Академический Документы
Профессиональный Документы
Культура Документы
Abstract: The last decade has seen a resurgence of advanced technologies being implemented in
automobiles. Functions that were considered highly complex and difficult to be implemented are not
only being provided but various other facilities are also being built on those very functions. Everything
from engine control to multimedia and infotainment services are implemented in today’s automobiles.
This has been due largely to the strides made by the electronics as well as the communications
industry. The emergence of the concept of providing the customer with all possible services has led
to an explosion of implementation of high-end electronics, each providing a facility of its own. When
so many devices are being embedded in a car, there also has to be a mechanism that should regulate
the way in which data transfer takes place. It is the objective of this paper to provide an insight into
most of the communication protocols that are being used, as well as technologies that are under
development in the automobile industry of today. Various protocols and their modus operandi are
explained, with schematics completing the picture.
1 INTRODUCTION
It also makes it possible to integrate different networks. (SAE) Congress. The CAN protocol is based on the
This will increase the functionality of already existent principle of broadcast transmission technique. It is
systems. The high data rates available today (they vary basically a communication technique in which data to
from a few kbps to a few Mbps depending on the net- be transmitted on a network is sent to all the nodes
work used) make it possible to implement such seem- including the one to which the data is intended. The
ingly simple networks for real-time control systems. To nodes look inside the data packet to see if the message
implement these networks in the safety critical systems was meant for them. If not they simply discard the
of a car will take some time, because a failure of these packet. The node to which the data was intended then
networks might result in loss of human life, a matter of downloads the data and processes it [4].
very grave concern. Such networks are, however, already Some of the features that have made CAN so popular
in use in many places in a car, such as multimedia, doors, are speed, data length, and event-triggered mechanism.
seat adjustments, and trunk release. The speed of data transmission in a CAN network can
According to current estimates, some 20 per cent go up to 1 Mbps. This is very helpful in real-time control
of the total manufacturing costs for automobiles is systems that can afford very low latency. Thus, due to
attributed to electronics. These electronic devices or the high speed offered by CAN, low latency and, hence,
electronic control units (ECU ) are generally in a single time-efficient control can be achieved. CAN frames are
chip, 8-bit microcontroller with around 100 B of RAM, also short in length, owing to which there is minimal
32 kB of ROM, few I/O pins to connect to sensors and delay in the reception of messages.
actuators, and a network interface [3]. They can be CAN is basically an event-triggered mechanism. This
broadly classified into two categories: body electronics means that the transmission of data is prompted only
and system electronics [3]. when a specific event occurs. For example, data trans-
Body electronic devices are responsible for those mission might take place when a button is pressed or a
operations not directly related to the movement of lever pulled. Owing to this property, the bandwidth
the vehicle. Examples include theft avoidance systems, available is made maximum use of because of the mini-
air-conditioning control, audio equipment control, seat mum load put on the bus system. The combination of
adjustment, window control, and air-bag control. Another high speed and short message length results, therefore,
interesting concept is keyless access to the vehicle. The in a low delay, owing to which CAN can be implemented
user simply has a card-like device. Sensors in the car in control systems that have a very low tolerance for
detect the card and automatically unlock the doors. The delays. The addressing system is based on message
user then sits and simply has to press a button to start identifiers rather than physical addresses for nodes.
the engine, rather than the conventional way of putting Every CAN message has a unique identifier that assigns
the key into the ignition and turning it. System electronic a priority to the respective message based on the binary
devices, on the other hand, are directly involved with value of the identifier. A lower binary value is assigned
the movement of the car. The most important impacts a higher priority and vice versa. Any node wishing to
have been in computerized engine control and anti-lock transmit sends the message to the CAN controller, which
braking systems (ABS). Another application that has in turn broadcasts the message. All the other nodes then
seen the implementation of computerized control is get ready to receive and the nodes that have no use for
transmission control. the message discard the message.
The main advantage of using ECUs and networking
them is that they give scalability and functionality.
Automotive electronic devices not only replace mech- 2.1 CAN arbitration
anical systems, they also help in integrating other systems.
