Rockwell-automation 1770-KF2 Data Highway or Highway Plus Interface Mo Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Zařízení Rockwell-automation 1770-KF2 Data Highway or Highway Plus Interface Mo. Rockwell Automation 1770-KF2 Data Highway or Highway Plus Interface Module User Manual User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 235
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Interface Module

Data Highway or Data Highway PlusAsynchronous (RS-232-C or RS-422-A)Interface ModuleCat. No. 1770-KF2)User Manual

Strany 2 - Important User Information

IntroductionChapter 11-6In a multi-drop configuration, one intelligent asynchronous deviceconnects to several Data Highways through sets of modems and

Strany 3 - Table of Contents

Message Packet FormatsChapter 55-21Note that the interface module at the receiving PC station executes thiscommand by first making a copy of the addre

Strany 4 - Table of Contentsii

Message Packet FormatsChapter 55-22Unprotected WriteThis command writes words of data into ay area of PC data table memory.Use the SIZE field to speci

Strany 5 - Introduction

Message Packet FormatsChapter 55-23Disable OutputsThis command turns off all outputs of the PLC controller. Use thiscommand to disable the PLC’s outp

Strany 6

Message Packet FormatsChapter 55-24Enable ScanThis command restarts the PLC processor’s program scanner after aphysical write operation has been perfo

Strany 7 - 1770-KF2

Message Packet FormatsChapter 55-25Physical WriteThis command writes bytes of data into the PC data table or programmemory. Use this command to downl

Strany 8 - Specifications

Message Packet FormatsChapter 55-26Enter Download ModeThis command puts the PLC-2 processor into the Download mode. Usethis command on a PLC-2 statio

Strany 9

Message Packet FormatsChapter 55-27Enter Upload ModeThis command puts the PLC-2 processor into the Upload mode. Use thiscommand on a PLC-2 station be

Strany 10

Message Packet FormatsChapter 55-28Physical ReadThis command reads bytes of data from the PC data table or programmemory. Use this command to upload

Strany 11

Message Packet FormatsChapter 55-29Set Data Table SizeThis command sets the data table size for the PLC-2 processor. Use thiscommand immediately befo

Strany 12

Message Packet FormatsChapter 55-30Only a computer can initiate privileged commands. Their primary use isfor uploading and downloading PLC-3 memory.O

Strany 13 - Communication Concepts

IntroductionChapter 11-7In either type of configuration, there are three possible ways you canconnect a KF2 module: Direct connection to an intellige

Strany 14

Message Packet FormatsChapter 55-317. WORD OFFSET — Contains the word offset between the desiredword and the beginning of the addressed file. The o

Strany 15 - Highway Network

Message Packet FormatsChapter 55-32Download RequestA computer can use this command to inform the 1775-KA module that itwants to do a download. If the

Strany 16

Message Packet FormatsChapter 55-33File WriteThis is a write command, starting address of which is either a file symbolor a block address. This start

Strany 17 - Network Connected to V

Message Packet FormatsChapter 55-34Physical WriteThis is a write command where the starting address is a PLC-3 physicaladdress. It is used to downloa

Strany 18

Message Packet FormatsChapter 55-35Shutdown RequestThis command is used by the computer to ask the 1775-KA module toinitiate either a PLC-3 shutdown (

Strany 19

Message Packet FormatsChapter 55-36Word Range ReadThis is a read command whose starting address is either a word symbol, afile symbol plus a word offs

Strany 20

Message Packet FormatsChapter 55-37Word Range WriteThis is a write command whose starting address is either a word symbol, afile symbol plus a word of

Strany 21

Message Packet FormatsChapter 55-38The above are privileged commands. This means that only a computercan execute them. Their primary purpose is for

Strany 22

Message Packet FormatsChapter 55-39DeallocateThis command deallocates access privileges to the selected PLC-4controller.Reply Format:(EXT STS Byte Opt

Strany 23

Message Packet FormatsChapter 55-40Physical ReadThis command reads the specified number of bytes from the memory ofthe selected PLC-4 controller. Use

Strany 24

IntroductionChapter 11-8Figure 1.4A PCL Network Connected to a Data HighwayPLC-5 PLC-5 1770-KF2Computer1785-KAPCLData HighwayAdvisor 2+1770-KF2PLC-317

