Preview

Reliabilityengineeringandsystemsafety

Powerful Essays
Open Document
Open Document
6939 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reliabilityengineeringandsystemsafety
Reliability Engineering and System Safety 100 (2012) 8–18

Contents lists available at SciVerse ScienceDirect

Reliability Engineering and System Safety journal homepage: www.elsevier.com/locate/ress

Verification of the safety communication protocol in train control system using colored Petri net$
Chen Lijie a,n, Tang Tao a, Zhao Xianqiong a, Eckehard Schnieder b a b

State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China
Institute for Traffic Safety and Automation Engineering, Technical University Braunschweig, Germany

a r t i c l e i n f o

a b s t r a c t

Article history:
Received 6 May 2011
Received in revised form
15 November 2011
Accepted 3 December 2011
Available online 21 December 2011

This paper deals with formal and simulation-based verification of the safety communication protocol in
ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri
Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair.
Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal



References: [3] G.W, C.H. Control system safety evaluation and reliability. US: ISA, 1998. [6] Bukowski, J.V. A comparison of techniques for computing PFD average. in: Reliability and Maintainability Symposium, 2005

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The client accept the connection and send data to server and the server to replay the…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    After selecting a protocol best suited comparing the earlier studies relevant on the field, it is required to make an assessment of verification and properly understand in depth about the protocol to develop a suitable algorithm targeting it. Therefore using a suitable experimental environment, the protocol should be simulated under various conditions and…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    the average time it takes a packet to reach the destination and for the response to return to the source…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    8. What is the most critical part of the termination procedure to ensure low crosstalk on the connection?…

    • 896 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT245 PH3 DB1

    • 310 Words
    • 1 Page

    For phase 3 discussion board we are ask to describe and compare the Open Systems Interconnection (OSI) model with another network model. For this assignment I will use the Transmission Control Protocol / Internet Protocol (TCP/IP) model. These models divide the communication process of the network into smaller parts. This helps with design, development, and troubling shooting. The OSI model has 7 layers- 1) Physical, 2) Data Link, 3) Network, 4) Transport, 5) Session, 6) Presentation, 7) Application. The TCP/IP model has 4 layers.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    References: Fundamentals of Communications and Networking. Copyright 2013. Jones & Bartlett Learning, LLC. Ascending Learning Company.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Dierks, T. and Rescorla, E. (2008). The transport layer security (TLS) protocol version 1.2. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc5246…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Signal Theory

    • 1153 Words
    • 5 Pages

    In this report I will be writing about Signal Theory and all of its aspects, this involves talking about how data is transferred over a network, what a packet is and what information it contains, asynchronous and synchronous transmission, errors that data may encounter and what protocols are in place to avoid this from happening.…

    • 1153 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Homework

    • 304 Words
    • 1 Page

    Reliable Delivery: The protocols provides reliable delivery service by guaranteeing to move each network layer datagram across the link without error.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Foundation Schools

    • 4532 Words
    • 15 Pages

    Scenario: Global Communications. (n.d.). Retrieved April 9, 2008 from University of Phoenix MMPBL500r3Gap Analysis Global Communications https://ecampus.phoenix.edu/secure/resource/resource.asp…

    • 4532 Words
    • 15 Pages
    Powerful Essays
  • Best Essays

    Klein, J. A. and Vaughen, B. K. (2008), A revised program for operational discipline. Proc. Safety Prog., 27: 58–65. doi: 10.1002/prs.10216…

    • 2671 Words
    • 11 Pages
    Best Essays

Related Topics