CIB: An Improved Communication Architecture for Real-Time Monitoring of Aerospace Materials, Instruments, and Sensors on the ISS

نویسندگان

  • Michael J. Krasowski
  • Norman F. Prokop
  • Joseph M. Flatico
  • Lawrence C. Greer
  • Phillip P. Jenkins
  • Philip G. Neudeck
  • Liangyu Chen
  • Danny C. Spina
چکیده

The Communications Interface Board (CIB) is an improved communications architecture that was demonstrated on the International Space Station (ISS). ISS communication interfaces allowing for real-time telemetry and health monitoring require a significant amount of development. The CIB simplifies the communications interface to the ISS for real-time health monitoring, telemetry, and control of resident sensors or experiments. With a simpler interface available to the telemetry bus, more sensors or experiments may be flown. The CIB accomplishes this by acting as a bridge between the ISS MIL-STD-1553 low-rate telemetry (LRT) bus and the sensors allowing for two-way command and telemetry data transfer. The CIB was designed to be highly reliable and radiation hard for an extended flight in low Earth orbit (LEO) and has been proven with over 40 months of flight operation on the outside of ISS supporting two sets of flight experiments. Since the CIB is currently operating in flight on the ISS, recent results of operations will be provided. Additionally, as a vehicle health monitoring enabling technology, an overview and results from two experiments enabled by the CIB will be provided. Future applications for vehicle health monitoring utilizing the CIB architecture will also be discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Low Cost UAV-based Remote Sensing for Autonomous Wildlife Monitoring

In recent years, developments in unmanned aerial vehicles, lightweight on-board computers, and low-cost thermal imaging sensors offer a new opportunity for wildlife monitoring. In contrast with traditional methods now surveying endangered species to obtain population and location has become more cost-effective and least time-consuming. In this paper, a low-cost UAV-based remote sensing platform...

متن کامل

Traffic congestion control using Smartphone sensors based on IoT Technology

Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room to improve the traffic efficiency. The suggested system utilize technologies for real-time collect...

متن کامل

A Real-time Motion Tracking Wireless System for Upper Limb Exosuit Based on Inertial Measurement Units and Flex Sensors (TECHNICAL NOTE)

This paper puts forward a real-time angular tracking (motion capture) system for a low cost upper limb exosuit based on sensor fusion; which is integrated by an elastic sleeve-mitten, two inertial measurement units (IMU), two flex sensors and a wireless communication system. The device can accurately detect the angular position of the shoulder (flexion-extension, abduction-adduction and interna...

متن کامل

Designing and Constructing an Optical System to measure Continuous and Cuffless Blood Pressure Using Two Pulse Signals

Introduction Blood pressure (BP) is one of the important vital signs that need to be monitored for personal healthcare. Arterial blood pressure is estimated from pulse transit time (PTT). This study uses two pulse sensors to get PTT. The aim of this study was to construct an optical system and to monitor blood pressure continuously and without cuff in people with different ages. Materials and M...

متن کامل

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013