SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
Controller area network
 Introduction
 CAN history
 CAN Data frames
 Arbitration
 Control and Data fields
 Before CAN
 After CAN
 Applications
 Advantages
 Limitations
 The CAN is serial communication protocol that supports real time systems with
high reliability. It detects the collisions; it also detects the errors, retransmits
corrupt messages and gives priority to the received and transmitted messages.
 The identifier length can be either 11 bits or 29 bits and the data length can vary
from 0 to 8 bytes.
 The fast growing use of the CAN protocol in the Industrial applications resulted in
development of the CAN based network.
 It is a message based communication, not address base.
 In CAN based distributed control system, the major problem is the size of
distributed area. The maximum speed of the CAN protocol is 1mbps for 50metres
and 500kbps for 100metres. Sleep mode and wakeup are available options for
each node to reduce power consumption.
 Bosch originally developed and released
CAN to address automotive network
requirements to reduce the cost and weight
of vehicle wiring harnesses . The first
release of the protocol came in 1985.
 In the 1990s CAN was standardized by ISO
11898.
The CAN data frame is composed of seven fields:
SOF :Start of Frame
RTR :Remote Transmission Request
CRC :Cyclic Redundancy Check
EOF :End of Frame
CAN message bits are referred to as “dominant” (0) or
“recessive” (1). The SOF field consists of one
dominant bit.
All network nodes waiting to transmit synchronize with
the SOF and begin transmitting at the same time. An
arbitration scheme determines which of the nodes
attempting to transmit will actually control the bus.
SO
F
Identifier RTR Control Data CRC EOF
Controller area network
 The arbitration field of the CAN message consists of an
11- or 29-bit identifier and a remote transmission(RTR)
bit. The CAN arbitration scheme is called “carrier sense
multiple access with collision detection”or CSMA/CD,
and assures that the highest priority message is
broadcast.
 Message priority is determined by the numerical value of
the identifier in the arbitration field, with the lowest
numerical value having the highest priority.
 Non-destructive, bit-wise arbitration resolves conflicts
among competing transmitters. This means that the bus
can be thought of as acting like an AND gate: If any
node writes a dominant (0) bit on the bus, every node
will read a dominant bit regardless of the value written
by that node.
 Every transmitting node always reads back the bus
value for each bit transmitted. If a node transmits a
recessive bit and reads back a dominant bit, it
immediately stops transmitting.
 The RTR bit simply distinguishes between data
frames and remote frames. In data frames, the RTR
bit must be dominant; in remote frames it must be
recessive.
 Arbitration is illustrated in the following Figure.
 The control field of the data frame consists of 6
bits (of which only the lower 4 are used) that
indicate the amount of data in the message.
 Since up to 8 bytes of data may be sent in one
message, the control field may take values
ranging from 000000 to 000111.
 The data to be transmitted are contained in the
data field.
 The most significant bit (MSB) of a data byte is
sent first.
Controller area network
Controller area network
Controller area network
 It reduces wiring since it is a distributed control and this
ensures enhancing of the system performance.
 Many CAN chip manufactures provided the data link
layer and the physical layer interfaced to the chip and all
the software developer needs to do only is to develop
the application coding.
 It provides the ability to work in different electrical
environment and ensures noise free transmission.
 Traffic congestion is eliminated as the messages are
transmitted based on their priority and it allows the
entire network to meet the timing constraints.
 It provides for error free transmission as each node can
check for errors during the transmission of the message
and send the error frame.
 Unfair access- node with a high priority can
“hog” the network.
 Poor latency for low priority nodes.
 The physical length limitation of the CAN bus
is 2km at the rate of 20kbps.
CAN is ideally suited in applications requiring
a large of short messages with high reliability
in rugged operating environments. Because
CAN is message based not address based
,it is especially well suited when data is
needed by more than one location and
system-wide data consistency is mandatory.
 https://www.elprocus.com
 SLIDESHARE: by V.Phani Krishna
 Controller Area Network (CAN): EECS 461, Fall
2008,J. A. Cook ,J. S. Freudenberg
 Vehicle Applications of Controller Area Network
:Karl Henrik Johansson , Martin T¨orngren ,
Lars Nielsen
 www.ijetae.com
Controller area network