We shall now proceed to discuss the various protocols A problem that arises in a network is the problem of
that are used for the control of the transmission of data collision avoidance. There could be a possibility that
between devices. with so many messages going around in the network
messages could collide, which could lead to a loss of
messages. CAN overcomes this by a simple method
known as carrier sense multiple access/collision detection
(CSMA/CD). In this method, the nodes first listen to the
2 CONTROLLER AREA NETWORK (CAN ) bus to see if it is free and then they transmit.
the reference message contains about four bytes of con- length. A counter Cycle_Count is used to indicate the
trol information with the other four bytes being usable number of the current basic cycle. It is incremented by
for data transfer. one every time a basic cycle is completed. Apart from
The advantage that it enjoys over CAN is that during the exclusive and arbitrating window, another window,
its operation cycle, TTCAN permits the transmission known as the Tx_Enable, is used. This is contained
of the regular time-triggered messages as well as event- within the exclusive and arbitrating windows. It is used
triggered messages. Certain time slots are reserved for to indicate to the node the time at which it is supposed
the event-triggered messages. For example, x-by-wire to start transmitting. This is done so that the message
systems, which integrate sensors and actuators for per- following the current one may not be delayed due to the
forming certain critical real-time control functions, need delayed transmission of the current message.
TTCAN. This leads to a predictable behaviour of the The time unit used in any network transaction in the
network, which is very important owing to the distri- TTCAN network is known as the network time unit
buted architecture of many networks. A distributed (NTU ). It can be either a CAN-bit duration in the level 1
network consists of many subsystems organized into TTCAN or a fraction of a second when implemented in
subnetworks. Each subnetwork may be implementing a the level 2 TTCAN. A message state counter (MSC ) is
different protocol. Therefore, a protocol that clearly attached to every message transmitted or received. An
defines the transmission procedure to be followed at error to this message is responded to by an increment in
well-defined time slots would clearly reduce the com- the MSC. A node then flags an error if either the MSC
plexity of the network, as well as utilize the available reaches a value of seven or the difference between two
bandwidth fully. In addition, it would reduce the time MSC is greater than two.
required, however small, for the arbitration procedure Implementation of the TTCAN protocol is handled
in the CAN that grants the nodes access to the bus by the TTCAN IP module, which implements not only
for transmission of messages. It would also reduce the TTCAN protocol (ISO 118998-4) but also the CAN
the probability of a message with low priority being protocol (ISO 11898-1) [10]. Bit rates of up to 1 Mbps
restrained from transmitting that message for a long time. are achievable by this module. All the requirements of
Many of the subnetworks in up and coming cars will a time-triggered network, including global time syn-
be highly crucial for the safety of the car, for example, chronization and clock-drift compensation, are provided
the x-by-wire systems being implemented in cars. In these by this module. Message objects and message masks are
systems, the control of the car would be decoupled from stored in the message RAM for operation in a CAN
the process to which it is attached [9]. Therefore, in these network. For TTCAN networks the trigger object is
cases, the deterministic nature of the network, as well as stored in the trigger RAM. The message handler handles
its reliability to deliver messages to sensors and actuators all message-handling instructions. It is possible to change
on time, is very essential. the message handler core as well as certain other cores
Figure 3 illustrates the communication model adopted by having an interface card connected to the module and
by TTCAN. The matrix cycle essentially describes the an external CPU.
transmission schedule of the entire network. It defines In summary, with the addition of a session layer to
which node should be transmitting at any given instant the protocol stack of a CAN network, it is possible to
of time. In this way, each node knows when exactly it have a time-triggered model of the CAN that lends
is supposed to transmit. The matrix cycle is repeated flexibility as well as a deterministic behaviour to the net-
over time. Each basic cycle consists of several exclusive work. This fact will be exploited by systems such as x-by-
and/or arbitrating and free windows. This structure is wire in the future. Slowly, such networks would be added
highly column oriented. Each column in a matrix cycle to the existing mechanical and/or hydraulic back-ups to
is known as a transmission column. All the windows ensure the complete safety of the operating control
belonging to a single transmission column are equal in system. The advantage of using a time-triggered archi-
tecture is that the system would not be overloaded with
events. This would take additional circuitry to resolve
pending scenarios.
in a conventionally wired vehicle’ [11]. Class-B networks the bus. The priority of the messages is indicated by bits
are essentially used for communicating between modules in the beginning of the messages. A CRC is implemented
supporting a data transfer rate of around 100 kbps. in the protocol for error correction [12].
