1 / 68

CAN

CAN. Controller Area Network Wilmer Arellano, Summer 2007. Overview. CAN Overview CAN and the OSI Model CAN Message Formats Message Acceptance Filters Interrupts Arbitration Synchronizing The Bit Time. References.

noma
Download Presentation

CAN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CAN Controller Area Network Wilmer Arellano, Summer 2007

  2. Overview • CAN Overview • CAN and the OSI Model • CAN Message Formats • Message Acceptance Filters • Interrupts • Arbitration • Synchronizing The Bit Time

  3. References • Microchip. (2006). dsPIC30F Family Reference Manual, High-Performance Digital Signal Controllers. DS70046E. Available: http://www.microchip.com • Microchip. (2002). AN228 A CAN Physical Layer Discussion. Available: http://www.microchip.com • Microchip. (2001). AN754 Understanding Microchip’s CAN Module Bit Timing. Available: http://www.microchip.com • Microchip. (09/2005). Interface Products Design Guide • Using CAN, LIN, Ethernet, Infrared Connectivity and General Purpose I/O Expanders. DS21883B. Available: http://www.microchip.com • Introduction to mikroC for dsPIC30/33 and PIC24 . Help version: 2006/05/19. Available: http://www.mikroe.com/

  4. CAN Overview • CAN • Very robust protocol similar to Ethernet. • Introduced by German automotive system supplier Robert Bosch in the mid-1980s • The goal was to make automobiles more reliable, safe and fuel-efficient while decreasing wiring harness weight and complexity. • New areas of application include industrial networks, medical equipment, railway signaling and controlling building services. • Members of The dsPIC family may posses 0, 1, or 2 CAN engines.

  5. CAN Overview • CAN is an asynchronous serial bus system with one logical bus line. • A CAN bus consists of two or more nodes. • The number of nodes on the bus may be changed dynamically without disturbing the communication of other nodes. • The bus logic corresponds to a “wired-AND” mechanism, “recessive” bits (mostly, but not necessarily equivalent to the logic level ‘1’) are overwritten by “dominant” bits (mostly logic level ‘0’). • As long as no bus node is sending a dominant bit, the bus line is in the recessive state, but a dominant bit from any bus node generates the dominant bus state.

  6. CAN Overview • There's no standard defined by CAN regarding connector requirements. • A medium must be chosen that is able to transmit the two possible bit states (dominant and recessive). One of the most common and cheapest ways is to use a twisted wire pair. • The twisted wire pair is terminated by terminating resistors at each end of the bus line. The maximum bus speed is 1 Mbit, which can be achieved with a bus length of up to 40 meters. • CAN is not inherently susceptible to radiated electromagnetic energy because both bus lines are affected in the same way, which leaves the differential signal unaffected.

  7. CAN Overview • The binary data is coded corresponding to the NRZ code (Non-Return-to-Zero; low level = dominant state; high level = recessive state). To ensure clock synchronization of all bus nodes, bit-stuffing is used. • During the transmission of a message, a maximum of five consecutive bits may have the same polarity. • Whenever five consecutive bits of the same polarity have been transmitted, the transmitter will insert one additional bit of the opposite polarity into the bit stream before transmitting further bits. • The receiver also checks the number of bits with the same polarity and removes the stuff bits from the bit stream (destuffing).

  8. CAN Overview • The CAN module will generate a signal that can be sent to a timer capture input whenever a valid frame has been accepted. This is useful for time-stamping and network synchronization

  9. CAN Overview

  10. CAN Overview

  11. CAN Overview

  12. CAN Overview

  13. CAN Overview • Ethernet differs from CAN in that Ethernet uses collision detection at the end of the transmission. • CAN uses collision detection with resolution at the beginning of the transmission • When a collision occurs during arbitration between two or more CAN nodes that transmit at the same time, the node(s) with the lower priority message(s) will detect the collision. • The lower priority node(s) will then switch to receiver mode and wait for the next bus idle to attempt transmission again.

  14. CAN and the OSI Model • Many network protocols are described using the seven layer Open System Interconnection (OSI) model, as shown in Figure1. The Controller Area Network (CAN) protocol defines the Data Link Layer and part of the Physical Layer in the OSI model. • Thee other layers can either be defined by the system designer, or they can be implemented using existing non-proprietary Higher Layer Protocols (HLPs) and physical layers. • CAN does not include either The Physical Medium Attachment or The Medium Dependent Interface. ISO-11898 includes them and includes CAN

  15. CAN and the OSI Model(The Open Systems Interconnection Basic Reference Model) • Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities. • Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. • Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.

