{"title":"Integrating Inaccessibility Control and Timer Management in CANELy","authors":"J. Rufino, P. Veríssimo, C. Almeida, G. Arroz","doi":"10.1109/ETFA.2006.355219","DOIUrl":null,"url":null,"abstract":"The CAN Enhanced Layer (CANELy) is a CAN-based infrastructure capable of extremely reliable communication. This paper describes the mechanisms and the techniques used in CANELy to enforce system correctness in the time-domain despite the occurrence of network errors (inaccessibility). The paper discusses how to integrate in the existing CANELy machinery, the control of inaccessibility and the management of timers, at several levels of the system. In particular, application and low-level protocol layers are addressed. In addition, a relevant set of parameters are available for system monitoring, allowing the validation/enforcement of the system model.","PeriodicalId":431393,"journal":{"name":"2006 IEEE Conference on Emerging Technologies and Factory Automation","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Conference on Emerging Technologies and Factory Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETFA.2006.355219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The CAN Enhanced Layer (CANELy) is a CAN-based infrastructure capable of extremely reliable communication. This paper describes the mechanisms and the techniques used in CANELy to enforce system correctness in the time-domain despite the occurrence of network errors (inaccessibility). The paper discusses how to integrate in the existing CANELy machinery, the control of inaccessibility and the management of timers, at several levels of the system. In particular, application and low-level protocol layers are addressed. In addition, a relevant set of parameters are available for system monitoring, allowing the validation/enforcement of the system model.