Process for controlling a switched full-duplex Ethernet type communication network

ABSTRACT

A process for controlling a switched full-duplex Ethernet type communication network including at least one source subscriber equipment and at least one destination subscriber equipment connected to each other through at least one physical link through at least one switch and at least one virtual link, which is the conceptual representation of a link from a source equipment to at least one destination equipment. In the process each equipment transmitting Ethernet frames segregates between virtual links and allocates a passband for each virtual link and multiplexes virtual links on the physical link output from this equipment. Each transmitted frame has a field that identifies the virtual link to which it belongs.

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] The present patent document is a divisional of U.S. application Ser. No. 10/287,912 filed on Nov. 4, 2002, and claims priority to French patent application FR 01 14263 filed Nov. 5, 2001, the entire contents of each of which are hereby incorporated herein by reference.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] This invention relates to a process for controlling a switched full-duplex Ethernet type communication network, particularly in avionics.

[0004] 2. Description of the Related Art

[0005] The Ethernet network, which is the reference in the world of communication networks, can be used to send data in digital form by packets or “frames”, where a packet is defined as being a set of data sent in a single step on the network.

[0006] In an Ethernet network, the data in each packet are not interpreted. The network carries the data without understanding their meaning. A packet is composed of two types of data, network data that are used to route the packet to its correct destination, and useful data which comprise the “useful load” in the packet.

[0007] An Ethernet network is composed of different equipment that is subscribed to the network, and connected to each other through a communication means formed of active equipment called switches, which perform three functions:

[0008] connect network subscribers in point to point mode through physical links, which are physical supports for messages to be transferred, for example twisted pair cables,

[0009] route (switch) packets sent by source equipment to one or more destination equipment,

[0010] check the integrity and the format of the Ethernet packet.

[0011]FIG. 1 illustrates an Ethernet network composed of two switches 11 interconnected to each other and each connected to three items of subscriber equipment 12 in point to point mode.

[0012] Operation of such a network is simple. Each network subscriber can send packets in digital form at any time towards one or several other subscribers. When a switch receives the packets, the “network information” data are analyzed to determine the destination equipment. The packets are then switched towards this equipment.

[0013] In the “switched full-duplex Ethernet type network” expression:

[0014] the “full-duplex” term means that the subscriber can send and receive packets at the same time on the same link,

[0015] the “switched” term means that the packets are switched in switches on appropriate outputs.

[0016] For example, this network may be a 100 Mbits/s switched full-duplex type network on twisted pair; the term “twisted pair” means that connections between the equipment and the switches are composed of two pairs of cables, each pair being twisted; the term 100 Mbits/s simply means the transmission or reception speed of packets on the network.

[0017] The Ethernet technology imposes:

[0018] a minimum size and a maximum size on the packets,

[0019] an identification of the source and/or the destination(s) in each packet,

[0020] a CRC (“Cyclic Redundancy Check”) that checks the integrity of the transported data.

[0021] At the present time, in the civil aeronautics field, data exchanges between the various onboard computers are based on the use of the ARINC 429 aeronautical standard.

[0022] However, the switched full-duplex Ethernet network is frequently used in industry. The emergence of new communication technologies shows that this type of network is an open and standard solution (IEEE standard 802.3) with a considerable potential for development as a local network. But this type of solution does not provide any means of guaranteeing segregation and transfer performances (in terms of network access, latency, etc.) necessary for avionics applications.

SUMMARY OF THE INVENTION

[0023] The purpose of this invention is to propose a process for controlling a switched full-duplex Ethernet type network, which guarantees data segregation and a limit to data transfer time, to enable application in avionics.

[0024] The invention relates to a process for controlling a switched full-duplex Ethernet type network comprising at least one source subscriber equipment and at least one destination subscriber equipment connected to each other through at least one physical link through at least one switch and through at least one virtual link which is the conceptual representation of a link from a source equipment to at least one destination equipment, characterised in that each source equipment transmitting Ethernet frames comprises:

[0025] means of segregation between virtual links and allocation of a passband for each virtual link,

[0026] means of multiplexing virtual links on the physical link output from this equipment, each transmitted frame having a field that identifies the virtual link to which it belongs.

