EP1147643A1 - Procede et dispositif pour determiner la fiabilite d'un support de donnees - Google Patents
Procede et dispositif pour determiner la fiabilite d'un support de donneesInfo
- Publication number
- EP1147643A1 EP1147643A1 EP00907425A EP00907425A EP1147643A1 EP 1147643 A1 EP1147643 A1 EP 1147643A1 EP 00907425 A EP00907425 A EP 00907425A EP 00907425 A EP00907425 A EP 00907425A EP 1147643 A1 EP1147643 A1 EP 1147643A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- data packets
- network subscriber
- value
- falsified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/24—Testing correct operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/20—Arrangements for detecting or preventing errors in the information received using signal quality detector
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/20—Arrangements for detecting or preventing errors in the information received using signal quality detector
- H04L1/203—Details of error rate determination, e.g. BER, FER or WER
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
- G06F11/0754—Error or fault detection not based on redundancy by exceeding limits
- G06F11/076—Error or fault detection not based on redundancy by exceeding limits by exceeding a count or rate limit, e.g. word- or bit count limit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
Definitions
- the invention relates to a network participant, to whom data packets can be transmitted by a further network participant, each of which has a data backup value, and which checks the data backup value of the data packet to detect a corruption of a received data packet.
- Such a network participant is known from the Siemens catalog ST 70, chapter 14, 1999 edition.
- the transmitting network subscriber provides this data packet with a CRC value before the transmission of a data packet, which the receiving network subscriber evaluates and thereby recognizes whether the received data packet has been corrupted on the transmission link.
- the invention further relates to a communication process carried out by the network participants.
- IEC 61508 prescribes so-called “Safety integrity levels ⁇ (SIL) for safety-related devices, whereby residual error probabilities of less than 10 " 6 to 10 ⁇ 5 per hour (SIL 1), less than 10 "7 to 10 " 6 per hour (SIL 2) and less than 10 "8 to 10 ⁇ 7 (SIL 3) per hour are specified.
- SIL Safety integrity levels
- the present invention is based on the object of creating a network subscriber of the type mentioned at the outset, or a corresponding communication method, which "online *" enables proof of security with regard to a bit error probability or input error probability and / or residual error probability.
- the CRC monitoring which is to be carried out anyway is used to determine the residual error probability of the overall system and / or the bit error probability of the communication on a transmission medium between network participants.
- the safety-related reaction is triggered according to the invention when either the ratio of corrupted to uncorrupted data packets and / or receipts reaches or exceeds a predetermined or predeterminable value or during a predetermined or predeterminable number of transmitted data packets, either during a predefined or predeterminable time interval Data packets and / or receipts reaches or exceeds a predetermined or predeterminable value.
- the number of corrupted and genuine data packets and / or corrupted receipts is first determined during operation. Possibly. It can also be provided to determine only the number of corrupted or only the number of uncorrupted data packets and / or receipts and additionally the total number of transmitted data packets, so that the respective complementary value can be determined at any time by calculation.
- the ratio of corrupted to genuine data packets and / or receipts or the number of corrupted data packets and / or receipts is then compared either continuously or according to a defined strategy with a predetermined or predeterminable threshold value.
- the error reaction is triggered when the ratio of corrupted to uncorrupted data packets and / or receipts is monitored if the number of corrupted data packets and / or receipts exceeds a predetermined or predeterminable threshold value in relation to the number of uncorrupted data packets and / or receipts during a predetermined or predeterminable period of time .
- the error reaction is triggered if, during a predetermined or predefinable further number of data packets, e.g. B. during another 65,000 data packets, another data packet is corrupted.
- a predetermined or predefinable further number of data packets e.g. B. during another 65,000 data packets
- another data packet is corrupted.
- an error response z. B. be provided that the outputs of an output unit of a technical system to be controlled are switched off.
- FIG. 1 shows a network with several network participants
- Figure 2 shows a telegram monitoring
- Figures 3 and 4 a topology of a communication relationship.
- 1 denotes a network which has a number of network participants 2, 3,... 9.
- the network participants 2, 3, 4 and 5 include z.
- driver modules have means in the form of driver modules, which are provided with an error checking algorithm in the form of a “cycle redundancy check * known per se.
- the error checking algorithm determines the respective
- the driver block of a receiving unit also forms a CRC value from the user data of a received telegram and compares this with the received CRC value.
- gray channel is a single-channel standard communication device that is used by the security profile and may contain any communication components.
- the driver block is z. B. for an "online * security verification in terms of a predeterminable residual error probability such that this z. B. within a predeterminable time interval, the number of corrupted and genuine data packets (telegrams) is determined and a safety response is triggered if the ratio of corrupted to genuine data packets reaches a value corresponding to this residual error probability.
- the driver block can also be parameterized such that it determines the number of corrupted data packets during the transmission of a predefined or predeterminable number of data packets and then triggers a safety-related reaction if this number of corrupted data packets instead of the ratio of falsified and undistorted data packets within a predefinable time interval reaches or exceeds a value corresponding to this residual error rate.
- the corresponding driver module shows this by a safety-related reaction, for example.
- B in the form of switching off the outputs of an output unit of a technical system.
- Figure 2 shows the representation of a telegram monitoring.
- a fail-safe CPU unit 10 of a programmable logic controller transmits to a fail-safe output unit 11 of this or another programmable logic controller Control at the beginning of a CPU cycle time Zy at times t n , t n + ⁇ , ... t m a telegram Tg n Tg n + ⁇ , ... Tg n + m .
- the output unit 11 checks the CRC values of the telegrams and acknowledges the CPU unit 10 within a monitoring time interval Zi to receive a telegram Tg n , Tg n + ⁇ , ... Tg n + m with corresponding acknowledgment telegrams Qu n , Qu n + ⁇ , Qu n + m , of which each receipt Qu n , Qu n + ⁇ , Qu n + m is also provided with a CRC value.
- the units 10, 11 the number of corrupted and uncorrupted telegrams within a predeterminable time interval, e.g. B. in the interval from the time t n + ⁇ and the time t n + m , determine and then trigger a safety-related reaction if the ratio of tampered to tampered telegrams reaches or exceeds 1:10 5
- the output unit 11 reacts in a safety-related manner if that
- the CPU unit 10 If the CPU unit 10 does not receive an acknowledgment telegram within a CPU cycle time Zy after the transmission of a telegram, the CPU unit 10 evaluates the missing acknowledgment as a corrupted acknowledgment telegram. In this case, the CPU unit reacts - as described - in a safety-related manner if, in accordance with the ratio of corrupted and uncorrupted telegrams, another telegram transmission has not been acknowledged or another corrupted acknowledgment telegram has been transmitted to the CPU unit 10. The same applies to telegrams for which the peripheral unit is the sender and expects acknowledgments from the CPU.
- the units 10, 11 then trigger a safety-related reaction if the number of corrupted telegrams within a predefinable time interval of one hour, which in the present example is an interval between the times t n + ⁇ and t n + m corresponds to, exceeds the value "2 *.
- the output unit 11 reacts in a safety-related manner if the received telegram Tg n + m is also corrupted. Furthermore, the CPU unit 10 reacts in a safety-related manner if, for. B. the acknowledgment telegrams Qu n + ⁇ and Qu n + are falsified, since the specifiable value "2 * is reached.
- the CPU unit 10 evaluates a missing acknowledgment within a CPU cycle time Zy as a corrupted acknowledgment telegram.
- the CPU unit reacts - as described - in a safety-related manner if, in accordance with the value "2 *, a further telegram transmission within one hour, ie within the time interval between the times t n + ⁇ and t n + m , does not acknowledge or on another corrupted acknowledgment telegram from the CPU unit 10 is transmitted.
- the peripheral unit also evaluates a missing acknowledgment.
