STANDARD PROCEDURE
STANDARD PROCEDURE - RKE TRANSMITTER
PROGRAMMING
To program the Remote Keyless Entry (RKE)
transmitter access codes into the RKE receiver in the
Passenger Door Module (PDM) requires the use of a
DRBIIItscan tool. Refer to the appropriate diagnos-
tic information.
STANDARD PROCEDURE - RKE TRANSMITTER
BATTERIES
The Remote Keyless Entry (RKE) transmitter case
snaps open and shut for battery access. To replace
the RKE transmitter batteries:
(1) Using a trim stick or a thin coin, gently pry at
the notch in the center seam of the RKE transmitter
case halves near the key ring until the two halves
unsnap.
(2) Lift the back half of the transmitter case off of
the RKE transmitter.
(3) Remove the two batteries from the RKE trans-
mitter.(4) Replace the two batteries with new Panasonic
CR2016, or their equivalent. Be certain that the bat-
teries are installed with their polarity correctly ori-
ented.
(5) Align the two RKE transmitter case halves
with each other, and squeeze them firmly and evenly
together until they snap back into place.
NOTE: The RKE system for this model uses a roll-
ing code security strategy. This strategy requires
that synchronization be maintained between the
RKE transmitter and the RKE receiver. RKE trans-
mitter battery removal or replacement can cause a
loss of synchronization. If the RKE receiver fails to
respond to the RKE transmitter following battery
removal or replacement, depress and release the
RKE transmitter Unlock button repeatedly while lis-
tening carefully for the power door locks in the
vehicle to cycle. After between five and eight
presses of the Unlock button, the power door locks
should cycle, indicating that re-synchronization has
occurred.
8N - 10 POWER LOCKSWJ
REMOTE KEYLESS ENTRY TRANSMITTER (Continued)
following procedure should be performed using a
DRBIIItscan tool to verify the status of both airbag
squibs before either deployed airbag is removed from
the vehicle for disposal.
CAUTION: Deployed front airbags having two initia-
tors (squibs) in the airbag inflator may or may not
have live pyrotechnic material within the inflator. Do
not dispose of these airbags unless you are sure of
complete deployment. Refer to the Hazardous Sub-
stance Control System for proper disposal proce-
dures. Dispose of all non-deployed and deployed
airbags in a manner consistent with state, provin-
cial, local, and federal regulations.(1) Be certain that the DRBIIItscan tool contains
the latest version of the proper DRBIIItsoftware.
Connect the DRBIIItto the 16-way Data Link Con-
nector (DLC). The DLC is located on the driver side
lower edge of the instrument panel, outboard of the
steering column.
(2) Turn the ignition switch to the On position.
(3) Using the DRBIIIt, read and record the active
(current) Diagnostic Trouble Code (DTC) data.
Using the active DTC information, refer to theAir-
bag Squib Statustable to determine the status of
both driver and/or passenger airbag squibs.
AIRBAG SQUIB STATUS
IF the Active DTC is: Conditions Squib Status
Driver or Passenger Squib 1
openANDthe stored DTC minutes for both Driver
or Passenger squibs are within 15 minutes of
each otherBoth Squib 1 and 2 were
used.
Driver or Passenger Squib 2
open
Driver or Passenger Squib 1
openANDthe stored DTC minutes for Driver or
Passenger Squib 2 open is GREATER than the
stored DTC minutes for Driver or Passenger
Squib 1 by 15 minutes or moreSquib 1 was used; Squib 2 is
live.
Driver or Passenger Squib 2
open
Driver or Passenger Squib 1
openANDthe stored DTC minutes for Driver or
Passenger Squib 1 open is GREATER than the
stored DTC minutes for Driver or Passenger
Squib 2 by 15 minutes or moreSquib 1 is live; Squib 2 was
used.
Driver or Passenger Squib 2
open
Driver or Passenger Squib 1
openANDDriver or Passenger Squib 2 open is NOT
an active codeSquib 1 was used; Squib 2 is
live.
Driver or Passenger Squib 2
openANDDriver or Passenger Squib 1 open is NOT
an active codeSquib 1 is live; Squib 2 was
used.
Ifnone of the Driver or Passenger Squib 1 or 2
open are active codes, the status of the airbag squibs
is unknown. In this case the airbag should be han-
dled and disposed of as if the squibs were both live.
CLEANUP PROCEDURE
Following a supplemental restraint deployment,
the vehicle interior will contain a powdery residue.
