SlideShare uma empresa Scribd logo
1 de 21
Time-Triggered Architectures
The Time-Triggered Architecture:
           What Is It?
-The Time-Triggered Architecture (TTA) is a
  platform for safety-critical embedded systems
  E.g., aircraft and engine flight control
-Functionally, it is a TDMA (time-triggered) serial
  bus
-“Bus" understates its criticality and sophistication
  *It is the safety-critical core of the systems built
  above it
• The components of a TTA will
  communicate using a time-triggered
  protocol.
  – Hardware support needed for running the
   protocol.
TTA: Where Did It Come From?
-Developed by the group of Hermann
  Kopetz, TU Vienna
-Commercialized by TTTech
-TTA is unique in being developed for mass-
  market for automobile applications (Audi,
  PSA etc.) but also used for aircraft
  applications (Honeywell)
• Application domains:
  – Automotive electronics
  – Fly-by-wire cockpits
  – Railway signaling systems
• Reason: time-deterministic executions.
The Main Idea
• Time-triggered
  – Every speaker is assigned a predetermined time slot.
  – After one round, the speaker gets a slot again.
  – Also, a topic-schedule has been worked out in
    advance.
     • Top1, Top2, Top4 in the first round.
     • Top1, Top3 and Top5 in the second round
     • Top2, Top4 and Top5 in the third round.
  – Ensure no one breaks the rules!
Basic Characteristics of TTA
• Exists in both bus and star topologies
  (logically still a bus)
• All functionality implemented in the
  distributed interfaces (called TTP/C
  controllers)
• And in the hub of the star topology (a
  modified controller)
• Creates a synchronous, TDMA ring on a
  broadcast bus
Time-Triggered Architecture
Time-Triggered Architecture

             • Basic unit: NODE
             • Node:
                  A processor with memory
                  I-O subsystem
                  Operating system
                  Application software
                  Time-triggered communication
                   controller
Time-Triggered Architecture
            • Communication (TTA Protocol)
                 Nodes connect to each other via two
                independent channels.
                 The communication subsystem
                executes a periodic Time Division
                Multiple Access (TDMA) schedule.
                 Read a data frame + state information
                from CNI (Communication Node
                Interface) at predetermined fetch instant
                and deliver to the CNIs of all receiving
                nodes at predetermined delivery
                instants.
Time-Triggered Architecture
            • Communication
                All the TTPs in a cluster know this
               schedule.
                All nodes of a cluster have the “same”
               notion of global time. (achieved by
               synchronizing local time)
                fault-tolerant clock synchronization.
                TTA BUS topology.
System Overview
• Replicated
  communication channels
• The channel is a
  broadcast bus
• Access is by TDMA
  driven by progression of
  global time
• Local nodes time
  synchronized by TTP
• Communication by rapid
  and periodic message
  exchanges
Features of the TTP
• Fault-tolerance
• Only data signals (and no control signals)
  cross interfaces.
• Integrates numerous services
  –   Predictable message transmission
  –   Message acknowledgement in group communication
  –   Clock synchronization
  –   Membership
TTP Design Rationale
• Sparse time base
   – Messages are sent only at statically designated intervals
   – Inflexible compared to Event-triggered (ET) model, but easier to
     test
• Use of a priori knowledge
   – All nodes are aware of when each node is scheduled to transmit
• Broadcast
   – Correctness of transmitted message can be concluded as soon
     as one receiver acknowledges message delivery (broadcast
     medium)
Protocol Highlights

