Você está na página 1de 121

Automotive Networking

The Bosch Yellow Jackets


ISBN 978-3-86522-303-6 Order No. 1 987 772 147 AA/MKK2-07.07-En

The Program Order number ISBN

Automotive Electrics/Automotive Electronics Basic principles of networking


Motor-Vehicle Batteries and Electrical Systems 1 987 722 143 978-3-86522-044-8 Examples of networked vehicles
Alternators and Starter Motors 1 987 722 128 978-3-86522-046-2 Bus systems
Automotive Lighting Technology,
Architecture of electronic systems
Windshield and Rear-Window Cleaning 1 987 722 176 978-3-86522-047-9
Automotive Sensors 1 987 722 131 978-3-86522-049-3
Automotive Microelectronics 1 987 722 122 978-3-86522-048-6
Automotive Networking 1 987 722 147 978-3-86522-303-6

Diesel-Engine Management Edition 2007 Expert Know-How on Automotive Technology


Diesel-Engine Management: An Overview 1 987 722 138 978-3-86522-043-1 Automotive Electrics/Automotive Electronics
Emissions-Control Technology for Diesel Engines 1 987 722 141 978-3-86522-081-3
Electronic Diesel Control EDC 1 987 722 135 978-3-86522-032-5
Diesel Fuel-Injection System Common Rail 1 987 722 142 978-3-86522-030-1

Expert Know-How on Automotive Technology Automotive Networking


Diesel Fuel-Injector Systems
Unit Injector System / Unit Pump System 1 987 722 172 978-3-86522-104-9
Diesel In-Line Fuel-Injection Pumps 1 987 722 137 978-3-86522-042-4
Distributor-Type Diesel Fuel-Injection Pumps 1 987 722 144 978-3-86522-029-5

Gasoline-Engine Management
Emissions-Control Technology
for Gasoline Engines 1 987 722 102 978-3-86522-050-9
Gasoline Fuel-Injection System K-Jetronic 1 987 722 159 978-3-86522-051-6
Gasoline Fuel-Injection System KE-Jetronic 1 987 722 101 978-3-86522-052-3
Gasoline Fuel-Injection System L-Jetronic 1 987 722 160 978-3-86522-053-0
Gasoline Fuel-Injection System Mono-Jetronic 1 987 722 105 978-3-86522-054-7
Ignition Systems for Gasoline Engines 1 987 722 130 978-3-86522-040-0
Gasoline-Engine Management:
Basics and Components 1 987 722 136 978-3-86522-041-7
Gasoline-Engine Management:
Motronic Systems 1 987 722 139 978-3-86522-045-5

Safety, Comfort and Convenience Systems


Conventional and Electronic Braking Systems 1 987 722 103 978-3-86522-033-2
Driving Stability Systems 1 987 722 146 978-3-86522-085-1
Adaptive Cruise Control ACC 1 987 722 134 978-3-86522-039-4
Electronic Transmission Control ETC 1 987 722 127 978-3-86522-109-4
Compressed-Air Systems for
Commercial Vehicles (1):
Systems and Schematic Diagrams 1 987 722 165 978-3-86522-035-6
Compressed-Air Systems for
Commercial Vehicles (2): Equipment 1 987 722 166 978-3-86522-036-3
Safety, Comfort and Convenience Systems 1 987 722 150 978-3-86522-037-0
Audio, Navigation and Telematics in the Vehicle 1 987 722 132 978-3-86522-038-7
Driving Stability Systems 1 987 722 146 978-3-86522-085-1

The up-to-date program is available on the Internet at:


http://rb-k.bosch.de/en/service/info_book.html
Robert Bosch GmbH

Imprint

Published by: Reproduction, duplication and translation of this


Robert Bosch GmbH, 2007 publication, either in whole or in part, is permis-
Postfach 1129 sible only with our prior written consent and
D-73201 Plochingen. provided the source is quoted.
Automotive Aftermarket Illustrations, descriptions, schematic diagrams
(AA/MKK2) and other data are for explanatory purposes and
illustration of the text only.
Editorial team: They cannot be used as the basis for the design,
Dipl.-Ing. Karl-Heinz Dietsche. installation, or specification of products.
We accept no liability for the accuracy of the
Authors and contributors: content of this document in respect of applicable
Dipl.-Ing. Stefan Mischo; statutory regulations.
Dipl.-Ing. (FH) Stefan Powolny; Robert Bosch GmbH is exempt from liability.
Dipl.-Ing. Hanna Zndel; Subject to alteration and amendment.
Dipl.-Ing. (FH) Norbert Lchel;
Dipl.-Inform. Jrn Stuphorn, Printed in Germany.
Bielefeld University; Imprim en Allemagne.
Dr. Rainer Constapel,
DaimlerChrysler AG Sindelfingen; 1st Edition, July 2007.
Dipl.-Ing. Peter Hussermann,
DaimlerChrysler AG Sindelfingen; (1.0)
Dr. rer. nat. Alexander Leonhardi,
DaimlerChrysler AG Sindelfingen;
Dipl.-Inform. Heiko Holtkamp,
Bielefeld University

and the editorial team in cooperation with


the responsible technical departments of
Robert Bosch GmbH.
Unless otherwise specified, the above are
all employees of Robert Bosch GmbH.
Robert Bosch GmbH

Automotive Networking

Robert Bosch GmbH


Robert Bosch GmbH

Contents

4 Basic principles of networking


4 Network topology
8 Network organization
10 OSI reference model
12 Control mechanisms

16 Automotive networking
16 Cross-system functions
17 Requirements for bus systems
19 Classification of bus systems
19 Applications in the vehicle
21 Coupling of networks
21 Examples of networked vehicles

30 Bus systems
30 CAN bus
44 LIN bus
50 Bluetooth
60 MOST bus
71 TTP/C
84 FlexRay
96 Diagnosis interfaces

104 Architecture of electronic systems


104 Overview
107 Architecture methods
of electronic systems
115 Summary and outlook

116 Technical terms


and abbreviations
116 Index of technical terms
118 Abbreviations
Robert Bosch GmbH

As electronic systems and components continue to take hold in the automotive sector, so the
number of electronic systems used in motor vehicles is constantly increasing. Such systems
used to operate autonomously to a large extent, but today are combined to form an interconnected
network. Powerful bus systems enable data to be exchanged between these systems.

Networking has taken hold right down to the small-car segment. The engine-management system
exchanges data with other systems which have become standard features (e.g. antilock braking
system, ABS). Many comfort and convenience functions (e.g. power-window units) are likewise
controlled by bus systems. New functions e.g. the further development of ACC (Adaptive Cruise
Control) for stop & go traffic require data from different vehicle domains. In other words, all the
electronically controlled systems in a vehicle must communicate with each other.

Data transfer in the various vehicle domains is subject to different requirements. Various bus
systems have therefore become established. This publication starts by explaining the basic
principles of networking, then provides an overview of automotive networking, and uses several
examples to demonstrate the need for networking in modern vehicles. A further chapter deals with
the most important buses in detail.

The complexity of electrics/electronics continues unabated. It will be necessary in the future


to pursue new approaches in order to be able to keep on top of this complexity. Standardized
structures in the development of electronic systems ensure that in-vehicle electronics performs
its functions reliably in spite of the increasing complexity.
Robert Bosch GmbH

4 | Basic principles of networking | Network topology

Basic principles of networking

With the tremendous speed at which Network topology


computer technology is advancing, the
number of electronic systems in use is A network is understood to be a system
increasing more and more. This growth in which a group of elements can exchange
is also continuing in automotive engi- information via a transportation medium.
neering. However, this also means that If the elements are visualized as nodes and
the complexity of an overall system (the the communication relationships as lines,
vehicle in this case) is on the increase. a picture is created of a network where
Individual systems such as engine man- many nodes are related to several other
agement have been improved over the nodes. The nodes in a communication net-
last few years. However, innovations are work are also often referred to as network
mainly achieved by means of interaction subscribers or stations.
between several individual systems. In motor vehicles, complex control units
The individual components need to be such as those for the engine management
networked so that the multitude of infor- system (Motronic or electronic diesel con-
mation that is managed by the individual trol, EDC), the electronic stability program
systems can also be used elsewhere (ESP), the transmission control system
throughout the system. Different com- or the door modules can be network sub-
munication systems are used depending scribers (Fig. 1). However, a sensor with a
on requirements (e.g. transmission reli- conditioning circuit that merely prepares
ability, fault tolerances, costs). and digitizes a measured value can also
act as a network subscriber and make the
measured signals available to other net-

1 Vehicle system networking

UVA0014-1Y
Robert Bosch GmbH

Basic principles of networking | Network topology | 5

work subscribers. The transport medium Bus topology


via which the communication takes place This network topology is also referred
is referred to as a bus or a data bus. to as a linear bus. The core element of a
bus topology is a single cable to which all
A network topology is understood to be nodes are connected via short connecting
the structure consisting of network nodes cables (Fig. 2). This topology makes it ex-
and connections. This merely shows which tremely easy to add other subscribers to
nodes are interconnected, but does not de- the network. Information is transmitted by
pict underlying details such as the length the individual bus subscribers in the form
of the connection. Every network sub- of so-called messages and distributed over
scriber must have at least one connection the entire bus.
to another network subscriber in order Nodes transmit and receive messages.
to participate in network communication. If a node fails, the data that is expected
Different requirements are made of the from this node is no longer available to
network topology for a variety of commu- the other nodes on the network. However,
nication network applications, while the the remaining nodes can continue to ex-
topology determines some of the charac- change information. However, a network
teristics of the overall network. All net- with a bus topology fails completely if the
work topologies are based on the following main line is defective (due to a cable break,
four basic topologies for example).
Bus topology
Star topology Star topology
Ring topology and The star topology consists of a main node
Mesh topology (repeater, hub) to which all other nodes
are coupled via a single connection (Fig. 3).
Other structures (hybrid topologies) can A network with this topology is therefore
be created by combining these basic topol- easy to extend if free capacity is available
ogies. (connections, cables).

2 Linear bus topology 3 Star topology


UMA0036-3D
SVA0003Y
SVA0002Y
Robert Bosch GmbH

6 | Basic principles of networking | Network topology

In star topologies, data is exchanged be- Ring topology


tween the individual node connections In the ring topology, each node is con-
and the main node, whereby a distinction nected to its two neighbors. This creates
is made between active and passive star a closed ring (Fig. 4). A distinction can
topologies. In active star topologies, the be made between single rings and double
main node contains a computer that pro- rings.
cesses and relays information. The perfor- In a single ring, data transfers are uni-
mance capability of a network is essen- directional from one station to the next.
tially determined by the performance The data is checked when it is received.
capability of this computer. However, If the data is not intended for this station
the main node does not have to have spe- it is repeated (repeater function), boosted
cial control intelligence. In passive star and relayed to the next station. The data
systems, it merely connects the bus lines that is being transferred is therefore re-
of the network subscribers together. layed from one station to the next in the
The following applies to active and pas- ring until it has reached its destination or
sive stars: if a network subscriber fails or arrives back at its point of origin, where
a connecting line to the main node is de- it will then be discarded.
fective, the rest of the network continues As a soon as a station in a single ring
to operate. However, if the main node fails fails, the data transfer is interrupted and
the entire network is disabled. the network breaks down completely.
In the automotive area, star structures
are under discussion for safety and secu- Rings can also be set up in the form of a
rity systems such as brakes and steering. double ring (e.g. FTTI), in which the trans-
In this case, the risk of a complete network fer of data is bidirectional. In this topology,
failure is prevented by designing the main the failure of a station or a connection
node to be physically redundant. This between two stations can be overcome,
means that several main nodes are used since all data is still transferred to all
to which the nodes whose information is operational stations in the ring.
needed for safe operation of the vehicle However, if several stations or connec-
can be connected in parallel. tions fail, the possibility of a malfunction
cannot be ruled out.

4 Ring topology 5 Mesh topology


SVA0004Y

SVA0005Y
Robert Bosch GmbH

Basic principles of networking | Network topology | 7

Mesh topology Hybrid topologies


In a mesh topology, each node is con- Hybrid topologies are a combination of
nected to one or more other nodes (Fig. 5). different network topologies. Examples of
In a fully meshed network, each node is such combination are:
connected to every other node. Star bus topology: the hubs of several
If a mode or connection fails it is possi- star networks are interconnected as a
ble for the data to be rerouted. This type linear bus (Fig. 6).
of network therefore has a high degree of Star ring topology: the hubs of several
system stability. However, the cost of net- star networks are connected to the main
working and transporting the message is hub (Fig. 7). The hubs of the star net-
high. work are connected in the form of a ring
Radio networks form a type of mesh to- in this main hub.
pology, since the transmissions from each
station are received by every other station
that is within range.
A mesh topology is bus-like as far as
exchanging messages is concerned, and
star-like regarding data transfers, since
every station receives all transmissions
from every other station, but connection
failures can be overcome.

6 Star bus topology 7 Star ring topology


SVA0007Y
SVA0006Y
Robert Bosch GmbH

8 | Basic principles of networking | Network organization

Network organization Message-oriented method


In this method it is not the receiver node
Addressing that is addressed, but the message itself
In order to make it possible to transmit (Fig. 8b). Depending on the content of
messages via a network and evaluate the the message, it is identified by a message
contents thereof, the useful data (payload) identifier that has been predefined for
that is transmitted is also accompanied by this message type. In this method, the
data transfer information. This can be ex- transmitter does not need to know any-
plicitly contained within the transmission thing about the destination of the message,
or implicitly defined using preset values. since each individual receiver node de-
Addressing represents important informa- cides whether or not to process the mes-
tion for data transfer information. It is sage. Of course, the message can be re-
needed in order for a message to be sent to ceived and evaluated by several nodes.
the correct recipient. There are different
ways of doing this. Transmission-oriented method
Transmission characteristics can also be
Subscriber-oriented method used to identify a message. If a message is
The data is exchanged on the basis of node always transmitted within a defined time
addresses. The message sent by the trans- window, it can be identified on the basis
mitter contains the data to be transmitted of this position. By way of a safeguard,
and also the destination node address this addressing is often combined with
(Fig. 8a). All receivers compare the trans- message or subscriber-oriented address-
mitter receiver address to their own ing.
address, and only the receiver with the
correct address evaluates the message. Bus access method
The majority of conventional communi- A node must access the bus in order to
cation systems (such as Ethernet) operate transmit a message. In the bus access
using the subscriber addressing principle. method a distinction is made between
Predictable methods in which the bus
access is determined by certain time-
dependent network characteristics,
whereby only one node can transmit
at a time and
8 Addressing modes Random methods whereby any node
can attempt to transmit data if the bus
a
appears to be free

Adr 1 Adr 2 Adr 3 Adr 4 In the predictable method the bus access
right is determined before bus access.
Adr 3 It can thereby be ensured that only one
subscriber is using the bus at a time.
Access collisions because of simultaneous
b
bus usage will be prevented if all subscrib-
Id 1 Id 2 Id 2 ers use this method.
Id 4 Id 3
Id 3 Id 3 Id 5
Id 6 Id 5 Id 6
Fig. 8
Id 7
UVA0012-1Y

a Subscriber-oriented
method
Id 3
b Message-oriented
method
Robert Bosch GmbH

Basic principles of networking | Network organization | 9

In the random method, the nodes can Multimaster


simultaneously attempt to use the bus as In a Multimaster network, several nodes
soon as it appears to be free. The timing can access the transport medium indepen-
of the bus access is therefore random. dently without the assistance of another
There is a risk of transmission collisions node. Bus access is uncontrolled. Every
using this method, which will require at- node can access the bus and transmit a
tention. This can be dealt with by repeat- message if the bus appears to be free.
ing transmissions after a collision has been This means that each node is its own mas-
detected (e.g. Ethernet), by giving the ter, and that any node can start a message
transmissions different codings (CDMA), transfer with equal status. However, this
controlling communication via a master or also means that collision detection and
prioritizing message types or transmitters. handling methods have to be in place.
For example, this may be in the form of a
Time division multiple access (TDMA) decision-making phase with prioritization
TDMA is a deterministic (predictive) ac- or delayed transmission repeats. The use
cess method. In this case each node is as- of priority control prevents a bus conflict
signed a time window in which it is allowed if several nodes wish to use the bus at the
to transmit (a priori). A fixed schedule same time, since the network node that
is therefore required for the network. has high priority or wishes to transmit
There is not usually a main communication a message with high priority forces its
subscriber controlling the communication way through in the event of a conflict and
procedure. However, concepts exist in transmits its message first. Normal mes-
which in which it is possible to switch be- sage transmission resumes when the line
tween different schedules if necessary. is free again.
The internal clocks of the different stations The Multimaster architecture has a posi-
must run extremely synchronously with tive effect on the availability of the system,
TDMA, since the transmit windows have since no individual node is in control of
to be adhered to with extreme precision. communication whose failure would lead
to total communication breakdown.
Master-slave
In the master-slave system, one node
on the network operates as the master.
This node determines the communication
frequency by interrogating its subordinate 9 Master-slave method

nodes (slaves). A slave only replies if it is


spoken to by the master (Fig. 9). However,
some master-slave protocols allow a slave Master
to contact a master in order to transmit a
message (e.g. transmit information about
the position of the power-window unit to
the door module).
A B A B A B
UVA0013-1E

Slave Slave Slave


1 2 3
Robert Bosch GmbH

10 | Basic principles of networking | OSI reference model

OSI reference model ranged functional areas (layers). Not all of


the layers in the OSI model are needed in a
Network protocols are usually defined simple communication system. Layers can
in layers, which combine properties and also be combined for many applications.
tasks. The properties of the deeper-lying Network protocols in the automotive area
layers are assumed in the next level up. are often divided up into
This has the advantage that individual Physical layer
layers are exchangeable, provided that Communication layer and
the interfaces that are provided between Application layer (user layer)
the layers remain unchanged.
The ISO OSI reference model (Open Physical layer
Systems Interconnection) provides a basis The electrical and procedural parameters
for describing and comparing many com- of the physical connection between the
munication protocols. This was developed network subscribers is defined in the
by the ISO (International Standardization physical layer.
Organization) and led to the adoption of
international standards by ISO and IEEE Signal level
(Institute of Electrical and Electronic In digital technology, data is represented
Engineers). by sequences of the two binary statuses,
In the OSI model, data communication 0 and 1. In order to transmit the data on
systems are depicted in different layers a bus, these statuses must be represented
(Fig. 10). The complex task of data commu- on the transmission agent. It is particularly
nication is distributed among clearly ar- important to avoid short-circuits on the

10 OSI reference model 11 Creating dominant and recessive levels

5V

Data Data
Bus
User layer line

Application layer E1 E2
T1 T2

Communication layer
Presentation layer
Control Status T Bus level
E
Session layer
0 conducts 0V
Transport layer
1 blocks 5V
Network layer
E1 E2 Bus level
Data link layer 0 0 0V dominant
0 1 0V dominant
Physical layer 1 0 0V dominant
1 1 5V recessive
Physical layer
UVA0027E

SVA0008Y

Physical connection
Robert Bosch GmbH

Basic principles of networking | OSI reference model | 11

bus when one node is transmitting a status If no data is being exchanged, the bus level
of 1 and another is transmitting a status is 5 V (microcontroller operating voltage,
of 0. Fig. 11). When the start bit is transmitted
The binary statuses can be depicted in (dominant level), the other station con-
many different ways. The serial interface nected to the bus (receiver) is notified
of the PC, for example, uses +12 V and that a data transfer is starting (Fig. 12).
-12 V, and CAN-B uses voltages of 0 V and The length of the start bit determines a
5 V. The voltages of the serial interface are bit time that represents the basis for the
unsuitable for a bus, since short-circuits entire data transfer. Every subsequent
can occur if several subscribers wish to data bit has the same length. The recipro-
transmit conflicting binary statuses simul- cal of this time corresponds to the data
taneously. transfer rate, i.e. the number of bits that
If the coding allows one level to over- can be transmitted in one second in a
write another, the overwriting level is re- continuous data stream. All participat-
ferred to as dominant, and the subordinate ing stations must be set to the same data
level as recessive. transfer rate.
It is also possible to depict dominant After the start bit has been received,
and recessive levels using visual media. the transmission of an 8-bit data word
A status of 1 (recessive) then corresponds commences (1 byte) with the lowest signif-
to e.g. dark, and a status of 0 (dominant) icant bit (LSB, Low Significant Bit). The re-
corresponds to light. In an optical fiber, ceiver that has synchronized itself to the
an individual node can override all of the start bit scans the data bus between each
others by feeding light into the conductor. data bit and therefore assembles the trans-
ferred data byte.
Bit stream The eighth data bit is followed by the
The application information cannot usu- parity bit. This bit indicates whether the
ally be transmitted directly. In order to number of transmitted ones is odd or even.
make transmission possible, the informa- It therefore allows the receiver to perform
tion is first incorporated as a payload in a simple check for possible transmission
the frame of a message that contains infor- errors. The sequence is completed with
mation to be transmitted. Since all proto- the stop bit, which is placed onto the bus
cols have been developed in accordance
with different requirements, the frame
format differs from protocol to protocol. 12 UART interface transmission frame

The frame needs to converted into a


bit stream to actually transmit the infor-
mation, i.e. a sequence of bits that can be
transmitted via the transport medium as
physical states.

Example of the UART interface


Start bit
The microcontrollers that are used in
8 data bits (1 byte)
control units have a simple interface
(UART, Universal Asynchronous Receiver/ Parity
Transmitter) on the chip, via which they Stop bit
can communicate with the outside world
SVA0009Y

(e.g. with a PC). The essential features of


a data transmission are read out via this
interface.
Robert Bosch GmbH

12 | Basic principles of networking | Control mechanisms

with a dominant level. The next data trans- Control mechanisms


fer can then take place.
Event control
Communication layer In an event-driven bus system, messages
Control units can only interconnect and are transmitted as soon as an event that
exchange data if they speak the same triggers the transmission of a message
language. This language determines has occurred (Fig. 13a). Examples of such
the rules that are used to exchange data events are:
between the individual network sub- Pressing a button on the air conditioning
scribers. system control panel
The communication layer accepts data Operating the hazard warning flasher
from the application layer, prepares it for switch
transmission and forwards it to the physi- Incoming message that requires a reac-
cal layer. tion (e.g. information from rpm sensor
The essential features of this protocol to speedometer needle motor)
layer are: Expiration of a fixed time period (time
Message frame format frame, e.g. 100 ms), after which mes-
Bus access control sages are transmitted cyclically
Message addressing
Detection and handling of collisions Since the stations are not synchronized
Network node synchronization with each other, situations where several
Checksum calculation stations wish to access the bus simultane-
ously are unavoidable. In order to allow
Application layer
The application layer consists of the appli-
cation that processes and provides the in- 13 Event control

formation. The application layer is the only


protocol layer to be affected by user or
a Occurrence of events
sensor input. high

1
Priority

2
low
Level

1
1 2 3
0

Time

b Occurrence of events
high
1
Priority

4
3 7

2 6
5
low
Level

1
1 3 4 2 5 6 7
SVA0010Y

Time
Robert Bosch GmbH

Basic principles of networking | Control mechanisms | 13

a message to be transmitted without falsifi- Timer control


cation, only one station at a time can trans- In the most recent developments in dy-
mit data on the bus. Collision avoidance namic driving systems such as brakes and
mechanisms are available for preventing steering, an increasing number of mechan-
or solving bus conflicts. ical and hydraulic components are being
If a node wishes to transmit a message replaced with electronic systems (x-by-
whilst the bus is occupied, the transmis- wire). Mechanical connections such as
sion is delayed (Fig. 13b). A station that is the steering column are becoming super-
ready to transmit must then wait until the fluous, and the functionality thereof is be-
transmission that is currently in progress ing taken over by sensors and actuators.
has been completed. The reliability, safety and failure tolerance
Since bus access is subsequently rene- requirements of these systems are ex-
gotiated, the transmission may be delayed tremely high. This means:
yet again. These delays become problem- Messages must be received on time
atic if the bus becomes overloaded by a The latency time of critical messages
large number of network subscribers that must be extremely small
wish to transmit messages. In this case The system must have a redundant
messages may be lost if the transmitter design
abandons the transmission due to exces- The failure of a node must affect the rest
sive delays. of the system as little as possible and
Event-driven bus systems are suitable It must be possible to achieve a safe op-
for reacting to asynchronous (unforeseen) erating status from any fault situation
events as quickly as possible. In an ideal
case, they reduce the delay between the X-by-wire systems require close network-
occurrence of the event and the message ing by the various components. The exter-
transmission (latency time) compared to nal increase in complexity places new de-
time-driven systems. However, the latency mands on the safety, failure tolerance and
time can vary considerably depending on availability of the communication system.
the network loading. The demands that are made of the elec-
tronic and network architecture therefore
Advantages also increase. A reliable, fault-tolerant net-
High level of flexibility and capability of work architecture is required so that data
retrofitting new nodes in the network is transmitted with guaranteed transmis-
Good response time to asynchronous sion characteristics, and electronic system
external events malfunctions are handled in the most effi-
Bus usage depending on event fre- cient way.
quency in line with requirements
No network loading by unused events, System architectures for real-time applica-
since only events that have actually tions meet these requirements because
occurred trigger a transmission their behavior is predictable and verifiable
because of the way in which they are con-
Disadvantages structed. In these protocols, time windows
Static bus occupancy, non-deterministic within which a node is permitted to trans-
(i.e. not possible to prove that a message mit are assigned to the control units in the
was transmitted at the right time) communication network (nodes) during
network planning (Fig. 14). In order to com-
ply with the time window, the nodes must
be synchronized as precisely as possible.
Robert Bosch GmbH

14 | Basic principles of networking | Control mechanisms

All transmissions are processed sequen- Advantages


tially in accordance with the network plan- Deterministic system
ning (without collisions). Once each node Punctual data transmission
has transmitted its message, the cycle re- Reliable detection and isolation of
starts with the first transmitter. This makes defective network nodes
it possible to determine how chronologi-
cally up-to-date the data is at any time. Disadvantages
Since missing messages are detected Overall system must be planned for
immediately, time-triggered concepts are distributed developments
more reliable than event-driven systems. Capacity for expanding the communica-
If a fast data rate is required in a time- tion system must be planned in
triggered system, the time delay between Good response time to asynchronous
the occurrence of an event and the trans- external events
mission of the data can be so small that
the system complies with strict real-time Composability
requirements. If a communication system allows inde-
The bus can be protected from unau- pendently developed subsystems to be
thorized access by a bus guardian. The bus integrated in an overall system, it is said
guardian prevents a defective node from to support composability. An important
interfering with network communication criterion when doing this is that the prop-
by transmitting messages outside the rele- erties that have been assured for the func-
vant transmit window. tionality of a subsystem are not adversely
These characteristics make it possible affected by adding other subsystems.
to create redundant, fault tolerant systems If this has been ensured, the checking
in which transmission errors can be reme- of system functionality is restricted to
died and faults in the network can picked subsystem checking that can be carried
up by network nodes that can provide the out by the constructor of the subsystem.
functionality without errors. If a communication system supports
composability, changes can be made to a
control unit without affecting the function-
ality of other control units. It is therefore
not necessary to recheck the entire system
after integrating a modified control unit
it is sufficient to check that the individual
subsystems are operating reliably. Com-
14 Timer control posability therefore reduces the time and
cost of integrating new subsystems. This is
the only way to increase the complexity of
Occurrence of events
the electronics in the vehicle.

0
Max. output
Time slots delay
Time
SVA0011Y
Robert Bosch GmbH

Sensor measuring principles | 15

Overview of bus systems used in vehicles

CAN-C CAN-B LIN TTP


high-speed CAN low-speed CAN
Definition Controller area Controller area Local interconnect Time-triggered protocol
network network network
Bus type Conventional bus Conventional bus Conventional bus Conventional and
optical bus
Domains Drivetrain Comfort/ Comfort/ Safety-related
convenience convenience networking
Applications Engine management, Body and comfort Low-cost expan- Networking in safety-
transmission control and convenience sion of CAN bus for related environments
and ABS/ESP net- electronics net- simple applications such as brakes, steering,
working working in the comfort and railway signal boxes or
convenience electron- aircraft landing gear
ics area
Most frequently Linear bus Linear bus Linear bus Star topology
used topology
Data transfer rate 10 kbit/s to 1Mbit/s Max. 125 kbit/s Max. 20 kbit/s Unspecified,
typ. 10 Mbit/s
Max. number of nodes 10 24 16 Unspecified
Control mechanism Event-driven Event-driven Time-driven Time-driven
Bus lines Copper conductors Copper conductors Copper conductor Copper conductors
(twisted pair) (twisted pair) (single wire) (twisted pair)
Deployment in all vehicles in all vehicles in all vehicles Premium class vehicles,
aircraft, rail control
systems
Standard ISO 1198 ISO 11 519-2 LIN consortium TTA group
SAE classification Class C Class B Class A Drive-by-wire

MOST Bus Bluetooth Flexray


Definition Media oriented Proprietary name Proprietary name
systems transport (Danish king)
Bus type Optical bus Wireless Conventional and optical bus
Domains Multimedia and Infotainment Multimedia and Infotainment Deployment across all domains
Applications Transmission of control, Data transfers over short A network system for use
audio and video information distances, e.g. mobile phone in safety-related and simple
integration in the infotain- applications
ment system
Most frequently Ring topology Network topology (radio) Star topology
used topology
Data transfer rate Max. 22.5 Mbit/s Max. 3 Mbit/s (v2.0) Typ. 10 Mbit/s
Max. 723 kbit/s (v1.2) Max. 20 Mbit/s
Max. number of nodes 64 8 active (up to 256 passive) Theoretically up to 2,048
Max. 22 per passive bus/star
Control mechanism Time and event-driven Event-driven Time and event-driven
Bus lines Plastic or glass optical Electromagnetic radio waves Copper conductors
waveguides (twisted pair)
Deployment Premium class vehicles made All vehicles, connection be- Pilot application
by European manufacturers tween multimedia equipment
and infotainment system
Standard MOST cooperation Bluetooth SIG Flexray consortium
SAE classification Mobile Media Wireless Drive-by-wire

Table 1
Robert Bosch GmbH

16 | Automotive networking | Cross-system functions

Automotive networking

Electrical and electronic systems in Cross-system functions


motor vehicles are often not indepen-
dent of each other but influence and If you examine the signals that are pro-
complement each other. For this reason, cessed in the individual systems, it be-
signal lines were used in previous injec- comes evident that many signals are
tion and ignition systems in order to needed in several control units. For exam-
simplify communication between these ple, the driving speed is evaluated in the
two systems. However, the increasing electronic stability program (ESP) for the
number of electronic systems rapidly vehicle dynamics control, in the engine
increased the demand for and the scope management for the automatic speed
of the information that was being ex- control (cruise control) and in the car
changed. The number of signal lines sound system for the speed-dependent
and plug connections that is required volume control.
increased accordingly, meaning that the The preparation of these variables from
technology that has so far been used was sensor signals requires computing power
approaching the limit of its capability. and therefore hardware and software re-
sources. It is therefore advisable for these
The solution was provided by the develop- variables always to be calculated in a con-
ment of serial bus systems, with which trol unit and transmitted to other control
large volumes of data from different units via a communication network.
sources can be transferred. A serial bus However, in order to implement cross-
system was first used in a vehicle in 1991, system functions, electronic systems can
when the CAN bus was used in the also exchange information and therefore
Mercedes-Benz 500E. influence each other. Intelligent sensors
The demand for additional driving are also considered to be electronic sys-
safety, convenience, economy and stricter tems that prepare the sensor signal in an
legal requirements on the environmental evaluation circuit and put the information
compatibility of motor vehicles can only on the data bus via a bus interface. Pre-
be achieved with the aid of additional elec- crash sensors detect a pending collision,
tronics. The number of electronic systems for example; the airbag control unit then
in vehicles is therefore increasing all the sends the door modules and the overhead
time (Fig. 2). control panel a request to close the windows

1 Automotive networking
SVA0037Y
Robert Bosch GmbH

Automotive networking | Cross-system functions | 17

and the sliding roof. This protects the Requirements for


occupants from penetrating objects. bus systems
Another example of a system-encom-
passing function is the adaptive cruise Both financial (e.g. cable costs, component
control (ACC), in which the radar sensor, costs) and technical constraints must be
the engine management, the electronic taken into consideration when a bus sys-
stability program (ESP) and the transmis- tem is being selected. The most important
sion control communicate with each other. technical selection criteria are explained
Distance control from the vehicle in front in the following.
that is adapted to the flow of traffic is
made possible in this system by means Data transfer rate
of engine torque adjustments, automatic This variable specifies the volume of data
brake system intervention and gear that is transmitted during a time unit. The
selection. smallest unit of data is the bit, and the data
Coordination between the individual transfer rate is usually specified in bits/sec-
systems is therefore required for cross- onds. Alternative names for this expression
system functions. Large volumes of data are transfer rate, data rate or bit rate.
must be exchanged to do this. As well as The required data rate is dependent on
powerful components, a powerful commu- the application. A slower transfer rate is
nication system is also required, with a required to switch the air-conditioning
low-cost network that is suitable for auto- compressor on and off than to transfer
motive vehicles. Special serial databus sys- audio signals, for example.
tems have been developed for this purpose.
Interference immunity
The use of bus systems has the following Ideally, the data should be transferred
advantages in comparison to a solution without interference. However, this cannot
that uses conventional wiring: be guaranteed in a motor vehicle because
Reduced costs with less weight and in- of electromagnetic effects. The interfer-
stallation space because of fewer cables ence immunity requirements that are
in the wiring harness made depend on the safety relevance of
Better reliability and functional reliabil- the electronic systems concerned. Lesser
ity due to fewer plug-in connections requirements are made of comfort and
Simplification of vehicle assembly
during production Number of control units in the Mercedes S-class
2 that are networked via CAN
Multiple use of sensor signals
Simple connection of system compo- 60
nents to a bus
Easier handling of equipment and spe- 50
cial equipment variants in a vehicle
40