  16. CAN and the OSI Model • Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network. • Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here. • Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined. • Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.

  17. Control Registers for the CAN Module • There are many registers associated with the CAN module. Descriptions of these registers are grouped into sections. These sections are: • • Control and Status Registers • • Transmit Buffer Registers • • Receive Buffer Registers • • Baud Rate Control Registers • • Interrupt Status and Control Registers

  18. CAN Message Formats • The CAN protocol engine handles all functions for receiving and transmitting messages on the CAN bus. • Messages are transmitted by first loading the appropriate data registers. • Status and errors can be checked by reading the appropriate registers. Any message detected on the CAN bus is checked for errors. The CAN Module supports the following frame types: • Standard Data Frame • Extended Data Frame • Remote Frame • Error Frame • lnterframe Space

  19. Standard Data Frame • A standard data frame is generated by a node when the node wishes to transmit data. The standard CAN data frame is shown in Figure 23-3. In common with all other frames, the frame begins with a Start-Of-Frame bit (SOF - dominant state) for hard synchronization of all nodes. • The SOF is followed by the Arbitration field consisting of 12 bits, the 11-bit identifier (reflecting the contents and priority of the message) and the RTR bit (Remote Transmission Request bit). The RTR bit is used to distinguish a data frame (RTR - dominant) from a remote frame. • The next field is the Control field, consisting of 6 bits. The first bit of this field is called the Identifier Extension (IDE) bit and is at dominant state to specify that the frame is a standard frame. The following bit is reserved by the CAN protocol, RB0, and defined as a dominant bit. The remaining 4 bits of the Control field are the Data Length Code (DLC) and specify the number of bytes of data contained in the message. • The data being sent follows in the Data field which is of the length defined by the DLC above (0-8 bytes).

  20. Remote Frame • A data transmission is usually performed on an autonomous basis with the data source node (e.g., a sensor sending out a data frame). It is possible however for a destination node to request the data from the source. For this purpose, the destination node sends a “remote frame” with an identifier that matches the identifier of the required data frame. The appropriate data source node will then send a data frame as a response to this remote request.

  21. Error Frame • An error frame is generated by any node that detects a bus error. An error frame, shown in Figure 23-6, consists of 2 fields, an error flag field followed by an Error Delimiter field. The Error Delimiter consists of 8 recessive bits and allows the bus nodes to restart bus communications cleanly after an error. There are two forms of error flag fields. The form of the error flag field depends on the error status of the node that detects the error. • If an error-active node detects a bus error then the node interrupts transmission of the current message by generating an active error flag. The active error flag is composed of six consecutive dominant bits. This bit sequence actively violates the bit-stuffing rule. All other stations recognize the resulting bit-stuffing error and in turn generate error frames themselves, called Error Echo Flags. The error flag field therefore consists of between six and twelve consecutive dominant bits (generated by one or more nodes). The Error Delimiter field completes the error frame. After completion of the error frame, bus activity retains to normal and the interrupted node attempts to resend the aborted message. • If an error passive node detects a bus error then the node transmits an Error Passive flag followed, again, by the Error Delimiter field. The Error Passive flag consists of six consecutive recessive bits. From this it follows that, unless the bus error is detected by the transmitting node or other error active receiver that is actually transmitting, the transmission of an error frame by an error passive node will not affect any other node on the network. If the bus master node generates an error passive flag then this may cause other nodes to generate error frames due to the resulting bit-stuffing violation. After transmission of an error frame, an error passive node must wait for 6 consecutive recessive bits on the bus before attempting to rejoin bus communications.

  22. Error Frame

  23. CAN Module Operation Modes • The CAN Module can operate in one of several Operation modes selected by the user. These modes include: • Normal Operation mode • Disable mode • Loopback mode • Listen Only mode • Configuration mode • Listen to All Messages mode • Modes are requested by setting the REQOP<2:O> bits (CiCTRL<1O:8>). Entry into a mode is acknowledged by monitoring the OPMODE<2:O> bits (CiCTRL<7:5>). The module does not change the mode and the OPMODE bits until a change in mode is acceptable, generally during bus idle time which is defined as at least 11 consecutive recessive bits.