This residue consists primarily of harmless particu-
late by-products of the small pyrotechnic charge that
initiates the propellant used to deploy a supplemen-
tal restraint. However, this residue may also contain
traces of sodium hydroxide powder, a chemical
by-product of the propellant material that is used to
generate the inert gas that inflates the airbag. Since
sodium hydroxide powder can irritate the skin, eyes,
nose, or throat, be sure to wear safety glasses, rubber
gloves, and a long-sleeved shirt during cleanup (Fig.
3).
Fig. 3 Wear Safety Glasses and Rubber Gloves -
Typical
WJRESTRAINTS 8O - 7
RESTRAINTS (Continued)
tion feature of the ITM can be disabled by depressing
the ªLockº button on the RKE transmitter three
times or cycling the key in the driver door cylinder
from the center to lock position within fifteen seconds
during VTA arming, while the security indicator is
still flashing rapidly. The VTA provides a single short
siren ªchirpº as an audible conformation that the
motion detect disable request has been received. The
ITM must be electronically enabled in order for the
intrusion alarm to perform as designed. The intru-
sion alarm function of the ITM is enabled on vehicles
equipped with this option at the factory, but a service
replacement ITM must be configured and enabled by
the dealer using the DRBIIItscan tool. Refer to the
appropriate diagnostic information.
OPERATION - SENTRY KEY IMMOBILIZER
SYSTEM
The Sentry Key Immobilizer System (SKIS) is
designed to provide passive protection against unau-
thorized vehicle use by disabling the engine after
about two seconds of running, whenever any method
other than a valid Sentry Key is used to start the
vehicle. The SKIS is considered a passive protection
system because it is always active when the ignition
system is energized and does not require any cus-
tomer intervention. The SKIS uses Radio Frequency
(RF) communication to obtain confirmation that the
key in the ignition switch is a valid key for operating
the vehicle. The microprocessor-based SKIS hard-
ware and software also uses messages to communi-
cate with other modules in the vehicle over the
Programmable Communications Interface (PCI) data
bus. (Refer to 8 - ELECTRICAL/ELECTRONIC CON-
TROL MODULES/COMMUNICATION - OPERA-
TION).
Pre-programmed Sentry Key transponders are pro-
vided with the vehicle from the factory. Each Sentry
Key Immobilizer Module (SKIM) will recognize a
maximum of eight Sentry Keys. If the customer
would like additional keys other than those provided
with the vehicle, they may be purchased from any
authorized dealer. These additional keys must be pro-
grammed to the SKIM in the vehicle in order for the
system to recognize them as valid keys. This can be
done by the dealer using a DRBIIItscan tool or, if
Customer Learn programming is an available SKIS
feature in the market where the vehicle was pur-
chased, the customer can program the additional
keys, as long as at least two valid Sentry Keys are
already available. (Refer to 8 - ELECTRICAL/VEHI-
CLE THEFT SECURITY - STANDARD PROCE-
DURE - TRANSPONDER PROGRAMMING).
The SKIS performs a self-test each time the igni-
tion switch is turned to the On position, and will
store fault information in the form of DiagnosticTrouble Codes (DTC's) if a system malfunction is
detected. Refer to the appropriate diagnostic informa-
tion.
DIAGNOSIS AND TESTING
DIAGNOSIS AND TESTING - VEHICLE THEFT
SECURITY SYSTEM
The VTSS-related hard wired inputs to and out-
puts from the Body Control Module (BCM), the
Driver Door Module (DDM), or the Passenger Door
Module (PDM) may be diagnosed and tested using
conventional diagnostic tools and procedures. Refer
to the appropriate wiring information.
However, conventional diagnostic methods may not
prove conclusive in the diagnosis of the BCM, the
DDM, the PDM, or the Programmable Communica-
tions Interface (PCI) data bus network. In order to
obtain conclusive testing of the VTSS, the BCM, the
DDM, the PDM, and the PCI data bus network must
also be checked. The most reliable, efficient, and
accurate means to diagnose the VTSS requires the
use of a DRBIIItscan tool and the appropriate diag-
nostic information.