More Related Content

PPTX
Can bus
PPTX
Ca npp t
PPT
CAN- controlled area network
PDF
Can Bus communication Protocol
ODP
Control Area Network
PPTX
Controller Area Network (Basic Level Presentation)
Can bus
Ca npp t
CAN- controlled area network
Can Bus communication Protocol
Control Area Network
Controller Area Network (Basic Level Presentation)

What's hot (20)

PPTX
Controller area network (can bus)
PPTX
PDF
Can Protocol For Automobiles
PPTX
Comparison Between CAN and CAN FD
PDF
Can overview
PPTX
Controller area network -ppt
PPT
Role of CAN BUS in automotives
PPTX
Can bus m.n.r
PPTX
Controller Area Network (CAN) Protocol || Automotive Electronics || Hariharan K
PPTX
Controller Area Network(CAN)
PPTX
Can Transport Protocol : UDS
PPTX
Thesis Presentation
PPTX
CAN (Controller Area Network)
PPTX
Communication stack
PPTX
CAN FD Software Stack Integration
PPTX
Controller area network
PPT
CAN (Controller Area Network) Bus Protocol
PPT
Controller area network (CAN bus) ppt
PDF
What is AUTOSAR MCAL? Learn about the software module architecture and device...
PPTX
Vehicular ad hoc network - VANET
Controller area network (can bus)
Can Protocol For Automobiles
Comparison Between CAN and CAN FD
Can overview
Controller area network -ppt
Role of CAN BUS in automotives
Can bus m.n.r
Controller Area Network (CAN) Protocol || Automotive Electronics || Hariharan K
Controller Area Network(CAN)
Can Transport Protocol : UDS
Thesis Presentation
CAN (Controller Area Network)
Communication stack
CAN FD Software Stack Integration
Controller area network
CAN (Controller Area Network) Bus Protocol
Controller area network (CAN bus) ppt
What is AUTOSAR MCAL? Learn about the software module architecture and device...
Vehicular ad hoc network - VANET
Ad

Similar to Controller area network (20)

PPTX
CAN BUS.pptx
PPT
PDF
IJSTEV2I12120
PDF
Can basics
PPTX
Introduction_to_CAN_Protocol: Basics.pptx
PDF
Automotive Networks : A Review
PPTX
Controller Area Network (CAN) Different Types
PPTX
Can network development using arm cortex m3
PPTX
Can network development using arm cortex m3
PPTX
PDF
Embedded One.pdf
DOCX
11.chapters
PPTX
Frame relay
PPTX
Shubham chakravarty ppt_wcan
PPTX
CN-Unit_2-DLL-Etherne nnnnnnnnnnnt .pptx
PPTX
7.MODBus and CANBus.pptx
PPTX
CONNECTED vehicle ECU.pptx
PPTX
INTRODUCTION TO WIRELESS NETWORKING
PDF
14 12 may17 18nov16 13396 m f hashmi
PDF
Lasseq f can
CAN BUS.pptx
IJSTEV2I12120
Can basics
Introduction_to_CAN_Protocol: Basics.pptx
Automotive Networks : A Review
Controller Area Network (CAN) Different Types
Can network development using arm cortex m3
Can network development using arm cortex m3
Embedded One.pdf
11.chapters
Frame relay
Shubham chakravarty ppt_wcan
CN-Unit_2-DLL-Etherne nnnnnnnnnnnt .pptx
7.MODBus and CANBus.pptx
CONNECTED vehicle ECU.pptx
INTRODUCTION TO WIRELESS NETWORKING
14 12 may17 18nov16 13396 m f hashmi
Lasseq f can
Ad

Recently uploaded (20)

PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Mechanical Engineering MATERIALS Selection
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PPTX
Lecture Notes Electrical Wiring System Components
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Geodesy 1.pptx...............................................
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mechanical Engineering MATERIALS Selection
Automation-in-Manufacturing-Chapter-Introduction.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original
Lecture Notes Electrical Wiring System Components
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
Embodied AI: Ushering in the Next Era of Intelligent Systems
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Geodesy 1.pptx...............................................

