CAN 协议外文文献翻译、中英文翻译、外文翻译
- 格式:doc
- 大小:112.00 KB
- 文档页数:9
文档信息信息内容关键词CAN总线,单片机,LPC2000,ARM7,SJA1000摘要本应用笔记介绍了CAN控制器的硬件应用程序编程接口的驱动程序例程,用于飞利浦的LPC2000的CAN控制器。
还提供了在KEIL下uVision3开发的ARM工具ADS1.2,使用评估板MCB210的示范项目。
这个演示中使用UART0与PC机通信,打印和CAN通信信息与超级终端。
1。
介绍1.1简介每个LPC2292/LPC2294包含两个/四个CAN控制器。
该CAN是一种串行通信协议,它能有效支持分布式实时控制与安全性非常高的水平。
它的应用范围很广,从高速网络,以更低的成本多路接线。
每个CAN控制器有类似飞利浦SJA1000和鹈鹕图书馆大楼寄存器结构,但这些设备的8位寄存器被组合在32位字,以允许在ARM环境的同时访问。
主要差别在于识别接收到的标识符,在CAN术语称之为验收过滤的,已经从CAN控制器移除,并集中在一个全球性的验收滤波器。
1.2主要特点针对LPC2000的CAN控制器的主要特点:•每个总线上的数据传输速率高达1 Mbit / s的•32位寄存器和RAM访问•兼容CAN规范2.0B,ISO11898-1•全局验收滤波器可以识别11位和29位Rx标识符所有的CAN总线•验收滤波器为选择的标准标识符提供了FullCAN-style自动接收1.3更多有用的功能当你驱动的LPC2000的CAN控制器在你的应用程序,你也可以找到以下有用的特性:•错误计数器具有读/写访问•可编程的错误报警限制•错误中断对每一个CAN总线错误•详细的位地址仲裁丢失中断•单次发送(无重发)•只听模式(无应答,没有主动错误标志)•接待'自己的'的消息(自接收请求)的。
为CAN控制器的详细使用方法,请参考LPC2000的部分数据资料和用户手册。
1.4 CAN总线的时序设置在此CAN驱动器,包括有用于CAN位定时的预先定义的值。
局域网络控制器的研究黄星辰计算机科学与技术学院贵州大学贵阳田军特种设备检验实验室质量技术监督局贵阳测控1102-王明高-2011014374摘要:控制器区域网络(CAN)是理想的适合于许多高水平的工业协议,包括CAN 和ISO 11898作为其物理层。
在系统设计中其成本、性能和可升级性,提供了巨大的灵活性。
本文对CAN的工作原则作了简要的介绍,采用CAN总线仪表的CAN收发器与DSP的德克萨斯的一个基本的实现,和一个强大的错误检测和故障约束机制的探讨。
也对一些对增强控制器区域网络(eCAN)的性质进行了讨论。
关键词控制器区域网络;增强、协议、消息一、引言控制器区域网络(CAN)[ 1 ]是一种多主串行总线,使用广播发送到所有节点。
CAN协议[ 2,3 ]提供了比其他通信协议更多的优点。
例如,CAN总线协议提供了一个很好的价格/性能比。
它允许快速的进行数据传输(可达1兆位/秒),可以实现实时通信[ 2 ]。
此外,数据具有很高的可靠性和强大的错误检测能力[ 4 ]。
还具有灵活性、热插拔性。
CAN总线被设计为具有最大传输速率1Mbit/sec的多主结构。
不同于传统的网络,如USB或以太网,CAN总线不可以从A点向B点的一个中央主机的下位机传送一个大块的报文。
在CAN网络中许多短帧数据如温度或转速被广播到整个网络,任何对报文有兴趣的节点都能够接收这个数据。
二、CAN总线标准CAN总线是一个国际标准化组织(ISO)定义的串行通讯总线。
最初是用于为用双线总线代替复杂的线束汽车行业中。
规范的要求的信号速率高达1 Mbps,抗干扰能力强,并有自检测能力和错误自修复能力。
这些特征使CAN总线可以广泛用在各种行业包括汽车,船舶,医疗,制造,和航空航天。
CAN通信协议ISO11898,描述的是信息是如何通过网络设备之间进行传输的,从层定义上讲,符合开放式系统互连。
通过物理介质连接的设备之间的通信是通过实际物理模型的层定义。
中英文文献翻译-SJA1000—独立的CAN控制器附录A 英文原文SJA1000—Stand-alone CAN controller1. INTRODUCTIONThe SJA1000 is a stand-alone CAN Controller product with advanced features for use in automotive and general industrial applications. It is intended to replace the PCA82C200 because it is hardware and software compatible. Due to an enhanced set of functions this device is well suited for many applications especially when systemoptimization, diagnosis and maintenance are important.This report is intended to guide the user in designing complete CAN nodes based on the SJA1000. The report provides typical application circuit diagrams and flow charts for programming.2. OVERVIEWThe stand-alone CAN controller SJA1000 1 has two different Modes of Operation:1.BasicCAN Mode (PCA82C250 compatible).2.PeliCAN Mode.Upon Power-up the BasicCAN Mode is the default mode of operation. Consequently, existing hardware and software developed for the PCA82C250 can be used without any change. In addition to the functions known from the PCA82C250 , some extra features have been implemented in this mode which make the device more attractive. However, they do not influence the compatibility to the PCA82C250.The PeliCAN Mode is a new mode of operation which is able to handle all frame types according to CAN specification 2.0B.Furthermore it provides a couple of enhanced features which makes the SJA1000 suitable for a wide range of applications.2.1 SJA1000 FeaturesThe features of the SJA1000 can be clustered into three main groups:1.Well-established PCA82C200 FunctionsFeatures of this group have already been implemented in the PCA82C250.2.Improved PCA82C200 FunctionsPartly these functions have already been implemented in the PCA82C250. However, in the SJA1000 they have been improved in terms of speed, size or performance.3.Enhanced Functions in PeliCAN ModeIn PeliCAN Mode the SJA1000 offers a couple of Error Analysis Functions supporting diagnosis, system maintenance and optimization. Furthermore functions for general CPU support and System Self Test have been added in this mode.2.2 CAN Node ArchitectureGenerally each CAN module can be divided into different functional blocks. The connection to the CAN bus linesis usually built with a CAN Transceiver optimized for the applications. The transceiver controls thelogic level signals from the CAN controller into the physical levels on the bus and vice versa.The next upper level is a CAN Controller which implements the complete CAN protocol defined in the CAN Specification 8. Often it also covers message buffering and acceptance filtering.All these CAN functions are controlled by a Module Controller which performs the functionality of the application. For example, it controls actuators, reads sensors and handles the man-machine interface (MMI).As shown in Figure 1 the SJA1000 stand-alone CAN controller is always located between a microcontroller and the transceiver, which is an integrated circuit in most cases.Figure 1 CAN Module Set-up2.3 Block DiagramThe following figure shows the block diagram of the SJA1000.The CAN Core Block controls the transmission and reception of CAN frames according to the CAN specification.The Interface Management Logic block performs a link to the external hostcontroller which can be a microcontroller or any other device. Every register access via the SJA1000 multiplexed address/data bus and controlling of the read/write strobes is handled in this unit. Additionally to the BasicCAN functions known from the PCA82C250, new PeliCAN features have been added. As a consequence of this, additional registers and logic have been implemented mainly in this block.Figure 2: Block Diagram SJA1000The Transmit Buffer of the SJA1000 is able to store one complete message (Extended or Standard). Whenever a transmission is initiated by the host controller the Interface Management Logic forces the CAN Core Block to read the CAN message from the Transmit Buffer.When receiving a message, the CAN Core Block converts the serial bit stream into parallel data for the Acceptance Filter. With this programmable filter the SJA1000 decides which messages actually are received by the host controller.All received messages accepted by the acceptance filter arestored within a Receive FIFO. Depending on the mode of operation and the data length up to 32 messages can be stored. This enables the user to be more flexible when specifying interrupt services and interrupt priorities for the system because the