BOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart

Size: px
Start display at page:

Download "BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart"

Transcription

1 CAN Specification Version , Robert Bosch GmbH, Postfach , D Stuttgart

2 CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications has le to requirements that the assignment of message ientifiers to communication functions be stanarize for certain applications. These applications can be realize with CAN more comfortably, if the aress range that originally has been efine by 11 ientifier bits is enlarge Therefore a secon message format ( extene format ) is introuce that provies a larger aress range efine by 29 bits. This will relieve the system esigner from compromises with respect to efining well-structure naming schemes. Users of CAN who o not nee the ientifier range offere by the extene format, can rely on the conventional 11 bit ientifier range ( stanar format ) further on. In this case they can make use of the CAN implementations that are alreay available on the market, or of new controllers that implement both formats. In orer to istinguish stanar an extene format the first reserve bit of the CAN message format, as it is efine in CAN Specification 1.2, is use. This is one in such a way that the message format in CAN Specification 1.2 is equivalent to the stanar format an therefore is still vali. Furthermore, the extene format has been efine so that messages in stanar format an extene format can coexist within the same network. This CAN Specification consists of two parts, with Part A escribing the CAN message format as it is efine in CAN Specification 1.2; Part B escribing both stanar an extene message formats. In orer to be compatible with this CAN Specification 2.0 it is require that a CAN implementation be compatible with either Part A or Part B. Note CAN implementations that are esigne accoring to part A of this or accoring to previous CAN Specifications, an CAN implementations that are esigne accoring to part B of this specification can communicate with each other as long as it is not mae use of the extene format.

3 PART A

4 Contents Part A - page 3 1 INTRODUCTION BASIC CONCEPTS MESSAGE TRANSFER Frame Types DATA FRAME REMOTE FRAME ERROR FRAME OVERLOAD FRAME INTERFRAME SPACING Definition of TRANSMITTER/RECEIVER MESSAGE VALIDATION CODING ERROR HANDLING Error Detection Error Signalling FAULT CONFINEMENT BIT TIMING REQUIREMENTS INCREASING CAN OSCILLATOR TOLERANCE Protocol Moifications...31

5 1 INTRODUCTION Introuction Part A - page 4 The Controller Area Network (CAN) is a serial communications protocol which efficiently supports istribute realtime control with a very high level of security. Its omain of application ranges from high spee networks to low cost multiplex wiring. In automotive electronics, engine control units, sensors, anti-ski-systems, etc. are connecte using CAN with bitrates up to 1 Mbit/s. At the same time it is cost effective to buil into vehicle boy electronics, e.g. lamp clusters, electric winows etc. to replace the wiring harness otherwise require. The intention of this specification is to achieve compatibility between any two CAN implementations. Compatibility, however, has ifferent aspects regaring e.g. electrical features an the interpretation of ata to be transferre. To achieve esign transparency an implementation flexibility CAN has been subivie into ifferent layers. the (CAN-) object layer the (CAN-) transfer layer the physical layer The object layer an the transfer layer comprise all services an functions of the ata link layer efine by the ISO/OSI moel. The scope of the object layer inclues fining which messages are to be transmitte eciing which messages receive by the transfer layer are actually to be use, proviing an interface to the application layer relate harware. There is much freeom in efining object hanling. The scope of the transfer layer mainly is the transfer protocol, i.e. controlling the framing, performing arbitration, error checking, error signalling an fault confinement. Within the transfer layer it is ecie whether the bus is free for starting a new transmission or whether a reception is just starting. Also some general features of the bit timing are regare as part of the transfer layer. It is in the nature of the transfer layer that there is no freeom for moifications. The scope of the physical layer is the actual transfer of the bits between the ifferent noes with respect to all electrical properties. Within one network the physical layer, of course, has to be the same for all noes. There may be, however, much freeom in selecting a physical layer. The scope of this specification is to efine the transfer layer an the consequences of the CAN protocol on the surrouning layers.

6 2 BASIC CONCEPTS CAN has the following properties prioritization of messages guarantee of latency times configuration flexibility Basic Concepts Part A - page 5 multicast reception with time synchronization system wie ata consistency multimaster error etection an signalling automatic retransmission of corrupte messages as soon as the bus is ile again istinction between temporary errors an permanent failures of noes an autonomous switching off of efect noes Layere Structure of a CAN Noe Application Layer Object Layer - Message Filtering - Message an Status Hanling Transfer Layer - Fault Confinement - Error Detection an Signalling - Message Valiation - Acknowlegment - Arbitration - Message Framing - Transfer Rate an Timing Physical Layer - Signal Level an Bit Representation - Transmission Meium

