the master does not provide a long-term key, the slave device shall perform the termination procedure with the error code set to PIN or key Missin9.  
    If the master does not provide a long-term key, either because the master’s event is blocked, or if the master indicates that the key is unavailable, the slave shall set the error code PIN or key Missin9 and send an LL-REJECT-IND PDU.
    After the master device receives the LL-REJECT-IND PDU, the link layer shall notify the master. The link layer can send LL data PDUs and LL control PDUs, these packets will not be encrypted.
    In the master device, this process is completed when the LL_REJECT_INDPDU from the slave device is received. In the slave device, this process is completed after receiving the acknowledgment of the LL_REJECT-7 IND PDU from the master device.
    If the host provides a long-term key, the slave link layer shall send an LL-ENC-RSP PDU in response to the master’s LL-ENC-REQPDU.
    The link layer should also use LTK as the key and SKD as the plaintext input to calculate the sessionKey. sessionKey should be set to the output of the encryption engine.

    What are the benefits of using a dedicated VLAN for iSCSl storage traffic?

    A layer of security can be provided that, with proper design and configuration, contains storage traffic and protects it from unwanted attention.
    VLANs can be created without gateways, essentially creating a non-routable network, which avoids other traffic types entering the iSCSl network, or iSCSl packets being routed into another network.
    A VLAN can act as a broadcast domain, eliminating unnecessary traffic that might be audited and discarded from the network adapters responsible for sending and receiving storage traffic.

    Every two LSl and VLS1 components require a storage capacitor, which is placed according to those rules?

    • Near the entrance of the power supply connector
    • Near the power terminals connecting daughter boards, peripherals and auxiliary circuits
    • Near high-power digital components
    • The farthest location from the power input terminals circuit

    What is a high voltage capacitor?

    To protect against ESD, a disc-shaped ceramic high-voltage capacitor is required to shunt the discharge energy to the rack ground.
    These capacitors are rated for a minimum voltage of 1500V (1kV). Low voltage capacitors are permanently damaged the first time ESD occurs. These capacitors must be placed close to the I/O connectors and connected with leads with as little inductive reactance as possible.
    For electrical fast transients, capacitors rated at 50 to 100V are usually sufficient, these capacitors will not be broken down by transient voltages due to their inability to respond to fast input changes, and transients are very brief and the voltage builds up very slowly, So the capacitor will not be broken down.

    What is the sequence of operations in which the PCD and PICC start a conversation?

    1. The RF (radio frequency) field of the PCD activates the PICC.
    2. The PICC waits for a command from the PCD.
    3. The PCD issues a command.
    4. The PICC issues a response.

    What are the two typical applications of FPGAs?

    • As an interface logic controller, it has unprecedented flexibility.
      1. ISA, PCI, PS/2 and USB interface controller.
      2. Interface controller for SDRAM, DDR, SRAM, NAND Flash and NOR Flash.
      3. level conversion, LVDS, TTL and CMOS.
    • Provide unprecedented computing power for high-speed digital signal processing (DSP).
      1. In the field of wireless communication, such as software radio (SDR).
      2. In the field of video image processing, such as high-definition digital television (HDTV).
      3. Military and aerospace fields, such as radar and sonar.


    DISQUS: 0