Figure 1. ECU Access to CAN bus
|
|
- Cora Greer
- 6 years ago
- Views:
Transcription
1 Welcome to our 4th CAN Tech Tips feature (Sort of a Chinese New Year edition). In December we showed how the CAN frame is packaged before sending over the physical bus. In the edition we will cover the access method of the CAN bus, and how the protocol compensates for message collisions. For those who have missed the first 3 CAN Tech Tips, these can now be obtained from our archives on Also, this as a reminder that there are a few places available for our CAN and In-Vehicle Networks training on Wednesday February 19th. The January session was a sell-out, and with the addition of the Automotive lab using our Fiesta mock-up wiring harness station, it was a great success. There was a lot of stimulating discussion. For more info, please see our training page on: A date has been set for March as well 12 March 2014 Accessing the CAN bus Data bus, e.g. CAN ECU 1 ECU 2 ECU 3 ECU 4 Figure 1. ECU Access to CAN bus Last issue we talked about how the CAN frame is constructed into a nice small data package. Once this is done, the CAN controller will put this data package onto the CAN bus via the CAN transceiver. Before it does, the controller must check how busy the CAN bus is. All the ECUs are sharing this
2 virtual one wire system. As shown in the block diagram below (Figure 1), each ECU has access to this wire, and must contend for control of the wire (CAN bus). This is similar to a car trying to access a road at a junction. A node will access the road when there is space available. This newsletter will talk about how CAN messages access this contention-based bus architecture. We also discuss how CAN messages are prioritised, and how messages are dealt with when there is a collision between multiple messages. We also show an example of the result of a collision on a PicoScope display. Bus Access CSMA/CD Carrier Sense Multiple Access/Collision Detect When a node (ECU) is ready to send a CAN frame, it will sense the bus. If the bus is not busy with another message, the node will send the CAN message immediately, therefore taking command of the data bus. If the bus is already busy with a message from another ECU, the node will wait until that ECU if finished transmitting, and it will try to take over the bus with its CAN message. Figure 2 shows the flow of this access method, where node X is already transmitting on the bus when node Y attempts access the bus. Here node Y will sense that node X already has access to the bus, and node Y will wait until node X is finished. Then it will access the bus. From our notes in Tech Tip 3, we know that there is a minimum of 3 bits of interframe space after the EOF (End of Frame). This is to allow for a minor delay before other nodes can access the bus. Also interesting to note is the Network Latency Time in Figure 2. This shows the maximum delay a message will incur if the bus is busy. If we consider that Node Y tried accessing the bus just after Node X s SOF (Start of Frame), and consider that a typical CAN frame is between 100 to 150 bits long, the worst case delay due to busy bus is 150 x bit time. Now, in a typical powertrain configuration is operating at 500 Kbps. This means the bit time is 2 µsec (microseconds), and therefore the max latency will be approx. 150 x 2 µsec = 300 µsec. Figure 2. Access method to CAN bus
3 If two or more nodes attempt to transmit at the exact same time, a collision will occur. Every node senses the data it has transmitted. If there is a difference between what is transmitted and what is received, a collision is sensed. What happens next depends on the protocol. This is a typical data bus access method known as CSMA/CD Carrier Sense Multiple Access/Collision Detect. This method is used in Ethernet and CAN. In Ethernet, when a collision is detected, all nodes transmitting at the time will back off of the bus, go through a random time out, and retransmit their message. The random time out ensures these nodes do not retransmit at the same time. NDBA Non-Destructive Bitwise Arbitration CAN utilises CSMA/CD, but it also adds a method called Non-Destructive Bitwise Arbitration (NDBA). This is possible through the use of NRZ (Non-Return to Zero) digital signalling. This was covered back in Tech Tips 2. In CAN, the messages are prioritised by their respective identifiers. Recall back to Tech Tip 3, where we showed in the message format the Identifier (ID) was at the beginning, and it determined the priority of the message. The lower the ID value, the higher the priority. During Collision Detect in CAN, the message with the highest priority does not back off. It wins arbitration against the other nodes trying to transmit the same time as the high priority message. The lower priority messages will back off and retransmit when the highest priority message Is finished transmitting. An example of this method is shown in Figure 3. Here we can see that Nodes A (ID 1493), B ( ID 1501) and C (ID 2013) are accessing the CAN bus at the exact same time. They are arbitrating for the bus by matching each other bit for bit from Start of Frame (SOF). From my prior statement (the lower the ID, the higher the priority), it is obvious that Nodes A (ID 1493) will win arbitration.
