Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method and device based on IEEE 1588 protocol

A verification method and protocol technology, applied in the field of verification methods and devices based on the IEEE1588 protocol, can solve problems such as difficult clock node control and difficult verification of time synchronization, and achieve the effect of simplifying verification steps and optimizing verification results

Inactive Publication Date: 2019-03-15
XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Or, use PPS (pulse-per-second), external auxiliary trigger and oscilloscope to verify the time synchronization system clock. Based on this, it can be seen that the first verification method, if there is no professional code recognition source equipment, it is difficult to verify the time synchronization is established. ; The second method is difficult to control the clock node through software to achieve the verification goal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device based on IEEE 1588 protocol
  • Verification method and device based on IEEE 1588 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solution of the present invention is clearly and completely described below in conjunction with the accompanying drawings.

[0025] Such as figure 1 As shown, the embodiment of the present invention provides a kind of verification method based on IEEE 1588 agreement, and described method comprises:

[0026] Step 101: Connect the clock alarm output terminal and the auxiliary trigger input terminal of the module under test, the module under test includes a master device and a slave device;

[0027] It should be noted that the clock alarm output terminals of the master device and the slave device are respectively interconnected with their corresponding auxiliary trigger input terminals.

[0028] Step 102: Outputting an alarm clock signal from the clock alarm output terminal;

[0029] Step 103: performing a time synchronization operation on the master device and the slave device in advance;

[0030] Specifically, based on the 1588 protocol, the time synchro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method based on an IEEE 1588 protocol. The verification method comprises steps of: connecting a clock alarm output end and an assisting trigger input end of a to-be-tested module, wherein the to-be-tested module comprises a master device and a slave device; outputting an alarm clock signal from the clock alarm output end; synchronizing time of the master device and the slave device in advance; configuring alarm time, and when the alarm time arrives, pulling up the alarm clock signal; separately acquiring a timestamp of a system clock of the master device and a timestamp of a system clock of the slave device through an assisting trigger operation; and comparing the timestamp of the system clock of the master device with the timestamp of the system clockof the slave device so as to obtain a final verification result.

Description

technical field [0001] The invention belongs to the technical field of integrated circuit design, and relates to a verification method and device based on the IEEE 1588 protocol. Background technique [0002] The 1588 protocol uses technologies such as network media communication, master device timing, slave computing, and distributed objects to achieve the highest sub-microsecond precision clock synchronization operation. When verifying the time synchronization of the master and slave devices, since it is difficult to use software to locate the time point of the time synchronization state, the verification result is difficult to obtain intuitively. [0003] Traditional time synchronization verification generally relies on the code recognition source to convert the system clock output by the device, and directly converts the 48bits / 60bits system clock output by the device into the year, month, day, hour, minute, and second, and then compares the clocks. Or, use PPS (pulse-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04J3/06
CPCH04J3/0667
Inventor 杨海波胡小婷蔡叶芳黎小玉曹朋朋王玉欢
Owner XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products