Registers, Data Formats, & Queries

Appendix C

 

 

Trigger Latency

Each trigger source has an associated latency. This is the time between the actual trigger and its recognition by the acquisition device.

The following latency times are only representative of the time between when the trigger is detected and when the trigger has been processed. Hardware latency times and ISR servicing of other tasks at the time of the trigger event but before the trigger is detected are not accounted for. In other words, these times may be offset as much as the hardware latency times, in addition to the amount of time that the longest uninterrupted ISR takes to process.

TRIGGER SOURCE

LATENCY

OBSERVED

 

(avg)

VARIATION

External Triggers ( TTL Rising, TTL Falling)

610.95 µs

2.10 µs

 

 

 

Selected Temperature Range

N/A(1)

N/A(1)

GET (IEEE only)

645.6 µs

3.10 µs

 

 

 

TALK (IEEE only)

780.53 µs

12.00 µs

 

 

 

“@" character

2.255 µs

620.00 µs

 

 

 

Alarm

N/A(1)

N/A(1)

Absolute Time

44.5 µs

27.0 µs

 

 

 

Count (post-trigger)

45.9 µs

28.5 µs

 

 

 

(1) When using a channel level or alarm as the trigger source, the trigger latency is dependent on the number of channels being scanned and the programmed timebase. If the scan time is less than or equal to the programmed scan rate, then the maximum trigger latency is equal to the programmed scan rate. If the scan time is greater than the programmed scan rate, the maximum trigger latency is equal to the scan time.

Trigger Overrun

A trigger overrun condition exists if more than one trigger start event or more than one trigger stop event occurs during one trigger acquisition. This is flagged and notification is given, but no other action is taken. The trigger overrun bit in the Error Source Register (ESE) is set. The user may query (with the E? command) the Error Source Register to determine if a trigger overrun has occurred.

Buffer Overrun

ChartScan’s internal buffer will wrap-around if the controlling computer cannot read the data out of the buffer before it is completely full. This situation is called “buffer overrun.” It prevents new data from being lost and keeps the scan rate consistent, but it also overwrites the oldest data.

Although registered as an error, depending on the application, a buffer overrun may be a part of normal operation.

For example, if a ChartScan unit with 256 Kbytes of memory was configured to scan 16 channels at a one-minute interval, the buffer would fill and an overrun would occur in about 5.6 days. Regardless of how long ChartScan is left unattended after that point, it will always maintain the newest 5.6 days of scans.

There are two cases of buffer overrun. One when only one trigger block is in the buffer, and secondly, when multiple trigger blocks are in the buffer.

If a buffer-overrun occurs, it may be detected by querying the Status Byte (STB) by either a SPOLL (IEEE 488 only) or a U1X command (IEEE 488 or RS-232).

C-18

ChartScan User’s Manual

Page 235
Image 235
Omega Vehicle Security 1400 manual Trigger Latency, Trigger Overrun, Buffer Overrun, Avg

1400 specifications

The Omega Vehicle Security 1400 stands out as a premier solution for vehicle protection, offering a blend of advanced technology and user-friendly features. With the increasing rise of vehicle thefts, incorporating a robust security system has become essential for vehicle owners. The Omega 1400 aims to address these concerns effectively, ensuring peace of mind for users.

One of the key features of the Omega Vehicle Security 1400 is its sophisticated alarm system. The device is equipped with a motion sensor that activates the alarm when unauthorized movement is detected. This feature provides an added layer of protection, alerting owners to potential threats even when they are away from their vehicles. Additionally, the system comes with multiple sensors that monitor doors and trunk openings, fortifying security against tampering.

A standout component of the Omega 1400 is its remote control functionality, which allows users to arm and disarm the alarm with ease. Featuring a user-friendly remote, drivers can secure their vehicles from a distance, ensuring convenience and accessibility. The remote not only operates the alarm system but also integrates a panic button, which can be used in emergency situations to deter potential threats.

The Omega Vehicle Security 1400 is also designed with cutting-edge technology, offering compatibility with smartphone applications. This innovation enables users to monitor their vehicles in real-time, providing alerts directly to their mobile devices. Users can check the status of their vehicle, adjust settings, and receive notifications if the alarm is triggered, ensuring they are always connected to their vehicle's security.

Another remarkable characteristic of the Omega 1400 is its built-in GPS tracking capability. In the unfortunate event of a theft, the GPS feature allows vehicle owners to track the location of their vehicle, increasing the chances of recovery. This technology proves invaluable for users who prioritize the safety of their assets.

Additionally, the Omega Vehicle Security 1400 supports a robust battery backup system. This ensures that the alarm remains functional even if the vehicle's power supply is compromised. The reliability and durability of this security system make it a worthy investment for anyone looking to safeguard their vehicle.

In summary, the Omega Vehicle Security 1400 brings together advanced alarm technologies, remote access, GPS tracking, and reliable power support, creating a comprehensive security solution tailored for modern vehicle owners. Each feature has been designed with user convenience and vehicle protection in mind, making it a top choice in the vehicle security landscape.