7 Basic Concepts Part A - page 6 The Physical Layer efines how signals are actually transmitte. Within this specification the physical layer is not efine so as to allow transmission meium an signal level implementations to be optimize for their application. The Transfer Layer represents the kernel of the CAN protocol. It presents messages receive to the object layer an accepts messages to be transmitte from the object layer. The transfer layer is responsible for bit timing an synchronization, message framing, arbitration, acknowlegment, error etection an signalling, an fault confinement. The Object Layer is concerne with message filtering as well as status an message hanling. The scope of this specification is to efine the transfer layer an the consequences of the CAN protocol on the surrouning layers. Messages Information on the bus is sent in fixe format messages of ifferent but limite length (see section 3: Message Transfer). When the bus is free any connecte unit may start to transmit a new message. Information Routing In CAN systems a CAN noe oes not make use of any information about the system configuration (e.g. station aresses). This has several important consequences. System Flexibility: Noes can be ae to the CAN network without requiring any change in the software or harware of any noe an application layer. Message Routing: The content of a message is name by an IDENTIFIER. The IDENTIFIER oes not inicate the estination of the message, but escribes the meaning of the ata, so that all noes in the network are able to ecie by MESSAGE FILTERING whether the ata is to be acte upon by them or not. Multicast: As a consequence of the concept of MESSAGE FILTERING any number of noes can receive an simultaneously act upon the same message. Data Consistency: Within a CAN network it is guarantee that a message is simultaneously accepte either by all noes or by no noe. Thus ata consistency of a system is achieve by the concepts of multicast an by error hanling.

8 Basic Concepts Part A - page 7 Bit rate The spee of CAN may be ifferent in ifferent systems. However, in a given system the bitrate is uniform an fixe. Priorities The IDENTIFIER efines a static message priority uring bus access. Remote Data Request By sening a REMOTE FRAME a noe requiring ata may request another noe to sen the corresponing DATA FRAME. The DATA FRAME an the corresponing REMOTE FRAME are name by the same IDENTIFIER. Multimaster When the bus is free any unit may start to transmit a message. The unit with the message of higher priority to be transmitte gains bus access. Arbitration Whenever the bus is free, any unit may start to transmit a message. If 2 or more units start transmitting messages at the same time, the bus access conflict is resolve by bitwise arbitration using the IDENTIFIER. The mechanism of arbitration guarantees that neither information nor time is lost. If a DATA FRAME an a REMOTE FRAME with the same IDENTIFIER are initiate at the same time, the DATA FRAME prevails over the REMOTE FRAME. During arbitration every transmitter compares the level of the bit transmitte with the level that is monitore on the bus. If these levels are equal the unit may continue to sen. When a recessive level is sent an a ominant level is monitore (see Bus Values), the unit has lost arbitration an must withraw without sening one more bit. Safety In orer to achieve the utmost safety of ata transfer, powerful measures for error etection, signalling an self-checking are implemente in every CAN noe. Error Detection For etecting errors the following measures have been taken: - Monitoring (transmitters compare the bit levels to be transmitte with the bit levels etecte on the bus) - Cyclic Reunancy Check - Bit Stuffing - Message Frame Check

9 Basic Concepts Part A - page 8 Performance of Error Detection The error etection mechanisms have the following properties: - all global errors are etecte. - all local errors at transmitters are etecte. - up to 5 ranomly istribute errors in a message are etecte. - burst errors of length less than 15 in a message are etecte. - errors of any o number in a message are etecte. Total resiual error probability for unetecte corrupte messages: less than message error rate * 4.7 * Error Signalling an Recovery Time Corrupte messages are flagge by any noe etecting an error. Such messages are aborte an will be retransmitte automatically. The recovery time from etecting an error until the start of the next message is at most 29 bit times, if there is no further error. Fault Confinement CAN noes are able to istinguish short isturbances from permanent failures. Defective noes are switche off. Connections The CAN serial communication link is a bus to which a number of units may be connecte. This number has no theoretical limit. Practically the total number of units will be limite by elay times an/or electrical loas on the bus line. Single Channel The bus consists of a single channel that carries bits. From this ata resynchronization information can be erive. The way in which this channel is implemente is not fixe in this specification. E.g. single wire (plus groun), two ifferential wires, optical fibres, etc. Bus values The bus can have one of two complementary logical values: ominant or recessive. During simultaneous transmission of ominant an recessive bits, the resulting bus value will be ominant. For example, in case of a wire-and implementation of the bus, the ominant level woul be represente by a logical 0 an the recessive level by a logical 1. Physical states (e.g. electrical voltage, light) that represent the logical levels are not given in this specification.

10 Basic Concepts Part A - page 9 Acknowlegment All receivers check the consistency of the message being receive an will acknowlege a consistent message an flag an inconsistent message. Sleep Moe / Wake-up To reuce the system s power consumption, a CAN-evice may be set into sleep moe without any internal activity an with isconnecte bus rivers. The sleep moe is finishe with a wake-up by any bus activity or by internal conitions of the system. On wake-up, the internal activity is restarte, although the transfer layer will be waiting for the system s oscillator to stabilize an it will then wait until it has synchronize itself to the bus activity (by checking for eleven consecutive recessive bits), before the bus rivers are set to "on-bus" again. In orer to wake up other noes of the system, which are in sleep-moe, a special wake-up message with the eicate, lowest possible IDENTIFIER (rrr rrr rrrr; r = recessive = ominant ) may be use.