Though this data rate is insufficient for real-time safety Once the transmitting node has finished transmission,
critical processes, class-B networks are ideal for non- the nodes that had lost arbitration try again to gain
real-time control processes and communication. access to the bus and the whole arbitration procedure is
The SAE J1850 protocol is based on a bus level repeated again. Invariably, it is seen that nodes that have
topology wherein the bus is a masterless peer-to-peer more active symbols in the starting of the message com-
protocol. Just like the CAN network, messages are pared to others gain access to the bus earlier than the
broadcast in the sense that whatever messages have to other messages. However, it must be stressed that, due
be sent are sent in the form of frames to all the nodes, to the nature of the bus access, it is impossible to specify
irrespective of the desired destination. instants of time at which certain nodes can transmit or
This protocol supports two modes. One is a 41.6 kbps receive, very much unlike the TTCAN presented before.
pulse-width modulated mode supporting a dual wire and The entire SAE J1850 protocol is implemented on a
the other is a 10.4 kbps variable pulse-width mode sup- single silicon chip. For example, the data link controller
porting a single-wire configuration. Data can be sent on developed by Delco Electronics Corporation for General
the bus by way of either time division multiplexing or Motors [13]. This chip has an 11-byte transmit first-in-
frequency division multiplexing. In time division multi- first-out (FIFO) buffer and a 20-byte receive FIFO
plexing, messages are sent on the same bus at different buffer as well as an 8-bit parallel data interface. It also
instances of time whereas in frequency division multi- has a transceiver built on. This transceiver provides a
plexing two or more messages are sent at the same time. 7 V waveform for transmission on the bus. Wave shaping
Data on the bus is transmitted by changing the amount is done to reduce RFI emissions. Functions, such as
of time each transition lasts on the bus. For example, filtering, timing, and symbol definitions, are performed
according to VPW J1850 protocol definition, a ‘1’ bit is by the logic section. The logic section includes host
a bus driven at a high potential (active) state for 64 ms interface, error detection, and correction codes, and all
kinds of logic. A diagram of the DLC chip is shown
or low potential (passive) state for 128 ms. Alternatively,
in Fig. 4.
a ‘0’ bit is defined as a bus in high potential (active) state
The total length of the network wiring is restricted to
for 128 ms or low potential (passive) state for 64 ms. A
40 m. This included 35 m of on-vehicle networking and
high potential is usually any voltage from 4.25 V to 20 V.
5 m of off-vehicle networking. The wiring itself is a single
A low potential is any voltage from ground voltage to
wire in the 10.4 kbps case and double wires in the case of
3.5 V.
the 41.6 kbps model. The maximum number of modules
The transitions between the voltage levels are achieved
or nodes, including off-vehicle equipment, is 32. This
by using transistors. When the bus is in idle state it is at
assumes that a single node is seen as a unit load, which
low or ground potential. When a node wants to transmit,
corresponds to 10.6 K∞V and 470 pF. Off-vehicle mini-
it uses the transistor to push the bus to a ‘high’ state,
mum resistance should be 10.6 K∞V and the maximum
thereby overriding any node wanting to pull the bus
capacitance should not exceed 500 pF. Another major
to a low state. Here, nodes that wish to transmit first specification is that a ‘0’ bit symbol is the dominant
sense the bus for a fixed amount of time. If they sense symbol and the ‘1’ bit symbol is the recessive symbol.
the bus to be idle, they start transmitting. If they sense the The pulses on the 10.4 kbps model are all wave-shaped.
bus is busy, they wait for a certain amount of time before The advantage of using this shape is that it rounds off
trying to start transmission once again. Let us assume the sharp edges of the bus transition, thereby removing
that a node wishing to transmit transmits a passive unwanted high frequency components. Table 1 shows
symbol. If there is no challenge, it goes ahead and trans- the VPW DC parameters.
mits the message. It has to be noted here that even during The advantage of the SAE J1850 is that it is an
transmission each bit is checked to makes sure that there open architecture. There are no stringent restrictions in
is no other node with higher priority waiting to transmit. its implementation and development, and hence it gives
This is called bit-by-bit arbitration. This process is engineers and designers sufficient leeway in develop-
carried out until only one bit is left. However, before ing applications. It is mainly used for diagnostic and
transmission, if there is a node transmitting an active data-logging functions.
symbol, the node with the passive symbol looses control
of the bus and starts functioning as a receiver. The
node with the passive symbol is then said to have ‘lost 5 IEEE 1394 PROTOCOL
arbitration’. Thus, we see why the arbitration scheme
used is called carrier sense multiple access/collision The IEEE 1394 is an up and coming bus standard that
resolution (CSMA/CR). It is called multiple access because can provide a high rate of data communication between
it is possible for multiple nodes to gain equal access to electronic devices. The bandwidth offered by an IEEE
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1222 A SHRINATH AND A EMADI
1394 serial bus is usually from 2i to 98.304 Mbps, with are translated into data at the other end. The link layer
i taking on the values of (i=0, 1, 2, 3, 4, 5) [14]. It has is associated with addressing as well as data checking.
a 64-bit addressing system, out of which the 16 most It is in this layer that error detection takes place. The
significant bits make up the node ID [15]. Out of these transaction layer basically provides the set-up mech-
16 bits, ten bits are used for bus Ids, which give rise to anisms for communication to take place. The serial
210−1=1023 buses and the remaining six bits giving management bus has management functions associated
rise to 26−1=63 nodes. A typical application for this with it. It is linked to all three layers. Finally, the appli-
protocol is for in-car infotainment purposes. The pro- cation layer is the layer in which codes for specific
tocol stack implemented in the IEEE 1394 is shown in applications are written.
