top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2009 IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems
2009 IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems
Pubbl/distr/stampa [Place of publication not identified], : I E E E, 2009
Disciplina 629.2/72
ISBN 1-5090-6812-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996204390003316
[Place of publication not identified], : I E E E, 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2009 IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems
2009 IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems
Pubbl/distr/stampa [Place of publication not identified], : I E E E, 2009
Disciplina 629.2/72
ISBN 1-5090-6812-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145382203321
[Place of publication not identified], : I E E E, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Microsystems for Automotive Applications 2013 : Smart Systems for Safe and Green Vehicles / / edited by Jan Fischer-Wolfarth, Gereon Meyer
Advanced Microsystems for Automotive Applications 2013 : Smart Systems for Safe and Green Vehicles / / edited by Jan Fischer-Wolfarth, Gereon Meyer
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (397 p.)
Disciplina 629.2
629.2/72
629.272
Collana Lecture Notes in Mobility
Soggetto topico Automotive engineering
Mechatronics
Transportation
Electronic circuits
Nanotechnology
Automotive Engineering
Circuits and Systems
Nanotechnology and Microengineering
ISBN 3-319-00476-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Driver Assistance and Road Safety -- Networked Vehicles -- Electrified Vehicles -- Energy Efficiency -- Components & Systems.
Record Nr. UNINA-9910437763603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The car hacker's handbook : a guide for the penetration tester / / by Craig Smith
The car hacker's handbook : a guide for the penetration tester / / by Craig Smith
Autore Smith Craig (Reverse engineer)
Edizione [1st edition]
Pubbl/distr/stampa San Francisco, [California] : , : No Starch Press, , 2016
Descrizione fisica 1 online resource (306 pages) : illustrations
Disciplina 629.2/72
Soggetto topico Automotive computers - Security measures
Automobiles - Performance
Automobiles - Customizing
Penetration testing (Computer security)
Automobiles - Vandalism - Prevention
ISBN 1-4571-9884-3
1-59327-770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright Page -- About the Author -- About the Contributing Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Chris Evans -- Acknowledgments -- Introduction -- Why Car Hacking Is Good for All of Us -- What's in This Book -- Chapter 1: Understanding Threat Models -- Finding Attack Surfaces -- Threat Modeling -- Level 0: Bird's-Eye View -- Level 1: Receivers -- Level 2: Receiver Breakdown -- Threat Identification -- Level 0: Bird's-Eye View -- Level 1: Receivers -- Level 2: Receiver Breakdown -- Threat Rating Systems -- The DREAD Rating System -- CVSS: An Alternative to DREAD -- Working with Threat Model Results -- Summary -- Chapter 2: Bus Protocols -- The CAN Bus -- The OBD-II Connector -- Finding CAN Connections -- CAN Bus Packet Layout -- The ISO-TP Protocol -- The CANopen Protocol -- The GMLAN Bus -- The SAE J1850 Protocol -- The PWM Protocol -- The VPW Protocol -- The Keyword Protocol and ISO 9141-2 -- The Local Interconnect Network Protocol -- The MOST Protocol -- MOST Network Layers -- MOST Control Blocks -- Hacking MOST -- The FlexRay Bus -- Hardware -- Network Topology -- Implementation -- FlexRay Cycles -- Packet Layout -- Sniffing a FlexRay Network -- Automotive Ethernet -- OBD-II Connector Pinout Maps -- The OBD-III Standard -- Summary -- Chapter 3: Vehicle Communication With SocketCAN -- Setting Up can-utils to Connect to CAN Devices -- Installing can-utils -- Configuring Built-In Chipsets -- Configuring Serial CAN Devices -- Setting Up a Virtual CAN Network -- The CAN Utilities Suite -- Installing Additional Kernel Modules -- The can-isotp.ko Module -- Coding SocketCAN Applications -- Connecting to the CAN Socket -- Setting Up the CAN Frame -- The Procfs Interface -- The Socketcand Daemon -- Kayak -- Summary -- Chapter 4: Diagnostics and Logging.