- the method according to the invention is used in a network of several communication participants (reason: the probabilistic safety requirements according to IEC 61508 always refer to a complete safety circuit), according to a further aspect of the invention it can be provided that the error probabilities determined are essentially parallel communication branches are added, and a safety-related reaction is triggered as soon as the sum of the error probabilities / error rates determined in the parallel communication relationships exceeds a predetermined or predefinable threshold value.
- Figure 3 shows schematically the communication relationship between a host 20, an analog / digital input unit 24 and a plurality of analog / digital output units 21, 22, 23.
- the input unit 24 is e.g. an emergency stop button 24.
- These output units 21, 22, 23 are e.g. Different motors or hydraulic units of an external technical process to be controlled are connected.
- the emergency stop button 24 If the emergency stop button 24 is actuated, it is essential that all of the output units 21, 22, 23 initiate a shutdown of the connected process periphery; i.e. it is essential that each device connected to an output unit 21, 22, 23 responds to the emergency stop situation signaled by the input unit 24. Therefore, the error probabilities / rates determined in the manner described above, which were determined in the data traffic of the individual communication relationships (20-21), (20-22), (20-23), are transmitted to the host 20, which received the Data cached and summed. In addition, the host 20 can also add those telegram errors that it detects in its receive telegrams. Exceeds the sum of
- Residual error probabilities / rates a predeterminable or predefined threshold value a safety-related reaction is initiated, as described above, that is to say, for example, the switching off of the process peripherals connected to the output units 21, 22, 23.
- FIG. 4 A host is also designated in FIG. 4 by 20.
- An output unit 28 is communicatively connected to this, to which, for example, a motor is connected as external process periphery.
- Input units 25, 26, 27 are also communicatively connected to the host 20.
- Process peripherals such as sensors for securing an electrical device, for example a step mat, a light barrier and an emergency stop button, are connected to these input units.
- the process peripherals connected to the output unit 28 must e.g. be switched off. Therefore, analogously to the example previously described with reference to FIG. 3, the error probabilities occurring in the communication relationships between the input units 25, 26, 27 and the host 20 are determined and transmitted to the host 20. At the host 20, the transmitted error probabilities / rates are added and a safety-related reaction, e.g. the switching off of the process peripherals connected to the output unit 28 is triggered as soon as the ascertained sum exceeds a predeterminable or predefined threshold value.
- the ascertained error probabilities / rates, which the fail-safe peripheral devices uncover, are transmitted to the host 20 in each case in the respective receive telegram.
- the host 20 can also add those telegram errors that it detects in its receive telegrams.
- a network participant to which data packets can be transmitted by another network participant, each of which has a data backup value, and which for identification A falsification of a received data packet checks the data backup value of the data packet, is provided with means which enable * online "security verification with regard to a probability / rate of communication error and / or probability of residual error / residual error rate.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Abstract