WARNING: ON VEHICLES EQUIPPED WITH AIR-
BAGS, DISABLE THE AIRBAG SYSTEM BEFORE
ATTEMPTING ANY STEERING WHEEL, STEERING
COLUMN, OR INSTRUMENT PANEL COMPONENT
DIAGNOSIS OR SERVICE. DISCONNECT AND ISO-
LATE THE BATTERY NEGATIVE (GROUND) CABLE,
THEN WAIT TWO MINUTES FOR THE AIRBAG SYS-
TEM CAPACITOR TO DISCHARGE BEFORE PER-
FORMING FURTHER DIAGNOSIS OR SERVICE. THIS
IS THE ONLY SURE WAY TO DISABLE THE AIRBAG
SYSTEM. FAILURE TO TAKE THE PROPER PRE-
CAUTIONS COULD RESULT IN ACCIDENTAL AIR-
BAG DEPLOYMENT AND POSSIBLE PERSONAL
INJURY.
8Q - 4 VEHICLE THEFT SECURITYWJ
VEHICLE THEFT SECURITY (Continued)
factory. The Sentry Key Immobilizer Module (SKIM)
can be programmed to recognize up to a total of eight
Sentry Keys. When programming a blank Sentry Key
transponder, the key must first be cut to match the
ignition switch lock cylinde for which it will be used.
Once the additional key has been cut, the SKIM
must be programmed to recognize it as a valid key.
There are two possible methods to program the
SKIM to recognize a new or additional valid key, the
Secured Access Method and the Customer Learn
Method. Following are the details of these two pro-
gramming methods.
SECURED ACCESS METHOD
The Secured Access method applies to all vehicles.
This method requires the use of a DRBIIItscan tool.
This method will also require that you have access to
the unique four-digit PIN code that was assigned to
the original SKIM. The PIN codemustbe used to
enter the Secured Access Mode in the SKIM. This
PIN number may be obtained from the vehicle owner,
from the original vehicle invoice, or from the
DaimlerChrysler Customer Center. Refer to the
appropriate diagnostic information for the proper
Secured Access method programming procedures.
CUSTOMER LEARN METHOD
The Customer Learn feature is only available on
domestic vehicles, or those vehicles which have a
U.S. country code designator. This programming
method also requires access to at least two valid Sen-
try Keys. If two valid Sentry Keys are not available,
or if the vehicle does not have a U.S. country code
designator, the Secured Access Methodmustbe used
to program new or additional valid keys to the SKIM.
The Customer Learn programming method proce-
dures are as follows:
(1) Obtain the blank Sentry Key(s) that are to be
programmed as valid keys for the vehicle. Cut the
blank key(s) to match the ignition switch lock cylin-
der mechanical key codes.
(2) Insert one of the two valid Sentry Keys into the
ignition switch and turn the ignition switch to the
On position.
(3) After the ignition switch has been in the On
position for longer than three seconds, but no more
than fifteen seconds, cycle the ignition switch back to
the Off position. Replace the first valid Sentry Key in
the ignition switch lock cylinder with the second
valid Sentry Key and turn the ignition switch back to
the On position. The second valid Sentry Key must
be inserted in the lock cylinder within fifteen seconds
of removing the first valid key.
(4) About ten seconds after the completion of Step
3, the SKIS indicator in the instrument cluster will
start to flash and a single audible chime tone willsound to indicate that the system has entered the
Customer Learn programming mode.
(5) Within sixty seconds of entering the Customer
Learn programming mode, turn the ignition switch to
the Off position, replace the valid Sentry Key with a
blank Sentry Key transponder, and turn the ignition
switch back to the On position.
(6) About ten seconds after the completion of Step
5, a single audible chime tone will sound and the
SKIS indicator will stop flashing, stay on solid for
three seconds, then turn off to indicate that the
blank Sentry Key has been successfully programmed.
The SKIS will immediately exit the Customer Learn
programming mode and the vehicle may now be
started using the newly programmed valid Sentry
Key.
Each of these steps must be repeated and com-
pleted in their entirety for each additional Sentry
Key that is to be programmed. If the above steps are
not completed in the given sequence, or within the
allotted time, the SKIS will exit the Customer Learn
programming mode and the programming will be
unsuccessful. The SKIS will also automatically exit
the Customer Learn programming mode if it sees a
non-blank Sentry Key transponder when it should
see a blank, if it has already programmed eight (8)
valid Sentry Keys, or if the ignition switch is turned
to the Off position for more than about fifty seconds.
NOTE: If an attempt is made to start the vehicle
while in the Customer Learn mode (SKIS indicator
flashing), the SKIS will respond as though the vehi-
cle were being started with an invalid key. In other
words, the engine will stall after about two seconds
of operation. No faults will be set.
NOTE: Once a Sentry Key has been programmed as
a valid key to a vehicle, it cannot be programmed
as a valid key for use on any other vehicle.
