Next Article in Journal
A Short-Term Traffic Flow Prediction Method for Airport Group Route Waypoints Based on the Spatiotemporal Features of Traffic Flow
Previous Article in Journal
Performance Improvement of a High Loading Centrifugal Compressor with Vaned Diffuser by Hub Contour Optimization
Previous Article in Special Issue
Comparison of Flight Parameters in SIL Simulation Using Commercial Autopilots and X-Plane Simulator for Multi-Rotor Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Event-Driven Link-Level Simulator for the Validation of AFDX and Ethernet Avionics Networks

1
Telecommunication Research Institute (TELMA), E.T.S. Ingeniería de Telecomunicación, University of Málaga, Boulevar Louis Pasteur 35, 29010 Málaga, Spain
2
Aerospace and Defence Systems, Aertec Solutions, 29590 Málaga, Spain
*
Author to whom correspondence should be addressed.
Aerospace 2024, 11(4), 247; https://doi.org/10.3390/aerospace11040247
Submission received: 31 January 2024 / Revised: 16 March 2024 / Accepted: 19 March 2024 / Published: 22 March 2024

Abstract

:
Aircraft are composed of many electronic systems: sensors, displays, navigation equipment, and communication elements. These elements require a reliable interconnection, which is a major challenge for communication networks since high reliability and predictability requirements must be verified for safe operation. In addition, their verification via hardware deployments is limited because these are costly and it is difficult to try different architectures and configurations, thus delaying design and development in this area. Therefore, verification at early stages in the design process is of great importance and must be supported with simulation. In this context, this work presents an event-driven link-level framework and simulator for the validation of avionics networks. The tool presented supports communication protocols commonly used in avionics, such as Avionics Full-Duplex Switched Ethernet (AFDX), as well as Ethernet, which is used with static routing. Also, the simulator provides accurate results by employing realistic models for various devices. The proposed platform was evaluated in the Clean Sky’s Disruptive Cockpit for Large Passenger Aircraft architecture scenario, showing the capabilities of the simulator. Verification speed is a key factor in its application, so the computational cost was analyzed, proving that the execution time is linearly dependent on the number of messages sent and that the increase in the number of nodes has few quadratic components.

1. Introduction

The aerospace industry has made significant progress since its inception over a century ago by the Wright brothers. The introduction of avionics (a term derived from the combination of aviation and electronics) has been of great importance in these advances. Avionics encompasses all the electronic systems that have been added to aircraft, including a wide range of equipment such as actuators, sensors, and communication systems. These systems make up the majority of the safety-critical elements in an aircraft. The concept of IMA and DIMA [1] has been extended to commercial aviation with the design of airplanes such as the Airbus A380 [2] and Boeing 777 [3]. This approach has advanced avionics significantly. The approach distributes safety-critical functions into separate independent modules, placing them closer to the components they monitor and connecting them within an avionics network.
Ethernet-based protocols, such as AFDX [4], are currently the most widely used among the various protocols and buses available for establishing these types of networks. Other protocols and buses, such as the CAN bus and serial bus, are also used, but Ethernet-based protocols are the most prevalent. AFDX is an implementation of the ARINC 664 Part 7 standard that provides dedicated bandwidth and a fixed QoS. The authors of this work previously presented an AFDX framework and simulator in [5] to facilitate the validation process during the Software-in-the-loop (SIL) step of the Model-Based Systems Engineering (MBSE) design process.
Although this protocol is widely used in avionics, there are efforts to implement other protocols, such as Ethernet networks with static routing. In this matter, some works are starting to propose Ethernet topologies instead of AFDX for avionics networks. For instance, refs. [6,7] explored new topologies for Ethernet-based avionics networks with a focus on ring topologies. The authors compared the AFDX topology of the Airbus A380 with different versions of an equivalent Ethernet ring topology, some of which achieved better delays. This shift away from AFDX has also been seen in the market. For example, [8] determined that a custom Ethernet implementation is more flexible and suitable for enterprise interests. However, it is noted that Ethernet is not as reliable as AFDX.
Additionally, the TSN [9] standard is another Ethernet-based option that is expected to become the standard for future generations of aircraft. Currently, a working group is developing a TSN profile tailored specifically to the avionics sector, covering aspects such as shapers, scheduling, and stream isolation [10].
In the aerospace market, achieving great reliability is crucial for avionics networks since they must satisfy the Design Assurance Level-A (DAL-A) of the DO-254 [11] and DO-178 [12] documents for certification. However, the industry is also seeking to reduce costs. As mentioned, one way to achieve this is by replacing the AFDX network with a less expensive alternative that requires fewer devices, resulting in less fuel consumption per flight. The flexibility of Ethernet-based networks provides designers with greater freedom to design redundancy strategies. Therefore, the choice to implement redundancy management when working with the Ethernet protocol in avionics topologies becomes optional, as it may or may not be necessary, based on the specific network design and redundancy requirements.
Therefore, it was deemed necessary to update the simulator in order to meet market demands. In this regard, the Ethernet protocol was added as an option to the simulator. Additionally, improvements have been made to the simulator, such as a more realistic memory structure in the switch model and the separation of packet generation and BAG scheduling. In addition, the simulator now includes switch capacity as an output to facilitate analysis of use cases. The TSN standard has also been studied for a possible future update of the simulator. Finally, a validation of the simulator was carried out.
Therefore, the present work is structured as follows. Section 2 provides a brief summary of the supported protocols. Secondly, Section 3 introduces the developed simulator with an insight into the implementation. Thirdly, Section 4 analyzes the correctness of the simulator results and the computational performance. Then, Section 5 presents a discussion of the integration of the simulator in the design process. Finally, Section 6 presents the main conclusions of this work.

2. Avionic Protocols

This section analyzes the two most important protocols used in avionics networks nowadays; namely ARINC 664 or AFDX, and TSN.

2.1. ARINC 664

AFDX is a packet-switching protocol layered over Ethernet networks that provides deterministic timing and redundancy management. It uses IP and UDP as its upper-layer protocols. AFDX provides determinism to the network with static virtual paths called Virtual Links (VL), limited bandwidth through the so-called BAG, and duplicity in the network for redundancy. AFDX networks consist of two types of devices: End Systems (ES), which are the end points of the network, and switches for interconnecting the ES. Further insight into this protocol can be found in the authors’ previous work [5].