11 Message Transfer Part A - page 10 3 MESSAGE TRANSFER 3.1 Frame Types Message transfer is manifeste an controlle by four ifferent frame types: A DATA FRAME carries ata from a transmitter to the receivers. A REMOTE FRAME is transmitte by a bus unit to request the transmission of the DATA FRAME with the same IDENTIFIER. An ERROR FRAME is transmitte by any unit on etecting a bus error. An OVERLOAD FRAME is use to provie for an extra elay between the preceing an the succeeing DATA or REMOTE FRAMEs. DATA FRAMEs an REMOTE FRAMEs are separate from preceing frames by an INTERFRAME SPACE DATA FRAME A DATA FRAME is compose of seven ifferent bit fiels: START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD, CRC FIELD, ACK FIELD, END OF FRAME. The DATA FIELD can be of length zero. Interframe Space DATA FRAME Interframe Space Start of Frame or Overloa Frame Arbitration Fiel Control Fiel Data Fiel CRC Fiel ACK Fiel En of Frame

12 Data Frame Part A - page 11 START OF FRAME marks the beginning of DATA FRAMES an REMOTE FRAMEs. It consists of a single ominant bit. A station is only allowe to start transmission when the bus is ile (see BUS IDLE). All stations have to synchronize to the leaing ege cause by START OF FRAME (see HARD SYNCHRONIZATION ) of the station starting transmission first. ARBITRATION FIELD The ARBITRATION FIELD consists of the IDENTIFIER an the RTR-BIT. Interframe Space Start of Frame ARBITRATION FIELD Control Fiel Ientifier RTR Bit IDENTIFIER The IDENTIFIER s length is 11 bits. These bits are transmitte in the orer from ID-10 to ID-0. The least significant bit is ID-0. The 7 most significant bits (ID-10 - ID-4) must not be all recessive. RTR BIT Remote Transmission Request BIT In DATA FRAMEs the RTR BIT has to be ominant. Within a REMOTE FRAME the RTR BIT has to be recessive. CONTROL FIELD The CONTROL FIELD consists of six bits. It inclues the DATA LENGTH CODE an two bits reserve for future expansion. The reserve bits have to be sent ominant. Receivers accept ominant an recessive bits in all combinations. DATA LENGTH CODE The number of bytes in the DATA FIELD is inicate by the DATA LENGTH CODE. This DATA LENGTH CODE is 4 bits wie an is transmitte within the CONTROL FIELD.

13 Data Frame Part A - page 12 Arbitration Fiel CONTROL FIELD Data Fiel r1 r0 DLC3 DLC2 DLC1 DLC0 or CRC Fiel reserve bits Data Length Coe Coing of the number of ata bytes by the DATA LENGTH CODE abbreviations: ominant r recessive Number of Data Bytes Data Length Coe DLC3 DLC2 DLC1 DLC0 0 1 r 2 r 3 r r 4 r 5 r r 6 r r 7 r r r 8 r DATA FRAME: amissible numbers of ata bytes: {0,1,...,7,8}. Other values may not be use.

14 Data Frame Part A - page 13 DATA FIELD The DATA FIELD consists of the ata to be transferre within a DATA FRAME. It can contain from 0 to 8 bytes, which each contain 8 bits which are transferre MSB first. CRC FIELD contains the CRC SEQUENCE followe by a CRC DELIMITER. Data or Control Fiel CRC FIELD Ack Fiel CRC Sequence CRC Delimiter CRC SEQUENCE The frame check sequence is erive from a cyclic reunancy coe best suite for frames with bit counts less than 127 bits (BCH Coe). In orer to carry out the CRC calculation the polynomial to be ivie is efine as the polynomial, the coefficients of which are given by the estuffe bit stream consisting of START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD (if present) an, for the 15 lowest coefficients, by 0. This polynomial is ivie (the coefficients are calculate moulo-2) by the generator-polynomial: X 15 + X 14 + X 10 + X 8 + X 7 + X 4 + X The remainer of this polynomial ivision is the CRC SEQUENCE transmitte over the bus. In orer to implement this function, a 15 bit shift register CRC_RG(14:0) can be use. If NXTBIT enotes the next bit of the bit stream, given by the estuffe bit sequence from START OF FRAME until the en of the DATA FIELD, the CRC SEQUENCE is calculate as follows: CRC_RG = 0; REPEAT CRCNXT = NXTBIT EXOR CRC_RG(14); CRC_RG(14:1) = CRC_RG(13:0); CRC_RG(0) = 0; // initialize shift register // shift left by // 1 position

15 Data Frame Part A - page 14 IF CRCNXT THEN CRC_RG(14:0) = CRC_RG(14:0) EXOR (4599hex); ENDIF UNTIL (CRC SEQUENCE starts or there is an ERROR conition) After the transmission / reception of the last bit of the DATA FIELD, CRC_RG contains the CRC sequence. CRC DELIMITER The CRC SEQUENCE is followe by the CRC DELIMITER which consists of a single recessive bit. ACK FIELD The ACK FIELD is two bits long an contains the ACK SLOT an the ACK DELIMITER. In the ACK FIELD the transmitting station sens two recessive bits. A RECEIVER which has receive a vali message correctly, reports this to the TRANSMITTER by sening a ominant bit uring the ACK SLOT (it sens ACK ). CRC Fiel ACK FIELD En of Frame ACK Slot ACK Delimiter ACK SLOT All stations having receive the matching CRC SEQUENCE report this within the ACK SLOT by superscribing the recessive bit of the TRANSMITTER by a ominant bit. ACK DELIMITER The ACK DELIMITER is the secon bit of the ACK FIELD an has to be a recessive bit. As a consequence, the ACK SLOT is surroune by two recessive bits (CRC DELIMITER, ACK DELIMITER). END OF FRAME Each DATA FRAME an REMOTE FRAME is elimite by a flag sequence consisting of seven recessive bits.