[0027] Advantageously, each destination equipment comprises means of subscribing to at least one virtual link in reception and achieving segregation between virtual links as far as the application.

[0028] Advantageously, each switch comprises incoming passband control means for each virtual link. It uses a static configuration table to know which virtual links it needs to switch, and the allowable number of packets for a virtual link. It comprises:

[0029] means of separately configuring each input port in order to indicate the output ports towards which each received Ethernet frame must be directed as a function of the virtual link identifier,

[0030] means of monitoring the flow of Ethernet frames associated with each virtual link that passes through the switch,

[0031] means of reformatting the flow in each virtual link,

[0032] means of multiplexing flows in virtual links on each output port.

[0033] In one example embodiment, each switch comprises the following in sequence:

[0034] an input port,

[0035] flow control means,

[0036] a switching motor supporting multidestination transfers,

[0037] flow control means,

[0038] flow reformatting means,

[0039] virtual link multiplexing means,

[0040] an output port.

[0041] Advantageously, a virtual link is characterized by:

[0042] a transfer direction, the virtual link being single directional,

[0043] a single transmitter subscriber: in this case the equipment,

[0044] one or several subscribers in reception: in this case the equipment,

[0045] a fixed passband (maximum number of packets per second and their size),

[0046] a maximum guaranteed time for transfer of packets from a source equipment to a destination equipment, regardless of the behaviour of the rest of the network, each virtual link having its own transfer time,

[0047] a path fixed on the network,

[0048] an unique identifier.

[0049] In one advantageous embodiment, network redundancy is achieved by doubling up the network, each subscriber having a connection to each of the two networks.

[0050] The invention also relates to a process for controlling a switched full-duplex Ethernet type communication network comprising source and destination subscriber equipment connected to each other through at least one physical link through at least one switch and through at least one virtual link that is the conceptual representation of a link from a source equipment to at least one destination equipment, characterized in that in a transmission service, an application is allowed to access virtual links in transmission, this service being used to multiplex virtual links to the physical link through an Ethernet interface, and to send packets for each virtual link as a function of the passband allocated to the virtual link. In a reception service, the packets are decoded, it is checked that their format is correct and useful data are made available to applications. In a passband protection service in the switch, the time characteristics of the packets are checked for each incoming virtual link, and if the allowable characteristics are exceeded, packets are destroyed to prevent a failure at a transmitter or a virtual link from compromising traffic in other virtual links output from this switch.

[0051] Advantageously, in one network redundancy service at subscriber level, a packet is sent and received in two virtual links in order to set up network redundancy, duplication of the network that is transparent for applications to guard against a failure in a switch or an interface.

[0052] Advantageously, in a “sampling” service, the destination terminal only presents the last received value to the user, and in this service the last value is systematically overwritten by the new received packet. In a “queuing” service, the destination equipment presents all data that it receives to the user, this service making it possible to:

[0053] send information that the addressee does not want to lose,

[0054] send data larger than the maximum packet size on the virtual link, the transmission service then breaking this data down into packets, and the reception service putting the data together again to make them available to the receiving application.

[0055] In a “file transfer” service, a data file is transferred and the transmission service breaks this file down into packets which are then transmitted sequentially, and the reception service recreates this file.

[0056] Advantageously, a passband and an inter-packet time are assigned for each virtual link.

[0057] In one advantageous embodiment, a subscriber in reception refines the selection of packets on the same virtual link using the network addressing information contained in the packet.

[0058] Advantageously, data integrity is achieved on each packet by a CRC that carries out a calculation to validate data transmitted in the packet, each packet is verified at each equipment entry on the network, and every bad packet is destroyed so that it is not used in order to release the passband and thus avoid uselessly creating congestion at the switches.