2.2. Time-Sensitive Networking

TSN is a set of standards of IEEE 802.1 [13] based on Ethernet to provide communications with real-time requirements. It includes several profiles, including Audio Video Bridging (802.1 BA [14]), Fronthaul (802.1 CM/de [15]), Industrial Automation (IEC/IEEE 60802 [16]), and Automotive in-Vehicle (P802.1 DG [17]). Recently, TSN has emerged as a promising protocol for avionics networks. The IEEE 802.1 Task Group is actively developing a TSN profile specifically tailored for avionics networks (IEEE P802.1 DP [10]), which need specifications slightly different from the other profiles.
In order to create the aerospace profile, the Task Group is adapting the structure of the AFDX protocol with IEEE 802.1 substandards. The IEEE 802.1Q [18] Stream is introduced instead of the AFDX VL, which would be implemented on top of Virtual Local Area Networks (VLANs). The AFDX ES is replaced with the IEEE 802.1Q End Station, and the AFDX Switch is substituted with the IEEE 802.1Q Bridge.
A significant difference between TSN and AFDX is the ease of configuration. TSN networks benefit from simplified configuration using the YANG data models developed by IEEE. Additionally, TSN is expected to be less expensive than AFDX, as it can use cheaper COTS L2 switches, while AFDX equipment is quite costly.

3. Proposed System

As highlighted in Section 1, the acquisition of metrics to evaluate the performance of avionics networks during their development, validation, and verification processes is essential. The main objective is to ensure that the specified delay thresholds critical to the proper operation of the aircraft are consistently met. The logical behavior of the simulator is explained in detail in [5]. This section focuses on the implementation of the simulator in Matlab/Simulink and its enhancements.

3.1. General Framework

On the one hand, The simulator creates a simulation model by taking a series of inputs. These inputs, which are summarized in Table 1, include the simulation time, the Bit Error Rate (BER), and the topology of the network. The topology includes the choice of protocol (Ethernet or AFDX), the connections between network elements (via adjacency matrix), the routing of each flow/VL (manually or randomly configured), periodicity/BAG, frame length, and certain switch parameters such as the switching delay and internal memory.
On the other hand, the simulator outputs the following FoM, which are valuable for network validation and for integrating the simulator into V&V frameworks:
  • Delay. Includes the maximum, minimum, mean, and standard deviation values of each flow/VL in milliseconds. The delay is set as the time from departure to arrival.
  • Jitter. Includes the maximum, minimum, mean, and standard deviation values of each flow/VL in milliseconds.
  • Throughput. Includes the maximum, minimum, mean, and standard deviation values of each flow/VL in bits per second (bps).
  • Packet loss. Specified for each flow/VL as a percentage.
  • Switch capacity. General capacity of each switch through the simulation in percentage.
The network model generation process utilizes these inputs to construct the network model, which includes all specified ES and switches. In addition, the model links each VL to its respective ES and establishes all necessary connections between ES and switches.
The simulator was developed using Matlab/Simulink, and it performs event-driven simulations by modeling the packets as entities. This approach prevents timestamp errors and unnecessary computation when there are no events [19]. Also, timestamps are taken from the simulation time, so the lack of synchronization in the network is not taken into account.
Additionally, the simulator manages packet entities in the ES and switches generated models to simulate the transmission of packets in the Data Link Layer. Thus, the simulator’s models for these network elements play a crucial role, as explained in the following subsections.
To sum up, the simulator operates according to the scheme depicted in Figure 1. It begins by obtaining the inputs from the configuration files. These inputs are then used to create the routing configuration, which is saved for future simulation replication. Thirdly, it utilizes the routing configuration to generate the Simulink model, link the ESs and switches, and set the parameters for the ES and the switch’s blocks. Lastly, the simulation is executed, and after the simulation finishes, the simulator extracts the FoMs from the results and logs them.

3.2. Multiple VL/Path Configuration

In large real-world network topologies, it is impractical to expect that every data flow will have the same configuration. Data flows for different purposes will have different periodicity and packet length configurations. For this reason, the simulator can automatically generate different configurations for the various VL/paths to understand the normal behavior of an avionics network. This configuration generation is implemented using OA, as described in [20].
OAs are mathematical tools utilized for designing an optimal combination of multiple variables in a set of experiments. The input variables, also known as factors, have a discrete set of possible values, or levels. These levels are combined to create an array of representative combinations. These combinations are then used as configurations for the different data flows.

3.3. End System Model

The ES consists of two components: a receiver and a transmitter. When emulating on-board equipment, the frames are generated by the transmitter, which includes a packet generator, a redundancy management module, and a route selection module. Figure 2a shows the Simulink model of the transmitter, which consists of three main components modeled by code: the Packet Generator, the Input Selector, and the Route Selector. Meanwhile, the Simulink model of the receiver is displayed in Figure 2b, where the input streams are combined into the output and stored with a timestamp for later analysis.
The Packet Generator module replaces the IMA device within the network and generates the frames. In the previous version, packets were directly generated in their corresponding BAG. In this version, the BAG-based scheduling has been separated from the packet generation process and moved to the Route Selector module. This facilitates the testing of various traffic patterns to observe network behavior.
Figure 3a illustrates the behavior of this module. In the initial setup, the module programs the first packet-generation event of each data flow/VL. Subsequently, a packet entity is generated for each VL. These entities store all relevant data, such as the BAG value, the frame data, the VL ID, and the payload size. The packet entity is then sent to the module output, and the next packet-generation event for the corresponding VL is programmed based on the traffic pattern. In case of needing redundancy, two packets with the same sequence number are generated.
The Input Selector module retrieves packets from the available inputs, which, in this case, is only the Packet Generator, and it forwards them to the Route Selector via a single link.
The Route Selector is responsible for addressing the packet entities of the output connected to the corresponding switch. The module’s behavior is illustrated in Figure 3b. If the AFDX protocol is used, the initial packet is directed to the storage corresponding to its VL, and it is held until the next available BAG. Subsequently, it will be transmitted to the corresponding output queue, where it will wait to be dispatched for the calculated transmission delay. Additionally, the CRC is set by the Route Selector module based on the BER input, modeling transmission errors.

3.4. Switch Model

As described in [5], the switch’s operation revolves around two main processes, scheduling and filtering, which implement the Round Robin and Token Bucket algorithms, respectively. Figure 4 shows the Simulink model of the switch, which consists of two main modules: an Input Selector Switch and Route Selector Switch.
The internal memory configuration uses a shared queue system, which is a common approach found in commercial switches, such as the one described in [21]. As shown in Figure 5, this system comprises individual FIFO queues assigned to each port, providing dedicated memory space. In addition to this, there is a shared memory that is used when a particular FIFO reaches full capacity, ensuring that it does not compromise the reserved memory of other ports. This design protects each port from the saturation effects of burst traffic from other ports. This behavior is illustrated in Figure 5, showing two case scenarios: one without the shared memory full and the other with the shared memory full. In Figure 5a, the green flow fills its FIFO queue while the red flow, characterized as burst traffic, utilizes the shared queue once its dedicated FIFO queue reaches full capacity. In Figure 5b, despite the switch memory being saturated with burst traffic from two flows (blue and red), the green traffic retains its dedicated memory and can transmit without issue, whereas messages from the red and blue traffic are dropped.
Figure 6a illustrates the behavior of the Input Selector Switch module. When a packet entity enters the module, it is placed in the appropriate input queue if the CRC is correct. Otherwise, it is dropped. Then, the packets are transmitted from the module using the Round Robin algorithm. This algorithm sequentially processes the queues, transmitting one packet per queue before proceeding to the next. This approach allows messages to bypass queues congested with burst traffic, enabling packets to be moved to the next module without an excessive delay.
Figure 6b shows the behavior of the Route Selector Switch. When a packet entity enters the module, it is directed to the corresponding output after a switching delay. In the Simulink model, this output is connected to a FIFO queue. If the queue is full, the packet is redirected to a shared memory queue, provided that memory is available. The packet then waits until a gap in the output FIFO queue is available. If the protocol used is AFDX, the module checks whether there is enough credit available to send the packet. If there is not enough credit, the packet is dropped. Following the FIFO queue shown in Figure 4 is an Entity Server block. The packet remains in this block for the duration of the calculated transmission delay before advancing to the next device in the network. This block has been configured to hold only one packet entity at a time. Once the current packet leaves, the next one in the FIFO queue replaces it.
A local Simulink library was created to enable the easy reuse of models or blocks for building new use cases. The simulator was designed to automatically generate the Simulink model using simple configuration files and set block parameters accordingly.