probability of data overrun conditions is reduced extremely.3. SYSTEMFor connection to the host controller, the SJA1000 provides a multiplexed address/data bus and additional read/write control signals. The SJA1000 could be seen as a peripheral memory mapped I/O device for the host controller.3.1 SJA1000 ApplicationConfiguration Registers and pins of the SJA1000 allow to use all kinds of integrated or discrete CAN transceivers. Due to the flexible microcontroller interfaceapplications with different microcontrollers are possible.Figure 3 Typical SJA1000 Application3.2 Power SupplyThe SJA1000 has three pairs of voltage supply pins which are used for different digital and analog internal blocks of the CAN controller.1.VDD1 / VSS1: internal logic (digital).2.VDD2 / VSS2: input comparator (analog).3.VDD3 / VSS3: output driver (analog).The supply has been separated for better EME behaviour. For instance the VDD2 can be de-coupled via an RC filter for noise suppression of the comparator.3.3 ResetFor a proper reset of the SJA1000 a stable oscillator clock has to be provided at XTAL1 of the CAN controller,see also chapter3.4. An external reset on pin 17 is synchronized and internally lengthened to 15 TXTAL. This guarantees a correct reset of all SJA1000 registers (see1). Note that an oscillator start-up time has to be taken into account upon power-up.3.4 Oscillator and Clocking StrategyThe SJA1000 can operate with the on-chip oscillator or with external clock sources. Additionally the CLK OUT pin can be enabled to output the clock frequency for the host controller. Figure 4 shows four different clocking principles for applications with the SJA1000. If the CLK OUT signal is not needed, it can be switched off with the Clock Divider register (Clock Off = 1). This will improve the EME performance of the CAN node.The frequency of the CLK OUT signal can be changed with the Clock DividerRegister:CLK OUT = f XTAL / Clock Divider factor (1,2,4,6,8,10,12,14).Upon power up or hardware reset the default value for the Clock Divider factor depends on the selected interface mode (pin 11). If a 16 MHz crystal is used in Intel mode, the frequency at CLK OUT is 8 MHz. In Motorola mode a Clock Divider factor of 12 is used upon reset which results in 1,33 MHz in this case.Figure 4 Clocking Schemes3.4.1 Sleep and Wake-upUpon setting the Go To Sleep bit in the Command Register (BasicCAN mode) or the Sleep Mode bit in the Mode Register (PeliCAN mode) the SJA1000 will enter Sleep Mode if there is no bus activity and no interrupt is pending. The oscillator keeps on running until 15 CAN bit times have been passed. This allows a microcontroller clocked with the CLK OUT frequency to enter itsown low power consumption mode.If one of three possible wake-up conditions occurs the oscillator is started again and a Wake-up interrupt is generated. As soon as the oscillator is stable the CLK OUT frequency is active.3.5 CPU InterfaceThe SJA1000 supports the direct connection to two famous microcontroller families: 80C51 and 68xx. With the MODE pin of the SJA1000 the interface mode is selected.Intel Mode: MODE = high.Motorola Mode: MODE = low.The connection for the address/data bus and the read/write control signals in both Intel and Motorola mode is shown in Figure 5. For Philips 8-bit microcontrollers。
can通信协议解析与实现英文Analysis and Implementation of CAN Communication ProtocolI. IntroductionCAN (Controller Area Network) is a communication protocol used in automotive and other industrial applications. It provides a way of reliable data transmission and enables real-time communication between multiple nodes. This article analyzes the CAN communication protocol and explores its implementation.II. CAN Protocol Analysis1. Physical LayerThe physical layer of CAN defines the transmission of signals, including voltage, current and transmission rate. CAN bus uses differential signal transmission, which can effectively resist external interference and ensure reliable data transmission.2. Data Link LayerThe data link layer is the core of the CAN communication protocol, which defines the rules and mechanisms of data transmission. The CAN bus uses a master-slave structured communication method. The nodes compete for the right to use the bus. When a node obtains the right, it sends a data frame containing identifier, data and check code. Other nodes receive the frame and judge whether to receive it based on the identifier.3. Application LayerThe application layer is the highest layer of the CAN protocol, which defines the specific content and format of data frames. According to different application scenarios, the CAN bus supports multiple application layer protocols, such as CANopen, SAE J1939, etc. These protocols define specific formats and contents of data frames, as well as the communication rules and interactions between nodes.III. CAN Protocol Implementation1. Hardware ImplementationThe hardware implementation of the CAN protocol requires the use of dedicated CAN controllers and transceivers. The CAN controller is responsible for packing/unpacking data and controlling the transmission process. The transceiver is responsible for transmitting data from the CAN controller onto the bus or receiving it from the bus and passing it to the controller. The key is to select appropriate CAN controllers and transceivers and connect them correctly to the bus.2. Software ImplementationSoftware implementation is an important part of enabling CAN communication. The drivers need to be written to control the CAN controller and transceiver. The drivers interact with the operating system to accomplish sending and receiving data. Application programs are also needed to utilize CAN communication, e.g. to enable communication between nodes by sending and receiving data frames.IV. ConclusionThis article analyzes the CAN communication protocol and discusses its implementation. CAN communication features high reliability, real-timecapability and flexibility, making it suitable for automotive and industrial applications. By thoroughly understanding the CAN principles and implementation, we can better apply it to solve real-world communication problems.一、引言CAN(Controller Area Network)是一种用于汽车和其他工业领域的通信协议。