BRIEF DESCRIPTION OF THE DRAWINGS

[0059] A more complete appreciation of the present invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:

[0060]FIG. 1 illustrates an Ethernet network according to known art,

[0061]FIG. 2 illustrates the concept of a virtual link in an Ethernet network according to the invention,

[0062]FIG. 3 illustrates an Ethernet network in which several virtual links according to the invention are shown,

[0063]FIG. 4A shows the composition of a transmission equipment, and FIG. 4B shows the composition of a reception equipment, for the network according to the invention,

[0064]FIG. 5 illustrates the different component elements of a switch in the network according to the invention,

[0065]FIGS. 6 and 7 illustrate different services used in the network according to the invention,

[0066]FIG. 8 illustrates the location of “sampling”, “queuing” and “file transfer” services with respect to the application and virtual link services as illustrated in FIGS. 6 and 7, in the network according to the invention,

[0067]FIG. 9 illustrates two examples of packet distributions in a sequence,

[0068]FIG. 10 illustrates the filtering function in a virtual link in reception according to the invention,

[0069]FIG. 11 illustrates an example of a transfer time for a virtual link VL1 according to the invention,

[0070]FIG. 12 illustrates an example verification of the packet in the virtual link VL1 in FIG. 11 according to the invention,

[0071]FIG. 13 illustrates the decomposition of the useful load of a packet in an example embodiment of the network according to the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0072] The switched full-duplex Ethernet network according to the invention uses the virtual link concept to limit the end to end transfer time, in other words from a source equipment to one (or several items of) destination equipment.

Concept of Virtual Link

[0073] This virtual link (VL) concept provides means of isolating data transfers between a source equipment 13 and destination equipment 14. A virtual link VL is seen as a “pipe” on the network, as illustrated in FIG. 2.

[0074] A virtual link VL is characterized by:

[0075] a transfer direction, the virtual link being single directional,

[0076] a single source equipment 13,

[0077] one (or several items of) destination equipment 14,

[0078] a fixed passband (maximum number of packets and their size per second),

[0079] a maximum guaranteed time for transfer of packets from a source equipment 13 to a destination equipment 14, regardless of the behavior of the rest of the network, each virtual link having its own transfer time,

[0080] a path fixed on the network,

[0081] an unique identifier.

[0082] A network subscriber may comprise several virtual links VL1, VL2, VL3, as shown in FIG. 3. We have:

[0083] a virtual link VL1 from equipment 21 to equipment 23, 24 and 25,

[0084] a virtual link VL2 from equipment 21 to equipment 22 and 23,

[0085] a virtual link VL3 from equipment 23 to equipment 22,

[0086] When equipment 21 wants to send a packet to equipment 23, 24 and 25, it sends a packet on the virtual link VL1. When it wants to send a packet to equipment 22 and 23, it sends a packet on the virtual link VL2.

[0087] The difference between virtual links VL1 and VL2 is identified by the destination identifier in the packet. On the network, the virtual link to which a packet belongs is determined by the identifier of the virtual link in the packet.

[0088] A switch uses a static configuration table to determine the virtual links that it is required to switch, and the allowable number of packets for a virtual link.

[0089] The virtual link concept is a means of fixing communications between equipment by configuring routes and passbands allocated to the virtual links. Thus, the flow formed by a virtual link is sure to be not disturbed by other flows sharing the same physical links all along its route in the network.

[0090] Furthermore, the virtual link concept enables central flow management, to make sure that the sum of the passbands allocated to virtual links on the same physical link does not exceed the capacities of the technology of this physical link. In the above example, the sum of the passbands of virtual links VL1 and VL2 must be less than the transmission capacity of the physical link from equipment 21.

[0091] In the network according to the invention, each equipment comprises:

[0092] means 32 that define virtual links in transmission and that allocate passbands by controlling segregations,

[0093] means 33 that sequence accesses of virtual links to the physical link, in transmission,

[0094] means 34 that make it possible to subscribe to one or several virtual links in reception, and that enable segregation between virtual links as far as the application.

[0095]FIGS. 4A and 4B represent these means in transmission and in reception respectively, between an application 30 and a physical layer Ethernet controller 31; the complete assembly of means 32 and 33 forming a communication stack 35 and the means 34 forming a communication stack 36.

