Publisher DOI: 10.1109/LCN.2015.7366277
Title: Beware of the Hidden! How Cross-traffic Affects Quality Assurances of Competing Real-time Ethernet Standards for In-Car Communication
Authors: Steinbach, Till 
Lim, Hyung-Taek 
Korf, Franz 
Schmidt, Thomas  
Herrscher, Daniel 
Wolisz, Adam 
Issue Date: 2015
Startpage: 1
Endpage: 9
Abstract: 
Real-time Ethernet is expected to become the core technology of future in-car communication networks. Following its current adoption in subsystems for info- and entertainment, broadband Ethernet promises new features in the core of upcoming car series. Its full potential will enfold when deploying Ethernet-based backbones that consolidate all automotive domains on a single physical layer at increased bandwidth but reduced complexity and cost. In such a backbone, traffic with a variety of real-time requirements and best-effort characteristics will share the same physical infrastructure. However, certain applications like online diagnosis, data- or firmware updates, and access to off-board backends will introduce bursty high traffic loads to the sensitive core of the cars communication network. In this work, we analyze the robustness against cross-traffic of real-time Ethernet protocols. Based on a realistic in-car scenario, we demonstrate that background cross-traffic can have significant impact on in-car backbone networks---even for real-time protocols with strict prioritization. By comparing the real-time approaches Ethernet AVBs asynchronous credit based shaping with the time-triggered and rate-constrained traffic classes of Time-triggered Ethernet (AS6802) we quantify how different media access policies suffer from low priority bursts of applications such as diagnosis, online updates or backend-based services. Our simulation study of a realistic in-car backbone design and traffic model reveals that in a realistic in-car network design, cross-traffic may increase end-to-end latency by more than 500% while the jitter can become 14 times higher than for a network without background tasks. We discuss ways to mitigate these degrading effects.
URI: http://hdl.handle.net/20.500.12738/476
Institute: Department Informatik 
Fakultät Technik und Informatik 
Type: Chapter/Article (Proceedings)
Appears in Collections:Publications without full text

Show full item record

Page view(s)

99
checked on Dec 27, 2024

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.