DOOR CYLINDER LOCK
SWITCH
DESCRIPTION
Vehicles manufactured for North American mar-
kets that are equipped with the optional Vehicle
Theft Security System (VTSS) have a door cylinder
lock switch secured to the back of the key lock cylin-
der inside the drivers front door (Fig. 1). The door
cylinder lock switch is a resistor multiplexed momen-
tary switch that is hard wired in series between the
door lock switch ground and right or left cylinder
lock switch mux circuits of the Drivers Door Module
(DDM) through the front door wire harness. The door
WJVEHICLE THEFT SECURITY 8Q - 7
VEHICLE THEFT SECURITY (Continued)
The ITM microprocessor continuously monitors
inputs from its on-board motion sensor as well as
inputs from the BCM and the alarm siren module.
The ITM motion sensor transmits ultrasonic signals
into the vehicle cabin through a transmit transducer,
then listens to the returning signals as the bounce off
of objects in the vehicle interior. If an object is mov-
ing in the interior, a detection circuit in the ITM
senses this movement through the modulation of the
returning ultrasonic signals that occurs due to the
Doppler effect. The motion detect function of the ITM
can be disabled by depressing the ªLockº button on
the Remote Keyless Entry (RKE) transmitter three
times within fifteen seconds, while the security indi-
cator is still flashing rapidly or by cycling the key in
the driver door cylinder from the center to the lock
position. The ITM will signal the alarm siren module
to provide a single siren ªchirpº as an audible confir-
mation that the motion sensor function has been dis-
abled.
If movement is detected, the ITM sends an mes-
sage to the BCM over the PCI data bus to flash the
exterior lighting and send a message to the alarm
siren module over a dedicated serial bus line to
sound the siren. When the BCM detects a breach in
the perimeter protection through a door, tailgate,
flip-up glass, or hood ajar switch input, it sends an
message to the ITM and the ITM sends an message
to the BCM over the PCI data bus to flash the exte-
rior lighting and send a message to the alarm siren
module over a dedicated serial bus line to sound the
siren. The ITM also monitors inputs from the alarm
siren module for siren battery or siren input/output
circuit tamper alerts, and siren battery condition
alerts, then sets active and stored Diagnostic Trouble
Codes (DTC) for any monitored system faults it
detects. An active fault only remains for the current
ignition switch cycle, while a stored fault causes a
DTC to be stored in memory by the ITM. If a fault
does not reoccur for fifty ignition cycles, the ITM will
automatically erase the stored DTC.
The ITM is connected to the vehicle electrical sys-
tem through the overhead wire harness. The ITM
receives battery voltage on a B(+) circuit through a
fuse in the Junction Block (JB), and is grounded to
the chassis at G303. These connections allow the
ITM to remain operational, regardless of the ignition
switch position. The hard wired inputs and outputs
for the ITM may be diagnosed and tested using con-
ventional diagnostic tools and procedures. However,
conventional diagnostic methods will not prove con-
clusive in the diagnosis of the ITM, the PCI data bus
network, or the electronic message inputs to and out-
puts from the ITM. The most reliable, efficient, and
accurate means to diagnose the ITM, the PCI data
bus network, and the message inputs to and outputsfrom the ITM requires the use of a DRBIIItscan
tool. Refer to the appropriate diagnostic information.
REMOVAL
(1) Disconnect and isolate the battery negative
cable.
(2) While pulling downward lightly on the rear cor-
ner of the Intrusion Transceiver Module (ITM) trim
cover, insert a small thin-bladed screwdriver through
each of the service holes on the rear edge of the trim
cover to release the two integral rear latch features
of the module from the mounting bracket above the
headliner (Fig. 7).
(3) Pull the ITM trim cover rearward far enough
to disengage the two front latch features of the mod-
ule from the mounting bracket above the headliner.
(4) Pull the ITM and trim cover down from the
headliner far enough to access and disconnect the
overhead wire harness connector for the ITM from
the module connector.
(5) Remove the ITM from the headliner.
INSTALLATION
(1) Position the Intrusion Transceiver Module
(ITM) to the headliner.
(2) Reconnect the overhead wire harness connector
for the ITM to the module connector.
(3) Align the two front latch features of the ITM
with the two front latch receptacles of the mounting
bracket above the headliner (Fig. 8).
(4) Push the ITM trim cover forward far enough to
insert the two rear latch features of the module into
Fig. 7 INTRUSION TRANSCEIVER MODULE
REMOVE
1 - SMALL SCREWDRIVER
2 - HEADLINER
3 - SERVICE HOLES
4 - ITM
8Q - 12 VEHICLE THEFT SECURITYWJ
INTRUSION TRANSCEIVER MODULE (Continued)
DESCRIPTION - CIRCUIT FUNCTIONS
All circuits in the diagrams use an alpha/numeric
code to identify the wire and it's function. To identify
which circuit code applies to a system, refer to the
Circuit Identification Code Chart. This chart shows
the main circuits only and does not show the second-
ary codes that may apply to some models.
CIRCUIT IDENTIFICATION CODE CHART
CIRCUIT FUNCTION
A BATTERY FEED
B BRAKE CONTROLS
C CLIMATE CONTROLS
D DIAGNOSTIC CIRCUITS
E DIMMING ILLUMINATION
CIRCUITS
F FUSED CIRCUITS
G MONITORING CIRCUITS
(GAUGES)
H OPEN
I NOT USED
J OPEN
K POWERTRAIN CONTROL
MODULE
L EXTERIOR LIGHTING
M INTERIOR LIGHTING
N NOT USED
O NOT USED
P POWER OPTION (BATTERY
FEED)
Q POWER OPTIONS (IGNITION
FEED)
R PASSIVE RESTRAINT
S SUSPENSION/STEERING
T TRANSMISSION/TRANSAXLE/
TRANSFER CASE
U OPEN
V SPEED CONTROL, WIPER/
WASHER
W OPEN
X AUDIO SYSTEMS
Y OPEN
Z GROUNDS
DESCRIPTION - SECTION IDENTIFICATION AND
INFORMATION
The wiring diagrams are grouped into individual
sections. If a component is most likely found in a par-
ticular group, it will be shown complete (all wires,
connectors, and pins) within that group. For exam-
ple, the Auto Shutdown Relay is most likely to be
found in Group 30, so it is shown there complete. It
can, however, be shown partially in another group if
it contains some associated wiring.
Splice diagrams in Section 8W-70 show the entire
splice and provide references to other sections the
splices serves. Section 8W-70 only contains splice dia-
grams that are not shown in their entirety some-
where else in the wiring diagrams.
Section 8W-80 shows each connector and the cir-
cuits involved with that connector. The connectors
are identified using the name/number on the dia-
gram pages.
WIRING SECTION CHART
GROUP TOPIC
8W-01 thru
8W-09General information and Diagram
Overview
8W-10 thru
8W-19Main Sources of Power and
Vehicle Grounding
8W-20 thru
8W-29Starting and Charging
8W-30 thru
8W-39Powertrain/Drivetrain Systems
8W-40 thru
8W-49Body Electrical items and A/C
8W-50 thru
8W-59Exterior Lighting, Wipers and
Trailer Tow
8W-60 thru
8W-69Power Accessories
8W-70 Splice Information
8W-80 Connector Pin Outs
8W-91 Connector, Ground and Splice
Locations
8W - 01 - 6 8W-01 WIRING DIAGRAM INFORMATIONWJ
WIRING DIAGRAM INFORMATION (Continued)
(11) Lower the vehicle until it is about 2 feet from
the floor.
CAUTION: Ensure that the connecting rod bolts DO
NOT scratch the crankshaft journals or cylinder
walls. Short pieces of rubber hose, slipped over the
rod bolts will provide protection during removal.
(12) Have an assistant push the piston and con-
necting rod assemblies up and through the top of the
cylinder bores (Fig. 60).
INSTALLATION
(1) Clean the cylinder bores thoroughly. Apply a
light film of clean engine oil to the bores with a clean
lint-free cloth.
(2) Install the piston rings on the pistons if
removed (Refer to 9 - ENGINE/ENGINE BLOCK/
PISTON RINGS - STANDARD PROCEDURE).
(3) Lubricate the piston and rings with clean
engine oil.
CAUTION: Ensure that connecting rod bolts DO
NOT scratch the crankshaft journals or cylinder
walls. Short pieces of rubber hose slipped over the
connecting rod bolts will provide protection during
installation.(4) Use a piston ring compressor to install the con-
necting rod and piston assemblies through the top of
the cylinder bores (Fig. 61).
(5) Ensure the arrow on the piston top points to
the front of the engine (Fig. 61).
(6) Raise the vehicle.