[0096] In the network according to the invention, each switch comprises:

[0097] means of separately configuring each input port in order to indicate the output ports towards which each received Ethernet frame must be directed as a function of the virtual link identifier,

[0098] means of monitoring the flow of Ethernet frames associated with each virtual link that passes through the switch,

[0099] means of reformatting the flow in each virtual link (re-separation of frames for each virtual link),

[0100] means of multiplexing flows in virtual links on each output port.

[0101] Therefore as illustrated in FIG. 5, this switch includes the following in sequence:

[0102] an input port 41,

[0103] flow control means 42,

[0104] a switching motor supporting multidestination transfers 43,

[0105] flow control means 44,

[0106] flow reformatting means 45,

[0107] means of multiplexing the virtual links 46,

[0108] an output port 47.

[0109] Thus, as illustrated in FIG. 6, the network according to the invention is characterized by the implementation of several services or means in each of the subscriber equipment 50:

[0110] a transmission service, the role of which is to enable an application 52 to access virtual links in transmission. This service multiplexes virtual links to the physical link 53 through an Ethernet interface 54, and for each virtual link sends packet as a function of the passband allocated to the virtual link.

[0111] A reception service 55 that decodes the packets, verifies that their format is good and makes useful data available to applications.

[0112] In these transmission and reception services, the virtual link may be represented as being a queue, as seen by the application.

[0113] Other protection services are used to guard against some network failures:

[0114] A passband protection service in the switch, which verifies the time characteristics of packets (separation between packets, the consumed passband), for each incoming virtual link. If the allowable characteristics are exceeded, the packets will simply be destroyed to prevent a failure in a transmitter or a virtual link from compromising traffic in other virtual links starting from this switch.

[0115] A network redundancy service 60 at subscriber level, that enables transmission and reception of a packet on two virtual links in order to implement a network redundancy. Duplication of the network, which is transparent for applications, thus provides protection against a failure in a switch or an interface (but it does not replace redundancy at system level). As shown in FIG. 7, there are also the transmission and reception services 51 and 55 in FIG. 6, and a network transmission reception redundancy service 60 to which is connected to a first Ethernet interface 61 and to a second Ethernet interface 62.

Transmission and Reception Modes

[0116] The communication interface may supply three additional services to subscriber level applications:

[0117] “Sampling”: the destination equipment only presents the last received value to the user. In reception, the last value is systematically overwritten by the new received packet. This service is suitable for receiving periodic information.

[0118] “Queuing”: destination equipment presents all data that it receives to the user, even if the receiver does not read them quickly enough. This service is useful for:

[0119] sending information that the addressee does not want to lose (all packets will be read),

[0120] sending data larger than the maximum size of the packet on the virtual link. The transmission service then breaks these data down into packets. The reception service reformats the data to make them available to the receiving application.

[0121] “File transfer”: this service transfers a data file.

[0122] The transmission service breaks it down into packets which are then transmitted sequentially. The reception service reconstructs the file. It is also capable of restarting on error (for example in the case of a data download).

[0123]FIG. 8 illustrates the location of these services with respect to applications and services on virtual links, using the same references as in FIG. 6.

Transmission of Packets on a Virtual Link

[0124] The invention does not only relate to the definition of virtual links that are used in equipment to send and receive data. It also relates to a particular use of the allocated passband, and sub-filtering functions on reception in a virtual link.

[0125] 1) The Allocated Passband and Inter-Packet Time

[0126] The allocated passband is defined as being the number of packets sent per second and the size of each packet. But this definition is incomplete because a passband does not give the distribution of these packets in time. It is also necessary to specify the minimum time to be respected between two packets. This minimum inter-packet time (IPT) gives the maximum passband of the virtual link for a given packet size.

