IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society 2012
DOI: 10.1109/iecon.2012.6389389
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the worst-case timing of Ethernet AVB for industrial applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A possible candidate could be camera traffic. Experiments with realistic automation control traffic show that this approach is reasonable and achieves the required latency bounds required for automotive applications [9] [19]. For less time-critical traffic or traffic that is not that well defined, a "less-than worst-case" design principle is then possible on the lower priorities, just like found in ECU or CAN bus designs.…”
Section: Mac Address Managementmentioning
confidence: 92%
See 1 more Smart Citation
“…A possible candidate could be camera traffic. Experiments with realistic automation control traffic show that this approach is reasonable and achieves the required latency bounds required for automotive applications [9] [19]. For less time-critical traffic or traffic that is not that well defined, a "less-than worst-case" design principle is then possible on the lower priorities, just like found in ECU or CAN bus designs.…”
Section: Mac Address Managementmentioning
confidence: 92%
“…However, this is only possible if the switch allows a partitioning of memory that explicitly ties memory partitions to individual priorities or queues and ports. The effects of different schedulers on delay and thus generated backlog for switched Ethernet have been studied extensively in [21,20,18,6,9]. The importance thus not only is on the appropriate port scheduler but also on the fact if and how buffer space can be reserved for specific queues that transport high critical streams to ensure freedom from interference.…”
Section: Mac Address Managementmentioning
confidence: 99%
“…Existing methods can be divided into four kinds: Compositional Performance Analysis (CPA), Network Calculus (NC), Trajectory Approach (TA) and miscellaneous methods. The first set of papers concern CPA method [ 23 , 24 , 25 , 26 , 27 ]. CPA is based on an iterative approach to seek the maximal stable delays in a busy period according to worst-case arrival sequences of all interfering flows.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we focus on the latter. A discussion about the gap between the observed latencies from a simulation and the latency guarantees from a formal CPA analysis in the Ethernet context can be found in [6].…”
mentioning
confidence: 99%