Diagnostic Trouble Codes -- DTC Format -- Reading DTCs with Scan Tools -- Erasing DTCs -- Unified Diagnostic Services -- Sending Data with ISO-TP and CAN -- Understanding Modes and PIDs -- Brute-Forcing Diagnostic Modes -- Keeping a Vehicle in a Diagnostic State -- Event Data Recorder Logging -- Reading Data from the EDR -- The SAE J1698 Standard -- Other Data Retrieval Practices -- Automated Crash Notification Systems -- Malicious Intent -- Summary -- Chapter 5: Reverse Engineering the CAN Bus -- Locating the CAN Bus -- Reversing CAN Bus Communications with can-utils and Wireshark -- Using Wireshark -- Using candump -- Grouping Streamed Data from the CAN Bus -- Using Record and Playback -- Creative Packet Analysis -- Getting the Tachometer Reading -- Creating Background Noise with the Instrument Cluster Simulator -- Setting Up the ICSim -- Reading CAN Bus Traffic on the ICSim -- Changing the Difficulty of ICSim -- Reversing the CAN Bus with OpenXC -- Translating CAN Bus Messages -- Writing to the CAN Bus -- Hacking OpenXC -- Fuzzing the CAN Bus -- Troubleshooting When Things Go Wrong -- Summary -- Chapter 6: ECU Hacking -- Front Door Attacks -- J2534: The Standardized Vehicle Communication API -- Using J2534 Tools -- KWP2000 and Other Earlier Protocols -- Capitalizing on Front Door Approaches: Seed-Key Algorithms -- Backdoor Attacks -- Exploits -- Reversing Automotive Firmware -- Self-Diagnostic System -- Library Procedures -- Comparing Bytes to Identify Parameters -- Identifying ROM Data with WinOLS -- Code Analysis -- A Plain Disassembler at Work -- Interactive Disassemblers -- Summary -- Chapter 7: Building and Using ECU Test Benches -- The Basic ECU Test Bench -- Finding an ECU -- Dissecting the ECU Wiring -- Wiring Things Up -- Building a More Advanced Test Bench -- Simulating Sensor Signals -- Hall Effect Sensors -- Simulating Vehicle Speed.
Summary -- Chapter 8: Attacking ECUS And Other Embedded Systems -- Analyzing Circuit Boards -- Identifying Model Numbers -- Dissecting and Identifying a Chip -- Debugging Hardware with JTAG and Serial Wire Debug -- JTAG -- Serial Wire Debug -- The Advanced User Debugger -- Nexus -- Side-Channel Analysis with the ChipWhisperer -- Installing the Software -- Prepping the Victim Board -- Brute-Forcing Secure Boot Loaders in Power-Analysis Attacks -- Prepping Your Test with AVRDUDESS -- Setting Up the ChipWhisperer for Serial Communications -- Setting a Custom Password -- Resetting the AVR -- Setting Up the ChipWhisperer ADC -- Monitoring Power Usage on Password Entry -- Scripting the ChipWhisperer with Python -- Fault Injection -- Clock Glitching -- Setting a Trigger Line -- Power Glitching -- Invasive Fault Injection -- Summary -- Chapter 9: In-Vehicle Infotainment Systems -- Attack Surfaces -- Attacking Through the Update System -- Identifying Your System -- Determining the Update File Type -- Modifying the System -- Apps and Plugins -- Identifying Vulnerabilities -- Attacking the IVI Hardware -- Dissecting the IVI Unit's Connections -- Disassembling the IVI Unit -- Infotainment Test Benches -- GENIVI Meta-IVI -- Automotive Grade Linux -- Acquiring an OEM IVI for Testing -- Summary -- Chapter 10: Vehicle-to-Vehicle Communication -- Methods of V2V Communication -- The DSRC Protocol -- Features and Uses -- Roadside DSRC Systems -- WAVE Standard -- Tracking Vehicles with DSRC -- Security Concerns -- PKI-Based Security Measures -- Vehicle Certificates -- Anonymous Certificates -- Certificate Provisioning -- Updating the Certificate Revocation List -- Misbehavior Reports -- Summary -- Chapter 11: Weaponizing CAN Findings -- Writing the Exploit in C -- Converting to Assembly Code -- Converting Assembly to Shellcode -- Removing NULLs.