4. Evaluation

Regarding the evaluation of the simulator, two main areas were analyzed in this work. First, the accuracy of the simulation results was verified to ensure that the simulator can be trusted. Secondly, the computational performance of the simulator was analyzed to determine its usefulness and provide an example of its results.

4.1. Correctness of the Results

In order to check the correctness of the simulator results, a comparison with the work presented in [22] was made. This work presents the use of an analytical method derived from Network Calculus to determine the worst possible delays in an AFDX network. Then, the method was validated using a simple use case. The results of this use case were replicated with the simulator presented in this work in order to ensure that the simulator is capable of providing reliable results.
The topology consists of seven ES, three switches, and five VLs. The configuration of the VLs in this use case is depicted in Figure 7 and described in Table 2, where it can be observed that two VLs go through switch S1, another two VLs go through switch S2, and all five VLs go through switch S3. Also, the length of the packets sent is 500 Bytes and the BAG configured is 4 ms.
Table 3 summarizes the results of this use case. Each row represents the worst-case delay of each VL and the necessary transmission start time of each ES transmission to obtain it, where Δ t is an insignificant delta of the time used to establish the packet order in the queues. For instance, in the worst case of VL1, the defined transmission start times cause the packet of VL1 (which departs from ES1) to be processed inside Switch 1 in the second place after the packet of VL2 (which departs from ES2). In Switch 3, packets from VL1, 4, and 5 (departing from ES1, 4, and 5, respectively) arrive simultaneously. The VL1 packet is the last to be processed before reaching the destination ES. The transmission start time for each VL shown in the table was configured in the traffic pattern section of the Packet Generator block. The simulation results match those given in [22], as can be seen in the three columns on the right.
The simulator offers the possibility to analyze the causes of various delays in detail by examining the FoM of switch capacity. This can be done by monitoring the memory usage of the switch throughout the simulation. For example, the usage of memory of the three switches during the collision of packets is represented in Figure 8. In particular, these data correspond with the simulation of the worst case for VL1 presented in Table 3. In both Switch 1 and Switch 2 (Figure 8a and Figure 8b, respectively), it can be observed that two packets arrive at the same time and leave one by one. Meanwhile, in Switch 3 (Figure 8c), more packets arrive at the same time: at time t = 112 μ s, the packets of VL2 and VL3 arrive at the switch and go to different queues; at time t = 152 μ s, both packets leave the switch, and three packets from VL4, VL5, and VL1 arrive at the same queue (being processed in that order). At time t = 192 μ s, the first packet in the queue leaves, at time t = 232 μ s, the second packet leaves, and, at time t = 272 μ s, the packet corresponding to VL1 leaves and reaches its destination, as shown in Table 3. Also, in Figure 8d, the time axis is zoomed out to show the BAG of 4 ms.

4.2. Computational Performance Analysis

In order to analyze the computational performance, the execution time of the simulations was studied. For this, the network topology of a real airplane, specifically the Airbus A350, was simulated with different packet periodicity configurations. The Airbus A350 flight control architecture, which was adapted from [23], is depicted in Figure 9. This architecture is composed of 37 ESs, of which 6 are Calculator Unit (CU)s and 7 are switches. The switches L2, L1, C, R1, and R2 are connected to six or seven ESs each. The computation and data processing are carried out via the CUs, while the remaining ESs work as sensors or actuators. As a result, communication flows between the CUs and the other ESs in both directions.
Then, this topology was simulated for 1 s with 60 VL configured with a packet periodicity of 0.5 ms, 1 ms, 2 ms, 3 ms, 4 ms, 5 ms, 6 ms, 7 ms, and 8 ms, meaning a total of 120,000, 60,000, 30,000, 20,000, 15,000, 12,000, 10,000, 8570, and 7500 messages sent, respectively. The rest of the configuration parameters are summarized in Table 4. Each configuration was simulated 100 times in order to obtain statistically significant results. The mean execution time of these configurations (running on a Mac with an Apple M1 chip and 16 GB of RAM) resulted in 13.5, 6.4, 3.5, 2.6, 2.2, 1.8, 1.6, 1.5, and 1.4 min, respectively, as shown in Figure 10. These results show that the duration of the simulations has a clear linear dependence on the messages sent, resulting in the linear expression of Equation (1) with a correlation value of R 2 = 0.97869 , where E X _ t i m e refers to the execution time of the simulation in minutes, and N _ P a c k e t s refers to the number of packets sent during the simulation.
E x _ t i m e [ m i n ] = 0.000106 · N _ P a c k e t s + 0.5
Additionally, a comparison of execution times for different topologies was conducted to observe the impact of the number of nodes (ES and switches) in the network. Three topologies were used: the 10-node topology from Section 4.1 (7 ES and 3 switches), the Airbus A350 topology with 44 nodes (37 ES and 7 switches), and the Airbus A380 topology with 132 nodes (123 ES and 9 switches), which is a typical example of an AFDX topology. Each of these topologies was simulated five times using the input parameters summarized in Table 5.
Figure 11 shows the execution times of these topologies. The mean execution time for each topology is 42.63 s, 5.23 min, and 33.6 min, respectively. The execution time increases polynomially, as described by Equation (2), where E X _ t i m e represents the simulation execution time in minutes, and N _ N o d e s represents the number of nodes in the topology with the configuration of Table 5. However, the linear component is approximately 30 times greater than the quadratic component in the quadratic expression. This, along with the A380 topology being one of the largest available, suggests that the quadratic term would have little impact on the execution time of real networks, ensuring prompt evaluation.
E x _ t i m e [ m i n ] = 0.001552 · N _ N o d e s 2 + 0.049187 · N _ N o d e s + 0.063406