Strany 25 - Installation

Message Packet FormatsChapter 55-41Physical Write with MaskThis command sets or resets bits in a memory word of the selectedcontroller. The ADDRESS f

Strany 26

Message Packet FormatsChapter 55-42Set to Program Load ModeThis command sets the selected controller to the Program Load mode.Reply Format:(EXT STS By

Strany 27

Message Packet FormatsChapter 55-43Set to Single-Scan Test ModeThis command sets the selected controller to the Single-Scan Test mode.Reply Format:(EX

Strany 28 - Figure 3.2

Message Packet FormatsChapter 55-44PLC-5 CommandsPLC-5 stations can execute the basic command set with the followingexceptions: Set ENQs Set NAKs Set

Strany 29

Message Packet FormatsChapter 55-452. PLC-5 LOGICAL BINARY ADDRESS — Contains the logicaladdress of a PLC-5 file, element, and subelement. Chapter

Strany 30

Message Packet FormatsChapter 55-46The STS and EXT STS bytes contain status and error code information.For more information on these bytes, see the “E

Strany 31

Message Packet FormatsChapter 55-47The link ID (presently not used, set it to zero) and the station address areone byte while the file number is two b

Strany 32

Message Packet FormatsChapter 55-48The STS and EXT STS bytes contain status and error code information.For more information on these bytes, see the “E

Strany 33 - Dimensions

Message Packet FormatsChapter 55-49have the privilege of placing the host in a Download mode. This erroroccurs when: the processor is in Program or

Strany 34

Message Packet FormatsChapter 55-50For example, if you wanted to set the processor to Run mode, your flagbyte would look like this:Bit 765432100000001

Strany 35

Chapter 22-1Communication ConceptsThis chapter presents some of the concepts of communication with theKF2 module. It describes the physical communica

Strany 36

Message Packet FormatsChapter 55-51The format for the Typed Write message is as follows:TNSSTSCMD0FSRCDST FNC67PACKETOFFSETTOTALTRANSPLC-5 SYSTEMADDRE

Strany 37

Message Packet FormatsChapter 55-52Table 5.FData Types/ID ValuesValue Mnemonic Name01234567891516ENDBBSCSITCRFAADRDLast Element Indicator/No Type Spe

Strany 38

Message Packet FormatsChapter 55-53Data Type SizeIf Bit 3 is a zero (0), the data type defined in the ID Value Field uses 7 orless bytes for each piec

Strany 39 - Chapter 3

Message Packet FormatsChapter 55-54The following example shows a type “A” (array) type/data parameter.The array data type includes one descriptor as p

Strany 40

Message Packet FormatsChapter 55-55The message format is as follows:Command Format:Reply Format:TNSSTSCMD0FSRCDSTTNSSTSCMD4FSRCDSTFNC53EXTSTSThe STS a

Strany 41

Message Packet FormatsChapter 55-56Write Bytes PhysicalUse this command to perform a Download Only after a Download (orUpload) All Request has been su

Strany 42 - (LED) Indicators

Message Packet FormatsChapter 55-57The packet offset and total transaction are two bytes each, while the sizeis only one byte. The format is as follo

Strany 43

Message Packet FormatsChapter 55-58Error CodesEach command has a status (STS) byte in its reply format to indicate: if the command was successfully c

Strany 44 - Asynchronous Link Protocols

Chapter 66-1Data Encoding and AddressingThis chapter explains two areas of special concern when you aretransmitting messages between computers and PCs

Strany 45

Data Encoding and AddressingChapter 66-2BinaryThe binary number system is probably the simplest to use for computerand PC applications because it is t

Strany 46

Communication ConceptsChapter 22-2the application and network layers, refer to Chapters 5 and 6. For moreon the data link layer of the asynchronous l

Strany 47 - Figure 4.1

Data Encoding and AddressingChapter 66-3Binary Coded DecimalPC data is often represented in binary coded decimal (BCD) form. In thissystem, each grou

Strany 48

Data Encoding and AddressingChapter 66-4DecimalThe decimal number system is probably the easiest for us to use because itis the most familiar to us.

