Figure 1. ECU Access to CAN bus

Size: px
Start display at page:

Download "Figure 1. ECU Access to CAN bus"

Transcription

1 Welcome to our 4th CAN Tech Tips feature (Sort of a Chinese New Year edition). In December we showed how the CAN frame is packaged before sending over the physical bus. In the edition we will cover the access method of the CAN bus, and how the protocol compensates for message collisions. For those who have missed the first 3 CAN Tech Tips, these can now be obtained from our archives on Also, this as a reminder that there are a few places available for our CAN and In-Vehicle Networks training on Wednesday February 19th. The January session was a sell-out, and with the addition of the Automotive lab using our Fiesta mock-up wiring harness station, it was a great success. There was a lot of stimulating discussion. For more info, please see our training page on: A date has been set for March as well 12 March 2014 Accessing the CAN bus Data bus, e.g. CAN ECU 1 ECU 2 ECU 3 ECU 4 Figure 1. ECU Access to CAN bus Last issue we talked about how the CAN frame is constructed into a nice small data package. Once this is done, the CAN controller will put this data package onto the CAN bus via the CAN transceiver. Before it does, the controller must check how busy the CAN bus is. All the ECUs are sharing this

2 virtual one wire system. As shown in the block diagram below (Figure 1), each ECU has access to this wire, and must contend for control of the wire (CAN bus). This is similar to a car trying to access a road at a junction. A node will access the road when there is space available. This newsletter will talk about how CAN messages access this contention-based bus architecture. We also discuss how CAN messages are prioritised, and how messages are dealt with when there is a collision between multiple messages. We also show an example of the result of a collision on a PicoScope display. Bus Access CSMA/CD Carrier Sense Multiple Access/Collision Detect When a node (ECU) is ready to send a CAN frame, it will sense the bus. If the bus is not busy with another message, the node will send the CAN message immediately, therefore taking command of the data bus. If the bus is already busy with a message from another ECU, the node will wait until that ECU if finished transmitting, and it will try to take over the bus with its CAN message. Figure 2 shows the flow of this access method, where node X is already transmitting on the bus when node Y attempts access the bus. Here node Y will sense that node X already has access to the bus, and node Y will wait until node X is finished. Then it will access the bus. From our notes in Tech Tip 3, we know that there is a minimum of 3 bits of interframe space after the EOF (End of Frame). This is to allow for a minor delay before other nodes can access the bus. Also interesting to note is the Network Latency Time in Figure 2. This shows the maximum delay a message will incur if the bus is busy. If we consider that Node Y tried accessing the bus just after Node X s SOF (Start of Frame), and consider that a typical CAN frame is between 100 to 150 bits long, the worst case delay due to busy bus is 150 x bit time. Now, in a typical powertrain configuration is operating at 500 Kbps. This means the bit time is 2 µsec (microseconds), and therefore the max latency will be approx. 150 x 2 µsec = 300 µsec. Figure 2. Access method to CAN bus

3 If two or more nodes attempt to transmit at the exact same time, a collision will occur. Every node senses the data it has transmitted. If there is a difference between what is transmitted and what is received, a collision is sensed. What happens next depends on the protocol. This is a typical data bus access method known as CSMA/CD Carrier Sense Multiple Access/Collision Detect. This method is used in Ethernet and CAN. In Ethernet, when a collision is detected, all nodes transmitting at the time will back off of the bus, go through a random time out, and retransmit their message. The random time out ensures these nodes do not retransmit at the same time. NDBA Non-Destructive Bitwise Arbitration CAN utilises CSMA/CD, but it also adds a method called Non-Destructive Bitwise Arbitration (NDBA). This is possible through the use of NRZ (Non-Return to Zero) digital signalling. This was covered back in Tech Tips 2. In CAN, the messages are prioritised by their respective identifiers. Recall back to Tech Tip 3, where we showed in the message format the Identifier (ID) was at the beginning, and it determined the priority of the message. The lower the ID value, the higher the priority. During Collision Detect in CAN, the message with the highest priority does not back off. It wins arbitration against the other nodes trying to transmit the same time as the high priority message. The lower priority messages will back off and retransmit when the highest priority message Is finished transmitting. An example of this method is shown in Figure 3. Here we can see that Nodes A (ID 1493), B ( ID 1501) and C (ID 2013) are accessing the CAN bus at the exact same time. They are arbitrating for the bus by matching each other bit for bit from Start of Frame (SOF). From my prior statement (the lower the ID, the higher the priority), it is obvious that Nodes A (ID 1493) will win arbitration.