30

20

10
SVC0012-1Y

0
W140 W220 W221
(1991) (1998) (2005)
Robert Bosch GmbH

18 | Automotive networking | Requirements for bus systems

convenience systems than the antilock Hard real-time requirement: the time
brake system (ABS), for example. specification must be strictly adhered
In order to meet these requirements, to. If the specified response time was ex-
mechanisms that detect transmission er- ceeded, the calculated result would not
rors are incorporated in the network pro- be able to be used. This can lead to seri-
tocols. A simple check can be carried out ous problems in safety-critical systems.
using the parity bit, which is calculated in
the transmitter and is transmitted together For example, if time allowances were ex-
with the useful data. This specifies whether ceeded in the ABS system, the incipient
the number of 1's in the transferred byte is locking of the wheels would not be de-
even or off. This information is checked by tected soon enough and the pressure in
the receiver. Single errors can be detected the master cylinder would not be reduced
using this method. in time. This would result in locked wheels.
Another method is the checksum check. The time allowances must also be strictly
If several data bytes are being transmitted, adhered to for many engine-management
the transmitter calculates a checksum system functions. Delays in transmitting
from the individual data bytes using a pre- injection and ignition signals could lead
defined formula and transmits this value. to engine judder and even misfiring.
The receiver also calculates the checksum These reactions must be avoided, since
of the data bytes that have been received they represent a potential danger. Hard
and compares it with the checksum that has real-time requirements must therefore be
been received. If a data transmission error made of these systems.
is detected, the received data is not used However, this does not necessarily mean
and a repeat transmission is requested. that the transmission of data via a bus sys-
tem also has to be subject to these hard
Real-time capability real-time requirements. Adherence to
A real-time system guarantees that its re- soft real-time requirements is usually suf-
sults are calculated within a fixed time in- ficient. If signals from other control units
terval. The duration of the time interval are needed for functions (e.g. a torque re-
depends on the application. The antilock duction request during a shift operation),
brake system (ABS) must react to the the bus system must transmit the data at
incipient locking of a wheel within a few a faster data transfer speed and with a
milliseconds (wheel speed reduction), smaller time delay so that the overall sys-
whereas response times of 100 ms are tem complies with the specified real-time
adequate for actuating the power-window requirements.
motor. Human beings cannot perceive
delay periods of less than 100 ms. Number of network nodes
Different demands are made of real-time The maximum number of nodes to be inte-
behavior depending on the application: grated varies for different areas of vehicle
Soft real-time requirement: the system operation. The number of nodes for com-
generally adheres to the specified re- fort and convenience systems may be high
sponse time, and if these times are occa- due to servomotor networking (e.g. seat
sionally exceeded, it does not produce adjustment) and intelligent sensors (e.g.
any serious effects (e.g. image jerking rain sensors). Several identical busses can
during picture transmission). be used if necessary.
Robert Bosch GmbH

Automotive networking | Classification of bus systems | 19

Classification of bus systems Applications in the vehicle


Because of differing requirements, The overall vehicle system can be divided
bus systems can be subdivided into into four domains or functional areas from
the following classes. the point of view or electrics/electronics:
Drivetrain
Class A Chassis
Transfer rates Low data rates Interior and
(up to 10 kBit/s.)
Telematics
Applications Actuator and sensor
networking
Representative LIN In the drivetrain and chassis domains,
the emphasis is primarily on real-time
Class B
applications. In the interior domain, the
Transfer rates Average data rates
(up to 125 kBit/s.) main focus is on multiplex aspects in net-
Applications Complex mechanisms working. Mainly multimedia and infotain-
for error handling,
control unit networking
ment applications are networked in the
in the comfort functions telematics domain.
Representative Low speed CAN

Class C Real-time applications


Transfer rates High data rates The networking of these systems makes
(up to 1 MBit/s.) considerable demands of the performance
Applications Real-time requirements, capability of the communication system.
control unit networking
in the drive and running Crankshaft-synchronous processes or pro-
gear functions cesses within a fixed time frame with cycle
Representative High speed CAN times of a few milliseconds are typical.
Class C+ If the system response times are adequate
Transfer rates Extremely high data rates for the task in hand, it is described as hav-
(up to 10 MBit/s.)
ing real-time capability (e.g. rapid ignition-
Applications Real-time requirements,
control unit networking timing advance in the Motronic after a re-
in the drive and running quest from the traction-control system for
gear functions
reducing torque and therefore preventing
Representative FlexRay
the wheel from spinning).
Class D
Transfer rates Extremely high data rates
(> 10 MBit/s.)
3 Domains in the overall vehicle system

Applications Control unit networking


in the telematics and
multimedia functions
Representative MOST

Chassis Drivetrain

Interior Telematics
SVC0013-1Y
Robert Bosch GmbH

20 | Automotive networking | Applications in the vehicle

The drivetrain and chassis systems are Multimedia networking


assigned to class C. These require fast Mobile communication applications com-
transfer rates in order to ensure the real- bine components such as
time behavior that is required for these Car sound system
applications. They also make considerable CD changer
fault tolerance demands. These require- Navigation system
ments are met by the event-driven CAN Driver-information systems
bus with a transfer rate of 500 kBaud Telephone
(high-speed CAN). Video system
Voice input
Examples: Internet, E-mail
Engine-management system (Motronic Back-up camera
or electronic diesel control, EDC)
Transmission control The networking of these components
Antilock brake systems, ABS makes it possible to have a centrally lo-
Vehicle dynamics control (e.g. electronic cated display and control unit for several
stability program, ESP) applications. Operating procedures can
Chassis control systems (e.g. active body be standardized in this way, and status
control, ABC) information can be summarized. Driver
Support systems (e.g. adaptive cruise distraction is therefore minimized.
control, ACC)
A distinction must be made between con-
Multiplex applications trol data and audio/video data in multime-
The multiplex application is suitable for dia networking. Transfer rates of up to
controlling and regulating components in 125 kBit/s are sufficient for control tasks
the body and comfort and convenience (such as CD changer control), meaning that
electronics area (class B), such as the low-speed CAN bus can be used, for
Displays example. The direct transmission of audio
Lighting or video data requires extremely high
Access authorization with anti-theft transfer rates of more than 10 MBit/s.
warning device The MOST bus is used for this purpose,
Air-conditioning for example.
Seat and mirror adjustment
Door module (power-window unit,
door-mirror adjustment)
Windshield wipers
Headlamp adjustment

The transfer rate requirements are not


as high for class B systems as they are for
class C systems. For this reason, low-speed
CAN with a transfer rate of 125 kBit/s or
single-wire CAN with 33 kBit/s. can be used.
If the transfer rate requirements drop
to less than 20 kBit/s, the low-cost LIN is
more frequently used. Applications are
mainly in the mechatronics area; examples
being the transfer of switch information or
the activation of actuators.
Robert Bosch GmbH

Automotive networking | Coupling of networks | 21

Coupling of networks Examples of networked


vehicles
The network topologies and protocols that
are most suitable for requirements are Topology
used for the different applications. How- The topologies of the communication net-
ever, the different network protocols are works can differ considerably depending
incompatible, meaning that data cannot be on the vehicle equipment. Figure 5 shows
simply exchanged between networks. examples of how the network can be struc-
In this case, help is provided by a gate- tured for different vehicle classes. In some
way. A gateway can be compared to an in- cases, different car manufacturers use dif-
terpreter that receives the data from a ferent bus systems for communication.
discussion partner, translates it and passes
it to another discussion partner. Techni- Signal transmission
cally speaking a gateway is a computer Signal types
that reads in the data that is transmitted A wide variety of information can be trans-
by the networks and converts it into an- mitted in a communication network in a
other format. The use of gateways there- vehicle. Some examples are:
fore makes it possible to exchange infor- Engine operating conditions (e.g. engine
mation between different networks. temperature, engine speed, engine load)
A central gateway (Fig. 4a) or several Physical measurements recorded by
distributed gateways can be used (Fig. 4b) sensors (e.g. outside temperature)
to interconnect the bus systems. All bus Control signals for activating servo-
lines are routed to the central gateway. motors (e.g. power-window units)
In the other case, one gateway connects Control-element switch positions
two or more busses. (e.g. for the windshield wiper)
Multimedia data (audio and video) for
transmitting music and speech (e.g. from
radio stations or when handsfree talk-
ing with a cellular phone) and moving
pictures (e.g. when playing a DVD or the
displays from a reversing camera)

4 Gateway structures

a b
Diagnostics

LIN Diagnostics Gateway 2


(drivetrain)
FlexRay Central
CAN-C gateway Gateway 1 Gateway 3
CAN-B ECUn (telematics) (interior)
ECU1 ECU1 MOST Gateway 4
ECU1 ECU1
ECU1 ECU2 ECU2 (chassis)
ECU1
ECU2 ECU2
ECU2 ECU3 ECU3 ECU2
ECU3 ECU3
ECUn ECUn ECUn Fig. 4
ECU4 ECU4 ECU1 ECU1 ECUn a Network with
Chassis Drive- Interior Telematics
SVC0014-1E

train ECUn ECUn ECUn ECU2 ECU3 central gateway


b Network with
several distributed
gateways
Robert Bosch GmbH

22 | Automotive networking | Examples of networked vehicles

5 Network topologies

a
Sensor CAN

Diagnostics
CAN Drive CAN

Instrument
cluster CAN
LIN

Comfort CAN

LIN
Infotainment CAN

Comfort CAN

LIN

BluetoothTM
b Distance control
CAN

Instrument
cluster CAN
Diagnostics CAN
MOST

Drive CAN

LIN LIN
Fig. 5 LIN
Typical network
topologies for
new-generation
SVA0028E

vehicles Comfort CAN


a Compact class
b Luxury class
Robert Bosch GmbH

Automotive networking | Examples of networked vehicles | 23

Resolution (e.g. 1 second). The engine speed, on


The signals must be available with a suit- the other hand, can change extremely
able resolution. Switch positions can rapidly. The times at which the engine
simply be shown as a 1-bit value (0 for management carries out measurements
switch open, 1 for switch closed). Other and calculations depends on the crank-
signals such as digitized analog voltages shaft position and is performed once per
from the engine-temperature sensor or combustion cycle. At fast engine speeds,
the calculated engine speed are shown as this corresponds to a time interval of a
1-byte or 2-byte values, for example, de- few milliseconds, i.e. approx. 3.3 ms at an
pending on resolution requirements. One engine speed of 6,000 rpm for a 6-cylin-
byte can be used to represent 256 values, der engine. However, not every system
and two bytes can be used to represent that needs the speed information for its
65, 536 values (= 256?256). The resolution control and regulation functions depends
for sensor signals with a voltage range on this availability. The engine control
of 05 V is approximately 20 mV with unit therefore does not need to output the
a 1 byte representation (= 5 V/256). A speed information on the data bus as soon
resolution of 5 mV requires a 10-bit data as it is calculated. In this case too, data
representation. transmission takes place according to a
The conversion between the binary cyclic time frame. A time frame of 10 ms
value and the physical value must be uni- is normal in the engine control area. This
form so that the transferred signals rep- means that the speed information is trans-
resent the same physical value in all sys- mitted on the bus 100 times per second.
tems. A resolution of 30 rpm is sufficient
for accessing the ignition map as far as Multimedia data
the engine speed n is concerned. A value A multimedia-compatible digital bus
range of 0 to 255?30 rpm (= 7, 650 rpm) system is frequently used in luxury-class
and therefore the entire speed range can vehicles to transfer audio data as an
consequently be represented by one byte alternative to using analog cables. In ad-
(8 bits). An incrementation of 30 rpm is too dition to improved audio quality, a bus
little for idle-speed control, on the other system of this type offers the advantage
hand. More bits are required to represent that various audio streams and the associ-
the signal with a higher resolution, pro- ated check commands can be transferred
vided that the same measuring range is in parallel. In the automotive industry,
being recorded. the optical MOST bus (Media Oriented
Systems Transport) has proven successful
Output as a the multimedia bus system.
In event-driven systems such as the ones The transfer of audio signals requires
that are primarily used in the automotive on the one hand synchronized transfer
area, the signals can be transferred on between the transmitter and one or more
the data bus when an event occurs. Ex- receivers and on the other hand a high
amples of such events are the operation data rate. In view of the fact that data
of switches for switching on the air-condi- transfer on the MOST bus takes place syn-
tioning system or the windshield wiper. chronously with a fixed clock-pulse rate,
Signals that represent the operating state synchronization is already assured by its
of the engine, for example, are not nec- transfer mechanism.
essarily associated with an event. The The digital transfer of CD-quality audio
engine temperature, which only changes signals, i.e. with a resolution of 16 bits and a
slowly, is cyclically measured in a fixed clock-pulse rate of 44.1 kHz, requires a con-
time frame by the engine control unit stant data rate of 1.35 Mbit/s for one stereo
Robert Bosch GmbH

24 | Automotive networking | Examples of networked vehicles

channel. Up to 15 stereo channels can be driving speed to be read out in the work-
transferred in parallel with the current ver- shop via the connected diagnostic tester
sion of the MOST bus (MOST25 with a total (example: the correct assignment of the
transfer rate of up to 24.8 Mbit/s). wheel-speed sensors must be checked for
the ABS functional test).
Data transfer: examples
The following examples show which sig- Engine speed
nals are measured and evaluated in which The injection and (with a gasoline engine)
systems. the ignition timing are output with a reso-
lution of less than 1 of the crankshaft an-
Driving speed gle. In order to ensure real-time behavior,
The ESP control unit calculates the driving the crankshaft position must be recorded
speed from the wheel-speed sensors. This in the engine control unit. The engine-
variable is transmitted on the CAN-C bus speed sensor scans the crankshaft trigger
(drive CAN). The engine-management sys- wheel and relays the signal to the control
tem needs this value for the cruise control, unit, which calculates both the crankshaft
among other things, and the transmission position and the engine speed. This vari-
control unit determines gear changes from able is used to calculate the injection time
the driving speed. The adaptive speed and the ignition angle, for example.
control (ACC, Adaptive Cruise Control) The engine speed is a variable that is
needs the current driving speed to calcu- needed in many other systems. The engine
late the necessary distance from the ve- control unit therefore outputs it on the
hicle in front and use it as a setpoint value. data bus. The shifting points are defined
A gateway transmits the speed informa- in the transmission control unit depending
tion via another CAN bus (instrument clus- on the speed. The engine speed is needed
ter CAN) to the instrument cluster, which for the ASR function (acceleration slip
displays the value via a needle instrument. control) in the Electronic Stability Program
The CAN-B bus (comfort CAN) is also (ESP) ASR intervention (torque reduc-
connected to the network via the gateway. tion) must not make the engine stall.
Some luxury class vehicles are equipped As in the previous example, the engine
with dynamic seats. The padding of the speed is transmitted to the diagnosis inter-
seats is inflated depending on the speed face and the instrument cluster (display on
and the acceleration, counteracting the rev counter).
the centrifugal force of the driver. This
increases comfort considerably when Turn signaling
cornering. The driver operates the turn-signal lever
The speed information is sent to the (Fig. 6, Item 1). A signal is relayed to the
Infotainment CAN via the gateway and re- steering column control unit via a discrete
layed to the car sound system. This allows line (2) depending on whether the driver
the volume to be adapted to the driving is indicating a right or left turn. This may
speed. The navigation system needs the be a resistance-coded signal, for example.
speed to calculate the position if the GPS The control unit evaluates the signal and
signal is missing (e.g. in a tunnel). detects that the driver is indicating a left
The diagnosis interface is directly con- turn, for example.
nected to the engine and transmission The comfort CAN relays this informa-
control unit via the serial K-line. All other tion to the vehicle power supply control
control units are connected to the diag- unit (3). The indication direction is defined
nosis interface via a virtual K-line that is on the basis of the received information
simulated on the CAN bus. This allows the (normal flash frequency, increased flash
Robert Bosch GmbH

Automotive networking | Examples of networked vehicles | 25

frequency in the event of bulb failure). The Load management


front left and rear left turn-signal lights At low revs (idle speed) and when a con-
are then actuated via discrete lines (4, 5). siderable amount of power is being used
The vehicle power supply control unit also up by the electrical consumers that are
transmits the left turn signaling informa- switched on, the battery or alternator volt-
tion on the comfort CAN. The gateway (6) age can drop to a low value. The vehicle
relays the information to the instrument power supply control unit calculates the
cluster CAN. The indicator lamp then current status of the vehicle power supply
flashes on the instrument cluster (9). from the current battery voltage, the DF
If the vehicle has a trailer hitch, the in- signal from the alternator (alternator uti-
formation goes to the trailer-recognition lization) and the information about heavy
control unit (7) via the comfort CAN. This current consumers that are switched on
actuates the turn-signal lamp on the trailer with a short switch-on duration. The vehi-
(8) via cables. cle power supply control unit requests an
idle speed increase via the CAN bus if the
Wiper stage 1 vehicle power supply is insufficient at idle
The wiper switch (Fig. 7, Item 1) transmits speed. The engine control unit implements
a signal via a discrete line to the steering the request. If this action does not solve
column control unit (2), which evaluates the problem, the vehicle power supply
the information (e.g. wiper stage 1). The control unit switches off specific consum-
control unit transmits this information on ers such as the heated rear windshield, the
the comfort CAN bus. The vehicle power seat heating or the heated outside mirror.
supply control unit (3) picks up the infor- These consumers are connected to the
mation and relays it to the wiper motor (4) vehicle power supply control unit via dis-
via the LIN bus. The vehicle power supply crete lines.
control unit acts as a gateway between the
comfort CAN and the wiper LIN.

Fig. 6
1 Turn-signal lever
2 Steering column
control unit
3 Electrical-system
6 Data transfer during turn signaling 7 Data transfer during windshield-wiper operation
control unit
4, 5 Turn-signal lights
4
6 Gateway
4 7 Trailer-recognition
3 5 LIN
M control unit
3 8 Turn-signal light
Comfort CAN

on trailer
9 Instrument cluster
2
Comfort CAN

1
Instrument cluster
Fig. 7
CAN 9 1
2 1 Windshield-wiper
6
lever
2 Steering column
control unit
SVA0029E

SVA0030E

7 3 Electrical-system
control unit
8
4 Wiper motor
Robert Bosch GmbH

26 | Automotive networking | Examples of networked vehicles

Multimedia application to its current reception status (the current


The signal sequences during the output of station name, for example) which are up-
a radio signal on the amplifier is described dated where necessary.
in the following as an example of the trans- At the amplifier, the head unit connects
fer of signals and multimedia data in a the stereo channel with a selected input
luxury-class vehicle infotainment system and uses corresponding check commands
with MOST bus (Fig. 5b). to set the properties for outputting the au-
The functions of the vehicle infotain- dio signal, e.g. the set volume. When all the
ment system are controlled via the cen- settings have been made, it instructs the
tral operating unit, the head unit (Fig. 8, amplifier to fade in the audio signal of the
Item 1). In current systems, this unit usu- radio signal, which is then output through
ally has a screen in the instrument panel the infotainment systems speakers.
and a rotary/pushbutton controller in the Before this, the head unit has if neces-
center console, by means of which the user sary ensured that the output of a previ-
interacts with the system. ously output audio signal has been faded
To output a radio station, the head unit, out, the output of the associated device
which in most systems is responsible for stopped, and the associated audio channel
managing the audio channels of the info- removed.
tainment system, establishes on the MOST In parallel the CAN/MOST gateway (4)
bus a stereo channel of the required audio constantly transmits the driving-speed
quality between the radio tuner (2) and the data, which it receives via the comfort
amplifier (3). It now tunes in the requested CAN, via the MOST bus to the amplifier,
station at the radio tuner via correspond- which has requested a notification for this
ing check commands and if necessary information when the system was started.
makes further settings. Finally, the head The amplifier can use the speed together
unit connects the tuner output with the with further vehicle information to calcu-
previously created stereo channel. For the late additional settings for outputting the
information to be displayed in the user audio signal, e.g. adapting the volume de-
interface, the head unit receives from the pending on the current speed.
radio tuner corresponding data relating

8 Multimedia networking

4 2
Comfort CAN

MOST

Fig. 8 3
5 1
1 Head unit
2 Radio tuner
3 Amplifier 6 7
SVM0005E

4 CAN/MOST gateway
5 Screen Check commands
6 Control element Multimedia data stream
7 Speakers
Robert Bosch GmbH

Automotive networking | Examples of networked vehicles | 27

Control of an automatic steel folding roof four CAN buses and a further four LIN sub-
Vehicles with automatic steel folding roofs buses. In this example, a total of 13 control
are currently very much in vogue. These units are involved in the control of the au-
roofs are automatically opened and closed. tomatic steel folding roof. The text below
The technical realization of this seemingly describes which functions are performed
simple mechanical function poses a huge by the individual control units to move the
challenge for the networking of the elec- roof.
tronics and control units.
The networking depicted in Figure 9 Roof control unit
shows a typical present-day mid-size ve- Power activation of the motors for the steel
hicle with the additional function of an au- folding roof is performed by this control
tomatic steel folding roof. At its maximum unit. This control unit also assumes the
equipment specification, this vehicle has role of complete monitoring of the move-
over 35 electronic control units (ECUs), ment process. Proximity-type sensors
which communicated with each other via which monitor, record and evaluate the

9 Control of an automatic steel folding roof

Instrument cluster
Central OBD socket
(WFS)
gateway
Central
processing unit Electrical-system Door control unit Dynamic headl.
(Radio, RadioNavi, control unit driver leveling contr.
RadioNaviNet,)
Wiper
(master) Door control unit AWD
passenger control unit
Booster AMP Wiper
(slave) Door control unit Transmission
rear left control unit
Voice control RS/LS
Door control unit Airbag
SMLS control unit
rear right
TV tuner (steering column)
Comfort control unit
MF st.w. Selector lever
Telephone (Kessy)
interface box
Roof control unit IR Electric
(CSC) power steering
Telematics
NAR Sounder
PTC heating Steering-angle
NGS sensor

Parking aid Engine control unit

A/C control unit NOx


Tire-pressure Seat, driver
monitoring (memory) Brake
control unit
Trailer Seat, passenger Fig. 9
(ABS, ESP, )
control unit (memory) Systems in blue boxes
SVA0047E

ESP
cluster are involved in the
Multifunction
Auxiliary heating control of the steel
control unit
folding roof
Robert Bosch GmbH

28 | Automotive networking | Examples of networked vehicles

movement of the roof are used for this ated. This also applies to the sliding sun-
purpose. In order to inform the driver of roof, which is activated by the roof control
the current status while the roof is being unit.
opened and closed and to prevent any
damage to the vehicle or the surroundings, Trailer control unit
the roof control unit receives numerous The trailer control unit informs the roof
further parameters from other control control unit whether a trailer is hitched. If
units in the vehicle. this is the case, opening and closing of the
roof is disabled.
Instrument cluster
The instrument cluster receives via the Door control units
gateway the current status from the roof The status of the windows and doors is
control unit and from other participating interrogated by all four door control units
control units, and informs the driver ac- and transmitted to the roof control unit.
cordingly. Example: Obstacle behind the Opening or closing of the roof is only
vehicle! Roof movement stopped. begun if all the doors are closed and the
windows are in the correct positions. This
Gateway setting is automatically corrected if the
All the communication requests which are windows are not in the correct positions.
transmitted from one bus system to an-
other are routed via the central gateway. Comfort control unit
The comfort control unit informs the roof
Vehicle power supply control unit control unit of, among other things, the
The vehicle power supply control unit key position. Movement of the roof is en-
checks whether the vehicle battery has abled only if the correct key is inserted.
sufficient charge to enable the roof to be
moved. If necessary, the driver is informed Brake control unit
and no roof movement is performed. The brake control unit uses sensors to
record the wheel speeds and thereby iden-
Parking-aid assistant tify whether the vehicle is moving. The
Before the roof is opened, the parking-aid roof control unit receives the speed infor-
assistant monitors the area behind the mation and enables movement of the roof
vehicle for obstacles to ascertain whether only if the vehicle is stationary.
there is sufficient space available to un-
fold the roof. If an obstacle is detected, Future areas of FlexRay application
the driver is informed and movement Up to now the high-speed CAN bus (CAN
is stopped. In this event, the driver can C) has been used to network control units
decide for him-/herself whether he/she in the drivetrain and in the chassis area. In
wishes to continue moving the roof. In future X-by-wire systems, the mechanical
certain cases the parking-aid assistant can connections, e.g. between steering wheel
detect something which poses no danger and front axle (steer-by-wire) or brake
to the vehicle. pedal and wheel brakes (brake-by-wire),
will be replaced by electrical communica-
A/C control unit tion systems in conjunction with driving-
All windows are automatically closed dynamics control systems.
when the air-recirculation switch is actu-
Robert Bosch GmbH

Automotive networking | Examples of networked vehicles | 29

Furthermore, vehicle architectures have ity Program), AFS (Active Front Steering),
up to new often used several CAN buses and ARC (Active Roll Control). Higher-
which are linked to each other via gate- level driving-dynamics control controls
ways to distribute the high data volume. the individual systems without limiting
Future architectures will use, for a fast, their functionality and prevents negative
powerful connection between several mas- interactions. Figure 10 shows the intercon-
ter computers (which assume, for example, nection of these systems with bus system
central functions in the safety and driver- and sensors.
assistance areas), a backbone bus with a The yaw sensor transmits the vehicles
high data rate to which in each case sub- acceleration values and yaw rate to ESP.
buses (e.g. drivetrain CAN and sensor CAN If a critical driving situation is detected
in the chassis area) are connected. by ESP using these data (e.g. vehicle over-
The new FlexRay bus system satisfies steer), situation-conditioned brake pres-
the demands which will be placed in future sures and engine-management interven-
on the vehicle architecture, such as, for tions are calculated. Higher-level global
example driving-dynamics control also evaluates
high data rates and guaranteed real- the driver-command steering angle from
time capabilities in the drive and chassis the steering-angle sensor and calculates
areas, a supplementary steering angle, which is
large date volume in the backbone, and converted by AFS. More effective and com-
high failure safety of safety-relevant fort-enhancing control can be achieved by
applications (e.g. X-by-wire) this interaction of the individual systems.
In this way, the vehicle can, for example,
through properties such as be stabilized by a corrective steering
high availability and redundancy by movement already at a very early stage
means of two physically independent such that braking interventions can be
channels, partially or even completely avoided.
high data rates with up to 10 Mbit/s per
channel,
data transfer with guaranteed latency,
and 10 FlexRay
synchronicity of all communication
users by means of a global time base. Global driving-dynamics control
Driving ESP
CAN dynamics FlexRay (active
FlexRay is currently still in the develop-
braking)
ment stage, although some initial systems
are already in volume production. The fol-
lowing example is a current approach to a Sensor AFS
technology (Active
FlexRay topology.
Front
Steering)
Excerpt from chassis domain
Concepts for global driving-dynamics Further ARC
compo- (Active
control are being developed to facilitate nents Roll
SVA0048E

control which is as cooperative and thus Control)


as effective as possible. Components of
these concepts are ESP (Electronic Stabil-
Robert Bosch GmbH

30 | Bus systems | CAN bus

Bus systems

CAN bus to damage. As a result of these different


requirements, buses with different data
In 1991 the CAN bus (Controller Area rates are used that offer an optimum cost-
Network) was the first bus system to be benefit ratio for the field of application
introduced to a motor vehicle in mass concerned. A distinction is made between
production. It has since established itself high-speed and low-speed CAN buses.
as the standard system in the automotive
sector, but the CAN bus is also commonly High-speed CAN (CAN-C)
used as a field bus in automation engineer- CAN-C is defined in ISO Standard 11898-2
ing in general. In imitation of other net- and operates at bit rates of 125 kBit/s to
work types, such as the local area network 1 MBit/s. The data transfer is therefore
(LAN), wide area network (WAN) or per- able to meet the real-time requirements
sonal area network (PAN), this bus system of the drivetrain.
was given the name, CAN. CAN-C buses are used for networking
the following systems:
Applications Engine-management system (Motronic
The CAN bus is used in various domains in for gasoline engines or EDC for diesel
the motor vehicle. These domains differ in engines)
the requirements they demand of the net- Electronic transmission control
work. Due to the fast processes involved in Vehicle stabilization systems (e.g. ESP)
the area of engine management, informa- Instrument cluster
tion is required much faster here than in
the area of comfort/convenience where Low-speed CAN (CAN-B)
the controlled systems are located further CAN-B is defined in ISO Standard 11898-3
apart and as such lines are more prone and operates at a bit rate of 5 to 125 kBit/s.
For many applications in the comfort/con-
venience and body area, this speed is suffi-
1 Networking of electronic control units by CAN cient to meet the real-time requirements
demanded in this area. Examples of such
applications are:
ECU 1 ECU 2 ECU 3 ECU 4
Control of the air-conditioning system
Seat adjustment
CAN-C Power-window unit
Sliding-sunroof control
Mirror adjuster
Lighting system
Gate-
way Control of the navigation system

The CAN bus is finding ever more use in


Diagnosis vehicle diagnostics. Here, the electronic
interface control unit is connected directly to the
CAN bus and thus receives the information
Fig. 1 ECU 5 ECU 6 ECU 7 ECU 8 it needs for diagnostics immediately. Pre-
ECU Control unit
vious diagnosis interfaces (e.g. KWP2000)
ECU 1 to ECU 4
CAN-B are becoming less important.
On the CAN-C
SVC0016E

high-speed bus
ECU 5 to ECU 11 ECU 9 ECU 10 ECU 11
On the CAN-B
low-speed bus
Robert Bosch GmbH

Bus systems | CAN bus | 31

Topology Incoming messages are processed by the


Bus topology transceiver and sent to the CAN controller
In the development of the CAN, particular on the RxD line.
focus was placed on eliminating the need The microcontroller, which runs the ap-
for a central control element for communi- plication program (e.g. Motronic), controls
cation. This approach is most effectively the CAN controller, prepares the data to be
supported by a bus topology in which all sent and evaluates the data received.
network nodes are connected to a bus and
each node is able to receive all information Logic bus states and coding
sent on the bus. The bus topology is most CAN uses two states for communication,
commonly selected during the conceptual dominant and recessive, with which the
design of the communications system. information bits are transmitted. The dom-
In addition to offering favorable electri- inant state represents a binary 0, the
cal properties, the linear bus topology recessive a binary 1. NRZ (Non-Return to
has the advantage that the failure of one Zero) is used as the encoding method for
station would not affect the functionality the data transmission. With this method,
of the data transmission system. Further- there is no compulsory return to zero be-
more, additional stations can be connected tween two transmission states of the same
to the system with little extra effort. value.
When it receives messages, the
Star topology CAN transceiver converts the signal level
The use of a central coupler makes it pos- back to logical states. In the process, a
sible to build star topologies. Active as well differential amplifier subtracts the CAN_L
as passive couplers can be used. The use level from the CAN_H level (Fig. 3). If lines
of a star topology achieves a high level of become twisted, disturbance pulses (e.g.
flexibility in adapting to the networking from the ignition system) have the same
task. effect on both lines. Differential data trans-
The coupler is used to build a star topol- fer therefore makes it possible to filter out
ogy and simply forwards the messages to interference on the line.
the individual segments. Since the signal
transit times remain unchanged, the cir-
cuit length of the star topology is the same
as that of a bus topology.
2 Network nodes in the CAN
Data transmission system
Network nodes
Network nodes
A network node (Fig. 2) comprises the mi-
crocontroller for the application software, Actuators Microcontroller Sensors
the CAN controller and the CAN trans-
ceiver (bus driver). The CAN controller is
responsible for the transmit and receive CAN controller
modes. It generates the bit stream for CAN TxD
CAN RxD
data communication from the binary data
CAN transceiver
to be transmitted and forwards it to the
transceiver on the TxD line. This amplifies CAN_H CAN_L
the signals, generates the voltage level re-
SVC0017E

quired for differential data transfer and CAN bus


transmits the processed bit stream serially
on the bus line (CAN_H and CAN_L).
Robert Bosch GmbH

32 | Bus systems | CAN bus

Some transceivers also evaluate the volt- Single-wire line


age level on the CAN_H and CAN_L line The single-wire line is a means of reducing
separately. It would then be possible for manufacturing costs by dispensing with
operation to continue in single-line mode the second line. For this to be possible,
if one of the two bus lines were to fail as however, all bus subscribers must share
a consequence of a short-circuit or cable a common ground that would assume the
break. However, the bus subscribers would function of the second line. The single-
have to share a common ground that would wire version of the CAN bus is therefore
assume the function of the failed line. only an option for a communications sys-
tem of limited spatial dimensions.
Transmission agent and bus coupling The data transfer on the single-wire line
Two-wire line is more prone to interference radiation be-
For the CAN, any transmission agent on cause it is not possible to filter out distur-
which dominant and recessive states can bance pulses as it is with the two-wire line.
be transmitted is worthy of consideration. For this reason, a higher level increase is
An untwisted or twisted pair of wires, de- required on the bus line to improve the
pending on the ambient conditions, is usu- signal-to-noise ratio. This in turn has a
ally used, and the wires are either galvani- negative effect on interference radiation.
cally coupled or decoupled. The two bus The flank steepness of the bus signals
lines are designated CAN_H and CAN_L. must therefore be reduced in comparison
The two-wire line supports symmetrical to the two-wire line. This is accompanied
data transfer whereby the bits are sent on by a lower data transfer rate. Conse-
both bus lines and represented by differ- quently, the single-wire line is only used
ent voltages. This reduces sensitivity to for the low-speed CAN in the body elec-
in-phase interference because the interfer- tronics and comfort/convenience electron-
ence affects both lines equally and can be ics. Thanks to this feature, a low-speed
filtered out. Additional shielding of the CAN with two-wire line would still remain
lines reduces their own radiation emis- functional in the event of a line failure
sions, especially at high baud rates. (CAN_H or CAN_L).