Strany 49

Data Encoding and AddressingChapter 66-5Figure 6.4Hexadecimal Numbers00 0000 0110100111113350 x 23 = 00 x 22 = 00 x 21 = 00 x 20 = 00 x 23 = 00 x 22 =

Strany 50 - Implementation of Data Paths

Data Encoding and AddressingChapter 66-6corresponding place value and add the results of the multiplications.Figure 6.5 shows the octal representation

Strany 51

Data Encoding and AddressingChapter 66-7This does not present a problem at PC stations on the link because PCsstore and retrieve their data in this sa

Strany 52 - Environment

Data Encoding and AddressingChapter 66-8Figure 6.6Results of Transmitting Low Byte First17 16 15 14 13 12 11 10 07 06 05 04 03 02 01 0010 0110 0101110

Strany 53

Data Encoding and AddressingChapter 66-9addressing in a PLC’s ladder diagram program to allow it to access itsown data table memory.Due to the differe

Strany 54 - Logic for Implementing T

Data Encoding and AddressingChapter 66-10PLC-3 and PLC-5PLC-3 and PLC-5 controllers use a form of logical addressing known as“extended addressing.” W

Strany 55 - Chapter 4

Data Encoding and AddressingChapter 66-11In Figure 6.7, the Level 5 address is 260 (decimal), which is too large tofit in one byte. Therefore, a byte

Strany 56

Data Encoding and AddressingChapter 66-12To send a command message to a PLC-5 station, you put the extendedaddress of the station in the field labeled

Strany 57

Communication ConceptsChapter 22-3Figure 2.1Data Highway NetworkPLC-3Processor1775-KAModuleComputerMODEMAdvisor 2+MODEM1770-KF2Module1770-KF2Module177

Strany 58

Data Encoding and AddressingChapter 66-13Figure 6.9PLC-5 Logical ASCII AddressingDisplayed Logical Address SymbolFile-Type IdentifierFile NumberDelimi

Strany 59

Data Encoding and AddressingChapter 66-14PLC-4 MicrotrolPLC-4 Microtrol controllers use a form of logical addressing that specifiesthe identification

Strany 60

Data Encoding and AddressingChapter 66-15PLCPLC controllers use physical addresses that are exactly the same values asthe corresponding logical addres

Strany 61

Data Encoding and AddressingChapter 66-16PLC-3 and PLC-5PLC-3 and PLC-5 controllers use physical addresses that are related tological addresses by mea

Strany 62 - Message T

Data Encoding and AddressingChapter 66-17PLC-4 MicrotrolPLC-4 Microtrol controllers use physical addresses that begin at 00 forthe first word of memor

Strany 63

Data Encoding and AddressingChapter 66-18The symbolic address field can be from 1 to 8 bytes long. The first bytecontains the ASCII code for the firs

Strany 64

Chapter 771Error ReportingThis chapter contains a list of error codes associated with network start-upand run-time situations. The error information

Strany 65

Error ReportingChapter 772An error code word specified in the header rung is the primary source ofexplanation for programming problems and run-time p

Strany 66

Error ReportingChapter 773Prescan errors always cause the module to turn on the PROG light andenter an error state. When the keylock is turned to PR

Strany 67 - Figure 4.14

Error ReportingChapter 77403The KA or KG does not have enough internal memory to store the start bit index. Thisshould only occur if the communicati

Strany 68

Communication ConceptsChapter 22-4One station consists of an Advisor 2+TM Color Graphic System connectedto a KF2 module through an RS-232-C link limit

Strany 69

Error ReportingChapter 77530A command rung syntax error has been detected in RUN mode after the prescan. Thismeans that either the communication zon

Strany 70 - Figure 4.15

Error ReportingChapter 77653A reply message has been received for which the start bit is off. This could mean thatthe user program turned off the st

Strany 71

Error ReportingChapter 77788Execution of protected commands at the remote station is inhibited because its PROGlight is on. This error results in se

Strany 72

Error ReportingChapter 778Local and Remote Error BitsAs a diagnostic tool, these bits are useful to identify the rung that causedan 80- or 90-series

Strany 73

Error ReportingChapter 779Local Error CodesThe 1775-KA module stores local error codes under the user symbolERROR. Possible local errors are listed