Selon l'invention, un noeud de réseau, auquel un autre noeud de réseau peut transmettre des paquets de données qui présentent chacun une valeur de sécurité de données, et qui contrôlent la valeur de sécurité du paquet de données reçu pour reconnaître une falsification dans ce paquet, est pourvu de moyens qui permettent "en ligne" une détermination de la sécurité en ce qui concerne la probabilité d'erreur de communication/le taux d'erreur de communication et/ou la probabilité d'erreur résiduelle et/ou le taux d'erreur résiduelle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00907425A EP1147643A1 (fr) | 1999-01-26 | 2000-01-13 | Procede et dispositif pour determiner la fiabilite d'un support de donnees |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE29901302U DE29901302U1 (de) | 1999-01-26 | 1999-01-26 | Netzwerkteilnehmer |
DE29901302U | 1999-01-26 | ||
EP99110157 | 1999-05-25 | ||
EP99110157A EP1024639A1 (fr) | 1999-01-26 | 1999-05-25 | Procédé et système pour déterminer la fiabilité des transfert de données |
EP00907425A EP1147643A1 (fr) | 1999-01-26 | 2000-01-13 | Procede et dispositif pour determiner la fiabilite d'un support de donnees |
PCT/DE2000/000118 WO2000045562A1 (fr) | 1999-01-26 | 2000-01-13 | Procede et dispositif pour determiner la fiabilite d'un support de donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1147643A1 true EP1147643A1 (fr) | 2001-10-24 |
Family
ID=8068484
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99110157A Withdrawn EP1024639A1 (fr) | 1999-01-26 | 1999-05-25 | Procédé et système pour déterminer la fiabilité des transfert de données |
EP00907425A Ceased EP1147643A1 (fr) | 1999-01-26 | 2000-01-13 | Procede et dispositif pour determiner la fiabilite d'un support de donnees |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP99110157A Withdrawn EP1024639A1 (fr) | 1999-01-26 | 1999-05-25 | Procédé et système pour déterminer la fiabilité des transfert de données |
Country Status (4)
Country | Link |
---|---|
US (1) | US6907542B2 (fr) |
EP (2) | EP1024639A1 (fr) |
DE (1) | DE29901302U1 (fr) |
WO (1) | WO2000045562A1 (fr) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707319B2 (en) | 2000-09-18 | 2010-04-27 | Rockwell Automation Technologies, Inc. | Noninvasive testing of network interface error codes for safety network |
US7590848B2 (en) * | 2002-02-07 | 2009-09-15 | Blackhawk Network | System and method for authentication and fail-safe transmission of safety messages |
US7133984B1 (en) * | 2003-04-11 | 2006-11-07 | Sprint Communications Company L.P. | Method and system for migrating data |
US7133727B2 (en) * | 2003-08-01 | 2006-11-07 | Invensys Systems, Inc. | System and method for continuous online safety and reliability monitoring |
US7117119B2 (en) * | 2003-08-01 | 2006-10-03 | Invensys Systems, Inc | System and method for continuous online safety and reliability monitoring |
KR101086397B1 (ko) * | 2003-12-02 | 2011-11-23 | 삼성전자주식회사 | Ip 패킷의 에러 처리 장치 및 방법, 그리고 상기 방법을실행하는 프로그램을 기록한 컴퓨터로 읽을 수 있는 기록매체 |
DE102005010820C5 (de) * | 2005-03-07 | 2014-06-26 | Phoenix Contact Gmbh & Co. Kg | Kopplung von sicheren Feldbussystemen |
DE102010044858B4 (de) * | 2010-09-09 | 2012-04-19 | Siemens Aktiengesellschaft | Verfahren zum Verarbeiten von Nachrichten in einem Kommunikationsnetz aus mehreren Netzknoten |
DE102012206272A1 (de) * | 2012-04-17 | 2013-10-17 | Beckhoff Automation Gmbh | Feldbus-Datenübertragung |
DE102016102282B4 (de) * | 2016-02-10 | 2024-01-04 | Phoenix Contact Gmbh & Co. Kg | Verfahren und Vorrichtung zum Überwachen einer Datenverarbeitung und -übertragung in einer Sicherheitskette eines Sicherheitssystems |
CN106888114B (zh) * | 2017-01-24 | 2019-11-29 | 北京广利核系统工程有限公司 | 一种核电站安全级仪控系统通信协议的自诊断方法 |