3 Filtering out interference on the CAN bus

a V

3.5 CAN high level


(CAN_H)
2.5
CAN low level
1.5
(CAN_L)

0
a V

2.0 Differential
SVC0018E

signal

0
Robert Bosch GmbH

Bus systems | CAN bus | 33

Voltage level Emission limits


The CAN transceiver converts the logical To permit correct evaluation of bit trans-
states 0 and 1 received by the CAN control- mission, the signal must arrive at each
ler into voltage levels that are fed to the node within the bit time without interfer-
CAN_H and CAN_L bus lines. ence, and yet still at the relevant sampling
The high-speed and low-speed CANs use point. Delays arise from the signal transit
different voltage levels for the transmis- time on the data bus. The maximum per-
sion of dominant and recessive states. missible bit rate thus depends on the total
The voltage levels of the low-speed CAN length of the bus. ISO 11898 specifies
are shown in Figure 4a, those of the high- the bit rate for a defined circuit length.
speed CAN in Figure 4b. The following recommendations exist for
In the recessive state, the high-speed longer lines.
CAN uses a voltage of 2.5 V on both lines. 1 MBits/s for 40 m (specified)
In the dominant state, a voltage of 3.5 V is 500 kBits/s up to 100 m
present on CAN_H and a voltage of 1.5 V is (recommendation)
present on CAN_L. 250 kBits/s up to 250 m
On the low-speed CAN, a voltage of 0 V 125 kBits/s up to 500 m
is present on CAN_H in the recessive state, 40 kBits/s up to 1,000 m
and 5 V on CAN_L. In the dominant state,
voltages of 3.6 V and 1.4 V are present on It is possible to connect at least 30 network
the CAN_H and CAN_L respectively. nodes to the bus without the need for ad-
ditional measures.
Reflection-free termination
Reflections of the electrical signals at open
ends of lines would interfere with commu-
nication. To dampen these reflections, the
bus lines are terminated at each end with
a resistor of 120 V.
Alternatively, the terminating resistors
may be integrated into the electronic con-
trol units themselves.

4 Voltage level 5 Data transmission system

a V
CAN_L
5
3.6
Node 1 Node n
1.4 (max. 30)
CAN_H
0
recessive dominant recessive
Time t CAN_H
b V
CAN_H 120V CAN bus line 120V Fig. 4
3.5
a Voltage level of
2.5 CAN_L
CAN_L the low-speed CAN
1.5
SVC0019E

SVC0020E

(CAN-B)
b Voltage level of the
recessive dominant recessive
high-speed CAN
Time t
(CAN-C)
Robert Bosch GmbH

34 | Bus systems | CAN bus

CAN protocol information. To fulfill this purpose, the


Protocol layers transport layer is responsible for such
For communications protocols, it is functions as arbitration or fault detection
standard practice to arrange thematically and signaling.
coherent tasks as a set of layers, which af-
fords a high level of flexibility in the imple- Physical layer
mentation of a bus system. With the CAN, The physical layer is the lowest level in the
both the CAN hardware and the CAN soft- transport stack. It consists of the physical
ware are subdivided into several layers components of the network, such as the
(Fig. 6). wiring and the voltages used to send the
information.
Application layer
The application layer represents the infor- Multimaster principle
mation in the form of data structures used The CAN protocol supports communica-
by the application. These sets of data tion between network nodes without the
which are to be transmitted are forwarded need for a central control unit. Each node
to the object layer for this purpose. may attempt to send messages at any time.
Whether this attempt is successful or not
Object layer essentially depends on two factors:
The task of the object layer is to manage Is the bus free before the start of trans-
the messages. The functions of this layer mission?
are used to decide which message should Has the arbitration phase been passed
be sent at which time. For incoming mes- successfully?
sages, this layer is responsible for message
filtering. This design ensures that, even if any num-
ber of nodes were to fail, it can still be de-
Transport layer termined whether a node is authorized to
The transport layer furnishes the object send.
layer with received messages and pro-
cesses the messages prepared by the ob- Content-based addressing
ject layer for sending in such a way that Unlike other networks, the CAN does not
the physical layer is able to transmit this address the individual network nodes but
the messages that have been sent. Each
6 Protocol layers message has a unique marker, or identifier.
The identifier classifies the content of the
message (e.g. engine speed or power-win-
Application layer dow position). A station is therefore able
to broadcast a message to all other stations
(multicast or broadcast method). These
stations read only those messages whose
Object layer
identifiers are stored in their acceptance
list (message filtering, Fig. 7). In this way,
Transport layer
each station decides for itself whether or
not it needs a message sent on the bus.
The identifier has 11 bits (standard format,
CAN 2.0 A) or 29 bits (extended format,
SVC0021E

Physical layer
CAN 2.0 B). With 11 bits in the standard
format, it is possible to distinguish be-
tween 2,048 different CAN messages;
Robert Bosch GmbH

Bus systems | CAN bus | 35

in the extended format, this number rises ority (lowest binary value of the identifier)
to over 536 million. is assigned first access, without any data
The advantage of this addressing loss or delay (non-destructive protocol).
method is that the network nodes do not The arbitration principle permits the
require any information about system dominant bits transmitted by a given sta-
configuration and are thus free to operate tion to overwrite the recessive bits of the
fully independently of each other. This re- other stations (Fig. 8). Each station outputs
sults in a highly flexible complete system, the identifier of its message onto the bus
which makes it easier to manage equip- bit by bit, with the most significant bit first.
ment variants. If one of the ECUs requires During this arbitration phase, each station
new information which is already on the wishing to send data compares the level
bus, all it needs to do is call it up from the present on the bus with the level it actually
bus. It is possible to integrate additional possesses. Each station that attempts to
stations into the system (provided they are send a recessive bit but encounters a dom-
receivers) without having to modify the inant bit loses the arbitration process.
existing stations. The station with the lowest identifier, i.e.
the highest priority, makes its way onto
Controlling bus access the bus without having to repeat the mes-
Arbitration phase sage (non-destructive access control).
If the bus is unoccupied (recessive state) The transmitters of lower-priority mes-
and messages are available for sending, sages automatically become recipients of
each station is free to initiate the sending the message just sent by another station.
of its message. The message begins with a They repeat their attempt to send as soon
dominant bit (start-of-frame bit), followed as the bus is free again.
by the identifier. When several stations Without this access control, bus colli-
start to transmit simultaneously, the sys- sions would result in faults. To guarantee
tem responds by employing wired-and unequivocal bus arbitration, therefore,
arbitration (arbiter = logical AND operator) it is not permissible for more than one
to resolve the resulting conflicts over bus node to send a message with the same
access. The message with the highest pri- identifier.

7 Addressing and message filtering 8 Bit arbitration


(acceptance check)

CAN CAN CAN CAN 1


Station 1 Station 2 Station 3 Station 4 Bus line
0
Fig. 7
1
Accept Provision Accept Station 1 Station 2 transmits
0 Stations 1 and 4 accept
the data
1
Selection Send Selection Selection Station 2
message 0 Fig. 8
1 Station 2 gains first
Station 3 access (signal on the
Reception Reception Reception 0
bus = signal from
UAE0742-2E

Station 1 Station 3
UAE0284-3E

loses the loses the station 2)


arbitration arbitration
Bus
0 Dominant level
1 Recessive level
Robert Bosch GmbH

36 | Bus systems | CAN bus

With this access method, maximum-pri- Error frame:


ority messages only have to wait for the If a station detects a fault or error, it
transfer of the message currently being communicates this to the other stations
sent and, with bit times of 130 (CAN 2.0 A) using an error frame.
or 150 (CAN 2.0 B), they have the lowest Overload frame:
latency. At a data transfer rate of This can be used to create a delay be-
500 kBits/s, this equates to 260 s or tween a preceding and subsequent data
300 s. The higher the load on the bus, frame or remote frame. The transmitting
the greater the data transfer's temporal node reports that it cannot currently
offset becomes for messages of lower pri- process another frame.
ority, and thus the greater the uncertainty
over when a message to be sent will arrive For data transfer on the data bus, a mes-
at the recipient. sage frame is created. It contains the infor-
In order that all messages have a chance mation to be transmitted arranged in a
of accessing the bus, the data transfer rate defined sequence. CAN supports two dif-
must be matched to the number of bus ferent formats of frame, which are speci-
subscribers. fied in CAN 2.0 A and CAN 2.0 B. The most
important difference between these two
Priority assignments frame formats is the length of the identi-
The direct consequence of the arbitration fier. A CAN 2.0 A frame has an 11-bit iden-
process is that the identifier also has the tifier, while a CAN 2.0 B frame has a 29-bit
role of prioritizing the frame during trans- identifier divided into two parts (11 bit
mission in addition to identifying the and 18 bit).
frame content. An identifier correspond- Both formats are compatible with
ing to a low binary number has high prior- each other and can be used together in
ity and vice versa. Message priorities are a network. The frames compliant with
derived from the speed at which the mes- CAN 2.0 A and B are shown in Figure 9.
sage content changes or from the impor- They have a maximum length of 130 bits
tance of the message to safety consider- (standard format) or 150 bits (extended
ations, for example. It must not be possible format).
for messages to have the same priority.

Message format
The message transfer on the CAN bus is 9 CAN message format

based on four different frame formats:


Data frame: Start of frame
The transmitted message contains data Arbitration field
(e.g. current engine speed) that is pro- Control field
Data field
vided by the transmitting station (data CRC field
source). ACK field
Remote frame: End of
frame
Stations can request the data they
Inter-
need from the data source (example: frame
space
the windshield wiper requests how wet
1
the windshield is from the rain sensor). IDLE 1* 12* 6* 0...64* 16* 2* 7* 3* IDLE
The data source responds by sending 0
UAE0285-3E

the relevant data frame. Data frame


Fig. 9
0 Dominant level Message frame
1 Recessive level
Robert Bosch GmbH

Bus systems | CAN bus | 37

In CAN 2.0 A and CAN 2.0 B data frames, Control field


the sequence of transferred information In a CAN 2.0 A frame, the control field
is arranged in the same way. The start-of- comprises the IDE bit (Identifier Extension
frame bit is followed by the arbitration, Bit), which is always sent as dominant
control, data and CRC fields. A frame is here, followed by a reserved bit for future
completed by the ACK field and the end- extensions, which is sent recessively. The
of-frame. remaining four bits in this field define the
number of data bytes in the next data field.
Start of frame This enables the receiver to determine
The bus is recessive in idle state. The start whether all data has been received.
of frame, represented by a dominant bit, The structure of a CAN 2.0 B frame is
indicates the start of a transmission and, practically identical. However, since the
together with the process of bit stuffing, IDE bit already belongs to the arbitration
serves to synchronize all stations. field, a further reserved bit for future ex-
tensions takes its place and this reserved
Arbitration field bit is sent recessively.
With a CAN 2.0 A frame, the arbitration
field comprises the 11-bit identifier and Data field
a control bit, the RTR bit (Remote Trans- The data field contains the actual mes-
mission Request). sage information comprised of between
With a CAN 2.0 B frame, the arbitration 0 and 8 bytes. A data field in which the
field comprises the 11-bit identifier, fol- length of the data is expressed in 0 results
lowed by the SRR bit (Substitute Remote in the shortest possible data frame with
Request) and the IDE (Identifier Extension a length of 44 or 64 bits. A frame like this
Bit). Both bits are sent recessively and can be used to synchronize distributed
thereby ensure that a CAN 2.0 A frame processes. A number of signals can be
always takes priority over a CAN 2.0 B transmitted in a single message (e.g. en-
frame if it has the same 11-bit identifier. gine temperature and engine speed).
The second 18-bit identifier follows. The
RTR bit completes the arbitration field. CRC field
The RTR bit indicates whether the trans- The CRC field (Cyclic Redundancy Check-
mitted frame is a data or remote frame. sum) contains a 15-bit checksum (frame
The RTR bit is dominant in the data frame check word) across the preceding frame
and recessive in the remote frame. If sta- from the start bit to the final bit of the data
tion A, for example, happens to send a field. The 16th bit (CRC delimiter) in this
message by data frame and station B re- field is recessive and closes the checksum.
quests this message by remote frame at The checksum is a means of detecting
the same time, the arbitration conflict can- possible transmission interference.
not be resolved in this situation by means
of the message identifier: the RTR bit is the ACK field
decisive factor for access authorization. Unlike all preceding fields, the ACK field
First of all, station A wins arbitration (acknowledgment) is not set by the sender
with the sending of the dominant RTR bit of the frame but by a different node that is
and continues to transmit the message. able to acknowledge receipt of the frame
Station B, which has requested precisely directly after the data field. This field
this message, prepares to receive and comprises the ACK slot and the recessive
is able to read the other data sent by ACK delimiter. The ACK slot is also trans-
station A. mitted recessively by the sender and over-
Robert Bosch GmbH

38 | Bus systems | CAN bus

written as dominant by a receiver upon the Cyclic redundancy check


message being correctly received. Here, it For every transmitted message, the trans-
is irrelevant whether the message is of any mitter calculates a check sequence from
significance for the particular receiver in the start-of-frame, arbitration, control and
the sense of an acceptance check (message data field. A 15-bit checksum is derived
filtering). Only correct receipt is con- from the bit sequence by means of a gener-
firmed. This signals to the sender that no ator polynomial. The checksum is then
malfunction occurred during data transfer. used to detect errors in the data transfer.
With CRC generation, a defined genera-
End of frame tor polynomial is used to carry out poly-
The end of frame marks the end of the nomial division across a given frame
message and comprises seven recessive range. The remainder forms the checksum.
bits. With seven bits of the same value in Once the CRC field has been received,
succession, the stuffing rule is deliberately the receiver is able to check that the frame
broken (see Error detection). has been transferred correctly by carrying
out its own polynomial division of the re-
Interframe space ceived frame range using the generator
The interframe space comprises a succes- polynomial and checking whether the re-
sion of three recessive bits which serve to ceived checksum matches the calculated
separate successive messages. After a total remainder.
of 10 of these recessive bits, the stations
are permitted to begin transmitting within Frame check
the network again. Until then, the bus re- The frame check involves all bus subscrib-
mains in idle state. ers, senders as well as receivers, checking
Only data and remote frames need to the sent/received data frame for compli-
include the interframe space. Error and ance with the predefined frame structure.
overload frames can be sent immediately The CAN protocol contains a number of
after the last frame. This enables immedi- fixed-format fields (start and end-of-
ate signaling of errors and problems. frame, delimiter) which are checked
by all stations.
Transmitter initiative
The transmitter will usually initiate a data ACK check
transmission by sending a data frame. It is With the ACK check, a receiver acknow-
also possible for a receiving station to call ledges that the frame has been received
in data from a sending station by deposit- correctly by sending a dominant bit in the
ing a remote frame. The network node ACK slot. The sender of the frame can then
that is able to deliver the information re- verify whether a message was transferred
quested makes the information available correctly. An absence of this bit indicates
in response to this query. that a transmission error has been de-
tected.
Error detection
The bus line may suffer interference, e.g. Monitoring
electromagnetic interference. To eliminate The sender of a frame continuously moni-
the risk of faulty behavior, the transmitted tors the bus level. It is able to detect a
data must be checked for correctness. transmission error by comparing the
A number of control mechanisms for sent bit and the sampled bit.
detecting errors are integrated in the
CAN protocol.
Robert Bosch GmbH

Bus systems | CAN bus | 39

Bit stuffing Fault confinement in the event of failures


Compliance with bit stuffing is checked by Defective stations could weigh heavily on
means of the code check. The stuffing con- bus traffic if they were to frequently send
vention stipulates that in every data frame erroneous messages or interrupt the trans-
or remote frame a maximum of five suc- mission of correct messages by repeatedly
cessive bits of equal state may be sent be- sending an error frame. The CAN protocol
tween the start of frame and the end of localizes station failures by means of
the CRC field. As soon as five identical bit statististical error analysis. A station rec-
states have been transmitted in succes- ognizes the probability of its own malfunc-
sion, the sender includes a bit with the op- tion by how often it aborts messages be-
posite state. The receiving station clears fore other stations send an error frame.
all of these inserted bits after the message The protocol's first measure in this case
has been received (destuffing). is to prevent a station such as this from
This measure permits detection of line continuing to abort transmissions. In an
faults, e.g. short-circuit or burst interfer- emergency, the station shuts down auto-
ence. Rare signal changes would affect matically.
the possibility for synchronization in the
nodes.

Error handling
If a CAN controller detects a fault or for-
mat error, it interrupts the current trans-
mission by sending an error frame com-
prising six successive dominant bits. This
breaks the stuffing rule that prohibits this
type of bit sequence. If the sender detects
that its message has been interrupted by
an error frame, it stops transmitting and
makes another attempt at a later time.
This effect prevents other stations from
accepting the erroneous message and
thereby ensures consistency of data
across the entire system.
Robert Bosch GmbH

40 | Bus systems | CAN bus

Hardware If messages on the bus are managed in


CAN controller of a subscriber extended format (29-bit identifier), the
The CAN controller of a subscriber gener- CAN controllers must be compatible with
ates a frame from the data to be sent con- the CAN 2.0 B specification. There are
taining all the fields required for compli- controllers that only support CAN 2.0 A
ance with the CAN protocol. It then con- and send and receive messages in the
verts the frame into a bit stream. standard format, but that generate errors
CAN only specifies the physical, trans- with messages in the extended format.
portation and object layers. The interfaces Other controllers are able to tolerate the
that are provided in the application layer extended format without generating an
can be arranged differently to suit the field error. These modules can be used in a CAN
of application. In order to provide proper together with controllers that administer
CPU support (electronic control unit mi- the sending and receiving of messages in
crocontroller for application software) for the extended format.
a wide range of different requirements,
semiconductor manufacturers have Basic CAN
brought onto the market products that In modules with basic-CAN implementa-
provide a variety of capabilities. They dif- tion, only the basic function of the CAN
fer neither in the frame format they pro- protocol for the generation of the bit
duce, nor in their error-handling methods, stream is implemented in the hardware.
but solely in the type of CPU support re- For the management of the messages to be
quired for message administration. sent and received, there is an intermediate

10 Basic-CAN module 11 Full-CAN module

Microcontroller Microcontroller
Output Input
buffer buffer
CAN
controller
Control
unit
System bus interface
Transmission Test for: Control
control unit acceptance, unit
faults
Transmit Receive
buffer buffer
Basic CAN
controller Transmission Test for:
Transmit Receive control unit acceptance,
buffer buffer faults

CAN TxD CAN TxD


CAN RxD CAN RxD

CAN transceiver CAN transceiver

CAN_H CAN_L CAN_H CAN_L


SVC0023E
SVC0022E

CAN bus CAN bus


Robert Bosch GmbH

Bus systems | CAN bus | 41

buffer to which the local computer (appli- Modules without local computer
cation software microcontroller) has ac- A further category of CAN module is one
cess (Fig. 10). Since the buffer capacity that is supplied without a local computer.
is limited, the computer must read the These SLIOs (Serial Linked Input/Output)
received data before new messages are are able to input and output data via ports.
received. Message filtering also takes They are therefore suitable for making
place in this computer. A part of the sensors and actuators bus-compatible at
computer's capacity is therefore used for low cost, but they do need a master that
CAN management. Since the computers controls them.
do not usually have sufficient processing
capacity, modules with basic CAN are pri- Transceiver
marily suitable for low bit rates, or for the The bit stream generated by the CAN con-
transmission of fewer messages but at troller is made up of binary signals. They
higher bit rates. do not yet correspond to the required volt-
The advantage of these modules, in com- age levels of the CAN bus. The CAN-bus in-
parison to modules with full CAN, is the terface module, or transceiver, generates
smaller chip surface and the lower manu- the differential signals CAN_H and CAN_L
facturing costs. and the reference voltage Uref from the
binary data stream.
Full CAN
Full CAN implementation is the protocol of Sleep mode
preference in cases where a station has to The CAN comfort bus must remain ready
manage several messages at high bit rates for operation even with the ignition
and the local computer has no free capac- switched off so that functions such as the
ity for communication tasks. They contain radio, power windows or parking lamp
several communication objects, each of may continue to operate. The bus sub-
which contains the identifier and the data scribers must therefore be supplied by
of a particular message. During the initial- terminal 30 (permanent positive). After
ization of the CAN module by the local terminal 15 has been switched off (ignition
computer, it is decided which messages off), a CAN node may enter sleep mode
the CAN controller should send and which (standby) to relieve the vehicle electrical
received messages it should process fur- system of as much load as possible. The
ther. Received messages are only accepted transmitter part of the transceiver module
(message filtering) if the identifier matches is switched off in this condition to mini-
one of the communication objects. mize the power consumption in this mode
CAN controllers with full-CAN imple- of operation. However, the receiver part
mentation relieve the burden on the local remains active and checks whether mes-
computer by performing all of the commu- sages are being sent on the bus. In this
nication including message filtering in the way, the CAN controller, which also enters
controller (Fig. 11). standby mode, is able to react to a wake-up
The CAN controller can be coupled to message and fully activate the CAN node.
the microcontroller in the electronic con-
trol unit as a stand-alone module by the
address/data bus. Powerful microcon-
trollers have the CAN controller integrated
on-chip. This type of bus coupling is the
more cost-effective and thus the more
common solution.
Robert Bosch GmbH

42 | Bus systems | CAN bus

Data transfer sequence Once the engine-speed information has


Using the transfer of engine speed as an been stored in the transmit buffer, the
example, it shall be demonstrated how CAN controller begins to compile the CAN
data is transferred on a CAN with full-CAN frame. Over the RxD line, the CAN con-
module. troller now monitors the bus. If the bus is
free, it immediately starts to generate the
Transmission bit stream and directs it to the transceiver
The engine management's application soft- on the TxD line; if the bus is occupied, it
ware calculates the engine speed from the waits. From the bit stream, the transceiver
signal from the engine-speed sensor. This creates a signal with the requisite voltage
value is calculated once for every combus- level.
tion cycle. The measured value enters both
the receive buffer and the transmit buffer Reception
of the microcontroller (Fig. 12a). The message originally sent by the engine
The engine-management microcon- management and forwarded on by the
troller is coupled to the CAN controller transceiver is received by all stations
by a parallel interface. The contents of connected to the bus (Fig. 12b). The mes-
the transmit buffer are cyclically passed sage reaches the CAN controller on the
(e.g. every 10 ms) to the transmit buffer RxD lines in the form of a bit stream.
of the CAN controller. A flag notifies the At the first stage (monitoring layer),
CAN controller that a message is ready the CAN controller checks the incoming
to be sent. With this transmit instruction, message for errors using the CRC check-
the engine management has completed its sum. If the message is free of errors, each
part of the task.

12 Data transfer sequence

a b
Engine control unit ABS control unit Instrument cluster
Microcontroller Microcontroller Microcontroller
n n
Rev
counter
output

CAN
area n n

CAN controller CAN controller CAN controller


Transmit Transmit Transmit
buffer buffer buffer

RX TX RX TX RX TX
Transceiver
SVC0024D
SVC0024E

CAN bus
Robert Bosch GmbH

Bus systems | CAN bus | 43

station responds with an acknowledge CAN is also widely used in industrial auto-
(ACK check). mation. These applications are supported
At the second stage, or acceptance layer, by an alliance of companies in the CAN in
the message undergoes message filtering. Automation users group (CiA).
Each station checks whether the received Bosch has concluded contracts with its
identifier is addressed to the particular licensees that guarantee that any CAN im-
station and whether the message is re- plementations will be able to communicate
quired in the application software. If not, with each other. Users will be able to rely
the message is rejected. Otherwise, it on the interaction of any CAN modules.
makes its way to the receive buffer. A flag
notifies the application software that a Characteristics
new message is ready for processing. Standardized in accordance with
The instrument cluster, for example, ISO 11898
calls up the available message, processes Prioritized communication
the engine-speed information and calcu- Data transfer rates: up to 1 MBits/s
lates triggering signals for the actuator of Data capacity: up to 8 bytes per message
the rev counter. Real-time response: the data protocol is
sufficient for the real-time requirements
Standardization in the motor vehicle
The International Organization for Stan- Non-destructive bus-access method
dardization (ISO) and SAE (Society of Au- Low power consumption
tomotive Engineers) have issued CAN stan- Flexibility of configuration
dards for data exchange in automotive ap- Simple and economical design with
plications: twisted line pairs
For low-speed applications up to Very high reliability of data transfer
125 kBit/s: ISO 11 519-2 and 11 898-3 Fault detection and signaling
For high-speed applications faster than Localizing of failed stations
125 kBit/s: ISO 11 898-2 and SAEJ 22 584 Handling of intermittent and permanent
(passenger cars) or SAEJ 1 939 (commer- faults
cial vehicles) Short-circuit resistance
An ISO Standard for diagnosis via CAN The number of nodes is theoretically un-
has also been published as ISO 15 765 limited. However, a limit arises in prac-
tice from the capacitive load of the bus
Standardization makes it possible for and the increasing latencies of messages
components of different manufacturers when a high number need to be sent.
to function together. No adaptations are
required.
Robert Bosch GmbH

44 | Bus systems | LIN bus

LIN bus The LIN bus is suitable for low data rates
of up to 20 kBit/s and is typically limited to
Overview a maximum of 16 bus subscribers.
The increasing use of mechatronic systems The electrical interface can be created
in the motor vehicle gave rise to the idea easily and cost-effectively in the network
of designing a cost-effective bus system nodes. As far as the nodes are concerned,
as an alternative to the low-speed CAN. a distinction is made between the master,
In 1998, several automotive manufacturers which is generally an electronic control
founded a consortium with the aim of de- unit connected to a superordinate bus sys-
veloping a specification for a serial bus for tem, and the slaves. These are intelligent
the networking of sensors and actuators in actuators, intelligent sensors or, quite sim-
the body electronics area. ply, just switches with additional hardware
It was believed that a bus system with for the LIN-bus interface.
simple bus protocol and a simple sequence The bus subscribers are usually ar-
control would make it possible to use even ranged in a linear bus topology and con-
low-capability microcontrollers without nected to each other by a single-wire line.
additional hardware for the communica- This topology, however, is not explicitly
tion interface. specified.
The workgroup's resulting LIN bus spec- Communication on the LIN bus takes
ification was introduced into mass produc- place in a time-synchronous manner,
tion with the Mercedes-Benz SL as early as whereby the master defines the time grid.
2001. Consequently, there arises a strictly deter-
The name, LIN (Local Interconnect ministic LIN bus response.
Network), is derived from the fact that Figure 1 shows an example of a LIN net-
all electronic control units are located work as a subbus in the roof/wiper area of
within a demarcated installation space the motor vehicle. Here, the bus comprises
(e.g. in the door). The LIN, therefore, is a central electronic control unit, as the
a local subsystem for supporting the vehi- master, and the four slaves: mirror, garage-
cle network by means of superordinate door opener, rain/light sensor and wiper
CAN networks. actuator. The master also functions as a
gateway to the Chassis CAN, the Body CAN
and the Diagnostics CAN.

1 LIN bus with master and slave nodes

Slave 1 Slave 2 Slave 3 LIN slave 4


Mirror Garage-door Rain/light Wiper
opener sensor actuator
Diagnostics
CAN Master
Central ECU
Roof/wiper LIN

Body CAN Chassis CAN


SVL0001E
Robert Bosch GmbH

Bus systems | LIN bus | 45

Applications Data transmission system


The LIN bus as a means of networking me- The LIN bus is designed as an unshielded
chatronic systems can be used for many single-wire line. The bus may adopt two
applications in the motor vehicle for which logical states:
the bit rates and variability of the CAN bus The dominant level corresponds to the
are not essential. Examples of LIN applica- electrical voltage of approx. 0 V and
tions: represents logical 0
Door module with door lock, power-win- The recessive level corresponds to
dow drive and door-mirror adjustment battery voltage UBat and represents
Control of the power-sunroof drive unit the logical 1 state
Control of the wiper motor for the wind-
shield wiper The recessive level is characterized by a
Sensor for rain and light detection resistance to battery voltage of 1kV in the
Air-conditioning system (transmission master and 30kV in the slaves.
of signals from the control element, Due to circuitry variations, there may be
activation of the fresh-air blower) differences in the voltage levels. A stable
Headlight electronics data transfer is ensured by the defining of
Control of motors for seat adjustment tolerances for sending and receiving in the
Theft deterrence areas of the recessive and dominant levels.
Garage-door opener The tolerance zones on the reception side
are wider (Fig. 2) to make it possible for
valid signals to be received despite inter-
ference radiation.
The data rate of the LIN bus is limited
to a maximum of 20 kBit/s. This is the out-
2 Tolerance ranges for transmitters and receivers come of a compromise between the de-
mand for high edge steepness for easy syn-
Transmitter chronization of the slaves on the one hand,
UBat
recessive
and the demand for lower edge steepness
80% for improved EMC characteristics on the
other. The standard bit rates of 2,400 Bit/s,
Voltage level

9,600 Bit/s and 19,200 Bit/s are recom-


mended. The minimum permissible value
20% for the bit rate is 1 kBit/s to prevent time-
dominant out conflicts. The edge steepness itself
0
Rise time Release time is defined in the LIN specification as
Time t 1 to 3 V/s.
The maximum number of nodes is not
specified in the LIN specification. It is
Receiver
UBat theoretically limited by the number of
available identifiers. In practice, the num-
recessive
ber of subscribers is restricted to 16 due
Voltage level

60% to the maximum permissible total capacity


40% of the bus system.

dominant
SVL0002E

0
Time t
Robert Bosch GmbH

46 | Bus systems | LIN bus

Bus access LIN protocol


Access to the LIN bus is determined by the Frame
master-slave principle. Each message is The information transferred on the
initiated by the master. The slave has the LIN bus is embedded in a defined frame
possibility to respond. The messages are (Fig. 3). A message initiated by the master
exchanged between the master and one, always begins with a header. The response
several or all of the slaves (point-to-point, (message field) contains different informa-
multicast, broadcast). tion depending on the type of message.
The following relationships are possible If the master wishes to transmit control
in the communication between master and instructions for a slave, it will populate the
slave: response with data to be used by the slave.
Message with slave response: the master If the master is transmitting a data request,
sends a message to one or more slaves the slave that it is addressing will populate
and asks for data (e.g. switch states or the response with the data requested by
measured values) the master.
Message with master instruction: the
master gives a slave a control instruction Header
(e.g. switch on a servomotor) The head is composed of the following
The master initiates communication parts:
between two slaves The synchronization break
The synchronization field
No arbitration or conflict management is The identifier field
required because, with the master-slave
access control, the master alone controls Synchronization
access to the data line. To guarantee consistent data transfer
between master and slaves, a synchroniza-
tion takes place at the beginning of each
frame. First of all, the beginning of a
frame is unambiguously marked by the
synchronization break (SynchBreak).