4 Figure 3. Bitwise Arbitration At t1, it can be seen that Nodes A and B transmit a Dominant 0, and Node C transmits a Recessive 1. Since Dominant always overrides Recessive, Node C will see at its receiver a Dominant bit come back. At this point Node C has lost arbitration, and it will back off to become a receiver. It will attempt retransmission after this CAN frame. After t1, Nodes A and B are still on the bus, matching each other bit for bit. At t2, Node A transmits a Dominant 0 and Node B transmits a Recessive 1. Dominant overrides Recessive, and as a result, Node B will see the Dominant 0 come back to its receiver. At this point, Node B backs off to become a receiver to retransmit after this CAN frame. Node A has won arbitration and carries on transmitting its message without interruption. This ensures the throughput of high priority messages. Following Node 1 s finish of transmission, Nodes B and C will immediately access the bus, and they will arbitrate. Node B will win the arbitration, and when it finishes transmitting, Node C will access the bus. Using the timings mentioned earlier, Node C s worst case delay time will be approx. 600 µsec, so the whole process from the start of the collision to the EOF of Node C will be less than 1 msec (millisecond). The Oscilloscope illustration below in Figure 4 shows this back to back CAN frame relationship after and arbitration process. This is captured from a real situation our Ford Fiesta workshop mock up that we use in our training. Here you can see three back to back CAN messages as a result of a 3 way collision. Utilising the PicoScope s CAN decode feature, it can be seen that the first CAN message is ID 201 (highest priority), the second CAN message is ID 420, and the third CAN message is ID 620 (lowest priority).

5 Figure 4. CAN Collision Aftermath Here we illustrated how CAN frames (messages) access the CAN bus, and how the messages deal with collisions on the bus. The next CAN Tech Tip will discuss how this affects bus load, and the limitations of CAN. We will also talk about what happens when there is an error on the bus. Common Acronyms: CAN Controller Area Networks CAN_H CAN High CAN_L CAN Low CSMA/CD - Carrier Sense Multiple Access/Collision Detect ECU Electronic Control Unit EOF End of Frame Kbps Kilobits per Second ID - Identifier Inputs/Outputs of microcontrollers Mbps Megabits per Second NDBA Non-Destructive Bitwise Arbitration NRZ Non Return to Zero

CAN bus and NMEA2000 1

CAN bus and NMEA2000 1 NMEA2000 relation to CAN and how Warwick Control can help Richard McLaughlin B.Sc., M.Sc., CEng Dr Chris Quigley Warwick Control NMEA Conference 2016, Naples, Florida CAN bus and NMEA2000 1 Company Profile

More information

Controller Area Network

Controller Area Network Controller Area Network 1 CAN FUNDAMENTALS...3 1.1 USER BENEFITS...3 1.1.1 CAN is low cost...3 1.1.2 CAN is reliable...3 1.1.3 CAN means real-time...3 1.1.4 CAN is flexible...3 1.1.5 CAN means Multicast

More information

Course Introduction. Purpose. Objectives. Content. Learning Time

Course Introduction. Purpose. Objectives. Content. Learning Time Course Introduction Purpose This training course provides an overview of Message Frames and hardware issues of the Controller Area Network (CAN) technology used to build networked, multiprocessor embedded

More information

CONTROLLER AREA NETWORK (CAN)

CONTROLLER AREA NETWORK (CAN) GROUP 54C CONTROLLER AREA NETWORK (CAN) CONTENTS GENERAL INFORMATION........ 54C-2 STRUCTURE................... 54C-3 SELF-DIAGNOSIS............... 54C-6 CAN BUS DIAGNOSTICS......... 54C-6 OPERATION...................

