Setha Pan-ngum. History of CAN [1] It was created in mid-1980s for automotive applications by Robert Bosch. Design goal was to make automobiles more reliable,

Slides:



Advertisements
Similar presentations
Contents Overview Data Information Frame Format Protocol
Advertisements

Data Link Protocols(HDLC & PPP). Data Link Protocols The set of specifications used to implement the DLL. DLL Protocols Synchronous Protocols Character-oriented.
HIGH-LEVEL DATA LINK CONTROL (HDLC) HDLC was defined by ISO for use on both point-to-point and multipoint data links. It supports full-duplex communication.
Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
Slide 1 Industrial Automation - Customer View - Training PhW - CANopen_en 02/ 2002 CANopen QUIZ CANopen QUIZ.
D Channel Data Link Protocol Link access procedure on the D channel - LAPD.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao Cleveland State University
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Host Data Layer 7 Application Interacts with software requiring network communications; identifies partners, resources and synchronization Layer 6 Presentation.
Dave Mills CANbus: A brief introduction Incorporating: The Fujitsu status Dave Mills Queen Mary, University of London.
CAN PROTOCOL Characterization Presentation
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
Medium Access Control Sublayer
 What is a Controller Area Network?  History of CAN  CAN communication protocol  Physical layer  ISO  CiA  CANopen  DeviceNet  Applying.
Gursharan Singh Tatla Transport Layer 16-May
EECS 373 Controller Area Networks Samuel Haberl Russell Kuczwara Senyuan Zhong.
SERIAL BUS COMMUNICATION PROTOCOLS
MODULE I NETWORKING CONCEPTS.
Controller Area Network Wilmer Arellano, Summer 2007
ECE 371 Controller Area Network (CAN) Overview. Controller Area Network The development of CAN began when more and more electronic devices were implemented.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Unit IV Data Link Control: Data link layer is the second layer in ISO OSI model. The two main functions of DLL are Data link control which deals with the.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
ECGR 6185 Advanced Embedded Systems Controller Area Network University Of North Carolina Charlotte Bipin Suryadevara.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
LOCAL AREA NETWORKS. MEDIUM ACCESS CONTROL All LANs and MANs consist of collections of devices that must share the network’s transmission capacity. Some.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
© 2009, Renesas Technology America, Inc., All Rights Reserved 1 Course Introduction  Purpose This training course provides an overview of Message Frames.
Data Link Layer : Services, Framing, Error Detection and Correction2.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
CCNA 1 v3.0 Module 6 Ethernet Fundamentals. Objectives.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Section 3 - Slide 1/19 P&T - GPS - Formation PhW - CANopen_lev1_en - 01/2004 History CANopen and the ISO model Physical layer Link layer Application layer.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
CAN Controller Area Network Wilmer Arellano, Summer 2007.
Ethernet Overview it the IEEE standard for Ethernet.
1 Lecture Controller Area Networks Dr. Tony Grift
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
An Introduction to CAN CAN Basics 2 Renesas Interactive
1 Copyright © 2014 Tata Consultancy Services Limited Controller Area Network (CAN) By Renukacharya A. Thakare.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Data Link Layer.
Controller Area Network
CAN ( Controller Area Network )
National Institute of Science & Technology TECHNICAL SEMINAR PRESENTATION Presented by TRUPTI RANJAN BEHERA Roll no: EI Under the Guidance of.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Controller Area Network (CAN Bus)
EA C451 (Internetworking Technologies)
Data Link Layer.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Data link layer (LLC).
Data Link Layer What does it do?
Chapter 12 Local Area Networks
CCNA 1 Chapter 5 Ethernet Fundamentals
Controller Area Networks (CAN)
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Ethernet and Token Ring LAN Networks
Data Link Layer. Position of the data-link layer.
Introduction Communication Modes Transmission Modes
Presentation transcript:

Setha Pan-ngum

History of CAN [1] It was created in mid-1980s for automotive applications by Robert Bosch. Design goal was to make automobiles more reliable, safer, and more fuel efficient. The latest CAN specification is the version 2.0 made in 1991.