• Bus access
  – A FTU will have one or two time slots depending on class of
    fault-tolerance
  – Number of slots in a TDMA round given to an FTU may also be
    different
• Membership Service
  – If a message from a sending node does not occur in designated
    interval, its membership is set to 0 in other nodes
  – Membership checked before transmission. A node is alive if
     • Its internal error detection mechanism has not indicated error
     • At least one of its transmitted frames has been correctly
       acknowledged.
Protocol Highlights
• Temporary blackout handling
  – Correlated failure of a number of nodes
  – Identified by sudden drop in membership
  – Nodes send I-messages and perform local
    emergency control
  – After membership has stabilized, mode
    changed to global emergency service
Protocol Highlights
Temporal encapsulation of nodes
   – Communication bandwidth assigned statically
   – Time base is sparse- every input can be observed
     and reproduced exactly
• Testability
   – Easy to test the implementation in comparison to ET
   – Easy to simulate –finite number of execution
     scenarios
      • Uncontrolled interactions between nodes are prevented
      • Determinism: can replicate states of nodes
Strengths
• Can provide fault-tolerant real-time performance
• Practical (MARS platform), efficient, and
  scalable
   – Can be implemented using available hardware,
     signalling mechanisms
   – Low overhead
   – High data rates, used in both twisted fiber and optical
     channels
• Reusability, composability, and testability
Weaknesses
• The schedule is fixed so there is no bandwidth
  allocated for alarms and other spontaneous
  messages
• All fault-tolerance mechanism is implemented
  at system level, this means that very little
  “freedom” is left for application specific
  implementations
• Addition of nodes affects the existing system
  (although not the application)
• Time-Triggered architectures and
  protocols will become important.
• Seemingly simple
  – But quite sophisticated
• for time-deterministic, robust distributed
  systems.

Mais conteúdo relacionado

Mais procurados

Processes and operating systems
Processes and operating systemsProcesses and operating systems
Processes and operating systemsRAMPRAKASHT1
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
8096 microcontrollers notes
8096 microcontrollers notes8096 microcontrollers notes
8096 microcontrollers notesDr.YNM
 
Cellular system design fundamentals
Cellular system design fundamentalsCellular system design fundamentals
Cellular system design fundamentalsShiju Chacko
 
Arm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furberArm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furberasodariyabhavesh
 
ARM - Advance RISC Machine
ARM - Advance RISC MachineARM - Advance RISC Machine
ARM - Advance RISC MachineEdutechLearners
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security ConceptsMohit Saxena
 
Advance computer architecture
Advance computer architecture Advance computer architecture
Advance computer architecture SabthamiS1
 
Timer counter in arm7(lpc2148)
Timer counter in arm7(lpc2148)Timer counter in arm7(lpc2148)
Timer counter in arm7(lpc2148)Aarav Soni
 
Multi core-architecture
Multi core-architectureMulti core-architecture
Multi core-architecturePiyush Mittal
 
Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Mrunal Deshkar
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)Sandesh Jonchhe
 
Chapter 1 microprocessor introduction
Chapter 1 microprocessor introductionChapter 1 microprocessor introduction
Chapter 1 microprocessor introductionShubham Singh
 

Mais procurados (20)

Real Time Operating System
Real Time Operating SystemReal Time Operating System
Real Time Operating System
 
Processes and operating systems
Processes and operating systemsProcesses and operating systems
Processes and operating systems
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
8096 microcontrollers notes
8096 microcontrollers notes8096 microcontrollers notes
8096 microcontrollers notes
 
Cellular system design fundamentals
Cellular system design fundamentalsCellular system design fundamentals
Cellular system design fundamentals
 
Arm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furberArm architecture chapter2_steve_furber
Arm architecture chapter2_steve_furber
 
ARM Processors
ARM ProcessorsARM Processors
ARM Processors
 
ARM - Advance RISC Machine
ARM - Advance RISC MachineARM - Advance RISC Machine
ARM - Advance RISC Machine
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Interrupts
InterruptsInterrupts
Interrupts
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
Advance computer architecture
Advance computer architecture Advance computer architecture
Advance computer architecture
 
Timer counter in arm7(lpc2148)
Timer counter in arm7(lpc2148)Timer counter in arm7(lpc2148)
Timer counter in arm7(lpc2148)
 
Multi core-architecture
Multi core-architectureMulti core-architecture
Multi core-architecture
 
Vx works RTOS
Vx works RTOSVx works RTOS
Vx works RTOS
 
Advanced micro -processor
Advanced micro -processorAdvanced micro -processor
Advanced micro -processor
 
Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor Overview of microcontroller and microprocessor
Overview of microcontroller and microprocessor
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)
 
Chapter 1 microprocessor introduction
Chapter 1 microprocessor introductionChapter 1 microprocessor introduction
Chapter 1 microprocessor introduction
 