3 LIN message format

LIN frame

Header Response
Synch Synch Ident Data Data Data Data Data Data Data Data Check-
Break Field Field field 0 field 1 field 2 field 3 field 4 field 5 field 6 field 7 sum
SVL0003E
Robert Bosch GmbH

Bus systems | LIN bus | 47

The SynchBreak comprises at least 13 con- Of the 64 possible messages, 32 may only
secutive dominant levels and one recessive contain two data bytes, 16 may only con-
level. tain four data bytes, and the remaining 16
At the end of the synchronization break, eight data bytes each.
the master sends the synchronization field The last bits in the identifier field con-
(SynchField) consisting of the bit sequence tain two checksums, which are used to
01010101. The slaves are then able to ad- check the identifier for transmission er-
just themselves to the time basis of the rors and any resulting incorrect message
master and thus synchronize. assignments.
The synchronization method described
permits a loose specification of the timing Data field
of the bus subscribers. The clocking of Once the header sent by the master node
the master should not deviate more than has been transmitted, it is time for the
0.5 % from the nominal value. The clock- transfer of the actual data to begin. The
ing of the slaves is permitted to deviate by slaves know from the transmitted identi-
up to 15 % before synchronization as long fier whether or not they are being ad-
as the synchronization reduces the devia- dressed and, if they are, they reply with
tion to a maximum of 2 % before the end their response in the data field.
of the message. Several signals can be packed into one
In this way, the slaves can be built with- frame. In this case, each signal has pre-
out an expensive quartz oscillator, e.g. cisely one generator, i.e. it is always writ-
using a simple RC circuit. ten by the same node of the network.
During the data transfer of the bytes,
Identifier it is always the least significant bit (LSB)
The third byte in the header is used as the that is output first. Each byte (8 bits) is
LIN identifier. As with the CAN bus, a con- preceded by a start bit and followed by
tent-based addressing method is used a stop bit, which means that each byte
the identifier therefore provides informa- involves the transmission of ten bits.
tion about the content of a message (e.g. The purpose of the start and stop bits is
engine speed). Based on this information, to resynchronize the nodes and thereby
all nodes connected to the bus decide prevent transmission errors.
whether they would like to receive and The data response of the slaves is veri-
process the message further or simply fied by means of a checksum.
ignore it. This process is known as accep-
tance filtering. LIN description file
Six of the eight bits of the identifier field The configuration of the LIN bus, in other
determine the identifier itself. Their per- words the specification of network sub-
mutations give rise to a possible 64 differ- scribers, signals and frames is managed
ent identifiers (ID). They have the follow- in the LIN description file, or ldf. For this
ing meanings: purpose, the LIN specification provides for
ID = 0 to 59: transmission of signals. an appropriate configuration language.
ID = 60: master request for the com- From the ldf, a set of C codes or header
mands and diagnosis files is automatically generated using suit-
ID = 61: slave response to ID 60 able tools. These are used as the basis for
ID = 62: reserved for manufacturer- implementing the master and slave func-
specific communication tions in the electronic control units con-
ID = 63: reserved for future extensions nected to the bus.
to the protocol
Robert Bosch GmbH

48 | Bus systems | LIN bus

The ldf is therefore a means of configuring Example: air-conditioning control


the entire LIN network. It represents a The LIN bus is typically used in the control
common interface between the vehicle of the air-conditioning system. The operat-
manufacturer and the supplier of the ing and display unit functions as the bus
master or slave modules. master. This is where the software for the
open and control algorithms are stored.
Message scheduling One of its tasks is to adjust the speed of
The scheduling table in the ldf defines the the fresh-air blower. The controlled vari-
sequence and time grid in which messages able for this is the actual temperature in
are sent. Frequently needed information is the passenger cell and the desired temper-
sent more often. Once the table has been ature set by the driver. The electronic con-
worked through, the master begins with trol unit receives the interior temperature
the first message again. The sequence in from a temperature sensor located in an
which the table is worked through may appropriate place in the interior. The de-
change depending on the operating status sired temperature is set at the control unit,
(e.g. diagnostics active/inactive, ignition e.g. using a sensor ring.
on/off). From the input variables, the electronic
The transfer grid of each message is control unit calculates that the blower
therefore known. This deterministic be- speed needs to be increased to a value of
havior is guaranteed by the fact that, with 200 rpm, for example. The electronic con-
the master-slave access control principle, trol unit transmits a message containing
all messages are initiated by the master. the master instruction to the LIN bus at a
defined time interval. The identifier in this
Network management example would be set the blower speed.
The nodes of an LIN network can be forced In this subbus, this instruction corre-
into sleep mode to minimize the no-load sponds to identifier 25, for example.
current of the entire electronics and elec- Following the header containing this iden-
trical system in the vehicle. Sleep mode tifier, the master transmits a numerical
can be achieved in two ways: value in the data field that equates to the
The master sends the go-to-sleep com- physical value of 200 rpm. Each slave pos-
mand with the reserved identifier 60 sesses a list of identifiers that are relevant
The slaves enter sleep mode of their own for this node. The fresh-air blower is the
accord if no data transfer has taken one and only slave that responds to the
place on the bus for a relatively long set blower speed identifier and executes
period (4 seconds) the master's request.
At speeds below idle, the fresh-air
Both the master and the slaves are able to blower must be switched off. At this low
wake up the network. To do so, they must speed, the heavy load could cause the en-
send the wake-up signal. This comprises gine to stall. The LIN bus is coupled to the
data byte 128. After a break of 4 to 64 bit CAN bus via the gateway and thus receives
times (wake-up delimiter), all nodes must the current engine speed on a continuous
have been initialized and be ready to re- basis. If the speed falls below the specified
spond to the master. engine-speed threshold, the LIN master
sends the message containing the set
blower speed identifier where the data
field contains the value 0. The fresh-air
blower switches off in response.
Robert Bosch GmbH

Bus systems | LIN bus | 49

4 LIN networking (example)

LIN slave 1 LIN slave 2 LIN slave 3 LIN slave 4


Fresh-air Windshield PTC auxiliary PTC auxiliary
blower heating heater, right heater, left

LIN master 1
ECU for air-con-
ditioning system

LIN slave 1
CAN
Sliding sunroof
motor

LIN master 2

SVL0004E
Roof module

Intelligent actuators can send up-to-date Summary


operating-status information to the actuat- The essential characteristics of the LIN bus
ing unit. The fresh-air blower records the are:
speed by means of a sensor and sends it Single-master/multiple-slave concept
back on the LIN bus as a numerical value. Master/slave access control
Due to the master-slave access method, Independent synchronization of the
the value is only contained in a message slave possible even without quartz
with slave response initiated by the mas- Deterministic signal transmission
ter. The feedback signal with the current Communication in the form of very
engine speed makes it possible to control, short messages
and therefore accurately maintain, the Character-based transmission (UART)
desired value. Bit rate max. 20 kBit/s
Data transfer over an unshielded single-
wire line
The reference potentials of the data line
are battery voltage and ground
Maximum bus length 40 m
Maximum number of nodes 16, typically
fewer than 12
Robert Bosch GmbH

50 | Bus systems | Bluetooth

Bluetooth for transmitting data for multimedia


applications.
Overview In the meantime, the Bluetooth SIG has
Mobile communication is gaining ever expanded to involve around 2,000 com-
more importance in all domains. For con- panies from the telecommunications, data
venient communication between various processing and automotive engineering
devices, a wireless link is indispensable. fields.
Infrared connections, as often used in
the past, tended to be manufacturer- Applications
specific, they required a direct line of Bluetooth is an industry standard for
sight and imposed constraints on the the networking of mobile multimedia
area of movement. Only with a standard- devices, such as a car sound system, cell
ized, wireless link could mobile devices phone, headset, PDA (Personal Digital
of different manufacturers communicate Assistant), PC and peripheral equipment
with each other without problems. (Fig. 1). Bluetooth stands for the simple
The development of the Bluetooth exchange of data between portable ter-
standard began in 1994 at the telecom- minals and the wireless transmission of
munications company, Ericsson. As part audio and video signals for entertain-
of an initial study, Ericsson investigated ment and information.
the possibilities for completely replacing The short-range wireless connectivity
the cable connections between the cell of Bluetooth eliminates the need for con-
phone and additional devices. In cooper- nection cables between the cell phone
ation with other industry partners, the and the hands-free system: no more
Bluetooth SIG (Special Interest Group) tangling of cables when making a call.
was formed in 1998 to create a uniform, It is in this area that Bluetooth has been
internationally-accepted standard. The the most well received.
SIG set itself the aim of specifying a wire- Meanwhile, a large number of con-
less technology with low manufacturing sumer electronics devices, be they cell
costs, low energy consumption and ro- phones, PDAs, notebooks or car phones,
bust resistance to interference. The now offer an address book function.
wireless interface had to be suitable

1 Bluetooth networking of mobile multimedia devices (example)

1 2 3

Fig. 1
1 Cellular phone
2 Headset 5 4
3 Personal digital
assistant (PDA) FM2 EUROPE 1
SVB0001Y

4 Laptop computer
5 Car sound system
with navigation unit
Robert Bosch GmbH

Bus systems | Bluetooth | 51

With Bluetooth, it is possible to conve- the specification, great emphasis was


niently synchronize the entries stored placed on backward compatibility with
in the various address books. The car the previous versions.
driver is spared the laborious task of
typing the phone number stored in the Transmission technology
cell phone or PDA or inputting an ad- Frequency band
dress into the navigation system. Bluetooth operates in the worldwide-
Bluetooth also makes it possible to license-free 2.4 GHz ISM band (Industrial
listen to the radio through a headset in Scientific Medicine). This is available
the rear of the vehicle and to control practically worldwide without approval
the car sound system using a PDA. apart from certain national limitations
and is reserved for applications in indus-
Bluetooth is predominantly used for try, science and medicine. For this rea-
the transfer of data in the multimedia son, the possibility of interference from
domain. However, this technology can garage-door openers, microwave ovens
quite easily be used for diagnostic and or other appliances which operate using
service purposes. Workshops or break- the same frequency band has to be ac-
down services would be able to conve- cepted. To minimize interference, the
niently read vehicle information during best possible use should be made of the
fault diagnosis and record the condition frequency spectrum. Devices that use
of the vehicle. the ISM band therefore implement
spread-spectrum techniques.
Bluetooth versions
The first specification (Bluetooth 1.0) of Frequency-hopping method
the Bluetooth standard was adopted in Bluetooth divides the 2.4 GHz band
July 1999. In December 1999 this specifi- into 79 channels at intervals of 1 MHz
cation was replaced by Bluetooth 1.0b, (f = 2,402 + k, k = 078). The band is
which contained improvements and clar- terminated at both the upper and lower
ifications for interoperability. February end by two guard bands with a width of
2001 saw the release of the Bluetooth 1.1 3.5 MHz (upper guard band) and 2 MHz
specification, which fixed fundamental (lower guard band). The transmission
interoperability problems between the
first devices and chips and is used in
most Bluetooth devices today. Three 2 Frequency-hopping method

years later, in November 2003, version


1.2 of the specification was published.
This used the IEEE (Institute of Electrical
and Electronics Engineers) language def-
inition for technical documentation and
introduced adaptive frequency hopping
Frequency f

(AFH) as a technical advancement that


improves resistance to interference in
the frequency band. The most significant
modification was introduced with ver-
sion 2.0 of the specification in November
2004. With the enhanced data rate (EDR), Time slots Time t
SVB0002E

it was possible to triple the bit rate from


1 MBit/s to 3 MBit/s and reduce power
consumption. With each new version of
Robert Bosch GmbH

52 | Bus systems | Bluetooth

uses a combined frequency-hopping/ 8 differential phase-shift keying (8DPSK),


time division duplex (FH/TDD) method: which modulate the phase of the carrier.
the frequency-hopping spread spectrum p/4DQPSK represents one of four com-
(FHSS, Fig. 2). The channels are switched binations of a bit pair (00, 01, 10 and 11)
1,600 times per second (i.e. in 625 s and so transfers a maximum of two bits;
slots). The slots are assigned in accor- 8DPSK can represent any combination
dance with the TDD method, i.e. the of three bits. This is used to increase the
transmitter and receiver are authorized bit rate from 1 MBit/s (net 727 kBit/s) to
to send alternately. The frequency-hop- 2 MBit/s (net 1,446 kBit/s) with GFSK,
ping method guarantees optimal and or 3 MBit/s (net 2,169 kBit/s) with EDR.
uniform use of the ISM band and makes
Bluetooth resistant to interference from Power classes
other transmitters in the same frequency Bluetooth devices are categorized into
band (e.g. WLAN). In addition, it also different power classes. Manufacturers
offers some security because a hacker are free to decide which power class they
would not know the destination of a fre- implement. The present specifications
quency switch or indeed the time frame define three power classes:
for which a particular frequency would Class 1 with 100 mW (20 dBm) trans-
be valid. This makes interception of a mission output for a range of 100 to
connection much more difficult. 150 m
The introduction of adaptive fre- Class 2 with 2.5 mW (4 dBm) transmis-
quency hopping (AFH) in the Bluetooth sion output for a range of 10 to 25 m
1.2 specification further increased Class 3 with 1 mW (0 dBm) transmis-
Bluetooth's resistance to interference sion output for a range of 10 m
and reduced the effect of Bluetooth itself
as a source of interference on other de- Topology
vices in the 2.4 GHz ISM band. The num- Bluetooth supports the automatic config-
ber of effective channels is dynamically uration of ad-hoc networks. This means
adaptable to the conditions in the fre- that two or more devices are able to
quency band. Frequencies used by other spontaneously form a network with no
transmitters are then removed from the prior knowledge of each other. Bluetooth
list of 79 possible channels. is based on the master-slave principle.
In principle, any Bluetooth device may
Modulation method be a master or a slave. The master is a
Bluetooth uses the Gaussian frequency- special device that coordinates commu-
shift keying (GFSK) method of modula- nication between the devices.
tion. This is a special variant of fre-
quency-shift keying (FSK) supplemented
with a Gaussian low-pass filter. GFSK
varies the frequency and delivers 1 bit
per keying interval. Bluetooth has a sym-
bol rate of 1 MBit/s. With the enhanced
data rate (EDR) introduced with the
Bluetooth 2.0 specification, it has been
possible to increase this data rate to
3 MBit/s. This is made possible by the
use of two variants of phase-shift keying
(PSK): the p/4 differential quaternary
phase-shift keying (p/4DQPSK) and the
Robert Bosch GmbH

Bus systems | Bluetooth | 53

Piconet The piconet is defined by the frequency-


A network of Bluetooth devices is known hopping sequence, i.e. the sequence of
as a piconet (Fig. 3). For the devices switching between the 79 possible chan-
within a piconet, there are two roles: nels. The hopping sequence is specified
master or slave. Which device assumes by the master and is calculated from the
which role is not decided until communi- master's device ID (a worldwide unique
cation is established. A device sets up a 48-bit identifier) and its internal clock.
piconet and transmits its device ID and The slaves synchronize with the master's
the value of its internal clock. This de- clock and its hopping sequence.
vice becomes the master. A master is able to manage up to seven
Any device that is not participating in active slaves. Each active slave receives
a piconet but is not switched off remains a 3-bit active member address (AMA).
in standby, which is marked by a small Active devices can send data or even
current draw. simply remain connected. By deregister-
The first stage in the creation of a ing, a device can switch back to standby.
piconet involves the potential master A Bluetooth device may also switch to
searching for other devices in its range any of three energy saving modes: hold
(inquiry scan). Special frequency-hop- mode, sniff mode and park mode. The
ping sequences (inquiry sequences) are devices continue to be synchronized with
available for this purpose. Devices that the hopping sequence of the piconet. The
wish to enter into communication with lowest energy saving mode is the park
other devices respond with an inquiry mode, where the device relinquishes its
response message. By the end of the in- AMA and receives in its place an 8-bit
quiry sequence, the information about all parked member address (PMA). With the
devices willing to communicate is avail- PMA, the device is still a subscriber in
able. The potential master is now able to the piconet but makes way for another,
address a specific device by means of a active device. Parked devices remain
special paging sequence. Paging is a pro- synchronized with the hopping sequence
cess whereby a fixed connection is es- of the piconet and can be addressed and
tablished between a master and a slave. reactivated by the master using the PMA.
The slave contains all the information it
needs to synchronize with the master. Scatternet
In a piconet, only one slave is ever able
3 Piconet to communicate with the master simulta-
neously. When more slaves enter the net-
work, the data rate per device falls very
quickly. This is where scatternets pro-
vide a solution. A scatternet consists of
S up to ten piconets in which the individ-
P P ual piconets partly overlap. In this way, it
is possible to set up even larger networks
M
in which all network subscribers may
S S connect to one another. The scatternet
in Figure 4 comprises two piconets. One
SB
of the Bluetooth devices is a member of
Fig. 3
both piconets. Through this device, the M Master
SVB0003E

two networks are able to exchange data. S Slave


However, this device, which is assigned P Park mode
SB Standby
Robert Bosch GmbH

54 | Bus systems | Bluetooth

to more than one piconet, can only func- It is conventional for the transmissions
tion as master in one of these networks. of the master to begin in the even time
A device that is assigned to two picon- slots and those of the slaves to begin
ets in a scatternet must synchronize with in the odd time slots. This characteris-
the network with which it wishes to com- tic conforms to the regular time-divi-
municate. It cannot remain connected to sion multiplexing method (TDD here)
both networks at the same time. Before whereby the master uses one half of the
the device leaves the old piconet, it must time slots and the slaves the other half.
inform its master that it will be unavail- In addition to packets that may occupy
able for a certain period of time. The one time slot, Bluetooth provides for
remaining network subscribers can packets that may occupy three or five
continue to communicate. time slots (multi-slot packets). As soon
A master, too, may leave its own as a master or slave sends a packet three
piconet and become a slave in another. or five time slots long, this transmitter
All communication in its old network, will remain on the same frequency.
however, is broken until it returns and There is no frequency change within
assumes its master function again. a packet (Fig. 6).
A master cannot become master of a Once the packet has been transferred,
second piconet. If this were to happen, the frequency hops as determined by the
both piconets would behave in an identi- hopping sequence (independently of the
cal manner and form a single network. transmission process). In the illustration,
for example, the frequency hops from
Physical data channel fk to fk+3 after the transmission of a 3-slot
A data channel is represented by a hop- packet). The reason for this behavior is
ping sequence between the 79 possible that not every station may have received
frequencies in the ISM band. Any device the transmission and cannot therefore
that is actively participating in a piconet respond specifically to the transfer of
must also hop at the same carrier fre- data in several time slots. For this rea-
quency (frequency fi). As soon as a mas- son, all stations that are not involved in
ter has sent data at frequency fk, a slave the transmission always continue to hop
can respond at frequency fk+1. This pro- in the sequence specified by the master.
cedure is illustrated in Figure 5.

4 Scatternet 5 Timing of data transfer

Piconet 1 Piconet 2

S SB f(k) f(k+1) f(k+2)


Master
P P S

M M

S S P Slave

P S 625 ms
Fig. 4
M Master
SVB0004E

SVB0005E

S Slave
P Park mode
SB Standby
Robert Bosch GmbH

Bus systems | Bluetooth | 55

Physical connections which transfer data from the user level


Bluetooth supports both circuit-switched the applications.
and packet-switched data channels. For
circuit-switched, synchronous communi- Data packets
cation, Bluetooth offers a synchronous A Bluetooth data packet generally
connection-oriented link (SCO), and an comprises three fields:
ACL (Asynchronous Connectionless Link) Access code
for packet-switched, asynchronous Header and
communication. Between two Bluetooth Payload
devices, there may only ever be one
ACL link but there can be up to three A packet may simply comprise the access
SCO links. The ACL links are the founda- code, or the access code and a header,
tion for the data transfer. The SCO links or the access code, header and payload
are purely voice channels with a data (Fig. 7).
rate of 64 kBit/s. The voice is transmitted A packet begins with an access code.
by continuously variable slope delta If a header follows, the access code has
modulation (CVSD) or pulse-code modu- a length of 72 bits, otherwise it is 68 bits
lation (PCM). A Bluetooth master can long. The access code is used for the
maintain several different data channels synchronization and identification of a
between its slaves even at the same time. piconet, for device polling and for device
calls. There are three different types of
Logical data channels access code:
Logical channels refer to different types Channel access code (CAC), the purpose
of channels streamed over a physical of which is to synchronize and identify
connection. The data transmitted over a piconet. The CAC is sent with each
a physical channel has different logical packet transmitted over the piconet.
meanings. Bluetooth distinguishes be- Device access code (DAC), which is used
tween two categories of channel: link to transfer specific identifiers during
channels, which are used for the ex- the device call (e.g. when paging).
change of control information between Inquiry access code (IAC), which is
master and slave; and user channels, used for device polling.

6 Frequency hopping with multi-slot packets 7 Structure of a packet

Access code Header Payload


f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+5) f(k+6)
72 (68) bits 54 bits 0 to 2,745 bits

625 ms 4 preamble 3 AMA

f(k) f(k+3) f(k+4) f(k+5) f(k+6) 64 synchron- 4 type


ization
1 flow
(4) appendix
f(k) f(k+5) f(k+6) 1 ARQN

1 SEQN
SVB0007E
SVB0006E

8 checksum
Robert Bosch GmbH

56 | Bus systems | Bluetooth

The header of a Bluetooth packet is Bluetooth architecture


54 bits long and contains information The Bluetooth architecture is complex.
about the link (link control information). This is inherently associated with the
It is made up of the address, packet type, idea behind general cable emulation.
flow control, error monitoring and The architecture is designed to enable
checksum fields. The actual length of new protocols and applications to be
the header (i.e. the sum of the bits in adapted for the use of Bluetooth. Accord-
the header) is 18 bits. The header is pro- ingly, the Bluetooth protocol stack is
tected by forward error correction (FEC). very extensive (Fig. 8 shows a simplified
The bits of the header are sent three version of the protocol stack).
times (1/3 FEC), giving a header length of The Bluetooth technology can be sub-
54 bits. A receiver can then simply take divided into three logical sections:
the majority decision; each bit triplet is Hardware
resolved to the value with majority in Host stack
the triplet. Applications
The payload of a Bluetooth packet can
be up to 341 bytes in size (1,023 bytes The hardware layer and the host stack
with EDR). The data field of the payload are defined in the Bluetooth Core Specifi-
consists of up to three segments: the cation; the applications are part of the
payload header, the payload itself and, Bluetooth Profile Specification.
in certain circumstances, a checksum.
Bluetooth uses 16 different packet Hardware-side protocols
types, the common feature of all being The hardware is represented by the
the access code and the header. The Bluetooth chip. This is where the radio
structure of the payload depends on the layer, baseband and link management
packet type concerned. Along with pack- are contained. The radio layer deals with
ets for ACL and SCO links, there are also the radio transmission, used frequencies,
packet types for polling the slaves, syn- modulations and transmission output.
chronizing the hopping sequence and The baseband represents the link-estab-
acknowledging data transfers. lishment mechanisms, the packet struc-
ture and the timing. The link management
Bluetooth device addresses establishes and manages the link between
A Bluetooth device is assigned a world-
wide unique Bluetooth device address. 8 Protocol stack

The address is derived from the IEEE-


802 standard and implemented in the de- Applications
vice by the manufacturer. The 48-bit ad-
OBEX
dresses are subdivided into three parts
LAP (Lower Address Part, containing SDP TCS BIN RFCOMM
24 bits)
Audio L2CAP
UAP (Upper Address Part, containing
8 bits) HCI (Host Controller Interface)
NAP (Non-significant Address Part,
Link Manager Protocol LMP
containing 16 bits) (link management)

Baseband
The LAP and UAP fields form the signifi-
SVB0008E

cant part of a Bluetooth device address. Radio (radio layer)


Robert Bosch GmbH

Bus systems | Bluetooth | 57

two devices and also implements security In addition to L2CAP, there are also au-
and authentication functions. dio and control protocols that govern the
The host controller interface (HCI) is handling of audio data and control data.
the interface between the hardware of a Audio applications, for example, can
Bluetooth module and the host-side pro- make direct use of the baseband layer
tocols. The HCI is a hardware abstraction once the audio signals have been coded
and realizes various interfaces for con- accordingly.
trolling the Bluetooth hardware and
transferring data (e.g. via USB or UART). The service discovery protocol (SDP) is
another important host-side protocol.
Host stack It serves to identify and scan for services
The host stack uses the HCI to control with specific properties and to describe
the Bluetooth hardware and transfer services within range of a Bluetooth de-
data. The format of this data is deter- vice. Bluetooth devices are meant to be
mined by the upper protocol layers. The able to interact on an ad hoc basis with
logical link control and adaptation proto- other devices in different environments.
col (L2CAP) implements the abstraction It is therefore necessary to know which
of the hardware's properties, adapts the services are made available by which de-
upper layers of the protocol stack to the vices within range. All devices wishing to
capabilities of the baseband and hides provide services must use an SDP server;
transmission details such as the connec- for all other devices, an SDP client is suf-
tionless or connection-oriented trans- ficient. The SDP prepares the services
mission type. The L2CAP layer essen- available on a device in a service data-
tially has three main functions: base. The service information in the pos-
It can receive packets with a length of session of the SDP server is stored in a
up to 64 kB from the upper layers and service record. The service record con-
decomposes them into smaller data sists of a list with service attributes that
packets (segments) for processing in describe the properties of the service
the lower layers if necessary. At the more precisely and is identified by a
other end, the segments are recom- 32-bit service record handle.
posed back into packets.
It manages the multiplexing and de- Two further protocols in the protocol
multiplexing of several packet sources. stack form the fundamental basis for the
If a packet is being recomposed, the interoperability of Bluetooth devices.
L2CAP layer determines to which pro- The RFCOMM (Radio Frequency Com-
tocol of the upper layers the packet is munication) cable emulation protocol
forwarded. above the L2CAP layer simulates up to
L2CAP offers functions for negotiating 60 virtual serial interfaces derived in ac-
quality of service and configuration pa- cordance with the ETSI 07.10 standard.
rameters. This means, for example, that As a result, almost any software that pre-
the maximum size of the payload can be viously expected a serial interface can
negotiated so that a device with limited work with Bluetooth.
resources would not be overwhelmed TCS BIN (Telephony Control Protocol
by overly large packets. Using the con- Specification Binary) is employed as
figuration parameter for the quality of the means of controlling telephone and
service, it is possible to define the telephony functions. This is a bit-ori-
properties of the data transfer: best ef- ented protocol for establishing voice
fort (best attempt but with no guarantee and data connections between Bluetooth
of data transfer) or guaranteed. devices. The use of appropriate, indus-
Robert Bosch GmbH

58 | Bus systems | Bluetooth

try-wide standards has made it possible, The Bluetooth profiles form the hierar-
here too, to ensure wide-ranging com- chy (Fig. 10). The GAP forms the basis
patibility with legacy applications. and describes all the essential functions
that a Bluetooth device must fulfill at the
Applications lowermost level. These include, for ex-
Many more protocols have been adapted ample, the functions for establishing and
for the Bluetooth standard (adapted pro- managing the link, the supported operat-
tocols) and can be found in the protocol ing modes and the security of a link.
stack. Internet applications can, for ex- The SDAP defines the access interface
ample, continue to use TCP/IP through for the service discovery protocol (SDP)
the point-to-point protocol (PPP) or the with which devices can discover or poll
Bluetooth network encapsulation proto- the services offered by other devices.
col (BNEP). For the exchange of vCalen- SDP builds on the GAP. All Bluetooth de-
dars and vCards, it is possible to use the vices must implement these two profiles.
object exchange protocol (OBEX) cov- The SPP is used by most other
ered by the IrDA standard. Bluetooth profiles. One exception to
this is the telephony control profile.
Profiles This is always used when Bluetooth is
The uppermost layer contains the appli- being used for cable emulation or if a
cations and profiles. Profiles represent serial data connection is to be used.
standard solutions for a particular us- The SPP builds on the GAP and uses
age scenario. The Bluetooth specification the RFCOMM protocol.
currently brings together 13 different The GOEP defines the fundamental
applications described as profiles. Each functions necessary for the exchange
profile uses a certain choice of protocol; of complex objects. It defines a client-
in principle, application profiles make server relationship for the exchange of
a different protocol stack available for data. Like the SPP, the GOEP provides
each application. Profiles describe the the foundation for further profiles.
vertical slice through the Bluetooth pro-
tocol stack; the protocols represent the
horizontal layers (Fig. 9). Within the pro-
files, the required and optional functions
of the layers are defined. These stan-
dardized profiles make it possible to en- 9 Profiles and protocols

sure interoperability between different


devices.
The four fundamental profiles of the
Applications
Bluetooth specification are:
Generic access profile (GAP)
Service discovery application profile
(SDAP)
Protocols

Serial port profile (SPP) and


Generic object exchange profile
(GOEP)
SVB0009E

Profiles
Robert Bosch GmbH

Bus systems | Bluetooth | 59

10 Profile hierarchy

Generic access profile (GAP)

Service discovery Telephony control profile


application (SDAP) Intercom (IntP) Cordless telephone (CTP)

Serial port profile (SPP)


Dial up network (DUNP) Generic object exchange profile (GOEP)

Fax (FaxP) File transfer (FP)

Headset (HSP) Object push (OPP)

SVB0010E
LAN access (LAP) Synchronisation (SP)

Origin of the name, Bluetooth

The name, Bluetooth, originates from


King Harald Gormsen, a Danish Viking.
Harald had the nickname, Blatand.
In the Middle Ages, Bla actually meant
dark, while Blatand made reference
to the dark figure of Harald Gormsen.
Bluetooth, therefore, is not a direct
translation of Blatand.

In the 10th Century, Harald Gorm-


sen united large parts of Denmark
and Norway. The Bluetooth wireless
system developed 1,000 years later
unified a wide range of different infor-
mation, data processing and wireless
mobile devices. This is why it was
named after King Harald.
Robert Bosch GmbH

60 | Bus systems | MOST bus

MOST bus The MOST Cooperation creates and ad-


ministers the specifications on which the
Introduction MOST bus is based. Furthermore, it de-
The MOST bus (Media Oriented Systems fines the requirements for implementation
Transport) was specifically developed for of MOST devices and provides appropriate
the networking of infotainment systems in compliance tests through accredited test
motor vehicles. In addition to traditional houses.
entertainment functions, such as radio
tuners or CD players, these infotainment Type of use
systems (which are becoming an increas- At present, the MOST bus is almost exclu-
ingly common feature of modern vehicles, sively used for the networking of infotain-
and premium class vehicles in particular) ment systems in motor vehicles. It can cur-
also offer video functions (DVD and TV), rently be found in over 35 vehicle models
route guidance capabilities and access to of various manufacturers, especially in
mobile communications and information. the premium and mid-range classes (as at
2006).
Requirements
The functions of an infotainment system Features of the MOST bus
place high demands on a bus system. The MOST bus supports the logical net-
The transmission of multimedia data, working of up to 64 devices, at which point
both audio and video, requires a high constraints associated with the chipsets
data rate and a synchronization of the may be encountered.
data transfer between source and sink In its current version, the MOST bus
as well as between sinks themselves. offers a data rate of 24.8 MBit/s (MOST 25).
For the transmission of informational Versions with higher data rates of 50 MBit/s
data, e.g. detailed information about the (MOST 50) and 150 MBit/s (MOST 150) are
music tracks on an mp3 player, and the already available as a development model.
sending of software updates, it is neces-
sary for the data transfer to be flexible Data transmission channels
with varying and, at certain times, For the transmission of data, the MOST bus
equally very fast data rates. supports the following channels and their
Likewise, the requirements for use in a different attributes:
motor vehicle, and the associated require- The control channel is used for the sim-
ments of electromagnetic compatibility ple transmission of control commands,
(EMC), must also be fulfilled. for the signaling of device statuses and
for the sending of messages necessary
MOST Cooperation to system management. With MOST 25,
It was with these requirements in mind the control channel has a gross band-
that the MOST bus was developed by the width of 705.6 kBit/s.
MOST Cooperation. This was founded in For the transmission of multimedia data,
1998 by BMW, DaimlerChrysler, Harman/ the MOST bus has a flexible number
Becker and Oasis SiliconSystems (now part of synchronous channels that are able
of SMSC). By 2006, the MOST Cooperation to carry both audio and video data.
had 16 automotive manufacturers and In MOST 25, there are a maximum of
67 suppliers and tool makers among its 15 audio channels available in stereo
membership. quality.
Robert Bosch GmbH

Bus systems | MOST bus | 61

On the asynchronous channel, data is Each device has a bypass. When this is
sent in packets. It is therefore suitable closed, the device forwards the signal
for transferring information that does directly and is therefore invisible to the
not require a fixed data rate but does MOST system. This service is useful,
need a high data rate at certain times. for example, when the system is starting
Examples could be the transfer of track and a device requires more time for initial-
information of an mp3 player or a soft- ization, or in the event of a temperature-
ware update. With MOST 25, the asyn- dependent shutoff.
chronous channel has a gross bandwidth There are also other possible structures
of up to 12.7 MBit/s. for a MOST system, e.g. a star topology.
Internally, however, these must always
The available bandwidth can be flexibly be arranged to form a (logical) ring.
distributed between the asynchronous With a star structure, this can be achieved
channel and the synchronous channels through use of a central hub, for example.
by means of the boundary descriptor,
which can also be shifted to the transit Device model
period if relevant preconditions are met. The MOST standard defines the model
shown in Figure 2 for a MOST device for
Topology which the following elements are required:
A MOST system is arranged in a ring struc- At the lowermost level, the physical
ture whereby a device is connected to its layer provides access to the transmission
predecessor or successor in the ring by agent. Departing from the original defini-
an input or output respectively (Fig. 1). tion that provided for optical transmission
One of the devices acts as the timing by POF cable (Plastic Optical Fiber), there
master and generates the data frames are today various physical layers available
for data transfer with which the other with optical and electrical transmission as
devices synchronize. well as various speeds of transfer.