(7) Each bearing insert is fitted to its respective
journal to obtain the specified clearance between the
bearing and the journal. In production, the select fit
is obtained by using various-sized, color-coded bear-
ing inserts as listed in the Connecting Rod Bearing
Fitting Chart. The color code appears on the edge of
the bearing insert. The size is not stamped on inserts
used for production of engines.
(8) The rod journal is identified during the engine
production by a color-coded paint mark on the adja-
cent cheek or counterweight toward the flange (rear)
end of the crankshaft. The color codes used to indi-
cate journal sizes are listed in the Connecting Rod
Bearing Fitting Chart.
(9) When required, upper and lower bearing
inserts of different sizes may be used as a pair (refer
to Connecting Rod Bearing Fitting Chart). A stan-
dard size insert is sometimes used in combination
with a 0.025 mm (0.001 inch) undersize insert to
reduce clearance 0.013 mm (0.0005 inch).
CAUTION: DO NOT intermix bearing caps. Each
connecting rod and bearing cap are stamped with
the cylinder number. The stamp is located on a
machined surface adjacent to the oil squirt hole
that faces the camshaft side of the cylinder block.
(10) Install the connecting rod bearing caps and
inserts in the same positions as removed.
CAUTION: Verify that the oil squirt holes in the rods
face the camshaft and that the arrows on the pis-
tons face the front of the engine.
(11) Install main bearing cap brace (Fig. 58).
Tighten nuts to 47 N´m (35 ft. lbs.).
Fig. 60 Removal of Connecting Rod and Piston
Assembly
1 - PISTON
2 - CONNECTING ROD
3 - BLOCK
Fig. 61 Rod and Piston Assembly Installation
9 - 46 ENGINE - 4.0LWJ
PISTON & CONNECTING ROD (Continued)
CRANKSHAFT MAIN BEARING SELECTION
The main bearings are ªselect fitº to achieve proper
oil clearances. For main bearing selection, the crank-
shaft position sensor target wheel has grade identifi-
cation marks stamped into it (Fig. 60). These marks
are read from left to right, corresponding with jour-
nal number 1, 2, 3, 4 and 5. The crankshaft position
sensor target wheel is mounted to the number 8
counter weight on the crankshaft.
NOTE: Service main bearings are coded. These
codes identify what size (grade) the bearing is.
MAIN BEARING SELECTION CHARTÐ4.7L
GRADE SIZE mm
(in.)FOR USE WITH
MARKING JOURNAL SIZE
A0.008 mm
U/S63.488±63.496 mm
(0.0004 in.)
U/S(2.4996±2.4999 in.)
BNOMINAL 63.496±63.504 mm
(2.4999±2.5002 in.)
C0.008 mm
O/S63.504±63.512 mm
(0.0004 in.)
O/S(2.5002±2.5005 in.)
INSPECTION
Wipe the inserts clean and inspect for abnormal
wear patterns and for metal or other foreign material
imbedded in the lining. Normal main bearing insert
wear patterns are illustrated (Fig. 61).
NOTE: If any of the crankshaft journals are scored,
the crankshaft must be repaired or replaced.
Inspect the back of the inserts for fractures, scrap-
ings or irregular wear patterns.
Inspect the upper insert locking tabs for damage.
Replace all damaged or worn bearing inserts.
CRANKSHAFT OIL SEAL -
FRONT
REMOVAL
(1) Disconnect negative cable from battery.
(2) Remove accessory drive belt (Refer to 7 -
COOLING/ACCESSORY DRIVE/DRIVE BELTS -
REMOVAL).
(3) Remove A/C compressor mouning fasteners and
set aside.
(4) Drain cooling system (Refer to 7 - COOLING -
STANDARD PROCEDURE).
(5) Remove upper radiator hose.
(6) Disconnect electrical connector for fan mounted
inside radiator shroud.
(7) Remove radiator shroud attaching fasteners.
NOTE: Transmission cooler line snaps into shroud
lower right hand corner.
Fig. 60 Main Bearing Markings on Target Wheel
1 - REARMOST CRANKSHAFT COUNTER WEIGHT
2 - TARGET WHEEL
3 - MAIN BEARING SELECT FIT MARKINGS
Fig. 61 Main Bearing Wear Patterns
1 - UPPER INSERT
2 - NO WEAR IN THIS AREA
3 - LOW AREA IN BEARING LINING
4 - LOWER INSERT
WJENGINE - 4.7L 9 - 115
CRANKSHAFT MAIN BEARINGS (Continued)