Semelhante a Time-Triggered Architecture Explained

WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Embedded System serial Communication.ppt
Embedded System serial Communication.pptEmbedded System serial Communication.ppt
Embedded System serial Communication.pptvipulkondekar
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time SynchronizationKrishna Sankar
 
Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating SystemsPawandeep Kaur
 
tutorial-Deterministic-Ethernet-stp.ppt
tutorial-Deterministic-Ethernet-stp.ppttutorial-Deterministic-Ethernet-stp.ppt
tutorial-Deterministic-Ethernet-stp.pptssuser3855be
 
NETWORK DESIGN.ppt
NETWORK DESIGN.pptNETWORK DESIGN.ppt
NETWORK DESIGN.pptdheepaT2
 
Vsat day-2008-comtech
Vsat day-2008-comtechVsat day-2008-comtech
Vsat day-2008-comtechSSPI Brasil
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 

Semelhante a Time-Triggered Architecture Explained (20)

WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Embedded System serial Communication.ppt
Embedded System serial Communication.pptEmbedded System serial Communication.ppt
Embedded System serial Communication.ppt
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time Synchronization
 
Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating Systems
 
08 multiplexing
08 multiplexing08 multiplexing
08 multiplexing
 
tutorial-Deterministic-Ethernet-stp.ppt
tutorial-Deterministic-Ethernet-stp.ppttutorial-Deterministic-Ethernet-stp.ppt
tutorial-Deterministic-Ethernet-stp.ppt
 
08 multiplexing
08 multiplexing08 multiplexing
08 multiplexing
 
FlexRay.pdf
FlexRay.pdfFlexRay.pdf
FlexRay.pdf
 
NETWORK DESIGN.ppt
NETWORK DESIGN.pptNETWORK DESIGN.ppt
NETWORK DESIGN.ppt
 
MC PPT.pptx
MC PPT.pptxMC PPT.pptx
MC PPT.pptx
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Atm intro
Atm introAtm intro
Atm intro
 
Vsat day-2008-comtech
Vsat day-2008-comtechVsat day-2008-comtech
Vsat day-2008-comtech
 
Rtp
RtpRtp
Rtp
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
7Multiplexing.pdf
7Multiplexing.pdf7Multiplexing.pdf
7Multiplexing.pdf
 
Tsfpga
TsfpgaTsfpga
Tsfpga
 

Mais de Gichelle Amon (20)

Kerberos
KerberosKerberos
Kerberos
 
Network security
Network securityNetwork security
Network security
 
Os module 2 d
Os module 2 dOs module 2 d
Os module 2 d
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Lec 3
Lec 3Lec 3
Lec 3
 
Lec2 final
Lec2 finalLec2 final
Lec2 final
 
Lec 4
Lec 4Lec 4
Lec 4
 
Lec1 final
Lec1 finalLec1 final
Lec1 final
 
Module 3 law of contracts
Module 3  law of contractsModule 3  law of contracts
Module 3 law of contracts
 
Transport triggered architecture
Transport triggered architectureTransport triggered architecture
Transport triggered architecture
 
Subnetting
SubnettingSubnetting
Subnetting
 
Os module 2 c
Os module 2 cOs module 2 c
Os module 2 c
 
Os module 2 ba
Os module 2 baOs module 2 ba
Os module 2 ba
 
Lec5
Lec5Lec5
Lec5
 
Delivery
DeliveryDelivery
Delivery
 
Addressing
AddressingAddressing
Addressing
 
6 spatial filtering p2
6 spatial filtering p26 spatial filtering p2
6 spatial filtering p2
 
5 spatial filtering p1
5 spatial filtering p15 spatial filtering p1
5 spatial filtering p1
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Time-Triggered Architecture Explained