中英文资料外文翻译计算机网络计算机网络,通常简单的被称作是一种网络,是一家集电脑和设备为一体的沟通渠道,便于用户之间的沟通交流和资源共享。
网络可以根据其多种特点来分类。
计算机网络允许资源和信息在互联设备中共享。
一.历史早期的计算机网络通信始于20世纪50年代末,包括军事雷达系统、半自动地面防空系统及其相关的商业航空订票系统、半自动商业研究环境。
1957年俄罗斯向太空发射人造卫星。
十八个月后,美国开始设立高级研究计划局(ARPA)并第一次发射人造卫星。
然后用阿帕网上的另外一台计算机分享了这个信息。
这一切的负责者是美国博士莱德里尔克。
阿帕网于来于自印度,1969年印度将其名字改为因特网。
上世纪60年代,高级研究计划局(ARPA)开始为美国国防部资助并设计高级研究计划局网(阿帕网)。
因特网的发展始于1969年,20世纪60年代起开始在此基础上设计开发,由此,阿帕网演变成现代互联网。
二.目的计算机网络可以被用于各种用途:为通信提供便利:使用网络,人们很容易通过电子邮件、即时信息、聊天室、电话、视频电话和视频会议来进行沟通和交流。
共享硬件:在网络环境下,每台计算机可以获取和使用网络硬件资源,例如打印一份文件可以通过网络打印机。
共享文件:数据和信息: 在网络环境中,授权用户可以访问存储在其他计算机上的网络数据和信息。
提供进入数据和信息共享存储设备的能力是许多网络的一个重要特征。
共享软件:用户可以连接到远程计算机的网络应用程序。
信息保存。
安全保证。
三.网络分类下面的列表显示用于网络分类:3.1连接方式计算机网络可以据硬件和软件技术分为用来连接个人设备的网络,如:光纤、局域网、无线局域网、家用网络设备、电缆通讯和G.hn(有线家庭网络标准)等等。
以太网的定义,它是由IEEE 802标准,并利用各种媒介,使设备之间进行通信的网络。
经常部署的设备包括网络集线器、交换机、网桥、路由器。
无线局域网技术是使用无线设备进行连接的。
中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。
订单管理系统中英⽂对照外⽂翻译⽂献中英⽂对照外⽂翻译(⽂档含英⽂原⽂和中⽂翻译)MySQL and JSP Web applicationsJSP developers encounter unique problems when building web applications that require intense database connectivity. MySQL and JSP Web Applications addresses the challenges of building data-driven applications based on the JavaServer Pages development model. MySQL and JSP Web Applications begins with an overview of the core technologies required for JSP database development--JavaServer Pages, JDBC, and the database schema. The book then outlines and presents an Internet commerce application that demonstrates concepts such as receiving and processing user input, designing and implementing business rules, and balancing the user load on the server. Through the JDBC (Java DataBase Connector), the developer can communicate with most commercial databases, such as Oracle. The solutions presented in MySQL and JSP Web Applications center on the open source tools MySQL and Tomcat, allowing the reader an affordable way to test applications and experiment with the book'sexamples.So What Is JSP All About?If you meet the requirements mentioned, you should already have a pretty good idea what the answer to this question is. JSP is all about doing highly object-oriented Web sites that can leverage all the best practices of modern software engineering. These practices include things such as SQL databases and UML-based design. This isn't to say that JSP is a cure-all and that using it will automatically make your Web site a paragon of engineering art. It's just as possible to design bad Web sites in JSP as with any other technology. That's why, as you go through the text, you will see how to incorporate the best practices and how to avoid the pitfalls of convenience when projects get stressful. JSP itself is an evolutionary step along the path that started with the first static Web servers, moved through CGI-enabled servers, and finally the first generation of script-enabled servers. JSP is less a Web server with a Java component than it is a Java engine that understands the Web.JSP grew out of Java servlets. Servlets allow the developer to handle the incoming Web requests using a Java program that has access to all the normal information that a Common Gateway Interface (CGI) program would. In addition, the servlet has access to session-persistent objects. These are Java objects that are associated with a specific user session and can be used to store state between requests. Servlet programming was a major step forward in allowing developers to write well-structured modular Web applications using an object-oriented language. It also solved the problem of state persistence, allowing more information to reside on the server during a transaction and less to have to pass back and forth between the user and the server. Servlets still suffered from one major problem. Because they eventually need to spit out HTML, the HTML coding had to be embedded in the servlet code. This led to code fragments like the one shown here:Out.println("\n\n\n");Out.println("");This kind of embedding gets very old very fast when you have to code a lot of pages. In addition, having to escape all of the quotation marks can lead to a lot of confusing andhard-to-find errors if you leave out a backslash. Eventually, a still-better idea emerged. Suppose that you could combine the best of static HTML pages and with the interactive capabilities of servlets. The result was JavaServer Pages (on the Microsoft side, the result was Active Server Pages). As Figure I.1 shows, JSP is a complicated beast. In the next chapter, you'll walk through this flow in detail, but for the moment, here are the major steps:1. A request comes in from a browser using the normal HTTP request format.2. The Web server hands off the request to JSP. JSP looks at the filename and finds the appropriate JSP file.3. The .jsp file is converted into a .java file, containing Java code that will create a class whose name is derived from the .jsp filename.4. JSP then compiles the .java file using javac to produce a .class file. Note that the two previous steps are skipped if a .classfile already exists and is newer than the .jsp file.5. An instance of the newly created class is instantiated and sent the _jspService message.6. The new instance looks to see if there is already an instance of the/doc/424adf09e97101f69e3143323968011ca300f74f.html er object called user existing in the session object space for the currently connected user. If not, one is instantiated.7. As part of servicing stuff.jsp, the user instance is called with the getUserName() method.8. If the JSP processing requires access to information in a database, it uses JDBC to make the connection and handle the SQL requests.As you can see, a tremendous amount of power is available in the JSP world. Developers are free to write Web pages that look mostly like HTML, except where callouts to Java are required. But, at the same time, they are free to develop fully fleshed-out object-oriented applications using all the features that Java can bring to bear. They also get all the benefits of servlets, including session persistence.Why Do We Need Databases?Well, one reason is so that Larry Ellison of Oracle