Strany 74

Error ReportingChapter 7710Code (If Applies)EXT STS STSMeaningErrorCode124Illegal destination in an assignment command. This does notnecessaril

Strany 75

Error ReportingChapter 7711Code (If Applies)EXT STS STSMeaningErrorCode159Bad level specified in extended address.1.More than 9 levels were spec

Strany 76

Error ReportingChapter 7712Code (If Applies)EXT STS STSMeaningErrorCode194Expression is too complex.199Attempt to divide by zero.200Bad port spe

Strany 77

Error ReportingChapter 7713Code (If Applies)EXT STS STSMeaningErrorCode215The value resulting from operations specified on the left side ofan as

Strany 78 - Message Sink Full, Case 2

Error ReportingChapter 7714Code (If Applies)EXT STS STSErrorCodeMeaningDIAGNOSTIC READ COMMAND10 81 1.A 2byte ADDR field and a 1byte SIZE fiel

Strany 79 - DLE ENQ STN BCC DLE EOT

Communication ConceptsChapter 22-5StationsA station consists of a computer, or PC processor, and the module ormodules that interface it with the PCL.

Strany 80 - Message Packet Formats

Error ReportingChapter 7715Code (If Applies)EXT STS STSMeaningErrorCodePLC/PLC2 READ COMMANDS10 81 1.The required 2byte ADDR field and 1byte

Strany 81 - Figure 5.1

Error ReportingChapter 7716Code (If Applies)EXT STS STSMeaningErrorCodePLC3 WRITE COMMANDS10 81 1.There are not at least 2 bytes of data after

Strany 82

Error ReportingChapter 7717Code (If Applies)EXT STS STSMeaningErrorCodeA F0 240Sum of total transaction size and the word level of PLC3addressi

Strany 83

Error ReportingChapter 7718Code (If Applies)EXT STS STSMeaningErrorCode8 F0 238The file size decreased between packets of a multipackettransact

Strany 84

Error ReportingChapter 7719The meaning of a particular remote error code will vary, depending on thetype of communication interface module at the rem

Strany 85

Error ReportingChapter 7720They apply to activity on their respective links. Obviously, the 1771-KAwill have only Data Highway counters. Most modul

Strany 86

Error ReportingChapter 77217. False Poll: Counts the number of times that this station has tried torelinquish mastership and the station that was ex

Strany 87 - Chapter 5

Error ReportingChapter 772215. Retransmits: Counts the number of duplicate frames received. Aduplicate frame is sent by a transmitter when it fails

Strany 88

Error ReportingChapter 772325. Replies Received: A 16-bit counter that records the number of replymessages that were received that resulted in the s

Strany 89

Error ReportingChapter 77243. Bad ACK Status: Counts the number of times the ACK wassuccessfully received but contained a non-zero status code other

Strany 90

Communication ConceptsChapter 22-6Computer ProgrammingThe communication protocol for the PCL is transparent to a computer onthe network. However, for

Strany 91

Error ReportingChapter 772510. Wrong Destination Address: Counts the number of frames thatwere rejected because the destination address was incorrec

Strany 92

Error ReportingChapter 772619. Received Messages: A 16-bit counter that records the number ofmessages successfully received.20. Not used.21. Number

Strany 93

Error ReportingChapter 77270. Bad CRC or I/O error on ACK. Same causes as bad CRC onmessages.1. ACK Timeout: Counts the number of times that the se

Strany 94

Error ReportingChapter 7728hear it, the old master will record a false poll and continue polling;and the new master will start polling also. This us

Strany 95

Error ReportingChapter 772916. Aborts: Counts the number of aborts received. The HDLC abortsignal is not used on the Data Highway but can be detect

Strany 96

Error ReportingChapter 773031. Number of ENQs sent.32. Number of messages that could not be successfully sent.33. Number of reply messages that could

Strany 97

Error ReportingChapter 773147. Number of broadcast messages received.48. Number of broadcast messages that were successfully received.49. Number of m

Strany 98

Error ReportingChapter 77328. Number of NAKs passed from the separator to the transmitter.9. Number of timeouts waiting for a response.10. Number of

Strany 99

Error ReportingChapter 773324. Number of times the DLE ACK response was delayed because of alack of buffer space for the next message.25. Number of t

Strany 100

Error ReportingChapter 773441. Number of messages with incorrect network address.42. 16-bit count of messages sent by command initiator.43. Not used.

