Have a look at this Acrobat file: http://www.ece.cmu.edu/~ece649/lectures/14_can.pdf
which covers:
- CAN overview
- Bit dominance and binary countdown
- Bit stuffing (including the bit stuffing error vulnerability in CAN)
- Message headers
- Message header filtering
- Network length restrictions
- Devicenet overview
No comments:
Post a Comment
Please send me your comments. I read all of them, and I appreciate them. To control spam I manually approve comments before they show up. It might take a while to respond. I appreciate generic "I like this post" comments, but I don't publish non-substantive comments like that.
If you prefer, or want a personal response, you can send e-mail to comments@koopman.us.
If you want a personal response please make sure to include your e-mail reply address. Thanks!