can afford to keep himself on Prozac when he thinks about Bill Gates. A more serious answer is the same reason that drove man to first press a stick against a piece of wet mud: because it's good to write things down. Web servers are marvelous creatures, but they're a bit like idiot savants. Ask them to serve a Web page or run a piece of Java, and they perform like a champ. But start asking them to remember what they didfive minutes ago, and they develop amnesia faster than a character in a soap opera.The first and most important reason that you use databases is that there's a lot in an e-commerce transaction that you need to remember and track:A user's name, address, credit card, and other information previously entered on a registration pagehat the user might have put into a shopping car t and left from a previous transactionWhat items are in stock, along with their price, description, and so onOrders that need to be fulfilled, orders that have been shipped, and items that have been backordered .Now, you could store all this information in a flat file on the server's hard disk, but there are other important properties that you want to have for this data:You want to be able to back out a transaction if part of it fails.You want to be able to locate the data somewhere more secure than the Web server, which could be in a DMZ or outside the firewall altogether.You want to be able to access data such as user data or products quickly, even if there are thousands or millions of them. When you add these items to the shopping list, only a relational database will really do the job effectively.MySQLMany sites don't need the battleship strength (and price tag) of Oracle. MySQL is an open-source SQL database available for anyone to use, with many (although not all) of the features of its big brothers, such as Oracle.MySQL is available for just about any computer that has decent power—it is fairly lightweight on the processor and easy to install (10 minutes, as opposed to multiple hours for Oracle).So, perhaps you are wondering, what's the catch? What are you not getting in MySQL that makes people turn to Oracle? Well, MySQL is a neat little package, but it is missing some things that would be nice to have in a perfect world.A major feature that MySQL does not offer is database consistency checking. You can useforeign key tags in your schema, but MySQL cheerfully ignores them. A lot of DB As I know would consider this a very bad thing.A foreign key constraint prevents you from creating inconsistent data. For example, let's suppose that you had a scheme that looked like this:CREATE TABLE USER (USERID INTEGER,FIRST_NAME V ARCHAR(80),LAST_NAME V ARCHAR(80));CREATE TABLE PURCHASE (USERID FOREIGN KEY USER(USERID),ITEM INTEGER,QUANTITY INTEGER);In a database such as Oracle's, if you created an entry in the PURCHASE table with a user ID of 3, there would have to already be a user ID of 3 in the USER table or an error would occur. Similarly, you couldn't delete user 3 from USER if it was referenced in PURCHASE.The MySQL folks make a pretty impassioned argument in their documentation that depending on foreign keys for data integrity is a bad idea anyway, but convincing your DBA of this philosophy is likely to degrade into a religious debate.In addition, some other features are missing, such as subselects and select into. But probably the other major piece that you will miss is the rollback/commit functionality. MySQL does implement rollback and commit for certain types of tables, but not all of them. Again, the MySQL folks offer their own spin on why this is okay, but being able to roll back transactions is (in my opinion) important enough to make sure that you have it available.Rollback allows you to set a savepoint on the database before starting to do a series of transactions with it, and be able to either roll back to the original state or commit the changes at the end. For example, when recording a purchase, you need to record a debit against the user's account and enter a record into the shipping table so that you'll know later to ship the item. Let's say that the second part fails. You wouldn't want to charge the user but not ship the item. Thus, you'd want to roll back to the state before the transaction began.So, MySQL isn't a full-blown production database—at least, not yet. It's still good enoughfor probably 90% of the e-commerce sites in the world, however. And version 4.0, which is in alpha as of this writing, addresses a number of these concerns, including row-level locking and transaction control.Putting Tomcat and MySQL TogetherCombining Tomcat and MySQL provides a powerful, reliable, and free platform that you can use to learn, develop, and deploy JSP applications. And, best of all, the code that you develop using this platform will run nicely using iPlanet and Oracle or WebSphere and SQL Server.As a learning tool the two together are almost "reference implementations" of their respective protocols (JSP and SQL). As a result, you won't pick up any nasty vendor-proprietary bad habits while you're getting up to speed.In addition, you can enjoy the knowledge that you are supporting the open-source software movement. Open-source software is code that is made freely available under one of several public licenses, frequently the GNU General Public License (GPL).Why is it good to support this movement? There are two sides to this answer: one technical and one political. Technically, it's a good thing because open-source software tends to encourage the development of open standards such as JSP and JDBC, allowing youto choose your tools from among a larger group rather than being locked into one vendor's proprietary solution. It's a positive thing politically because it keeps the large companies honest. WebLogic and iPlanet have to stay competitive and responsive because they know that there's a free solution out there if they aren't. And when you use open-source software, you are sending a message that your overriding concerns are features and reliability, not having a large company to sue if something goes wrong.MySQL和JSP的Web应⽤程序JSP开发⼈员构建Web应⽤程序时遇到需要强⼤的数据库连接的特殊问题。
基于CAN总线的通信转换器的设计摘要:随着在工业中使用的各种电子设备和控制设备的大量应用,基于现场总线的通信网络产生。
CAN总线与用在现有串行通信的正常总线RS-232之间的连接,可以实现构建多点网络和远距离通信。
本文讨论了RS-232和CAN总线之间的转换方法,并介绍了通信转换器新的设计和调试。
为了克服来自总线配置和各种控制器的通信协议所带来的逻辑矛盾或冲突,在转换器中,选择了独立的总线控制器SJA1000与单片机AT89C51来构成CAN总线的智能节点;利用MAX232来完成从232到微控制器接口卡的TTL的电平转换;提供总线的差动发送功能和CAN控制器的差分接收功能。
RS-232在ISM(工业,科学,医学)领域有着不凡的工作且具有内置的UART(异步串行接收)接口,其结合CAN,能快速、准确地实现PC 机串行接口和CAN总线之间的数据通信。
通过调试检查,该设计有一些长距离直接通信的优点,高通信速度,简单的配置,低成本。
由于简单的配置和低成本的原因,它可以取代目前市场中高价格的CAN接口卡。
关键词–通信,协议,CAN总线,RS-232,SJA1000I.引言电力系统历来都是一个有着最高的自动化程度的生产部门。
基于总线的控制系统将逐步取代分散控制系统,成为我国电子系统自动化的主导设备。
由于对RS-232通信距离短(根据EAT/ TAI-232标准,只有15米),只能点对点通信,就不能建立多点通信的网络。
CAN总线是用在网络测量技术的串行数据传输通信协议之一。
RS-232是广泛的用在串行通信的普通总线。
各种计算机,外部设备和测量设备可以通过它方便的有机地连接,进而形成一个测控系统。
但是,因为它的低速,短距离传输并且它可以使接口信号间串扰。
它不能在工业控制直接使用。
总线在工业上已经得到了认可,因高性能,高可靠性和独特的设计而出名。
例如,在奔驰s型的汽车中使用了系统;一些美国企业已经将CAN总线作为内部总线,应用到产品线及机床。
串行存储器接口: 基于I2C 和μWire上SPI的优点介绍在动态的半导体工业中,今天被承认的协议明天就变成了落后的。
在这些第一流的竞争中,并行总线在系统数据的传输中无疑成为最主要的。
面对来自新的串行接口的严重挑战。
最近的协议和改良的标准使串行接口具吸引人的选择为存储器和外围设备的控制应用软件。
在外围设备竞争中, IEEE1394 中,千兆位的以太网络和通用串行总线(USB) 是拥有并行总线上的许多系统的优点比如 PCI , PCCard , IDE(磁盘机) 和 ISA/EISA。
在半导体存储器世界中,指令储藏装置几乎全都是使用并行总线。
然而,串行通路数据存储器现在找到了逐渐加快的接收如较快速的串行总线允许设计者取得没有缺点的好处。
这一个申请调查串行存储器接口的趋势而且评估三个最权威的接口标准记录。
存储密度如并行闪存和 EEPROMs 密度的增加,低密度装置的制造花费变得逐渐少而又有效,所以这些密度倾向于 "消失" 。
这提供机会给串行存储器对密度的增加即"填充缝隙" 并停止并行的类型。
这些串行存储装置为许多数据的储藏提供了理想的方案。
串行存储器出现串行存储装置出现超过 14 年。
早期的许多应用软件之中发现低密度装置,因为他们的费用低,容量大。
典型的早期使用包括了系统结构或装置确认。
这些应用软件通常需要非常小的存储容量和很小的接口速度限制。
近几数年来,不丢失的串行存储器的使用以明现的速率增加进入应用软件之中,从蜂巢式电话到汽车的区域网络系统到工业的仪器排列。
在大部份这些应用软件中串行存储器开始替代并行的装置。
串行存储开始在二个相关的市场需求之中对抗并行装置的。
第一是手提式的产品迅速的发展,如膝上型电脑计算机 , 掌上型电脑计算机的急增,装在口袋里蜂巢网状式电话,呼叫器等。
可携带式需要厂商找方法去减小他们的产品大小和电源。
这一个区域的成功促使了较多的小型化和趋势导致小型化出现在可预知的未来。
MVS-CAN通信协议-翻译版CAN-Specification for MVS MS6.2 V33Page 1 of 121.General Requirements (3)1.1.Standards and Additional Specifications (3)2.Construction of the CAN Bus (3)3.Messages (3)3.1.Baud Rate (3)3.2. Configuration Parameter for CAN Identifier and Transmission Rates (3)3.3Configuration Parameter to Enable Messages (4)3.4 Monitoring of Receive Messages (4)3.5Not Available or not Valid Data Bytes (4)3.6List of Messages (4)4.CAN Send Messages (5)5.CAN Receive Messages (10)Page 2 of 121. General RequirementsThe CAN Bus (Controller Area Network) is a communication port to exchange data between diagnostic systems and other controllers.MVS receives data for engine operation and sends diagnostic information, measured data and calculated data via the CAN Bus.1.1. Standards and Additional SpecificationsThe CAN-Interface is based on following standards :SAE-J1939/21 1994-07.SAE-J1939/71 1996-05DIN ISO 11898 August 1995Additional Specifications:List of MVS Error codes, Blink Codes2. Construction of the CAN BusThe can bus lines must be twisted pair.The maximum length of the complete Bus should not exceed 40m.The distance between two CAN Bus controllers must be min. 0,1m.The CAN BUS wires should go directly from one controller to the next controller,because separate lines from a controller to the can bus must be max. 0.3m (for max baud rates up to1Mbaud).The CAN Bus must be terminated with a resistor 121 1% min 0.5W at both ends of the CAN Bus. MVS has got an internal termination resistor. So it must be place at the end of the CAN Bus.For special applications MVS controller without termination resistors are available.3. Messages3.1. Baud RateBaud rate: 250 K Bit/s3.2. Configuration Parameter for CAN Identifier and Transmission RatesThe messages are corresponding to the standards see above.Additional MVS specific proprietary messages are defined.The transmit rates, the receive rates and the identifiers are specified in this document, but for special applications modifications may be necessary.The following parameter are configuration parameters for the CAN messages:1. Scan rates of the receive messagesPage 3 of 122. the identifiers are set to the values which are listed in the chapters of transmit and receive messages.For special application like to MVS controllers on one CAN BUS the complete identifiers can be modified by configuration parameters.3. The identifiers consist on:The Priority of the messageThe 2 Byte PDU which tells the receiver what message it is The source address of the message. That is the node address of the sender.It is the last byte of the identifier and normally set to zero for engine controllers.3.3 Configuration Parameter to Enable MessagesIt depends on the application which MVS CAN Bus messages are enabled.MVS sends the CAN messages all the time.The receive messages have access to the MVS engine control functions. Therefore for each receive message there is a configuration parameter to enable the receiving and the access to the MVS functionality. Enabled receive messages are monitored continuously.3.4 Monitoring of Receive MessagesEach enabled receive message will be monitored. Three seconds (configuration parameter) after start of the engine the time out monitoring will be started. If the receive message is missing longer than 5s (configuration parameter) then the message is in time out and a fault message will be generated.3.5 Not Available or not Valid Data BytesIf data of a messages are foreseen but not available or not used, then these data have to be marked as …not defined“ by setting value to FF in byte data and FFxx for 2byte data, as defined in the standard. Not valid data, i.e. recognized as defective by an diagnostic function, have to be set to the value FE or FExx.3.6 List of MessagesThe first column of the following lists contains the Message name, the repetition rate and the identifier. The second column explains the data bytes.Example:Name: Electronic Engine Controller Message 1EEC1Repetition rate: 10 msIdentifier: 0C F0 04 00Page 4 of 12Page 5 of 124. CAN Send MessagesMVS MS6.2 P060.V33Message Data BytesElectronic Engine Controller Message 1 EEC1 10 ms 0C F0 04 00 Byte 1: Status Bits 1 to 4 engine torque mode 0 = Idle governor active (default) 1 = Accelerator pedal active 2 = Cruise control active 3 = PTO governor active 4 = Road speed limitation active 5 = Brake control active 6 = Transmission control 7 = Torque limitation is active 8 = High speed governor is active Bits 5 to 8 are not defined Byte 2: Requested