16 Remote Frame Part A - page REMOTE FRAME A station acting as a RECEIVER for certain ata can initiate the transmission of the respective ata by its source noe by sening a REMOTE FRAME. A REMOTE FRAME is compose of six ifferent bit fiels: START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, CRC FIELD, ACK FIELD, END OF FRAME. Contrary to DATA FRAMEs, the RTR bit of REMOTE FRAMEs is recessive. There is no DATA FIELD, inepenent of the values of the DATA LENGTH CODE which may be signe any value within the amissible range The value is the DATA LENGTH CODE of the corresponing DATA FRAME. Inter Frame Space REMOTE FRAME Inter Frame Space or Overloa Frame Start of Frame Arbitration Fiel Control Fiel CRC Fiel ACK Fiel En of Frame The polarity of the RTR bit inicates whether a transmitte frame is a DATA FRAME (RTR bit ominant ) or a REMOTE FRAME (RTR bit recessive ).

17 Error Frame Part A - page ERROR FRAME The ERROR FRAME consists of two ifferent fiels. The first fiel is given by the superposition of ERROR FLAGs contribute from ifferent stations. The following secon fiel is the ERROR DELIMITER. Data Frame Error Flag ERROR FRAME Interframe Space or Overloa Frame superposition of Error Flags Error Delimiter In orer to terminate an ERROR FRAME correctly, an error passive noe may nee the bus to be bus ile for at least 3 bit times (if there is a local error at an error passive receiver). Therefore the bus shoul not be loae to 100%. ERROR FLAG There are 2 forms of an ERROR FLAG: an ACTIVE ERROR FLAG an a PASSIVE ERROR FLAG. 1. The ACTIVE ERROR FLAG consists of six consecutive ominant bits. 2. The PASSIVE ERROR FLAG consists of six consecutive recessive bits unless it is overwritten by ominant bits from other noes. An error active station etecting an error conition signals this by transmission of an ACTIVE ERROR FLAG. The ERROR FLAG s form violates the law of bit stuffing (see CODING) applie to all fiels from START OF FRAME to CRC DELIMITER or estroys the fixe form ACK FIELD or END OF FRAME fiel. As a consequence, all other stations etect an error conition an on their part start transmission of an ERROR FLAG. So the sequence of ominant bits which actually can be monitore on the bus results from a superposition of ifferent ERROR FLAGs transmitte by iniviual stations. The total length of this sequence varies between a minimum of six an a maximum of twelve bits. An error passive station etecting an error conition tries to signal this by transmission of a PASSIVE ERROR FLAG. The error passive station waits for six consecutive bits

18 Overloa Frame Part A - page 17 of equal polarity, beginning at the start of the PASSIVE ERROR FLAG. The PASSIVE ERROR FLAG is complete when these 6 equal bits have been etecte. ERROR DELIMITER The ERROR DELIMITER consists of eight recessive bits. After transmission of an ERROR FLAG each station sens recessive bits an monitors the bus until it etects a recessive bit. Afterwars it starts transmitting seven more recessive bits OVERLOAD FRAME The OVERLOAD FRAME contains the two bit fiels OVERLOAD FLAG an OVERLOAD DELIMITER. There are two kins of OVERLOAD conitions, which both lea to the transmission of an OVERLOAD FLAG: 1. The internal conitions of a receiver, which requires a elay of the next DATA FRAME or REMOTE FRAME. 2. Detection of a ominant bit uring INTERMISSION. The start of an OVERLOAD FRAME ue to OVERLOAD conition 1 is only allowe to be starte at the first bit time of an expecte INTERMISSION, whereas OVERLOAD FRAMEs ue to OVERLOAD conition 2 start one bit after etecting the ominant bit. En of Frame or Error Delimiter or Overloa Delimiter Overloa Flag OVERLOAD FRAME Inter Frame Space or Overloa Frame superposition of Overloa Flags Overloa Delimiter At most two OVERLOAD FRAMEs may be generate to elay the next DATA or REMOTE FRAME.