Creating a Metasploit Payload -- Determining Your Target Make -- Interactive Probing -- Passive CAN Bus Fingerprinting -- Responsible Exploitation -- Summary -- Chapter 12: Attacking Wireless Systems with SDR -- Wireless Systems and SDR -- Signal Modulation -- Hacking with TPMS -- Eavesdropping with a Radio Receiver -- TPMS Packets -- Activating a Signal -- Tracking a Vehicle -- Event Triggering -- Sending Forged Packets -- Attacking Key Fobs and Immobilizers -- Key Fob Hacks -- Attacking a PKES System -- Immobilizer Cryptography -- Physical Attacks on the Immobilizer System -- Flashback: Hotwiring -- Summary -- Chapter 13: Performance Tuning -- Performance Tuning Trade-Offs -- ECU Tuning -- Chip Tuning -- Flash Tuning -- Stand-Alone Engine Management -- Summary -- Appendix A: Tools of the Trade -- Hardware -- Lower-End CAN Devices -- Higher-End CAN Devices -- Software -- Wireshark -- PyOBD Module -- Linux Tools -- CANiBUS Server -- Kayak -- SavvyCAN -- O2OO Data Logger -- Caring Caribou -- c0f Fingerprinting Tool -- UDSim ECU Simulator -- Octane CAN Bus Sniffer -- AVRDUDESS GUI -- RomRaider ECU Tuner -- Komodo CAN Bus Sniffer -- Vehicle Spy -- Appendix B: Diagnostic Code Modes and PIDs -- Modes Above 0x10 -- Useful PIDs -- Appendix C: Creating Your Own Open Garage -- Filling Out the Character Sheet -- When to Meet -- Affiliations and Private Memberships -- Defining Your Meeting Space -- Contact Information -- Initial Managing Officers -- Equipment -- Abbreviations -- Index -- Footnotes -- Chapter 10: Vehicle-to-Vehicle Communication -- Chapter 12: Attacking Wireless Systems with SDR.
Record Nr. UNINA-9910798228303321
Smith Craig (Reverse engineer)  
San Francisco, [California] : , : No Starch Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The car hacker's handbook : a guide for the penetration tester / / by Craig Smith
The car hacker's handbook : a guide for the penetration tester / / by Craig Smith
Autore Smith Craig (Reverse engineer)
Edizione [1st edition]
Pubbl/distr/stampa San Francisco, [California] : , : No Starch Press, , 2016
Descrizione fisica 1 online resource (306 pages) : illustrations
Disciplina 629.2/72
Soggetto topico Automotive computers - Security measures
Automobiles - Performance
Automobiles - Customizing
Penetration testing (Computer security)
Automobiles - Vandalism - Prevention
ISBN 1-4571-9884-3
1-59327-770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright Page -- About the Author -- About the Contributing Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Chris Evans -- Acknowledgments -- Introduction -- Why Car Hacking Is Good for All of Us -- What's in This Book -- Chapter 1: Understanding Threat Models -- Finding Attack Surfaces -- Threat Modeling -- Level 0: Bird's-Eye View -- Level 1: Receivers -- Level 2: Receiver Breakdown -- Threat Identification -- Level 0: Bird's-Eye View -- Level 1: Receivers -- Level 2: Receiver Breakdown -- Threat Rating Systems -- The DREAD Rating System -- CVSS: An Alternative to DREAD -- Working with Threat Model Results -- Summary -- Chapter 2: Bus Protocols -- The CAN Bus -- The OBD-II Connector -- Finding CAN Connections -- CAN Bus Packet Layout -- The ISO-TP Protocol -- The CANopen Protocol -- The GMLAN Bus -- The SAE J1850 Protocol -- The PWM Protocol -- The VPW Protocol -- The Keyword Protocol and ISO 9141-2 -- The Local Interconnect Network Protocol -- The MOST Protocol -- MOST Network Layers -- MOST Control Blocks -- Hacking MOST -- The FlexRay Bus -- Hardware -- Network Topology -- Implementation -- FlexRay Cycles -- Packet Layout -- Sniffing a FlexRay Network -- Automotive Ethernet -- OBD-II Connector Pinout Maps -- The OBD-III Standard -- Summary -- Chapter 3: Vehicle Communication With SocketCAN -- Setting Up can-utils to Connect to CAN Devices -- Installing can-utils -- Configuring Built-In Chipsets -- Configuring Serial CAN Devices -- Setting Up a Virtual CAN Network -- The CAN Utilities Suite -- Installing Additional Kernel Modules -- The can-isotp.ko Module -- Coding SocketCAN Applications -- Connecting to the CAN Socket -- Setting Up the CAN Frame -- The Procfs Interface -- The Socketcand Daemon -- Kayak -- Summary -- Chapter 4: Diagnostics and Logging.