More information

Introduction to Controller Area Network (CAN)

Introduction to Controller Area Network (CAN) Introduction to Controller Area Network (CAN) 2003 Microchip Technology Incorporated. All Rights Reserved. Introduction to Controller Area Network (CAN) 1 Topics CAN Protocol Overview What is CAN? CAN

More information

Additional Slides (informative)

Additional Slides (informative) Automation Systems Discrete Event Control Systems and Networked Automation Systems Additional Slides (informative) Application Automotive Networks (LIN, CAN, FlexRay, MOST) Vorlesungstitel Vehicle Bus

More information

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien

Operating Systems, Concurrency and Time. real-time communication and CAN. Johan Lukkien Operating Systems, Concurrency and Time real-time communication and CAN Johan Lukkien (Courtesy: Damir Isovic, Reinder Bril) Question Which requirements to communication arise from real-time systems? How

More information

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN? Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today

More information

The House Intelligent Switch Control Network based On CAN bus

The House Intelligent Switch Control Network based On CAN bus The House Intelligent Switch Control Network based On CAN bus A.S.Jagadish Department Electronics and Telecommunication Engineering, Bharath University Abstract The Embedded Technology is now in its prime

More information

UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN)

UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) UNDERSTANDING THE CONTROLLER AREA NETWORK (CAN) The unsuspecting troops had come under heavy enemy fire just before dawn and the garrison was caught totally by surprise. The fort commander had been awakened

More information

Controller area network

Controller area network Controller area network From Wikipedia, the free encyclopedia (Redirected from Controller area network) Controller area network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers

More information

The Controller Area Network (CAN) Interface

The Controller Area Network (CAN) Interface The Controller Area Network (CAN) Interface ARSLAB - Autonomous and Robotic Systems Laboratory Dipartimento di Matematica e Informatica - Università di Catania, Italy santoro@dmi.unict.it L.S.M. Course

More information

Communication (III) Kai Huang

Communication (III) Kai Huang Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet

More information

Communication Networks for the Next-Generation Vehicles

Communication Networks for the Next-Generation Vehicles Communication Networks for the, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 (313) 577-3855, smahmud@eng.wayne.edu January 13, 2005 4 th Annual Winter Workshop U.S.

More information

FlexRay and Automotive Networking Future

FlexRay and Automotive Networking Future FlexRay and Automotive Networking Future Chris Quigley Warwick Control Technologies Presentation Overview High Speed and High Integrity Networking Why FlexRay? CAN Problems Time Triggered Network Principles

More information

Real-Time Communications. LS 12, TU Dortmund

Real-Time Communications. LS 12, TU Dortmund Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application

Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Implementation and validation of SAE J1850 (VPW) protocol solution for diagnosis application Pallavi Pandurang Jadhav 1, Prof. S.N.Kore 2 1Department Of Electronics Engineering, Walchand College Of Engineering,

More information

An Introduction to CAN by Peter Bagschik (I+ME ACTIA)

An Introduction to CAN by Peter Bagschik (I+ME ACTIA) 1 of 11 24.10.00 14:36 An Introduction to CAN by Peter Bagschik (I+ME ACTIA) The CAN (Controller Area Network) protocol was developed in Europe for the use in passenger cars. Through the successful use

More information

CAN-FD Flexible Data Rate CAN

CAN-FD Flexible Data Rate CAN FD CAN-FD Flexible Data Rate CAN A Short Primer and Update V. 202-08-27 Agenda > Why CAN-FD? What is CAN-FD? Basic Concepts CAN-FD Specifics Data Frame Operating Modes/States Physical Layer Considerations

More information

Time Triggered CAN, Implementations, Development and Testing Tools

Time Triggered CAN, Implementations, Development and Testing Tools Time Triggered CAN, Implementations, Development and Testing Tools Chris Quigley, Ben Pope, James Finney, Richard T. McLaughlin Warwick Control Technologies ABSTRACT The Controller Area Network (CAN) has

More information

Collision Avoidance of Vehicle System Using CAN Protocol

Collision Avoidance of Vehicle System Using CAN Protocol Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

CAN Protocol Implementation

CAN Protocol Implementation CAN Protocol Implementation Arun Pasupathi, Gaurav Agalave Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland University, Rochester, MI e-mails: apasupathi@oakland.edu,

More information

Development of a CAN Slave Module with SystemC. Igor Sachs Shang Qihua

Development of a CAN Slave Module with SystemC. Igor Sachs Shang Qihua Development of a CAN Slave Module with SystemC Igor Sachs Shang Qihua Agenda 0. Motivation 1. Introduction to the CAN-Bus 1.1 The CAN Message Format (Frame) 1.2 Bus Arbitration 1.3 Bit Stuffing 2. Development