19 Overloa Frame Part A - page 18 OVERLOAD FLAG consists of six ominant bits. The overall form correspons to that of the ACTIVE ERROR FLAG. The OVERLOAD FLAG s form estroys the fixe form of the INTERMISSION fiel. As a consequence, all other stations also etect an OVERLOAD conition an on their part start transmission of an OVERLOAD FLAG. (In case that there is a ominant bit etecte uring the 3r bit of INTERMISSION locally at some noe, the other noes will not interpret the OVERLOAD FLAG correctly, but interpret the first of these six ominant bits as START OF FRAME. The sixth ominant bit violates the rule of bit stuffing causing an error conition). OVERLOAD DELIMITER consists of eight recessive bits. The OVERLOAD DELIMITER is of the same form as the ERROR DELIMITER. After transmission of an OVERLOAD FLAG the station monitors the bus until it etects a transition from a ominant to a recessive bit. At this point of time every bus station has finishe sening its OVERLOAD FLAG an all stations start transmission of seven more recessive bits in coincience INTERFRAME SPACING DATA FRAMEs an REMOTE FRAMEs are separate from preceing frames whatever type they are (DATA FRAME, REMOTE FRAME, ERROR FRAME, OVERLOAD FRAME) by a bit fiel calle INTERFRAME SPACE. In contrast, OVERLOAD FRAMEs an ERROR FRAMEs are not precee by an INTERFRAME SPACE an multiple OVERLOAD FRAMEs are not separate by an INTERFRAME SPACE. INTERFRAME SPACE contains the bit fiels INTERMISSION an BUS IDLE an, for error passive stations, which have been TRANSMITTER of the previous message, SUSPEND TRANSMISSION.

20 Interframe Space Part A - page 19 For stations which are not error passive or have been RECEIVER of the previous message: Frame INTERFRAME SPACE Frame Intermission Bus Ile For error passive stations which have been TRANSMITTER of the previous message: Frame INTERFRAME SPACE Frame Intermission Bus Ile Suspen Transmission INTERMISSION consists of three recessive bits. During INTERMISSION no station is allowe to start transmission of a DATA FRAME or REMOTE FRAME. The only action to be taken is signalling an OVERLOAD conition. BUS IDLE The perio of BUS IDLE may be of arbitrary length. The bus is recognize to be free an any station having something to transmit can access the bus. A message, which is pening for transmission uring the transmission of another message, is starte in the first bit following INTERMISSION. The etection of a ominant bit on the bus is interprete as a START OF FRAME. SUSPEND TRANSMISSION After an error passive station has transmitte a message, it sens eight recessive bits following INTERMISSION, before starting to transmit a further message or recognizing the bus to be ile. If meanwhile a transmission (cause by another station) starts, the station will become receiver of this message.

21 Transmitter / Receiver Part A - page Definition of TRANSMITTER / RECEIVER TRANSMITTER A unit originating a message is calle TRANSMITTER of that message. The unit stays TRANSMITTER until the bus is ile or the unit loses ARBITRATION. RECEIVER A unit is calle RECEIVER of a message, if it is not TRANSMITTER of that message an the bus is not ile.

22 Message Valiation Part A - page 21 4 MESSAGE VALIDATION The point of time at which a message is taken to be vali, is ifferent for the transmitter an the receivers of the message. Transmitter: The message is vali for the transmitter, if there is no error until the en of END OF FRAME. If a message is corrupte, retransmission will follow automatically an accoring to prioritization. In orer to be able to compete for bus access with other messages, retransmission has to start as soon as the bus is ile. Receivers: The message is vali for the receivers, if there is no error until the last but one bit of END OF FRAME.

23 5 CODING BIT STREAM CODING Coing Part A - page 22 The frame segments START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD an CRC SEQUENCE are coe by the metho of bit stuffing. Whenever a transmitter etects five consecutive bits of ientical value in the bit stream to be transmitte it automatically inserts a complementary bit in the actual transmitte bit stream. The remaining bit fiels of the DATA FRAME or REMOTE FRAME (CRC DELIMITER, ACK FIELD, an END OF FRAME) are of fixe form an not stuffe. The ERROR FRAME an the OVERLOAD FRAME are of fixe form as well an not coe by the metho of bit stuffing. The bit stream in a message is coe accoring to the Non-Return-to-Zero (NRZ) metho. This means that uring the total bit time the generate bit level is either ominant or recessive.

24 6 ERROR HANDLING 6.1 Error Detection Error Hanling Part A - page 23 There are 5 ifferent error types (which are not mutually exclusive): BIT ERROR A unit that is sening a bit on the bus also monitors the bus. A BIT ERROR has to be etecte at that bit time, when the bit value that is monitore is ifferent from the bit value that is sent. An exception is the sening of a recessive bit uring the stuffe bit stream of the ARBITRATION FIELD or uring the ACK SLOT. Then no BIT ERROR occurs when a ominant bit is monitore. A TRANSMITTER sening a PASSIVE ERROR FLAG an etecting a ominant bit oes not interpret this as a BIT ERROR. STUFF ERROR A STUFF ERROR has to be etecte at the bit time of the 6th consecutive equal bit level in a message fiel that shoul be coe by the metho of bit stuffing. CRC ERROR The CRC sequence consists of the result of the CRC calculation by the transmitter. The receivers calculate the CRC in the same way as the transmitter. A CRC ERROR has to be etecte, if the calculate result is not the same as that receive in the CRC sequence. FORM ERROR A FORM ERROR has to be etecte when a fixe-form bit fiel contains one or more illegal bits. ACKNOWLEDGMENT ERROR An ACKNOWLEDGMENT ERROR has to be etecte by a transmitter whenever it oes not monitor a ominant bit uring the ACK SLOT. 6.2 Error Signalling A station etecting an error conition signals this by transmitting an ERROR FLAG. For an error active noe it is an ACTIVE ERROR FLAG, for an error passive noe it is a PASSIVE ERROR FLAG. Whenever a BIT ERROR, a STUFF ERROR, a FORM ERROR or an ACKNOWLEDGMENT ERROR is etecte by any station, transmission of an ERROR FLAG is starte at the respective station at the next bit. Whenever a CRC ERROR is etecte, transmission of an ERROR FLAG starts at the bit following the ACK DELIMITER, unless an ERROR FLAG for another conition has alreay been starte.