Strany 101

Communication ConceptsChapter 22-7Configuration ConsiderationsAllen-Bradley manufactures a variety of communication interfacemodules for different app

Strany 102

Error ReportingChapter 77357. False polls (failure to transfer).8. Received acknowledgment when not master.9. Message size too small (less than 5 byt

Strany 103

Error ReportingChapter 773627. Reply messages sent.28. Not used.MODEM CHANNEL COUNTERS29. Command messages sent.30. Not used.31. Reply messages recei

Strany 104

Error ReportingChapter 773746. Computer link timeout (preset to 500 msec).47. Not used.48. Maximum number of NAKs accepted per message (preset to 10)

Strany 105

Error ReportingChapter 77381770KF2 and 1785KA PCL Link Error CountersFor the KF2, the block of counters in this section are followed by a blockof m

Strany 106

Error ReportingChapter 7739PLC5 Diagnostic CountersByte No.0123456789101112131415161718192021222324252627293031ACK TimeoutsNAK No Memory ReceivedNum

Strany 107

Error ReportingChapter 7740The remote station then formatted a reply with the STS byte containingsome error code. Local errors mean that the network

Strany 108

Error ReportingChapter 7741Here is a list of relevant PLC-3 status codes for the STS byte and theEXT STS byte.Bits Hex Value MeaningSTS Byte0407 0Su

Strany 109

AppendixAA1Switch SettingsHere is a reference for switch settings for a 1770-KF2 communicationinterface module.Table A.AAsynchronous Link Features (S

Strany 110 - Command Packet:

Switch SettingsAppendix AA2Table A.BStation Number (SW2, SW3, SW4)A. First Digit (SW2)SwitchDigit 1 20123OFFOFFONONOFFONOFFONFor a PLC network l

Strany 111

Switch SettingsAppendix AA3Table A.ENetwork Link Selection (SW7)Local Area Network Switch 1 Switch 2Data HighwayOFF OFFPeer Communication LinkON OFF

Strany 112

Because of the variety of uses for the products described in this publication,those responsible for the application and use of this control equipment

Strany 113

Communication ConceptsChapter 22-8Each of the physical links just described requires three layers of softwareto enable communication to take place. T

Strany 114

AppendixBB1Message FormatsTable B.AASCII Codes and Their Numerical ValuesHex Binary ASCII Hex Binary ASCII Hex Binary ASCII000102030405060708090A0B0C

Strany 115

AppendixCC1General Asynchronous Link Error Codes(STS, EXT STS)Asynchronous link (RS-232-C) error codes are passed in the link messagepackets. You ca

Strany 116 - Command Format:

General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC2Remote STS Error CodesThe remote STS error code nibble contains errors found by the re

Strany 117

General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC3You will have an EXT STS code if your STS code is F0 (hex). The EXTSTS has different

Strany 118

General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC4EXT STS Codes for Command Code 0F (Hex)The following table contains EXT STS codes (in

Strany 119

AppendixDD1Detailed FlowchartsThis appendix presents flowcharts that give detailed views of an exampleof software logic for implementing full-duplex

Strany 120

Detailed FlowchartsAppendix DD2Figure D.1Data Flow Diagram for FullDuplex ProtocolDLE ACKDLE ACKDLE NAKUARTMultiplexerData Link LayerPhysical Link

Strany 121

Detailed FlowchartsAppendix DD3Figure D.2Transmitter Routine for FullDuplex ProtocolXMITGETMSGGet Messagefrom Network LayerReset NAKand TimeoutCo

Strany 122

Detailed FlowchartsAppendix DD4Figure D.3WTAK SubroutineRETURNGet the Response Code (if Any) from RESPSTOPTIMECancel theACK TimerCommon• WTR

Strany 123

Detailed FlowchartsAppendix DD5Figure D.4SENDM SubroutineRETURNSENDETX SendDLE ETX CRCLink Data Done ?CRC IncludeByte in CRCSENDDATASe

