Solved

How does RS-422 work?

Posted on 2006-07-18
5
1,331 Views
Last Modified: 2008-01-09
Suppose I have two computers connected using an RS-422 line.

Computer #1 sends three separate messages before Computer #2 reads any message.

Can Computer #2 still read all three messages or are some of them lost?


In other words, does RS-422 use buffering?

If messages are lost, how can I avoid this? Using "Ready to Send" and "Clear to Send" lines?
0
Comment
Question by:rfr1tz
  • 2
  • 2
5 Comments
 
LVL 44

Accepted Solution

by:
scrathcyboy earned 200 total points
ID: 17134873
The specification itself does not imply buffering or include buffering, it is just a fast serial specification -
http://en.wikipedia.org/wiki/RS-422

However, it is possible to buffer the input and output on the specification, as the following examples indicate --

www.aeroflex.com/products/commtest/ber/productinfo/Parallel_Pods_Promo_030800.pdf
www.acttechnico.com/TVME322_Spec.pdf
www.bb-elec.com/sitemap.asp
www.rs485.com/psoftware.html

Note the last is a buffered driver for ethernet input/output, its speed is comparable to 10 base T.
0
 
LVL 11

Assisted Solution

by:grsteed
grsteed earned 100 total points
ID: 17135247
RS-422 uses a pair of wires for each signal (TX and RX) using a differential arrangement. That is when the signal on one wire is going positive (to indicate a mark or 1) the other wire is going negative. This allows the receivers to cancel out any noise that was picked up on the line since noise would show up as a positive or negative pulse in both wires of the pair.  It can operate on a minimus of 5 wires. ( 2-TX, 2-RX and a ground)

As opposed to RS-232 which can operate on  3 wires (1-TX, 1-RX, and a ground)  The signal levels are the same as RS-232 (+/-12V)

Cheers,
Gary
0
 
LVL 30

Assisted Solution

by:pgm554
pgm554 earned 200 total points
ID: 17135253
The buffering is done through the UART (either an 8250 or a 16550)
If you are sending serially, this is handled by the protocol.(Xmodem,Zmodem,etc)

Check this out:

http://cristal.inria.fr/~doligez/zmodem/
0
 
LVL 30

Assisted Solution

by:pgm554
pgm554 earned 200 total points
ID: 17135268
0
 
LVL 11

Expert Comment

by:grsteed
ID: 17135457
I guess I should have read the part about buffering.  LOL
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now