4.3. Results Comparison

Furthermore, the simulation-derived packet traces, such as the ones presented in Table 6, can serve as a valuable data source for generating time series metrics. This feedback is crucial in the design process, offering insights into network performance during normal operation. It allows the efficiency of the network to be evaluated and metrics other than worst-case delays, which are typically used for certification purposes, to be obtained.
The simulation’s packet entities store the payload contents. However, the payload in the simulations conducted for this work was randomly generated, so it was not included in the traces in Table 6. Nonetheless, the payload can be included in the traces if the packets contain useful information.
In this way, in order to show some representative statistics, the A350 topology was simulated using an automatically generated configuration of 80 VLs, as commented upon in Section 3.2. This VL configuration is shown in Table 7, where the path, the packet length, and the BAG/periodicity of each VL/data flow are shown. The possible packet length levels were 64, 128, 256, 400, 512, 750, 900, 1100, and 1280 Bytes, while the possible BAG levels were 0.5, 1, 2, 4, and 8 ms. Also, the bitrate was configured as follows: 100 Mbps between the ESs and the switches, and 1 Gbps between different switches.
The A350 topology was simulated twice with this configuration: once with Ethernet and once with AFDX. To compare the protocols, a burst traffic pattern was configured in the Packet Generator. The generation time of the next packet entity was modeled as a uniform distribution between the calculated transmission delay of the current packet and the BAG or periodicity value.
Then, the results of the Ethernet simulation are summarized in Table 8, while the results of the AFDX simulation are summarized in Table 9. The differences are significant, mainly due to the application of the BAG-based scheduler. On one hand, the jitter in the AFDX simulation is bounded and never exceeds 500 μ s, which is the maximum jitter allowed in AFDX networks. In most cases, it is close to 0. On the other hand, the Ethernet simulation exhibits higher jitter, with a standard deviation that sometimes exceeds 500 μ s. Additionally, the delay in the Ethernet simulation is generally higher than in the AFDX simulation due to higher network saturation.
However, in the AFDX simulation, packet loss is consistently around 50% in every VL due to the constant waiting for an available BAG. Packet loss is calculated as the number of packets that do not reach their destination at the end of the simulation. In contrast, the Ethernet simulation undergoes a low or close to 0% packet loss in most data flows.
The results of the Ethernet simulation show that, in overly demanding situations (i.e., all data flows with a bursty traffic pattern), the A350 Ethernet topology can result in unacceptable delays and jitter. For this reason, to validate a topology to be used with Ethernet, it must be carefully evaluated within the expected operating conditions.

5. Discussion

As mentioned in this work, the simulator presented in this work was designed to be used in the SIL step of the MBSE design process. This step is particularly important in the aerospace sector because hardware implementation is highly expensive and lacks the flexibility of simulators for network testing. It is, therefore, essential to be sure that the network will function correctly before proceeding to the HIL stage of the MBSE design process.
Simulators, like the one proposed in this study, play a critical role in this sector. They facilitate the easy reuse of models by storing them in a library and programmatically generating use cases. The utilization of Matlab/Simulink for implementation also offers advantages, including the ability to conduct parallel simulations. The automation of generating use cases from configuration files, as demonstrated in the presented simulator, is a crucial aspect. This functionality enables the seamless integration of the simulator into validation frameworks, such as the one discussed in [5], or automatic validation platforms. These platforms use the FoMs to generate new use cases with minimal human intervention, a current focus of the authors.

6. Conclusions and Outlook

This work is a follow-up to the work presented in [5], which presented an AFDX simulator. Therefore, a brief analysis of the main protocols and standards used to communicate between the different elements of an avionics network, such as Ethernet and Ethernet-based AFDX and TSN, was presented. Efforts to replace AFDX with lower-cost Ethernet-based devices have also been observed in the market. Thus, the AFDX simulator was updated to adapt to the market needs, including the Ethernet protocol, as well as new inputs and outputs, while also improving the models to be more realistic. A deeper examination of the Matlab/Simulink implementation of the simulation was also conducted. In addition, this simulator can be easily integrated into validation frameworks and platforms. Furthermore, the simulator was successfully tested by replicating the results of a known use case, also showing the analysis possibilities that the simulator’s FoMs provide. Then, a computational performance analysis was carried out. This analysis showed that the time required for each simulation is linearly dependent on the number of messages sent. Secondly, the comparison of various topologies showed that the time required for each simulation has a slight quadratic correlation with the number of nodes in the topology. This computational complexity allows for the evaluation of real networks in a timely manner. Additionally, the simulator’s event-driven design makes it more efficient than other simulators with fixed-step solvers. The versatility of the results also facilitates informed decision-making and the refinement of avionics networks.
Further work will include the study of the TSN standards for their implementation in the simulator, as TSN is anticipated to become the standard for future generations of aircraft. Also, validation frameworks and platforms would be developed in order to automate the avionics design process.

