Professional Documents
Culture Documents
CAN History
INTRODUCTION
Agricultural machinery
Production line control systems
Machine tools
Large optical telescopes
Photo copiers
Medical systems
Paper making and processing machinery
Packaging machinery
Textile production machinery
even toys for children
Using CAN to network controllers, actuators, sensors,
and transducers, manufacturers of all the above-
mentioned computer controlled products have
benefited from:
Reduced design time (readily available, multi
sourced components, and tools)
Lower connection costs (lighter, smaller cables and
connectors)
Improved reliability (fewer connections.)
Safety:
The safety-related aspects of using CAN in cars
attracted the attention of manufacturers of medical
systems. Because of the inherent reliability of the
data transmission and the stringent safety
Robustness:
CAN will operate in extremely harsh environments
and the extensive error checking mechanisms ensure
Implementations of CAN
Communication is identical for all implementations of
CAN. However, there are two principal hardware
implementations.
The two implementation are known as Basic CAN and
Full CAN.
***Note***
The terms Basic CAN and Full CAN must not be
confused with the terms Standard CAN - also known
as Base Frame Format (11 bit identifier, Version 2.0A
Full CAN:
Full-CAN devices provide the whole hardware for
convenient acceptance filtering and message
management. For each message to be transmitted or
received these devices contain one so called
message object in which all information regarding
the message (e.g. identifier, data bytes etc.) are
stored. During the initialisation of the device, the
host CPU defines which messages are to be sent and
which
are to be received. Only if the CAN controller receives
a message whose identifier matches with one of the
identifiers of the programmed (receive-) message
objects the message is stored and the host CPU is
informed by interrupt. Another advantage is that
incoming Remote
Frames can be answered automatically by the Full-
CAN controller with the corresponding Data Frame. In
Network Sizes:
Error Detection
CAN implements five error detection mechanisms;
three at the message level and two at the bit level.
At the message level:
Cyclic Redundancy Checks (CRC)
Frame Checks
Acknowledgment Error Checks (ACK)
Frame Check:
There are certain predefined bit values that must be
transmitted at certain points within any CAN
Message Frame.
If a receiver detects an invalid bit in one of these
positions a Form Error (also known as a Format Error)
will be flagged.
Bit Monitoring:
Any transmitter automatically monitors and
compares the actual bit level on the bus with the
level that it transmitted. If the two are not the same,
a bit error is flagged. All nodes perform Bit
Monitoring: A Bit Error occurs if a transmitter sends a
dominant bit but detects a recessive bit on the bus
line or, sends a recessive bit but detects a dominant
bit on the bus line. An Error Frame is generated and
the message is repeated. When a dominant bit is
detected instead of a recessive bit, no error
occurs during the Arbitration Field or the
Acknowledge Slot because these fields must be able
to be overwritten by a dominant bit in order to
achieve arbitration and acknowledge functionality.
Bit Stuffing:
CAN uses a technique known as bit stuffing as a
check on communication integrity. After five
consecutive identical bit levels have been
transmitted, the transmitter will automatically inject
(stuff) a bit of the opposite polarity into the bit
stream. Receivers of the message will automatically
delete (de-stuff) such bits before processing the
message in any way.
Because of the bit stuffing rule, if any receiving node
detects six consecutive bits of the same level, a stuff
error is flagged. If six consecutive bits with the same
Error Frame:
If an error is detected by any node, using any and all
of the five mechanisms described above, the node
that detects the error aborts the transmission by
sending an Error Frame. This prevents any other
node from accepting the message and ensures
consistency of data throughout the network.
Error Confinement:
Error confinement is a mechanism which is
understood to be unique to CAN and provides a
method for discriminating between temporary errors
and permanent failures. Temporary errors may be
DEPARTMENT OF COMPUTER SCIENCEPage 30
Controller Area Network
Bit time:
As defined in ISO11898, the nominal time for each bit
in a CAN message frame is made up of four non-
overlapping time segments as shown below.
Synchronization
When any node receives a data frame or a remote
frame, it is necessary for the receiver to synchronize
with the transmitter.
The CAN 2.0 protocol was chosen by the SAE Truck &
Bus Control and Communications Network
Subcommittee
of the Truck & Bus Electrical Committee to support
its ``Recommended Practice for Serial Control and
Communciations Vehicle Network CLASS C'' called
the SAE J1939 specification. The SAE CLASS C
passenger car subcommittee is currently evaluating
CAN,
Vehicle Applications of
Controller Area Network
Introduction
Protocol extensions
Higher-layer protocols
CAN gateways
Control Applications
The number of CAN nodes sold per year is currently about 400 million.
(Data from the association CAN in Automation)
Perspectives
ARCHITECTURE
The enhanced Controller Area Network (eCAN)
module implemented in the C28x DSP is compatible
with the CAN 2.0B standard (active). It uses
established protocol to communicate serially with
other controllers in electrically noisy environments.
With 32 fully configurable mailboxes and
time−stamping feature, the eCAN module provides a
DEPARTMENT OF COMPUTER SCIENCEPage 58
Controller Area Network
Features
Memory Map
Message Objects
Message Mailbox
Receive Mailbox