Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised
نویسندگان
چکیده
منابع مشابه
Message response time analysis for ideal controller area network (CAN) refuted
This paper revisits basic message response time analysis of controller area network (CAN). We show that existing message response time analysis, as presented in [10], is optimistic. Assuming discrete scheduling, the problem can be resolved by applying worst-case response time analysis for fixed-priority non-preemptive scheduling (FPNS) as described in [4].
متن کاملCalculating Controller Area Network (can) Message Response Times
Controller Area Network (CAN) is a well designed communications bus for sending and receiving short real-time control messages at speeds of up to 1Mbit/sec. One of the perceived drawbacks to CAN has been the inability to bound accurately the worst-case response time of a given message (i.e. the longest time between queueing the message and the message arriving at the destination processors). Th...
متن کاملImpact Case Study: Guaranteed Performance on Controller Area Network (CAN)
Controller Area Network (CAN) is a digital communications bus used by the automotive industry for invehicle networks. Research from the Real-Time Systems Group at the University of York introduced techniques that enable CAN to operate under high loads (approx. 80% utilisation) while ensuring that all messages meet their deadlines. The research led directly to the development of commercial produ...
متن کاملController Area Network ( CAN ) EECS 461 , Fall 2008 ∗
Up until now, we’ve considered our embedded control system to be self-contained: an algorithm implemented in software resident on a single microprocessor, communicating with its environment through sensors and actuators via peripheral devices such as an analog-to-digital converter. In fact, many embedded systems are distributed, consisting of multiple microprocessors communicating over one or m...
متن کاملA System to Recognize Intruders in Controller Area Network (CAN)
The existing automotive Controller Area Network (CAN) is vulnerable. The absence of sender verification in its communication means that an attacker acting as a node on its network will be treated like a legitimate node that has always been present, allowing attackers to transmit and receive messages freely. This paper proposes a system that will allow nodes using CAN to identify legitimate mess...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Real-Time Systems
سال: 2007
ISSN: 0922-6443,1573-1383
DOI: 10.1007/s11241-007-9012-7