Fig. 5. The 1394 protocol supports a variety of features, such
Just like the OSI model that is used widely in the as high data rates and plug-and-play compatibility, as
TCP/IP protocol each level in the IEEE 1394 stack has well as support for asynchronous and isosynchronous
certain functions assigned to it. The physical layer is in data types [16 ]. Asynchronous data transfer is mainly
charge of sending electrical impulses on the bus, which used for guaranteed data delivery, which some protocols
such as the SAE J1850 protocols, offer (the in-frame
response). Messages are short and are mainly used for
control and setup purposes. Isosynchronous data trans-
fer is used for mass transfer of data. However, reliability
is not a major criterion in this case. Constant speed
and bandwidth are the major factors taken into con-
sideration for this kind of data transfer. Messages are
sent in the form of packets, which are sent out every
125 ms. A typical application is video streaming.
The IEEE 1394 protocol provides for automatic con-
figuration of the tree topology implemented. The three
basic steps are: bus initialization, tree identification and
Fig. 5 IEEE 1394 protocol stack self-identification. In the case of dynamically changing
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1223
IDs, the devices must implement a group of registers centralized approach, a single node handles all the tasks.
defined by the control and status register (CSR) archi- In the decentralized approach, all the administrative
tecture specification. The devices themselves are generally tasks are distributed throughout all the nodes.
of two types: low-cost devices and high-end devices [14]. A MOST network is essentially made up of MOST
The low-cost devices are usually the devices at the user interconnect, MOST system services, and MOST devices.
end of the system (e.g. air-conditioning, music system, The MOST interconnect is essentially concerned with
and motor electronics). These devices usually contain the establishment of connections between the devices
few codes and a microcontroller. The high-end devices at the start-up phase. It is also during this phase that
are usually more powerful, having a powerful processor device addresses are distributed throughout all the devices.
and universal user interface (e.g. touch screen or display Synchronization between all the nodes by means of a bit
board replete with keyboard and mouse). Such powerful pulse is achieved during this phase.
devices have uses in the field of GPS and navigation. The MOST system services are comprised of low-level
Another important characteristic of the IEEE 1394 system services. Functions such as data routing, channel
protocol is that the management functions are distri- allocation, fault detection, or delay detection are per-
buted. This means that the nodes have no master and formed by the low-level system services. The application
each node operates independently. Therefore, even if one socket and the basic layer system services make up the
part of the network ceased to function for some unfore- MOSTNetservices, which are basically concerned with
seen reason, the rest of the network would continue to the transmission and reception of different kinds of data,
function irrespective of the failure of a part of the net- as well as providing standard interfaces to access various
work. Main applications include the avionics industry to network management functions. MOST devices can vary
handle CNI waveforms, industrial cameras for industrial from simple displays to complex applications. They have
inspection systems for quality control, and multimedia the capability of bandwidth allocation, as well as packet
applications in automobiles. and control data capacity handling. Figure 6 illustrates
the implementation of a MOST device in a typical
configuration.
6 MEDIA ORIENTED SYSTEM TRANSPORT The data types supported by MOST are control data
(MOST ) and bursty data. All the transactions taking place on the
MOST network involve the generation of a synchronous
The development of the MOST network [16 ] stemmed frame by a frame generator or timing master. Each node
from the need for a peer–peer network that had high has an internal timing device that locks onto this signal
data speeds, but was also cost effective. The MOST net- by means of a phase-locked loop (PLL). By locking
work was essentially designed to be used for multimedia onto this synchronization frame, all the nodes are
applications in the automotive environment; however, synchronized to the timing master.
due to its efficiency, it is increasingly being used for home MOST networks are designed to use fibre optical
networks too. Also, the implementation of optical fibres cables as the medium of transmission. Therefore, the
at its physical layer ensures high reliability under adverse network is designed to accommodate all the possible
circumstances. Some of the key features of the MOST complex topologies that can implement applications
networks are ease of use, cost effectiveness, availability based on fibre optical cables. This provides enhanced
of synchronous and asynchronous data transfer mode, capacity, as well as security features. It also enables the
flexibility, and a wide range of applications. MOST network to support the plug-and-play mode of
As pointed out before, the MOST network is a peer– operation. The signal lines that compose the physical
peer network. The point-to-point network connection structure are RX-receive data and TX-transmit data.
can be established using either of the ring, star, or daisy- Other optional lines are power, ground, and wake-up.
chain topologies. Two approaches can be used for As the name suggests, the wake-up line is used for
administrative tasks: centralized and decentralized. In the waking-up the target device. In this network, each node
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1224 A SHRINATH AND A EMADI
First of all, the need for complex circuitry to implement economical compared to protocols such as CAN. How-
other fault-tolerant mechanisms is avoided. Second, ever, this advantage is negated by its inherent limitations,
combined with software fault detection, the fail-silent such as low bandwidth and performance, and the single
architecture would be able to cover the entire range of master topology of the network.
possible errors comprehensively. Third, this mechanism There are quite a few criteria that have to be taken
can be tested to test its full functionality. into consideration when a network is designed. Factors
Each ECU, as mentioned before, is made up of some such as bandwidth, security, latency, electromagnetic
sensors and actuators. It must be ascertained that in a interference, fault tolerance, and cost should be balanced
node comprising two ECUs there should not be any in order to design a network to suit the requirements.
disparity in the decision finally taken. This may mean There are, basically, two different approaches that could
that each ECU exchanges sensor values with the others be taken to design a network. One approach is to divide
on the common bus, so that a common decision is the sensors and actuators in a zonal manner, connected
reached. An alternative to using the common system bus to a central ECU. Various main ECUs are connected to
is using a sensor bus. Also, if digital sensors are used, each other by CAN links. This extensive use of CAN
each ECU will have the same values. If the two ECUs is to enable the usage of high bandwidth for signal
are located far way from each other, then the sensors exchanges. The other approach is to totally abolish the
are connected to the closest ECU. If, on the other hand, zonal concept. Here, all the actuators and sensors are
they are situated close to each other, then the sensors connected to the central ECU by means of LIN links.
may be connected to the ECUs by means of a sensor This has the advantage of being scalable. No major
bus as mentioned above. Figure 7 demonstrates the changes have to be done to the network in order to
concept of implementation of a X-by-wire system in a accommodate additional nodes.
vehicle. As mentioned before, LIN is based on the SCI
The software model consists of two layers: the system ( UART ) byte word interface. The network has a single
software layer and the application software layer. The master/multiple slave topology [19]. All the slaves have
system software layer is used to provide services to the job of transmitting and receiving. The master node,
the application software layer. Services such as fault apart from the task of transmission and reception, has
tolerance and detection are implemented in the system the additional task of maintaining the synchronization
software level. The language used to write codes is in the network. This is done by means of a message
the ANSI C subset with certain modifications, such header, which consists of the synchronization break,
as exclusion of certain error-prone constructors and synchronization byte, and a message identifier. The
inclusion of exception handling. Efficient design, higher message identifier is used by the nodes to identify the
fault tolerance, ability to be tested, and easy-to- messages meant for them. Each identifier is unique to
synchronize are the main advantages. The x-by-wire the node. This way the node knows the messages meant
system is being developed by the European Consortium for it. It has to be remembered that the message identifier
to provide a standard that is accepted all over Europe indicates the content of the message and not the
for the development of intelligent driving aids for destination. Once the node has received the message
drivers. meant for it, it then sends back a response that contains
data with the size ranging from two, four, or eight bytes
of data with one checksum byte. One message frame
8 LOCAL INTERCONNECT NETWORK consists of the header and the response parts.
Each message frame is made up of a byte field, which
Local interconnect network (LIN ) [18] is a com- has ten bits. These ten bits include a dominant ‘start’
munication protocol that has been established for auto- bit, eight bits of data, and a recessive ‘stop bit’. The
mobiles. This protocol is based on the SCI ( UART ) message frame consists of the header sent by the master
data format with a single master/multiple slave archi- node and the response sent by the slave node. The header
tecture. A consortium formed in 1998, comprising Audi, sent by the master node consists of synchronization
BMW, Daimler Chrysler, Volvo, Volkswagen, VCT, and break, synchronization field, and the identifier field.