engine torque in % related to Mdmax 1% / bit, Offset 125, range 0 to 100% Example 135 = 10% Byte 3: Engine torque related to Mdmax 1% / bit, Offset 125, range 0 to 100% Byte 4,5: Engine speed 0,125 rpm/ bit, range 0to 8031 rpm Bytes 6, 7, 8 not defined Electronic Engine Controller Message 2 EEC2 50 ms 0C F0 03 00 Byte 1: Status Bit 1, 2 Idle throttle switch 00 = not idle and plausible 01 = idle and plausible 10 = not plausible ( error value) 11 = switch not available Bits 3, 4 status accelerator pedal Kick down switch 00 = not active, 01 = active, 10 = Error Bits 5,6,7,8 not defined Byte 2: Accelerator pedal 0,4 % / bit, range 0 to 100% Byte 3: Percent load at current speed Engine torque related to max engine torque at engine speed 1% / bit, range 0 to 125% Bytes 4, 5, 6, 7, 8 Not available Electronic Engine Controller Message 3 EEC3250 ms18 FE DF 00 Byte 1: Engine friction torquenominal friction torque related to max. friction torque ( Mdmax) 1% / bit, Offset 125, range 0 to 100%Example 135 = 10%Bytes 2, 3, 5,6,7,8: = not available / not definedCruise Control / Vehicle Speed 100 ms18 FE F1 00 Byte 1: StatusBits 3, 4 parking brake switch00 = not active, 01 = activeBits 1,2,5,6,7,8 not availableByte 2,3: Vehicle speed1/256 km/h /bit, Range 0 to 251 km/hByte 4: Bits 1, 2 Cruise Control Switch 100 = not active, 01 = activeBits 5, 6 Brake Switch, Bits 7, 8 Clutch Switch00 = not active, 01 = active, 10 = error, 11 = not available Bits 3, 4 are not supportedByte 5: Cruise Control Switch 2, Set speed switch:Bits 1, 2 set, Bits 3, 4 decelerate,Bits 5, 6 resume, Bits 7, 8 accelerate00 = not ac tive, 01 = active, 10 = error, don’t careByte 6: Cruise Control Set Speed1/256 km/h /bit, range 0 to 251 km/hByte 7, 8: State Cruise ControlBits 6, 7,8:0 = Off/Disabled1 = Hold2 = Accelerate3 = Decelerate/Coast4 = Resume5 = Set6 = Accelerator Override7 = not availableRetarder message ERC1 100ms18 F0 00 29 Byte 1: Status ERC1:Bits 1 to 4: Retarder Torque Mode, decimal values:0 = no request1 = exhaust brake switch operated, i.e. driver operated2 = exhaust brake requested by vehicle management, i.e.cruise control3 = Request for exhaust brake by transmission control6 = Locking out of exhaust brake by transmission control7 = Locking out of exhaust brake by ABS,ASR,MSRBits 5,6,7,8, Not supportedByte 2: Percent exhaust brake torque, actual retarder percent torque 1%/ bit, Offset 125, operating range –125% to 0%0 % = exhaust brake inactive ( Byte 2 = 125 –0 = 125)100% = exhaust brake active ( Byte 2 = 125 –100 = 25) Bytes 3 to 8 not definedEngine configuration(Broadcast Announce Message BAM) 1000 ms18 EC FF 00 This message contains more than 8 data bytes as must be transmitted using multi packet transport protocol, consisting of one header message (BAM) to define what message to transfer and the following packet messages.Byte 1: Control Byte = 32dBytes 2, 3 Total Message Size = 28 (data length)Page 6 of 12Byte 4: Total number of packets = 4Byte 5: = FFhBytes 6-8 Parameter Group Number of engine configuration = 00 FE E3 (PGN of engine configuration)Page 7 of 12Engine Configuration ( Data Transfer Packages) 1000 mspacket interval 100ms18 EB FF 00 Points of limiting torque map:Point 1: Torque / speed point at idlePoint 2: Torque / speed at highest possible engine speedPoints 3-5: T orque / speed points between points 1 and 2 to permitlinear interpolation over the entire torque range.Point 6: High idle speed (torque = 0)Point 7: Maximum momentary engine override speed (torque = 0)Package 1:Byte 1: Package identification = 1 (first package)Byte 2,3: Engine speed at idle, point 1Byte 4: Percent torque at idle, point 1Byte 5, 6: Highest possible engine speed, pt 2Byte 7: Percent torque at highest speed, pt 2Byte 8:Low byte of engine speed at point 3Package 2:Byte 1: Package identification = 2 (second package)Byte 2: High byte of engine speed at pt 3 1Byte 3: Percent torque at point 3 2Byte 4, 5: Engine speed at point 4Byte 6: Percent torque at point 4Byte 7, 8: Engine speed at point 5Package 3:Byte 1: Package identification = 3 (third package)Byte 2: Percent torque at point 5Byte 3, 4: Engine speed at high idle, point 6Byte 5, 6: Gain of end speed governorByte 7, 8: Reference engine torquePackage 4:Byte 1: Package identification: 4 (fourth package)Byte 2, 3: Maximum momentary engine override speed, point 7 Byte 4: Maximum momentary engine override time, 0.1s/bit,0 to 25s Byte 5-8: Not supported by EDCSpeed values: 0.125 rpm / bit, Range: 0 to 8031 rpmPercent torque values: 1%/ bit, Offset: -125%, Range: 0 to 125% Reference is reference torque of package 3, i.e. 135 = 10%Gain KP: it is not the droop, it is torque/ speed0.0007813 % of engine reference torque/rpm / bit,Range: 0 to 50,2 %/rpmTorque values: 1 Nm / bit, Range: 0 to 64 255 NmEngine temperature 1000ms18 FE EE 00 Byte 1: Coolant Water Temperature1K/bit, Offset –40 0C, range -40 to 210 0C i.e. 50d = 10Degrees CelsiusBytes 2 to 8 not availablePage 8 of 12Inlet Conditions 1000ms18 FE F6 00 Byte 2: Boost Pressure2 kPa/bit, range 0 to 500 kPAByte 3: Charge Air Temperature, intake manifold temperature 1K/bit, Offset –40 0C, Range -40 to 210 0CBytes 1, 4 to 8 not availableAnalog Message (AM-MSG)MVS specific message, not standard 500ms0C FE DA 00 Byte 1,2: Injection fuel0,1 mg/stroke/bit, range 0 to 409 mg/stroke/bit Byte 3, 4: fuel temperature1K/bit, Offset –40 0C, range -40 to 210 0C Bytes 5, 6 Oil pressure4 kPa/bit, range 0 to 1000 kPa/bitBytes 7, 8 Oil temperature (if available)0,03125 0C, offset -273 0C, i.e. 11936d = 100 0CDigital Message (DM-MSG)MVS specific message, not standard 500ms0CFEDB00 Byte 1: Switch InputBits:0 = Brake switch1 = reserved2 = clutch switch3 = Hand brake switch4 = Motor Brake switch5 = Low idle switchBits 6 and 7 reserved (set to zero) Byte 2: Switch OutputBits:0 = Motor brake switch1 = Cold start relayBits 2 to 7 reserved (set to zero) Byte 3: Switch Position (multi function switch1 = Position 12 = Position 2 .....and so onBytes 4 to 7 not defined (FFh)Engine Hours 500 ms0C FE E5 00 These engine hours are accumulated also when engine is stopped and the MVS is switched on. It counts the switched on time of the controller. Byte 