Skip to main content
Log in

Worst-case end-to-end delays evaluation for SpaceWire networks

  • Published:
Discrete Event Dynamic Systems Aims and scope Submit manuscript

Abstract

SpaceWire is a standard for on-board satellite networks chosen by the ESA as the basis for multiplexing payload and control traffic on future data-handling architectures. However, network designers need tools to ensure that the network is able to deliver critical messages on time. Current research fails to address this needs for SpaceWire networks. On one hand, many papers only seek to determine probabilistic results for end-to-end delays on Wormhole networks like SpaceWire. This does not provide sufficient guarantee for critical traffic. On the other hand, a few papers give methods to determine maximum latencies on wormhole networks that, unlike SpaceWire, have dedicated real-time mechanisms built-in. Thus, in this paper, we propose an appropriate method to compute an upper-bound on the worst-case end-to-end delay of a packet in a SpaceWire network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Balakrishnan S, Özgüner F (1998) A priority-driven flow control mechanism for real-time traffic in multiprocessor networks. IEEE Trans Parallel Distrib Syst 9(7):664–678. doi:10.1109/71.707545

    Article  Google Scholar 

  • Dally W (1990) Performance analysis of k-ary n-cube interconnection networks. IEEE Trans Comput 39(6):775–785. doi:10.1109/12.53599

    Article  Google Scholar 

  • Dally W (1992) Virtual-channel flow control. IEEE Trans Parallel Distrib Syst 3(2):194–205. doi:10.1109/71.127260

    Article  Google Scholar 

  • Dally W, Seitz C (1987) Deadlock-free message routing in multiprocessor interconnection networks. IEEE Trans Comput C-36(5):547–553. doi:10.1109/TC.1987.1676939

    Article  MATH  Google Scholar 

  • Draper JT, Ghosh J (1994) A comprehensive analytical model for wormhole routing in multicomputer systems. J Parallel Distrib Comput 1–34

  • ECSS (2008) Spacewire–links, nodes, routers and networks, pp 1–129

  • IEEE Computer Society (1996) IEEE standard for heterogeneous interconnect (hic) (low-cost, low-latency scalable serial interconnect for parallel system construction). IEEE Standard 1355-1995

  • Kim B, Kim J, Hong S, Lee S (1998) A real-time communication method for wormhole switching networks. In: 1998 Proceedings international conference on parallel processing, pp 527–534

  • Le Boudec JY, Thiran P (2004) Network calculus a theory of deterministic queuing systems for the internet. LNCS 2050. Springer Verlag, pp 1–265

  • Lu Z, Jantsch A, Sander I (2005) Feasibility analysis of messages for on-chip networks using wormhole routing. In: Design automation conference, 2005 proceedings of the ASP-DAC 2005 Asia and South Pacific, vol 2, pp 960–964. doi:10.1109/ASPDAC.2005.1466499

  • Mifdaoui A, Frances F, Fraboul C (2007) Real-time characteristics of switched ethernet for “1553b”-embedded applications: simulation and analysis. In: 2007 SIES ’07 international symposium on industrial embedded systems, pp 33–40. doi:10.1109/SIES.2007.4297314

  • Mutka MW (1994) Using rate monotonic scheduling technology for real-time communications in a wormhole network. In: Proceedings of the second workshop on parallel and distributed real-time systems, pp 194–199. doi:10.1109/WPDRTS.1994.365629

  • Parkes S (2009) Spacewire-t initial protocol definition

  • Parkes SM, Armbruster P (2005) Spacewire: a spacecraft onboard network for real-time communications. IEEE-NPSS Real Time Conf (14):1–5

  • Qian Y, Lu Z, Dou W (2009) Analysis of worst-case delay bounds for best-effort communication in wormhole networks on chip. In: Proceedings of the 2009 3rd ACM/IEEE international symposium on networks-on-chip, pp 44–53

  • Shi Z, Burns A (2009) Real-time communication analysis with a priority share policy in on-chip networks. In: 2009 ECRTS ‘09 21st Euromicro conference on real-time systems, pp 3–12. doi:10.1109/ECRTS.2009.17

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Ferrandiz.

Additional information

This work was funded by a PhD grant from the CNES and Thalès Alenia Space.

Appendix

Appendix

1.1 Proof of termination

We first define the link dependency graph D for a network represented by the graph \(\mathcal{G}(N,L)\) as the directed graph \(D=\mathcal{G}(L,E)\) where the nodes L of D are the links of \(\mathcal{G}(N,L)\) and the edges E are the pairs of links used successively by a flow:

$$ E=\{(l_i,l_j) \in L~for~which~\exists f \in F | next(f,l_i)=l_j\} $$

Theorem 1

For any flow f in F and any link l in L, the computation of d(f, l) finishes if and only if D is acyclic.

Proof

  1. We reason by contradiction. Suppose there’s a cycle in D. Since next(f, l) cannot return l for any l (a packet cannot use the same link twice in a row), this cycle’s length is at least 2. Given the definition of d, this means we can find a flow f and a link l such that computing d(f, l) requires calling d(f, l) during the recursion. Thus the computation of d(f, l) does not finish.

  2. Suppose D is acyclic. We can then use topological sorting to assign a total order to the vertices of D such that if (l i , l j ) ∈ E then l i  > l j (if D is not connected in the graph theory sense we can order each connected component individually then arbitrarily order the component). From the definition of E and next(f, l), it follows that computing d(f, l) only requires calls to d with links inferior to l as parameters. Since F is a finite set and d(f, l) is called only once for some given f and l, it follows that computing d(f, l) always terminates. □

Note that as shown in Dally and Seitz (1987), for an interconnection network using Wormhole Routing under assumptions similar to ours, it is equivalent to say that the link dependency graph is acyclic and that the network is deadlock-free. Since deadlock prone networks would not be valid for satellite use, Theorem 1 shows that the computation finishes in every pertinent case. This is also coherent with the fact that, when the computation does not finish, d(f, l) becomes infinite which is characteristic of a deadlock.

A simple way to check beforehand if the computation will finish is to use the adjacency matrix of the dependency graph and iterate it. If it converges toward the zero matrix then there are no cycles in the graph. However, if a power of the matrix has only 1 on its diagonal, it means that the dependency graph is cyclic and the sum will diverge.

1.2 Complexity

The exact number of operations required to compute d(f, l) on a given network will vary with the topology and the number of conflicting flows on each link. However, we can compute an upper-bound on the number of operations without difficulties.

Let us note n the total number of flows and m the total number of links. If we compute navely the delay for each flow, the size of the computation will increase exponentially with the number of flows in conflicts on each link. However, it is easy notice that the number of possible calls to d(f, l) is finite and bounded by n.m. Thus, if we store the results of all the calls during the computation and given that there can be at most n additions or maximum computations during a call of d(f, l), the complexity of the computation will be O(n 2.m).

If Group Adaptative Routing is used, since we have to enumerate all the partitions of the set of conflicting flows, the computation becomes exponential.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ferrandiz, T., Frances, F. & Fraboul, C. Worst-case end-to-end delays evaluation for SpaceWire networks. Discrete Event Dyn Syst 21, 339–357 (2011). https://doi.org/10.1007/s10626-011-0103-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10626-011-0103-1

Keywords

Navigation