1 Ring structure of the MOST system 2 Model for a MOST device

Timing master MOST device


position 0
NetBlock Appl.
Rx Tx

Network service
e

MOST network
Tx

Rx tion 1 ve
Tim sition 2
slav

po ng s
Tim

interface controller
si
i
Rx

Tx
ing
po

MOST physical
la

UVM0001Y

UVM0002Y

layer
Robert Bosch GmbH

62 | Bus systems | MOST bus

The MOST network interface controller Transmission agent


(NIC) is a hardware controller that is re- The MOST bus was originally defined as
sponsible for controlling the physical layer an optical transmission agent that used a
and implements the basic transfer ser- plastic optical fiber (POF). The optical sig-
vices. While in the original version of the nal used here with a wavelength of 650 nm
NIC many control tasks had to be carried (in the red wavelength range) is generated
out by the main processor of the device, by an LED on the transmit side, which is
the current version (Intelligent Network designated Tx-FOT (FOT = Fiber Optic
Interface Controller, INIC) is, for the most Transceiver). On the receive side, Rx-FOT,
part, able to handle tasks autonomously the optical signal is converted back into an
and already implements substantial parts electrical signal by a PIN photodiode.
of the network service. Typical controllers The POF cables used for automotive
for the MOST are the OS8104 (NIC) and the applications (Fig. 3) consist of a 980 m
OS81050 (INIC), manufactured by SMSC. thick optical core insulated by 20 m thick
The MOST network service is the driver optical cladding with a low refractive in-
layer through which applications and dex. In total, the optical conductor there-
system services have access to the NIC. fore has a diameter of 1 mm. The optical
The lower layer of the network service fiber is insulated with a black buffer, which
(layer 1) offers basic communication and is in turn surrounded by a protective cable
management functions, while the layer sheathing. This gives the cable a total dia-
above (layer 2) offers functions for sup- meter of 2.3 mm.
porting the development of applications, POF lines offer the following benefits
such as a translator for the application when used in the motor vehicle:
protocol or support for the notification No electromagnetic interference radia-
service. tion
The applications of the device are imple- Insensitivity to interference irradiation
mented on top of the network service. Lower weight than equivalent shielded
In a MOST system, the interface of an ap- electrical lines
plication is realized as a function block More flexible routing in comparison to
(FBlock). Each device must at least imple- equivalent shielded electrical lines
ment a special FBlock, the NetBlock,
which is required for management func-
tions within the MOST system. In addition,
a device will usually implement one or 3 POF cable

more applications that can be used as


FBlocks of applications on other devices.
A device of a vehicle infotainment system
is often integrated with several functions,
Cable sheathing
e.g. those of a radio tuner and those of an
amplifier, which can be represented in the Buffer
MOST system as independent FBlocks.

2.3 mm

1 mm 1.5 mm Optical fiber


UVM0003Y
Robert Bosch GmbH

Bus systems | MOST bus | 63

To date, modern vehicles are equipped An area for the control channel (with
exclusively with MOST 25, with POF data MOST 25, two bytes per data frame)
transmission via POF connections. In addi- An area for the synchronous channels,
tion to this, however, further transmission whereby one or more bytes are always
techniques have been defined for the assigned to a specific synchronous
MOST: channel
The optical transmission by glass fiber An area for the asynchronous channel
cable (PCS) with laser diodes (VCSEL),
which offers a greater damping reserve, In the case of MOST 25, the synchronous
supports higher speeds and is less sensi- and asynchronous area demand a 60-byte
tive to high temperatures. share of the data frame. The distribution
An electrical transmission by copper between the synchronous channels and
cable, which is also less sensitive to the asynchronous channel is determined
temperature and is more economical by by the value of the boundary descriptor
comparison, requires additional shield- with a resolution of 4 bytes. The synchro-
ing measures at higher bandwidths. nous area must have at least 24 bytes
This has consequences for costs and (6 stereo channels). This means that
cabling. 24 to 60 bytes are permitted for the
synchronous area and 0 to 36 bytes are
Data transfer permitted for the asynchronous area.
Data transfer on the MOST bus is orga-
nized into data frames, which are gener-
ated by the timing master with a fixed data
rate and passed on by subsequent devices
in the ring.

Data frames
The timing master normally generates
data frames with a cycle of 44.1 kHz,
and in rarer cases 48 kHz. The cycle is
defined by the system manufacturer
(i.e. the vehicle manufacturer in conjunc-
tion with its device suppliers) to suit the
predominant media formats in the system. 4 Data frame

The size of the data frames, by extension,


determines the bus speed of a MOST sys- Administrative area: 1 byte
(preambel, boundary descriptor)
tem. With MOST 25, the size of a data
frame is 512 bits.
Administrative area: 1 byte
A data frame is made up of the following (frame control, status and parity)
ranges (Fig. 4):
Areas for administrative information
at the start and end of the data frame,
the tasks of which include the synchro- Syn- Asyn- Control
chronous chronous channel:
nization of the data transfer, determina- channels channel 2 bytes
tion of the devices' ring positions and
Total of 60 bytes: distribution
the transmission of the boundary by boundary descriptor
UVM0004E

descriptor
1 data frame for MOST 25: 64 bytes
Robert Bosch GmbH

64 | Bus systems | MOST bus

System events Group addresses: each device may also


The fundamental system events described be assigned a group address in the
below indicate the current status of the 0x300 to 0x3FF range, making it possi-
data transfer in the MOST system. These ble to address all devices in a given
are monitored by the NIC and forwarded group at the same time.
by the network service to the applications, Broadcast address: the MOST addition-
which must then respond accordingly. ally supports a special broadcast ad-
Lock, stable lock: a lock occurs as soon dress, hexadecimal 0x3C8, which makes
as communication is established in the it possible to address all devices in the
ring, i.e. the correct device receives the MOST system.
correct data frames. A stable lock is set
when the system has been in lock status Transmission of control commands
for a specific period. The control channel permits the transmis-
Unlock, critical unlock: an unlock de- sion of control messages with a maximum
notes the loss of the lock, i.e. that no length of 32 bytes. These have to be shared
correct data frames are being received. among consecutive data frames. With
If the system is in the unlock state for MOST 25, the 16 data frames required
a certain period, the status switches to here are also known as a block. The format
critical unlock. of the control messages is defined by the
Network change event: if the number of protocol described in the next section.
devices in a MOST system changes be- The sending of messages on the control
cause one device has opened or closed channel is supported by the NIC. It pro-
its bypass, this is signaled by a network vides the necessary services for data pro-
change event. tection and channel arbitration, i.e. for de-
termining the next opportunity for a mes-
Addressing sage to be sent. The reliable transmission
Devices on the MOST bus are addressed by of control messages is safeguarded by the
means of a 16-bit address. The following use of a cyclic redundancy code (CRC) and
different addressing types are supported: an automatic repeat request.
Logical addresses: each device has a log- The control channel's gross bandwidth
ical address that is unique in the system of 705.6 kBit/s is reduced to a net data rate
and is set and distributed when the sys- of 406 kBit/s following the deduction of ap-
tem starts. The logical addresses can proximately 3 % for system administration
be set dynamically based on the ring overheads (two of 64 control messages)
position, for which, beginning with the and less the extra overhead to account
timing master, the hexadecimal range for arbitration and data protection. Since
0x100 to 0x13F is reserved. Or they arbitration only allows a particular device
can be defined statically by the system to populate every third available control
manufacturer in a range reserved spe- message, an individual device has a maxi-
cifically for this purpose. mum data rate of 135 kBit/s at its disposal
Physical addresses: for system adminis- for sending.
tration services, e.g. determination of To enable the sending of messages of
logical addresses, each device also has a more than 32 bytes, the network service
physical address that is derived from its supports the segmentation and deseg-
current ring position. The physical ad- mentation of application messages up to
dresses are assigned the range 0x400 to 65,556 bytes in size on the control chan-
0x43F. nel. This service, also known as the appli-
Robert Bosch GmbH

Bus systems | MOST bus | 65

cation message service (AMS), differs from to occupy a synchronous channel


the control message service (CMS), which sends an appropriate system message
only allows 32-byte control messages to request (ResourceAllocate) to the tim-
be sent. ing master. A corresponding message
(ResourceDeallocate) is used to free the
Transmission of multimedia data channel.
In the MOST system, the transmission of
multimedia data takes place on the syn- Transmission of packet data
chronous channels. The data transfer is On the asynchronous channel, data is sent
controlled by relevant control commands in the form of packets. The asynchronous
on the control channel. A synchronous channel currently supports two modes:
channel can be assigned a specific band- a slower 48-byte mode, where 48 bytes
width, which is achieved with a resolution are available in each packet for the net
of one byte of a data frame. A stereo audio data transfer but which places less heavy
channel with a resolution of 16 bits re- demands on device implementation, and
quires four bytes, for example. In the a 1,014-byte mode that is more complex
case of MOST 25, a maximum of 60 bytes to implement.
(depending on the value of the boundary With MOST 25, between 0 and a maxi-
descriptor) are available for the synchro- mum of 36 bytes of a data frame can be
nous channels, which equates to 15 stereo assigned to the asynchronous channel,
audio channels. which corresponds to a maximum gross
The sinks and sources for multimedia bandwidth of 12.7 MBit/s. For the 1,014-
data are each assigned to an FBlock, which byte mode, this produces a maximum net
provides the necessary functions for their bandwidth of almost 11 MBit/s, and a data
management. An FBlock may therefore rate of almost 3 MBit/s for the 48-byte
contain several sources and sinks, which mode. In practice, however, substantially
are numbered consecutively with a source lower data rates are achieved mainly due
and sink number respectively. to restrictions in device implementations.
An FBlock has functions that supply in- The transmission of data packets on the
formation about the quantity and type of asynchronous channel is also directly sup-
sources and sinks that it makes available ported by the NIC. Likewise, a packet on
(SyncDataInfo, SourceInfo and SinkInfo). the asynchronous channel contains a CRC
Furthermore, each FBlock with a source to permit detection of simple transmission
has an Allocate function with which it errors. Unlike the control channel, how-
requests a synchronous channel and asso- ever, there is no issuing of automatic re-
ciates its source to it. Its Deallocate peat requests on the data link layer.
function, on the other hand, is used to To ensure reliable transfer and flow con-
free up the channel again. trol in the large data volumes typical of the
Similarly, an FBlock with a sink has a asynchronous channel, it is conventional
Connect function for connecting the sink to use yet another transport protocol that
to a particular synchronous channel, and is implemented in a higher driver layer.
a DisConnect function for its disconnec- This may either be the MOST high protocol
tion. Several sinks may also be connected (MHP), developed specifically for the
to a particular channel at the same time. MOST, or the popular TCP/IP protocol,
With MOST 25, the channel assignment which is set up on an appropriate adapta-
for synchronous channels is managed tion layer known as the MOST asynchro-
by the timing master. A source wishing nous medium access control (MAMAC).
Robert Bosch GmbH

66 | Bus systems | MOST bus

Administrative functions not necessarily have to be the case. The


The MOST standard defines the following other devices in the MOST system in this
administrative services that are required relationship are known as network slaves.
for the operation of a MOST system. The network master manages an image
of the current configuration of a MOST
Configuration status system in the central registry. In addition
A valid configuration status in the MOST to the addresses of all devices, this also
system is the prerequisite for communica- contains all FBlocks implemented by them
tion in the application layer. The configu- (down to the system FBlocks such as the
ration of the MOST system is managed by NetBlock). A network slave searching for
a single device, the network master. An ap- the device address for a particular FBlock
plicative communication is only permitted may request it from the network master.
once this device has signaled a conflict- If a network slave frequently accesses
free configuration status. other devices, it may, for faster access, also
OK configuration status: the network store a local copy of the central registry
master transmits the OK configuration a decentral registry which it must update
status as soon as a conflict-free configu- accordingly in the event of any change in
ration is achieved. the configuration.
NotOK configuration status: if a conflict To build the central registry, the net-
arises, e.g. because two devices have work master carries out a network scan
the same address, the network master when the system starts and as soon as
transmits its NotOK configuration status. a network change event has occurred.
In response to this, all devices initialize During this scan, it queries the NetBlocks
their addresses and communication set- of all devices for the FBlocks implemented
tings. by this device. If it detects a conflict while
New and Invalid configuration statuses: doing so, e.g. duplicate device address or
these configuration statuses indicate duplicate instance of an FBlock, it takes
that a new application (FBlock) has measures to resolve the conflict. To do
been registered in the system or that a this, the network master may initiate a
previously registered application has recalculation of addresses, convert the
dropped out. InstId of an FBlock or, if necessary,
ignore a device.
NetBlock
It is mandatory for each device to imple- Connection master
ment an FBlock called the NetBlock, which The connection master manages the syn-
covers a range of different administrative chronous connections existent in the MOST
functions (e.g. for address initialization) system at a given time. It makes available
and supplies information about the device a table containing information about all
and the FBlocks that it implements. the connections currently present in the
MOST system (SyncConnectionTable).
Network master It also makes it possible to query the band-
The network master is implemented by width remaining for further synchronous
a special device in a MOST system and connections (AvailableChannels).
is responsible for system configuration. On request, the connection master
In present-day systems, the network mas- builds connections between a specific
ter is usually realized by the headunit source and sink (BuildSyncConnection) or
(i.e. the control element) of the infotain- removes them (RemoveSyncConnection)
ment system. This device often assumes by sending the necessary commands to
the role of timing master too, but this does the associated FBlocks.
Robert Bosch GmbH

Bus systems | MOST bus | 67

It is even possible to dispense with the


1 Elements of a control message
connection master completely if a central
Field Size Description
entity in a MOST system, e.g. the headunit,
DeviceID 16 bits Device address
is responsible for the administration of the
FBlockID 8 bits FBlock identifier
synchronous channels.
InstID 8 bits Instance of the FBlock
FktID 12 bits Function identifier
MOST application layer OPType 4 bits Type of operation
The MOST standard defines a suitable pro- Length 16 bits Length of the data
tocol in the application layer for the trans- field
mission of control commands, status infor- Data 0 to Data field
mation and events. This protocol makes it 65,535 bytes Table 1
possible to address a specific function of
an application interface (i.e. of an FBlock) Function block (FBlock)
that is provided by any device within the A function block (FBlock) defines the in-
MOST system. For example, it is possible terface of a specific application or system
to start playback of a CD on a separate service. An FBlock is assigned an address
CD player or to query the number of the comprising an 8-bit FBlockID, which spec-
track currently playing in it. While the ifies the type of FBlock, and an additional
MOST protocol is mainly applied to the 8-bit InstID. The latter is a means of distin-
control channel, it can be transferred guishing between several instances of
across the asynchronous channel if FBlocks of the same type in a MOST sys-
necessary. tem.
An FBlock that is controlled by an asso-
Overview ciated application, and the device that im-
The protocol for MOST control messages plements the FBlock, are known as the
provides for the following elements of a slave in this relationship (e.g. an applica-
control message (Table 1): tion that addresses an external CD player
The address of a device in the MOST sys- through the associated FBlock). The appli-
tem (DeviceID) cation that controls the FBlock is called
An identifier for an FBlock implemented the controller.
by this device (FBlockID) and its in- The functions that an FBlock possesses
stance in the MOST system (InstID) are defined by the function catalog. In the
The identifier for the requested function case of system services, the function cata-
within the FBlock (FktID) logs are defined by the MOST standard.
The type of operation (OpType) that The MOST standard even defines the inter-
should be applied to this function, e.g. faces for common applications from the
the setting or querying of a property of area of vehicle infotainment systems (e.g.
the FBlock for an amplifier or a CD player/changer).
A data range containing the parameters However, these interfaces tend to be ex-
of the function call (Data) and a corre- tended by the system manufacturer. Other
sponding length value (Length) proprietary FBlocks are defined in their
entirety by the system or device manufac-
turer.
Robert Bosch GmbH

68 | Bus systems | MOST bus

Functions and operations Data field


A function block is made up of several The data field of the control message con-
functions that are addressed with a 12-bit tains the parameter values for a function
FktID. Depending on the type of function, call or its results. The data field is inter-
the function may be assigned differently preted as specified in the definition of the
predefined operations, which are de- function concerned and may contain one
scribed by a 4-bit OpType identifier. In the or more parameter values.
case of functions, a further distinction is
made between methods and properties. The MOST standard defines the following
A method describes an action that an parameter types:
FBlock is able to execute, e.g. starting the Boolean and BitField for individual
station scan of a radio tuner. A method boolean values (1 byte) or sequence
can be initiated by the controller using a of individual bits (1, 2 and 4 bytes).
Start or StartResult operation. In response, Enum for enumerations.
the slave returns a corresponding result Unsigned and signed byte, word and
message if applicable (for StartResult). long for integer values with or without
If this result is not made available within sign and a size of 1, 2 or 4 bytes.
a specific period, the controller is notified String for character strings. These
that the method is still being processed by are zero terminated and contain a
means of a processing message. In the end, description of the character coding
a method may even be terminated by the in the first byte.
sending of an abort message. Stream, ClassifiedStream and
A property describes a particular attri- ShortStream for various types of
bute of the FBlock, such as the number of byte sequences of any length.
the track currently playing. A property
such as this can be requested (Get opera- A parameter type for real numbers does
tions) or set (Set or SetGet operations) not exist. The MOST standard provides for
by the controller. As the result of such a real numbers represented as fixed-point
query, the slave responds with a status values by the integer parameter types.
message, if applicable (for Get and SetGet), More complex data types are not defined
containing the current contents of the in the standard either. These have to be
property. realized by function classes instead.
Furthermore, the MOST standard pro-
vides for a notification service with which
a controller may register with a slave for
certain properties. If the value of one of
these properties changes, all controllers
that have registered for notification are in-
formed of the change by a status message.
Robert Bosch GmbH

Bus systems | MOST bus | 69

Function classes Applications


To standardize the way in which functions As well as defining the lower layers neces-
are defined, the MOST standard specifies sary for data transfer, the MOST standard
a series of function classes for proper- defines the interfaces for typical applica-
ties. These determine which properties tions from the area of vehicle infotainment
the function has and which operations are systems, e.g. a CD changer, amplifier or
permissible. radio tuner.
In addition to simple function classes The FBlocks defined by the MOST
(with a single parameter for numerical Cooperation are summarized in a func-
values or texts), there also exist complex, tion catalog and listed with their current
composite function classes. These are versions in the next section. The function
used to represent composite data struc- catalog defines in detail all functions for
tures such as records and arrays. They can the FBlocks contained in them as well
also be nested at a specific nesting depth, as the permissible operations and their
which makes it possible to create two- parameters.
dimensional arrays or arrays of records, For the function catalog, there is a
for example. These nested data structures machine-readable description available in
are, for example, used to represent the XML format that can be used to import the
phone book of a mobile phone. catalog into various MOST tools.
With multidimensional function classes, In addition to the function catalogs
the two parameters PosX and PosY are description of all functions of an FBlock,
used to address a particular position in the developments are underway to specify
first or second dimension, where 0 always the dynamic behavior for the use of an
stands for all elements of this dimension. FBlock. This involves the use of message
This makes it possible to access not only a sequence charts (MSCs) compliant with the
specific element but also an entire line of a MSC 2000 standard but with minor, MOST-
twodimensional array. specific enhancements.
Functions required by various applica-
tions, e.g. the aforementioned functions
for managing sources for multimedia data,
are defined in the GeneralFBlock. This is
used as a function compilation, i.e. when a
new FBlock is defined, all necessary func-
tions are copied from the GeneralFBlock to
the new FBlock.
Robert Bosch GmbH

70 | Bus systems | MOST bus

Standardization The following application interfaces are


The MOST standard is maintained by the standardized by the MOST Cooperation.
MOST Cooperation, which also publishes The following versions are currently valid:
the corresponding specifications. The AudioAmplifier (FBlockID: 0x22),
specifications are available through the Version 2.4.2: a simple amplifier.
home page of the MOST Cooperation AuxIn (FBlockID: 0x24), Version 2.4: an
(www.mostcooperation.com). interface for connecting MP3 players or
The following versions of the MOST data carriers with pieces of music.
specifications are currently valid (as at MicrophoneInput (FBlockID: 0x26),
2006): Version 2.3.1: a microphone input.
MOST Specification, Version 2.4. AudioTapePlayer (FBlockID: 0x30),
MOST Dynamic Specification, Version 2.3.1: a cassette player.
Version 1.2. AudioDiskPlayer (FBlockID: 0x31),
MOST Specification of Optical Physical Version 2.4: a CD player or CD changer.
Layer, Version 1.1. DVDVideoPlayer (FBlockID: 0x34),
MOST Specification of Advanced Optical Version 2.4.1: a DVD player or DVD
Physical Layer, Version 1.0. changer.
MOST Specification of Electrical AmFmTuner (FBlockID: 0x40), Version
Physical Layer, Version 1V1. 2.4.2: a radio receiver for FM/AM.
MOST High Protocol Specification, TMCTuner (FBlockID: 0x41), Version
Version 2.2. 2.3.1: a special receiver for traffic-
MAMAC Specification, Version 1.1. message signals (TMC).
TVTuner (FBlockID: 0x42), Version
The MOST Cooperation defines within 2.3.2: a television receiver.
the framework of the compliance process DABTuner (FBlockID: 0x42), Version
requirements placed on MOST devices 4.0: a receiver for digital radio (DAB).
which must be satisfied by all devices in SDARS (FBlockID: 0x44), Version 2.4: a
order to be able to carry the MOST logo. receiver for satellite radio.
MOST compliance is tested and awarded Telephone (FBlockID: 0x50), Version
by test institutes which have received ap- 2.3.2: a telephone module or a connec-
propriate accreditation from the MOST tion to a cellular phone.
Cooperation. The compliance require- GeneralPhonebook (FBlockID: 0x51),
ments are governed by the following speci- Version 2.3.1: access to a phonebook,
fications, which describe the compliance e.g. that of a cellular phone.
process itself and the compliance tests NavigationSystem (FBlockID: 0x52),
for the physical layer, for system mecha- Version 1.11: an interface for a navi-
nisms (Core) and for application interfaces gation system; but only unofficially
(Profile): approved by the MOST Cooperation.
MOST Compliance Requirements, GraphicDisplay (FBlockID: 0x60),
Version 2.0. Version 2.3: an independent display
MOST Compliance Test of Physical Layer screen.
Specification, Version 1.0.
MOST Core Compliance Test Specifica-
tion, Version 1.1.1.
MOST Profile Compliance Test Specifica-
tion, Version 1.0.
Robert Bosch GmbH

Bus systems | TTP/C | 71

TTP/C Areas of application


TTP/C was originally developed for use
Overview in safety-relevant systems in the automo-
The Time-Triggered Protocol for SAE tive field. Because the core functions of
Class C networks (TTP/C) is a time-con- TTP/C were formally verified and a TTP/C
trolled protocol in which the network us- network can be put together economically
ers transfer data in special time intervals compared with other protocols with simi-
determined in advance. In other words, all lar reliability properties, TTP/C has also in
network users have a global time defini- the meantime come to be used in aircraft,
tion which is determined by means of a a field which is subject to very stringent
time-synchronization protocol. requirements with regard to safeguarding
TTP/C was developed specially to satisfy functionality. TTP/C is also used in train
real-time requirements in distributed, control systems.
fault-tolerant systems. It was developed
specifically with a view to its use in the Fault-tolerance strategy
automotive field, but has in the meantime The fault-tolerance strategy is used to
also come to be used in other fields, such describe which faults can be detected
aviation and railroads. and handled. TTP/C is able to detect and
According to the requirements of the handle each individually occurring fault
Society of Automotive Engineers (SAE) for (Single Fault Hypothesis). In addition, a se-
Class C protocols, TTP/C is a protocol for ries of multiple fault scenarios is handled.
high-speed networks (>125 kbit/s bit rate) However, some important multiple fault
which can be used for real-time commu- scenarios, such as a complete temporary
nication in check systems. For this reason, breakdown of communication for example,
particular emphasis was placed during cannot be detected on the node level. Ad-
development on the fields of fault detec- ditional methods of fault detection and
tion and tolerance, robustness against mal- handling are required on the application
functions, composability, and guaranteed level for this purpose.
latencies. The TTP/C network must consist of at
TTP/C is based on the principle of least four real member nodes to ensure
Time-Triggered Architecture (TTA), a that all single faults are detected.
framework for developing highly reliable, The network ensures on the architecture
distributed real-time systems and the ap- level that a faulty network node cannot
plications that run on them. prevent any properly functioning network
The development of TTP/C dates back node from transmitting its message. This is
to the MARS project (Maintainable Real- done by bus guardians, which permit bus
Time System), which was conducted in access only at defined points in time.
1979 at the Technical University of Berlin.
Further development followed within the Time-Triggered Architecture
framework of further projects, such as Time-Triggered Architecture (TTA) forms
TTA (Time-Triggered Architecture) or the the basis on which the TTP/C protocol was
Brite-EuRam III project Safety Related specified (Fig. 1). The core element of TTA
Fault Tolerant Systems in Vehicles (X-by- is the network node, which comprises a
Wire), in which systems for activating host processor and a TTP/C controller,
safety-relevant automotive components, referred to in the following as the control-
such as brakes or steering systems, via ler. The network node is the Smallest Re-
electronic networks without a mechanical placeable Unit (SRU) in a TTP/C system.
fallback level were examined. The host processor processes inputs from
Robert Bosch GmbH

72 | Bus systems | TTP/C

sensors and activates actuators. The Com- Communication Network Interface (CNI)
munication Network Interface (CNI) forms The CNI functions as a temporary firewall
the interface between the host processor because it makes available a memory area
and the controller and provides memory via which data received and to be sent are
areas via which the host processor and the exchanged between the host processor
controller can exchange information. and the controller. This interface repre-
The controller is in the end connected to sents the host processors sole possibility
the TTP/C bus, by way of which it connects of transferring information via the net-
the node with other nodes. The group of work. It is therefore not possible for the
all the nodes connected to a TTP/C bus and host processor to influence the communi-
the bus forms a cluster. cation sequence. In particular, the point in
time at which information is provided by
Host Processor the host processor has no influence on the
The host processor executes the applica- networks communication sequence.
tion, the actual function of the network
node. In order to support the application, TTP/C Controller
an operating system, which also for the The controller (Fig. 2) operates entirely
most part provides the FT-COM layer, runs independently of the host processor. Its
on the host processor as well as the ap- most important components are the proto-
plication. The FT-COM layer introduces a col processor, a local bus guardian, and the
further abstraction level of the technical Message Descriptor List (MEDL).
realization of communication. The applica- The function of the protocol proces-
tion can provide data for transfer via the sor is to prepare information provided
interfaces of the FT-COM layer, thanks to by the host processor in the CNI in such a
which the application designer does not way that they can be transferred as TTP/C
have to deal with deeper concepts, such as frames.
the memory areas in the CNI. The controller is connected via two in-
terfaces with the remaining components
of the network node. The connections to
the host processor and to the transceivers
(drivers) are established via the CNI and
the Logical Line Interface respectively.

1 TTA network

Node Node Node Node


Sensors,
actuators Host Host Host Host
processor processor processor processor
Application
level
CNI Data CNI CNI CNI
communication
TTP/C
communication Controller Controller Controller Controller
subsystem

Channel 0
SVT0001E

TTP/C bus
Channel 1
Robert Bosch GmbH

Bus systems | TTP/C | 73

Message Descriptor List (MEDL) Strictly speaking, the designation Message


The MEDL contains all the check informa- Descriptor List is incorrect. Information
tion required by the controller to send and blocks within a frame are designated as
receive data. It is a list adapted for each messages in TTP/C (Fig. 3). However, this
controller containing, for example, infor- structure exists only from the perspec-
mation on the position and size of transmit tive of the host processor, not from the
and receive slots. perspective of the controller, which only
The information stored in the MEDL processes frames. The designations has
includes the points in time at which the persisted, however, because it was intro-
controller frame may be transmitted and duced in earlier specifications.
at which frames of other controllers are
expected which are processed by the host Local and Central Bus Guardians
processor. The primary function of the bus guardian
CNI memory positions in which informa- is to limit transmissions of a node to the
tion from the host processor is to be pro- defined time windows. For this purpose,
vided for transfer and in which received it accesses the information of the MEDL
information from the controller is to be in which the transmit slots of the node are
stored are also defined in the MEDL. stored.
The MEDL also contains further in- There are two different types of bus
formation needed for the operation. For guardians. Local bus guardians are con-
example, the identification of frames used nected between the controller and the
to synchronize the internal clocks and the TTP/C bus and prevent bus access out-
synchronization times. side defined transmit slots. Central bus
guardians operate in a central coupler.
If exclusively central bus guardians are
2 TTP/C node used, however, only faults are excluded for
the nodes which are directly connected to
the couplers. Connected bus topologies,
on the other hand, cannot be completely
I/O Interface
protected.

Hostprozessor

3 Message components

Communication Network
Interface (CNI) Application data:
Supplied/processed by the host processor

Protokoll- Messages:
MEDL Data areas interpreted
prozessor
by the host processor

Bus Guardian Controller Message Message Message CRC


TTP
1 2 3
Logical Line
Interface Protocol overhead Protocol overhead
Frame type, explicit C-state Frame CRC
Driver Driver
Frame:
SVT0002E

SVT0003E

Bit stream transmitted via the channel


TTP/C Bus
Robert Bosch GmbH

74 | Bus systems | TTP/C

In addition to monitoring bus access, the Network


central bus guardian can also assume the Network Size
function of detecting and containing SOS TTP/C is designed for networks of up to
faults (Slightly-Off Specification). These 64 nodes. A TTP/C network can consist of
are faults in which a node continually vio- a minimum of two nodes, but at least four
lates slightly one or more communication nodes are required to satisfy the Single
parameters, such as the voltages used or Fault Hypothesis. A problem in the data
the timing of the transmit slots. The upshot transfer lies in the danger that a transfer is
of this is that some network nodes which not received uniformly by all the network
were designed with greater tolerances nodes. If there are at least four real mem-
process these messages, but other reject ber nodes (nodes with sole access to one
them as faulty. As a result of SOS faults, it transmit slot) in a TTP/C network, TTP/C
becomes problematic to establish whether can identify reliably whether the message
data have been correctly transmitted or transmission was successful or whether
incorrectly received. faults occurred during transmission or
reception.
Logical Line Interface
The Logical Line Interface (LLI) is the Topology
interface between the controller and the All TTP/C networks have two independent
transceiver (driver). The LLI establishes physical channels via which a network
the structure of the logical information in node simultaneously transmits information
which the driver must accept information redundantly. This configuration is required
to be transmitted and in which it must pro- in order that the Single Fault Hypothesis,
vide received information. This makes it i.e. the handling of the failure of any com-
easier to adapt controllers to a new trans- ponent, can be satisfied. However, it is also
mission medium since only the drivers possible for nodes which do not fulfill any
have to be modified; however, the format safety-relevant functions to be connected
of the interface to the rest of the system only to one of the two channels.
remains unchanged. Since a controller always forwards
messages via the LLI to its drivers, it is
Driver possible to adapt TTP/C to very different
The driver is the transceiver for the trans- topologies. Bus, star and hybrid topologies
mission medium. It converts the physical from any combinations of bus and star to-
states of the TTP/C bus into logic states, pologies are described (Fig. 4) in the TTP/C
which can be processed by the controller. Specification (Version 1.1).
Robert Bosch GmbH

Bus systems | TTP/C | 75

Bus topology Star topology


In a bus, all the network nodes are con- If a star topology is used, the network
nected in series to central cables. If a bus nodes are connected to each other via cen-
topology is used, the structure dictates tral couplers. Here, each TTP/C channel is
that no central bus guardians can be used. brought together in its own coupler.
However, the overall length of the cabling Star topologies facilitate the use of cen-
can be reduced to a minimum for this pur- tral bus guardians, which are able to pro-
pose. vide additional protection against faults.

4 Network topologies Hybrid topologies of bus and star


Even hybrid technologies composed of bus
and star topologies can be built. For ex-
a ample, it is possible to cascade several star
Node Node Node Node topologies into a multi-star or to connect a
sub-bus to a star topology.

Transmission Media
Within a TTP/C network, communication
takes place via two channels. The channels
are designated Channel 0 (Ch0) and Chan-
b
Node Node nel 1 (Ch1), or Channel A (ChA) and Chan-
SC nel B (ChB).
Because the TTP/C Specification is
SC formulated very openly with regard to
Node Node the transmission medium, it is possible
to build TTP/C networks using very dif-
ferent media. Both electrical and optical
media can be used here. In particular, it is
c also possible to design one channel to be
Node Node optical and the other to be electrical. Dif-
ferences in the latencies of the different
SC SC
media can be compensated for by way of
Node Node
SC SC the configuration in the MEDL.
The achievable bit rate also varies to-
Node Node gether with this flexibility; however, the bit
rate itself is fixed during operation within
a network and cannot be altered.
It is possible with current implemen-
d tations to achieve bit rates of 5 Mbit/s
Node Node Node for asynchronous data transfer during
system starting and of up to 25 Mbit/s for
SC synchronous data transfer during normal
operation. Prototypes in the laboratory Fig. 4
SC a Bus
environment has achieved bit rates of up
b Star
to 1 Gbit/s.
Node Node Node c Multi-star
d Star/bus
SVT0004Y

combination

SC Coupler
Robert Bosch GmbH

76 | Bus systems | TTP/C

Communication cycle FTUs are used so that safety-relevant


TTP/C controls bus access by means of a information can also be provided in the
TDMA process (Time Division Multiple event of the failure or one or more net-
Access, Fig. 5). Here, the available band- work nodes. Here, all the nodes combined
width is divided into time windows (slots) in a FTU are able to process a task and use
in which in each case an established net- in a cycle alternately the transmit slot of a
work node can utilize the networks full round allocated to the FTU.
bandwidth.
TTP/C distinguishes between rounds Passive Nodes
and cycles in the sequence of slots. All A node transfers data only when current
rounds contain the same sequence of data are available for transfer, otherwise
slots whose size can be independently it remains silent. A node which does not
established. A cycle is a defined sequence transfer any data in its transmit slot is
of rounds in which the individual rounds a passive node. This is the standard be-
differ only in the content of the individual havior when the controller of the node
slots, but not in the sequence of size of the establishes that its host has not updated
slots. the Host Life Sign, by means of which
In round, each member node of the an application signals that it is active. The
cluster transmits one frame precisely in controller then assumes that the applica-
one slot. A distinction is made here be- tion cannot generate any valid data and
tween two types of member node: real does not transmit.
and virtual. Real member nodes are nodes This mechanism is also used for monitor
which have their own transmit slot which nodes, which merely monitor the commu-
only this node can access. Virtual member nication of the other nodes, but themselves
nodes consist of a group of nodes which do not influence the communication.
use a common transmit slot. This structure
is used to build up redundant structures
(Fault Tolerant Unit, FTU) which make the Time control
failure of nodes more tolerable. The time window of a slot can be subdi-
vided using the performed activities into
different phases (Fig. 6). Before a node
can transmit information, it needs time in
order to read in the transmission param-
5 Schematic bus-access diagram eters or to prepare the transceivers. This
phase is called the Pre-Send Phase (PSP).
This is followed by the time interval in
A Node C Frame Ch0 Frame
which information is actually transmitted
B Round slot D Frame Ch1
via the network, the Transmission Phase
(TP). After a message has been received,
A 0 1 2 3 0 1 2 3 0
a node needs time in order to prepare the
information. This takes pace in the Post-
B 0 1 2 3 4 5 6 7 0
Receive Phase (PRP). Because the time
C
needed for PSP and PRP is not fixed, the
D
PRP is followed by the Idle Phase, a phase
Node slot Time
through which the length of a node slots
TDMA round TDMA round is stretched to the time interval defined in
SVT0005E

the MEDL.
Cluster cycle
Robert Bosch GmbH

Bus systems | TTP/C | 77

A TDMA slot is fixed at points in time COM layer, also an application, which is
which can be observed using the transmis- processed on the host processor.
sion. But because this is not applicable to The lower layers are implemented in
all the activities of a controller during a the controller, where data communication
slot, a distinction is made between node takes place between the host processor
slot and TDMA slot. and the controller via the CNI interface.
For a node, the slot begins with the PSP. In the controller, the top layer is the Pro-
But because no signal is transmitted in this tocol Service Layer; under this is the Data
phase, external observers lack a precise Link Layer followed at the lowest level by
point in time at which the node slot begins. the Physical Layer.
The first precise point in time which can
be observed from an external source is the Physical Layer
start of the TP. This point is also called the The Physical Layer comprises the require-
Action Time (AT). A TDMA slot therefore ments which are placed on the physical
comprises the time interval which passes transmission of information. Often the
between two ATs. Therefore, there exists connections to be used, the cable types or
in a TDMA slot only the TP and the Inter- the voltage levels are established for this
frame Gap (IFG), in which the PRP, Idle purpose in a protocol specification.
Phase and PSP are combined. Efforts are indeed underway to formu-
A node slot, on the other hand, begins late a specification for a TTP/C physical
with the PSP, which is followed by the TP, layer, but the TTP/C protocol specification
the PRP and the Idle Phase. merely establishes requirements which
must be fulfilled by the physical layer
TTP/C Protocol used. This has the advantage that the pro-
TTP/C systems use the TTA framework tocol is very flexible with regard to the
(Time-Triggered Architecture) as the basis networking and bit rate. It is thus possible,
for which with the exception of the appli- for example, for networking to use both
cation finished solutions can be used. optical and electrical media, which can
The TTA protocol stack (Fig. 7) can be also be combined with each other.
divided hierarchically into three areas. However, the system designer is faced
The top layer is the host layer, the ex- with the problem of initially having to
ecuted application. Under this is the FT- identify and evaluate possible solutions.

6 Slot timing 7 Protocol stack

Host
Executed application
Layer
Node Dslot Node
slot i-1 Node slot i slot i+1 FT-COM CNI
Redundancy management FT-COM
DTP DPRP DIdle DPSP Message permanence Layer
TTP CNI
PRP Idle PSP TP PRP Idle PSP TP Communication services Protocol
Safety services Service
Action Time

Action Time

IFG Higher-layer services Layer


(AT)

(AT)

Frame structure Data Link


Endianess of bus Layer
TDMA slot i-1 TDMA slot i TDMA
slot i+1 Bit synchronization Physical
Bit coding/decoding Layer
SVT0007E
SVT0006Y

Layers processed by the host processor


Layers processed by the controller
Robert Bosch GmbH

78 | Bus systems | TTP/C

Essentially, three requirement are placed FT-COM Layer


on the physical layer: The FT-COM Layer offers functions for
Two independent physical transmission realizing replicated, distributed applica-
channels must exist. tions. These include redundancy control
The transmission channel must permit and the decision as to whether replicated
distributed broadcast transmissions, i.e. messages of other nodes are correct.
transmissions which are received by all In order to allow applications standard-
the network users. ized access to communication data, the
The delay which occurs during the FT-COM Layer offers an interface similar
transmission of information via a me- to CNI in which the data for the Host Layer
dium (Propagation Delay) must be applications are provided.
known.
Host Layer
Data Link Layer The Host Layer comprises the applications
The Data Link Layer contains the functions which run on the host processor. In addi-
which are needed to transmit frames be- tion to the actual applications, these in-
tween nodes. These include the structures clude the operating system and the check
which are required for access to the trans- structures (control loops).
mission channels and for the transmission In order to give the communication sys-
of frames. In particular, the Data Link tem as modular a structure as possible, the
Layer establishes the format of the mes- applications of this layer should access the
sage frames. FT-COM interface and not the CNI. This
makes it possible, for example, for an ap-
Protocol Service Layer plication which previously ran on a real
The Protocol Service Layer is responsible member node to be switched with minimal
for implementing the protocol services of- complexity to a series of virtual member
fered. Here, a distinction is made between nodes.
communication services, safety services
and higher-level services.
The functions of the communication ser-
vices are the safeguarding of reliable data
transfer, startup of a cluster, reintegration
of member nodes in the cluster, transmis-
sion acknowledgment, and fault-tolerant
clock synchronization.
The safety services include the manage-
ment of node membership, avoidance of
cliques, and the independent bus guardian.
The higher-level services include func-
tions for delayed mode changes, distrib-
uted alarm, external clock synchroniza-
tion, or reconfiguration of a node.
Robert Bosch GmbH

Bus systems | TTP/C | 79

Protocol services The internal clocks of the network nodes 1)

Jennifer Lundelius-
Cluster Startup of a cluster can run with different levels of
Welch,
All the nodes of a cluster act without syn- precision. Only nodes which have precise
Nancy A. Lynch
chronization during cluster startup; bus clocks should be used for time synchro-
access is therefore not yet controlled via nization. These nodes receive the flag as 2)

TDMA. Because there is always a trans- Master Clocks in the MEDL, whereby Hermann Kopetz,
mission delay caused by the medium the SYF (Synchronization Frame Flag) Wilhelm Ochsenreiter:
used when messages are distributed in a is set for their frames. Nodes with more Clock Synchroniza-
tion in Distributed
network, two unsynchronized nodes of a imprecise internal clocks act as Slave
Real-Time Systems,
cluster can start simultaneously with the Clocks and use the clock information of
IEEE Transactions on
message transmission if the transmission the master clocks. There must be at least Computers, 36(8):
delay is greater than the duration of the four master clocks in a cluster to ensure 933-940, August 1987.
startframe. This can occur during system that clock synchronization is Byzantine-
startup if several nodes are authorized to fault-tolerant. Byzantine faults are faults in
initiate synchronization (coldstart nodes). which different nodes interpret the same
The situation can arise where different transmission differently.
cliques arise within one cluster of which The nodes of a cluster are synchronized
only the nodes of one clique are synchro- by measuring the Action Time (AT) in
nized, but not all the nodes of the cluster. each transmitted slot. If the SYF flag of a
In order to avoid this, all the nodes re- frame is set and the received frame was
ject the first correctly received coldstart faultlessly received, the AT of the frame is
frame. The coldstart nodes wait for a time stored in a stack four deep. In other words,
interval (startup timeout) before trying the last four correction values determined
again to transmit a coldstart frame. Be- are stored in the stack.
cause the size of the startup timeout must The actual clock synchronization takes
be different for all the coldstart nodes in place in frames, for which the ClkSyn
the cluster and differ at least by the size flag (Clock Synchronization) is set in the
of the transmission delay, collisions can MEDL. If this is the case, the mean value
no longer occur during the second cluster is formed from the stack values, where
startup. This process is also known as the highest and lowest values are ignored.
Big Bang. The internal clock is now corrected by the
calculated mean value.
Synchronization TTP/C also supports the inclusion of
In a communication system which controls external reference clocks (e.g. GPS) in the
bus access by means of TDMA, it is impor- system. Time Gateway Hosts are nodes of
tant for the individual users to have as pre- this type which offer an external time ref-
cise an idea as possible of a global time. erence. These nodes transmit the external
Synchronization in a TTP/C system uses correction value as application data in a
for the operation time only the offset cor- frame. The remaining nodes of the cluster
rection by means of which the onset of a store this value in the CNI and include it in
point in time is synchronized to all the in- the calculation of the AT correction values.
ternal clocks of the nodes of a cluster. For
this purpose, TTP/C uses a variant of the
Welch-Lynch algorithm 1) which was de-
scribed by Kopetz and Ochsenreiter 2).
Robert Bosch GmbH

80 | Bus systems | TTP/C

Membership Service Transmission acknowledgment


TTP/C uses Membership Service to ensure TTP/C offers an implicit transmission ac-
that all the nodes of a cluster at each point knowledgment. Because the member vec-
in time have the same consistent view as tor of the next sender in the round is also
to which nodes are present in the network transmitted as part of the frame, the origi-
and which are not. For this purpose, each nal sender can check whether its transmis-
node carries a member vector in which it sion was correctly received.
notes whether the last received transmis- But because the successor may be faulty,
sion of a node has run correctly. If a node the sender also observes the transmission
receives a message incorrectly, it changes of the second successor. If the latter iden-
the entry of the message sender to incor- tifies in its member vector that it has also
rect. received the transmission incorrectly, this
By comparing the member vectors of means for the sender that a transmit fault
the following frames, a calibration is made has occurred at its end. If the second suc-
with the remaining nodes of the cluster. cessor has received the message correctly,
the first successor detects that a receive
Clique Avoidance fault has occurred.
In order to achieve correspondence within Measures can now be taken to handle
the cluster with regard to the current state both fault types.
of the cluster, it is necessary to prevent the
formation within the cluster of subgroups Controller State (C-State)
or cliques whose view of the current state In order for the applications executed on
differs from the real state of the cluster. the host processors to be able to deliver
To prevent the formation of cliques, consistent results, it is necessary that
each node logs how many transmissions all the nodes of a cluster share common
were successfully and how many were in- knowledge of the state of the cluster. This
correct. knowledge is summarized in the C-state.
Before it can transmit a frame itself, Each node may indeed determine its C-
the Clique Avoidance Algorithm is used. state independently, but the cluster agrees
The controller checks whether more suc- by comparison with the other nodes to the
cessful transmissions were received than view of the majority of the users.
incorrect transmissions. Only if this is the The controller state is influenced by the
case does the node set both counters to values for global time, current position in
zero and transmit its frame. If this is not the TDMA round (MEDL position), current
the case, the controller switches to the cluster mode, requested mode change
Freeze state, in which the controller is (DMC), and the member vector.
deactivated and no data are transmitted.
From this state, it can be placed by the
host processor in the initialization mode
again.
Robert Bosch GmbH

Bus systems | TTP/C | 81

Cluster Mode the case, the controller assumes that there


In many real-time systems, operation has been a communication fault and begins
and check functions can be divided into with a cluster startup.
phases which are mutually exclusive. For
example, the operation of a motor vehicle Frame format
could be divided into the phases Driv- Because TTP/C regulates bus access via
ing and Stationary. In order to support TDMA, all messages are transmitted in
the different requirements placed on the broadcast mode and a priori knowledge
exchange of information in the different of the communication sequence and its
phases, it is possible to define in a TTP/C content is present in the MEDL, it is pos-
network modes in which the transmitted sible to keep very low the overhead of the
information in a frame can vary. However, protocol, i.e. the volume of information
the order of the slot in a TDMA round is needed to process the frame.
the same in all modes. Two different frame types are used in
For the purpose of correct interpreta- the operation of a cluster (Fig. 8). Cold-
tion, it is therefore necessary when modes start Frames, also known as Initialization
are used for all the nodes of a cluster to be Frames or I-Frames, occur exclusively
in the same mode. during system startup. Normal Frames,
also known as N-Frames, are used for
Deferred Pending Mode Change (DMC) communication during normal operation.
A change of cluster mode can be initi-
ated by applications if the controller is
permitted in the MEDL to change to the
requested new mode.
Because the change of cluster mode
comes into force only at the beginning of 8 Frame format

the following cycle, the information for


the deferred pending mode change is re-
Header
corded in the C-state.
I/N Mode Change
If another change of cluster mode is re- Frame Flags
1 bit 3 bits
quested by another application later in the
cluster cycle, this request overwrites the
previous request. A special case is CPM
(Clear Pending Mode change), in which an I-frame
application prevents the requested change Header C-state CRC
of cluster mode.

Reintegration of a node
A node must synchronize itself with the N-frame (explicit C-state)
cluster if it has failed due to an incorrect Application data
Header C-state CRC
transmission from the member vector or up to 240 bytes

if it has been re-initialized. To this end, it


waits for a frame in which an explicit
C-state was transmitted, e.g. an initializa- N-frame (implicit C-state)
tion frame. The controller adopts this Application data
C-state and uses it for its transmission. Header CRC
up to 240 bytes
SVT0008E

In order for this to be able to function,


a frame with an explicit C-state must be
transmitted every two rounds. If this is not
Robert Bosch GmbH

82 | Bus systems | TTP/C

I-Frame C-state
An I-frame begins with the TTP/C header. The C-state consists of the global time,
This is followed by the current controller information on the MEDL and the member
C-state and finally the CRC value of the vector of the cluster. The MEDL position
frame. corresponding to the Round Slot Position
in the current cluster mode, the current
N-Frame cluster mode and the requested cluster
To ensure that Membership Service can mode change (DMC) is transmitted as in-
function, it is necessary for the C-state to formation on the MEDL.
be included in the frame structure. This An explicit C-state has a size of 96 bits
can occur explicitly or implicitly in the (six words of two bytes each).
case of N-frames.
If the C-State is explicitly transmitted, CRC checksum
the header is followed by the controller TTP/C uses the CRC checksum only to
C-state. This is followed by application identify transmission faults. Transmission
data and then the CRC value of the frame. faults are not corrected. Transmission
If the C-State is implicitly included in the faults are detected by a process whereby
frame, the frame consists of the header, each node determines a CRC checksum for
application data and finally the CRC value the received message and compares this
of the frame, the determination of which with the transmitted checksum.
was initialized with the current C-state. A polynomial is used to determine the
Download frames are a special form checksum. The TTP/C Specification in this
of the N-frame; these are accepted by all respect does not stipulate a specific poly-
the receiving nodes, regardless of cluster nomial; instead, it requires the polynomial
association and C-state. To facilitate this to facilitate a Hamming distance of at
behavior, a constant value which is known least 6. In other words, it must be possible
to all the nodes is used for these frames to within one transmission for at least five in-
determine the CRC. correctly transmitted bits to be detected.
The CRC calculation is initialized by the
Frame Fields Schedule ID, where the ID is split into two
Header parts. One part is used for initialization
The header of all the TTP/C frames is for Channel 0 and the other for Channel 1.
identical. Firstly, one bit signals the frame This prevents a node which does not have
type, whether an I-frame or an N-frame is the correct MEDL or which was connected
transmitted. crosswise to the channels from transmit-
This is followed by three bits, by means ting or receiving successfully.
of which a change of current cluster mode The C-state for initializing the CRC cal-
can be requested. These bits are set to culation is also used in the transmission of
zero if no change has been requested. frames with an implicit C-state. Thus, only
those frames whose CRC checksum was
Application data determined with the same C-state are ac-
The information of the application is trans- cepted as valid.
mitted in this area. The size of this field The calculated CRC value is transmitted
can be determined for each slot of a round at the end of a frame in a 3-byte field.
individually in the MEDL and must not
exceed 240 bytes per slot.
Robert Bosch GmbH

Bus systems | TTP/C | 83

Composability Standardization
Networking technology has changed The development of TTA stretches back
greatly over the years. Where initially over a period of 20 years. Today, develop-
stand-alone systems (e.g. activation of a ment of the Specification is coordinated
turn-signal lamp via switches and relays) by the TTAgroup, a cross-industry consor-
were used, the changeover was quickly tium which was founded by the companies
made to cooperative systems in which Airbus, Audi, Delphi, Honeywell, PSA Peu-
individual components exchange informa- geot Citron, Renault, and TTTech.
tion with each other. The Specification of TTP/C has been in-
However, the interaction of components fluenced in particular by Hermann Kopetz,
is increasingly making it difficult to ensure who between 1979 and 1982 was Profes-
the correct fulfillment of a function. For sor of Computer Process Control at the
this reason, the aspect of composability, Technical University of Berlin and since
i.e. the possibility of combining separately 1982 has run the Institute for Technical
developed subsystems into an overall sys- Information Technology at the Technical
tem without having to verify the function University of Vienna. Professor Kopetz
of the overall system again, is becoming also directed the MARS project and was
increasingly important. substantially involved in each further de-
In order to ensure that this functions, velopment of the protocol.
it is necessary to ensure that a subsystem
autonomously fulfills its functions, but also Characteristics
that this is the case when the subsystem is Support of communication for safety-
integrated in an overall system. relevant functions.
TTP/C facilitates the implementation of Guaranteed transmission properties.
composability through the communication Guaranteed detection of all single faults.
parameters which are stored in the MEDL. Fault-tolerant communication units
(FTU) for fault-tolerant provision of
Verification of the Specification data.
The functionality of TTP/C has been thor- Local and central bus guardians
oughly analyzed. The core algorithms possible.
of the protocol specification have been Low protocol overhead.
formally verified with regard to certain as- Data efficiency of 85 % for transmission.
pects of consistency, stability and safety. Supports composability with regard to
Furthermore, the function of TTP/C sys- time response and ranges of values.
tems has been tested using failure-injec- Functions for the most part formally
tion experiments. This involved the use of verified.
both physical and software faults to check Consistent view by all nodes of the clus-
the fault tolerance and fault-detection ter state thanks to Membership Service
properties. and Clique Avoidance Algorithm.
Clear structuring of the protocol inter-
faces.
No restriction of the bit rate from the
Specification. TTP/C components were
tested with a bit rate of up to 1 Gbit/s.
Experience from product use.
Robert Bosch GmbH

84 | Bus systems | FlexRay

FlexRay bus access is controlled by the use of mini-


slots. Minislots are small time windows
Overview in which a defined message can be trans-
FlexRay is a field that was designed to ferred. This access method is also known
support open and closed-loop control as FTDMA (Flexible Time Division Multi-
technologies in the automotive sector. ple Access).
Development focused on the suitability With messages transmitted in the static
for use in active safety systems in particu- component of the cycle, the transfer prop-
lar. FlexRay therefore offers transfers with erties can be assured in accordance with
guaranteed compliance with transfer known methods. In the dynamic compo-
properties, high bit rates and a fault- nent, messages are sent as required. In this
tolerant design. case, messages are prioritized based on
The development of FlexRay, managed the message ID. The division between the
by the FlexRay Consortium, goes back to static and dynamic component is freely
cooperation between German automotive configurable but it cannot be modified
manufacturers, BMW and DaimlerChrysler. later during system operation. The same
In 1999 these two companies began to applies to the slot lengths in the static
compile requirements for a new communi- range, which, while configurable, must re-
cation system. In the process, develop- main constant once operation is underway.
ment would incorporate experience FlexRay systems can be equipped with
gained from the byteflight system of two transmission channels, with each
BMW and the prototype development channel having separate lines. This makes
of DaimlerChrysler. it possible to create a redundant data
The aim of FlexRay is to provide a sys- transfer or increase the available band-
tem with high transfer rates that will work width for specific applications. The latter
in a deterministic and fault-tolerant man- can be used both for the parallel transmis-
ner while being as flexible as possible to sion of information of two network nodes
use and expand. The main fields of appli- and for the faster transfer of information
cation of the FlexRay are drivetrain sys- of one node.
tems (drive) and active safety systems with FlexRay operates at a maximum bit rate
no mechanical fall-back level (x-by-wire). of 10 MBit/s, which is achievable in opti-
However, the areas of passive safety sys- mal environmental conditions. A rate of
tems and comfort/convenience and body up to 20 MBit/s is achievable if two chan-
electronics are also supported. nels are used without redundant access.
To support these very different domains, In addition to the bit rate of 10 MBit/s,
FlexRay uses two different types of bus ac- which is the only bit rate defined in Speci-
cess. For deterministic transfer properties, fication 2.1 dated 15th December 2005,
it offers time-controlled bus access. In the there are endeavors to support lower bit
case of applications whose transfers place rates of 2.5 or 5 MBit/s.
less demanding requirements on transfer
properties, it is desirable to make as effec-
tive use of the available transfer capacity
as possible. To combine these two ap-
proaches, communication takes place in
cycles. In each cycle, there is firstly a static
transmission component in which bus ac-
cess is controlled by TDMA (Time Division
Multiple Access). There then follows a dy-
namic transmission component in which
Robert Bosch GmbH

Bus systems | FlexRay | 85

Areas of application Active star topology


The areas of application of the FlexRay are An active star topology can be viewed as
very diverse. By offering redundant, time- a point-to-point link between a number
controlled and fault-tolerant transfers, of nodes and an active coupler. In this to-
not only is FlexRay suitable for use in pology, therefore, only the distance from
active safety systems with no mechanical a node to the coupler is of importance.
fall-back level and in the area of the drive- This cannot be more than 24 m.
train, but its optional, dynamic transmis- Apart from the connection lengths and
sion range means that it is able to support the number of connectable nodes, the
application in the areas of passive safety most important difference between an
systems and networking in the body and active and a passive star topology is in
comfort/convenience domains. the achievable bit rates. With the use of
With the high bandwidth of up to passive couplers, the achievable data
20 MBit/s for non-redundant transfers, rate (approx. 1 MBit/s) is below the rate
it is even conceivable, in theory, that that can be achieved with active couplers
FlexRay could be used for the transfer (up to 10 MBit/s).
of audio or highly compressed video.
Cascaded star topologies
Topology Cascaded star topologies are the product
Point-to-point of several active star topologies linked
The simplest configuration of a FlexRay together. In a FlexRay system, a topology
system is the direct link between two like this is limited to three cascaded star
network nodes. The maximum distance topologies.
between the two nodes is 24 m in this
configuration. Hybrid topologies
Hybrid topologies are a blend of topolo-
Bus topology gies from bus and star topologies, e.g. the
Between 4 and 22 nodes can be connected connection of several bus topologies to a
in a bus topology. The maximum distance star topology instead of individual nodes.
between any two nodes in a bus topology
may be 24 m. Two-channel topologies
Since it is possible to implement both
Star topology channels of a FlexRay system indepen-
A star topology is another architectural dently, different topologies can be used
variant of the FlexRay network. Both ac- for each channel. For example, one chan-
tive and passive couplers are supported. nel could be realized as an active star
topology, the other as a bus topology.
Passive star topology
3 to 22 nodes can be connected in a pas-
sive star. Here, too, the distance between
any two nodes cannot be greater than
24 m.
Robert Bosch GmbH

86 | Bus systems | FlexRay

Hardware mission. The information received by the


FlexRay controller of a subscriber communication controller is forwarded to
A FlexRay node (Fig. 1) comprises the the actuators responsible for processing.
host processor, a communication control-
ler (CC) and one bus driver (BD) for each Communication controller
channel to which the node is connected. The communication controller (CC) real-
Optionally, each node may contain a izes all aspects of the FlexRay system
bus guardian (BG) for monitoring each relating to the protocol. Its tasks include
bus driver and the bus guardian may re- scheduling, synchronizing with other net-
ceive information through an additional work nodes, creating a macrotick signal,
host processor. creating a bit stream from the information
It is optional whether a network node of the host or controlling bus access.
is connected to one or both channels;
here, at the very most, the requirements Bus driver
from the field of application of the network The bus driver (BD) assumes the role of a
node take effect. transceiver. It converts logical information
into physical voltages that are carried on
Transmission agents copper wires, and vice versa. The role of
The transmission agent for a FlexRay sys- the BD also includes a protective function
tem is of a twisted-pair cabling design, against electrostatic discharge (ESD).
where shielded (STP) or unshielded (UTP) Furthermore, the BD monitors the states
cabling may be used. of the BP and BM and is thereby able to de-
Each of the two FlexRay channels con- tect whether the bus is affected by physical
sists of two wires designated bus plus (BP) faults.
and bus minus (BM). The BD also processes wakeup signals
and, optionally, is able to control the
Host processor power management of the network node
The host processor gathers information because functions of the node can be
from the sensors, which is forwarded to switched off.
the communication controller for trans-

1 Network node architecture

Communication data
Host Configuration data & Communication controller
status information
Synchronization
Communication data

Communication data

signals
Configuration data & Bus guardian
Control signal

Control signal

status information (optional)

Control Status
signals signals
Control data &
status information Bus driver
UVF0001E

Control signal (optional)


Power supply
Robert Bosch GmbH

Bus systems | FlexRay | 87

Bus guardian Local bus guardian


The bus guardian (BG) is a device that will The local bus guardian (node-local bus
only permit transmissions if the connected guardian) is implemented as a stand-alone
network node is authorized to send a mes- CC inside the network node that monitors
sage. With this system, it is theoretically operation of a CC (Fig. 2). Its synchroniza-
possible for faulty network nodes to inter- tion process is independent of that of the
fere at the very most with their own trans- CC's; in particular, the CC and BG have
mission but not with the transmissions of separate oscillators.
other network nodes. In addition, it is also possible for the BG
The FlexRay protocol only provides the and CC to be controlled by dedicated host
framework for use of a BG: its use is not a processors that communicate with each
mandatory specification. Specification 2.0 other. This is, however, not mandatory.
only described a local bus guardian that As a consequence of direct control lines
would operate inside the network node (bus-guardian enable, BGE) between the
and monitor access to one of the channels. BG, CC and BD, information can only be
A critical aspect of this concept was that transferred from the CC to the BD if the
correct operation of the bus guardian in a BG permits this transfer to take place.
faulty network node could not be guaran-
teed as a consequence of the integration Central bus guardian
of the bus guardian in the node and the The central bus guardian (CBG, Fig. 3) was
permission for the bus guardian to access a new feature introduced with Specifica-
the oscillator of the network node. tion 2.1. It operates in the coupler of a
Specification 2.1 contains a refined star topology and monitors the operation
concept for the local bus guardian and of all connected nodes or networks. Faults,
introduces the concept of a central bus such as short-circuits on buses or network
guardian. nodes, that transmit information like a
babbling idiot with no consideration of
the transmission window, and thus inter-
fere with orderly communication, can be
detected by a CBG and suitable counter-

2 Local bus guardian 3 Central bus guardian

ECU Node 1 Node 2 Node 3 Node 4 Node 5


Host1 e.g. SPI Host2
CC BGSM BG (CC)
BGEout_A
BGEout_B
TxENin_A
TxENin_B
BGEin_A
BGEin_B
TxEN_A

TxEN_B
RxD_A

RxD_B

RxD_A

RxD_B
TxD_A

TxD_B

CBG CBG
A B Subbus

BD BD
UVF0002E

UVF0003E

Channel A Optional Optional Optional


Node 6 Node 7 node 1 node 2 node 3
Channel B
Robert Bosch GmbH

88 | Bus systems | FlexRay

measures may then be taken. As a result, the bus driver looks out for the transmis-
the effects of these faults can be confined sion of a wakeup signal, in response to
to small areas of the network. which the node is set to wakeup mode.

Operating modes Sending and receiving


In addition to normal operation, a FlexRay A bus driver connects a FlexRay network
system also supports the complete initial- node to the channel that contains a re-
ization of the network from sleep to ceiver and transmitter. If a controller is
standby (Fig. 4). In order for this system connected to both channels, it follows that
start to function, the BDs of all network there must be two receivers and transmit-
nodes have the capability to detect wakeup ters available in the network node.
signals on the bus and to start the remain-
ing other components of the dedicated Protocol
network node. Protocol layers
Special network nodes that may be con- The FlexRay protocol is built on five core
nected to the starter motor of a vehicle, mechanisms:
for example, generate the wakeup signal. Coding and decoding
The system start is split into the wakeup Control of bus access (media access
and startup phases. The wakeup phase in- control, MAC)
volves the activation of the network nodes Processing of frames and symbols
by the wakeup signal. In the startup phase, Clock synchronization and
the network nodes are initialized and syn- Schedule monitoring by the bus
chronized. guardian
If the function of a node is not required
for the time being, the node can be set to Unlike in other network protocols, with
a standby mode in which all operations FlexRay there are interfaces between all
of the coding and decoding process are core mechanisms. This requires a process
stopped. This reduces the energy con- that coordinates and synchronizes the
sumption of the node. In sleep mode, the changes in the core mechanisms. This is
power consumption of a network node is the task of the protocol operation control
at its minimum. In this mode, all functions (POC).
of the network node are deactivated: only

4 Wakeup sequence

local wake POC state leave coldstart


wakeup event channel A inhibit mode
Node A
wakeup/coldstart node power config ready wakeup wakeup ready integration listen coldstart listen
channel A, B off/reset listen send
wake channel B
Node B
wakeup/coldstart node power off/reset config ready wakeup wakeup ready coldstart listen
channel A, B listen send

Node C
non coldstart node power off/reset config ready integration
channel B listen

Channel A wakeup
UVF0004E

pattern
wakeup
B pattern
Robert Bosch GmbH

Bus systems | FlexRay | 89

FlexRay gives the host system the capabil- Coding on the physical layer
ity of influencing all five core mechanisms For coding, FlexRay uses a NRZ method
directly. To arrange this, communication (Non-Return to Zero) in which the two
takes place through an interface the con- identical transmission states are not di-
troller host interface (CHI) between the vided by a range in which the voltage falls
network node and host. back to a zero value. This type of coding
Concentrating on the main interfaces, makes it necessary to have mechanisms
the task areas can be arranged as a proto- with which a network node can divide the
col stack (Fig. 5). At the top level is the ap- transmitted states. To this end, FlexRay
plication, which forwards its commands to adds a sequence behind each transmitted
the CHI. Under the CHI is the POC, which byte: the byte start sequence (BSS). From
in turn has access to the MAC, clock syn- this sequence, each node can detect when
chronization and frame & symbol process- a byte has been transmitted and, with this
ing. In the next lower layer are the pro- information, encode the individual bits
cesses for coding and decoding. The low- of the transmission.
ermost level is represented by the transfer By applying different voltages to the
characteristics of the physical layer. two wires of one channel, it is possible
The bottom three layers are in nodes to create four bus states, which are desig-
that are connected to both channels: nated Idle_LP, Idle, Data_0 and Data_1
double presence because these functions (Fig. 6).
have to be fulfilled for each channel sepa- A bus state is identified by measuring
rately. More precisely speaking, this the differential voltage. Here, the bus volt-
means that for one node connected to age (uBus) is made equal to the difference
both FlexRay channels there is double between uBM and uBP (voltages at BP and
availability of synchronization, MAC, BM).
frame & symbol processing, coding uBus = uBP - uBM
and decoding, and physical layer.

5 Protocol stack 6 Bus states and voltages

Application V

Controller host interface Idle_LP Idle Data_1 Data_0

Protocol operation control


uBP uBus
Media Clock Frame & 2.5
access synchro- symbol
control nization processing
Voltage

Coding and decoding uBM


UVF0005E

UVF0006E

0
Physical bus
Time
Robert Bosch GmbH

90 | Bus systems | FlexRay

With this method, the data transfer is pro- Generation of a frame bit stream
tected against external electromagnetic Before a node can transmit a frame con-
interference because these act equally on taining the data of the host, the frame is
both wires and are canceled out in the dif- converted into a bit stream. To this end,
ference. the frame is first decomposed into individ-
Idle_LP (LP = low power) is the state in ual bytes. The start of a frame is populated
which a very low voltage of -200 mV and with a transmission start sequence (TSS)
200 mV is present at BP and BM. This state, followed by a frame start sequence (FSS)
for example, is used to identify the start of (Fig. 7). From the bytes of the frames, an
a transmission. extended byte sequence (EBS) is then gen-
In Idle state, a voltage of 2.5 V with a tol- erated whereby each frame byte is pre-
erance of 500 mV is present at BP and BM. ceded with a byte start sequence (BSS).
To set the channel to Data_0 state, at The 24-bit checksum (CRC) for this
least one transmitting node must apply bit sequence (TSS+FSS+EBS) is now calcu-
a negative differential voltage of -600 mV lated and appended to the bit sequence.
to the channel. To finish the bit stream, a frame end
For the channel to be set to Data_1 state, sequence (FES) is appended.
at least one transmitting node must apply If the frame belongs to the dynamic seg-
a positive differential voltage of 600 mV ment, a dynamic trailing sequence (DTS)
to the channel. can be additionally appended to prevent
If the transmission of an information another node from beginning its transmis-
signal is neither blocked by the bus guard- sion on the channel prematurely.
ian nor the communication controller, a
HIGH bit is signaled by the Data_1 channel Communication cycle
state and a LOW bit by Data_0. Each FlexRay cycle (Fig. 8) contains a
static segment that is transmitted as the
first part of the cycle. The static segment
contains a fixed number of transmission
ranges, the static slots.
Optionally, there may be a dynamic seg-
ment in the FlexRay cycle and this is trans-
ferred in second place. Each dynamic seg-
ment contains a fixed, freely configurable
7 Bit stream (dynamic segment) number of minislots.
Also optional is the symbol window,
MAC MAC which is transmitted as the third element
FSP MAC FSP
of the cycle. It can be used for the trans-
mission of an individual symbol and has
CODEC a b cd the same size as a static slot.
BSS BSS BSS DTS
To terminate the cycle, there is a phase
FSS FES
network idle time (NIT) in which the bus
High
is set to idle state. In general, the length
TxD
Low of the NIT corresponds to the remaining
TSS 1st byte last byte macroticks not used by the static and dy-
sequence sequence namic segment or symbol window. This is
1* gdBit
High not the case if it was detected during syn-
UVF0007E

MSB LSB
TxEN chronization that an offset correction is
Low required through which the length of the
NIT can be increased or reduced.
Robert Bosch GmbH

Bus systems | FlexRay | 91

Static segment To identify the end of a transmission,


The static segment comprises a fixed num- a phase in which the channel is idle (dy-
ber of equally sized transmission windows namic slot idle phase) is added to the end
(static slots), which are sent simultane- of a dynamic slot. The phase in which the
ously on both channels. Exactly one frame transmission takes place is called the dy-
can be sent in each static slot. Both the size namic slot transmission phase.
and quantity of the static slots in a static Another difference between the dy-
segment are configured during integra- namic and static segment is that the coun-
tion. ters of slots transferred are incremented
Bus access in the static segment is synchronously on both channels in the
controlled by a TDMA method whereby, dynamic segment. In the dynamic seg-
in each slot, the frame with the corre- ment, the counter of both channels is in-
sponding frame ID is sent. Frame ID 1 cremented independently in line with
is therefore sent in slot 1, frame ID 2 in the current transmission status (Fig. 9).
slot 2 and thus frame ID n in slot n.

Dynamic segment 9 Slot counter

Unlike in the static segment, the transmis-


Slot counter channel A minislot
sions in the dynamic segment are not of gNumber-
fixed length. To control bus access, mini- m minislot 1 m+1 m+2 m+3 m+4 m+5 OfMinislots
Channel B Channel A

slots are used that hold the same fixed frame ID m frame ID m+3 frame ID m+5
number of macroticks for all nodes con- t
nected to the network. Macroticks are
frame ID m+3 frame ID m+7
ranges in which exactly one frame can
m m+1 m+2 m+3 m+4 m+5 m+6 m+7 m+8
be transmitted.
Dynamic slots (transmission windows Slot counter Dynamic slot Dynamic slot
channel B with without
of variable size) are now created based on transmission transmission
the minislots. The maximum size of a dy-
Dynamic segment containing
namic slot is limited by a fixed number of
UVF0009E

gNumberOfMinislots minislots
minislots specified during configuration. Transmission may only start within the first
pLatestTx minislots of the dynamic segment

8 Communication cycle

t
Communication
cycle level
static segment dynamic segment symbol window network
idle time
Arbitration
grid level
static slot static slot minislot minislot
action point action point action point
Macrotick
level
macrotick

Microtick
UVF0008E

level
microtick
Robert Bosch GmbH

92 | Bus systems | FlexRay

Symbol window For this purpose, selected messages from


The symbol window makes it possible to the static part of the cycle are used (sync
send a collision avoidance symbol (CAS) frames) and are transmitted by the net-
or a media access test symbol (MTS). work nodes that are connected to both
These two symbols are identical and channels.
help to prevent collisions during the In a distributed communication system,
system-startup phase. each network node generally needs its
The third symbol defined in the FlexRay own internal clock for setting transmission
protocol the wakeup symbol (WUS) is timing correctly. As a consequence of tem-
not permitted to be sent in the symbol win- perature and voltage fluctuations and pro-
dow. It serves only to generate a wakeup duction-related precision tolerances, these
pattern (WUP), which is used during the internal clocks can soon deviate from an
system startup. abstract, system-wide global time. In the
case of a system such as FlexRay, which
Network idle time (NIT) controls bus access by means of time slots,
During the NIT, a network node corrects the synchronization of all network nodes
the ascertained time deviations of its inter- plays an especially important role because,
nal clock. It also gives the network node without a standardized, global time preset
the opportunity in this phase to make im- for all nodes, the specified transmission
plementation-dependent adjustments and windows cannot be maintained and may
changes to settings relating to the commu- break down.
nication cycle.
Clock control hierarchy
Clock control In a FlexRay system, clocking is controlled
In both the static and the dynamic part of on three levels (Fig. 10). The bottom level
the communication cycle, FlexRay reverts is represented by the microticks, which
to the identifiers of the transmission win- are derived directly from the oscillator
dow in which a node may transmit. If this clock of the network node. A microtick
method is to be successful, it is necessary is therefore not a system-wide variable,
for all nodes connected to the network but only relevant to the node concerned.
to have synchronous time information. At the next level up, the clock is con-
trolled by means of macroticks ranges
in which exactly one frame can be sent.
10 Timing Within fixed tolerances, macroticks form
the lowermost system-wide time unit.
t
Communication Each network node determines the dura-
cycle level 0 1 2 3 4 5 62 63 tion of a macrotick in microticks. The
number of microticks per macrotick does
vCycleCounter cCycleCountMax
not have to be the same for all macroticks.
gdCycle The top level is characterized by a clock
Macrotick control based on the communication cycle,
0 1 2 3 4 5 n-1 n
level which always contains the same, fixed
gMacroPerCycle -1
vMacrotick number of macroticks.

gdMacrotick
Microtick 0 1 2 3 4 5
UVF0010E

level
vMicrotick pdMicrotick
Robert Bosch GmbH

Bus systems | FlexRay | 93

Time synchronization Gradient correction


A synchronization method is required in With gradient correction, deviations in
order to guarantee a standardized time the transmission frequency of a node are
across the entire system. The basic para- continuously corrected during the com-
meters for timing are the number of munication cycle. The node here checks
microticks per communication cycle the transmission frequencies of all other
(pMicroPerCycle), the duration of a com- nodes. By means of the FTAA, these
munication cycle (gdCycle) and the dura- values are used to adjust the node's
tion of a microtick (pdMicrotick), where own transmission frequency.
the relationship between each is deter-
mined by the following equation: Offset correction
Offset correction is a way to correct devia-
gdCycle
pMicroPerCycle = round(_____________) tions in the communication-cycle phase
pdMicrotick
by including an offset in the NIT. With this
During operation of a FlexRay network, method, the node similarly employs the
the clocks of the oscillators of various net- FTAA to determine its phase difference
work nodes will not be equal or even sim- in relation to the other nodes of the net-
ply remain constant. They will fluctuate work and uses it to determine the offset
in response to outside influences. This required to shorten or extend the NIT
deviation is balanced by two corrective phase. Since all nodes use this approach,
measures: the gradient correction and the all nodes can initiate the transmission of
inclusion of an offset in the communica- a cycle in a synchronous manner.
tion cycle.
Timing
Fault-tolerant average algorithm Transmissions in the FlexRay system
Since an individual node can only observe are timed by action points, which are
the differences between the expected time specially-marked macrotick boundaries.
at which a transmission should have been A transmission in a static slot begins once
actioned and the actual time at which the a static-slot action point has been reached.
transmission took place, a fault-tolerant The position of this action point in a mac-
average algorithm (FTM), as described by rotick is defined system-wide.
J. L. Welch and N. A. Lynch, is used in both In a dynamic slot, a transmission begins
corrective measures. The measured time once a minislot action point has been
differences of all transmitted sync frames reached and ends at a subsequent minislot
are sorted by their value. If more than action point. This method ensures that
seven sync frames were received, the two there is always an idle period between
highest and two lowest values are removed individual transmissions.
from the list. If between three and seven
sync frames were received, the highest and
the lowest value are removed. For fewer
than three sync frames, the average is
derived from all measured differences.

Welch, Lynch,
A New Fault-Tolerant
Algorithm for Clock
Synchronisation,
Information and
Computation, vol.77,
No.1, April 1988
Robert Bosch GmbH

94 | Bus systems | FlexRay

Frame format The startup frame indicator reveals that


FlexRay uses the same format in both this frame is a startup frame. Startup
the static and dynamic part of the frame. frames are used in the network's starting
The format can be broken down into three phase and may only be sent by special
parts: header, payload segment and trailer coldstart nodes.
segment (Fig. 11). The indicators are followed by the
frame ID, payload length, header CRC and
Header segment cycle count.
The header segment contains a total of The frame ID has a length of 11 bits and
five bytes, at the start of which is a series corresponds to the number of the slot in
of indicators. which the frame is sent. In one cycle, each
The reserved bit is intended for future frame ID exists only once on each channel.
modifications to the protocol and is sent as The payload length expresses the size
a logical 0. of the information sent in the payload seg-
The payload preamble indicator indi- ment. Since the payload in a FlexRay frame
cates whether or not the payload segment is always sent in 2-byte words, a 62 in the
contains a network-management vector payload length field indicates, for exam-
(NMVector). An NMVector enables the host ple, that 124 bytes of payload are being
processor to transmit data directly without transmitted in the payload segment.
first being processed and prepared by the In the static segment, the payload length
CC. field always contains the same value
The null frame indicator indicates a null because the size of information here is
frame that contains no usable information. constant for all frames. Of course, this
The sync frame indicator indicates that property does not apply to frames in the
this frame is intended to be used for sys- dynamic segment.
tem synchronization. This indicator may In the header CRC, an 11-bit CRC value
only be set by network nodes that operate is transmitted. This is formed from the
as sync nodes. polynomial
x11 + x9 + x8 + x7 + x2 +1.

Since the information in the header seg-


ment is constant for all frames in the static
segment, the header CRC value can be cal-
11 Frame format culated offline and assigned to the network
node through configuration settings.
Reserved bit If a frame in the dynamic segment is
Payload preamble indicator
Null frame indicator always of the same size, it is possible here
Sync frame indicator also for the CRC value to be calculated off-
Stratup frame indicator
line.
Header CRC
Covered Area The final field in the header segment
is the cycle count. This field contains the
Pay- count number of the cycle in which the
Frame load Header Cycle Data Data Data Data CRC CRC CRC
ID length CRC count 0 1 2 n
sending network node is currently active.
11 bits 7 bits 11 bits 6 bits 0254 bytes 24 bits

Header Payload Trailer


Segment Segment Segment
UVF0011E

FlexRay Frame 5 + (0 254) + 3 bytes


Robert Bosch GmbH

Bus systems | FlexRay | 95

Payload segment development of FlexRay, depending on


The payload segment has a maximum the obligations that they have accepted.
length of 254 bytes, which are transmitted The uppermost group is represented by
in 2-byte words. the core partners, which first and foremost
The payload segment customarily trans- include the founding members. Alongside
fers the payload that is further processed the core partners are the premium associ-
by the host processors. Optionally, how- ates and associate memberships.
ever, an NMVector may also be sent in the By 2004 General Motors, Bosch and
payload segment, or a 16-bit message ID. Volkswagen had joined the FlexRay Group
With the assignment of message IDs, as core partners. In 2004 Freescale took
it is possible to send several data blocks in over Motorola's position in the group of
a frame. For this purpose, the message ID core partners.
is placed at the front of the other data by
the host processor as application data. Characteristics
Deterministic transfers possible
Trailer segment Optional bus guardian monitors network
The trailer segment contains a single access and protects against faults
field in which a 24-bit CRC checksum Differential signal transmission
(frame CRC) is sent. The polynomial used Collision-free transmission while opera-
to determine the frame CRC is: tion is in progress
x24 + x22 + x19 + x18 + x16 + x15 + x14 + Redundant transmission of information
x13 + x11 + x10 + x8 + x7 + x6 + x3 + x+1 on two channels
High transmission speed of up to
Standardization 10 MBit/s; up to 20 MBit/s with parallel
FlexRay Group transmission on two channels
FlexRay is a protocol specified by the Startup and initialization from an inac-
FlexRay Group. The FlexRay Group was tive sleep state are directly supported
founded in 2000 by the companies, BMW, by the protocol
DaimlerChrysler, Motorola and Philips Support for diverse fields of application
Semiconductors (www.flexray-group.com). Event and time-controlled transmission
The members of the FlexRay Group are of information possible
organized in a hierarchy. They also have Published standardization by the
different levels of influence on the further FlexRay Group
Robert Bosch GmbH

96 | Bus systems | Diagnosis interfaces

Diagnosis interfaces ple, individual actuators can be targeted


for activation to check them for correct
Diagnosis legislation (e.g. CARB, California operation. At the end of the line (EOL),
Air Resources Board) demands constant the diagnosis interface is used to test the
monitoring of emission-related compo- electronic control unit and make changes
nents in various electronic systems (OBD, to configurations (e.g. immobilizer, trans-
On-Board Diagnosis). Faults (e.g. electrical mission type). It is even possible to pro-
short-circuits of sensors, implausible op- gram the entire flash EPROM using end-
erating states) are stored in a fault memory of-line programming.
in the control unit. These faults can be
read using a scan tool (official testing sta- Diagnostics requires an interface for con-
tion) or workshop tester. For this purpose, necting the tester to the electronic control
there is a socket in the footwell, dashboard units. For communication, there are basi-
or center console of the vehicle to which cally two options available at the present
the tester is connected by means of a stan- time:
dard connector (ISO 15031-3) (Fig. 1). K line and
Using a workshop tester, the after-sales CAN bus
service is able to read the entire fault
memory: emission-related faults and The K-line network is not a bus in the true
vehicle-specific faults (e.g. from Motronic, sense, which means that collisions may
ABS). With the information stored in the occur. Since most electronic control units
fault memory, it is possible to diagnose a have a CAN interface for the exchange of
fault and repair it efficiently. The tester data between electronic systems, this op-
can also be used to clear the fault memory. tion for communication with the tester is
Furthermore, measured values and con- gaining ever more in importance.
trol-unit identification values can be evalu- Various protocols are implemented on
ated. Using the workshop tester, it is also the interfaces. These tend to be the CARB
possible to control special diagnostic func- or official protocol and the manufacturer-
tions. With actuator diagnosis, for exam- specific communication, which can be
closely related in their properties and
functions. It is even possible to use both
1 Diagnosis connector (diagnosis interface) interfaces: CARB-relevant functions run on
the CAN, manufacturer-specific functions
on the K line.
1 2 3 4 5 6 7 8
Figure 2 provides an overview of the
9 10 11 12 13 14 15 16
standards and the various layers of the
OSI reference model.
Pin 2: Bus line (high) from SAE J1850
Pin 10: Bus line (low) from SAE J1850
Pin 7: K line in accordance with ISO 9141-2
and ISO 14230-4
Pin 15: K line in accordance with ISO 9141-2
and ISO 14230-4
Pin 6: CAN_H from ISO 15765-4
Pin 14: CAN_L from ISO 15765-4
Pin 1, 3, 8, 9, 11, 12, 13
Not used by OBD
UWT0106-1E

Pin 4: Vehicle ground


Pin 5: Signal ground
Pin 16: Battery positive
Robert Bosch GmbH

Bus systems | Diagnosis interfaces | 97

Diagnostic protocol CARB


The communication method in diagnostics The Californian environmental authority
is characterized by the fact that the tester (CARB) introduced guidelines to promote
(client) addresses one or several electronic support for a standardized interface.
control units (servers) and requests data The CARB protocol is built on existing
output (e.g. from the fault memory) or an standards and specifies the data flow and
action (e.g. actuator diagnosis). These ser- timing (transport layer). This is established
vices and the transmission agent are de- in ISO 14230-4/ISO 9141-2 for the K line
fined in the various protocols. and in ISO 15765-4 for the CAN. The actual
communication messages (services) in the
KWP 71 application layer are precisely defined in
This protocol was developed in collabora- ISO 15031-5/SAE J1979 and permit no
tion with Bosch as the first standardized manufacturer-specific deviations.
serial interface and is based on a 5-baud
initialization and byte handshake. For ad- In California, every newly registered vehi-
dressing, the protocol provides for the use cle must support at least one of these pro-
of a unidirectional line (L line). The line tocols with all emission-related electronic
for data exchange (K line) is bidirectional. control units. The European counterpart
Alternatively, if the L line is not used at is the EOBD standard.
all in the system architecture, the K line
can also be used for addressing because
addressing and data exchange are two
chronologically sequential states. The way
in which communication is established is
predefined, the services are standardized.
2 Standards for diagnosis communication

KWP 2000 (ISO 14230: 1-3) a


This diagnostic protocol connects a tester CARB
Layer

to the electronic control units using a K line CAN


K line. In the KWP 2000 standard, there 7 ISO 15031-5 ISO 15031-5 ISO 15031-5 ISO 15031-5

are various possibilities for the way in 6


which communication is established (fast 5 ISO 15765-4
initialization and 5-baud initialization).
4
The communication services are specified Fig. 2
ISO 15765-2
3
but there is some freedom for customer- ISO 15765-4 a CARB
ISO 14230-2 ISO 11898
specific adaptations. 2 ISO 9141-2
ISO 14230-4
SAE J1850
ISO 15765-4 communication

1 ISO 9141-2
ISO 14230-1
SAE J1850
ISO 11898 b Customer-specific
ISO 14230-4 ISO 15765-4
communication
ISO 15765: 1-3 (CAN) b
This standard reproduces the existing Manufacturer-specific
Layer

Layers of the
protocols, ISO 14230: 1-4, on the CAN. K line: KWP 2000 CAN / UDS
ISO 15765-3 OSI reference model
It defines a way to leave untouched the 7 ISO 14230-3
ISO 14229-1 7 Application
fundamental format of messages ex- 6 6 Presentation
changed between tester and electronic 5 ISO 15765-3
5 Session

control unit and to transmit them on the 4 Transport


4 3 Network
CAN bus.
3 ISO 15765-2 2 Data link
SVA0018E

1 Physical
2 ISO 14230-2 ISO 11898-1

1 ISO 14230-1 ISO 11898 UDS Unified Diagnostic


Services
Robert Bosch GmbH

98 | Bus systems | Diagnosis interfaces

Application protocols Communication on the K line


The increasing complexity of control-unit Physical layout
functions places high demands on the The diagnostic tester connects to one or
tuning and optimization of these systems several electronic control units using the
to suit the types of engine and vehicle con- K-line system (Fig. 3). All electronic con-
cerned. This process is known as applica- trol units have equal rights. Communica-
tion engineering. For this purpose, an tion flows bidirectionally between the tes-
application system is connected to the ter and the electronic control units. This
electronic control unit. The application means that data can be received and sent
protocol for the K line is the McMess pro- by all subscribers. However, only one sub-
tocol, and the CCP protocol for the CAN. scriber is ever able to send at a given time.
The communication is an asynchronous
McMess process. There is no additional line for the
With the McMess protocol, parameters in the transmission of a clock signal. The baud
electronic control unit can be modified and rate on the K line is between 1,200 and
operands recorded. In a special application 10,400 baud in accordance with ISO stan-
mode, the protocol describes the method dards. In special applications (e.g. manu-
and contents of communication between ap- facturer-specific flash programming),
plication system and electronic control unit it could even be as high as 250 kBd.
for the K line. With McMess, for example, the Data transfer on the K line is realized as
measuring device is able to read the contents follows: the resistor in the tester increases
of the variable memory (e.g. sensor values, the potential of the line provided no elec-
measured values) quickly. tronic control unit is sending on it to bat-
tery-voltage level (Fig. 4). If an electronic
CCP (CAN Calibration Protocol) control unit is activated, it connects its
The CCP protocol describes the contents K-line connection to the shared ground
of communication between an application and therefore switches the potential of the
system and an electronic control unit if K line to ground. Each of the connected
these communicate on the CAN bus. electronic control units is able to detect
CCP allows electronic control units in that one of the bus subscribers is actively
the network to function at higher payload accessing the K line.
rates than on the K line.

3 System architecture of bus systems 4 Circuit diagram of an electronic-control-unit network

CAN bus

ECU 1 ECU 2 ECU 3 ECU 1 ECU 2 ECU n

K line

UBat
Diagnosis interface
Tester
SVA0017E

SVA0019E

Tester
Robert Bosch GmbH

Bus systems | Diagnosis interfaces | 99

Message format Checksum


The message format of the KWP 2000 The 1-byte checksum is always positioned
protocol comprises three parts (Fig. 5): at the end of a message. It contains the
Header value of the modulo 256 sum across all
Data bytes and bytes in the message apart from the
Checksum checksum itself.

Header Initialization
The header is made up of no more than To be able to send messages, each elec-
four bytes. tronic control unit must support a subset
The format byte (Fmt) contains informa- of the possible message formats. At the
tion about the form and composition of beginning of communication, the format
the message. Two bits (A0 and A1) pro- supported by the electronic control unit
vide address information, while six bits is communicated to the tester by means
(L0 to L5) provide the quantity of data of key bytes as part of initialization.
bytes. With this coding, there can be up The ISO standards specify which of the
to 63 data bytes. If L0 to L5 are set to possible initialization procedures are cus-
zero, the number of payload bytes must tomary for ECU diagnostics. The following
be coded using the length byte (Len). initialization procedures are supported:
The target address (Tgt) indicates the 5-baud initialization and
communication partner for which the Fast initialization
information is destined.
The source address (Src) indicates the
communication partner that sent the
information.
The length byte (Len) specifies the quan-
tity of payload bytes (max. 255 bytes).
Up to a value of 63, the coding can take
place in Fmt. For more than 63, the 5 Message format of the KWP 2000 protocol

length must be specified using this byte.


Check-
Header Data bytes sum
The existence of a target and source ad-
dress as well as the length byte is depen- Fmt Tgt Src Len SId
dent on the parameters from the format
byte. max. 4 bytes max. 255 bytes 1 byte

Checksum calculation
Data bytes
Up to 255 bytes of payload can be sent per
message. The first byte of the payload is
always a service-identification byte (SId). A1 A0 L5 L4 L3 L2 L1 L0
The subsequent data bytes are data that
differ depending on the service con-
cerned. 0 0 No address information
0 1 Exception mode (CARB)
1 0 With address information,
physical addressing
SVA0020E

1 1 With address information,


functional addressing
Robert Bosch GmbH

100 | Bus systems | Diagnosis interfaces

These different initialization methods are recognition pattern. From the bit sequence
used either for CARB diagnostics or for 01010101 (binary format), the tester de-
after-sales diagnostics. Furthermore, a termines the baud rate of the electronic
distinction can be made between physical control unit, which may be between 1,200
initialization and functional initialization, and 10,400 baud. The electronic control
which introduces the topic of point-to- unit then transmits the two key bytes,
point or point-to-multi communication. which communicate the header format
With functional initialization, a group of and timing method that the electronic
electronic control units is addressed and control unit supports. As acknowledgment
initialized. A function initialization can that communication has been successfully
only be successful if all the electronic con- established, the tester sends the comple-
trol units of this group support the same ment of the second key byte back to the
baud rate, the same transmission timing electronic control unit and, in return, re-
and the same protocol. By contrast, only ceives from the electronic control unit the
one electronic control unit is initialized in complement of the address. Initialization
the case of physical initialization. is then complete and the regular data
transfer may begin.
5-baud initialization
Communication is initiated by means of Fast initialization
a 5-baud address sent by the tester. It is Fast initialization establishes communica-
thus possible for each electronic control tion in a shorter time than 5-baud initial-
unit to be addressed individually and ad- ization. With fast initialization, the tester
dressing is clearly separate from the data sends a wakeup pattern (WuP) comprising
transfer. a low and high phase, each lasting 25 ms
The tester outputs the address onto the (Fig. 7). At the end of the WuP, the tester
K line at a transfer rate of 5 baud (Fig. 6). sends the StartCommunication Service at a
10 bits (eight data bits, one start and one rate of 10,400 baud. The electronic control
stop bit) take approx. 2 seconds. unit returns a positive reply containing the
On receiving the address, the electronic key bytes. Initialization is then complete
control unit responds with the baud-rate and regular communication may begin.

6 5-baud initialization 7 Fast initialization

Tester Control unit Tester Control unit

5-baud initialization Fast initialization


Address (2s) TWuP
5 baud 0x55 KB1 KB2 KB2 Address
W5 W1 W2 W3 W4 W4 Tidle

1,200 to 10,400 baud TiniL 10,400 baud


Synchronization
W1 60 to 300ms Baud-rate recognition
W2 5 to 20ms TiniL 251ms
SVA0021E

SVA0022E

W3 0 to 20ms TWuP 501ms


W4 25 to 50ms Tidle 300ms
W5 300ms
Robert Bosch GmbH

Bus systems | Diagnosis interfaces | 101

CARB initialization If a falling edge was detected, the elec-


CARB initialization is a special case of tronic control unit delays sending its
5-baud initialization, although CARB may own data until the bus has returned to
also be activated by fast initialization. idle state and the P2min time period has
A functional initialization of all connected again elapsed. Only then may it attempt
electronic control units is achieved with to send its data again.
the fixed address 0x33. The baud rate is
permanently set at 10,400 Bd. The require- Collision detection
ments are described in more detail in A collision cannot be prevented if two
ISO 14230-4 and ISO 9141-2. electronic control units send at the same
One of the outcomes of these standards time. In this event, the collision still has
is that all emission-related electronic con- to be detected. This is possible by monitor-
trol units fitted in a vehicle may only sup- ing the K line. To this end, the electronic
port one protocol: ISO 14230-4, ISO 9141-2 control units reread their own transmitted
or SAE J1850. A mixture of protocols in the byte through the serial interface.
same vehicle is not permitted. In Figure 8, two electronic control units
(ECU 1 and ECU 2) send a start bit at the
Key bytes same time. ECU 2 then sends a 0 (dominant
The electronic control unit uses key bytes bit) and ECU 1 a 1 (recessive bit). The 0
to inform the tester of which header bytes, appears on the K line. With bit 2, the exact
length bytes and timing method are sup- opposite is true. Here, ECU 1 persists with
ported. The key-byte decoding process the dominant level. When the complete
is defined in ISO 9141 and ISO 14230-2. byte has been transferred, the electronic
control units compare the byte sent on the
Arbitration K line with the byte they have read. In the
Arbitration is a means of preventing or de- example, a recessive level was overwritten
tecting collisions of data sent by different by a dominant level for both electronic
electronic control units at the same time. control units. From this, both electronic
Arbitration is necessary if a correct response control units deem the transfer to have
to the tester request is to be received in been faulty and retreat from sending.
the case of functional communication
(e.g. reading the fault memory of all emis-
sion-related electronic control units using
a scan tool). Collisions can be expected 8 Sequence of unsuccessful communication

because more than one electronic control


unit is permitted to send following initial- Recessive
ECU 1 level
ization by the tester.
Dominant
Arbitration is only relevant to data Start 1 2 3 4 level
transfer on the K line. bit

Collision prevention ECU 2


To prevent collisions following a tester re-
Start 1 2 3 4
quest, each electronic control unit checks
bit
the K line for a falling edge after a time of
P2min. A falling edge may be interference, Bus
or another electronic control unit has
SVA0023E

already been sending data. Start 1 2 3 4


bit
Robert Bosch GmbH

102 | Bus systems | Diagnosis interfaces

To prevent cyclical collisions, the elec- Different addressing methods exist:


tronic control unit reports after a time of normal and extended addressing, whereby
P2min, which is calculated in accordance normal addressing is the regular address-
with a specific algorithm. ing method and is analyzed below. Longer
Let us assume that ECU 2 in the previous messages that do not fit into a CAN frame
example sent a 1 as its first data bit. ECU 1 (seven bytes with normal addressing, six
would then receive nothing from the data with extended addressing) are segmented
transfer of ECU 2 and would continue to into several CAN frames and recomposed
establish communication. ECU 2, however, by the recipient.
detects the collision in bit 2 and retreats.
The collision in this event is non-destruc- Unsegmented messages
tive. If the quantity of data bytes to be transmit-
ted is no greater than seven bytes (for nor-
Communication on the CAN mal addressing), a single frame is trans-
Physical layout ferred. The first byte to be sent is the PCI
A CAN interface containing the necessary (Protocol Control Information). It identi-
hardware already exists in many electronic fies the frame in the high nibble (top four
control units. This bus system can also be bits of a byte) as being a single frame and
used for diagnostics. It is possible to com- indicates the data length (DL) in the low
municate with the electronic control units nibble (Fig. 9).
using a diagnostic tester connected to the The data is sent by the transmitter to the
bus by a diagnosis connector. receiver in a single message (Fig. 10a).

Baud rates Segmented messages


The typical baud rates associated with If more than seven data bytes (for normal
CAN are 500 kBd or 1 MBd. addressing) are to be delivered, the diag-
nosis tester (client) sends a first frame
Addressing and message types on the CAN data bus (Fig. 10b) first of all.
Tester communication on the CAN bus The electronic control unit (server) ac-
is defined by ISO 15765. The communica- knowledges with a flow-control frame.
tion services of ISO 15765-3 or 14 229-1 The other data is subsequently sent in
are defined in a similar way to those of consecutive frames.
ISO 14230-3 (Fig. 2).
The fundamental difference between
these protocols is in the format of mes- 9 Format of an unsegmented message

sages and how they are transmitted. While


up to 255 data bytes can be transmitted in
0 1 2 3 4 5 6 7
a message on the K line, only eight data
PCI Data
bytes are possible with the CAN. To repro-
duce the service messages on the CAN, the
contents (data bytes) of the header and the
checksum are separated and embedded in
a similar, new message format. The ad-
dress of the electronic control unit is now 7 6 5 4 3 2 1 0
the CAN identifier itself. With different 0 0 0 0 DL
Single frame
CAN identifiers, it is now possible to sup-
SVA0024E

port functional or physical addressing.