WO2018137147A1 (fr) * | 2017-01-24 | 2018-08-02 | 北京广利核系统工程有限公司 | Procédé d'auto-diagnostic de protocole de communication de système d'instrumentation et de commande de niveau de sécurité d'une centrale nucléaire |
CN113661665B (zh) * | 2019-04-16 | 2023-12-19 | 三菱电机株式会社 | 安全通信装置、安全通信系统、安全通信方法及计算机可读取的记录介质 |
US11190546B2 (en) | 2019-05-31 | 2021-11-30 | QDroid Inc. | Secure failsafe apparatus |
US11318960B1 (en) * | 2020-05-15 | 2022-05-03 | Gm Cruise Holdings Llc | Reducing pathogen transmission in autonomous vehicle fleet |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0594336A1 (fr) * | 1992-10-23 | 1994-04-27 | Matsushita Electric Industrial Co., Ltd. | Transmission de messages de données dans un système de radio-téléphonie numérique cellulaire |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3108445A1 (de) * | 1981-03-06 | 1982-11-04 | Robert Bosch Gmbh, 7000 Stuttgart | Verfahren und schaltungsanordnung zur messung der fehlerrate digital codierter signale |
DE3346828A1 (de) * | 1983-12-23 | 1985-09-26 | Siemens AG, 1000 Berlin und 8000 München | Verfahren und schaltungsanordnung zum bestimmen der qualitaet einer uebertragungsstrecke |
US5023872A (en) * | 1988-03-25 | 1991-06-11 | Advanced Micro Devices, Inc. | FDDI bit error rate tester |
JP2562701B2 (ja) * | 1989-12-26 | 1996-12-11 | 株式会社小松製作所 | データ伝送システムのエラー表示装置 |
US5138616A (en) * | 1990-03-19 | 1992-08-11 | The United States Of America As Represented By The Secretary Of The Army | Continuous on-line link error rate detector utilizing the frame bit error rate |
US5280630A (en) * | 1992-01-21 | 1994-01-18 | Motorola, Inc. | Method and apparatus for dynamic channel allocation |
CA2064541C (fr) | 1992-03-31 | 1998-09-15 | Thomas A. Gray | Comptage cyclique des erreurs pour la maintenance d'une liaison |
DE4218529A1 (de) * | 1992-06-05 | 1993-12-09 | Philips Patentverwaltung | Decoder mit Bitfehlerratenschätzung und/oder Wortsynchronisation |
US6088590A (en) * | 1993-11-01 | 2000-07-11 | Omnipoint Corporation | Method and system for mobile controlled handoff and link maintenance in spread spectrum communication |
GB2301717B (en) * | 1995-06-02 | 1999-08-11 | Dsc Communications | Network controller for monitoring the status of a network |
US5768300A (en) * | 1996-02-22 | 1998-06-16 | Fujitsu Limited | Interconnect fault detection and localization method and apparatus |
DE19651593B4 (de) * | 1996-12-11 | 2008-11-20 | Rohde & Schwarz Gmbh & Co. Kg | Anordnung zum Optimieren der Datenübertragung über einen bidirektionalen Funkkanal |
US5924122A (en) * | 1997-03-14 | 1999-07-13 | Compaq Computer Corp. | Method for error recovery spinlock in asymmetrically accessed multiprocessor shared memory |
US6098179A (en) * | 1998-01-22 | 2000-08-01 | Digital Equipment Corporation | Method and apparatus for performing error detection |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6266782B1 (en) * | 1998-11-30 | 2001-07-24 | Siemens Information And Communication Networks, Inc. | Apparatus and methods for inband protocol correction in distributed object networking |
JP2000269999A (ja) * | 1999-03-19 | 2000-09-29 | Fujitsu Ltd | ネットワーク間通信装置 |
US6442708B1 (en) * | 1999-12-14 | 2002-08-27 | Honeywell International Inc. | Fault localization and health indication for a controller area network |
US6629261B1 (en) * | 2000-11-21 | 2003-09-30 | At&T Wireless Services, Inc. | Enhanced data link layer selective reject mechanism in noisy wireless environment |
US6795941B2 (en) * | 2000-12-21 | 2004-09-21 | Honeywell International Inc. | Method for diagnosing a network |
US6810488B2 (en) * | 2001-05-22 | 2004-10-26 | Webex Communications, Inc. | Adaptive selective retransmission of packets |
-
1999
- 1999-01-26 DE DE29901302U patent/DE29901302U1/de not_active Expired - Lifetime
- 1999-05-25 EP EP99110157A patent/EP1024639A1/fr not_active Withdrawn
