NASA has said that the Phoenix Mars lander has stopped transmission after being damaged by ice during the long Martian winter.
The Phoenix probe, which landed on Mars two years ago almost to the day, has so far failed to respond to contact attempts by the Mars Odyssey orbiter despite over 60 fly-bys. It is thought that ice has infiltrated the landed and rendered its computer systems inoperable.
“The Phoenix spacecraft succeeded in its investigations and exceeded its planned lifetime," said Fuk Li, manager of the Mars Exploration Program at NASA's Jet Propulsion Laboratory in Pasadena, California.
"Although its work is finished, analysis of information from Phoenix's science activities will continue for some time to come."
NASA's Mars Reconnaissance Orbiter shows signs of severe ice damage to the lander's solar panels that would have made it impossible for the lander to recharge. The Phoenix probe, which landed in mars' polar regions to study the composition of the surface and its elements.
"Before and after images are dramatically different," said Michael Mellon of the University of Colorado in Boulder, a science team member for both Phoenix and HiRISE.
"The lander looks smaller, and only a portion of the difference can be explained by accumulation of dust on the lander, which makes its surfaces less distinguishable from surrounding ground."
The lander uses an IBM RAD6000 radiation-hardened RISC chip running at 33 MHz and a processing speed of about 35 MIPS. It as run off two gallium arsenide solar array panels which have now failed.
NASA calls game over on Mars Phoenix lander
By
Iain Thomson
on
May 25, 2010 2:09PM

Ice has proved fatal to exploration system on Red Planet.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future

Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection