Вы находитесь на странице: 1из 14

1217

Electronic control units for automotive electrical power


systems: communication and networks

A Shrinath and A Emadi*


Illinois Institute of Technology, Chicago, Illinois, USA

Abstract: The last decade has seen a resurgence of advanced technologies being implemented in
automobiles. Functions that were considered highly complex and difficult to be implemented are not
only being provided but various other facilities are also being built on those very functions. Everything
from engine control to multimedia and infotainment services are implemented in today’s automobiles.
This has been due largely to the strides made by the electronics as well as the communications
industry. The emergence of the concept of providing the customer with all possible services has led
to an explosion of implementation of high-end electronics, each providing a facility of its own. When
so many devices are being embedded in a car, there also has to be a mechanism that should regulate
the way in which data transfer takes place. It is the objective of this paper to provide an insight into
most of the communication protocols that are being used, as well as technologies that are under
development in the automobile industry of today. Various protocols and their modus operandi are
explained, with schematics completing the picture.

Keywords: automotive electrical systems, Bluetooth, communication, controller area network,


electronic control units, network

1 INTRODUCTION

The modern-day automobile was not built in a day. It


took years and thousands of patents to build it. This has
been an industry that has seen rapid growth in terms of
its technical as well as its aesthetic aspects. The car-
building effort has also been receptive to growth in other
industries recently, most prominent among them the Fig. 1 Growth in automobile wiring
electronics industry. Until a decade ago, the automobile
industry suffered from a conservative approach towards
computer-controlled processes. However, rapid strides
made by the electronics industry made it possible to manu- With the necessity of wiring the electronic devices
facture smarter devices. By incorporating these devices, together comes the issue of data management. This task
car manufacturers were able to offer more services and is accomplished by a set of rules known as protocols.
features in a car. But, this has come at a price. The cost These protocols govern the way in which data is com-
of implementing such electronics amounts to almost a municated from one electronic device to the other.
quarter of the total cost of manufacturing an automobile Examples of such protocols are x-by-wire, MOST, CAN,
[1]. While electronic systems averaged $100 in an auto- TTCAN, SAE J1850, and Bluetooth. A noted exception
mobile in 1977, they have averaged around $1800 until here is Bluetooth, which is a wireless protocol. Details
quite recently [1]. Coupled with the implementation of about this protocol are explained later in this paper.
computing solutions for solving automotive problems The advantage of using these protocols is that the task
is the fact that these electronic components need to be of communication between the devices is centralized (i.e.
connected by wires. Figure 1 represents graphically the the task is handled by a central control unit). Thus, all
growth in wiring in recent years [2]. the devices are networked together. The implementation
of these networks not only solves the problems of
The MS was received on 26 December 2003 and was accepted after traditional wiring systems, it also provides scalability; it
revision for publication on 22 June 2004.
* Corresponding author: Illinois Institute of Technology, 3301 South leaves open opportunities for adding new components
Dearborn Street, Chicago, IL 60616-3793, USA. email: emadi@iit.edu in the future without any major changes to the network.
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1218 A SHRINATH AND A EMADI

It also makes it possible to integrate different networks. (SAE) Congress. The CAN protocol is based on the
This will increase the functionality of already existent principle of broadcast transmission technique. It is
systems. The high data rates available today (they vary basically a communication technique in which data to
from a few kbps to a few Mbps depending on the net- be transmitted on a network is sent to all the nodes
work used) make it possible to implement such seem- including the one to which the data is intended. The
ingly simple networks for real-time control systems. To nodes look inside the data packet to see if the message
implement these networks in the safety critical systems was meant for them. If not they simply discard the
of a car will take some time, because a failure of these packet. The node to which the data was intended then
networks might result in loss of human life, a matter of downloads the data and processes it [4].
very grave concern. Such networks are, however, already Some of the features that have made CAN so popular
in use in many places in a car, such as multimedia, doors, are speed, data length, and event-triggered mechanism.
seat adjustments, and trunk release. The speed of data transmission in a CAN network can
According to current estimates, some 20 per cent go up to 1 Mbps. This is very helpful in real-time control
of the total manufacturing costs for automobiles is systems that can afford very low latency. Thus, due to
attributed to electronics. These electronic devices or the high speed offered by CAN, low latency and, hence,
electronic control units (ECU ) are generally in a single time-efficient control can be achieved. CAN frames are
chip, 8-bit microcontroller with around 100 B of RAM, also short in length, owing to which there is minimal
32 kB of ROM, few I/O pins to connect to sensors and delay in the reception of messages.
actuators, and a network interface [3]. They can be CAN is basically an event-triggered mechanism. This
broadly classified into two categories: body electronics means that the transmission of data is prompted only
and system electronics [3]. when a specific event occurs. For example, data trans-
Body electronic devices are responsible for those mission might take place when a button is pressed or a
operations not directly related to the movement of lever pulled. Owing to this property, the bandwidth
the vehicle. Examples include theft avoidance systems, available is made maximum use of because of the mini-
air-conditioning control, audio equipment control, seat mum load put on the bus system. The combination of
adjustment, window control, and air-bag control. Another high speed and short message length results, therefore,
interesting concept is keyless access to the vehicle. The in a low delay, owing to which CAN can be implemented
user simply has a card-like device. Sensors in the car in control systems that have a very low tolerance for
detect the card and automatically unlock the doors. The delays. The addressing system is based on message
user then sits and simply has to press a button to start identifiers rather than physical addresses for nodes.
the engine, rather than the conventional way of putting Every CAN message has a unique identifier that assigns
the key into the ignition and turning it. System electronic a priority to the respective message based on the binary
devices, on the other hand, are directly involved with value of the identifier. A lower binary value is assigned
the movement of the car. The most important impacts a higher priority and vice versa. Any node wishing to
have been in computerized engine control and anti-lock transmit sends the message to the CAN controller, which
braking systems (ABS). Another application that has in turn broadcasts the message. All the other nodes then
seen the implementation of computerized control is get ready to receive and the nodes that have no use for
transmission control. the message discard the message.
The main advantage of using ECUs and networking
them is that they give scalability and functionality.
Automotive electronic devices not only replace mech- 2.1 CAN arbitration
anical systems, they also help in integrating other systems.
We shall now proceed to discuss the various protocols A problem that arises in a network is the problem of
that are used for the control of the transmission of data collision avoidance. There could be a possibility that
between devices. with so many messages going around in the network
messages could collide, which could lead to a loss of
messages. CAN overcomes this by a simple method
known as carrier sense multiple access/collision detection
(CSMA/CD). In this method, the nodes first listen to the
2 CONTROLLER AREA NETWORK (CAN ) bus to see if it is free and then they transmit.

It was in 1983 that Robert Bosch GmbH in Germany


started an internal project to develop an in-vehicle net-
2.2 CAN error detection
work that would serve to connect all the electronic com-
ponents in a car. In 1986, they introduced the concept The errors that occur in a network may be at either
of the serial bus-based controller area network (CAN ) the bit level or at the frame level. Fortunately, CAN is
for the first time at the Society of Automotive Engineers equipped to handle both kinds of error [5]. The major
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1219

types of error that can be handled by the CAN protocol


are bit, stuffing, cyclic redundancy check (CRC ), form,
and acknowledgement errors. As mentioned before,
CRC is employed to detect any errors occurring during
transmission. Here both the receiver and transmitter
would have stored a mutually agreed polynomial P(x).
The transmitter then represents the data to be trans-
mitted by a polynomial G(x). G(x) is then divided by
P(x). The remainder is then transmitted in the frame
to the receiver. The receiver then performs the same Fig. 2 CAN system overview
division to see if it gets the same remainder. If not, then
the receiver can infer that an error has occurred.
3 TIME TRIGGERED CONTROLLER AREA
NETWORK (TTCAN )
2.3 CAN architecture
Communication protocols can be divided into two
A basic CAN protocol consists of three layers: physical classes: event triggered and time triggered. Both these
layer, data-link layer, and application layer. The data-link methods vary as far as their operating principles are
layer (DLL) is implemented in an electronic component concerned [8]. Time-triggered-controller area network
known as the CAN-controller. Several semiconductor (TTCAN ) is a communication protocol based on CAN,
manufacturers, such as Intel, Motorola, and Philips, though the difference is that it uses a time-triggered
make it. The CAN controller consists of the following: mechanism rather than the event-triggered mechanism
CPU interface logic (CIL), which handles the data used in CAN. The specifications of TTCAN are defined
transfer on the bus; bit stream processor (BSP), which in ISO standard 11898-4. It utilizes all the error detection
handles the streaming of data between buffer and bus mechanisms as well as the soundness of CAN.
line; error management logic (EML), which is involved The event-triggered model is known as an asyn-
with error management; bit timing logic (BTL), which chronous model whereas the time-triggered model is
is responsible for the synchronization of bit streams; known as a synchronous model. In the event-triggered
transceiver control logic (TCL), which handles error model, data transmission takes place when a certain
detection and correction, transmission, and reception of event takes place, for example when a button is pressed
the data and arbitration; and message buffer memory or a lever pulled. Here data transmission takes place at
(MBM ), which is used to store messages for future random on the time line. However, in the case of a time-
transmission. Recently, a variation of the CAN protocol, triggered model, data transmission takes place at specific
called the CANopen, has been developed [6 ]. intervals on the timeline. In this mode, all the nodes are
There are many ways in which CAN can be synchronized to a master clock so that all of them have
implemented in automobiles. For our case, we shall con- the same sense of time. Each node is allotted a slot time.
sider the various ways in which the Jaguar car company It is only during its allotted slot time that the node can
has implemented CAN in its XK8 sports car [7]. The transmit. This is something akin to the time division
applications in this car are the engine control module multiple access scheme. As mentioned before, trans-
(ECM ), antilock braking system (ABS), transmission mission of data takes place due to the progression of
control module (TCM ), instruments and driver infor- time. But, how do the nodes know when to start trans-
mation module ( INST ), J-gate illumination module mitting their data? In the static scheme, nodes are
(JGM ), and intersuspension data transfer system. The allotted slots in time, but in the time-triggered CAN this
following figure demonstrates amply the concept of problem is solved by the transmission of a special frame
CAN implementation in automobiles. Data access points known as the reference frame. This is distinguished from
are specially ear-marked from where data has to be other frames by virtue of its identifier. This reference
collected. Appropriate sensors are wired to these data message has a bit called the start-of-frame (SOF ) bit.
access points, which are in turn wired to microprocessors The reception of this bit denotes the instance of time at
that perform adequate data processing. The data is then which the data transmission can take place. The TTCAN
placed on the CAN bus along with the medium access has two levels of operation defined in the specification.
control mechanism. The data is then sent to the CAN Level 1 is by virtue of the property of the reference
controller for control mechanisms to be implemented. message. This reference message ensures the time-triggered
In a more generalized manner, CAN can be used to net- operation of the CAN. Level 2 ensures the global time
work body control modules and infotainment networks. synchronization of the nodes in the network. The differ-
Details cannot be released as these are proprietary ence is that for level 1 implementation, the reference
technologies. Figure 2 graphically depicts how CAN is message carries one byte of information necessary for
implemented in automobiles. control purposes, whereas for level 2 implementation,
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1220 A SHRINATH AND A EMADI

the reference message contains about four bytes of con- length. A counter Cycle_Count is used to indicate the
trol information with the other four bytes being usable number of the current basic cycle. It is incremented by
for data transfer. one every time a basic cycle is completed. Apart from
The advantage that it enjoys over CAN is that during the exclusive and arbitrating window, another window,
its operation cycle, TTCAN permits the transmission known as the Tx_Enable, is used. This is contained
of the regular time-triggered messages as well as event- within the exclusive and arbitrating windows. It is used
triggered messages. Certain time slots are reserved for to indicate to the node the time at which it is supposed
the event-triggered messages. For example, x-by-wire to start transmitting. This is done so that the message
systems, which integrate sensors and actuators for per- following the current one may not be delayed due to the
forming certain critical real-time control functions, need delayed transmission of the current message.
TTCAN. This leads to a predictable behaviour of the The time unit used in any network transaction in the
network, which is very important owing to the distri- TTCAN network is known as the network time unit
buted architecture of many networks. A distributed (NTU ). It can be either a CAN-bit duration in the level 1
network consists of many subsystems organized into TTCAN or a fraction of a second when implemented in
subnetworks. Each subnetwork may be implementing a the level 2 TTCAN. A message state counter (MSC ) is
different protocol. Therefore, a protocol that clearly attached to every message transmitted or received. An
defines the transmission procedure to be followed at error to this message is responded to by an increment in
well-defined time slots would clearly reduce the com- the MSC. A node then flags an error if either the MSC
plexity of the network, as well as utilize the available reaches a value of seven or the difference between two
bandwidth fully. In addition, it would reduce the time MSC is greater than two.
required, however small, for the arbitration procedure Implementation of the TTCAN protocol is handled
in the CAN that grants the nodes access to the bus by the TTCAN IP module, which implements not only
for transmission of messages. It would also reduce the TTCAN protocol (ISO 118998-4) but also the CAN
the probability of a message with low priority being protocol (ISO 11898-1) [10]. Bit rates of up to 1 Mbps
restrained from transmitting that message for a long time. are achievable by this module. All the requirements of
Many of the subnetworks in up and coming cars will a time-triggered network, including global time syn-
be highly crucial for the safety of the car, for example, chronization and clock-drift compensation, are provided
the x-by-wire systems being implemented in cars. In these by this module. Message objects and message masks are
systems, the control of the car would be decoupled from stored in the message RAM for operation in a CAN
the process to which it is attached [9]. Therefore, in these network. For TTCAN networks the trigger object is
cases, the deterministic nature of the network, as well as stored in the trigger RAM. The message handler handles
its reliability to deliver messages to sensors and actuators all message-handling instructions. It is possible to change
on time, is very essential. the message handler core as well as certain other cores
Figure 3 illustrates the communication model adopted by having an interface card connected to the module and
by TTCAN. The matrix cycle essentially describes the an external CPU.
transmission schedule of the entire network. It defines In summary, with the addition of a session layer to
which node should be transmitting at any given instant the protocol stack of a CAN network, it is possible to
of time. In this way, each node knows when exactly it have a time-triggered model of the CAN that lends
is supposed to transmit. The matrix cycle is repeated flexibility as well as a deterministic behaviour to the net-
over time. Each basic cycle consists of several exclusive work. This fact will be exploited by systems such as x-by-
and/or arbitrating and free windows. This structure is wire in the future. Slowly, such networks would be added
highly column oriented. Each column in a matrix cycle to the existing mechanical and/or hydraulic back-ups to
is known as a transmission column. All the windows ensure the complete safety of the operating control
belonging to a single transmission column are equal in system. The advantage of using a time-triggered archi-
tecture is that the system would not be overloaded with
events. This would take additional circuitry to resolve
pending scenarios.