-
2000
- 2000-01-13 EP EP00907425A patent/EP1147643A1/fr not_active Ceased
- 2000-01-13 WO PCT/DE2000/000118 patent/WO2000045562A1/fr active Application Filing
-
2001
- 2001-07-18 US US09/908,110 patent/US6907542B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0594336A1 (fr) * | 1992-10-23 | 1994-04-27 | Matsushita Electric Industrial Co., Ltd. | Transmission de messages de données dans un système de radio-téléphonie numérique cellulaire |
Non-Patent Citations (1)
Title |
---|
See also references of WO0045562A1 * |
Also Published As
Publication number | Publication date |
---|---|
US6907542B2 (en) | 2005-06-14 |
US20020010874A1 (en) | 2002-01-24 |
WO2000045562A1 (fr) | 2000-08-03 |
DE29901302U1 (de) | 2000-03-30 |
EP1024639A1 (fr) | 2000-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE10316649B4 (de) | Sicherheitskommunikation auf einer einzigen Rückebene | |
DE112010001370B4 (de) | Signalübertragungsvorrichtung für einen Aufzug | |
EP1631014B1 (fr) | Procédé et dispositif pour coupler des procédés critiques à un bus | |
EP1352326B1 (fr) | Procede et dispositif de surveillance d'un traitement et d'une transmission de donnees | |
EP1802019B1 (fr) | Détection d'erreurs lors de la transmission de données | |
EP1147643A1 (fr) | Procede et dispositif pour determiner la fiabilite d'un support de donnees | |
EP1923759B1 (fr) | Procédé et système de transmission de données sécurisée | |
DE10152235B4 (de) | Verfahren zum Erkennen von Fehlern bei der Datenübertragung innerhalb eines CAN-Controllers und ein CAN-Controller zur Durchführung dieses Verfahrens | |
EP1952238B1 (fr) | Module de bus a raccorder a un systeme de bus et utilisation d'un module de bus de ce type dans un systeme de bus as-i | |
EP0837394A2 (fr) | Système de bus à sûreté intégrée | |
EP2652911B1 (fr) | Diagnostic de rupture de conducteur | |
EP2109244A1 (fr) | Procédé de transmission orientée vers la sécurité, appareil de sécurité et unité de contrôle | |
WO2016008948A1 (fr) | Système de commande et de transmission de données, module de passerelle, module e/a et procédé de commande de processus | |
DE10312699B4 (de) | Nichtinvasives Testen von Netzwerkschnittstellen-Fehlercodes für ein Sicherheitsnetzwerk | |
EP1811722B1 (fr) | Procédé et dispositif pour la conversion de messages présents sur plusieurs canaux en un message fiable sur un seul canal | |
EP3977682A1 (fr) | Dispositif de test de détection d'erreur pour une station d'abonné d'un système de bus série et procédé de test de mécanismes de détection d'erreur lors d'une communication dans un système de bus série | |
DE102014111361A1 (de) | Verfahren zum Betreiben einer Sicherheitssteuerung und Automatisierungsnetzwerk mit einer solchen Sicherheitssteuerung | |
EP1686732A1 (fr) | Procédé et système de transmission d'unités de données de protocole | |
EP1985070B1 (fr) | Procede et dispositif pour le couplage de bus de processus relatifs a la sécurité | |
DE10232272B4 (de) | Verfahren zum Betrieb einer Vorrichtung fü ein Sicherheitssystem | |
EP1064590B1 (fr) | Telegramme de donnees abrege d'un systeme d'automatisation | |
EP0625751A1 (fr) | Procédé de transmission d'information de façon sûre sur un bus | |
EP3817961A1 (fr) | Procédé d'échange sécurisé et d'affichage sécurisé de données d'état de composants de sécurité | |
EP0410270B1 (fr) | Procédé d'utilisation d'une interface fiable de transmission de signaux | |
EP1780923A1 (fr) | Transmission de datagrammes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20010613 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
17Q | First examination report despatched |
Effective date: 20030328 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT CH DE ES FR GB LI |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20081027 |