Motorola worked on establishing a specification for this Each message frame is built on the 8N1-coding scheme.
protocol. The synchronization break must be a minimum of 13 bits
The development of LIN was based on the necessity for in length to ensure proper synchronization. The syn-
a communication protocol that was very cost effective chronization field is a string of bits with an equivalent
and not only addressed the issue of the specification for hexadecimal value of 0×55. With this type of syn-
communication, but also other issues like signal trans- chronization pattern, it is possible for nodes not
mission, programming, and interconnection of nodes. It equipped with quartz stabilizers to resynchronize them-
basically takes an all-round approach for the develop- selves. There are basically two levels of synchronization
ment and consolidation of an automotive protocol. that are defined for the LIN network: unsynchronized,
The basic advantage that LIN enjoys is that it is very in which the slave clock time differs from the master
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1226 A SHRINATH AND A EMADI
clock time by less then ±15 per cent and synchronized, Bluetooth is implemented in devices by way of small
in which the slave clock time differs from the master chips. It uses a shortwave radio signal that is always on
clock time by less than ±2 per cent. for signal transmission purposes. It creates what is
There are four identifiers reserved for special purposes. known in the technical terms as an ‘ad hoc’ network [21].
Out of the four identifiers, two are used for uploading The participants in this ad hoc network are the slaves
and downloading purposes. The only way they differ from and the masters present in the entire network. Each
the normal data frame is that in these frames, instead of master and slaves form what is known as a ‘piconet’.
data, there are user-defined command messages. The This, basically, represents an area of active participation
other two special identifiers are used for ensuring upward by one master and one or more slaves. A slave can
compatibility with the future versions of the LIN pro- participate in any number of piconets, but a master can
tocol. These identifiers are called extended identifiers. belong to only one piconet. The topology is also called
There are three types of communication mode that are the scatternet topology. Each piconet has its boundary.
supported: master to slave or multiple slaves, slave to There is at least one slave acting as a bridge between
master, and slave to slave: the slaves can talk to each two piconets. Each piconet has its own characteristic
other without routing the transmission through the transmission frequency, also, since each piconet uses its
master. This is illustrated in Fig. 8. own transmission frequency, each piconet is uniquely
A typical LIN network has a single master with as identified by the hopping pattern used for transmission.
many as 2–10 nodes contained in the network. Typical The master of that particular piconet determines the
data speeds range from 2.4 kbps to 19.6 kbps. The volt- hopping pattern.
age level that can be supported by the buses is around The spectrum of Bluetooth lies in the unlicensed
13.5 V. Each data frame contains 2–8 bytes of data with industrial, scientific, and medical (ISM ) band. The fre-
a six-bit identifier. Single-wire transmission, low cost of quency ranges from 2.4 GHz to 2.483 GHz. A number
implementation, and no resonators are the advantages. of multiple access schemes are used. The most widely
Low bandwidth and a single-bus access scheme are the used schemes are the time division multiple access
main disadvantages. LIN is usually used for door and (TDMA), frequency division multiple access (FDMA),
roof control, as well as for the steering wheel and column. and code division multiple access (CDMA). A total of
Other implementations include smart wiper motor, 79 hop frequencies have been defined spaced 1 MHz
sensors and switch panels, seat control, and heating. from each other in the United States. However, in
France and Spain, instead of 79, there have been only
23 hop carriers defined. This protocol supports both the
9 BLUETOOTH synchronous connection oriented (SCO) link as well as
the asynchronous connection-less (ACL) link.
Bluetooth [20] is a wireless communication standard The Bluetooth baseband model is the intelligent
that has been developed for networking small devices core of communication. The functionality of the module
such as printers, palm pilots, and mobile phones. It was depends on the kind of the application. Simple appli-
initially conceived by Ericsson in 1994. Since then com- cations can be run on the baseband processor, whereas
panies such as Nokia, IBM, Intel, and Toshiba have complex applications are run on the host processor.
joined it in its research efforts and in 1998 formed what Therefore, the module should be very flexible in terms
is known as the Bluetooth Special Interest Group (SIG). of load sharing; it must be able to accept any load at
Currently, about 2000 companies are part of the SIG any point of time. Efficient usage of resources is a prime
and are developing Bluetooth-related products. issue to be considered when designing a module. There
are several modules that have been developed. But, their
usage has been hampered by the fact that they are large
due to huge hardware. All the functions are performed
by this hardware block instead of the microcontroller.
This leads to a waste of the microcontroller. Therefore,
the modules that existed so far were inefficient. However,
to increase the efficiency of the module it is possible to
transfer a lot of functionality to the microcontroller, with
the hardware blocks implementing only essential hard-
ware functions. The basic block diagram of a module is
shown Fig. 9.