Author Contributions

Conceptualization, P.V.-S., J.V. and S.F.; methodology, P.V.-S. and J.V.; software, P.V.-S., J.V. and J.P.; validation, P.V.-S., J.V. and V.E.; formal analysis, J.V.; resources, S.F., V.E., R.O. and R.B.; writing—original draft preparation, P.V.-S., J.V. and S.F.; writing—review and editing, J.P., V.E., R.O. and R.B.; supervision, S.F.; project administration, S.F. and R.B.; funding acquisition, S.F., V.E., R.O. and R.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially funded by the Junta de Andalucía and the ERDF (European Regional Development Fund) Operational Programme in the framework of the CAPTOR project: “advanCed Avionics communications validation and verification PlaTfORm” (Ref. PYC20 RE 077 UMA), AERTEC Solutions (reference 8.06/5.59.5543, 8.06/5.59.5715, 806/59.5974 and 806/59.5715) in the framework of project 2020 AS-DISCO: “Audio Suite for Disruptive Cockpit Demonstrator” (this project has received funding from the Clean Sky 2 Joint Undertaking under the European Union’s Horizon 2020 research and innovation programme under Grant Agreement n°: 865416), the Ministry of Economic Affairs and Digital Transformation and the European Union—NextGenerationEU in the framework of the Recovery, Transformation and Resilience Plan and the Recovery and Resilience Mechanism under the MAORI project, the Ministry of Science and Innovation (grant FPU21/04472), and the University of Malaga through the “II Plan Propio de Investigación, Transferencia y Divulgación Científica”.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors are grateful to Aertec Solutions for its support and collaboration in this project.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Butz, H. Open Integrated Modular Avionic (IMA): State of the Art and future Development Road Map at Airbus Deutschland. 2008. Available online: https://www.semanticscholar.org/paper/Open-Integrated-Modular-Avionic-(-IMA-)-%3A-State-of-Butz/042d7fc1a86cfd72d8e33f8e2ed93bb7c54a9ffd (accessed on 5 May 2023).
  2. Brajou, F.; Ricco, P. The Airbus A380—An AFDX-based flight test computer concept. In Proceedings of the AUTOTESTCON 2004, San Antonio, TX, USA, 20–23 September 2004; pp. 460–463. [Google Scholar]
  3. Boeing. Boeing-777. Available online: https://www.boeing.es/productos-y-servicios/commercial-airplanes/777.page (accessed on 5 May 2023).
  4. Kazi, S.I. Architecting of Avionics Full Duplex Ethernet (AFDX) Aerospace Communication Network. 2013. Available online: https://www.iject.org/vol4/spl4/c0140.pdf (accessed on 5 May 2023).
  5. Villegas, J.; Fortes, S.; Escano, V.; Baena, C.; Colomer, B.; Barco, R. Verification and Validation Framework for AFDX Avionics Networks. IEEE Access 2022, 10, 66743–66756. [Google Scholar] [CrossRef]
  6. Mifdaoui, A.; Amari, A. Real-time ethernet solutions supporting ring topology from an avionics perspective: A short survey. In Proceedings of the 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12–15 September 2017; pp. 1–8. [Google Scholar] [CrossRef]
  7. Amari, A.; Mifdaoui, A. Specification and Performance Indicators of AeroRing—A Multiple-Ring Ethernet Network for Avionics Embedded Systems. Sensors 2018, 18, 3871. [Google Scholar] [CrossRef] [PubMed]
  8. Doverfelt, R.; Skolan, K.; Elektroteknik, F.; Datavetenskap, O. An Evaluation of Ethernet as Data Transport System in Avionics 2020. Available online: https://www.diva-portal.org/smash/get/diva2:1484743/FULLTEXT01.pdf (accessed on 5 May 2023).
  9. Deng, L.; Xie, G.; Liu, H.; Han, Y.; Li, R.; Li, K. A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN. ACM Comput. Surv. 2022, 55, 1–36. [Google Scholar] [CrossRef]
  10. IEEE P802.1DP; TSN for Aerospace Onboard Ethernet Communications. IEEE: Piscataway, NJ, USA, 2023. Available online: https://1.ieee802.org/tsn/802-1dp/ (accessed on 5 May 2023).
  11. AC 20-152-RTCA; Document RTCA/DO-254, Design Assurance Guidance for Airborne Electronic Hardware—Document Information. Federal Aviation Administration: Washington, DC, USA, 2005.
  12. DO-178C RTCA; Software Considerations in Airborne Systems and Equipment Certification. Federal Aviation Administration: Washington, DC, USA, 2012.
  13. IEEE. Welcome to the IEEE 802.1 Working Group. Available online: https://1.ieee802.org/ (accessed on 5 May 2023).
  14. IEEE. IEEE SA—IEEE 802.1BA-2021. Available online: https://standards.ieee.org/ieee/802.1BA/10547/ (accessed on 5 May 2023).
  15. IEEE. IEEE SA—IEEE 802.1CMde-2020. Available online: https://standards.ieee.org/ieee/802.1CMde/7478/ (accessed on 5 May 2023).
  16. IEEE. IEC/IEEE 60802 TSN Profile for Industrial Automation. Available online: https://1.ieee802.org/tsn/iec-ieee-60802/ (accessed on 5 May 2023).
  17. IEEE. P802.1DG—TSN Profile for Automotive In-Vehicle Ethernet Communications. Available online: https://1.ieee802.org/tsn/802-1dg/ (accessed on 5 May 2023).
  18. IEEE. IEEE SA—IEEE 802.1Q-2018. Available online: https://standards.ieee.org/ieee/802.1Q/6844/ (accessed on 5 May 2023).
  19. Mathworks. Solvers for Discrete-Event Systems—MATLAB & Simulink. Available online: https://es.mathworks.com/help/simevents/ug/solvers-for-simevents-models.html (accessed on 20 January 2023).
  20. Altuntaş, M.; Eker, M.; Kışla, P.; Can, E.; Demir, M.; Hokelek, I.; Akdogan, E. Testing Deterministic Avionics Networks Using Orthogonal Arrays. In Proceedings of the The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, Barcelona, Spain, 3–7 October 2021. [Google Scholar]
  21. Curtiss-Wright Defense Solutions. Parvus DuraNET 20-10. Available online: https://www.curtisswrightds.com/products/networking-communications/rugged-systems/duranet-20-10 (accessed on 5 May 2023).
  22. Xu, Q.; Yang, X. Performance Analysis on Transmission Estimation for Avionics Real-Time System Using Optimized Network Calculus. Int. J. Aeronaut. Space Sci. 2019, 20, 506–517. [Google Scholar] [CrossRef]
  23. Finzi, A.; Mifdaoui, A.; Frances, F.; Lochin, E. Network Calculus-based Timing Analysis of AFDX networks incorporating multiple TSN/BLS traffic classes. arXiv 2019, arXiv:1905.00399. [Google Scholar]
Figure 1. Simulator logical process.
Figure 1. Simulator logical process.
Aerospace 11 00247 g001
Figure 2. Simulink models within the ES: (a) TX module and (b) RX module.
Figure 2. Simulink models within the ES: (a) TX module and (b) RX module.
Aerospace 11 00247 g002
Figure 3. Internal logic and implementation of ES modules: (a) Packet Generator and (b) Route Selector.
Figure 3. Internal logic and implementation of ES modules: (a) Packet Generator and (b) Route Selector.
Aerospace 11 00247 g003
Figure 4. Simulink model for the switch.
Figure 4. Simulink model for the switch.
Aerospace 11 00247 g004
Figure 5. Architecture of the switch queues during (a) normal operation and (b) switch saturation.
Figure 5. Architecture of the switch queues during (a) normal operation and (b) switch saturation.
Aerospace 11 00247 g005
Figure 6. Switch modules’ internal logic and implementation: (a) Input Selector Switch and (b) Route Selector Switch.
Figure 6. Switch modules’ internal logic and implementation: (a) Input Selector Switch and (b) Route Selector Switch.
Aerospace 11 00247 g006
Figure 7. Use case topology for the validation of the simulator, adapted from [22].
Figure 7. Use case topology for the validation of the simulator, adapted from [22].
Aerospace 11 00247 g007
Figure 8. Switch memory usage during packet collisions.
Figure 8. Switch memory usage during packet collisions.
Aerospace 11 00247 g008
Figure 9. Airbus A350 architecture used for the performance analysis, adapted from [23].
Figure 9. Airbus A350 architecture used for the performance analysis, adapted from [23].
Aerospace 11 00247 g009
Figure 10. Computational performance of the simulator: execution time in minutes vs. number of messages sent.
Figure 10. Computational performance of the simulator: execution time in minutes vs. number of messages sent.
Aerospace 11 00247 g010
Figure 11. Computational performance of the simulator: execution time in minutes vs. number of nodes in the topology.
Figure 11. Computational performance of the simulator: execution time in minutes vs. number of nodes in the topology.
Aerospace 11 00247 g011
Table 1. Input configuration parameters.
Table 1. Input configuration parameters.
ParameterFields
Simulation timeDuration in seconds
BERBit error rate
TopologyProtocol
Identifier
ESs
Route A
Route B
Cable length (m)
Link speed (bps)
BAG/periodicity (ms)
Min/max packet length (B)
Switch characteristics (delay and memory)
Table 2. Use case configuration for the validation of the simulator [22].
Table 2. Use case configuration for the validation of the simulator [22].
TransmitterVLReceiverPathPacket LengthBAG
ES1VL1ES6ES1 → S1 → S3 → ES6500 B4 ms
ES2VL2ES7ES2 → S1 → S3 → ES7500 B4 ms
ES3VL3ES6ES3 → S2 → S3 → ES6500 B4 ms
ES4VL4ES6ES4 → S2 → S3 → ES6500 B4 ms
ES5VL5ES6ES5 → S3 → ES6500 B4 ms
Table 3. Use case results comparison for the validation of the simulator.
Table 3. Use case results comparison for the validation of the simulator.
Transmission StartEvaluation Method
VLES1ES2ES3ES4ES5EPLBNCOGSimulation
VL12 Δ t μ s Δ t μ s0 μ s0 μ s96 μ s272 μ s272.8 μ s272 μ s
VL20 μ s Δ t μ s0 μ s0 μ s96 μ s192 μ s192 μ s192 μ s
VL3 Δ t μ s0 µs2 Δ t μ s Δ t μ s96 μ s272 μ s272.8 μ s272 μ s
VL4 Δ t μ s0 μ s Δ t μ s2 Δ t μ s96 μ s272 μ s272.8 μ s272 μ s
VL5 Δ t μ s0 μ s0 μ s0 μ s96 + 2 Δ t μ s176 μ s176.8 μ s176 μ s
Table 4. Input configuration parameters for the computational analysis.
Table 4. Input configuration parameters for the computational analysis.
ParameterFields
Simulation time1 s
ProtocolEthernet
Link speed1 Gbps
Packet length1280 B
Periodicity[0.5, 1, 2, 3, 4, 5, 6, 7, 8] ms
TopologyA350
#VLs60
Table 5. Input configuration parameters for the topology comparison.
Table 5. Input configuration parameters for the topology comparison.
ParameterFields
Simulation time0.5 s
ProtocolAFDX
Link speed1 Gbps
Packet length1280 B
BAG1 ms
#VLs3 per ES
Table 6. Traces at the reception of an ES.
Table 6. Traces at the reception of an ES.
Timestamp (s)Delay (s)Arrival Time (s)Depart Time (s)Payload Size (B)Tx AddressRx AddressVLSeq (×1014)
1 6.3344 × 10 5 6.3344 × 10 5 06.3344 × 10 5 12807119.1667
27.3896 × 10 5 6.3344 × 10 5 1.0552 × 10 5 7.3896 × 10 5 128071210.768
39.5001 × 10 5 6.3344 × 10 5 3.1657 × 10 5 9.5001 × 10 5 1280711515.317
41.1611 × 10 4 6.3344 × 10 5 5.2762 × 10 5 1.1611 × 10 4 1280713240.854
51.0633 × 10 3 6.3344 × 10 5 1.0000 × 10 3 1.0633 × 10 3 12807112.9073
61.0738 × 10 3 6.3344 × 10 5 1.0205 × 10 3 1.0738 × 10 3 12807124.0522
71.0950 × 10 3 6.3344 × 10 5 1.0316 × 10 3 1.0950 × 10 3 1280711535.144
81.1161 × 10 3 6.3344 × 10 5 1.0527 × 10 3 1.1161 × 10 3 1280713236.255
Table 7. A350 testing use-case-generated configuration.
Table 7. A350 testing use-case-generated configuration.
VLTransmitterReceiverPathPacket LengthBAG/PeriodicityVLTransmitterReceiverPathPacket LengthBAG/Periodicity
VL1ES29C1ES29 R2 SS1 C11280 B1 msVL41ES30C1ES30 R2 SS1 C1400 B1 ms
VL2C4ES4C4 SS2 L2 ES4400 B0.5 msVL42ES26C6ES26 R2 SS2 C6128 B1 ms