4 SAE J1850 PROTOCOL

The SAE J1850 protocol has been defined by SAE to


be a class-B protocol, whose definition is given as ‘A
system whereby data, e.g., parametric data, is transferred
between nodes to eliminate redundant sensors and other
system elements. The nodes in this form of a multiplex
Fig. 3 Matrix cycle in TTCAN system typically already existed as a stand-alone module
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1221

in a conventionally wired vehicle’ [11]. Class-B networks the bus. The priority of the messages is indicated by bits
are essentially used for communicating between modules in the beginning of the messages. A CRC is implemented
supporting a data transfer rate of around 100 kbps. in the protocol for error correction [12].
Though this data rate is insufficient for real-time safety Once the transmitting node has finished transmission,
critical processes, class-B networks are ideal for non- the nodes that had lost arbitration try again to gain
real-time control processes and communication. access to the bus and the whole arbitration procedure is
The SAE J1850 protocol is based on a bus level repeated again. Invariably, it is seen that nodes that have
topology wherein the bus is a masterless peer-to-peer more active symbols in the starting of the message com-
protocol. Just like the CAN network, messages are pared to others gain access to the bus earlier than the
broadcast in the sense that whatever messages have to other messages. However, it must be stressed that, due
be sent are sent in the form of frames to all the nodes, to the nature of the bus access, it is impossible to specify
irrespective of the desired destination. instants of time at which certain nodes can transmit or
This protocol supports two modes. One is a 41.6 kbps receive, very much unlike the TTCAN presented before.
pulse-width modulated mode supporting a dual wire and The entire SAE J1850 protocol is implemented on a
the other is a 10.4 kbps variable pulse-width mode sup- single silicon chip. For example, the data link controller
porting a single-wire configuration. Data can be sent on developed by Delco Electronics Corporation for General
the bus by way of either time division multiplexing or Motors [13]. This chip has an 11-byte transmit first-in-
frequency division multiplexing. In time division multi- first-out (FIFO) buffer and a 20-byte receive FIFO
plexing, messages are sent on the same bus at different buffer as well as an 8-bit parallel data interface. It also
instances of time whereas in frequency division multi- has a transceiver built on. This transceiver provides a
plexing two or more messages are sent at the same time. 7 V waveform for transmission on the bus. Wave shaping
Data on the bus is transmitted by changing the amount is done to reduce RFI emissions. Functions, such as
of time each transition lasts on the bus. For example, filtering, timing, and symbol definitions, are performed
according to VPW J1850 protocol definition, a ‘1’ bit is by the logic section. The logic section includes host
a bus driven at a high potential (active) state for 64 ms interface, error detection, and correction codes, and all
kinds of logic. A diagram of the DLC chip is shown
or low potential (passive) state for 128 ms. Alternatively,
in Fig. 4.
a ‘0’ bit is defined as a bus in high potential (active) state
The total length of the network wiring is restricted to
for 128 ms or low potential (passive) state for 64 ms. A
40 m. This included 35 m of on-vehicle networking and
high potential is usually any voltage from 4.25 V to 20 V.
5 m of off-vehicle networking. The wiring itself is a single
A low potential is any voltage from ground voltage to
wire in the 10.4 kbps case and double wires in the case of
3.5 V.
the 41.6 kbps model. The maximum number of modules
The transitions between the voltage levels are achieved
or nodes, including off-vehicle equipment, is 32. This
by using transistors. When the bus is in idle state it is at
assumes that a single node is seen as a unit load, which
low or ground potential. When a node wants to transmit,
corresponds to 10.6 K∞V and 470 pF. Off-vehicle mini-
it uses the transistor to push the bus to a ‘high’ state,
mum resistance should be 10.6 K∞V and the maximum
thereby overriding any node wanting to pull the bus
capacitance should not exceed 500 pF. Another major
to a low state. Here, nodes that wish to transmit first specification is that a ‘0’ bit symbol is the dominant
sense the bus for a fixed amount of time. If they sense symbol and the ‘1’ bit symbol is the recessive symbol.
the bus to be idle, they start transmitting. If they sense the The pulses on the 10.4 kbps model are all wave-shaped.
bus is busy, they wait for a certain amount of time before The advantage of using this shape is that it rounds off
trying to start transmission once again. Let us assume the sharp edges of the bus transition, thereby removing
that a node wishing to transmit transmits a passive unwanted high frequency components. Table 1 shows
symbol. If there is no challenge, it goes ahead and trans- the VPW DC parameters.
mits the message. It has to be noted here that even during The advantage of the SAE J1850 is that it is an
transmission each bit is checked to makes sure that there open architecture. There are no stringent restrictions in
is no other node with higher priority waiting to transmit. its implementation and development, and hence it gives
This is called bit-by-bit arbitration. This process is engineers and designers sufficient leeway in develop-
carried out until only one bit is left. However, before ing applications. It is mainly used for diagnostic and
transmission, if there is a node transmitting an active data-logging functions.
symbol, the node with the passive symbol looses control
of the bus and starts functioning as a receiver. The
node with the passive symbol is then said to have ‘lost 5 IEEE 1394 PROTOCOL
arbitration’. Thus, we see why the arbitration scheme
used is called carrier sense multiple access/collision The IEEE 1394 is an up and coming bus standard that
resolution (CSMA/CR). It is called multiple access because can provide a high rate of data communication between
it is possible for multiple nodes to gain equal access to electronic devices. The bandwidth offered by an IEEE
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1222 A SHRINATH AND A EMADI

Fig. 4 DLC chip diagram

Table 1 VPW DC parameters

Parameters Symbol Minimum Type Maximum Unit

Input high voltage V 4.25 – 20.00 Volts


ih
Input low voltage V – – 3.5 Volts
il
Output high voltage V 6.25 – 8.0 Volts
oh
Output low voltage V 0.00 – 1.5 Volts
ol
Absolute ground offset voltage V 0.00 – 2.0 Volts
go
Network resistance R 315 – 1575 Ohms
load
Network capacitance C 2470 – 16 544 PF
load
Network time constant T – – 5.2 Ms
load
Signal transition time T – – 18.0 Ms
t
Node resistance (unit load) R – 10 600 – Ohms
ul
Node capacitance (unit load) C – 470 – PF
ul
Node leakage current I – – 10 MA
leak

1394 serial bus is usually from 2i to 98.304 Mbps, with are translated into data at the other end. The link layer
i taking on the values of (i=0, 1, 2, 3, 4, 5) [14]. It has is associated with addressing as well as data checking.
a 64-bit addressing system, out of which the 16 most It is in this layer that error detection takes place. The
significant bits make up the node ID [15]. Out of these transaction layer basically provides the set-up mech-
16 bits, ten bits are used for bus Ids, which give rise to anisms for communication to take place. The serial
210−1=1023 buses and the remaining six bits giving management bus has management functions associated
rise to 26−1=63 nodes. A typical application for this with it. It is linked to all three layers. Finally, the appli-
protocol is for in-car infotainment purposes. The pro- cation layer is the layer in which codes for specific
tocol stack implemented in the IEEE 1394 is shown in applications are written.
Fig. 5. The 1394 protocol supports a variety of features, such
Just like the OSI model that is used widely in the as high data rates and plug-and-play compatibility, as
TCP/IP protocol each level in the IEEE 1394 stack has well as support for asynchronous and isosynchronous
certain functions assigned to it. The physical layer is in data types [16 ]. Asynchronous data transfer is mainly
charge of sending electrical impulses on the bus, which used for guaranteed data delivery, which some protocols
such as the SAE J1850 protocols, offer (the in-frame
response). Messages are short and are mainly used for
control and setup purposes. Isosynchronous data trans-
fer is used for mass transfer of data. However, reliability
is not a major criterion in this case. Constant speed
and bandwidth are the major factors taken into con-
sideration for this kind of data transfer. Messages are
sent in the form of packets, which are sent out every
125 ms. A typical application is video streaming.
The IEEE 1394 protocol provides for automatic con-
figuration of the tree topology implemented. The three
basic steps are: bus initialization, tree identification and
Fig. 5 IEEE 1394 protocol stack self-identification. In the case of dynamically changing
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1223

IDs, the devices must implement a group of registers centralized approach, a single node handles all the tasks.
defined by the control and status register (CSR) archi- In the decentralized approach, all the administrative
tecture specification. The devices themselves are generally tasks are distributed throughout all the nodes.
of two types: low-cost devices and high-end devices [14]. A MOST network is essentially made up of MOST
The low-cost devices are usually the devices at the user interconnect, MOST system services, and MOST devices.
end of the system (e.g. air-conditioning, music system, The MOST interconnect is essentially concerned with
and motor electronics). These devices usually contain the establishment of connections between the devices
few codes and a microcontroller. The high-end devices at the start-up phase. It is also during this phase that
are usually more powerful, having a powerful processor device addresses are distributed throughout all the devices.
and universal user interface (e.g. touch screen or display Synchronization between all the nodes by means of a bit
board replete with keyboard and mouse). Such powerful pulse is achieved during this phase.
devices have uses in the field of GPS and navigation. The MOST system services are comprised of low-level
Another important characteristic of the IEEE 1394 system services. Functions such as data routing, channel
protocol is that the management functions are distri- allocation, fault detection, or delay detection are per-
buted. This means that the nodes have no master and formed by the low-level system services. The application
each node operates independently. Therefore, even if one socket and the basic layer system services make up the
part of the network ceased to function for some unfore- MOSTNetservices, which are basically concerned with
seen reason, the rest of the network would continue to the transmission and reception of different kinds of data,
function irrespective of the failure of a part of the net- as well as providing standard interfaces to access various
work. Main applications include the avionics industry to network management functions. MOST devices can vary
handle CNI waveforms, industrial cameras for industrial from simple displays to complex applications. They have
inspection systems for quality control, and multimedia the capability of bandwidth allocation, as well as packet
applications in automobiles. and control data capacity handling. Figure 6 illustrates
the implementation of a MOST device in a typical
configuration.
6 MEDIA ORIENTED SYSTEM TRANSPORT The data types supported by MOST are control data
(MOST ) and bursty data. All the transactions taking place on the
MOST network involve the generation of a synchronous
The development of the MOST network [16 ] stemmed frame by a frame generator or timing master. Each node
from the need for a peer–peer network that had high has an internal timing device that locks onto this signal
data speeds, but was also cost effective. The MOST net- by means of a phase-locked loop (PLL). By locking
work was essentially designed to be used for multimedia onto this synchronization frame, all the nodes are
applications in the automotive environment; however, synchronized to the timing master.
due to its efficiency, it is increasingly being used for home MOST networks are designed to use fibre optical
networks too. Also, the implementation of optical fibres cables as the medium of transmission. Therefore, the
at its physical layer ensures high reliability under adverse network is designed to accommodate all the possible
circumstances. Some of the key features of the MOST complex topologies that can implement applications
networks are ease of use, cost effectiveness, availability based on fibre optical cables. This provides enhanced
of synchronous and asynchronous data transfer mode, capacity, as well as security features. It also enables the
flexibility, and a wide range of applications. MOST network to support the plug-and-play mode of
As pointed out before, the MOST network is a peer– operation. The signal lines that compose the physical
peer network. The point-to-point network connection structure are RX-receive data and TX-transmit data.
can be established using either of the ring, star, or daisy- Other optional lines are power, ground, and wake-up.
chain topologies. Two approaches can be used for As the name suggests, the wake-up line is used for
administrative tasks: centralized and decentralized. In the waking-up the target device. In this network, each node

