Zoom

Sontheim protocol stacks

Save as PDF

Protocol stacks

There are various CAN-based protocol stacks and tools available that were programmed with regards to utmost accuracy and proper coding. That makes them very process-reliable and field-proven. Sontheim provides both micro-controller-based and PC-based protocol stacks for

  • CANopen (including draft standard implementation)
  • SAE J1939
  • ISO 11783 (Isobus)
  • ISO 15765 (KWP2000 on CAN)
  • UDS
  • Basic CAN (Raw-CAN)
  • Proprietary protocols (customer-specific)
  • Further protocol stacks upon inquiry

A highly important business is the customer-specific alteration and fitting to individual requirements.

Additionally, there are several software components that work in relation to the Sontheim protocol stacks:

Flash bootloader

The Flash Bootloader is the Sontheim means for boot and flash processes. After a reset of the main unit the bootloader starts automatically with either starting an application or the routines of a flashing process. Both components support a variety of micro-controller and protocols:

Micro-controllers:

  • Infineon
  • Philips
  • Motorola
  • Fujitsu Siemens
  • Atmel
  • TriCore-based ECUs

Protocol stacks

  • CANopen (including draft standard implementation)
  • SAE J1939
  • ISO 11783 (Isobus)
  • ISO 15765 (KWP2000 on CAN)
  • UDS
  • Basic CAN (Raw-CAN)
  • Proprietary protocols (customer-specific)
  • Further protocol stacks upon inquiry

Flash tool

An important component of the Sontheim tool chain is the Flash Tool for downloading applications and flash tools for programming single ECUs (electronic control units). Numerous 8-, 16- and 32-bit micro-controllers and protocols are supported. In order to achieve the highest user-friendliness and an intuitive handling there are some OEM “look and feel” elements implemented. In addition to that the flash processes can be conducted in an automated or in a guided and silent way. The design of the Flash Tool can be adapted to the customer’s individual requirements, even security and data processing routines like Seed&Key algorithms can be adjusted.