4 Figure 3. Bitwise Arbitration At t1, it can be seen that Nodes A and B transmit a Dominant 0, and Node C transmits a Recessive 1. Since Dominant always overrides Recessive, Node C will see at its receiver a Dominant bit come back. At this point Node C has lost arbitration, and it will back off to become a receiver. It will attempt retransmission after this CAN frame. After t1, Nodes A and B are still on the bus, matching each other bit for bit. At t2, Node A transmits a Dominant 0 and Node B transmits a Recessive 1. Dominant overrides Recessive, and as a result, Node B will see the Dominant 0 come back to its receiver. At this point, Node B backs off to become a receiver to retransmit after this CAN frame. Node A has won arbitration and carries on transmitting its message without interruption. This ensures the throughput of high priority messages. Following Node 1 s finish of transmission, Nodes B and C will immediately access the bus, and they will arbitrate. Node B will win the arbitration, and when it finishes transmitting, Node C will access the bus. Using the timings mentioned earlier, Node C s worst case delay time will be approx. 600 µsec, so the whole process from the start of the collision to the EOF of Node C will be less than 1 msec (millisecond). The Oscilloscope illustration below in Figure 4 shows this back to back CAN frame relationship after and arbitration process. This is captured from a real situation our Ford Fiesta workshop mock up that we use in our training. Here you can see three back to back CAN messages as a result of a 3 way collision. Utilising the PicoScope s CAN decode feature, it can be seen that the first CAN message is ID 201 (highest priority), the second CAN message is ID 420, and the third CAN message is ID 620 (lowest priority).
5 Figure 4. CAN Collision Aftermath Here we illustrated how CAN frames (messages) access the CAN bus, and how the messages deal with collisions on the bus. The next CAN Tech Tip will discuss how this affects bus load, and the limitations of CAN. We will also talk about what happens when there is an error on the bus. Common Acronyms: CAN Controller Area Networks CAN_H CAN High CAN_L CAN Low CSMA/CD - Carrier Sense Multiple Access/Collision Detect ECU Electronic Control Unit EOF End of Frame Kbps Kilobits per Second ID - Identifier Inputs/Outputs of microcontrollers Mbps Megabits per Second NDBA Non-Destructive Bitwise Arbitration NRZ Non Return to Zero
CAN bus and NMEA2000 1
NMEA2000 relation to CAN and how Warwick Control can help Richard McLaughlin B.Sc., M.Sc., CEng Dr Chris Quigley Warwick Control NMEA Conference 2016, Naples, Florida CAN bus and NMEA2000 1 Company Profile
More informationController Area Network
Controller Area Network 1 CAN FUNDAMENTALS...3 1.1 USER BENEFITS...3 1.1.1 CAN is low cost...3 1.1.2 CAN is reliable...3 1.1.3 CAN means real-time...3 1.1.4 CAN is flexible...3 1.1.5 CAN means Multicast
More informationCourse Introduction. Purpose. Objectives. Content. Learning Time
Course Introduction Purpose This training course provides an overview of Message Frames and hardware issues of the Controller Area Network (CAN) technology used to build networked, multiprocessor embedded
More informationCONTROLLER AREA NETWORK (CAN)
GROUP 54C CONTROLLER AREA NETWORK (CAN) CONTENTS GENERAL INFORMATION........ 54C-2 STRUCTURE................... 54C-3 SELF-DIAGNOSIS............... 54C-6 CAN BUS DIAGNOSTICS......... 54C-6 OPERATION...................
