Martin J. Miles; David R. Wortendyke

Abstract: The six volumes of this report are: Volume 1. Overview; Volume 2. Experiment Design; Volume 3. Data Extraction; Volume 4. Data Reduction; Volume 5. Data Analysis; Volume 6. Data Display This volume explains how to conduct a data communication session. Specifically, it explains how to determine the commands and expected responses of a protocol (for access and disengagement functions), how to determine the responsibility of the participating entities for producing each reference event, and how to draw a profile of the session (which demonstrates the flow of information between the participating entities and across user/system interfaces). It explains how to create a file containing the commands and expected responses of the protocol, the code that causes the times at which they cross interfaces to be recorded, and a code number that indicates the state of the entities at each interface. This volume also explains how to modify the transmitting program to agree with the protocol. It explains how to create files that support the on–line data extraction software. Specifically, these files are the end user identification files, the clock calibration file, and the protocol file. This volume then explains how to execute a shell script that conducts a test, and how to execute a shell script that processes the test data.

Keywords: protocol; access; user information transfer; disengagement; communication state codes; reference events; satellite clock receiver; session profile; user/system interfaces

To request a reprint of this report, contact:

Ed Drocella, Chief,
Spectrum Engineering and Analysis Division
Office of Spectrum Management
National Telecommunications and Information Administration
(202) 482-1652

Disclaimer: Certain commercial equipment, components, and software may be identified in this report to specify adequately the technical aspects of the reported results. In no case does such identification imply recommendation or endorsement by the National Telecommunications and Information Administration, nor does it imply that the equipment or software identified is necessarily the best available for the particular application or uses.

Back to Search Results