25 Fault Confinement Part A - page 24 7 FAULT CONFINEMENT With respect to fault confinement a unit may be in one of three states: error active error passive bus off An error active unit can normally take part in bus communication an sens an ACTIVE ERROR FLAG when an error has been etecte. An error passive unit must not sen an ACTIVE ERROR FLAG. It takes part in bus communication but when an error has been etecte only a PASSIVE ERROR FLAG is sent. Also after a transmission, an error passive unit will wait before initiating a further transmission. (See SUSPEND TRANSMISSION) A bus off unit is not allowe to have any influence on the bus. (E.g. output rivers switche off.) For fault confinement two counts are implemente in every bus unit: 1) TRANSMIT ERROR COUNT 2) RECEIVE ERROR COUNT These counts are moifie accoring to the following rules: (note that more than one rule may apply uring a given message transfer) 1. When a RECEIVER etects an error, the RECEIVE ERROR COUNT will be increase by 1, except when the etecte error was a BIT ERROR uring the sening of an ACTIVE ERROR FLAG or an OVERLOAD FLAG. 2. When a RECEIVER etects a ominant bit as the first bit after sening an ERROR FLAG the RECEIVE ERROR COUNT will be increase by When a TRANSMITTER sens an ERROR FLAG the TRANSMIT ERROR COUNT is increase by 8. Exception 1: If the TRANSMITTER is error passive an etects an ACKNOWLEDGMENT

26 Fault Confinement Part A - page 25 ERROR because of not etecting a ominant ACK an oes not etect a ominant bit while sening its PASSIVE ERROR FLAG. Exception 2: If the TRANSMITTER sens an ERROR FLAG because a STUFF ERROR occurre uring ARBITRATION whereby the STUFFBIT is locate before the RTR bit, an shoul have been recessive, an has been sent as recessive but monitore as ominant. In exceptions 1 an 2 the TRANSMIT ERROR COUNT is not change. 4. If an TRANSMITTER etects a BIT ERROR while sening an ACTIVE ERROR FLAG or an OVERLOAD FLAG the TRANSMIT ERROR COUNT is increase by If an RECEIVER etects a BIT ERROR while sening an ACTIVE ERROR FLAG or an OVERLOAD FLAG the RECEIVE ERROR COUNT is increase by Any noe tolerates up to 7 consecutive ominant bits after sening an ACTIVE ERROR FLAG, PASSIVE ERROR FLAG or OVERLOAD FLAG. After etecting the 14th consecutive ominant bit (in case of an ACTIVE ERROR FLAG or an OVERLOAD FLAG) or after etecting the 8th consecutive ominant bit following a PASSIVE ERROR FLAG, an after each sequence of aitional eight consecutive ominant bits every TRANSMITTER increases its TRANSMIT ERROR COUNT by 8 an every RECEIVER increases its RECEIVE ERROR COUNT by After the successful transmission of a message (getting ACK an no error until END OF FRAME is finishe) the TRANSMIT ERROR COUNT is ecrease by 1 unless it was alreay After the successful reception of a message (reception without error up to the ACK SLOT an the successful sening of the ACK bit), the RECEIVE ERROR COUNT is ecrease by 1, if it was between 1 an 127. If the RECEIVE ERROR COUNT was 0, it stays 0, an if it was greater than 127, then it will be set to a value between 119 an A noe is error passive when the TRANSMIT ERROR COUNT equals or excees 128, or when the RECEIVE ERROR COUNT equals or excees 128. An error conition letting a noe become error passive causes the noe to sen an ACTIVE ERROR FLAG.

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

CAN Specification 2.0, Part B page 1 PART B. CAN in Automation, Am Weichselgarten 26, D-91058 Erlangen

CAN Specification 2.0, Part B page 1 PART B. CAN in Automation, Am Weichselgarten 26, D-91058 Erlangen CAN Specification 2.0, Part B page 1 PART B CAN Specification 2.0, Part B page 2 1 INTRODUCTION...3 2 BASIC CONCEPTS...5 3 MESSAGE TRANSFER...11 3.1 Frame Formats...11 3.2 Frame Types...11 3.2.1 DATA FRAME...11

More information

2.1 CAN Bit Structure The Nominal Bit Rate of the network is uniform throughout the network and is given by:

2.1 CAN Bit Structure The Nominal Bit Rate of the network is uniform throughout the network and is given by: Order this document by /D CAN Bit Timing Requirements by Stuart Robb East Kilbride, Scotland. 1 Introduction 2 CAN Bit Timing Overview The Controller Area Network (CAN) is a serial, asynchronous, multi-master