Conventional Wiring (No Bus) [3] Serial Communication Links

A Simple CAN Application (Serial Bus) [3]

Conventional wiring [2]

With CAN [2]

CAN information [2]

Layered Approach in CAN (1 of 3) [1] Only the logical link and physical layers are described. Data link layer is divided into two sublayers: logical link control (LLC) and medium access control (MAC). LLC sublayer deals with message acceptance filtering, overload notification, and error recovery management. MAC sublayer presents incoming messages to the LLC sublayer and accepts messages to be transmitted forward by the LLC sublayer. MAC sublayer is responsible for message framing, arbitration, acknowledgement, error detection, and signaling. MAC sublayer is supervised by the fault confinement mechanism.

Layered Approach in CAN (2 of 3) [1] The physical layer defines how signals are actually transmitted, dealing with the description of bit timing, bit encoding, and synchronization. CAN bus driver/receiver characteristics and the wiring and connectors are not specified in the CAN protocol. System designer can choose from several different media to transmit the CAN signals.

Layered Approach in CAN (3 of 3) [1]

General Characteristics of CAN [1] (1 of 3) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Every node on the network must monitor the bus (carrier sense) for a period of no activity before trying to send a message on the bus. Once the bus is idle, every node has equal opportunity to transmit a message. If two nodes happen to transmit simultaneously, a nondestructive arbitration method is used to decide which node wins.

Binary Countdown (Bit dominance) [2]

Binary Countdown [4]

General Characteristics of CAN [1] (2 of 3) Message-Based Communication Each message contains an identifier. Identifiers allow messages to arbitrate and also allow each node to decide whether to work on the incoming message. The lower the value of the identifier, the higher the priority of the identifier. Each node uses one or more filters to compare the incoming messages to decide whether to take actions on the message. CAN protocol allows a node to request data transmission from other nodes. There is no need to reconfigure the system when a new node joins the system.

General Characteristics of CAN [1] (3 of 3) Error Detection and Fault Confinement The CAN protocol requires each node to monitor the CAN bus to find out if the bus value and the transmitted bit value are identical. The CRC checksum is used to perform error checking for each message. The CAN protocol requires the physical layer to use bit stuffing to avoid long sequence of identical bit value. Defective nodes are switched off from the CAN bus.

Types of CAN Messages (1 of 2) [1] Data frame Remote frame Error frame Overload frame

Types of CAN Messages (2 of 2) [1] Two states of CAN bus Recessive: high or logic 1 Dominant: low or logic 0

Data Frame [1] A data frame consists of seven fields: start-of-frame, arbitration, control, data, CRC, ACK, and end-of- frame.

Start of Frame [1] A single dominant bit to mark the beginning of a data frame. All nodes have to synchronize to the leading edge caused by this field.

Arbitration Field [1] There are two formats for this field: standard format and extended format. The identifier of the standard format corresponds to the base ID in the extended format. The RTR bit is the remote transmission request and must be 0 in a data frame. The SRR bit is the substitute remote request and is recessive. The IDE field indicates whether the identifier is extended and should be recessive in the extended format. The extended format also contains the 18-bit extended identifier.

Control Field [1] Contents are shown in figure The first bit is IDE bit for the standard format but is used as reserved bit r1 in extended format. r0 is reserved bit. DLC3…DLC0 stands for data length and can be from 0000 (0) to 1000 (8).

Data Field [1] May contain 0 to 8 bytes of data

CRC Field [1] It contains the 16-bit CRC sequence and a CRC delimiter. The CRC delimiter is a single recessive bit.

ACK Field [1] Consists of two bits The first bit is the acknowledgement bit. This bit is set to recessive by the transmitter, but will be reset to dominant if a receiver acknowledges the data frame. The second bit is the ACK delimiter and is recessive.

Remote Frame [1] Used by a node to request other nodes to send certain type of messages Has six fields as shown in Figure 13.7 These fields are identical to those of a data frame with the exception that the RTR bit in the arbitration field is recessive in the remote frame.