1 Engine hours Low Byte Low WordByte 2 Engine Hours High Byte Low WordByte 3 Engine Hours Low Byte High WordByte 4 Engine Hours High Byte High WordBytes 5 to 8 not defined (FFh)Resolution 0,05 h / bitFailure Report (FRM-MSG)MVS specific message, not standard 1000 ms0C FE D4 00 Byte 1: Failure CodeByte 2: Type of failureByte 3: Environment condition 1Byte 4: Environment condition 2Byte 5: Frequency counterBytes 6 to 8 not defined (FFh)When there is more than one error present, they are to be transmitted one after another in a cyclic order. One failure message, per second has to be sent . If there are no failures present , then a NULL Block has to be transmitted.Page 9 of 12Page 10 of 12There error codes a listed in a separate document.5. CAN Receive MessagesMVS MS6.2 P060.V33Message Data bytes Engine torque request from transmission TSC1_TE 10 ms 0C 00 00 03 To control engine torque during gear shift Highest priority of all TSC1 messages Byte 1: Control Bits 00 = no access (default status in MVS) 10 = torque control active, torque value in byte 4 11 = torque limit control active, limit value in byte 4 Byte 4: Requested torque or torque limit 1% / bit, Offset 125, range 0 to 100% Example 135 = 10% Bytes 2, 3, 5,6,7,8: = FFhEngine torque request from ABS/ASR TSC1_AE 10 ms 0C 00 00 0B To control engine torque during driving wheels slipping conditions: Byte 1: Control Bits 00 = no access (default status in MVS) 10 = torque control active, torque value in byte 4 11 = torque limit control active, limit value in byte 4 Byte 4: Requested torque or torque limit 1% / bit, Offset 125, range 0 to 100% Example 135 = 10% Bytes 2, 3, 5,6,7,8: = FFhTorque request from vehicle controller TSC1_FM 10 ms 0C 00 00 11 Message from the vehicle ECU to control engine torque: Byte 1: Control Bits 00 = no access (default status in MVS) 10 = torque control active, torque value in byte 4 11 = torque limit control active, limit value in byte 4 Byte 4: Requested torque or torque limit 1% / bit, Offset 125, range 0 to 100% Example 135 = 10% Bytes 2, 3, 5,6,7,8: = FFhPseudo Pedal Position MVS specific message, not standard DEC_V1 50 ms 0C FF 01 17Byte 1: Control Bits 1 = pedal position request active 0 = nopedal position request, low idle Byte 2: Pseudo Pedal Position 0,4% / Bit Byte 3 to Byte 5: FFRetarder torque request from transmissionTSC1_TER50 ms0C 00 29 03 Message from transmission to control retarder torque during gear shift: Byte 1: Control Bits00 = no access (default status in MVS)10 = torque control active, torque value in byte 411 = torque limit control active, limit value in byte 4Byte 4: Requested torque or torque limit1% / bit, Offset 125, range 0 to 100%Example 135 = 10%Bytes 2, 3, 5,6,7,8: = FFhRetarder torque request from ABS/ASR TSC1_AER50 ms0C 00 29 0B Message from ABS/ASR to disable engine retarder during ABS-phase (ABS) or to command engine retarder with the desired torque (brake - engine retarder coupling): Byte 1: Control Bits00 = no access (default status in MVS)10 = torque control active, torque value in byte 411 = torque limit control active, limit value in byte 4Byte 4: requested torque value or limit torque value1% / bit, Offset 125, range -125% to 0%Example 110 = -15%If injection fuel is calculated lower zero then the retarderwill be activeBytes 2, 3, 5,6,7,8: = FFhRetarder torque request from vehicle ECUTSC1_FMER50 ms0C 00 29 11 Message from the vehicle ECU to control engine retarder: Byte 1: Control Bits00 = no access (default status in MVS)10 = torque control active, torque value in byte 411 = torque limit control active, limit value in byte 4 Byte 4: requested torque value or limit torque value1% / bit, Offset 125, range -125% to 0%Example 110 = -15%If injection fuel is calculated lower zero then the retarder will be activeBytes 2, 3, 5,6,7,8: = FFhTransmission Control ETC110ms0C F0 02 03 Message from transmission controlByte 1: StatusBits 1,2: will be ignoredBits 3,4: 00 = Torque converter lockup disengaged 01 = Torque converter lockup engaged Bits 5,6: 00 = shift not in progress01 = shift in progressBits 7,8: will be ignoredBytes 2,3: output shaft speed 0,125 rpm / bitByte 5: Command ETC1Bit 1,2: 0= Kick down status is not requested1= Kick down status is requestedBits 3-8: will be ignoredBytes 4, 6 to 8 will be ignoredPage 11 of 12Failure Space Erase (clear error memory) FSPERMVS specific message, not standardnot cyclic18 D0 03 2B No data necessary Data Length = 0The error memory will be cleared after receiving the message identifier. This is not a cyclic message therefore there is no time out monitoring enabled for this message.Power ReductionRROMVS specific message, not standard 50ms0C FE DB 2B Byte 1: Power Reduction value 1% / Bit,Example 4Bh = 75% of the max. power (torque) is available0 = engine stopsByte 2: start lock0 = no start lock1 = start locked (start prevention)ImmobilizerTSSL50ms18 E5 00 1DNot used yetPage 12 of 12。
CAN protocolM .J .SchofieldThe CAN protocol is an international standard defined in the ISO 11898. Beside the CAN protocol itself the conformance test for the CAN protocol is defined in the ISO 16845, which guarantees the interchangeability of the CAN chips.1. Principles of data exchangeCAN is based on the “broadcast communication mechanism”, which is based on a message-oriented transmission protocol. It defines message contents rather than stations and station addresses. Every message has a message identifier, which is unique within the whole network since it defines content and also the priority of the message. This is important when several stations compete for bus access (bus arbitration).As a result of the content-oriented addressing scheme a high degree of system and configuration flexibility is achieved. It is easy to add stations to an existing CAN network without making any hardware or software modifications to the present stations as long as the new stations are purely receivers. This allows for a modular concept and also permits the reception of multiple data and the synchronization of distributed processes. Also, data transmission is not based on the availability of specific types of stations, which allows simple servicing and upgrading of the network.2. Real-time data transmissionIn real-time processing the urgency of messages to be exchanged over the network can differ greatly: a rapidly changing dimension, e.g. engine load, has to be transmitted more frequently and therefore with less delays than other dimensions, e.g. engine temperature.The priority, at which a message is transmitted compared to another less urgent message, is specified by the identifier of each message. The priorities are laid down during system design in the form of corresponding binary values and cannot be changed dynamically. The identifier with the lowest binary number has the highest priority.Bus access conflicts are resolved by bit-wise arbitration of the identifiers involved by each station observing the bus level bit for bit. This happens in accordance with the wired-and-mechanism, by which the dominant state overwrites the recessive state. All those stations (nodes) with recessive transmission and dominant observation lose the competition for bus access. All those "losers" automatically become receivers of the message with the highest priority and do not re-attempt transmission until the bus is available again.Transmission requests are handled in order of their importance for the system as a whole. This proves especially advantageous in overload situations.Since bus access is prioritized on the basis of the messages, it is possible to guarantee low individual latency times in real-time systems.3. Message frame formatsThe CAN protocol supports two message frame formats, the only essential difference being in the length of the identifier. The “CAN base frame” supports a length of 11 bits for the identifier, and the “CAN extended frame” supports a length of 29 bits for the identifier.4. CAN extended frame formatThe difference between an extended frame format message and a base frame format message is the length of the identifier used. The 29-bit identifier is made up of the 11-bit identifier (“base identifier”) and an 18-bit extension (“identifier extension”). The distinction between CAN base frame format and CAN extended frame format is made by using the IDE bit, which is transmitted as dominant in case of an 11-bit frame, and transmitted as recessive in case of a 29-bit frame. As the two formats have to co-exist on one bus, it is laid down which message has higher priority on the bus in the case of bus access collision with different formats and the same identifier / base identifier: The 11-bitmessage always has priority over the 29-bit message.The extended format has some trade-offs: The bus latency time is longer (in minimum 20 bit-times), messages in extended format require more bandwidth (about 20 %), and the error detection performance is lower (because the chosen polynomial for the 15-bit CRC is optimized for frame length up to 112 bits).CAN controllers, which support extended frame format messages are also able to send and receive messages in CAN base frame format. CAN controllers that just cover the base frame format do not interpret extended frames correctly. However there are CAN controllers, which only support the base frame format but recognize extended messages and ignore them.5. Detecting and signaling errorsUnlike other bus systems, the CAN protocol does not use acknowledgement messages but instead signals errors immediately as they occur. For error detection the CAN protocol implements three mechanisms at the message level (data link layer: OSI layer 2):∙Cyclic Redundancy Check (CRC): The CRC safeguards the information in the frame by adding a frame check sequence (FCS) at the transmissionend. At the receiver this FCS is re-computed and tested against thereceived FCS. If they do not match, there has been a CRC error.∙Frame check: This mechanism verifies the structure of the transmitted frame by checking the bit fields against the fixed format and the framesize. Errors detected by frame checks are designated "format errors".∙ACK errors: Receivers of a message acknowledge the received frames. If the transmitter does not receive an acknowledgement an ACK error isindicated.The CAN protocol also implements two mechanisms for error detection at the bit level (physical layer: OSI layer 1):∙Monitoring: The ability of the transmitter to detect errors is based on the monitoring of bus signals. Each station that transmits also observes thebus level and thus detects differences between the bit sent and the bitreceived. This permits reliable detection of global errors and errors localto the transmitter.∙Bit stuffing: The coding of the individual bits is tested at bit level. The bit representation used by CAN is "Non Return to Zero (NRZ)" coding.The synchronization edges are generated by means of bit stuffing. Thatmeans after five consecutive equal bits the transmitter inserts a stuff bitinto the bit stream. This stuff bit has a complementary value, which isremoved by the receivers.If one or more errors are discovered by at least one station using the above mechanisms, the current transmission is aborted by sending an "error frame". This prevents other stations from accepting the message and thus ensures the consistency of data throughout the network. After transmission of an erroneous message that has been aborted, the sender automatically re-attempts transmission (automatic re-transmission). Nodes may again compete for bus access.However effective and efficient the method described may be, in the event of a defective station it might lead to all messages (including correct ones) being aborted. If no measures for self-monitoring were taken, the bus system would be blocked by this. The CAN protocol therefore provides a mechanism to distinguish sporadic errors from permanent errors and local failures at the station. This is done by statistical assessment of station error situations with the aim of recognizing a station's own defects and possibly entering an operation mode in which the rest of the CAN network is not negatively affected. This may continue as far as the station switching itself off to prevent other nodes' messages erroneously from being recognized as incorrect.CAN 协议斯科菲尔德CAN协议是在ISO 11898中定义的国际标准。