  24. CAN Module Operation Modes • Normal Operating mode is selected when REQOP<2:O> = ‘000’. In this mode, the module is activated, the I/O pins will assume the CAN bus functions. The module will transmit and receive CAN bus messages. • Configuration mode, the module will not transmit or receive. The error counters are cleared and the interrupt flags remain unchanged. The programmer will have access to configuration registers that are access restricted in other modes.

  25. Set Operation Mode

  26. Set Operation Mode

  27. Get Operation Mode

  28. CAN Write

  29. CAN Write OR: tx = 0b11111000; See next Slide

  30. CAN Write 11 Highest Priority

  31. CAN Read

  32. CAN Read

  33. CAN Read

  34. Message Acceptance Filters • The message acceptance filters and masks are used to determine if a message in the message assembly buffer should be loaded into either of the receive buffers. • Once a valid message has been received into the Message Assembly Buffer (MAB), the identifier fields of the message are compared to the filter values. If there is a match, that message will be loaded into the appropriate receive buffer. • The filter masks are used to determine which bits in the identifiers are examined with the filters. A truthtable is shown in Table 23-3 that indicates how each bit in the identifier is compared to the masks and filters to determine if the message should be loaded into a receive buffer. • The mask bit essentially determines which bits to apply the filter to. If any mask bit is set to a zero, then that bit will automatically be accepted regardless of the filter bit.

  35. Message Acceptance Filters

  36. MASK

  37. MASK

  38. FILTER

  39. FILTER

  40. Optionally MASKS could be set manually as in the example:C1RXM0SID=0b0001111110000000;

  41. Optionally Filters could be set manually as in the example:C1RXF3SID=0b0001111000011100;

  42. Message Acceptance Filters • When a filter matches and a message is loaded into the receive buffer, the number of the filter that enabled the message reception is indicated in the CiRXnCON register via the FILHIT bits. The CiRX0CON register contains one FILHIT Status bit to indicate whether the RXF0 or the RXF1 filter enabled the message reception. The CiRX1CON register contains the FILHIT<2:0> bits. They are coded as shown in Table 23-4.

  43. Interrupts EXAMPLE C1INTE=0b00100011;

  44. Interrupts When a message is received, the RXnIF flag (CiINTF<0> or CiINRF<1>) will be set.

  45. Interrupts void interrupt_CAN1() org 0x00004A { // Your code // Remember to clear the Interrupt Flag on exit. See example (clearing RXIIF: Receive Buffer 1 Interrupt Flag bit) C1INTF=C1INTF&0b1111111111111101; }

  46. Arbitration • For bus arbitration, Carrier Sense Multiple Access/Collision Detection (CSMA/CD) with Non-Destructive Arbitration (NDA) is used. • If bus node A wants to transmit a message across the network, it first checks that the bus is in the Idle state (“Carrier Sense”), (i.e., no node is currently transmitting). If this is the case (and no other node wishes to start a transmission at the same moment), node A becomes the bus master and sends its message. • All other nodes switch to Receive mode during the first transmitted bit (Start-Of-Frame bit). After correct reception of the message (which is Acknowledged by each node), each bus node checks the message identifier and stores the message, if required. Otherwise, the message is discarded.

  47. Arbitration • If two or more bus nodes start their transmission at the same time (“Multiple Access”), collision of the messages is avoided by bitwise arbitration (“Collision Detection/Non-Destructive Arbitration” together with the “Wired-AND” mechanism, “dominant” bits override “recessive” bits). • Each node sends the bits of its message identifier (MSb first) and monitors the bus level. A node that sends a recessive identifier bit but reads back a dominant one loses bus arbitration and switches to Receive mode. • This condition occurs when the message identifier of a competing node has a lower binary value (dominant state = logic 0) and therefore, the competing node is sending a message with a higher priority. • In this way, the bus node with the highest priority message wins arbitration without losing time by having to repeat the message. • All other nodes automatically try to repeat their transmission once the bus returns to the Idle state. • It is not permitted for different nodes to send messages with the same identifier, as arbitration could fail, leading to collisions and errors later in the message.

  48. CAN BIT TIME • The CAN bit time is made up of non-overlapping segments. Each of these segments are made up of an integer number of units called Time Quanta (TQ). • The Nominal Bit Rate (NBR) is defined in the CAN specification as the number of bits per second transmitted by an ideal transmitter with no resynchronization and can be described with the equation:

More Related