[0127]FIG. 9 thus illustrates two example packet distributions in a sequence 70:

[0128] a distribution 71 of 10 packets separated by 1 bit,

[0129] a uniform distribution 72 of 10 packets. The fact of indicating that the minimum inter-packet time is 100 ms gives the maximum traffic envelope on this virtual link, and the passband can be deduced from the packet size using the following formula: $\frac{\text{Packet~~Size}}{\text{Minimum~~inter-packet~~time}} = \text{passband~~of~~virtual~~link}$

[0130] The assignment of a passband (PB) and an inter-packet time (IPT) for a virtual link does not mean that the packets will systematically be transmitted on the virtual link every IPT and occupy the entire allocated passband. These packets will only be sent on the virtual link when a subscriber application makes them available to the transmission in this virtual link.

[0131] 2) The Filter Function in a Virtual Link in Reception

[0132] On the same virtual link, a subscriber in reception can refine the selection of packets using network addressing information contained in the packet. This filter mode which uses a virtual sub-links concept gives greater flexibility for the definition and use of virtual links by avoiding the creation of specific virtual links.

[0133]FIG. 10 gives an example of a virtual link that supports a stream of three types of packets (a, b and c). Each subscriber can filter (75) the packets according to its needs (subscriber A1-packet a; subscriber A2-packet b; and subscriber A3-packet C).

Performances of the Network According to the Invention

[0134] The performances of the network according to the invention can be broken down in four ways:

[0135] data integrity,

[0136] network availability,

[0137] network determinism,

[0138] end to end routing of data.

[0139] 1) Data Integrity

[0140] Data integrity is achieved on each packet by a CRC (Cyclic Redundancy Check) that enables a calculation to validate data transmitted in the packet. The CRC is located at the end of the packet and it corresponds to all bits in the packet (network information plus useful information).

[0141] In the network a packet is verified at each equipment entry to the network, so that every bad packet can be destroyed so that it cannot be used, in order to release the passband and to avoid unnecessarily overloading the switches.

[0142] 2) Network Availability

[0143] The network is shared by several systems for communications. Therefore its availability has a non-negligible impact on the global availability.

[0144] This availability is increased by network redundancy, that consists of doubling up the network, with each subscriber having a connection to each of the two networks, and one of the two packets being selected on reception.

[0145] This network redundancy enables operation even if a switch or several links are defective.

[0146] 3) Network Determinism

[0147] The network is a deterministic network. This means that any packet belonging to a virtual link for an allocated passband is sure of accessing the network and being transmitted to receiving equipment for a limited latency time (maximum packet transit time).

[0148] For a virtual link, the maximum latency calculation is given by the following formula:

Latency time of a virtual link=Ta _(E) +TTE+(NS×TTS)+TTR+TA _(R)

[0149] Where

[0150] TTE: crossing time through the communication stack in transmission, corresponding to the time necessary to form packets in the communication services. This time is identical for all virtual links and is dependent on the hardware supporting the application.

[0151] TA_(E): transmission access time. The allocated passband is given in the form of a maximum passband and a minimum time between two consecutive packets (inter-packet time IPT). Since packets are sent in a virtual link asynchronously with regard to the application, if a packet has just been sent, it will be necessary to wait for a time IPT before accessing the network: thus TA_(E)≦IPT in all cases.

[0152] NS: number of switches through which the virtual link passes,

[0153] TTS: maximum time for a packet to pass through a switch,

[0154] TTR: crossing time in reception through the communication stack, corresponding to the time TTE but in reception. This time includes the packet reception time by the services. It is identical for all virtual links, and it depends on the hardware supporting the application.

[0155] TA_(R): access time in reception. When a subscriber receives a packet, it is made available to the application through a “mail box”. As a maximum, TA_(R)=IPT.

[0156] The times TA_(E) and TA_(R) are a result of the asynchronism between the applications and the network in transmission and reception.

[0157] A first estimate will give the following maximum values for a packet transfer time, independently of the virtual links:

[0158] TTE=0.5 ms

[0159] TTR=0.5 ms

[0160] TTS=1 ms.