More informationIntroduction to Controller Area Network (CAN)
Introduction to Controller Area Network (CAN) 2003 Microchip Technology Incorporated. All Rights Reserved. Introduction to Controller Area Network (CAN) 1 Topics CAN Protocol Overview What is CAN? CAN
More informationAdditional Slides (informative)
Automation Systems Discrete Event Control Systems and Networked Automation Systems Additional Slides (informative) Application Automotive Networks (LIN, CAN, FlexRay, MOST) Vorlesungstitel Vehicle Bus
More informationOperating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien
Operating Systems, Concurrency and Time real-time communication and CAN Johan Lukkien (Courtesy: Damir Isovic, Reinder Bril) Question Which requirements to communication arise from real-time systems? How
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationThe House Intelligent Switch Control Network based On CAN bus
The House Intelligent Switch Control Network based On CAN bus A.S.Jagadish Department Electronics and Telecommunication Engineering, Bharath University Abstract The Embedded Technology is now in its prime
More informationUNDERSTANDING THE CONTROLLER AREA NETWORK (CAN)
UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) The unsuspecting troops had come under heavy enemy fire just before dawn and the garrison was caught totally by surprise. The fort commander had been awakened
More informationController area network
Controller area network From Wikipedia, the free encyclopedia (Redirected from Controller area network) Controller area network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers
More informationThe Controller Area Network (CAN) Interface
The Controller Area Network (CAN) Interface ARSLAB - Autonomous and Robotic Systems Laboratory Dipartimento di Matematica e Informatica - Università di Catania, Italy santoro@dmi.unict.it L.S.M. Course
More informationCommunication (III) Kai Huang
Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet
More informationCommunication Networks for the Next-Generation Vehicles
Communication Networks for the, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 (313) 577-3855, smahmud@eng.wayne.edu January 13, 2005 4 th Annual Winter Workshop U.S.
More informationFlexRay and Automotive Networking Future
FlexRay and Automotive Networking Future Chris Quigley Warwick Control Technologies Presentation Overview High Speed and High Integrity Networking Why FlexRay? CAN Problems Time Triggered Network Principles
More informationReal-Time Communications. LS 12, TU Dortmund
Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationImplementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application
Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Pallavi Pandurang Jadhav 1, Prof. S.N.Kore 2 1Department Of Electronics Engineering, Walchand College Of Engineering,
More informationAn Introduction to CAN by Peter Bagschik (I+ME ACTIA)
1 of 11 24.10.00 14:36 An Introduction to CAN by Peter Bagschik (I+ME ACTIA) The CAN (Controller Area Network) protocol was developed in Europe for the use in passenger cars. Through the successful use
More informationCAN-FD Flexible Data Rate CAN
FD CAN-FD Flexible Data Rate CAN A Short Primer and Update V. 202-08-27 Agenda > Why CAN-FD? What is CAN-FD? Basic Concepts CAN-FD Specifics Data Frame Operating Modes/States Physical Layer Considerations
More informationTime Triggered CAN, Implementations, Development and Testing Tools
Time Triggered CAN, Implementations, Development and Testing Tools Chris Quigley, Ben Pope, James Finney, Richard T. McLaughlin Warwick Control Technologies ABSTRACT The Controller Area Network (CAN) has
More informationCollision Avoidance of Vehicle System Using CAN Protocol
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCAN Protocol Implementation
CAN Protocol Implementation Arun Pasupathi, Gaurav Agalave Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland University, Rochester, MI e-mails: apasupathi@oakland.edu,
More informationDevelopment of a CAN Slave Module with SystemC. Igor Sachs Shang Qihua
Development of a CAN Slave Module with SystemC Igor Sachs Shang Qihua Agenda 0. Motivation 1. Introduction to the CAN-Bus 1.1 The CAN Message Format (Frame) 1.2 Bus Arbitration 1.3 Bit Stuffing 2. Development
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x
ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha
More informationISO INTERNATIONAL STANDARD. Road vehicles Controller area network (CAN) Part 3: Low-speed, fault-tolerant, medium-dependent interface
INTERNATIONAL STANDARD ISO 11898-3 First edition 2006-06-01 Road vehicles Controller area network (CAN) Part 3: Low-speed, fault-tolerant, medium-dependent interface Véhicules routiers Gestionnaire de
More informationYASP Yet Another Scalable Protocol
YASP Yet Another Scalable Protocol (c) 2003 by José Francisco Castro June 14, 2003 Abstract YASP is a simple and open protocol to build networks with small microcontrollers The protocol is designed to
More informationIndustrial Feedback cum Control System through CAN Protocol
Industrial Feedback cum Control System through CAN Protocol Jaikaran Singh Assoc. Professor, ECE Mukesh Tiwari Assoc. Professor, ECE Manish Shrivastava M. Tech Scholar (VLSI) ABSTRACT Industrial automation
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationProblem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.
Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access
More informationUSER DRIVEN FEEDBACK CONTROL SYSTEM DRIVEN USING CAN PROTOCOL
USER DRIVEN FEEDBACK CONTROL SYSTEM DRIVEN USING CAN PROTOCOL ABHINAV PALIWAL 1, ASHISH KUMAR GUPTA 2 Fourth Sem M TECH Scholar, Embedded System Student, Oriental University, Indore Asst. Professor, Dept.