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

ISO INTERNATIONAL STANDARD. Road vehicles Controller area network (CAN) Part 3: Low-speed, fault-tolerant, medium-dependent interface

ISO INTERNATIONAL STANDARD. Road vehicles Controller area network (CAN) Part 3: Low-speed, fault-tolerant, medium-dependent interface INTERNATIONAL STANDARD ISO 11898-3 First edition 2006-06-01 Road vehicles Controller area network (CAN) Part 3: Low-speed, fault-tolerant, medium-dependent interface Véhicules routiers Gestionnaire de

More information

YASP Yet Another Scalable Protocol

YASP Yet Another Scalable Protocol YASP Yet Another Scalable Protocol (c) 2003 by José Francisco Castro June 14, 2003 Abstract YASP is a simple and open protocol to build networks with small microcontrollers The protocol is designed to

More information

Industrial Feedback cum Control System through CAN Protocol

Industrial Feedback cum Control System through CAN Protocol Industrial Feedback cum Control System through CAN Protocol Jaikaran Singh Assoc. Professor, ECE Mukesh Tiwari Assoc. Professor, ECE Manish Shrivastava M. Tech Scholar (VLSI) ABSTRACT Industrial automation

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

USER DRIVEN FEEDBACK CONTROL SYSTEM DRIVEN USING CAN PROTOCOL

USER DRIVEN FEEDBACK CONTROL SYSTEM DRIVEN USING CAN PROTOCOL USER DRIVEN FEEDBACK CONTROL SYSTEM DRIVEN USING CAN PROTOCOL ABHINAV PALIWAL 1, ASHISH KUMAR GUPTA 2 Fourth Sem M TECH Scholar, Embedded System Student, Oriental University, Indore Asst. Professor, Dept.

More information

Microprocessor Communication Module Connecting On Board Diagnostic System and Personal Computer

Microprocessor Communication Module Connecting On Board Diagnostic System and Personal Computer Microprocessor Communication Connecting On Board Diagnostic System and Personal Computer Nina Bencheva, Yordan Alexandrov Microprocessor Communication Connecting On Board Diagnostic System and Personal

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

Implementation of automotive CAN module requirements

Implementation of automotive CAN module requirements Implementation of automotive CAN module requirements Alan Devine, freescale semiconductors At first glance all CAN modules are very similar, the only difference being the number of message buffers which

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Shared Ethernet Networks

Shared Ethernet Networks Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a

More information

Recommended readings

Recommended readings Recommended readings Dominique Paret, Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire..., ISBN: 978-0- 470-03416-3, 434 pages, WILEY, UK, 2007. Wolfhard Lawrenz, CAN System Engineering:

More information

Implementation of CAN Bus Protocol

Implementation of CAN Bus Protocol Implementation of CAN Bus Protocol Ms. Ashwini S. Shinde ashushinde16@gmail.com Ms. Aarti S. Deshpande aartideshpande11@gmail.com Mr. Pradnyant N Kalamkar pnkalamkar4587@gmail.com Mr. Arjun R. Nichal arjunnichal@gmail.com

More information

Media Access Control. Networked Systems (H) Lecture 5

Media Access Control. Networked Systems (H) Lecture 5 Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted

More information

AUTOMOTIVE WAKEUP METHODS. Natalie Wienckowski September 2017 IEEE802.3 Interim

AUTOMOTIVE WAKEUP METHODS. Natalie Wienckowski September 2017 IEEE802.3 Interim AUTOMOTIVE WAKEUP METHODS Natalie Wienckowski September 2017 IEEE802.3 Interim AGENDA GENERAL WAKEUP REQUIREMENTS WAKE ON TRAFFIC PARTIAL NETWORK WAKEUP PSEUDO PARTIAL NETWORK SUMMARY Page 3 Page 5 Page

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

CAN protocol enhancement

CAN protocol enhancement Protocols CAN protocol enhancement This article describes the enhanced CAN protocol called CAN-HG and the features of the IC circuitry from Canis that implement it. CAN-HG has been designed to meet two

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Simplify CAN and LIN In-vehicle Network Testing

Simplify CAN and LIN In-vehicle Network Testing Simplify CAN and LIN In-vehicle Network Testing An in-vehicle network integrates many modules that interact with the environment, and process high and low speed information. As a result, testing this network