Diagnostic Trouble Codes -- DTC Format -- Reading DTCs with Scan Tools -- Erasing DTCs -- Unified Diagnostic Services -- Sending Data with ISO-TP and CAN -- Understanding Modes and PIDs -- Brute-Forcing Diagnostic Modes -- Keeping a Vehicle in a Diagnostic State -- Event Data Recorder Logging -- Reading Data from the EDR -- The SAE J1698 Standard -- Other Data Retrieval Practices -- Automated Crash Notification Systems -- Malicious Intent -- Summary -- Chapter 5: Reverse Engineering the CAN Bus -- Locating the CAN Bus -- Reversing CAN Bus Communications with can-utils and Wireshark -- Using Wireshark -- Using candump -- Grouping Streamed Data from the CAN Bus -- Using Record and Playback -- Creative Packet Analysis -- Getting the Tachometer Reading -- Creating Background Noise with the Instrument Cluster Simulator -- Setting Up the ICSim -- Reading CAN Bus Traffic on the ICSim -- Changing the Difficulty of ICSim -- Reversing the CAN Bus with OpenXC -- Translating CAN Bus Messages -- Writing to the CAN Bus -- Hacking OpenXC -- Fuzzing the CAN Bus -- Troubleshooting When Things Go Wrong -- Summary -- Chapter 6: ECU Hacking -- Front Door Attacks -- J2534: The Standardized Vehicle Communication API -- Using J2534 Tools -- KWP2000 and Other Earlier Protocols -- Capitalizing on Front Door Approaches: Seed-Key Algorithms -- Backdoor Attacks -- Exploits -- Reversing Automotive Firmware -- Self-Diagnostic System -- Library Procedures -- Comparing Bytes to Identify Parameters -- Identifying ROM Data with WinOLS -- Code Analysis -- A Plain Disassembler at Work -- Interactive Disassemblers -- Summary -- Chapter 7: Building and Using ECU Test Benches -- The Basic ECU Test Bench -- Finding an ECU -- Dissecting the ECU Wiring -- Wiring Things Up -- Building a More Advanced Test Bench -- Simulating Sensor Signals -- Hall Effect Sensors -- Simulating Vehicle Speed.
Summary -- Chapter 8: Attacking ECUS And Other Embedded Systems -- Analyzing Circuit Boards -- Identifying Model Numbers -- Dissecting and Identifying a Chip -- Debugging Hardware with JTAG and Serial Wire Debug -- JTAG -- Serial Wire Debug -- The Advanced User Debugger -- Nexus -- Side-Channel Analysis with the ChipWhisperer -- Installing the Software -- Prepping the Victim Board -- Brute-Forcing Secure Boot Loaders in Power-Analysis Attacks -- Prepping Your Test with AVRDUDESS -- Setting Up the ChipWhisperer for Serial Communications -- Setting a Custom Password -- Resetting the AVR -- Setting Up the ChipWhisperer ADC -- Monitoring Power Usage on Password Entry -- Scripting the ChipWhisperer with Python -- Fault Injection -- Clock Glitching -- Setting a Trigger Line -- Power Glitching -- Invasive Fault Injection -- Summary -- Chapter 9: In-Vehicle Infotainment Systems -- Attack Surfaces -- Attacking Through the Update System -- Identifying Your System -- Determining the Update File Type -- Modifying the System -- Apps and Plugins -- Identifying Vulnerabilities -- Attacking the IVI Hardware -- Dissecting the IVI Unit's Connections -- Disassembling the IVI Unit -- Infotainment Test Benches -- GENIVI Meta-IVI -- Automotive Grade Linux -- Acquiring an OEM IVI for Testing -- Summary -- Chapter 10: Vehicle-to-Vehicle Communication -- Methods of V2V Communication -- The DSRC Protocol -- Features and Uses -- Roadside DSRC Systems -- WAVE Standard -- Tracking Vehicles with DSRC -- Security Concerns -- PKI-Based Security Measures -- Vehicle Certificates -- Anonymous Certificates -- Certificate Provisioning -- Updating the Certificate Revocation List -- Misbehavior Reports -- Summary -- Chapter 11: Weaponizing CAN Findings -- Writing the Exploit in C -- Converting to Assembly Code -- Converting Assembly to Shellcode -- Removing NULLs.