More informationMicroprocessor Communication Module Connecting On Board Diagnostic System and Personal Computer
Microprocessor Communication Connecting On Board Diagnostic System and Personal Computer Nina Bencheva, Yordan Alexandrov Microprocessor Communication Connecting On Board Diagnostic System and Personal
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationCSMA/CD (Collision Detection)
CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed
More informationImplementation of automotive CAN module requirements
Implementation of automotive CAN module requirements Alan Devine, freescale semiconductors At first glance all CAN modules are very similar, the only difference being the number of message buffers which
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationRecommended readings
Recommended readings Dominique Paret, Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire..., ISBN: 978-0- 470-03416-3, 434 pages, WILEY, UK, 2007. Wolfhard Lawrenz, CAN System Engineering:
More informationImplementation of CAN Bus Protocol
Implementation of CAN Bus Protocol Ms. Ashwini S. Shinde ashushinde16@gmail.com Ms. Aarti S. Deshpande aartideshpande11@gmail.com Mr. Pradnyant N Kalamkar pnkalamkar4587@gmail.com Mr. Arjun R. Nichal arjunnichal@gmail.com
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationAUTOMOTIVE WAKEUP METHODS. Natalie Wienckowski September 2017 IEEE802.3 Interim
AUTOMOTIVE WAKEUP METHODS Natalie Wienckowski September 2017 IEEE802.3 Interim AGENDA GENERAL WAKEUP REQUIREMENTS WAKE ON TRAFFIC PARTIAL NETWORK WAKEUP PSEUDO PARTIAL NETWORK SUMMARY Page 3 Page 5 Page
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationCAN protocol enhancement
Protocols CAN protocol enhancement This article describes the enhanced CAN protocol called CAN-HG and the features of the IC circuitry from Canis that implement it. CAN-HG has been designed to meet two
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationSimplify CAN and LIN In-vehicle Network Testing
Simplify CAN and LIN In-vehicle Network Testing An in-vehicle network integrates many modules that interact with the environment, and process high and low speed information. As a result, testing this network
More informationAUTOMOBILE APPLICATIONS USING CAN PROTOCOL
AUTOMOBILE APPLICATIONS USING CAN PROTOCOL 1 VEERESH B M, 2 JEEVAN C N, 3 MAHESH PATIL 1,2,3 Department of Electronics and Communication, G.S.S.I.T, Bangalore, India Abstract- The main objective of the
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationUsing CAN Arbitration for Electrical Layer Testing
Using CAN Arbitration for Electrical Layer Testing Sam Broyles and Steve Corrigan, Texas Instruments, Inc. The Controller Area Network (CAN) protocol incorporates a powerful means of seamlessly preventing
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationController Area Network (CAN)
Controller Area Network (CAN) EECS 461, Fall 2008 J. A. Cook J. S. Freudenberg 1 Introduction Up until now, we ve considered our embedded control system to be self-contained: an algorithm implemented in
More informationDCB1M - Transceiver for Powerline Communication
Preliminary Description DCB1M - Transceiver for Powerline Communication The information in this data sheet is preliminary and may be changed without notice. 1. General The DCB1M is an innovative technology
More informationCertified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationCAN Node using HCS12
CAN Node using HCS12 Ketan Kulkarni, Siddharth Dakshindas Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland University, Rochester, MI e-mails: krkulkarni@oakland.edu,
More informationMATLAB Expo Simulation Based Automotive Communication Design using MATLAB- SimEvent. Sudhakaran M Anand H General Motors
MATLAB Expo 2013 Simulation Based Automotive Communication Design using MATLAB- SimEvent Sudhakaran M Anand H General Motors 1 Agenda Introduction Different Analysis Methods Analytical vs. Simulation Approach
More information1 November Basics of In-Vehicle Networking (IVN) Protocols
1 November 2011 Basics of In-Vehicle Networking (IVN) Protocols Available IVN Protocols There are many Bus Systems used in a car but... "It is becoming clear that regardless of carmaker, new vehicles will
More informationPacket? No. SenseCarrier. Discard packet attempts < 16. attempts == 16
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2001 Background: Single-Link Communication September 5 2001 Overview. These notes are intended
More informationMilCAN A. Data Link Layer Specification IHSDB-APP-GEN-D-031. Revision 4
MilCAN A Data Link Layer Specification IHSDB-APP-GEN-D-031 Revision 4 Cover + viii + 19 pages March 2003 This document may be downloaded from http://www.milcan.org Rev. 4 To request clarification of any
More informationModule 5 Local Area Networks
Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the
More informationCollege of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435
College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationGrundlagen der Automatisierungstechnik. 10. Signale und Kommunikation in der Automatisierungstechnik
Grundlagen der Automatisierungstechnik (Automatisierungstechnik 1) 10. Signale und Kommunikation in der Automatisierungstechnik Outline Signals analogue vs. digital cyclic vs. event-driven Analogue vs.