Controller area network

  • 2.  Introduction  CAN history  CAN Data frames  Arbitration  Control and Data fields  Before CAN  After CAN  Applications  Advantages  Limitations
  • 3.  The CAN is serial communication protocol that supports real time systems with high reliability. It detects the collisions; it also detects the errors, retransmits corrupt messages and gives priority to the received and transmitted messages.  The identifier length can be either 11 bits or 29 bits and the data length can vary from 0 to 8 bytes.  The fast growing use of the CAN protocol in the Industrial applications resulted in development of the CAN based network.  It is a message based communication, not address base.  In CAN based distributed control system, the major problem is the size of distributed area. The maximum speed of the CAN protocol is 1mbps for 50metres and 500kbps for 100metres. Sleep mode and wakeup are available options for each node to reduce power consumption.
  • 4.  Bosch originally developed and released CAN to address automotive network requirements to reduce the cost and weight of vehicle wiring harnesses . The first release of the protocol came in 1985.  In the 1990s CAN was standardized by ISO 11898.
  • 5. The CAN data frame is composed of seven fields: SOF :Start of Frame RTR :Remote Transmission Request CRC :Cyclic Redundancy Check EOF :End of Frame CAN message bits are referred to as “dominant” (0) or “recessive” (1). The SOF field consists of one dominant bit. All network nodes waiting to transmit synchronize with the SOF and begin transmitting at the same time. An arbitration scheme determines which of the nodes attempting to transmit will actually control the bus. SO F Identifier RTR Control Data CRC EOF
  • 7.  The arbitration field of the CAN message consists of an 11- or 29-bit identifier and a remote transmission(RTR) bit. The CAN arbitration scheme is called “carrier sense multiple access with collision detection”or CSMA/CD, and assures that the highest priority message is broadcast.  Message priority is determined by the numerical value of the identifier in the arbitration field, with the lowest numerical value having the highest priority.  Non-destructive, bit-wise arbitration resolves conflicts among competing transmitters. This means that the bus can be thought of as acting like an AND gate: If any node writes a dominant (0) bit on the bus, every node will read a dominant bit regardless of the value written by that node.
  • 8.  Every transmitting node always reads back the bus value for each bit transmitted. If a node transmits a recessive bit and reads back a dominant bit, it immediately stops transmitting.  The RTR bit simply distinguishes between data frames and remote frames. In data frames, the RTR bit must be dominant; in remote frames it must be recessive.  Arbitration is illustrated in the following Figure.
  • 9.  The control field of the data frame consists of 6 bits (of which only the lower 4 are used) that indicate the amount of data in the message.  Since up to 8 bytes of data may be sent in one message, the control field may take values ranging from 000000 to 000111.  The data to be transmitted are contained in the data field.  The most significant bit (MSB) of a data byte is sent first.
  • 13.  It reduces wiring since it is a distributed control and this ensures enhancing of the system performance.  Many CAN chip manufactures provided the data link layer and the physical layer interfaced to the chip and all the software developer needs to do only is to develop the application coding.  It provides the ability to work in different electrical environment and ensures noise free transmission.  Traffic congestion is eliminated as the messages are transmitted based on their priority and it allows the entire network to meet the timing constraints.  It provides for error free transmission as each node can check for errors during the transmission of the message and send the error frame.
  • 14.  Unfair access- node with a high priority can “hog” the network.  Poor latency for low priority nodes.  The physical length limitation of the CAN bus is 2km at the rate of 20kbps.
  • 15. CAN is ideally suited in applications requiring a large of short messages with high reliability in rugged operating environments. Because CAN is message based not address based ,it is especially well suited when data is needed by more than one location and system-wide data consistency is mandatory.
  • 16.  https://www.elprocus.com  SLIDESHARE: by V.Phani Krishna  Controller Area Network (CAN): EECS 461, Fall 2008,J. A. Cook ,J. S. Freudenberg  Vehicle Applications of Controller Area Network :Karl Henrik Johansson , Martin T¨orngren , Lars Nielsen  www.ijetae.com