Creating a Metasploit Payload -- Determining Your Target Make -- Interactive Probing -- Passive CAN Bus Fingerprinting -- Responsible Exploitation -- Summary -- Chapter 12: Attacking Wireless Systems with SDR -- Wireless Systems and SDR -- Signal Modulation -- Hacking with TPMS -- Eavesdropping with a Radio Receiver -- TPMS Packets -- Activating a Signal -- Tracking a Vehicle -- Event Triggering -- Sending Forged Packets -- Attacking Key Fobs and Immobilizers -- Key Fob Hacks -- Attacking a PKES System -- Immobilizer Cryptography -- Physical Attacks on the Immobilizer System -- Flashback: Hotwiring -- Summary -- Chapter 13: Performance Tuning -- Performance Tuning Trade-Offs -- ECU Tuning -- Chip Tuning -- Flash Tuning -- Stand-Alone Engine Management -- Summary -- Appendix A: Tools of the Trade -- Hardware -- Lower-End CAN Devices -- Higher-End CAN Devices -- Software -- Wireshark -- PyOBD Module -- Linux Tools -- CANiBUS Server -- Kayak -- SavvyCAN -- O2OO Data Logger -- Caring Caribou -- c0f Fingerprinting Tool -- UDSim ECU Simulator -- Octane CAN Bus Sniffer -- AVRDUDESS GUI -- RomRaider ECU Tuner -- Komodo CAN Bus Sniffer -- Vehicle Spy -- Appendix B: Diagnostic Code Modes and PIDs -- Modes Above 0x10 -- Useful PIDs -- Appendix C: Creating Your Own Open Garage -- Filling Out the Character Sheet -- When to Meet -- Affiliations and Private Memberships -- Defining Your Meeting Space -- Contact Information -- Initial Managing Officers -- Equipment -- Abbreviations -- Index -- Footnotes -- Chapter 10: Vehicle-to-Vehicle Communication -- Chapter 12: Attacking Wireless Systems with SDR.
Record Nr. UNINA-9910822423003321
Smith Craig (Reverse engineer)  
San Francisco, [California] : , : No Starch Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data acquisition from light-duty vehicles using OBD and CAN / / Eric Walter, Richard Walter
Data acquisition from light-duty vehicles using OBD and CAN / / Eric Walter, Richard Walter
Autore Walter Eric
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale, Pa. (400 Commonwealth Dr., Wallendale PA USA) : , : Society of Automotive Engineers, , 2017
Descrizione fisica 1 PDF (186 pages)
Disciplina 629.2/72
Collana Society of Automotive Engineers. Electronic publications
Soggetto topico Motor vehicles - Electric equipment
ISBN 0-7680-9541-7
0-7680-8352-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Benefits and applications of the in-vehicle network for data acquisition -- Chapter 2. Comparison with traditional data acquisition -- Chapter 3. Binary, hex, bits, and bytes -- Chapter 4. Controller area network (CAN) protocol -- Chapter 5. On-board diagnostics (OBD) background and standards -- Chapter 6. OBD-II diagnostic messages and test modes -- Chapter 7. J1979 OBD-II data with mode $01 -- Chapter 8. Mode $06: request on-board monitoring test results for specific monitored systems -- Chapter 9. Enhanced diagnostics -- Chapter 10. Additional protocols -- Chapter 11. Diagnostic trouble codes (DTCs) -- Chapter 12. Steps to acquire LD in-vehicle network data -- Chapter 13. Applications and example data -- Chapter 14. Calculating fuel economy -- Chapter 15. Reverse engineering messages -- Chapter 16. Data sotrage and transfer.
Record Nr. UNINA-9910438218403321
Walter Eric  
Warrendale, Pa. (400 Commonwealth Dr., Wallendale PA USA) : , : Society of Automotive Engineers, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
FlexRay and its applications [[electronic resource] ] : real time multiplexed network / / Dominique Paret
FlexRay and its applications [[electronic resource] ] : real time multiplexed network / / Dominique Paret
Autore Paret Dominique
Pubbl/distr/stampa Hoboken, N.J., : Wiley, 2012
Descrizione fisica 1 online resource (336 p.)