The microcontroller is used for controlling other units,
as well as controlling some link control protocols. The
baseband unit is entrusted with the task of encoding
and decoding bit streams, as well as control of the RF
Fig. 8 Data communication in LIN module. The USB and UART blocks are used for
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004
ELECTRONIC CONTROL UNITS FOR AUTOMOTIVE ELECTRICAL POWER SYSTEMS 1227
immediately or can be cached for later retrieval. Broad- Services should thus be aware of the current context.
cast services may include the local weather forecast, Furthermore, location awareness is an important factor
updates about the local traffic situation, or advertise- for service provisioning.
ments for local events like movie trailers of currently
playing cinema programmes. Also, entertainment services, Car production. In the car production system, a lot of
such as broadcasts of regular television programmes (for software is downloaded as a final step in the production
backseat passengers) fall into this service category. line. This is an application where Bluetooth is really well
suited [25]. A Bluetooth base station is connected to the
Information push. The main difference between infor- product field bus. When the car online gets connected
mation push and casting is that users must subscribe to the Bluetooth base station, it uploads its serial
to push services. Notification of an incoming personal number. The production computer then downloads the
fax, a customized stock market report, or updates of a software via the field bus to the base station, which is
user’s car software are applications for information push. then uploaded to the car. However, this is a dedicated
This personalization requires addressing mechanisms for application and no other Bluetooth-enabled device
individual users and devices. should be connected to the cell.
Intra-car communication. Inside the car, there are a hostile environment, because failure of these systems
host of devices that would be helpful to the driver (e.g. could affect the overall performance of the subsystems
navigation systems). A car driver might wish to bring in the vehicle.
his or her mobile devices and connect them to the car
network. As an example, the address of a business
partner could be stored in a PDA. After the address has 10 CONCLUSION
been fed into the car navigation system, the system may
suggest the route which may take the shortest time, based In summary, network and communication technologies
on the weather and traffic-related data, which would are set to become a standard in cars in the near future.
already have been downloaded by the navigation system. However, it must be remembered that these are still
Also, the sound system and movie screens can be used emerging technologies where possibilities of improvement
for various applications. are still large. Even in its nascent stages, implementation
of these technologies would require the passing of
stringent and complete tests certified by the automotive
With the implementation of Bluetooth technology, industry to demonstrate their safety. In areas that are very
there would be elimination of cables, which would con- safety-critical, the performance of these technologies and
tribute towards a major reduction in the overall weight devices should be flawless in tough environments. It has
of the car. This, in turn, would lead to improvements in yet to be seen whether they can live up to the standards
factors such as fuel economy and emissions. Devices that expected.
previously needed wires for interconnectivity can now
communicate with each other via a wireless link, without
the need of cables between them. Furthermore, there REFERENCES
could be interconnection between devices not only in
the same subsystem of the automobile, but also devices 1 Leen, G. and Heffernan, D. Expanding automotive
belonging to various other subsystems in the same auto- electronic systems, Comput. Control Eng. J., 2002, 35(1),
mobile. This, in effect, provides a seamless connectivity 88–93.
between devices. In addition, since Bluetooth is a wire- 2 Leen, G., Heffernan, D. and Dunne, A. Digital networks in
less-based communication system, it is highly flexible automotive vehicle, Comput. Control Eng. J., 1999, 10(6),
and can also be modified without much difficulty [27]. 257–266.
It is possible to add and remove nodes from the network 3 Kopetz, H. Automotive electronics. In Proceedings of the
1999 Euromicro Conference on Real-Time Systems, 1999,
without any difficulty at all.
York, UK, pp. 132–140.
Even though Bluetooth is a versatile technology, it has 4 Navet, N. CAN use in automobiles, IEEE Potentials,
its own limitations. There are inherent inadequacies that Oct./Nov., 1998.
make practical implementation of this technology seem 5 CAN 2.0 specification, 2003, http://www.can-cia.de/.
difficult. In an environment where data transfer takes 6 Fars, M., Ratcliff, K. and Barbosa, M. An introduction to
place almost all the time, the issue of privacy is foremost CAN open, Comput. Control Eng. J., 1999, 10(4), 161–168.
in everybody’s mind. In the above-mentioned appli- 7 Xing, W., Chen, H. and Ding, H. The application of
cations, we took the example of a PDA communication controller area network on vehicle. In Proceedings of the
with a car navigation system. The possibility of data in IEEE International Vehicle Electronics Conference, 1999,
the PDA being transferred to an electronic logbook Changchun, China, vol. 1, pp. 455–458.