[0161] In the example illustrated in FIG. 11, in which the references in FIG. 2 are repeated, we have:

[0162] For the virtual link VL1 from equipment 13 to equipment 14 through two switches 11, if the time IPT=5 ms and the read interval=ms, we have:

[0163] TA_(E)=5 ms

[0164] NS=2

[0165] TA_(R)=1 ms

[0166] Latency time for a virtual link=9 ms.

[0167] 4) End to end Routing of Data

[0168] The network according to the invention creates a single end to end route using virtual links, for each packet.

[0169] At each subscriber, each packet is assigned on transmission to a virtual link predefined by configuration. This packet has an addressing part that contains the identification of the virtual link. This identification is used for routing in the network.

[0170] In the routing of a packet, a service verifies if a packet is authorized to pass through each switch at which the packet arrives. Similarly, on reception, a service checks if the packet belongs to a virtual link authorized in reception. If not, the packet is destroyed.

[0171]FIG. 12 illustrates an example verification of a packet in the virtual link VL1 in FIG. 10. This check takes place at points 80.

Example Embodiment of the Network According to the Invention in Avionics

[0172] In this example embodiment, several characteristics of the network according to the invention have been specified, in order to simplify and standardize the use of this network in avionics.

Characteristics of Virtual Links

[0173] 1) Number of Virtual Links

[0174] Three subscriber classes are defined, depending on the number of virtual links in transmission and reception:

[0175] large consumer subscriber,

[0176] medium consumer subscriber,

[0177] small consumer subscriber.

[0178] This type of distribution is given in table 1 at the end of the description.

[0179] 2) Passband in Virtual Links

[0180] Each virtual link has an allocated passband that is given by the minimum inter-packet time (IPT) and the packet size. The IPT is given by the following formula:

IPT=1 ms×2^(k)

[0181] where K is an integer from 0 to 7;

[0182] which gives either 1 ms, 2 ms, 4 ms, 8 ms, 16 ms, 32 ms, 64 ms, or 128 ms.

[0183] By definition, four maximum packet sizes have been defined for each virtual link, namely 16 bytes, 98 bytes, 226 bytes and 482 bytes. This size only indicates useful data for the packet, used by applications directly. Network information data are also taken into account for calculation of the passband.

[0184] In table 2 at the end of the description, the effective passbands on the network for a virtual link are given for each packet size (useful load) and for each IPT time.

[0185] The required transmission passband for equipment on aircraft is low (<400 kbits/s). Thus, an upper bound in transmission is given which is summarized by the rule that the sum of passbands of the virtual links VL in transmission must be less than 5 Mbits/s. Thus, in transmission we can have:

[0186] a subscriber with ten 16-byte virtual links at 2 ms (which gives 3.36 Mbits/s), or

[0187] a subscriber with five 16-byte virtual links at 2 ms and ten 226-bytes virtual links at 16 ms and one 226-byte virtual link at 4 ms (which gives 4.778 Mbits/s).

[0188] In order to allocate a passband to a virtual link, a real need has to be identified in terms of data transmission frequency and volume.

[0189] Margins on the passband are given in two ways, either by duplication of the virtual link, or by an effective margin on the passband of the virtual link. In the latter case, it is possible to:

[0190] allocate a useful size larger than necessary,

[0191] allocate a shorter time IPT, so that the packet transmission frequency can be increased, for example the number of packets per second can be doubled if the time IPT changes from 16 ms to 8 ms,

[0192] a combination of the useful size and the time IPT.

[0193] 3) Virtual Links Mode

[0194] Three transfer modes have been defined above, namely “sampling”, “queuing”, and “file transfer”. In order to facilitate the definitions in the virtual links, each virtual link is used either in “sampling” mode or in “queuing” mode or in “file transfer” mode.

[0195] 4) Filtering

[0196] The possibility of filtering in a virtual link enables some equipment to avoid an excessive number of virtual links in transmission and in reception (if the same transmitter). This means can be used to group several virtual links into a single link and to define “virtual sub-links”, the packets being selected by network information contained in the packet. Filtering gives better flexibility on the use of communication “pipes” and enables optimisation of their use.