Disciplina 629.2/72
Soggetto topico FlexRay (Computer network protocol)
Motor vehicles - Electronic equipment
Motor vehicles - Automatic control
Automotive computers
Adaptive control systems
ISBN 1-282-25406-5
9786613814715
1-119-96406-7
1-119-96405-9
Classificazione TEC008070
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; List of Abbreviations; Part A: 'Secure Real Time' Applications; 1 Reminders about the CAN Protocol; 1.1 The Limitations of CAN; 1.2 'Event-Triggered' and 'Time-Triggered' Aspects; 1.2.1 The Probabilistic Side of CAN; 1.2.2 The Deterministic Side of Applications; 2 The TTCAN Protocol; 2.1 TTCAN - ISO 11898-4; 2.2 Session Layer; 2.3 Principle of Operation of TTCAN; 3 Emergence of 'X-by-Wire' Systems; 3.1 High Throughput and X-by-Wire; 3.2 Redundancy; 3.3 High-Level Application Requirements; 3.3.1 The Number of Communication Systems is Growing
3.3.2 The Electronic Architecture Must be Common to Several Vehicle Platforms 3.3.3 Some Things the Architecture of the Communication Network and the Nodes Must Allow; 3.4 High-Level Functional Requirements; 3.4.1 Speed of Communication; 3.4.2 Physical Layer; 3.4.3 Access to and Management of the Medium; 3.4.4 Synchronisation Method; 3.4.5 Network Topologies; 3.4.6 Requirements at System Level; Part B: The Flexray Concept and Its Communication Protocol; 4 The Genesis of FlexRay; 4.1 The TTP/C Protocol; 4.2 FlexRay; 4.2.1 The Genesis of FlexRay; 4.3 The FlexRay Consortium
4.4 The Aim of FlexRay 4.4.1 A Flexible Configuration; 4.4.2 Solutions; 5 FlexRay and Real Time; 5.1 Physical Time; 5.2 Local Time; 5.2.1 Local Clock; 5.2.2 'Clock Tick' and Microticks; 5.2.3 In Practice; 5.3 Global View at Network Level - Global Time; 5.3.1 Concept of Global Time; 5.3.2 Macrotick (MT); 5.3.3 And the Bit Time - What's Happening to it Inside There?; 5.4 Summarizing: Time and its Hierarchies in FlexRay; 6 The FlexRay Protocol; 6.1 History; 6.2 General - Channels, Cycles, Segments and Slots; 6.2.1 Philosophy of the Protocol
6.2.2 Hierarchy and Overall Form of FlexRay Communication 6.3 Channels and Cycles; 6.3.1 Communication Channel(s); 6.3.2 Communication Cycle; 6.4 Segments; 6.4.1 A Little Philosophy about Static and Dynamic Segments and Their Purposes; 6.4.2 Slots and Minislots; 6.4.3 Static Segments and Slots; 6.4.4 Dynamic Segments and Minislots; 6.4.5 Summary; 6.5 Communication Frames; 6.5.1 Overview of Frames; 6.5.2 Common Constituent Parts of Static and Dynamic Frames; 6.5.3 Encapsulation and Coding of Frames of Logical Data in Slots and Minislots
6.5.4 . . . for Frames which are Transported during Static and Dynamic Segments 6.6 'SW - Symbol Window' Segment; 6.7 'NIT - Network Idle Time' Segment; 7 Access to the Physical Layer; 7.1 Definition of Tasks; 7.2 Execution of the Communication Cycle; 7.3 Frame ID (11 Bits); 7.4 Arbitration Grid Level; 7.4.1 Basic Concepts; 7.4.2 Policy for Access to the Medium; 7.5 Conditions of Transmission and Access to the Medium during the Static Segment; 7.6 Conditions of Transmission and Access to the Medium during the Dynamic Segment; 7.6.1 Access to the Medium during the Dynamic Segment - Example 1
7.6.2 Particular, Difficult Choice of Hierarchy of Frame ID - Example 2
Record Nr. UNINA-9910139691503321
Paret Dominique  
Hoboken, N.J., : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
FlexRay and its applications : real time multiplexed network / / Dominique Paret
FlexRay and its applications : real time multiplexed network / / Dominique Paret
Autore Paret Dominique
Edizione [2nd ed.]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, 2012
Descrizione fisica 1 online resource (336 p.)