Fig. 6 MOST device in a typical configuration

D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1224 A SHRINATH AND A EMADI

has a set of functions that are to be carried out. The


most important ones are: synchronization, managing data
flow, decoding addresses, detection of system start-up,
and power management.
These are the functions that are implemented in each
node. However, the software too has many functions
that are important. Some of them are: physical address-
ing, channel allocation, control, data transfer, packet
data transfer, and system monitoring.
Since this network can support real-time data trans-
mission, it can be used for networking CD audio drivers,
set-top boxes, and TV sets. Current MOST technology
can support over 12 uncompressed stereo CD quality
audio channels at the same time or 12 MPEG1+ audio Fig. 7 An implementation of x-by-wire system for steering
channels or several MPEG2+ audio channels. It can and braking systems
also be used for networking multimedia at homes, for
example multiroom audio and video devices.
In the automotive field, MOST is applied for The entire architecture of the x-by-wire system is based
implementing infotainment networks. Data, such as door on a time-triggered approach. Here, all the activities are
status or illumination property signals, are transmitted carried out at specific instants of time. Time is divided
to the body control module using MOST technology. into slots of equal duration. For each time slot, there is
a specific task assigned. All the nodes are synchronized
to one global sense of time. This is achieved by the trans-
7 X-BY-WIRE mission of a synchronization pulse by a master node.
This pulse is periodic in nature.
The automobile industry is always concerned with safety- At specific instants of time, all the sensors capture
related issues. It is always trying to develop methods their measurements, which are, in turn, transmitted on
that keep increasing safety standards, for example, the bus. These measurements are used to update certain
intelligent driver assistance. However, such systems need variables. The new values overwrite the old ones. These
to be computer-controlled to deliver maximum efficiency. new values are then used for control applications.
With this comes the need to replace all the mechanical A main feature of the x-by-wire system is what is known
or hydraulic backup with electric/electronic components. as composability. It means that whatever properties
This can only be done when it has been ascertained are exhibited by subsystems, the same properties are
that the systems that are replacing the mechanical or exhibited by when the various subsystems are integrated
hydraulic backups are very safe. Such systems are known to offer some function or application. Another important
as x-by-wire [17] systems. A consortium comprising feature is the ability of the system to handle errors that
Daimler-Benz, Centro Ricerche Fiat, Ford Europe, are generated when nodes ‘talk’ during a slot that is not
Volvo, Robert Bosch, Mecel, Magneti Marelli, the allotted to them. This node is known as a ‘babbling
University of Chalmers, and the Vienna Institute of idiot’. This error can be avoided because, in a time-
Technology has carried out work in this field. Examples triggered system, it is known beforehand which node is
of this kind of system are steer-by-wire and brake-by- supposed to transmit at which time interval.
wire systems. Figure 7 illustrates a typical application of The bus access is controlled by a TDMA scheme.
an x-by-wire system. Broadcast topology is used. As mentioned before,
The system is comprised of actuators and sensors con- information regarding which node can transmit at which
nected to the ECUs. The sensors and actuators are used interval is stored in the memory. This information is
for taking measurements, which are, in turn, fed to the stored in every node locally. Every node is supposed to
ECUs for driver feedback. Based on the measurements follow this timetable. The protocol used is the time-
taken, the driver can make suitable modifications, which triggered protocol/class-C (TTP/C ).
are then relayed to the actuators for implementation. The node architecture is based on what is known as
It must be ensured that the measurements taken are a ‘fail-silent’ mode of operation. This means that if a
always accurate. If the readings taken by the sensors are node is detected as having an error, it is asked to stop
not accurate or the response of the driver given to the transmission. This is done so that the erroneous node
actuator is not accurately interpreted, it could lead to does not interfere with the normal performance of the
very serious losses. Another problem with implementing network. Sometimes, two nodes are used as a pair for
this technology for mass production is its economic fault tolerance. If one node has gone silent, then the
feasibility. In addition, associated with this technology other node can continue to perform the task in an error-
are problems such as reliability and maintainability. free way. This technique has many distinct advantages.
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1225

First of all, the need for complex circuitry to implement economical compared to protocols such as CAN. How-
other fault-tolerant mechanisms is avoided. Second, ever, this advantage is negated by its inherent limitations,
combined with software fault detection, the fail-silent such as low bandwidth and performance, and the single
architecture would be able to cover the entire range of master topology of the network.
possible errors comprehensively. Third, this mechanism There are quite a few criteria that have to be taken
can be tested to test its full functionality. into consideration when a network is designed. Factors
Each ECU, as mentioned before, is made up of some such as bandwidth, security, latency, electromagnetic
sensors and actuators. It must be ascertained that in a interference, fault tolerance, and cost should be balanced
node comprising two ECUs there should not be any in order to design a network to suit the requirements.
disparity in the decision finally taken. This may mean There are, basically, two different approaches that could
that each ECU exchanges sensor values with the others be taken to design a network. One approach is to divide
on the common bus, so that a common decision is the sensors and actuators in a zonal manner, connected
reached. An alternative to using the common system bus to a central ECU. Various main ECUs are connected to
is using a sensor bus. Also, if digital sensors are used, each other by CAN links. This extensive use of CAN
each ECU will have the same values. If the two ECUs is to enable the usage of high bandwidth for signal
are located far way from each other, then the sensors exchanges. The other approach is to totally abolish the
are connected to the closest ECU. If, on the other hand, zonal concept. Here, all the actuators and sensors are
they are situated close to each other, then the sensors connected to the central ECU by means of LIN links.
may be connected to the ECUs by means of a sensor This has the advantage of being scalable. No major
bus as mentioned above. Figure 7 demonstrates the changes have to be done to the network in order to
concept of implementation of a X-by-wire system in a accommodate additional nodes.
vehicle. As mentioned before, LIN is based on the SCI
The software model consists of two layers: the system ( UART ) byte word interface. The network has a single
software layer and the application software layer. The master/multiple slave topology [19]. All the slaves have
system software layer is used to provide services to the job of transmitting and receiving. The master node,
the application software layer. Services such as fault apart from the task of transmission and reception, has
tolerance and detection are implemented in the system the additional task of maintaining the synchronization
software level. The language used to write codes is in the network. This is done by means of a message
the ANSI C subset with certain modifications, such header, which consists of the synchronization break,
as exclusion of certain error-prone constructors and synchronization byte, and a message identifier. The
inclusion of exception handling. Efficient design, higher message identifier is used by the nodes to identify the
fault tolerance, ability to be tested, and easy-to- messages meant for them. Each identifier is unique to
synchronize are the main advantages. The x-by-wire the node. This way the node knows the messages meant
system is being developed by the European Consortium for it. It has to be remembered that the message identifier
to provide a standard that is accepted all over Europe indicates the content of the message and not the
for the development of intelligent driving aids for destination. Once the node has received the message
drivers. meant for it, it then sends back a response that contains
data with the size ranging from two, four, or eight bytes
of data with one checksum byte. One message frame
8 LOCAL INTERCONNECT NETWORK consists of the header and the response parts.
Each message frame is made up of a byte field, which
Local interconnect network (LIN ) [18] is a com- has ten bits. These ten bits include a dominant ‘start’
munication protocol that has been established for auto- bit, eight bits of data, and a recessive ‘stop bit’. The
mobiles. This protocol is based on the SCI ( UART ) message frame consists of the header sent by the master
data format with a single master/multiple slave archi- node and the response sent by the slave node. The header
tecture. A consortium formed in 1998, comprising Audi, sent by the master node consists of synchronization
BMW, Daimler Chrysler, Volvo, Volkswagen, VCT, and break, synchronization field, and the identifier field.
Motorola worked on establishing a specification for this Each message frame is built on the 8N1-coding scheme.
protocol. The synchronization break must be a minimum of 13 bits
The development of LIN was based on the necessity for in length to ensure proper synchronization. The syn-
a communication protocol that was very cost effective chronization field is a string of bits with an equivalent
and not only addressed the issue of the specification for hexadecimal value of 0×55. With this type of syn-
communication, but also other issues like signal trans- chronization pattern, it is possible for nodes not
mission, programming, and interconnection of nodes. It equipped with quartz stabilizers to resynchronize them-
basically takes an all-round approach for the develop- selves. There are basically two levels of synchronization
ment and consolidation of an automotive protocol. that are defined for the LIN network: unsynchronized,
The basic advantage that LIN enjoys is that it is very in which the slave clock time differs from the master
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1226 A SHRINATH AND A EMADI