8 Leen, G. and Heffernan, D. Time triggered controller area
in the car is possible. In such scenarios, almost anyone
network, Comput. Control Eng. J., 2001, 12(6), 245–256.
can access this data. This problem can be overcome in
9 Führer, T., Müller, B., Dieterle, W., Hartwich, F.,
the following way. If any Bluetooth device, in our case Hugel, R. and Walther, M. Time triggered communication
the PDA, has an address akin to the IP addresses issued on CAN (Robert Bosch GmbH ), 2003, http://www.can-
to computers connected to the internet, the owner can cia.de/.
then add that particular address to the piconet environ- 10 TTCAN IP Module, 1998, http://www.can.bosch.com/
ment, so that now the devices know that they are content/.
communicating with a legitimate device. 11 Wiegand, B. SAE J1850 class B data communication net-
Since this technology involves a lot of electronic works interface. Communication Standards for European
devices, the conditions existing in the operating environ- On-Board-Diagnostics Seminar, 1998, ref. no. 1998/294,
ment should be taken into consideration. Equipment IEE, pp. 5/1–5/9.
12 Oliver, J. Implementing the J1850 protocol ( Intel
would be subjected to various mechanical vibrations,
Corporation), 2003, http://www/intel.com/design/intarch/
temperature swings from −40 °C to +80 °C, splashes of papers/j1850_wp.htm.
petrol, water, and potential miswirings can lead to short 13 Lupini, C. A., Haggerty, T. J. and Braun, T. A. Class 2:
circuiting of essential systems, load jumps, jump starts, General Motors’ version of SAE J1850 Proceedings of the
electromagnetic fields, and voltage spikes [28]. These 8th International Conference on Automotive Electronics,
electronic systems must be enabled to tolerate such 1991, London, pp. 74–78.
D23203 © IMechE 2004 Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering
1230 A SHRINATH AND A EMADI
14 Rabel, M., Schmeiser, A. and Grossmann, H. P. Integrating 20 Wireless technology resources: Bluetooth, 2003, http://
IEEE 1394 as infotainment backbone into the automotive www.palowireless.com/.
environment. In Proceedings of the 2001 IEEE 53rd 21 Haarsten, J. C. The Bluetooth radio system, IEEE Pers.
Vehicular Technology Conference, 2001, Rhodes, Greece, Commun., 2000, 7(1), 28–36.
vol. 3, pp. 2026–2031. 22 Bretz, E. A. The car: just a Web browser with tires, IEEE
15 Baltazar, G. and Chapelle, G. P. Firewire in modern Spectrum, 2001, 38(1), 92–94.
integrated military avionics, IEEE Aerosp. Electron. Syst. 23 Fredriksson, L. B. Bluetooth in automotive applications. In
Mag., 2001, 16(11), 12–16. Bluetooth Technology Conference, 2001, San Francisco.
16 Scholles, M., Frommhagen, K., Kleinmann, L., Nauber, P. 24 Kellerer, W., Bettstetter, C., Schwingenschlogl, C. and
and Schelinski, U. IEEE 1394 firewire system for industrial Sties, P. (Auto) mobile communication, IEEE Pers.
and factory automation applications. In Proceedings of Commun., 2001, 8(6), 41–47.
the 8th IEEE Conference on Emerging Technologies and 25 Fredriksson, L. B. Bluetooth in automotive diagnostics. In
Factory Automation, 2001, 2, 627–630. Bluetooth Technology Conference, 2001, San Francisco.
17 MOST Specification Framework, 2003, 26 Wunderlich, H. and Schwab, M. (Daimler–Chrysler R&D,
http://www.mostnet.de/. Germany) and Fredriksson, L. B. ( KVASER, Sweden).
18 Kopetz, H., McCall, G., Mortana, P., Dilger, E., Potential of bluetooth in automotive applications. In
Johansson, L. A., Krug, M., Lideñ, P., Müller, B., Bluetooth Technology Conference, 2000, Geneva.
Panizza, U., Poledna, S., Schedl, A., Södenberg, J., 27 Wunderlich, H., Schwab, M., Fredriksson, L. B. and
Strömber, M. and Thurner, T. Towards an architecture Nikola, M. Bluetooth in automotive industry: enabling
for safety related fault tolerant systems in vehicles, effortless connectivity between devices. In Bluetooth
http://www.vmars.tuwien.ac.at/people/kopetz.htm/. Technology Conference, 2000, Geneva.
19 Specks, J. W. and Rájnak, A. LIN protocol develop- 28 Nüsser, R. and Pelz, R. M. Bluetooth based wireless con-
ment tools & software interfaces for LIN in vehicles. nectivity in an automotive environment. In Proceedings of
In Proceedings of the 9th International Conference on the 52nd IEEE Vehicular Technology Conference, 2000, 4,
Electronic Systems for Vehicles, 2000. 1395–1942.
Proc. Instn Mech. Engrs Vol. 218 Part D: J. Automobile Engineering D23203 © IMechE 2004