Seminar On CAN Bus Protocol (2015) - PPT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30
At a glance
Powered by AI
Some key takeaways from the document are that CAN bus is a multi-master serial communication protocol primarily used in automotive and industrial applications for reliable data exchange between electronic control units. It uses priority-based bit-wise arbitration and broadcast messaging with error detection capabilities.

Some of the main applications of CAN bus discussed in the document are automotive, military vehicles, industrial machinery, medical systems, agricultural machinery, marine control and navigation, and elevator control systems.

Arbitration in CAN bus works using a wired-AND mechanism, where if two nodes start transmitting simultaneously, the node with the lower ID number will win the arbitration and continue transmitting its message while the other node backs off and retries. This priority-based arbitration scheme allows messages with higher priority to be transmitted first.

Seminar on

CAN
Bus
Protocol

By Abhinaw Tiwari
CSE-12010330
Contents
 Introduction
 CAN Applications
 CAN Characteristics
 Message Types
 Arbitration
 CAN Data Protection
 Advantages
 Disadvantages
 Conclusion

-2-
Introduction

• Multi-master protocol

• Broadcasting

• Serial communication technology

• Priority-based bit-wise arbitration

-3-
Introduction

• Originally developed by Robert Bosch for


automobile in-vehicle network in the 1980s

• For reliable data exchange between ECUs

• Robust in noisy environments

• Cost effective

-4-
Introduction

• Compact and fast

• It is a message-based protocol.

• There are no defined addresses, just defined


messages.

-5-
Before CAN
After CAN
Real-world applications

-8-
Real-world applications
• Automotive
• Military vehicles
• Industrial machinery
• Medical systems
• Agricultural machinery
• Marine control and navigation
• Elevator control systems

-9-
CAN Characteristics
• All messages are broadcast
• Any node is allowed to broadcast a
message
• Each message contains an ID that
identifies the source or content of a
message
• Each receiver decides to process or
ignore each message

- 10 -
CAN Characteristics

Bit Rate / Bus Length


1M bit/sec 40 meters (131 feet)
500K bit/sec 100 meters (328 feet)
250K bit/sec 200 meters (656 feet)
125K bit/sec 500 meters (1640 feet)

- 11 -
CAN Characteristics
Physical Medium

Single twisted pair wire terminated on each end

Node Node
A B

120 Ω 120 Ω

- 12 -
CAN Characteristics
Network Size

• The maximum number of nodes is not


specified.
• Networks are limited by electrical loading,
up to 64 nodes is normal

- 13 -
CAN Message Types
Four Message Types
• Data Frame
– Used to transmit data
• Remote Frame
– Used to request data transmission
• Error Frame
– Sent by a node that detects an error
• Overload Frame
– Sent by a node to request a delay in
transmission
- 14 -
CAN Message Format

• Standard Data Frame

• Extended Data Frame


CAN Arbitration

• CSMA/CA

• All nodes must wait for an idle bus condition .

• If two nodes begin transmitting simultaneously,


they then participate in an arbitration process.

- 16 -
CAN Arbitration

• Wired-AND mechanism

• The node with the lower ID number wins the


arbitration and continues transmitting its
message.

• The loser of the arbitration backs off and re-tries.

- 17 -
CAN Arbitration
CSMA/CA & Wired-AND Logic

- 18 -
CAN Data Protection
CAN Data Protection-
Error Detection

• Bit Monitoring
 Sender Task
 Compares every bit placed on the CAN bus with the
actual bus level
 Discrepancy indicates a bit monitoring error and
results in error handling

- 19 -
CAN Data Protection
CAN Data Protection-
Error Detection

• Stuff Check
 Receiver Task
 Compares arriving bit stream for a sequence of six
homogeneous bits.
 Detection of a sixth homogeneous bit indicates bit
stuffing error and results in error handling

- 20 -
CAN Data Protection
CAN Data Protection-
Error Detection

• Form Check
 Receiver Task
 Comparison of the arriving bit stream with the
message format
 Detection of a dominant delimiter bit (CRC delimiter,
ACK delimiter) or a dominant bit within EOF
indicates a format error and results in error handling

- 21 -
CAN Data Protection
CAN Data Protection-
Error Detection

• Cyclic Redundancy Check


 Receiver Task
 Utilizes the arriving bit stream and generator
polynomial for the Cyclic Redundancy Check
defined in ISO 11898-1
 Detection of a CRC error results in error handling

- 22 -
CAN Data Protection
CAN Data Protection-
Error Detection

• ACK Check
 Sender Task
 Acknowledge error (ACK error) is detected if the
recessive level placed by the sender is not
overwritten
 Detection of an ACK error results in error handling

- 23 -
CAN Data Protection
Error Tracking

- 24 -
CAN Advantages

• High performance under light loads


• Low cost
• Reliable
• Robust

- 25 -
CAN Disadvantages

• Unfair access: Node with high priority can hog


the network
• Starvation for some particular nodes

- 26 -
Conclusion

• CAN is ideally suited in applications requiring a large


number of short messages with high reliability in
rugged operating environments.
• Because CAN is message-based and not address-
based, it is especially well-suited when data is
needed by more than one location and system-wide
data consistency is mandatory.

- 27 -
References

1. https://elearning.vector.com

2. https://slideshare.net

- 28 -
CAN Bus Protocol

Q&A

- 29 -
CAN Bus Protocol

Thank you!

- 30 -

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy