Optical bypass technology enhances security in road traffic management

Nowadays the smooth flow of road traffic is significantly dependent on suitable data communication. Optical bypass technology, which functions similar to a railway turnout, protects networks against multiple points of failure. This means if a certain part of the network fails, it will not affect the function of the remaining network.


By Thorsten Ebach, EKS Engel                                               Download PDF version of this article


There is a requirement for uninterrupted operation for networks in traffic control, as prescribed e.g. in the road tunnel equipment and operation guideline (RABT). But redundancy methods are not suited to meet this requirement, despite switching in only a few milliseconds. The reason is that if multiple failures occur simultaneously an interrupt of the data communication is inevitable. To prevent this, EKS Engel has implemented optical bypass technology, up to now mainly used in traditional IT, into the industrially integrated optical bypass x-light which withstands the harsh environments in traffic control systems. The x-light works in a protocol transparent way  and therefore supports Ethernet as well as all field busses and even numerous interfaces like RS-485. The optical bypass also works seamlessly with third-party network devices and can be integrated either in ring or line topologies.

Various kinds of traffic-control equipment, e.g. intelligent traffic guidance systems, warning signals for wrong-way drivers, or roadside emergency telephones, constantly monitor the flow of traffic to ensure the highest degree of security. Tunnels are additionally equipped with fire alarm systems and smoke extraction systems. Nowadays nearly all these traffic management systems are linked via fiber optic cables, mainly with single-mode transmission systems featuring attenuation of only 0.3dB per kilometer up to 100km. With transmission-distances up to 5km maximum, mainly multi-mode fiber cables are in use with attenuation 1dB per kilometer. Even in terms of reliability, fiber optics is the measure of all things because it is not sensitive to electromagnetic fields. Fiber optics consists of insulating material, which means data is transmitted via an electric insulator. Therefore, there are no potential equalization currents which are much dreaded in larger extended plants. There is also no risk of damaging connected devices even in the event of direct lightning strikes.

Active network components like Ethernet switches or field-bus converters are put through their paces by their manufacturers prior to delivery. But despite this, failures in operation cannot be completely avoided. The main reasons are, apart from incorrect use, problems in hardware and software and power failure.

To avoid problems within the network several protection methods are in use. Power failure can be compensated at least for a certain time with an uninterruptible power supply (UPS). Software is evaluated or rather validated as well as tested with structure, function, and so-called black-box tests. The magic word in hardware is redundancy, which means that devices, plug connectors, and wiring are present twice. Also, the network has a redundant layout which results in a kind of hot standby effect: if a device or the network itself fails, the system switches automatically over to a redundant one.

Figure 1. The x-light bypass is parallel connected to the subscriber via two optical duplex ports. If the subscriber connection fails, it will be physically bridged.

But this is often a complex and costly strategy. To solve this problem the ring topology was developed. In a ring topology, the data communication has one direction, but in case of an interruption it works the other direction. This maintains the function of the network. The ring topology, also often used in traffic management systems, builds in redundancy which ensures fast switching, achieving the premier class of safety against failure. In contrast to line topology it can cope with a single point of failure, i.e. the failure of one participant. But if there is a failure of another subscriber or more (multiple points of failure), even ring topology is overstrained. To avoid situations like this, networks are monitored with systems which display the state of the active components, like FiberView, and the condition of the individual fiber transmission lines, to detect excessive attenuation.

Optical bypass technology takes one step further because it starts at the network participant level. This could include all devices featuring an optical port. If one of them fails the bypass takes over and maintains the data communication between adjacent participants. Therefore, the only application affected is the one controlled by the failed subscriber. The remaining network continues to be kept in function physically, and therefore works even with multiple points of failure. This is also valid even if the bypass, which is powered either by the protected participant or a separate power supply, no longer receives any power at all.

So, how does this work? With optical bypass technology fiber transmission lines are switched over physically immediately after a failure occurs at the respective participant. The principle is similar to railway turnouts working with strong electromagnets: if no current flows the turnout automatically switches and this is why the bypass technology works even without any voltage which is the trick. Since the bypass technology works at the physical level of the network it is protocol transparent and vendor independent.

Figure 2. In normal operation, the optical bypass sends the data to the parallel connected subscriber (on top). In the case of failure, data is not transmitted to the output but to the second input (below).

X-light is parallel connected to the respective participant via two optical input and output duplex ports. In case of disturbance its differential relay sends a signal to the electrical port of x-light and thereby activates the bypass function. After that the data is not transmitted any longer to the faulty participant but to the next participant in the network, in other words, the participant is bridged physically. To reconnect it safely later on to the network, e.g. after booting, there is an individual adjustable turn-on delay.