Error Frame [1] This frame consists of two fields. The first field is given by the superposition of error flags contributed from different nodes. The second field is the error delimiter. Error flag can be either active-error flag or passive-error flag. Active error flag consists of six consecutive dominant bits. Passive error flag consists of six consecutive recessive bits. The error delimiter consists of eight recessive bits.

Overload Frame [1] Consists of two bit fields: overload flag and overload delimiter Three different overload conditions lead to the transmission of the overload frame: Internal conditions of a receiver require a delay of the next data frame or remote frame. At least one node detects a dominant bit during intermission. A CAN node samples a dominant bit at the eighth bit (i.e., the last bit) of an error delimiter or overload delimiter. Format of the overload frame is shown in Figure The overload flag consists of six dominant bits. The overload delimiter consists of eight recessive bits.

Interframe Space (1 of 2) [1] Data frames and remote frames are separated from preceding frames by the interframe space. Overload frames and error frames are not preceded by an interframe space. The formats for interframe space is shown in Figure and

Interframe Space (2 of 2) [1] The intermission subfield consists of three recessive bits. During intermission no node is allowed to start transmission of the data frame or remote frame. The period of bus idle may be of arbitrary length. After an error-passive node has transmitted a frame, it sends eight recessive bits following intermission, before starting to transmit a new message or recognizing the bus as idle.

Message Filtering [1] A node uses filter (s) to decide whether to work on a specific message. Message filtering is applied to the whole identifier. A node can optionally implement mask registers that specify which bits in the identifier are examined with the filter. If mask registers are implemented, every bit of the mask registers must be programmable.

Bit Stream Encoding [1] The frame segments including start-of-frame, arbitration field, control field, data field, and CRC sequence are encoded by bit stuffing. Whenever a transmitter detects five consecutive bits of identical value in the bit stream to be transmitted, it inserts a complementary bit in the actual transmitted bit stream. The remaining bit fields of the data frame or remote frame (CRC delimiter, ACK field and end of frame) are of fixed form and not stuffed. The error frame and overload frame are also of fixed form and are not encoded by the method of bit stuffing. The bit stream in a message is encoded using the non-return-to-zero (NRZ) method. In the non-return-to-zero encoding method, a bit is either recessive or dominant.

Errors (1 of 3) [1] Error handling CAN recognizes five types of errors. Bit error A node that is sending a bit on the bus also monitors the bus. When the bit value monitored is different from the bit value being sent, the node interprets the situation as an error. There are two exceptions to this rule: A node that sends a recessive bit during the stuffed bit-stream of the arbitration field or during the ACK slot detects a dominant bit. A transmitter that sends a passive-error flag detects a dominant bit.

Errors (2 of 3) [1] Stuff error Six consecutive dominant or six consecutive recessive levels occurs in a message field. CRC error CRC sequence in the transmitted message consists of the result of the CRC calculation by the transmitter. The receiver recalculates the CRC sequence using the same method but resulted in a different value. This is detected as a CRC error.

Errors (3 of 3) [1] Form error Detected when a fixed-form bit field contains one or more illegal bits Acknowledgement error Detected whenever the transmitter does not monitor a dominant bit in the ACK slot Error Signaling A node that detects an error condition and signals the error by transmitting an error flag An error-active node will transmit an active-error flag. An error-passive node will transmit a passive-error flag.

Fault Confinement [1] A node may be in one of the three states: error-active, error-passive, and bus- off. A CAN node uses an error counter to control the transition among these three states. CAN protocol uses 12 rules to control the increment and decrement of the error counter. When the error count is less than 128, a node is in error-active state. When the error count equals or exceeds 128 but not higher 255, the node is in error-passive state. When the error count equals or exceeds 256, the node is in bus off state. An error-active node will transmit an active-error frame when detecting an error. An error-passive node will transmit a passive-error frame when detecting an error. A bus-off node is not allowed to take part in bus communication.

From [2]

CAN Benefits and Drawbacks [2]

References and slide sources 1. Huang Han-Way, The HCS12/9S12: An introduction 2. Koopman P, Controller Area Network (CAN) slides 3. Stone M, Controller Area Networks lecture slides, Oklahoma State University 4. Upender B, Koopman P, Communication protocols for embedded systems, Embedded systems programming, Nov 1994.