More information

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Local Interconnect Network Training. Local Interconnect Network Training. Overview Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended

More information

In-Vehicular Communication Networking Protocol

In-Vehicular Communication Networking Protocol In-Vehicular Communication Networking Protocol ABSTRACT Renu Sharma Indiana University, Purdue University Indianapolis, IN rensharm@iupui.edu Today s modern vehicles contain a complex symbiosis of intelligent

More information

Comparison of FlexRay and CAN-bus for Real-Time Communication

Comparison of FlexRay and CAN-bus for Real-Time Communication Comparison of FlexRay and CAN-bus for Real-Time Communication Andreas Forsberg Mälardalen University Högskoleplan 1 721 23 Västerås +46 768011236 afg05001@student.mdh.se Johan Hedberg Mälardalen University

More information

Distributed Real-Time Systems (TI-DRTS) Track 2. CAN-BUS Introduction. Version 9.11.2009 Ref. VECTOR application note & Motorola note

Distributed Real-Time Systems (TI-DRTS) Track 2. CAN-BUS Introduction. Version 9.11.2009 Ref. VECTOR application note & Motorola note Distributed Real-Time Systems (TI-DRTS) Track 2 CAN-BUS Introduction Version 9.11.2009 Ref. VECTOR application note & Motorola note What is CAN? Controller Area Network (CAN) is a common, small area network

More information

Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive

Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive Products Group within Microchip. This web seminar today

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

LIN (Local Interconnect Network):

LIN (Local Interconnect Network): LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,

More information

Understanding SAE J1939. by Simma Software, Inc.

Understanding SAE J1939. by Simma Software, Inc. Understanding SAE J1939 by Simma Software, Inc. Contact E-mail: jrsimma at simmasoftware dot com Phone: 888-256-3828 For J1939 source code, see J1939 Software Starting Notes Ask questions anytime. This

More information

Section 34. Controller Area Network (CAN)

Section 34. Controller Area Network (CAN) Section 34. Controller Area Network (CAN) HIGHLIGHT This section of the manual contains the following topics: 34.1 Introduction...34-2 34.2 CAN Message Formats... 34-4 34.3 CAN Registers...34-9 34.4 Enabling

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Protocols for Wired and Wireless Networks in Vehicle Systems

Protocols for Wired and Wireless Networks in Vehicle Systems Protocols for Wired and Wireless Networks in Vehicle Systems Syed Masud Mahmud, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 Copyright 2002 by Syed Masud Mahmud Email:

More information

A Security Evaluation and Internal Penetration Testing Of the CAN-bus

A Security Evaluation and Internal Penetration Testing Of the CAN-bus A Security Evaluation and Internal Penetration Testing Of the CAN-bus Master of Science Thesis in the program Networks and Distributed Systems SAREH TALEBI Chalmers University of Technology Department

More information

1 Introduction to the Recommendations and their Application Principles

1 Introduction to the Recommendations and their Application Principles 1 Introuction to the Recommenations an their Application Principles 1.1 National an International Regulations for Piling Wors (1) Since the implementation ofdin EN 1997-1:2009-09: Eurocoe 7: Geotechnical

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

Vehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com

Vehicle data acquisition using CAN By Henning Olsson, OptimumG henning.olsson@optimumg.com Vehicle data acquisition using By Henning Olsson, OptimumG henning.olsson@optimumg.com Introduction: Data acquisition is one of the best tools to increase the understanding of vehicle behavior. One can

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Sage Match Terms and Conditions of Use (Last updated: 9 November 2015)

Sage Match Terms and Conditions of Use (Last updated: 9 November 2015) 1. Acknowlegement an Acceptance 1.1. This Agreement is between: (1) you, the person or organisation registere to use or using the Sage accountancy network service known as Sage Match ; an (2) us, as follows:

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

In-Vehicle Networking

In-Vehicle Networking In-Vehicle Networking SAE Network classification Class A networks Low Speed (

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

NETWORK CODING OVERHEAD

NETWORK CODING OVERHEAD NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

DeviceNet Communication Manual

DeviceNet Communication Manual DeviceNet Communication Manual Soft-Starter Series: SSW-07/SSW-08 Language: English Document: 10000046963 / 00 03/2008 Summary ABOUT THIS MANUAL... 5 ABBREVIATIONS AND DEFINITIONS... 5 NUMERICAL REPRESENTATION...

