www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...
You are here : design-reuse-embedded.com  > Automotive, Avionics and High safety  > Avionics

Babelya - Safe & Secure Ethernet ARINC664P7 1588 Switch/Router

All Silicon IP

Overview

High Performance, Safe and Cyber secure by Design Ethernet Router

High Performace: 100% electronic hardware design means, no software, no malicious code, not hackable. The hardware processing is able to handle high Ethernet throughput up to 10Gbps with a typical short latency of 2 µs. With Cetrac architecture, all interfaces have their own ressources in starving mode which are allocated to each data flows to ensure maximum and continuous performance over the time.

Secure by design: The Babelya™ router product integrates the patented CetraC® technology. Our softwareless technology is from its inception designed to guarentee data flow segregation. Each entering frame is filtered with configurable rules (MAC, IP, protocol, frame size, bandwith usage, etc.). Babelya allows mixed criticality applications to share the same network and gives huge gains in size, complexity and power. All these features are obviously the perfect answers to cyber security issues.

Safety is everywhere: Babelya™ implements design technics to build a fault tolerant system. Code checking and correction are enabled for each frame. Rendudancy flow management is built in for all ports. Full status and monitored events are reported. Two 28V power supplies are supported.

The CetraC core technology is pure hardware embedded into a single FPGA. It works as a level/level3 Ethernet switch for which precise route configuration guaranties a targeted behavior. Specific Mac addresses and IP addresses, authorized protocols by route and bandwidth usage are guaranteed by the pure state machine implementation.

By specifying one way routes network diode behavior can be easily achieved in order to separate efficiently different network zones.

During operation time no configuration can be changed so you can be sure that what you decided is what happens. If any not authorized data or device plugging occurs, you can configure the device to be instantly aware by receiving event status frames. In order to protect your data, you can also configure the routes to encrypt and / or decrypt the flows using AES256 method or specific encryption algorithm on demand.

Finally as the configuration itself is a sensitive asset, the loading process is secured by dynamic key generation, loader authentication and configuration encrypting.

Babelya™ is the central element of your cyber-secure network.

Partner with us

 

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2020 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.