Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network
Post: #1


This paper presents a novel approach for calculating a probabilistic worst-case response-time for messages in the Controller Area Network (CAN). CAN uses a bit-stuffing mechanism to exclude forbidden bit-patterns within a message frame. The added bits eliminate the forbidden patterns but cause an increase in frame length. How much the length is increased depends on the bit-pattern of the original message frame.
Traditional response-time analysis methods assume that all frames have a worst-case number of stuff-bits. This introduces pessimism in the analysis.
In this paper we introduce an analysis approach based on using probability distributions to model the number of stuff-bits. The new analysis additionally opens up for making trade-offs between reliability and timeliness, in the sense that the analysis will provide a certain probability for missing deadlines, which in the reliability analysis can be treated as a probability of failure. We evaluate the performance of our method using a subset of the SAE benchmark.

Presented By:
Thomas Nolte, Mlardalen University
Hans Hansson, Mlardalen University
Christer Norstr?, Mlardalen University

read full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: time response analysis control system ppt slides, report of controller area network using railway tracksphp, probabilistic worst case response time analysis for the controller area network, what are the disadvantges of a metropolitan area network man, top 10 worst ps2, top 100 worst movies of the decade, mini projects on controller area network,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Last Post: ijasti
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 7,181 10-02-2015 05:52 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,692 30-03-2014 04:40 AM
Last Post: Guest
Question Space-time Adaptive Processing (STAP) computer science crazy 2 2,275 16-10-2013 03:09 PM
Last Post: Guest
  Computerized Paper Evaluation using Neural Network computer science crazy 12 8,921 17-07-2013 04:08 PM
Last Post: Guest
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,919 04-03-2013 01:21 PM
Last Post: Guest
  Quadrics Interconnection Network computer science crazy 2 2,794 28-02-2013 02:42 PM
Last Post: Guest
  network security seminar report computer science technology 13 10,543 24-01-2013 12:42 PM
Last Post: seminar details
  Network security and protocols project topics 1 1,356 24-01-2013 12:41 PM
Last Post: seminar details
  Gigabit Ethernet passive optical network (GE-PON) electronics seminars 1 1,924 12-01-2013 12:00 PM
Last Post: seminar details