VL3ES17C6ES17 C SS2 C6512 B8 msVL43ES13C2ES13 C SS1 C2256 B1 ms
VL4C1ES31C1 SS1 R2 ES31256 B2 msVL44ES14C6ES14 C SS2 C6512 B8 ms
VL5C3ES25C3 SS1 R1 ES251280 B8 msVL45ES9C1ES9 L1 SS1 C11100 B0.5 ms
VL6ES14C6ES14 C SS2 C6900 B8 msVL46ES27C4ES27 R2 SS2 C464 B8 ms
VL7ES30C4ES30 R2 SS2 C464 B0.5 msVL47ES5C6ES5 L2 SS2 C6128 B0.5 ms
VL8ES27C6ES27 R2 SS2 C6900 B1 msVL48ES11C4ES11 L1 SS2 C4900 B1 ms
VL9ES24C5ES24 R1 SS2 C564 B0.5 msVL49ES3C2ES3 L2 SS1 C2128 B4 ms
VL10ES21C2ES21 R1 SS1 C2256 B2 msVL50ES6C2ES6 L2 SS1 C2512 B4 ms
VL11ES1C2ES1 L2 SS1 C2900 B2 msVL51ES2C6ES2 L2 SS2 C61100 B1 ms
VL12ES4C5ES4 L2 SS2 C5400 B4 msVL52C3ES16C3 SS1 C ES161100 B1 ms
VL13ES10C6ES10 L1 SS2 C61100 B2 msVL53ES28C3ES28 R2 SS1 C364 B4 ms
VL14ES14C3ES14 C SS1 C3128 B4 msVL54ES25C3ES25 R1 SS1 C31100 B2 ms
VL15ES25C2ES25 R1 SS1 C2900 B4 msVL55ES13C1ES13 C SS1 C1256 B8 ms
VL16ES14C4ES14 C SS2 C4128 B4 msVL56ES30C6ES30 R2 SS2 C6400 B2 ms
VL17ES24C2ES24 R1 SS1 C21280 B1 msVL57ES2C2ES2 L2 SS1 C21100 B4 ms
VL18ES21C1ES21 R1 SS1 C1750 B2 msVL58ES26C1ES26 R2 SS1 C1256 B4 ms
VL19ES16C6ES16 C SS2 C6400 B8 msVL59ES6C4ES6 L2 SS2 C4750 B8 ms
VL20ES19C2ES19 R1 SS1 C2512 B1 msVL60ES21C3ES21 R1 SS1 C3750 B0.5 ms
VL21ES8C4ES8 L1 SS2 C41280 B0.5 msVL61ES10C5ES10 L1 SS2 C5750 B8 ms
VL22ES28C6ES28 R2 SS2 C6900 B0.5 msVL62ES22C2ES22 R1 SS1 C2900 B4 ms
VL23ES5C1ES5 L2 SS1 C11100 B2 msVL63ES20C5ES20 R1 SS2 C5750 B2 ms
VL24ES27C2ES27 R2 SS1 C2128 B0.5 msVL64ES29C5ES29 R2 SS2 C5256 B2 ms
VL25ES8C6ES8 L1 SS2 C6128 B8 msVL65ES14C3ES14 C SS1 C3256 B0.5 ms
VL26ES7C2ES7 L1 SS1 C21280 B2 msVL66ES16C4ES16 C SS2 C4400 B8 ms
VL27ES15C3ES15 C SS1 C364 B2 msVL67ES25C4ES25 R1 SS2 C4512 B1 ms
VL28ES19C4ES19 R1 SS2 C41280 B1 msVL68ES26C4ES26 R2 SS2 C4400 B4 ms
VL29C2ES24C2 SS1 R1 ES24512 B8 msVL69ES30C6ES30 R2 SS2 C6750 B4 ms
VL30ES12C4ES12 L1 SS2 C4400 B0.5 msVL70ES20C4ES20 R1 SS2 C4256 B2 ms
VL31ES2C4ES2 L2 SS2 C464 B1 msVL71ES10C3ES10 L1 SS1 C3400 B2 ms
VL32ES29C1ES29 R2 SS1 C1750 B0.5 msVL72ES27C2ES27 R2 SS1 C21100 B4 ms
VL33ES15C1ES15 C SS1 C11100 B8 msVL73ES6C2ES6 L2 SS1 C264 B8 ms
VL34ES6C5ES6 L2 SS2 C5900 B0.5 msVL74ES10C6ES10 L1 SS2 C61280 B4 ms
VL35ES17C1ES17 C SS1 C1750 B1 msVL75ES6C6ES6 L2 SS2 C61280 B8 ms
VL36ES9C4ES9 L1 SS2 C464 B1 msVL76C3ES4C3 SS1 L2 ES4512 B2 ms
VL37ES24C3ES24 R1 SS1 C3750 B4 msVL77ES13C4ES13 C SS2 C4512 B0.5 ms
VL38ES8C6ES8 L1 SS2 C6900 B8 msVL78ES19C5ES19 R1 SS2 C5128 B1 ms
VL39ES26C4ES26 R2 SS2 C4512 B0.5 msVL79ES4C2ES4 L2 SS1 C264 B4 ms
VL40C1ES14C1 SS1 C ES141280 B2 msVL80ES14C4ES14 C SS2 C4256 B0.5 ms
Table 8. Results of A350 simulation with Ethernet protocol for bursty traffic.
Table 8. Results of A350 simulation with Ethernet protocol for bursty traffic.
VLDelay (µs)Jitter (µs)Throughput (Kbps)Packet Loss (%)VLDelay (µs)Jitter (µs)Throughput (Kbps)Packet Loss (%)
MeanStdMeanStdMeanStdMeanStd
 15246.1683.19253.21634.51717.120.842415159.3671.83238.07628.211717.16.0666
2105.575.18881.90864.8249130.8042336.27164.01136.5590.807130.80.65524
3376.63154.67128.6885.426284.951.224543171.0495.66473.4561.27284.950.050429
480.3765.438  × 10 11 5.4246  × 10 11 3.4102  × 10 12 332.75044379.1161.01131.0493.183332.752.3166
5252.420.148690.0186220.14751220.580.3937455238651.23236.15606.89220.5817.863
6450.96159.33132.8987.466350.551.2448465065328.1985.074316.93350.554.2969
75079.3232.5279.154218.631774.33.566147334.78163.41135.890.8771774.30.39448
8434.56156.75130.287.224360.872.2959485175.4323.9694.756309.78360.8743.489
966.76228.35922.73916.943278.82049156.9395.26175.86557.513278.820
10175.7294.46773.89258.809902.750.1012150219.9295.2275.73257.617902.750
11273.0289.14768.38657.147212.540.3073851461.48155.32129.5285.688212.543.0153
12125.429.70624.83416.2631052.3052222.240.772260.150960.757361052.30
13459.12150.28125.682.40978.8843.41615368.71830.63623.82619.22878.8840
1483.28437.04128.16124.029484.62054238.5525.88919.56516.943484.620
15273.6293.30772.39158.78573.1920555116720.05276.48664.6273.1924.6512
165088.1274.1583.657261.052598.36.876256372.66158.25130.589.4162598.31.8127
17323.1987.6467.08256.378680.970.1506857307.1699.2873.57166.583680.970.38462
185215.2635.2225.04593.95101.7412.475585128.7688.91252.31640.93101.744.2857
19361.68162.62134.4990.9981065.70.41841595135.5506.11136.84487.131065.740.249
20210.2594.52472.4160.7372415.30.0504860176.8327.08518.57819.7072415.30.025233
215198.5384.58115.22366.913529.251.88861184.7329.43924.54716.1763529.20
22433.59157.57131.886.326873.182.358462269.8988.02666.64657.43873.180.1938
235226.4714.1265.19662.96604.0522.57763180.1425.90821.13614.969604.050
24155.2897.90876.26561.38635.8780.025516499.82629.23123.32617.60235.8780
25336.43171.81141.4397.1091300.20.854765100.932.56825.07220.7831300.20
26331.486.47766.2855.50591.1330.1004665104.6381.0397.424368.391.13319.672
2770.83532.71525.57820.3811128.50675123.2322.3995.251307.991128.525.92
285205.2407.25117.75389.83135.4856.148685106.9356.87101.34342.14135.4820.468
29123.386.0004  × 10 11 5.9264  × 10 11 8.611  × 10 12 1347.50.3984169409.57156.21128.6788.3731347.52.5794
305118.1267.1784.246253.54173.4719.11705093335.0895.365321.2173.4713.636
315081.8233.778.755220.022682.93.842371126.8834.30425.98422.3812682.90
325199658.93243.02612.46226.5111.23172302.7193.673.38658.002226.510
335234.2702.61256.02654.053667.219.67973150.84106.2978.40971.583667.20
34195.617.13910.60313.4641367.50.02525974490.67153.7130.9880.1971367.53.5785
355190.8685.53254.66636.44171.812.47575513.11158.11131.6887.093171.84.5082
365085.7219.6975.663206.24388.563.44376125.957.36834.38395.9207388.560.099701