More information

AUTOMOBILE APPLICATIONS USING CAN PROTOCOL

AUTOMOBILE APPLICATIONS USING CAN PROTOCOL AUTOMOBILE APPLICATIONS USING CAN PROTOCOL 1 VEERESH B M, 2 JEEVAN C N, 3 MAHESH PATIL 1,2,3 Department of Electronics and Communication, G.S.S.I.T, Bangalore, India Abstract- The main objective of the

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Using CAN Arbitration for Electrical Layer Testing

Using CAN Arbitration for Electrical Layer Testing Using CAN Arbitration for Electrical Layer Testing Sam Broyles and Steve Corrigan, Texas Instruments, Inc. The Controller Area Network (CAN) protocol incorporates a powerful means of seamlessly preventing

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Controller Area Network (CAN)

Controller Area Network (CAN) Controller Area Network (CAN) EECS 461, Fall 2008 J. A. Cook J. S. Freudenberg 1 Introduction Up until now, we ve considered our embedded control system to be self-contained: an algorithm implemented in

More information

DCB1M - Transceiver for Powerline Communication

DCB1M - Transceiver for Powerline Communication Preliminary Description DCB1M - Transceiver for Powerline Communication The information in this data sheet is preliminary and may be changed without notice. 1. General The DCB1M is an innovative technology

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

CAN Node using HCS12

CAN Node using HCS12 CAN Node using HCS12 Ketan Kulkarni, Siddharth Dakshindas Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland University, Rochester, MI e-mails: krkulkarni@oakland.edu,

More information

MATLAB Expo Simulation Based Automotive Communication Design using MATLAB- SimEvent. Sudhakaran M Anand H General Motors

MATLAB Expo Simulation Based Automotive Communication Design using MATLAB- SimEvent. Sudhakaran M Anand H General Motors MATLAB Expo 2013 Simulation Based Automotive Communication Design using MATLAB- SimEvent Sudhakaran M Anand H General Motors 1 Agenda Introduction Different Analysis Methods Analytical vs. Simulation Approach

More information

1 November Basics of In-Vehicle Networking (IVN) Protocols

1 November Basics of In-Vehicle Networking (IVN) Protocols 1 November 2011 Basics of In-Vehicle Networking (IVN) Protocols Available IVN Protocols There are many Bus Systems used in a car but... "It is becoming clear that regardless of carmaker, new vehicles will

More information

Packet? No. SenseCarrier. Discard packet attempts < 16. attempts == 16

Packet? No. SenseCarrier. Discard packet attempts < 16. attempts == 16 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2001 Background: Single-Link Communication September 5 2001 Overview. These notes are intended

More information

MilCAN A. Data Link Layer Specification IHSDB-APP-GEN-D-031. Revision 4

MilCAN A. Data Link Layer Specification IHSDB-APP-GEN-D-031. Revision 4 MilCAN A Data Link Layer Specification IHSDB-APP-GEN-D-031 Revision 4 Cover + viii + 19 pages March 2003 This document may be downloaded from http://www.milcan.org Rev. 4 To request clarification of any

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Grundlagen der Automatisierungstechnik. 10. Signale und Kommunikation in der Automatisierungstechnik

Grundlagen der Automatisierungstechnik. 10. Signale und Kommunikation in der Automatisierungstechnik Grundlagen der Automatisierungstechnik (Automatisierungstechnik 1) 10. Signale und Kommunikation in der Automatisierungstechnik Outline Signals analogue vs. digital cyclic vs. event-driven Analogue vs.

More information

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch by Jeff Tyson If you have read other HowStuffWorks articles on networking or the Internet, then you know that a typical network consists of nodes (computers), a connecting medium (wired or wireless) and

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers

12.2. Figure 12.1 Data link layer divided into two functionality-oriented sublayers 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers 12.3 Figure 12.2 Taxonomy of multiple-access protocols discussed in this chapter 12-1 RANDOM ACCESS 12.4 In random access

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont... Media Access Protocols Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Shared Access Networks More than two nodes are attached to the same physical medium Normally span a small geographical

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Digital communication technology for teaching automatic control: the level control case

Digital communication technology for teaching automatic control: the level control case Digital communication technology for teaching automatic control: the level control case Nicolás H. Beltrán, Manuel A. Duarte-Mermoud and Pablo A. Kremer Department of Electrical Engineering, University

