Quantum Data 881 User Manual page 430

Hide thumbs Also See for 881:
Table of Contents

Advertisement

88
Chapter 12 CEC Interactive Troubleshooting Environment (ITE)
6. Monitor the effects of the arbritration test using the ACA. Refer to
bus
(channel):" on page 467 for instructions on monitoring the commands through the
ACA.
If you are monitoring the messages using the ACA you will see an error. In the screen
shot below the details panel describes the reason for the error when seizing the
address bit. The Details panel shows the details of the message that is highlighted.
Bit corruption tests
You can simulate the corruption of any single bit of the 8 data bits in a block. You have to
specify which byte you want to corrupt and which bit within that byte that you want to
corrupt. When you specify a byte and a bit to corrupt it applies to the specified byte and bit
of the subsequent message on the CEC bus.
There are two commands that are used in tandem: 1) CEC1:CECT:BADS which takes an
argument to specify which byte of the next message will be affected, and 2)
CEC1:CECT:BADM which takes an argument to specify which bit of the specified byte will
be affected (corrupted).
To test bit corruption:
1. Enter the following commands to cause a corrupt bit.
CEC1:CECT:BADS 2
//indicates that the bit error will occur on the
second byte of the next message.
"To monitor the CEC

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

882

Table of Contents