37185.7634.52126.46622.133220.480775131.2275.0385.297261.46220.4823.711
38447.78141.19116.2979.721618.23.26537879.19129.74423.91917.6721618.20
395127.2272.6687.871258.111300.224.08579136.5591.56771.26957.4061300.20.19342
40252.50.809370.187060.78743805.380805097262.8882.952249.44805.3812.598
Table 9. Results of A350 simulation with AFDX protocol for bursty traffic.
Table 9. Results of A350 simulation with AFDX protocol for bursty traffic.
VLDelay (µs)Jitter (µs)Throughput (Kbps)Packet Loss (%)VLDelay (µs)Jitter (µs)Throughput (Kbps)Packet Loss (%)
MeanStdMeanStdMeanStdMeanStd
1482.3793.34985.69636.918852.4349.13541104.573.525  × 10 11 2.6026  × 10 11 2.3759  × 10 11 852.4349.9
2104.573.5776  × 10 11 2.6058  × 10 11 2.4507  × 10 11 67.79249.5714267.39319.03212.78214.09567.79250.348
3147.863.1272  × 10 11 2.6501  × 10 11 1.6431  × 10 11 141.2851.9234384.7858.91626.81995.7394141.2850.025
480.3765.7043  × 10 11 5.4875  × 10 11 1.5381  × 10 11 164.5750.64244629.211.3022  × 10 10 7.185  × 10 11 1.0841  × 10 10 164.5750.98
5252.412.139  × 10 11 1.8294  × 10 11 1.0962  × 10 11 116.6750.9845267.0271.41461.67435.976116.6748.24
6307.99.36412.34059.0644180.0948.5646242.686.5281  × 10 11 5.3866  × 10 11 3.6561  × 10 11 180.0950.98
770.21342.85325.28134.596927.0449.68647258.81144.7124.6673.411927.0449.837
8195.4618.46511.90414.111180.0949.97548226.4811.3597.50978.5194180.0949.52
948.125.5794  × 10 11 4.3391  × 10 11 3.5061  × 10 11 141.2850.1994958.8721.2788  × 10 11 6.7322  × 10 12 1.0864  × 10 11 141.2848.665
1095.67310.96910.4883.1775463.9348.45450463.991.0155  × 10 10 9.8199  × 10 11 2.513  × 10 11 463.9351.55
11261.3141.46241.3911.547106.9349.74951423.1785.78577.39536.92106.9349.29
12104.573.5217  × 10 11 2.5894  × 10 11 2.3812  × 10 11 564.249.69852222.174.117  × 10 11 3.4699  × 10 11 2.2129  × 10 11 564.249.469
13417.6952.23945.19526.11938.65552.1535348.125.0921  × 10 11 4.2708  × 10 11 2.7598  × 10 11 38.65549.084
1460.694.9127  × 10 11 4.0216  × 10 11 2.81  × 10 11 232.4351.64454287.173.7347  × 10 11 3.0937  × 10 11 2.0877  × 10 11 232.4349.341
15377.8943.82823.73336.81638.65648.9855112.024.3846  × 10 11 3.1502  × 10 11 3.0365  × 10 11 38.65651.362
16234.3620.93220.896.4511  × 10 11 1307.851.36256285.5852.23945.19526.1191307.850.397
17394.07158.52141.6770.996388.7948.53357729.673.73253.7251.2011  × 10 10 388.7951.172
18174.9613.8211.597.510553.67950.15890.98710.63210.6116.4576  × 10 11 53.67948.98
19104.573.5487  × 10 11 2.5998  × 10 11 2.4042  × 10 11 538.5647.69959530.476.2479  × 10 11 5.1852  × 10 11 3.4546  × 10 11 538.5650.593
20137.2613.94913.5943.09732613.750.37260163.373.0549  × 10 11 2.5627  × 10 11 1.6618  × 10 11 2613.749.393
21355.5652.68545.96425.731853.346.92161212.585.356  × 10 11 4.4554  × 10 11 2.9456  × 10 11 1853.349.597
22260.4198.17858.26579.008564.1548.90162244.5444.92226.72436.069564.1549.9
23288.113.8211.597.5105308.2148.9863165.131.76681.7653.2911  × 10 11 308.2150.348
24120.6683.37975.96934.3219.40550.31164122.228.07424.25614.09219.40549.85
25518.021.2485  × 10 10 5.5473  × 10 11 1.1173  × 10 10 654.4150.59365128.480.0177230.00857810.015508654.4150.483
26416.8178.78778.7088.8648  × 10 11 45.0949.966147.775.0018  × 10 11 4.159  × 10 11 2.7535  × 10 11 45.0948.347
2748.126.8471  × 10 11 4.5613  × 10 11 5.1025  × 10 11 1307.549.79967411.3856.66642.81137.11307.550.298
28459.8238.58631.12422.78767.79248.90168381.9620.93220.894.4607  × 10 11 67.79250
29123.385.9998  × 10 11 5.9148  × 10 11 8.552  × 10 12 852.4355.98669543.2266.67866.5451.0492  × 10 10 852.4352.107
30117.237.8221.84530.86990.0950.08770190.8814.8812.8747.440190.0949.393
3153.3875.28724.64562.521553.449.31671273.8131.19631.1654.3855  × 10 11 1553.449.597
32317.79139.49121.3968.673141.8949.05872642.913.57983.57261.0965  × 10 10 141.8949.698
33442.3245.17144.8153.975185350.199734701.0382  × 10 10 1.0236  × 10 10 1.4718  × 10 11 185350.397
34201.2922.06119.08611.057776.9848.54674594.77125.61125.369.6547  × 10 11 776.9847.146
35334.1793.34985.69636.91890.0949.8575824.521.2254  × 10 10 5.9082  × 10 11 1.0723  × 10 10 90.0948.133
3657.5295.21674.51332.6122194.7849.5276123.385.9724  × 10 11 5.907  × 10 11 8.4126  × 10 12 194.7848.718
37311.534.2774  × 10 11 3.6576  × 10 11 2.2055  × 10 11 116.6850.59377203.2249.97644.17923.342116.6849.367
38685.41.2464  × 10 10 6.4195  × 10 11 1.0668  × 10 10 1076.548.567888.74635.87529.87419.8411076.549.444
39160.4937.8221.84530.869654.3149.7747977.5212.7128  × 10 11 2.5423  × 10 11 9.3295  × 10 12 654.3152.471
40252.412.1124  × 10 11 1.797  × 10 11 1.1074  × 10 11 426.4350.24980272.93109.0798.94345.847426.4349.52
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Vera-Soto, P.; Villegas, J.; Fortes, S.; Pulido, J.; Escaño, V.; Ortiz, R.; Barco, R. An Event-Driven Link-Level Simulator for the Validation of AFDX and Ethernet Avionics Networks. Aerospace 2024, 11, 247. https://doi.org/10.3390/aerospace11040247

AMA Style

Vera-Soto P, Villegas J, Fortes S, Pulido J, Escaño V, Ortiz R, Barco R. An Event-Driven Link-Level Simulator for the Validation of AFDX and Ethernet Avionics Networks. Aerospace. 2024; 11(4):247. https://doi.org/10.3390/aerospace11040247

Chicago/Turabian Style

Vera-Soto, Pablo, Javier Villegas, Sergio Fortes, José Pulido, Vicente Escaño, Rafael Ortiz, and Raquel Barco. 2024. "An Event-Driven Link-Level Simulator for the Validation of AFDX and Ethernet Avionics Networks" Aerospace 11, no. 4: 247. https://doi.org/10.3390/aerospace11040247

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop