scholarly journals Research of Message Scheduling for In-Vehicle FlexRay Network Static Segment Based on Next Fit Decreasing (NFD) Algorithm

2018 ◽  
Vol 8 (11) ◽  
pp. 2071 ◽  
Author(s):  
Shiyi Jin ◽  
Mengzhuo Liu ◽  
Yujing Wu ◽  
Yihu Xu ◽  
Jingnan Zhang ◽  
...  

FlexRay is becoming the in-vehicle communication network of the next generation. In this study, the main contents are the FlexRay network static segment scheduling algorithm and optimization strategy, improve the scheduling efficiency of vehicle network and optimize the performance of communication network. The FlexRay static segment characteristic was first analyzed, then selected bandwidth utilization as the performance metrics to scheduling problem. A signal packing method is proposed based on Next Fit Decreasing (NFD) algorithm. Then Frame ID (FID) multiplexing method was used to minimize the number of FIDs. Finally, experimental simulation by CANoe. FlexRay software, that shows the model can quickly obtain the message schedule of each node, effectively control the message payload size and reduced bus payload by 16.3%, the number of FID drops 53.8% while improving bandwidth utilization by 32.8%.

Author(s):  
Zsombor Petho ◽  
Intiyaz Khan ◽  
Árpád Torok

AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.


2014 ◽  
Vol 940 ◽  
pp. 362-365
Author(s):  
Wen Shen ◽  
Hui Deng ◽  
Wei Wang ◽  
Hai Yu

In this paper, we give an introduction to all-optical switching in power communication network. We apply the all-optical technology into electric power communication network. Edge node is designed to complete the optical packet optical packet generation and split into groups of common features. The core node is designed to forward optical packet to complete way finding functionality. All-optical technology shows advantages in protecting the transmission of real-time business requirements to maximize bandwidth utilization and network availability.


Author(s):  
Ravi Mahadevan ◽  
Neelamegam Anbazhagan

<span>Online Nowadays, the enterprises &amp; individuals are contributing their workloads on cloud service providers which are going to increase on daily basis. There are   large amount CSP are available to offer virtualized and dynamic resource on pay and use basis. However, there are almost CSP failed to maintain quality of service (QOS) and minimal resource optimization. Some of the existing approaches are highly dedicated on scheduling policy but, it does not considered reliable services with optimized QOS. To offer best solution of above problem, the framework proposes Enhanced Minimal Resource Optimization based Scheduling Algorithm to minimize the resources and maintain the QOS.  The method avoids delay in Request-Response model in cloud environment. To avoid overload for resource allocation, the proposed design utilized optimized scheduling policy.  Proposed mechanisms utilized optimized service brokering policy to reduce the delay response in cloud environment. The framework also help cloud user to prefer best CSP according to their prior services. The method offers rising trend of resource based structure to reduce the placement churn extensively. Proposed system utilized efficient scheduling policy to transmit data request to CSP with minimal data processing time. The entire utilization is to improve the QOS of cloud service provider in the features of multi-dimensional resource. Based on experimental evaluations, proposed technique improves the CPT (Computation Processing Time) 301.72 milliseconds, BU (Bandwidth Utilization) 20 Mbps, CPUU (CPU Utilization) 5% &amp; MRU (Memory Resource Utilization) 3% on given input parameters compare than existing methodology.</span>


2014 ◽  
Vol 487 ◽  
pp. 674-677
Author(s):  
Xie Li

This paper introduces the time triggered bus technology in vehicle communication network application, the bus protocol project: exclusive time window, the window of time and idle time window is discussed. In the laboratory conditions, the different communication protocols and communication parameters can be easily realized, which can be used to analyze the CAN and TTCAN communication protocol and network load frame priority to the impact of delay time, and verify the correctness of the model.


2003 ◽  
Vol 02 (04) ◽  
pp. 403-408
Author(s):  
A. Al-Zoubaidi

In this paper we propose a Regional Internet Exchange (RIX) scheme for MENA countries intra-regional traffic, compared with the existing situation for Internet service provision. The RIX architecture is proposed, implemented, and evaluated using simulation. Simultaneous comparative performance evaluation of Internet service provision for the existing and the proposed scenarios are presented. It is focused to measure utilization, message delays, access time and client perceived latencies performance metrics. The study shows that the proposed scheme results in less international bandwidth utilization and it reduces significantly the access time and most importantly it is inherently cost-effective.


Sign in / Sign up

Export Citation Format

Share Document