Structure and Format of the Useful Load

[0197] The term “structure” specifies the arrangement of the useful load (data transmitted and received by applications) in the packet.

[0198] The term “format” specifies the type of data (integer, binary, etc.).

[0199] The Ethernet standard does not impose the packet structure and the data format (unlike the ARINC 429 standard); however, the following rules are respected in the example considered.

[0200] As illustrated in FIG. 13, the useful load comprises:

[0201] the functional validity (VF) valid for all data in the packet,

[0202] the data themselves, coded according to a standard format,

[0203] the arrangement of the data themselves shall be defined by common agreement between the transmitter and the addressees.

[0204] 1) Functional Validity

[0205] The transmitter calculates the functional validity, and the receiver or receivers use it to determine the degree of confidence to be assigned to the transmitted packet. The functional validity is coded in the first four bytes of the packet.

[0206] The functional validity is the equivalent of “SSMs” used on the ARINC 429 aeronautical standard. However, there are some major differences:

[0207] This functional validity is purely functional, in other words it only reflects the state of data determined by the transmitting application, and not the state of resources that support it.

[0208] The functional validity may be equal to one of the following values:

[0209] NO: “Normal Operation”

[0210] NCD: “No Computed Data”

[0211] FTF: “Functional Test”

[0212] The validity of the resources due to distanciation between application and resource cannot be generated by the functional validity.

[0213] 2) Data Format

[0214] Data are coded in a predefined format, in order to standardize exchanges. This format is as similar as possible to the “computer” format manipulated by compilers and microprocessors, to minimize format transformations to be made by applications.

[0215] The selected formats are defined in the coding rule illustrated in table 3 at the end of the description.

[0216] 3) Data Grouping

[0217] The Ethernet protocol is particularly efficient when transmitted information is relatively long. Therefore, it is very advantageous to group data to that they can be sent all at once to facilitate coherence and integrity.

[0218] The data grouping criteria may be as follows:

[0219] same transfer mode

[0220] same refreshment period

[0221] functional affinity

[0222] same management of functional validity.

Network Design and Sizing Procedure

[0223] It is essential to define the subscriber hardware and software architecture, at least from the communication point of view, before carrying out a network design and sizing procedure.

[0224] This involves a system and network architecture design phase that must clearly identify:

[0225] physically interfaced equipment on the bus, apart from redundancy,

[0226] transmission and reception subscriber applications seen by the network,

[0227] virtual links as entirely separate elements of the network architecture with its topology.

[0228] The systems must take account of tests and if necessary define specific virtual links for transferring data to test instrumentation means.

[0229] For each hardware equipment, the following are necessary:

[0230] its identification: module name or equipment name,

[0231] its position in the aircraft architecture.

[0232] The following are necessary for each subscriber application:

[0233] its identification: function name,

[0234] its description: a comment,

[0235] its “mapping” on the hardware equipment in the aircraft architecture,

[0236] the identification of the logical interface.

[0237] Equipment, even equipment external to the aircraft, or a test installation, etc., may support several subscribers each with one or several logical interfaces to one or several sub-networks.

[0238] The following are necessary for each virtual link:

[0239] its identification: name of the virtual link,

[0240] the type of information transmitted in the form of a comment,

[0241] the name of the transmitting application,

[0242] the names of receiving applications,

[0243] its routing on hardware equipment in the aircraft architecture in the form of a list of switches passed through, as identified in the architecture,

[0244] the useful passband (bits/s),

[0245] the packet size: the packet size may be fixed or variable in a virtual link, and the maximum size must be given,

[0246] the time IPT,

[0247] justification of the passband, the packet size and the time IPT,

[0248] the usage mode: for “queuing” mode, it is possible to specify if the packet size is greater than 482 bytes,

[0249] the maximum latency.

[0250] The transmission system is responsible for defining virtual links. The transmission system must make sure that equipment in reception take account of virtual links.

Means Used

[0251] A database supports this part of the process and defines:

[0252] the hardware architecture of the system with all resources and wiring,

[0253] subscribers (components) and their “mapping” on the hardware architecture,

[0254] virtual links of the system and their routings.