clock time by less then ±15 per cent and synchronized, Bluetooth is implemented in devices by way of small
in which the slave clock time differs from the master chips. It uses a shortwave radio signal that is always on
clock time by less than ±2 per cent. for signal transmission purposes. It creates what is
There are four identifiers reserved for special purposes. known in the technical terms as an ‘ad hoc’ network [21].
Out of the four identifiers, two are used for uploading The participants in this ad hoc network are the slaves
and downloading purposes. The only way they differ from and the masters present in the entire network. Each
the normal data frame is that in these frames, instead of master and slaves form what is known as a ‘piconet’.
data, there are user-defined command messages. The This, basically, represents an area of active participation
other two special identifiers are used for ensuring upward by one master and one or more slaves. A slave can
compatibility with the future versions of the LIN pro- participate in any number of piconets, but a master can
tocol. These identifiers are called extended identifiers. belong to only one piconet. The topology is also called
There are three types of communication mode that are the scatternet topology. Each piconet has its boundary.
supported: master to slave or multiple slaves, slave to There is at least one slave acting as a bridge between
master, and slave to slave: the slaves can talk to each two piconets. Each piconet has its own characteristic
other without routing the transmission through the transmission frequency, also, since each piconet uses its
master. This is illustrated in Fig. 8. own transmission frequency, each piconet is uniquely
A typical LIN network has a single master with as identified by the hopping pattern used for transmission.
many as 2–10 nodes contained in the network. Typical The master of that particular piconet determines the
data speeds range from 2.4 kbps to 19.6 kbps. The volt- hopping pattern.
age level that can be supported by the buses is around The spectrum of Bluetooth lies in the unlicensed
13.5 V. Each data frame contains 2–8 bytes of data with industrial, scientific, and medical (ISM ) band. The fre-
a six-bit identifier. Single-wire transmission, low cost of quency ranges from 2.4 GHz to 2.483 GHz. A number
implementation, and no resonators are the advantages. of multiple access schemes are used. The most widely
Low bandwidth and a single-bus access scheme are the used schemes are the time division multiple access
main disadvantages. LIN is usually used for door and (TDMA), frequency division multiple access (FDMA),
roof control, as well as for the steering wheel and column. and code division multiple access (CDMA). A total of
Other implementations include smart wiper motor, 79 hop frequencies have been defined spaced 1 MHz
sensors and switch panels, seat control, and heating. from each other in the United States. However, in
France and Spain, instead of 79, there have been only
23 hop carriers defined. This protocol supports both the
9 BLUETOOTH synchronous connection oriented (SCO) link as well as
the asynchronous connection-less (ACL) link.
Bluetooth [20] is a wireless communication standard The Bluetooth baseband model is the intelligent
that has been developed for networking small devices core of communication. The functionality of the module
such as printers, palm pilots, and mobile phones. It was depends on the kind of the application. Simple appli-
initially conceived by Ericsson in 1994. Since then com- cations can be run on the baseband processor, whereas
panies such as Nokia, IBM, Intel, and Toshiba have complex applications are run on the host processor.
joined it in its research efforts and in 1998 formed what Therefore, the module should be very flexible in terms
is known as the Bluetooth Special Interest Group (SIG). of load sharing; it must be able to accept any load at
Currently, about 2000 companies are part of the SIG any point of time. Efficient usage of resources is a prime
and are developing Bluetooth-related products. issue to be considered when designing a module. There
are several modules that have been developed. But, their
usage has been hampered by the fact that they are large
due to huge hardware. All the functions are performed
by this hardware block instead of the microcontroller.
This leads to a waste of the microcontroller. Therefore,
the modules that existed so far were inefficient. However,
to increase the efficiency of the module it is possible to
transfer a lot of functionality to the microcontroller, with
the hardware blocks implementing only essential hard-
ware functions. The basic block diagram of a module is
shown Fig. 9.
The microcontroller is used for controlling other units,
as well as controlling some link control protocols. The
baseband unit is entrusted with the task of encoding
and decoding bit streams, as well as control of the RF
Fig. 8 Data communication in LIN module. The USB and UART blocks are used for
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1227

it is very difficult to integrate different applications on a


common network. With the employment of Bluetooth,
it is possible to integrate various networks on the back-
bone that Bluetooth offers. This can lead to exciting new
applications. A mobile environment like a car can then
be turned into virtually a mobile office station where
office work, such as e-mails or file transfer, can take
place; a mini theatre where a mini screen in the car can
play a movie being broadcast with a touch of a button
on a keypad, which acts like a wireless remote control;
or it could be a simple application like browsing
the internet and booking an airline ticket online. The
possibilities are tremendous. What remains to be seen is
Fig. 9 Bluetooth baseband module
the efficiency of this technology. With so many devices
linked by radio and so many applications, the question
implementing the host control interface (HCI ) and the of efficient bandwidth utilization and security issues, to
physical layer. The audio CODEC, as the name suggests, name but two, have to be answered.
is used for audio coding and decoding as well as support- It must be mentioned that Bluetooth would initially
ing both the A-law and the m-law modulated schemes. be applied to safety-uncritical applications in and around
the car, for example, communication and infotainment
applications, or applications that involve exchange of
9.1 Bluetooth in vehicles
pure car-specific information (control and status data of
Automotive manufacturers have to deal with problems the body electronics). Inside the car, Bluetooth allows the
arising from the use of wiring of electronic parts, including wireless connection of various car-embedded electronic
networking, power efficiency, weight factor, and shrink- devices, such as control panels and headsets, with
ing layout space, as well as assembly-line difficulties to other car-embedded electronic devices. However, beyond
name but a few. There is a wide range of automotive replacing wires between in-car devices, the scope of
networks, reflecting defined, functional, and economic Bluetooth in the automotive industry is to ensure inter-
niches. High bandwidth networks are used for vehicle operability between wireless devices (e.g. mobile phones
multimedia applications, where cost is not critical. and PDAs), and car-embedded devices (e.g. car navigation
Reliable, responsive networks are critical for real-time systems, car radio, and car-embedded phones). The main
control applications, such as powertrain control and principle here is to allow devices to cooperate and share
vehicle dynamics. Not only can Bluetooth be used for resources and during almost the entire time, access the
control applications, it can also be used to network car-embedded system through mobile devices. This is
multimedia devices. Vendors have envisioned a scenario implemented by the way of a central control unit (CCU )
where it is possible to obtain data from a PDA, as well as [23]. Apart from controlling various devices in the car,
control multimedia operations in a car via a Bluetooth- Bluetooth can be used in car–car communication, as
enabled cellular phone [22]. Applications running on well as in other Bluetooth-enabled devices near the car’s
voice recognition can also be added on for applications environment. The exchange of data between the car and
such as banking or shopping online, which can then be stationary facilities provides a base for various special
implemented using Bluetooth technology. Therefore, application scenarios, e.g., access of traffic information
using this technology the car can be made into a virtually or e-commerce applications at designated ‘‘access points’,
moving office. As mentioned before, there are many or download of software for car electronic systems for
applications that can be supported in a vehicle. Each service stations. Listed below are some of the appli-
application demands a different kind of a network for cations that are envisaged for Bluetooth in the near
the devices implementing that particular application. future [24].
The reason is that every application may have varying
demands of bandwidth, security, and reliability. Anytime information. With this kind of information
Connectivity and connection with the world outside service, users receive data via broadcast or multicast.
the car enable new applications. Vehicles can make use The main advantage of these services is their ‘always on’
of various communication networks available outside nature, such that services can be accessed without any
the car from communication services to applications setup effort. Moreover, data carousels allow starting
inside the car. It is at this conjuncture that Bluetooth reception at any time. A certain casting service may be
comes into the picture. The problem with the existing offered in large areas or in limited areas only, according
networks for a mobile environment like a car is that to the coverage of the broadcast program. In this way,
there are so many networks involved, each one having it is subject to variation along the travelling route of the
its own data transmission rate and characteristics, that automobile. The received information can be displayed
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1228 A SHRINATH AND A EMADI