Robert Bosch GmbH

Bus systems | Diagnosis interfaces | 103

The first frame contains the PCI, an ad- (Separation Time) specifies the interval
ditional length byte (DL, Data Length) and to be maintained between consecutive
the first six data bytes (Fig. 11). In the frames.
high nibble, the PCI contains the informa- The flow-control frame is followed by
tion for identifying the frames as the first the consecutive frames. Again, the PCI
frame. The extended data length (XDL) in the high nibble contains the identifier,
is stored in the low nibble. Together with while the low nibble contains the sequence
the DL, a 12-bit data word is formed with number (SN). With the first consecutive
which it is possible to express values from frame to be sent, the SN is set to 1. The SN
0 to 4,095. is incremented with each subsequent con-
The transmitter sends the first frame secutive frame; after 15, the SN restarts
and waits for an acknowledgment of re- from 0. By evaluating the sequence num-
ceipt from the receiver in the form of a ber, the receiver is able to detect whether
flow-control frame. This message again or not all the frames have arrived.
contains the PCI, the high nibble of which
identifies the frame as the flow-control
frame. The low nibble contains the flow
status (FS), which can be used to authorize
or delay the sending of further frames
(consecutive frames).
11 Format of a segmented message

BlockSize (BS) indicates how many consec-


utive frames can be received without the
need for a further flow-control frame to a 0 1 2 3 4 5 6 7
be sent. The values expressed in STmin PCI DL Data

7 6 5 4 3 2 1 0
10 Diagram of message transfer
0 0 0 1 XDL
First frame
a Transmitter Receiver
3 2 1 0 7 6 5 4 3 2 1 0
XDL DL
Single frame
b 0 1 2 3 4 5 6 7
PCI BS STmin Data

b Transmitter Receiver
First frame 7 6 5 4 3 2 1 0
0 0 1 1 FS
Flow control Flow control
Consecutive
fram e Clear to send
Fig. 10
STmin Consecutive 0 0 0 0 (CTS)
frame Block a Message transfer
0 0 0 1 Wait (WT),
size (BS) receiver in a single frame
Consecutive
frame not ready (unsegmented
c 0 1 2 3 4 5 6 7 message)
Flow control PCI Data b Segmented
message transfer
Consecutive
frame
Last block 7 6 5 4 3 2 1 0
SVA0026E
SVA0025E

Consecutive Fig. 11
frame ( BS) 0 0 1 0 SN a First frame
Consecutive frame
b Flow control
c Consecutive frame
Robert Bosch GmbH

104 | Architecture of electronic systems | Overview

Architecture of electronic systems

Electronic systems in motor vehicles are By the mid-1970s the development of


today characterized by a high level of integrated circuits for a broad range of
networking and complexity. The latest applications had also reached and revolu-
processes, methods and tools of system tionized automotive engineering.
architecture are required to keep on top
of this structure in the future too. One of the first instances of the network-
ing of electronic systems came about dur-
ing the development of TCS (Traction Con-
Overview trol System). This networking was initially
realized by purely mechanical means. The
History throttle valve in the air-intake system of
Over the many decades of automobile his- the internal-combustion engine was fit-
tory, there has been a manageable number ted with a device which could be activated
of electrical systems in motor vehicles: directly by the traction control system. It
ignition, lighting, windshield wipers, horn, was not discernible to the engine manage-
fuel gauge, various indicator lamps, and a ment whether the driver or the TCS was
vehicle radio. Semiconductors were used moving the throttle valve.
initially only for rectification (direct-cur- The next stage involved the realization
rent generator replaced by alternator from of an electronic connection to the engine
approximately 1963) and then later for control unit via a PWM interface (pulse-
electronic control (transistorized ignition width modulation) to improve dynamic
from 1965). response. This could be used to transfer
Certain in-vehicle functions were realiz- the signal to the engine control unit for
able with electromechanical means or with reducing the drive torque. This was then
discrete electronic components either not implemented in the form of an air-supply
at all or only with disproportionately high throttling, an injection blank-out or an ig-
complexity. Thus, for example, the first nition-timing advance.
electronic ABS had already been devel- On account of the ever more stringent
oped in 1970, but was never ready for se- exhaust-emission regulations, the previ-
ries production or the market on account ously depicted ways of coupling could no
of its size, weight and cost (Fig. 1). longer be maintained. It had to be left to

1 Comparison of different-generation antilock braking systems

a b

Fig. 1
a ABS8
(current system)
b ABS1 from 1970
(transistor-
SVA0038D

technology device,
did not go into
series production)
Robert Bosch GmbH

Architecture of electronic systems | Overview | 105

the engine management as to how a TCS- New systems, such as automatic ranging
requested reduction of the drive torque or parking-aid assistant for example, have
was effected (air path, fuel path or igni- their own ECU with the determining sen-
tion path). It was therefore necessary to sors and actuators. However, they increas-
come up with a more powerful interface ingly rely on being supplied with further
via which a desired torque and a dynamic- information by the network. Thus, the ESP
response request could be transmitted. control unit (Electronic Stability Program)
By contrast, the actual torque, the engine supplies the network with the information
speed and the current setting reserve were on the vehicle speed. The vehicle radio can
to be transmitted to the TCS control unit. It use this information, for example, to adapt
proved complex and expensive in terms of the volume to the vehicle speed.
the number of cables required to transfer To keep on top of the complexity, it is
these different data via discrete and, for necessary when developing new systems
example, pulse-width modulated inter- to specify jointly with the creator all the
faces. The CAN bus system (Controller Area variables obtained from the network. This
Network) was introduced in 1991 as an relates in particular to signal quality and
alternative to discrete cabling. In this way, signal availability. The theme of in-vehicle
the foundations for the modern networking safety always play an important role here.
of systems in motor vehicles were laid. The receiving system provides a limp-
home function if the signals obtained from
Technology of the present day the network are unavailable.
In todays mid-size and luxury-class Because of the powerful networking
vehicles, virtually all the ECUs are net- between the ECUs, a good many new per-
worked directly or indirectly (e.g. via gate- formance features can even be achieved
ways) with each other (Fig. 2). Networking completely without additional hardware,
goes so far to some extent that 60 or more i.e. purely by means of data communica-
ECUs communicate via several CAN buses tion and software. One example of this is
and further communication systems, such the opening of the side windows through
as MOST (Media Oriented Systems Trans- longer actuation of the radio remote con-
port) or LIN (Local Interconnect Network), trol for the central-locking system. Thus,
communicate with each other. for example, the vehicle can be uniformly

2 ECU interconnection in a modern luxury-class vehicle

Diagnostics CAN
Sensor CAN
Instrument
Central cluster CAN
gateway
Drive CAN
LIN

Comfort CAN

LIN
SVA0039E

MOST
Robert Bosch GmbH

106 | Architecture of electronic systems | Overview

ventilated in the summer months when an important task when defining new
the doors are opened. The power-window networking concepts.
units and the central-locking system ex- Thus, for example, the logic circuit
change the necessary information. The for the finger-protection function of the
software required for this purpose runs power-window units is located in many a
either on the ECU for the central-locking design variations directly in the ECU on
system or the ECU for the power-window the power-window motor. The activation
units. In many vehicles the two systems signal for normal operation, e.g. the men-
share a common ECU so that new soft- tioned window opening by radio remote
ware-based performance features can be control, is transmitted via a LIN bus from a
integrated even more easily. central ECU of the body electronics (body
This demonstrates a trend which is al- computer). A client-server architecture is
ready encountered in body electronics: referred to in this respect. Finger protec-
the integration of individual ECUs to form tion is a local function which for reasons of
central ECUs (Fig. 3). These central ECUs safety and on account of its time require-
are connected with the sensors and actua- ments cannot usually be realized on a
tor either via discrete, analog cables or distributed basis.
via buses. The latter reduce significantly
the number of pins in the ECU plug and Development trends
thereby also reduce the cabling costs. Sen- The above-mentioned centralization and
sors and actuators connected via buses are the use of intelligent sensors and actua-
also known as intelligent sensors and tors in the field of body electronics are
actuators. These must for the purpose of expected to extend in the coming vehicle
bus connection have on board electronic generations to the other electronics fields.
circuitry, which in many cases also con- Domain master computers will be used
tains the sensor-signal conditioning or ac- to perform central functions in the areas of
tuator driver functions. At the same time, comfort and convenience, safety, driver as-
however, the use of electronic circuitry sistance, infotainment, and energy supply
gives rise to higher costs in the sensors or (Fig. 4). The ECUs of the intelligent sensors
actuators. Minimizing the overall costs of and actuators distributed in the vehicle
electronics and cabling thus represents are dependent on these master computers.

3 Comparison of decentralized control with centralized control

a b

Fig. 3
1 Mirror 1 3 6 8
4 9
2 Door ECU
3 Power-window unit
4 Check unit 2 LIN
5 Lock
5 10
6 Mirror (LIN)
7 Central ECU (to the other doors) (to the other doors)
CAN
8 Power-window unit
SVA0040E

CAN
(LIN)
7
9 Check unit (LIN)
10 Lock (LIN)
Robert Bosch GmbH

Architecture of electronic systems | Architecture methods of electronic systems | 107

Functions which require a high degree of Architecture methods of


networking of information control com- electronic systems
mands are predominantly reproduced on
these central computers in software. A Architecture
standard software architecture is required As the amount of electronics and network-
to enable these functions also to run on ing in the vehicle increases, so too the de-
different ECU platforms and thus to be mand for powerful development processes
reused. This is to be achieved by means of and their description methods takes cen-
the AUTOSAR Initiative (see AUTOSAR ter stage: the architecture of electronic
section). systems.
Here, the master computers are to be The term architecture generally refers
networked with each other via a pow- to the art of building. In the construction
erful data backbone. Central network industry, the architect designs a building
access for diagnostics and software by drawing up plans for the different views Fig. 4
downloading is also connected to this and contractual work based on the clients AMP Audio Amplifier
backbone. It will also include a firewall wishes and boundary conditions. A plan ARS Active Roll
to prevent the permeation of undesirable abstracts the reality with regard to a par- Stabilizer
BCM Body Computer
software (viruses). ticular aspect (e.g. geometric conditions or
BM Battery
electric cabling). The building can finally
Management
be erected on the basis of the plans of all CDC Continuous
the necessary aspects. Damping Control
When carried over to a motor vehicle, CGW Central Gateway
this is referred to as the E/E architecture. DAB Digital Audio
E/E denotes the electrical and elec- Broadcasting
DLC Differential Locks
tronic aspects of the motor vehicle. The
Control
plans of the E/E architect are referred to
EPB Electric Parking
in the following with the general term of Brake
model. EPS Electric Power
Automobile manufacturers and sup- Steering
pliers have different views on how many ESP Electronic Stability
Program
models of which type are needed to
ETC Electronic
Transmission
Control
4 Possible scenario for a future luxury-class vehicle
LRR Long Range Radar
LVDS Low Voltage
Diagnose-CAN
Differential
CAN FlexRay
CGW Signaling
Ethernet PSI Peripheral Sensor
W-Lan Interface
BCM1 BCM2 THU USB VDU PSM EPM PSM Passive Safety
Ethernet
CAN ESP CAN Manager
AMP TV LRR SDARS Satellite
EPB ETC
SRR1 Digital Audio Radio
DAB/ Instr.
EPS
SDARS S/G Services
SRR2 DLC
Display
LVDS S/G Starter Generator
Video CDC BM
SRR Short Range Radar
PSI5
LIN Display MOST ARS THU Telematics Head
Unit
SVA0041Y

Body & Comfort Infotainment & Cockpit Vehicle Motion Passive Safety Power Train TV Television
Electronics Electronics Electronics Electronics Electronics
VDU Vehicle Dynamics
Unit
Robert Bosch GmbH

108 | Architecture of electronic systems | Architecture methods of electronic systems

describe completely the electrical and Function model, Function network


electronic systems in the vehicle. The Function models are the preliminary
models presented in the following have stage of concrete technical systems. They
proven successful in practice and are a describe the transfer elements which are
necessary framework for describing the needed to realize the required perfor-
E/E scope. mance features without going into their
concrete technology.
Note: The term architecture is often used For the example of active front steering,
in the literature and in publications to de- this means an analysis of logically func-
note the models themselves. Here, a clear tional transfer elements, such as
distinction is made between work opera- Variable steering ratio
tion (= architecture development) and pre- Stabilization control
sentation of the result (= model). Vehicle model
Actuator
Models of E/E architecture Vehicle
The models of E/E architecture reflect the Driver
results of the different integration stages
of the electronic systems in the vehicle. The function models are usually created
These steps are usually dealt with simul- using block diagrams in accordance with
taneously because both the geometry (the DIN 19 226 (Fig. 5).
body structure) and new systems are
addressed in the concept phase. In the There have in the past been several ap-
course of vehicle development, the situa- proaches to integrating the active func-
tion may arise where an electronic system tion chains in a standardized hierarchi-
in the chosen technology does not fit into cal structure for the complete vehicle
the available space. Compromises must be (function network). This should, for
found in this case. example, distinguish between functions
on the vehicle level and functions on the
subsystem level (e.g. in the drivetrain).
The CARTRONIC concept from Bosch
is an example of this. Unfortunately, the

5 Signal-flow diagram with standard elements

Driver
.
dSteering wheel dSum cVehicle

Vehicle

Variable steering
ratio
dSuperposition
Further interference
compensation
Stabilization Actuator
control
.
Fig. 5
cSetpoint
SVA0042E

Signal-flow diagram
showing active front Vehicle model
steering as an example
Robert Bosch GmbH

Architecture of electronic systems | Architecture methods of electronic systems | 109

automotive industry has up to now failed in the form of ECUs, the first step is to look
to agree to a standardized functional for synergy with the further technology
structure of the vehicle. However, many blocks to be integrated. A technological
promising approaches are contained network is created (Fig. 6). If, for example,
in the AUTOSAR Initiative, to which a specific sensor technology is available
Bosch is actively contributing ideas from for an active-chain link whose signal is
CARTRONIC. required by another active chain, this will
also be used. This occurs even if this sen-
Technology model, sor is overspecified for the additional user.
Technological network It is nevertheless important to store the
The technology model describes what original requirement in a database as this
technical realization is used for the speci- synergy may no longer be present in an-
fied function blocks without already com- other vehicle.
bining these into modules, such as e.g. The automotive industry usually
electronic control units (ECUs). Technol- uses the nomenclature e.g. according to
ogy blocks are created. DIN 19 227, IEC 617-4 and other standards
Thus, the signal filtering function can to describe the hardware.
be realized with discrete components by
means of a digital circuit or filter software Integration models
on a microprocessor. Even a controller Node model
function can be executed with a discrete The links of the technological active chains
electronic circuit or a microprocessor. are combined into groups at different loca-
Voltage stabilization can be achieved by tions, the nodes. Here, strict adherence
either a smoothing capacitor or an elec- to the optimum cost of integrating the
tronic DC/DC converter. technology blocks is maintained. Thus, at-
The decision as to which realization tempts are made, for example, to integrate
technology to opt for is dictated on the the software parts of several technological
one hand by the function and on the other active chains on a common microproces-
hand by the costs. Another important sor. Sensor signals are used repeatedly
dictating factor is reuse. Before the tech- where possible and actuators used com-
nology blocks are combined into modules monly where possible. But the history

6 Example of a technological active chain

Switch I/O channel

Software

Sensor I/O channel I/O channel Actuator

-20+50 C 020mA 04095 bits 02047 bits 420mA m3/h


SVA0043E
Robert Bosch GmbH

110 | Architecture of electronic systems | Architecture methods of electronic systems

shows that there are remarkable synergies ECU software model


even in the mechanical field (e.g. vacuum If the software parts of several technologi-
supply of a pneumatic brake booster by the cal active chains have been assigned to
intake port of the spark-ignition engine). an ECU, it is necessary to plan and model
the software required for the respective
ECU hardware model processor.
This model represents the structure of the Classical IT (PC systems) have some
electronic hardware of an individual ECU. recognized methods for software-architec-
It is created by allocating specific elec- ture development with associated models.
tronic components from the technologi- However, no standard has developed up to
cal active chains to an electronic module now in the automotive industry. The most
in a node. An ECU is therefore, generally widely spread method is that of modeling
speaking, a collecting point for electronic with the aid of UML (Unified Modeling
components of different systems, an inte- Language).
gration platform. AUTOSAR is currently in the process of
Software for controlling different systems defining a standard for structuring soft-
from different sources (automobile manu- ware along hardware lines and its interface
facturers or suppliers) is also integrated on to the application functions in the ECUs
the microprocessors located in the ECU. By of motor vehicles (Fig. 8). A standardized
networking the ECUs, it is possible to repre- form of representation is also in progress.
sent complex distributed functions, which Some manufacturers of UML tools already
utilize sensors and actuators for different offer AUTOSAR profiles on the basis of
installation locations in the vehicle. the previously achieved standardization.
During development, initially customary Typically, a distinction is made between
circuit diagrams will be used for the elec- basic and application software (the use-
trical or electronic part of the ECU. Then ful load). Blocks of basic software are, for
the ECU mechanics and the design and example, device-driver software, commu-
connection technology will be established. nication software, operating system, and
The model is confined to a very rough rep- hardware abstraction.
resentation in the early concept phase.

7 ECU model

Sensor mC Actuator

Peripherals chip A/D


RAM
Sensor Sensor power CAN Configurable Actuator
supply peripheral driver
module stages
Sensor Actuator
flash
High-speed
Sensor System and mS bus Actuator
mC power
supply CAN-bus driver Safety
controller
SVA0044E

LIN-bus driver
Robert Bosch GmbH

Architecture of electronic systems | Architecture methods of electronic systems | 111

Network model of communication On the one hand, it is important to fuse


Because all the technology blocks of a individual electric circuits so that a short-
vehicle have been allocated to ECUs in the circuit does not affect the entire network.
previous steps, a network of these ECUs On the other hand, not all circuits should
is now in place with their communication be supplied with electrical energy in each
relationships. The network model of com- operating state. The principle of termi-
munication represents all the ECUs in the nals was therefore introduced for this
motor vehicle which have bus communi- purpose. Thus, for example, terminal 15 is
cation and are thus directly or indirectly only supplied with electrical energy when
networked with each other. the ignition is switched on.
Each signal which is exchanged between
two or more ECUs is assigned to a suitable The electrical circuit diagram (Figures 9
bus system. and 10) shows the electrical networking
There is currently still no standardized and fusing of the individual modules with-
notation for drafting and graphic repre- out the installation position being taken
sentation. The models are for the most into consideration. Here the colors of the
part created in standard PC-graphics tools. cables and the matching with a terminal
or fuse can be seen. The terminal designa-
Network model of energy supply tions comply with DIN 72 552.
The allocation of the technology blocks to The positive pole of the supply voltage
ECUs and sensor and actuator modules has is usually featured in the top half of the
also given rise to a network of electrical representation while the negative pole
loads/consumers which requires a suitable (ground) is featured in the bottom half.
energy supply.

8 Simplified representation of the AUTOSAR software model

AUTOSAR Application Actuator Sensor Application


Software Software Software Software Software
Component Component Component Component AUTOSAR Component
AUTOSAR AUTOSAR AUTOSAR Software AUTOSAR
Interface Interface Interface Interface Interface

ECU
Firmware
AUTOSAR Runtime Environment (RTE)
Standard
Software

API 2 Standardized
VFB & RTE Standardized Standardized AUTOSAR AUTOSAR
AUTOSAR
relevant Interface Interface Interface Interface
Interface
ECU
API 1 Services Communication
Abstraction
RTE Standardized Standardized Standardized
Standardized

relevant Interface Interface Interface Fig. 8


Interface

Operating Complex
API Application
API 0 System Device
Standardized Drivers Program Interface
Interface ECU Electronic Control
API 3 Private
Basic Software
Microcontroller Unit
Interfaces inside Abstraction
Basic Software RTE Real Time
SVA0045Y

possible ECU-Hardware Environment


VFB Virtual Function
Bus
Robert Bosch GmbH

112 | Architecture of electronic systems | Architecture methods of electronic systems

Space model and wiring harness 10 Circuit diagram: vehicle radio


This model groups electronic modules in
a specific location in the vehicle (Fig. 11).
In this way, the connecting cables between 30 30
the ECUs or the energy-supply leads of the
15 15
electrical loads/consumers are brought
together in cable looms. This creates the
backbone of every vehicle, the wiring F F W1
harness. Many different boundary condi- W1
tions must be observed here, such as, for
example:
The manufacturing concept (one-part or
multi-part wiring harness) A2

Loom cross-sections (flexibility)


Electromagnetic compatibility (EMC) P6
Heat dissipation
Weight
Costs (copper)
Fig. 10 X18 B11 B12
A2 Vehicle radio Two-dimensional models are usually suffi-
B11 Speaker
cient in the concept phase of a vehicle; de- 31 31
B12 Speaker

UAS1038-1Y
tailed three-dimensional models are used 1 2 3 4 5 6 7 8
F Fuse
P6 Clock/timer
in the later development phase.
W1 Vehicle antenna
X18 Diagnosis socket

9 Circuit diagram: power supply

30 30
15 15

S1

P1
012
57a 15 15x 50

S38

G1

B+ D+ 50 30
G M
3
Fig. 9 U

G1 Starter battery B W G2 M1 15a 31

G2 Alternator with
P1 P1 T1
voltage regulator
UAS1030-1Y

M1 Starter motor
P1 Display 31 31
1 2 3 4 5 67 8 9 10 11
S1 Ignition switch
T1 Ignition coil
Robert Bosch GmbH

Architecture of electronic systems | Architecture methods of electronic systems | 113

E/E development process Such a restriction can be, for example, the
The E/E development process links the space available in the center console for
individual draft stages with each other on installing ECUs. Another restriction can be
a logic and time basis and provides quality the maximum permissible heat dissipation
criteria at the beginning and the end of a in a location which influences the power
draft stage. electronics positioned there. Thus, for
Because E/E architecture for automotive example, the audio amplifier in vehicles is
applications is still a young discipline, the frequently installed in the luggage-com-
processes at automobile manufacturers partment areas since the heat in the cock-
and suppliers still differ greatly. This re- pit area cannot be adequately dissipated.
lates both to the number and sequence of
the draft stages and to the quality criteria. Evaluation of models
The following must be observed for all ap-
Requirement management proaches: During the transition from one
The requirements decisively determine model hierarchy to the next (e.g. from the
the decisions of the E/E architect. It is ad- function model to the technology model),
visable to distinguish between functional a list of evaluation criteria (e.g. reuse or
and non-functional requirements. Func- testability) is compared with a portfolio of
tional requirements refer to the desired specimen solutions (e.g. bus technologies).
performance features when the vehicle is Evaluation of the specimen solutions using
being used. Non-functional requirements the criteria allows a solution to take shape
refer to the technical solution and are on the basis of the purely functional re-
therefore also known as draft restrictions. quirements and irrefutable boundary con-
ditions (MUST criteria). This procedure
is also known as QFD (Quality Function
11 Example of a 2D space model Deployment).
An alternative procedure consists in
Lights Lights
front left front right comparing a reference solution (e.g. the
Engine compartment previous networking model) using the
Engine compartment evaluation criteria with alternative solu-
tions. This does indeed deliver fast results,
Engine Engine
comp. comp. but possibly not the global optimum.
inside left inside right
Because the evaluation criteria are gen-
Mirror Interior f. m. Mirror
f. le. Interior Interior f. ri. erally weighted differently by the automo-
f. le. f. ri. bile manufacturers, the electronic systems
Door f. le. Door f. ri. of the vehicles sometimes differ consider-
Roof
Door Door ably from each other.
Interior

Door r. le. Door r. ri.

Interior Interior
Door r. le. r. ri. Door
Luggage
compartment interior
Luggage
compartment

Luggage
compartment
SVA0046E

Lights Lights
rear left rear right
Robert Bosch GmbH

114 | Architecture of electronic systems | Architecture methods of electronic systems

E/E development tools On the basis of the standardized infra-


It would be desirable to have a tool that structure software, which consists pri-
can represent the different models of E/E marily of standard modules, each vehicle
architecture work and network them with manufacturer can implement its specific
each other. It should furthermore be pos- content (application software).
sible to record the modeling properties
numerically in order to be able to provide Objectives and concepts
them with an evaluation. In concrete terms, the following objectives
However, this requires a certain degree are pursued at AUTOSAR:
of standardization of the models and their Reuse of basic software for different
data formats. Only this facilitates com- vehicle platforms and vehicle manufac-
petition between the tool manufacturers turers
and opens up to the different disciplines Support in the integration of third-party
involved the opportunity of joining the software in the field of both basic and
process at different points. application software during ECU devel-
Many automobile manufacturers and opment
suppliers are working intensively on such Support in the shifting of application
concept tools or formats. Unfortunately, it software between ECUs during develop-
is not currently possible to foresee if and ment
when standard formats for describing the Replacement of standard hardware
models will develop. blocks without this result in changes in
AUTOSAR opens up this standard at the application software
least for describing software and ECU Model-based concepts for early valida-
networks. AUTOSAR will therefore be dis- tion of the system draft
cussed in more detail in the following.
The ECU-software mode defined by AUTO-
AUTOSAR SAR (Fig. 8) supports a horizontalization of
The AUTOSAR Partnership (AUTomotive the software, whereby a clear separation
Open Systems ARchitecture) was founded between the basic software and the appli-
in July 2003 by vehicle manufacturers and cation software is created. This is achieved
suppliers - Bosch among them. Its global by several abstraction levels in the basic
objective is the joint development of an software from hardware drivers through
open software architecture for future au- to complex infrastructure services and the
tomotive applications. The Partnerships AUTOSAR Runtime Environment (RTE).
objectives include the standardization of Because the interfaces of most basic-
a fundamental ECU infrastructure (basic software modules within these layers are
software), exchange formats and func- standardized, standard hardware blocks
tional interfaces. These are intended to and the associated drivers can be replaced
replace the previous company-specific in- without this incurring changes to the ap-
dividual solutions. Model-based concepts plication software.
and methods make it possible to keep on Conversely, application software which
top of the continuous rise in complex- limits itself to the use of these standard
ity, brought about by new functions. The interfaces can during development be
demands for quality and reliability are ful- inserted more easily in an ECU or even
filled by the multiple use of proven stan- shifted to another ECU. It is thus possible,
dards. AUTOSAR concerns itself in stages for example, for the same application
with all vehicle domains. software of a vehicle-speed controller
Robert Bosch GmbH

Architecture of electronic systems | Summary and outlook | 115

depending on the vehicle platform to run Summary and outlook


on the engine control unit, the transmis-
sion control unit or another ECU without As a result of the increasing scope and
the application software having to be the increasing networking of electronic
changed. This naturally requires the ECU systems, it is necessary to invest in suit-
and the networking to be sufficiently able processes, methods and tools for E/E
powerful. architecture. E/E architecture has taken
Standardization of the basic software shape as an independent function in the
and its configurability depending on the automotive industry. If the procedures de-
requirements of the application software scribed in this publication are consistently
enable basic-software modules to be re- applied and developed further, electronics
used for different vehicle platforms and in motor vehicles will also be manageable
manufacturers. This increases the quality in the future and will continue to make
of the software since there are no product- significant contributions to improving traf-
specific changes, reduces the development fic flow, traffic safety, driving comfort, and
costs through reuse and forms a stable economical fuel utilization.
basis for the constantly increasing com-
plexity and networking of the application
functions.
AUTOSAR is also developing model-
based concepts for early validation of the
system draft. A check is made on the basis
of a formalized description as to whether
application-software interfaces are consis-
tent with respect to each other without the
application software having to be in place
as a full program.
Robert Bosch GmbH

116 | Index of technical terms, |, Index of technical terms

Index of technical terms


A D
Addressing, MOST, 64 Data frames, MOST, 63
Addressing, network, 8 Data transfer, MOST, 63
Administrative functions, MOST, 66 Data transfer rate, 17
Application layer, 12 Diagnosis interfaces, 96
Application protocols, 98 Diagnostic protocol, 97
Arbitration, 35, 101 Dynamic segment, 91
Architecture methods, 107
Architecture of electronic systems, E
104 E/E development process, 113
Automotive networking, 16 ECU hardware model, 110
AUTOSAR, 114 ECU software model, 110
Event control, 12
B
Basic CAN, 40 F
Big Bang, 79 Fault-tolerant average algorithm, 93
Bit stuffing, 39 FlexRay, 84
Bluetooth, 50 FlexRay controller, 86
Bluetooth architecture, 56 FlexRay protocol, 88
Bluetooth versions, 51 Frequency-hopping method, 51
Bus access method, 8 Full CAN, 41
Bus driver, 86 Function block, MOST, 62, 67
Bus Guardian, 73 Function model, 108
Bus guardian, 87 Function network, 108
Bus systems, 30
Bus topology, 5 G
Byzantine fault, 79 Gateway, 21
Gradient correction, 93
C
CAN bus, 30 H
CAN controller, 40 Host Processor, TTP/C, 72
CAN protocol, 34 Hybrid topologies, 7
Classification of bus systems, 19
Cluster Startup, 79 I
Communication controller, 86 Integration models, 109
Communication cycle, TTP/C, 76 Interference immunity, 17
Communication layer, 12
Communication Network Interface, K
72 K line, 98
Composability, 83 KWP 2000, 97
Configuration status, MOST, 66 KWP 71, 97
Connection master, MOST, 66
Content-based addressing, 34 L
Control mechanisms, 12 LIN bus, 44
Cyclic redundancy check, 38 LIN protocol, 46
Logical Line Interface, 74
Robert Bosch GmbH

Index of technical terms | 117

M S
Macrotick, 92 Scatternet, 53
Master-slave, 9 Single-wire line, 32
McMess, 98 Sleep mode, 88
Membership Service, 80 SOS faults, 74
Mesh topology, 7 Space model, 112
Message Descriptor List, 73 Star topology, 5
Microtick, 92 Startup, 88
Minislots, 91 Static segment, 91
Models, EE architecture, 108 Symbol window, 92
Modulation method, Bluetooth, 52
MOST application layer, 67 T
MOST bus, 60 Technological network, 109
Multimaster, 9 Technology model, 109
Multiplex applications, 20 Time-Triggered Architecture, 71
Timer control, 13
N Time synchronization, 93
NetBlock, MOST, 66 Transmission agent, MOST, 62
Networking, 4 TTP/C, 71
Network management, LIN, 48 TTP/C Controller, 72
Network master, MOST, 66 TTP/C Network, 74
Network model, 111 TTP/C Protocol, 77
Network nodes, 31 Two-wire line, 32
Network organization, 8
Network service, MOST, 62 W
Network topology, 4 Wakeup, 88
Node model, 109

O
Offset correction, 93
OSI reference model, 10

P
Physical layer, 10
Piconet, 53
POF cables, 62
Power classes, Bluetooth, 52
Protocol layers, 34
Protocol services, TTP/C, 79

R
Real-time applications, 19
Real-time capability, 18
Ring topology, 6
Robert Bosch GmbH

118 | Abbreviations, |, Abkrzungen

Abbreviations A E
ABC: Active Body Control EBS: Extended Byte Sequence
ABS: Antilock Braking System ECU: Electronic Control Unit
ACC: Adaptive Cruise Control EDC: Electronic Diesel Control
ADC: Analog Digital Converter EDR: Enhanced Data Rate
AMA: Active Member Address EEM: Electric Energy Management
AMP: Audio Amplifier EMC: Electromagnetic Compatibility
AMS: Application Message Service EPB: Electric Parking Brake
ARS: Active Roll Stabilizer EPS: Electric Power Steering
ASC: Active Suspension Control ESD: Electrostatic Discharge
TCS: Traction Control System ESP: Electronic Stability Program
AT: Action Time ETC: Electronic Transmission Control
AUTOSAR: Automotive Open Systems
Architecture F
FEC: Forward Error Correction
B FES: Frame End Sequence
BCM: Body Computer FOT: Fiber Optic Transceiver
BD: Bus Driver FSK: Frequency Shift Keying
BG: Bus Guardian FSR: Force Sensitive Resistance
BGE: Bus Guardian Enable FSS: Frame Start Sequence
Bit: Binary Digit FTDMA: Flexible Time Division
BM: Battery Management Multiple Access
BM: Bus Minus FTU: Fault Tolerant Unit
BNEP: Bluetooth Network FTM: Fault Tolerant Mean Value
Encapsulation Protocol
BP: Bus Plus G
BSS: Byte Start Sequence GAP: Generic Access Profile
GFSK: Gaussian Frequency Shift
C Keying
CAC: Channel Access Code GOEP: Generic Object Exchange
CAN: Controller Area Network Profile
CAS: Collision Avoidance Symbol GPS: Global Positioning System
CBG: Central Bus Guardian
CDC: Continuous Damping Control H
CDM: Code Division Multiplex HCI: Host Controller Interface
CDMA: Code Division Multiple HDL: Hardware Description Language
Access HFM: Hot-film air-mass meter
CGW: Central Gateway (German: Heifilm-
CHI: Controller Host Interface Luftmassenmesser)
CMS: Control Message Service HHC: Hill Hold Control
CNI: Communication Network HUD: Headup Display
Interface
CPM: Clear Pending Mode Change I
CRC: Cyclic Redundancy Checksum I/O Ports: In/Out Ports
IAC: Inquiry Access Code
D IC: Integrated Circui
DAB: Digital Audio Broadcasting IEEE: Institute of Electrical
DAC: Device Access Code and Electronics Engineers
DI: Direct Injection IFG: Interframe Gap
DLC: Differential Locks Control INIC: Intelligent Network Interface
DMA: Direct-Memory-I/O-Access Controller
DMC: Deferred Pending Mode Change
Robert Bosch GmbH

Abbreviations | 119

L PPP: Point-to-Point Protocol V


L2CAP: Logical Link Control and PRP: Post-Receive Phase VDU: Vehicle Dynamics Unit
Adaptation Protocol PSI: Peripheral Sensor Interface
LAN: Local Area Network PSK: Phase Shift Keying W
LAP: Lower Address Part PSM: Passive Safety Manager WAN: Wide Area Network
LCD: Liquid Crystal Display PSP: Pre-Send Phase WLAN: Wireless Local Area Network
LDF: LIN Description File WPAN: Wireless Personal Area
LED: Light Emitting Diode Q Network
LIN: Local Interconnect Network QFD: Quality Function Deployment WUP: Wakeup Pattern
LLI: Logical Line Interface WUS: Wakeup Symbol
LRR: Long Range Radar R
LSB: Least Significant Bit RADAR: Radiation Detecting and
LVDS: Low Voltage Differential Ranging
Signaling RFCOMM: Radio Frequency
Communication
M
MAC: Media Access Control S
MAMAC: MOST Asynchronous SAE: Society of Automotive Engineers
Medium Access Control SDAP: Service Discovery Application
MARS: Maintainable Real Time Protocol
System SDARS: Satellite Digital Audio Radio
MC, C: Microcontroller Service
MEDL: Message Descriptor List SDP: Service Discovery Protocol
MHP: MOST High Protocol SEI: Software Engineering
MOST: Media Oriented Systems Institute
Transport SIG: Special Interest Group
MSB: Most Significant Bit (Bluetooth)
MSC: Message Sequence Chart SOS: Slightly-Off Specification
SPP: Serial Port Profile
N SRR: Short Range Radar
NAP: Non-significant Address Part SRU: Smallest Replaceable Unit
NIC: Network Interface Controller STN: Super Twisted Nematic
NIT: Network Idle Time STP: Shielded Twisted Pair
NM: Network Management
NRZ: Non-Return to Zero T
TR: Technical Requirements
O TCS BIN: Telephony Control Protocol
OBEX: Object Exchange Specification - Binary
OSI: Open System Interconnection TDD: Time Division Duplex
TDMA: Time Division Multiple Access
P THU: Telematic Head Unit
PAN: Personal Area Network TP: Transmission Phase
PC: Personal Computer TSS: Transmission Start Sequence
PCM: Pulse Code Modulation TTA: Time Triggered Architecture
PD2: Partition Design 2 TTP: Time Triggered Protocol
PDA: Personal Digital Assistant TV: Television
PLC: Powerline Communication
PMA: Parked Member Address U
POC: Protocol Operation UAP: Upper Address Part
Control UART: Universal Asynchronous
POF: Plastic Optical Fiber Receiver Transmitter
ppm: parts per million UTP: Unshielded Twisted Pair

Você também pode gostar