Impact of AS6802 synchronization protocol on time-triggered and rate-constrained traffic

Anaïs Finzi, Luxi Zhao

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

51 Downloads (Orbit)

Abstract

TTEthernet is an Ethernet-based synchronized network technology compliant with the AFDX standard. It supports safety-critical applications by defining different traffic classes: Time-Triggered (TT), Rate-Constrained (RC), and Best-Effort traffic. The synchronization is managed through the AS6802 protocol, which defines so-called Protocol Control Frames (PCFs) to synchronize the local clock of each device. In this paper, we analyze the synchronization protocol to assess the impact of the PCFs on TT and RC traffic. We propose a method to decrease the impact of PCFs on TT and a new Network Calculus model to compute RC delay bounds with the influence of both PCF and TT traffic. We finish with a performance evaluation to i) assess the impact of PCFs, ii) show the benefits of our method in terms of reducing the impact of PCFs on TT traffic and iii) prove the necessity of taking the PCF traffic into account to compute correct RC worst-case delays and provide a safe system.

Original languageEnglish
Title of host publicationProceedings of 32nd Euromicro Conference on Real-Time Systems
EditorsMarcus Volp
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
Publication date1 Jun 2020
Pages17:1--17:22
ISBN (Electronic)9783959771528
DOIs
Publication statusPublished - 1 Jun 2020
Event32nd Euromicro Conference on Real-Time Systems - Virtual event
Duration: 7 Jul 202010 Jul 2020

Conference

Conference32nd Euromicro Conference on Real-Time Systems
LocationVirtual event
Period07/07/202010/07/2020
SeriesLeibniz International Proceedings in Informatics, LIPIcs
Volume165
ISSN1868-8969

Keywords

  • AS6802
  • Modeling
  • Performance analysis
  • TTE

Fingerprint

Dive into the research topics of 'Impact of AS6802 synchronization protocol on time-triggered and rate-constrained traffic'. Together they form a unique fingerprint.

Cite this