当前位置:网站首页>Communication tutorial | overview of the first, second and third generation can bus
Communication tutorial | overview of the first, second and third generation can bus
2022-07-04 12:34:00 【strongerHuang】
Focus on + Star sign public Number , Don't miss the highlights
Video Number | strongerHuang
WeChat official account | strongerHuang
CAN It's more and more widely used , Automotive electronics 、 Industrial control 、 Large instruments and equipment can be seen everywhere CAN Bus .
1986 year : Launched CAN Bus ;
2012 year : Launched CAN FD;
2020 year : A new generation of CAN XL;
first generation CAN
CAN:Controller Area Network, Controller area network , It belongs to industrial fieldbus , yes ISO International standard serial communication protocol .
CAN Fieldbus is one of the most widely used Fieldbus in the world , At present, it has become the standard bus of automotive computer control system and embedded industrial control LAN .
from OSI(Open System Interconnection Open systems interconnection )7 From the perspective of layer network model ,CAN field bus Only the second 1 layer ( The physical layer ) And the 2 layer ( Data link layer ).
I have written a lot about CAN And CANOpen The content of , You can search on my official account homepage , Or backstage reply “CAN” See more .
Second generation CAN
CAN FD:CAN with Flexible Data-Rate, Translated into Variable speed CAN.
In the classic CAN Increase the transmission rate on the basis of , Data fields can be transferred 64byte, That is, the variable speed function , yes CAN Upgraded version .
CAN FD Two ways are adopted to improve the efficiency of communication :
Shorten bit time and improve bit rate ;
Lengthen the length of the data field, reduce the number of messages, and reduce the bus load rate .
stay CRC Three polynomials are used in the verification section to ensure the data reliability under high-speed communication .
Refer to the official website :
https://www.can-cia.org/can-knowledge/can/can-fd
The first generation and the second generation CAN difference
1. Data bits are different
CAN: One frame of data is the longest 8 byte
CAN FD: One frame of data is the longest 64 byte
2. Different speeds
CAN: Maximum 1Mbit/s
CAN FD: Greater than 1Mbit/s
( In the arbitration stage , Limit to 1 Mbit/s)
Of course , Except for the difference of data bits , And variable rate 、 The frame format is different , For details, please refer to the official documents :
www.can-cia.org
The third generation CAN
Following CAN、 CACN FD after , stay 2020 year 1 month ,CiA A new generation of CAN XL.
CAN XL A will be provided Maximum 2048 Byte data field . The network layer can 11 The bit priority field is used for addressing purposes , And indicate the content of the data field .
CAN XL The frame passes through two CRC( Cyclic redundancy check ) To protect , Five randomly distributed error codes can be detected .
CAN XL It is a highly scalable communication technology , Involving bit rate and length of data field . The physical layer is still under development . The goal is to reach as high as 10+ Mbit/s Bit rate of .
CAN XL Optimize the heterogeneous network architecture for the region , This scheme can meet the optimization requirements of the future vehicle network length , Reduce cabling .
For more details , Please refer to :
https://www.can-cia.org/can-knowledge/can/can-xl
https://www.can-cia.org/news/cia-in-action/view/can-xl-is-knocking-on-the-door/
------------ END ------------
Focus on official account back office reply 『 Communication course 』『 Single chip microcomputer 』 Read more about it .
reply “ Add group ” Join the technical exchange group according to the rules , reply “1024” See more .
Click on “ Read the original ” See more sharing .
边栏推荐
- JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
- MPLS experiment
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
- How do std:: function and function pointer assign values to each other
- Entitas learning [iv] other common knowledge points
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 6
- 记一次 Showing Recent Errors Only Command /bin/sh failed with exit code 1 问题
- Detailed explanation of classic process synchronization problems
- When synchronized encounters this thing, there is a big hole, pay attention!
- Introduction of network security research direction of Shanghai Jiaotong University
猜你喜欢
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 5
Wechat video Number launches "creator traffic package"
SAP ui5 date type sap ui. model. type. Analysis of the display format of date
2020 Summary - Magic year, magic me
(August 9, 2021) example exercise of air quality index calculation (I)
How to use "bottom logic" to see the cards in the world?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 7
22 API design practices
Azure solution: how can third-party tools call azure blob storage to store data?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
随机推荐
Global and Chinese markets for soluble suture 2022-2028: Research Report on technology, participants, trends, market size and share
In 2022, financial products are not guaranteed?
Global and Chinese markets for environmental disinfection robots 2022-2028: Research Report on technology, participants, trends, market size and share
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
Entitas learning [iv] other common knowledge points
netstat
Some summaries of the 21st postgraduate entrance examination 823 of network security major of Shanghai Jiaotong University and ideas on how to prepare for the 22nd postgraduate entrance examination pr
queue
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
The most robust financial products in 2022
Azure solution: how can third-party tools call azure blob storage to store data?
8.8.1-PointersOnC-20220214
Games101 Lesson 8 shading 2 Notes
IPv6 experiment
13、 C window form technology and basic controls (3)
Awk getting started to proficient series - awk quick start
Decrypt the advantages of low code and unlock efficient application development
Clockwise rotation method of event arrangement -- PHP implementation
What if the chat record is gone? How to restore wechat chat records on Apple Mobile