immediately or can be cached for later retrieval. Broad- Services should thus be aware of the current context.
cast services may include the local weather forecast, Furthermore, location awareness is an important factor
updates about the local traffic situation, or advertise- for service provisioning.
ments for local events like movie trailers of currently
playing cinema programmes. Also, entertainment services, Car production. In the car production system, a lot of
such as broadcasts of regular television programmes (for software is downloaded as a final step in the production
backseat passengers) fall into this service category. line. This is an application where Bluetooth is really well
suited [25]. A Bluetooth base station is connected to the
Information push. The main difference between infor- product field bus. When the car online gets connected
mation push and casting is that users must subscribe to the Bluetooth base station, it uploads its serial
to push services. Notification of an incoming personal number. The production computer then downloads the
fax, a customized stock market report, or updates of a software via the field bus to the base station, which is
user’s car software are applications for information push. then uploaded to the car. However, this is a dedicated
This personalization requires addressing mechanisms for application and no other Bluetooth-enabled device
individual users and devices. should be connected to the cell.

Car diagnostics. The first application of Bluetooth


Data retrieval. To request information that is not
technology in the automotive industry will perhaps be
present within the automobile system or not delivered
for car diagnostics [26 ]. Here, without the need for
automatically, a bi-directional wireless link has to be set
electrical connection of devices, the factory environment
up. Data retrieval can mean broadband applications
would be able to monitor the car equipment and perform
(e.g. video streaming to view multimedia presentations
diagnostic experiments. The software for such appli-
about a destination). In addition, route information may
cations also would be downloadable into the car from
be requested by the navigation system. An example of a
any stationary station that is Bluetooth-enabled and
convenient low bandwidth service is wireless access to
hosts the software.
music CD recognition systems, which automatically
download the track titles of a CD from a database on
Toll payment. Bluetooth has the capability to enhance
the internet. In most application cases, data retrieval has
the existent automatic toll payment methods and to
a strongly asymmetric character.
advance the widespread standardized adoption of such
systems. When a vehicle already contains a Bluetooth
Transparent access to the internet and intranets. A transponder, all that is needed is the system software to
transparent IP connection to the internet is required be upgraded, which can be done in the method mentioned
to make the car part of the internet. Business people, above. After the system software has been upgraded,
for example, should be able to access their corporate various other applications can be implemented, such as
network for mobile office applications (e.g. e-mail ). parking meter systems and parking access systems.

Telecommunication services. Common telecommunication Filling station. An interesting application of Bluetooth


services that rely on cellular systems (real-time conver- can be envisaged at a gas filling station. Here, the
sational services) also have to be an integrated part of the make and model of a car, as well as its tank capacity
services accessible from a vehicle. Telecommunication and other characteristics, can be downloaded to a
services will comprehend not only common voice ‘robotic’ attendant. The filling station then can transmit
telephony, but also broadband communication services, certain diagnostic parameters, such as oil pressure or
such as multimedia video conferencing. All these service tyre pressure, to the vehicle driver along with certain
types are well known from non-car-specific com- suggestions or in the simplest case can transmit certain
munication situations. However, using them in a car special offers that the vehicle driver can make use of.
environment produces some specific requirements for
service execution. Besides the physical availability of the Non-safety critical control systems. Bluetooth can be
communication infrastructure, services must be aware of used for providing control networks to various non-
some other factors in the vehicular environment. Car safety critical devices, such as trunk release, seat move-
applications mostly have varying users, for example, ment, door module, and rain sensors, to name but a few.
alternating drivers and different passengers using various Additionally, with the help of Bluetooth, cables that
terminals, especially with corporate car fleets and rental traverse moveable interfaces, such as those between
cars. In this case, services should be aware of the car bonnets, trunks, doors, steering wheels, road wheel,
user’s profile and provide possibilities for its storage and and the vehicle frame, may be replaced. Also, complex
retrieval. Furthermore, the specific driving situation interfaces like those on the dashboard can be eliminated
(speed, traffic, time of day/year, and general driving and customizable-user interfaces could be brought into
behaviour) must be considered when executing a service. the picture.
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1229