With optical bypass technology, networks of traffic management systems are not only protected against the effects of hardware and software errors, breakdown of power supply, shortfall of defined values, and so on, but parts of the network can also be specifically disconnected, e.g. for maintenance work. For this purpose, a voltage is applied to the electrical port of the respective bypass and therefore to the linked participant. This disconnects the connected participant physically from the network without the need to disconnect fiber connectors. Disconnecting connectors could eventually cause problems because of dirt particles which could get into the link.

An optical bypass is not only of worth in traffic management systems but also in all cases where power failure could cause serious problems. This includes production lines in automotive industry, plants in the petrochemical sector, and wind farms. Since the x-light has been developed as stand-alone device, retrofitting is no problem and neither transmitting protocols nor manufacturer-specific standards play a role. Integrating the bypass function into an Ethernet switch or field bus converter would lose this flexibility despite the fact that it would be possible.


Related


Fluffing the Cloud

The synergistic development aspect of electronic design was very apparent these past weeks at the APEC and Embedded World shows, as engineers from around the globe came together in San Antonio, Texas,...

Powerful graphics in squared form factor

Figure 1. The all-in-one eN-GXSOC has been designed and developed for 24/7 use in harsh industrial environments and utilizes an innovative passive cooling system. AMD graphics technology is ent...

Artificial Intelligence on the Edge

This article introduces UP AI Edge, a platform which is fully powered by Intel technology and integrates: Intel Apollo Lake-I CPU, Intel Cyclone 10 gx FPGA, and Intel Movidius Myriad 2 VPU (Video ...

Make your IoT computing efficient and secure

Cloud, Edge and Fog computing is everywhere and everybody is talking about it. In industrial surroundings traditional server approaches cannot provide the required robustness for operation in harsh in...

 


Grammatech talks about the importance of software in engineering

In this video Mark Hermeling of Grammatech talks to Alix Paultre after the Embedded World show in Nuremberg about the importance of software verification for security and safety in electronic design. ...


Lattice Semi walks through their booth demos at Embedded World

In this video Lattice Semiconductor walks us through their booth demonstrations at Embedded World 2018. The live demonstrations include an operating IoT remote vehicle, a low-power network used for vi...


Maxim describes their latest security solution at Embedded World 2018

In this video Scott from Maxim Integrated describes their latest security solution at Embedded World 2018. In the live demo he shows the DS28E38 DeepCover Secure ECDSA Authenticator, an ECDSA public k...


Garz & Fricke at Embedded World 2018 - Embedded HMIs and SBCs “Made in Germany”

You are looking for a HMI-system or single components as touches, displays and ARM-based SBCs? Welcome at Garz & Fricke – the Embedded HMI Company! Our offering ranges from typical single co...


ECRIN Systems myOPALE: Remote Embedded Modular Computers

myOPALE™ offers disruptive technology to multiply capabilities of your next Embedded Computers in a smaller foot print thanks to PCI Express® over Cable interconnect, standard 5.25’&rs...


TechNexion rolls out embedded systems, modules, Android Things kits at Embedded World 2018

In this video John Weber of TechNexion talks to Alix Paultre about how the company helps its customers getting products to market faster. By choosing to work with TechNexion, developers can take advan...


Mike Barr talks cybersecurity

In this video Mike Barr, CEO of the Barr Group, talks to Alix Paultre about cybersecurity at the Embedded World conference in Nuremberg, Germany. Too many designers, even in critical spaces like milit...


Ted Marena of Microsemi talks about their scope-free on-chip debug tools

In this video Ted Marena of Microsemi talks about their scope-free on-chip debug tools with Alix Paultre at Embedded World 2018. SmartDebug tool works with the Microsemi FPGA array and SERDES without ...


Infineon demonstrates their iMotion motor control solution at Embedded World

In this video Infineon explains their latest  IMC100 series iMOTION motor control IC at Embedded World 2018 in Nuremberg. The device provides a ready-to-use solution for high-efficiency variable-...


Samsung goes over their new ARTIK IoT development system

In this video James Stansberry of Samsung talks to Alix Paultre about their ARTIK IoT development system at Embedded World in Nuremberg. The family of system-on-modules provide a complete, production-...


Cypress explains their latest low-power 32-bit Arm Cortex-M4 PSoC 6

In this video Allen Hawes of Cypress Semiconductor talks to Alix Paultre about their latest low-power 32-bit Arm Cortex-M4 PSoC 6, designed to provide a secure high-performance MCU for next-generation...