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

DigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management

DigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management Bandwidth Management Page 4.1 DigiPoints Volume 1 Module 4 Bandwidth Management Summary This module will cover Time Division Multiplexing (TDM). TDM technology allows many users to access a particular

More information

Scalable live video streaming to cooperative clients using time shifting and video patching

Scalable live video streaming to cooperative clients using time shifting and video patching calable live vieo streaming to cooperative clients using time shifting an vieo patching Meng Guo, Mostafa H. Ammar {mguo, ammar}@cc.gatech.eu Networking an Telecommunication Group ollege of omputing, Georgia

More information

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE No.107 Guie to the calibration an testing of torque transucers Goo Practice Guie 107 Measurement Goo Practice Guie No.107 Guie to the calibration an testing of

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Data Exchange On The CAN Bus I

Data Exchange On The CAN Bus I Service. Self-Study Programme 238 Data Exchange On The CAN Bus I Basics The CAN bus system in a car interlinks the control units to form a network. This produces new functions in the car and in diagnostics

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

Quectel Cellular Engine

Quectel Cellular Engine Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Vorlesung Kommunikationsnetze Fieldbus Systems

Vorlesung Kommunikationsnetze Fieldbus Systems Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

1.1.1 Determining the Slot Number (Default)

1.1.1 Determining the Slot Number (Default) EK-FSFCO-WS ULTRIX/ULTRIX Worksystem Software Boot Commans for DECstation/DECsystem 5000 Moel 200 Series Processors Dear Digital Customer, Because of changes in the firmware of the DECstation/DECsystem

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

A Scheme to Estimate One-way Delay Variations for Diagnosing Network Traffic Conditions

A Scheme to Estimate One-way Delay Variations for Diagnosing Network Traffic Conditions Cyber Journals: Multiisciplinary Journals in Science an Technology Journal of Selecte Areas in Telecommunications (JSAT) August Eition 2011 A Scheme to Estimate One-way Delay Variations for Diagnosing

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Synco 700 Switching and Monitoring Device RMS705

Synco 700 Switching and Monitoring Device RMS705 Synco 700 Switching an Monitoring Device RMS705 incluing extension moules RMZ785 an RMZ787 asic Documentation Eition 1.0 CE1P3123en 15.11.2005 uiling Technologies HVC Proucts Siemens Switzerlan Lt uiling

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Multiple clock domains

Multiple clock domains DESIGNING A ROBUST USB SERIAL INTERFACE ENGINE(SIE) What is the SIE? A typical function USB hardware interface is shown in Fig. 1. USB Transceiver USB Serial Interface Engine Status Control Data Buffers/

More information

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

DS1621 Digital Thermometer and Thermostat

DS1621 Digital Thermometer and Thermostat Digital Thermometer and Thermostat www.dalsemi.com FEATURES Temperature measurements require no external components Measures temperatures from 55 C to +125 C in 0.5 C increments. Fahrenheit equivalent

More information

OSI Layers in Automotive Networks

OSI Layers in Automotive Networks OSI Layers in Automotive Networks 2013-03-20 IEEE 802.1 Plenary Meeting - Orlando Aboubacar Diarra, Robert Bosch GmbH 1 Outline OSI Reference Model Simplified generic Architecture for Automotive Serial

More information

LOCAL INTERCONNECT NETWORK (LIN)

LOCAL INTERCONNECT NETWORK (LIN) 54B-1 GROUP 54B LOCAL INTERCONNECT NETWORK (LIN) CONTENTS GENERAL INFORMATION........ 54B-2............ 54B-3 STRUCTURE................... 54B-2 54B-2 LIN refers to "Local Interconnect Network," which

More information

Introduction to. LIN (Local Interconnect Network)

Introduction to. LIN (Local Interconnect Network) Introduction to LIN (Local Interconnect Network) Stéphane REY Revision 1.0 - ay 13 th, 2003 Table of content 1 INTRODUCTION...3 1.1 PURPOSE OF THE DOCUENT...3 1.2 ACRONYOUS...3 1.3 RELATED DOCUENTS...3

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

The concept of on-board diagnostic system of working machine hydraulic system

The concept of on-board diagnostic system of working machine hydraulic system Scientific Journals Maritime University of Szczecin Zeszyty Naukowe Akaemia Morska w Szczecinie 0, 3(04) z. pp. 8 90 0, 3(04) z. s. 8 90 The concept of on-boar iagnostic of working machine hyraulic Leszek

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Different approaches for the equalization of automotive sound systems

Different approaches for the equalization of automotive sound systems Auio Engineering Society Convention Paper Presente at the 112th Convention 2002 May 10 13 Munich, Germany This convention paper has been reprouce from the author's avance manuscript, without eiting, corrections,

More information

Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB

Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

LIN. Specification Package. Revision 2.0. This specification is provided on an "AS IS" basis only and cannot be the basis for any claims.

LIN. Specification Package. Revision 2.0. This specification is provided on an AS IS basis only and cannot be the basis for any claims. LIN Specification Package September 23, 2003; Page 1 LIN Specification Package This specification is provided on an "AS IS" basis only and cannot be the basis for any claims. LIN Consortium, 2003. All

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

www.imprezer.tk Introduction to www.union88.tk RACE FUELS Hans-Christian von der Wense Munich, Germany

www.imprezer.tk Introduction to www.union88.tk RACE FUELS Hans-Christian von der Wense Munich, Germany Introduction to Hans-Christian von der Wense Munich, Germany Overview Progress in Automotive Electronics and it s Impacts on Networking LIN Consortium LIN Concept Physical Layer Data Link Layer LIN Network

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

Application Report ...

Application Report ... Application Report SNVA408B January 00 Revise April 03 AN-994 Moeling an Design of Current Moe Control Boost Converters... ABSTRACT This application note presents a etail moeling an esign of current moe

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information