Disciplina 629.2/72
Soggetto topico FlexRay (Computer network protocol)
Motor vehicles - Electronic equipment
Motor vehicles - Automatic control
Automotive computers
Adaptive control systems
ISBN 1-282-25406-5
9786613814715
1-119-96406-7
1-119-96405-9
Classificazione TEC008070
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; List of Abbreviations; Part A: 'Secure Real Time' Applications; 1 Reminders about the CAN Protocol; 1.1 The Limitations of CAN; 1.2 'Event-Triggered' and 'Time-Triggered' Aspects; 1.2.1 The Probabilistic Side of CAN; 1.2.2 The Deterministic Side of Applications; 2 The TTCAN Protocol; 2.1 TTCAN - ISO 11898-4; 2.2 Session Layer; 2.3 Principle of Operation of TTCAN; 3 Emergence of 'X-by-Wire' Systems; 3.1 High Throughput and X-by-Wire; 3.2 Redundancy; 3.3 High-Level Application Requirements; 3.3.1 The Number of Communication Systems is Growing
3.3.2 The Electronic Architecture Must be Common to Several Vehicle Platforms 3.3.3 Some Things the Architecture of the Communication Network and the Nodes Must Allow; 3.4 High-Level Functional Requirements; 3.4.1 Speed of Communication; 3.4.2 Physical Layer; 3.4.3 Access to and Management of the Medium; 3.4.4 Synchronisation Method; 3.4.5 Network Topologies; 3.4.6 Requirements at System Level; Part B: The Flexray Concept and Its Communication Protocol; 4 The Genesis of FlexRay; 4.1 The TTP/C Protocol; 4.2 FlexRay; 4.2.1 The Genesis of FlexRay; 4.3 The FlexRay Consortium
4.4 The Aim of FlexRay 4.4.1 A Flexible Configuration; 4.4.2 Solutions; 5 FlexRay and Real Time; 5.1 Physical Time; 5.2 Local Time; 5.2.1 Local Clock; 5.2.2 'Clock Tick' and Microticks; 5.2.3 In Practice; 5.3 Global View at Network Level - Global Time; 5.3.1 Concept of Global Time; 5.3.2 Macrotick (MT); 5.3.3 And the Bit Time - What's Happening to it Inside There?; 5.4 Summarizing: Time and its Hierarchies in FlexRay; 6 The FlexRay Protocol; 6.1 History; 6.2 General - Channels, Cycles, Segments and Slots; 6.2.1 Philosophy of the Protocol
6.2.2 Hierarchy and Overall Form of FlexRay Communication 6.3 Channels and Cycles; 6.3.1 Communication Channel(s); 6.3.2 Communication Cycle; 6.4 Segments; 6.4.1 A Little Philosophy about Static and Dynamic Segments and Their Purposes; 6.4.2 Slots and Minislots; 6.4.3 Static Segments and Slots; 6.4.4 Dynamic Segments and Minislots; 6.4.5 Summary; 6.5 Communication Frames; 6.5.1 Overview of Frames; 6.5.2 Common Constituent Parts of Static and Dynamic Frames; 6.5.3 Encapsulation and Coding of Frames of Logical Data in Slots and Minislots
6.5.4 . . . for Frames which are Transported during Static and Dynamic Segments 6.6 'SW - Symbol Window' Segment; 6.7 'NIT - Network Idle Time' Segment; 7 Access to the Physical Layer; 7.1 Definition of Tasks; 7.2 Execution of the Communication Cycle; 7.3 Frame ID (11 Bits); 7.4 Arbitration Grid Level; 7.4.1 Basic Concepts; 7.4.2 Policy for Access to the Medium; 7.5 Conditions of Transmission and Access to the Medium during the Static Segment; 7.6 Conditions of Transmission and Access to the Medium during the Dynamic Segment; 7.6.1 Access to the Medium during the Dynamic Segment - Example 1
7.6.2 Particular, Difficult Choice of Hierarchy of Frame ID - Example 2
Record Nr. UNINA-9910824733303321
Paret Dominique  
Hoboken, N.J., : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Onboard Diagnostics and Measurement in the Automotive Industry, Shipbuilding, and Aircraft Construction
Onboard Diagnostics and Measurement in the Automotive Industry, Shipbuilding, and Aircraft Construction
Autore Palocz-Andresen Michael
Edizione [1st ed.]
Pubbl/distr/stampa Warrendale : , : SAE International, , 2012
Descrizione fisica 1 online resource (184 pages)
Disciplina 629.2/72
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910438308903321
Palocz-Andresen Michael  
Warrendale : , : SAE International, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui