MarketTelecommand
Company Profile

Telecommand

A telecommand or telecontrol is a command sent to control a remote system or systems not directly connected to the place from which the telecommand is sent. The word is derived from tele = remote (Greek), and command = to entrust/order (Latin). Systems that need remote measurement and reporting of information of interest to the system designer or operator require the counterpart of telecommand, telemetry. The telecommand can be done in real time or not depending on the circumstances, as was the case of Marsokhod.

Transmission of commands
For a Telecommand (TC) to be effective, it must be compiled into a pre-arranged format (which may follow a standard structure), modulated onto a carrier wave which is then transmitted with adequate power to the remote system. The remote system will then demodulate the digital signal from the carrier, decode the TC, and execute it. Transmission of the carrier wave can be by ultrasound, infra-red or other electromagnetic means. Infrared Infrared light makes up the invisible section of the electromagnetic spectrum. This light, also classified as heat, transmits signals between the transmitter and receiver of the remote system. When the buttons on a remote are pressed they touch and close their corresponding contacts below them within the remote. There are four aluminum rods inside the transmitter that produce high frequency sounds when they are hit at one end. Each rod is a different length, which enables them to produce varying sound pitches, which control the receiving unit. This technology was widely used but had certain issues such as dogs being bothered by the high frequency sounds. == New applications ==
New applications
Often the smaller new remote controlled airplanes and helicopters are incorrectly advertised as radio controlled devices (see Radio control) but they are either controlled via infra-red transmission or electromagnetically guided. Both of these systems are part of the telecommand area. == Encryption ==
Encryption
To prevent unauthorised access to the remote system, TC encryption may be employed. Secret sharing may be used. == See also ==
tickerdossier.comtickerdossier.substack.com