3 9499 040 50511
Contents
1 General ..................................5
1.1 Scope of delivery . . . . . . . . . . . . . . . . . . . . . . . . . ..........6
2 Hints on operation............................7
2.1 Interface connection . . . . . . . . . . . . . . . ...................7
2.1.1 Installation of cables . . . . . . . . . . . . . . . . . . . ...........7
2.2 Forcing .........................................7
3 Process data ...............................8
3.1 Defined as status byte are: . . . . . . . . . . . . . . ................12
3.2 Status and diagnosis messages . . . . . . . . . . . . ................15
3.3 Disabling mechanism with changes . . . . . . . . . . . ..............15
3.4 Process data transmission . . . . . . . . . . . . . . ................15
3.5 Parameter transmission . . . . . . . . . . . . . . . . . . . . . . ..........16
3.5.1 Message elements . . . . . . . . . . . . . . ................16
3.5.2 General communication structure . . . . . . . . . . . . . . . .......17
3.5.3 Data write sequence . . . . . . . . . . . . . ................17
3.5.4 Data read procedure . . . . . . . . . . . . . ................18
3.6 Examples . . . . . . . . . . . . . . . . . . . . . . . ................18
3.6.1 Function block protocol principles . . . . . . . . . . . . . . . .......18
3.6.2 Individual access . . . . . . . . . . . . . . . ................18
3.6.3 Block access (tens block). . . . . . . . . . . . . ..............19
3.6.4 Block acces (overall block) . . . . . . . . . . . . . . . . . .......19
3.7 Data types. . . . . . . . . . . . . . . . . . . . . . . ................21
4 Quick entrance .............................22
4.1 Quick entrance with S5. . . . . . . . . . . . . . . . . . . . . . ..........22
4.1.1 Example of a test environment: . . . . . . . . . . .............22
4.2 Quick entrance with S7. . . . . . . . . . . . . . . . . . . . . . ..........24
4.2.1 Example of a test environment: . . . . . . . . . . .............24
5 Function block protocol ........................26
5.1 Data structuring. ...................................26
5.2 CODE tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ........27
5.2.1 Structure of configuration words (C.xxxx). . . . . . . . . . ........27
5.2.2 INSTRUMENT (FB no.: 0 type no.: 0) . . . . . . . . . . .......27
5.2.3 Special accesses (FB no.: 10 ... 17 type no.: 10) . . . . . . . . . . . . 33
5.2.4 Freely configurable (FB no.: 20 ... 27 type no.: 20) . . . . . . . . . . 34
5.2.5 INPUT (FB no.: 60 ... 67 Type no.: 112) . . . . . . . . . . . . . . . . 36
5.2.6 CONTR (FB no.: 50 ... 57 Type no.: 91) . . . . . . . . . . . . . . . . 37
5.2.7 ALARM (FB no.: 70 ... 77 Type no.: 46) . . . . . . . . . . . . . . . . 41