The In-Car Computing Network: An Embedded Systems Challenge

نویسنده

  • Karl-Thomas Neumann
چکیده

Modern vehicles are in fact computer networks on wheels. Up to 60 electronic control units are connected using various networking technologies such as CAN (Controler Area Network) or MOST (optical fibres for multimedia content). Many of the control units use state of the art microcontrollers and have complex analog and digital interfacing circuitry. Software is playing an ever increasing role in the definition of vehicle control functions. The speech is giving an overview on modern vehicle electronic architecture and its inherent hardware and software challenges. The growth fields of automotive electronics will be highlighted and examples of next generation applications will be given. Karl-Thomas Neumann is Director of Electronic Strategy, reporting to Volkswagen group board member for R&D. Prior to his current position, Dr Neumann was the Director of Electronic Research supporting all nine brands of the Volkswagen Group. Before joining Volkswagen, Dr. Neumann spend six years at Motorola Semiconductor Product Sector in Munchen performing various functions ranging from Design Engineer, Manager of Strategy and Technology Development Europe to Director of Strategy and Advanced systems Labs. Dr. Neumann completed Electrical Engineering with focus on Information Processing at University of Dortmund (1987) and received his Ph.D. in Electrical Engineering from University of Duisburg in 1995. Proceedings of the International Conference on Computer Design: VLSI in Computers & Processors (ICCD’01) 1063-6404/01 $10.00 © 2001 IEEE

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Reaction Delay as the Driver Effects in the Development of Car-Following Models

Car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new Intelligent Transportation System (ITS) applications. A number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. This paper presents a novel idea to calculate ...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

متن کامل

Neural Controller Design for Suspension Systems

The main problem of vehicle vibration comes from road roughness. An active suspension systempossesses the ability to reduce acceleration of sprung mass continuously as well as to minimizesuspension deflection, which results in improvement of tire grip with the road surface. Thus, braketraction control and vehicle maneuverability can be improved consider ably .This study developeda new active su...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001