  • 2. The Time-Triggered Architecture: What Is It? -The Time-Triggered Architecture (TTA) is a platform for safety-critical embedded systems E.g., aircraft and engine flight control -Functionally, it is a TDMA (time-triggered) serial bus -“Bus" understates its criticality and sophistication *It is the safety-critical core of the systems built above it
  • 3. • The components of a TTA will communicate using a time-triggered protocol. – Hardware support needed for running the protocol.
  • 4. TTA: Where Did It Come From? -Developed by the group of Hermann Kopetz, TU Vienna -Commercialized by TTTech -TTA is unique in being developed for mass- market for automobile applications (Audi, PSA etc.) but also used for aircraft applications (Honeywell)
  • 5. • Application domains: – Automotive electronics – Fly-by-wire cockpits – Railway signaling systems • Reason: time-deterministic executions.
  • 6. The Main Idea • Time-triggered – Every speaker is assigned a predetermined time slot. – After one round, the speaker gets a slot again. – Also, a topic-schedule has been worked out in advance. • Top1, Top2, Top4 in the first round. • Top1, Top3 and Top5 in the second round • Top2, Top4 and Top5 in the third round. – Ensure no one breaks the rules!
  • 7. Basic Characteristics of TTA • Exists in both bus and star topologies (logically still a bus) • All functionality implemented in the distributed interfaces (called TTP/C controllers) • And in the hub of the star topology (a modified controller) • Creates a synchronous, TDMA ring on a broadcast bus
  • 8.
  • 10. Time-Triggered Architecture • Basic unit: NODE • Node:  A processor with memory  I-O subsystem  Operating system  Application software  Time-triggered communication controller
  • 11. Time-Triggered Architecture • Communication (TTA Protocol)  Nodes connect to each other via two independent channels.  The communication subsystem executes a periodic Time Division Multiple Access (TDMA) schedule.  Read a data frame + state information from CNI (Communication Node Interface) at predetermined fetch instant and deliver to the CNIs of all receiving nodes at predetermined delivery instants.
  • 12. Time-Triggered Architecture • Communication  All the TTPs in a cluster know this schedule.  All nodes of a cluster have the “same” notion of global time. (achieved by synchronizing local time)  fault-tolerant clock synchronization.  TTA BUS topology.
  • 13. System Overview • Replicated communication channels • The channel is a broadcast bus • Access is by TDMA driven by progression of global time • Local nodes time synchronized by TTP • Communication by rapid and periodic message exchanges
  • 14. Features of the TTP • Fault-tolerance • Only data signals (and no control signals) cross interfaces. • Integrates numerous services – Predictable message transmission – Message acknowledgement in group communication – Clock synchronization – Membership
  • 15. TTP Design Rationale • Sparse time base – Messages are sent only at statically designated intervals – Inflexible compared to Event-triggered (ET) model, but easier to test • Use of a priori knowledge – All nodes are aware of when each node is scheduled to transmit • Broadcast – Correctness of transmitted message can be concluded as soon as one receiver acknowledges message delivery (broadcast medium)
  • 16. Protocol Highlights • Bus access – A FTU will have one or two time slots depending on class of fault-tolerance – Number of slots in a TDMA round given to an FTU may also be different • Membership Service – If a message from a sending node does not occur in designated interval, its membership is set to 0 in other nodes – Membership checked before transmission. A node is alive if • Its internal error detection mechanism has not indicated error • At least one of its transmitted frames has been correctly acknowledged.
  • 17. Protocol Highlights • Temporary blackout handling – Correlated failure of a number of nodes – Identified by sudden drop in membership – Nodes send I-messages and perform local emergency control – After membership has stabilized, mode changed to global emergency service
  • 18. Protocol Highlights Temporal encapsulation of nodes – Communication bandwidth assigned statically – Time base is sparse- every input can be observed and reproduced exactly • Testability – Easy to test the implementation in comparison to ET – Easy to simulate –finite number of execution scenarios • Uncontrolled interactions between nodes are prevented • Determinism: can replicate states of nodes
  • 19. Strengths • Can provide fault-tolerant real-time performance • Practical (MARS platform), efficient, and scalable – Can be implemented using available hardware, signalling mechanisms – Low overhead – High data rates, used in both twisted fiber and optical channels • Reusability, composability, and testability
  • 20. Weaknesses • The schedule is fixed so there is no bandwidth allocated for alarms and other spontaneous messages • All fault-tolerance mechanism is implemented at system level, this means that very little “freedom” is left for application specific implementations • Addition of nodes affects the existing system (although not the application)
  • 21. • Time-Triggered architectures and protocols will become important. • Seemingly simple – But quite sophisticated • for time-deterministic, robust distributed systems.