More information

Ch 7. Network Interface

Ch 7. Network Interface EE414 Embedded Systems Ch 7. Network Interface Part 1/2 Byung Kook Kim School of Electrical Engineering Korea Advanced Institute of Science and Technology Overview 7.1 Advanced Communication Principles

More information

COMP/ELEC 429/556 Fall 2017 Homework #1

COMP/ELEC 429/556 Fall 2017 Homework #1 COMP/ELEC 429/556 Fall 2017 Homework #1 Assigned 9/28/2017 Due 10/12/2017 11:55pm Submit Electronically to Canvas (Hard deadline, no slip day may be used) This homework is worth 10% of your final grade

More information

DISTRIBUTED REAL-TIME SYSTEMS

DISTRIBUTED REAL-TIME SYSTEMS Distributed Systems Fö 11/12-1 Distributed Systems Fö 11/12-2 DISTRIBUTED REAL-TIME SYSTEMS What is a Real-Time System? 1. What is a Real-Time System? 2. Distributed Real Time Systems 3. Predictability

More information

Design of the Control System about Central Signals in Electric Vehicle

Design of the Control System about Central Signals in Electric Vehicle J. Electromagnetic Analysis & Applications, 2010, 2: 189-194 doi:10.4236/jemaa.2010.23027 Published Online March 2010 (http://www.scirp.org/journal/jemaa) 1 Design of the Control System about Central Signals

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Accessing the shared! communication medium!! Media! Access! Conntrol!

Accessing the shared! communication medium!! Media! Access! Conntrol! Accessing the shared communication medium Media Access Conntrol 1 J. Kaiser, IVS-EOS Common Layering in the fieldbus area 7 7 application layer Service Access Point (SAP) 2 2 link layer 1 1 physical layer

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

Enhanced Error-Recovery CAN Bus System Using Reed-Solomon Codec

Enhanced Error-Recovery CAN Bus System Using Reed-Solomon Codec Journal of Network Intelligence c 2017 ISSN 2414-8105 (Online) Taiwan Ubiquitous Information Volume 2, Number 4, November 2017 Enhanced Error-Recovery CAN Bus System Using Reed-Solomon Codec Shi-Huang

More information

in Mainz (Germany) Sponsored by Allen Bradley National Semiconductor Philips Semiconductors Organized by

in Mainz (Germany) Sponsored by Allen Bradley National Semiconductor Philips Semiconductors Organized by 1 st international CAN Conference icc 1994 in Mainz (Germany) Sponsored by Allen Bradley National Semiconductor Philips Semiconductors Organized by CAN in Automation (CiA) international users and manufacturers

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448

CPE 448/548 Exam #1 (100 pts) February 14, Name Class: 448 Name Class: 448 1) (14 pts) A message M = 11001 is transmitted from node A to node B using the CRC code. The CRC generator polynomial is G(x) = x 3 + x 2 + 1 ( bit sequence 1101) a) What is the transmitted

More information

BOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart

BOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance and introduction of serial communication to more and more

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

ECE 653: Computer Networks Mid Term Exam all

ECE 653: Computer Networks Mid Term Exam all ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers

More information

DNA/DNR-CAN-503 Controller Area Network Layer. User Manual

DNA/DNR-CAN-503 Controller Area Network Layer. User Manual DNA/DNR-CAN-503 Controller Area Network Layer User Manual 4-Port, Controller Area Network (CAN) Layer for the PowerDNA Cube and RACKtangle chassis September 2009 Edition PN Man-DNx-503-0909 Version 3.8

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

An Overview of the Controller Area Network

An Overview of the Controller Area Network An Overview of the Controller Area Network José Rufino ruf@digitais.ist.utl.pt IST - UTL Abstract The Controller Area Network (CAN) is a communication bus for message transaction in small-scale distributed

More information

Application Note. Introduction. AN2255/D Rev. 0, 2/2002. MSCAN Low-Power Applications

Application Note. Introduction. AN2255/D Rev. 0, 2/2002. MSCAN Low-Power Applications Application Note Rev. 0, 2/2002 MSCAN Low-Power Applications by S. Robb 8/16-bit MCU Division Freescale, East Kilbride Introduction The Freescale Scalable Controller Area Network (MSCAN) is the specific

More information