Intra-car communication. Inside the car, there are a hostile environment, because failure of these systems
host of devices that would be helpful to the driver (e.g. could affect the overall performance of the subsystems
navigation systems). A car driver might wish to bring in the vehicle.
his or her mobile devices and connect them to the car
network. As an example, the address of a business
partner could be stored in a PDA. After the address has 10 CONCLUSION
been fed into the car navigation system, the system may
suggest the route which may take the shortest time, based In summary, network and communication technologies
on the weather and traffic-related data, which would are set to become a standard in cars in the near future.
already have been downloaded by the navigation system. However, it must be remembered that these are still
Also, the sound system and movie screens can be used emerging technologies where possibilities of improvement
for various applications. are still large. Even in its nascent stages, implementation
of these technologies would require the passing of
stringent and complete tests certified by the automotive
With the implementation of Bluetooth technology, industry to demonstrate their safety. In areas that are very
there would be elimination of cables, which would con- safety-critical, the performance of these technologies and
tribute towards a major reduction in the overall weight devices should be flawless in tough environments. It has
of the car. This, in turn, would lead to improvements in yet to be seen whether they can live up to the standards
factors such as fuel economy and emissions. Devices that expected.
previously needed wires for interconnectivity can now
communicate with each other via a wireless link, without
the need of cables between them. Furthermore, there REFERENCES
could be interconnection between devices not only in
the same subsystem of the automobile, but also devices 1 Leen, G. and Heffernan, D. Expanding automotive
belonging to various other subsystems in the same auto- electronic systems, Comput. Control Eng. J., 2002, 35(1),
mobile. This, in effect, provides a seamless connectivity 88–93.
between devices. In addition, since Bluetooth is a wire- 2 Leen, G., Heffernan, D. and Dunne, A. Digital networks in
less-based communication system, it is highly flexible automotive vehicle, Comput. Control Eng. J., 1999, 10(6),
and can also be modified without much difficulty [27]. 257–266.
It is possible to add and remove nodes from the network 3 Kopetz, H. Automotive electronics. In Proceedings of the
1999 Euromicro Conference on Real-Time Systems, 1999,
without any difficulty at all.
York, UK, pp. 132–140.
Even though Bluetooth is a versatile technology, it has 4 Navet, N. CAN use in automobiles, IEEE Potentials,
its own limitations. There are inherent inadequacies that Oct./Nov., 1998.
make practical implementation of this technology seem 5 CAN 2.0 specification, 2003, http://www.can-cia.de/.
difficult. In an environment where data transfer takes 6 Fars, M., Ratcliff, K. and Barbosa, M. An introduction to
place almost all the time, the issue of privacy is foremost CAN open, Comput. Control Eng. J., 1999, 10(4), 161–168.
in everybody’s mind. In the above-mentioned appli- 7 Xing, W., Chen, H. and Ding, H. The application of
cations, we took the example of a PDA communication controller area network on vehicle. In Proceedings of the
with a car navigation system. The possibility of data in IEEE International Vehicle Electronics Conference, 1999,
the PDA being transferred to an electronic logbook Changchun, China, vol. 1, pp. 455–458.
8 Leen, G. and Heffernan, D. Time triggered controller area
in the car is possible. In such scenarios, almost anyone
network, Comput. Control Eng. J., 2001, 12(6), 245–256.
can access this data. This problem can be overcome in
9 Führer, T., Müller, B., Dieterle, W., Hartwich, F.,
the following way. If any Bluetooth device, in our case Hugel, R. and Walther, M. Time triggered communication
the PDA, has an address akin to the IP addresses issued on CAN (Robert Bosch GmbH ), 2003, http://www.can-
to computers connected to the internet, the owner can cia.de/.
then add that particular address to the piconet environ- 10 TTCAN IP Module, 1998, http://www.can.bosch.com/
ment, so that now the devices know that they are content/.
communicating with a legitimate device. 11 Wiegand, B. SAE J1850 class B data communication net-
Since this technology involves a lot of electronic works interface. Communication Standards for European
devices, the conditions existing in the operating environ- On-Board-Diagnostics Seminar, 1998, ref. no. 1998/294,
ment should be taken into consideration. Equipment IEE, pp. 5/1–5/9.
12 Oliver, J. Implementing the J1850 protocol ( Intel
would be subjected to various mechanical vibrations,
Corporation), 2003, http://www/intel.com/design/intarch/
temperature swings from −40 °C to +80 °C, splashes of papers/j1850_wp.htm.
petrol, water, and potential miswirings can lead to short 13 Lupini, C. A., Haggerty, T. J. and Braun, T. A. Class 2:
circuiting of essential systems, load jumps, jump starts, General Motors’ version of SAE J1850 Proceedings of the
electromagnetic fields, and voltage spikes [28]. These 8th International Conference on Automotive Electronics,
electronic systems must be enabled to tolerate such 1991, London, pp. 74–78.

D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1230 A SHRINATH AND A EMADI

14 Rabel, M., Schmeiser, A. and Grossmann, H. P. Integrating 20 Wireless technology resources: Bluetooth, 2003, http://
IEEE 1394 as infotainment backbone into the automotive www.palowireless.com/.
environment. In Proceedings of the 2001 IEEE 53rd 21 Haarsten, J. C. The Bluetooth radio system, IEEE Pers.
Vehicular Technology Conference, 2001, Rhodes, Greece, Commun., 2000, 7(1), 28–36.
vol. 3, pp. 2026–2031. 22 Bretz, E. A. The car: just a Web browser with tires, IEEE
15 Baltazar, G. and Chapelle, G. P. Firewire in modern Spectrum, 2001, 38(1), 92–94.
integrated military avionics, IEEE Aerosp. Electron. Syst. 23 Fredriksson, L. B. Bluetooth in automotive applications. In
Mag., 2001, 16(11), 12–16. Bluetooth Technology Conference, 2001, San Francisco.
16 Scholles, M., Frommhagen, K., Kleinmann, L., Nauber, P. 24 Kellerer, W., Bettstetter, C., Schwingenschlogl, C. and
and Schelinski, U. IEEE 1394 firewire system for industrial Sties, P. (Auto) mobile communication, IEEE Pers.
and factory automation applications. In Proceedings of Commun., 2001, 8(6), 41–47.
the 8th IEEE Conference on Emerging Technologies and 25 Fredriksson, L. B. Bluetooth in automotive diagnostics. In
Factory Automation, 2001, 2, 627–630. Bluetooth Technology Conference, 2001, San Francisco.
17 MOST Specification Framework, 2003, 26 Wunderlich, H. and Schwab, M. (Daimler–Chrysler R&D,
http://www.mostnet.de/. Germany) and Fredriksson, L. B. ( KVASER, Sweden).
18 Kopetz, H., McCall, G., Mortana, P., Dilger, E., Potential of bluetooth in automotive applications. In
Johansson, L. A., Krug, M., Lideñ, P., Müller, B., Bluetooth Technology Conference, 2000, Geneva.
Panizza, U., Poledna, S., Schedl, A., Södenberg, J., 27 Wunderlich, H., Schwab, M., Fredriksson, L. B. and
Strömber, M. and Thurner, T. Towards an architecture Nikola, M. Bluetooth in automotive industry: enabling
for safety related fault tolerant systems in vehicles, effortless connectivity between devices. In Bluetooth
http://www.vmars.tuwien.ac.at/people/kopetz.htm/. Technology Conference, 2000, Geneva.
19 Specks, J. W. and Rájnak, A. LIN protocol develop- 28 Nüsser, R. and Pelz, R. M. Bluetooth based wireless con-
ment tools & software interfaces for LIN in vehicles. nectivity in an automotive environment. In Proceedings of
In Proceedings of the 9th International Conference on the 52nd IEEE Vehicular Technology Conference, 2000, 4,
Electronic Systems for Vehicles, 2000. 1395–1942.

Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004

Вам также может понравиться