More informationImage courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch
by Jeff Tyson If you have read other HowStuffWorks articles on networking or the Internet, then you know that a typical network consists of nodes (computers), a connecting medium (wired or wireless) and
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More information12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers
12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers 12.3 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter 12-1 RANDOM ACCESS 12.4 In random access
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationProbabilistic Worst-Case Response-Time Analysis for the Controller Area Network
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering
More informationShared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...
Media Access Protocols Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Shared Access Networks More than two nodes are attached to the same physical medium Normally span a small geographical
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationDigital communication technology for teaching automatic control: the level control case
Digital communication technology for teaching automatic control: the level control case Nicolás H. Beltrán, Manuel A. Duarte-Mermoud and Pablo A. Kremer Department of Electrical Engineering, University
More informationCh 7. Network Interface
EE414 Embedded Systems Ch 7. Network Interface Part 1/2 Byung Kook Kim School of Electrical Engineering Korea Advanced Institute of Science and Technology Overview 7.1 Advanced Communication Principles
More informationCOMP/ELEC 429/556 Fall 2017 Homework #1
COMP/ELEC 429/556 Fall 2017 Homework #1 Assigned 9/28/2017 Due 10/12/2017 11:55pm Submit Electronically to Canvas (Hard deadline, no slip day may be used) This homework is worth 10% of your final grade
More informationDISTRIBUTED REAL-TIME SYSTEMS
Distributed Systems Fö 11/12-1 Distributed Systems Fö 11/12-2 DISTRIBUTED REAL-TIME SYSTEMS What is a Real-Time System? 1. What is a Real-Time System? 2. Distributed Real Time Systems 3. Predictability
More informationDesign of the Control System about Central Signals in Electric Vehicle
J. Electromagnetic Analysis & Applications, 2010, 2: 189-194 doi:10.4236/jemaa.2010.23027 Published Online March 2010 (http://www.scirp.org/journal/jemaa) 1 Design of the Control System about Central Signals
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationProblem 7. Problem 8. Problem 9
Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate
More informationAccessing the shared! communication medium!! Media! Access! Conntrol!
Accessing the shared communication medium Media Access Conntrol 1 J. Kaiser, IVS-EOS Common Layering in the fieldbus area 7 7 application layer Service Access Point (SAP) 2 2 link layer 1 1 physical layer
More informationNetworking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.
Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local
More informationEnhanced Error-Recovery CAN Bus System Using Reed-Solomon Codec
Journal of Network Intelligence c 2017 ISSN 2414-8105 (Online) Taiwan Ubiquitous Information Volume 2, Number 4, November 2017 Enhanced Error-Recovery CAN Bus System Using Reed-Solomon Codec Shi-Huang
More informationin Mainz (Germany) Sponsored by Allen Bradley National Semiconductor Philips Semiconductors Organized by
1 st international CAN Conference icc 1994 in Mainz (Germany) Sponsored by Allen Bradley National Semiconductor Philips Semiconductors Organized by CAN in Automation (CiA) international users and manufacturers
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationCPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448
Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted
More informationBOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart
CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance and introduction of serial communication to more and more
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationDNA/DNR-CAN-503 Controller Area Network Layer. User Manual
DNA/DNR-CAN-503 Controller Area Network Layer User Manual 4-Port, Controller Area Network (CAN) Layer for the PowerDNA Cube and RACKtangle chassis September 2009 Edition PN Man-DNx-503-0909 Version 3.8
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationAn Overview of the Controller Area Network
An Overview of the Controller Area Network José Rufino ruf@digitais.ist.utl.pt IST - UTL Abstract The Controller Area Network (CAN) is a communication bus for message transaction in small-scale distributed
More informationApplication Note. Introduction. AN2255/D Rev. 0, 2/2002. MSCAN Low-Power Applications
Application Note Rev. 0, 2/2002 MSCAN Low-Power Applications by S. Robb 8/16-bit MCU Division Freescale, East Kilbride Introduction The Freescale Scalable Controller Area Network (MSCAN) is the specific
More information