Embodiment of a Communication Stack in an Equipment

[0255] This type of stack must enable every subscriber to interface with the communication network.

[0256] There are three possible approaches for integration of this function in the subscriber equipment:

[0257] an autonomous board satisfying all communication needs and capable of interfacing with the rest of the equipment simply through a bus,

[0258] a list of necessary components and the software that can be integrated into the target equipment,

[0259] a subscriber interoperability specification with its validation plan in order to check that the supplier's development is conform with the specified functional requirements. TABLE 1 Number of Number of Subscriber virtual links Virtual links Class in transmission In reception Large consumer 32 128 Medium consumer 16  64 Small consumer  8  32

[0260] TABLE 2 Useful Byte Real passband on the network (to) 1 ms 2 ms 4 ms 8 ms 16 ms 32 ms 64 ms 128 ms  16   672 000   336 000  168 000  84 000  42 000  21 000 10 500  8 280  98 1 328 000   664 000  332 000 166 000  83 000  41 500 20 750 10 375 226 2 352 000 1 176 000  588 000 294 000 147 000 735 000 36 750 18 375 482 4 400 000 2 200 000 1 100000 550 000 275 000 137 500 68 750 34 375

[0261] TABLE 3 Type Standard format Character Signed 8-bit ASCII character (Arinc 653) Integer Signed 32-bit integer (Arinc 653) Unsigned integer Unsigned 32-bit integer (Arinc 653) Boolean Unsigned 32-bit integer with info in LSB Real 32-bit floating point integer according to IEEE 303 Proprietary type Format not managed by IOF's

[0262] Obviously, numerous modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that within the scope of the appended claims, the present invention may be practiced otherwise than as specifically herein. 

1. Process for controlling a switched full-duplex Ethernet type communication network including at least one source subscriber equipment and at least one destination subscriber equipment connected to each other through at least a physical link through at least one switch and through at least one virtual link which is a conceptual representation of a link from a source equipment to at least one destination equipment, the process comprising: in a transmission service, allowing an application to access virtual links in transmission, the transmission service configured to multiplex virtual links to a physical link through an Ethernet interface; and for each virtual link, sending packets as a function of passband allocated to the respective virtual link; checking time characteristics of the packets in a passband protection service in the switch, for each incoming virtual link; and destroying the packets if the allowable characteristics are exceeded, to prevent a failure in a transmitter or a virtual link from compromising traffic in other virtual links leaving the switch.
 2. Process according to claim 1, further comprising, in a reception service, decoding packets, checking that a format of the decoded packets is correct, and making useful data available to applications.
 3. Process according to claim 1, wherein a packet is sent and received on two virtual links, in a network redundancy service at subscriber level, to implement network redundancy, that is transparent for applications to avoid problems caused by failure of a switch or an interface.
 4. Process according to claim 1, further comprising performing a sampling service in a destination equipment that only presents a last received value to a user, and wherein the last received value is systematically overwritten by a new received packet.
 5. Process according to claim 1, further comprising performing a queuing service in a destination equipment that presents all data that the destination equipment receives to the user, the queuing service enabling: sending information that an addressee does not want to lose; and sending information larger than a maximum packet size of the virtual link, the transmission service then breaking down the data into packets, the reception service reformatting the data to make reformatted data available to the receiving application.
 6. Process according to claim 1, further comprising performing a file transfer source in which a data file is transferred, the transmission service breaking the data file down into packets that are then transmitted sequentially, the reception service rebuilding the data file.
 7. Process according to claim 1, wherein a passband and an inter-packet time are assigned for each virtual link.
 8. Process according to claim 7, further comprising in a subscriber in reception, refining a selection of packets on a same virtual link, by using network addressing information contained in the packet.
 9. Process according to claim 8, further comprising achieving data integrity on each packet by a CRC that makes a calculation to validate data transmitted in the packet, checking each packet at each network equipment input, and destroying all bad packets. 