Strany 124

Communication ConceptsChapter 22-9automatically fills the protocol bytes. If the transaction originates from acomputer station, your computer softwar

Strany 125

Detailed FlowchartsAppendix DD6Figure D.5STARTTIME Subroutine11658STARTTIMERETURNAn Implementation-DependentRoutine that Schedules TIMEOUT to Be Exec

Strany 126

Detailed FlowchartsAppendix DD7Figure D.7TIMEOUT Subroutine11660TIMEOUTRETURNScheduled By•Aborted By•WAKEUPWake Up the ProcessSleeping at WTRESP(If A

Strany 127

Detailed FlowchartsAppendix DD8Figure D.9SIGOK/SIGFAIL SubroutineSIGOK Place SuccessCode in Message Control BlockLINKPlace Message on RETURN Queue

Strany 128

Detailed FlowchartsAppendix DD9Figure D.10Sharing the Transmit Side of the UARTTXALLOCUART UsageTXFREEXMIT RCVEXMIT RCVENot-in-UseSignal11664Since th

Strany 129

Detailed FlowchartsAppendix DD10Figure D.11SENDCTL SubroutineSENDCTLTXALLOCAllocate UART or WaitSENDTransmit DLESEND TransmitControlCodeTXFREED

Strany 130

Detailed FlowchartsAppendix DD11Figure D.12SENDTX Subroutine11665SENDTXTXALLOCAllocate UART or WaitSENDTransmit DLESENDTransmit ETXSENDTransmit C

Strany 131

Detailed FlowchartsAppendix DD12Figure D.13SEND SubroutineSENDDisable Processor Interrupts Enable UARTTransmit Interrupt UARTTransmitter

Strany 132

Detailed FlowchartsAppendix DD13Figure D.14SENDDATA SubroutineSENDDATATXALLOCAllocate UART or WaitSENDTransmit Link Data Byte Is DataByte DLE

Strany 133

Detailed FlowchartsAppendix DD14Figure D.15TXALLOC SubroutineTXALLOC UARTin Use ?Set IN-USE FlagRETURNSLEEPWait at TXALWTUntil UART Is FreeIn

Strany 134

Detailed FlowchartsAppendix DD15Figure D.17TRANSMIT INTERRUPT Subroutine11670WAKEUPTRANSMITINTERRUPTINTERRUPTRETURNResume ProcessNOTE: a Z80 S10.Th

Strany 135

Communication ConceptsChapter 22-10required. Using an excessive number of high priority commands defeatsthe purpose of this feature and could delay o

Strany 136

Detailed FlowchartsAppendix DD16Figure D.19SLEEP and WAKEUP InteractionPROCESS A PROCESS B PROCESS CSLEEPA Previous WakeupLaterWAKEUP2178365Sequence

Strany 137

Detailed FlowchartsAppendix DD17Figure D.20POWERUP Subroutine11673POWERUPSPAWN RCVESPAWN XMITContinueInitializationPOWERUPAt power-up the Z-80starts

Strany 138 - Data Encoding and Addressing

Detailed FlowchartsAppendix DD18Figure D.22UNLINK SubroutineRETURNAn Implementation-InputUNLINK11675Address of QueueOutput Message Control BlockDep

Strany 139 - Numbers

Detailed FlowchartsAppendix DD19Figure D.24Receiver Routine for FullDuplex ProtocolRCVEReset Buffer Flag: SetHeader to Illegal ValueGET BUFFERGet a

Strany 140 - Figure 6.2

Detailed FlowchartsAppendix DD20Figure D.25XMSG SubroutineXMSGGETBUFCheck Availabil-ityof Receive BufferClear CRCAccumulatorGETCODEGet a CodeLinkData

Strany 141 - Figure 6.3

Detailed FlowchartsAppendix DD21Figure D.26GETCODE SubroutineGETCODEGETRAWGet Byte from UARTDLE ?GETRAWGet Byte from UARTDLE ?NoYesBCCAdd Data Byte

Strany 142 - Hexadecimal

Detailed FlowchartsAppendix DD22Figure D.27GETRAW SubroutineGETRAWDisable Proces-sor Interrupts Enable UARTReceive InterruptByte inUART ? D

Strany 143 - Figure 6.5

Detailed FlowchartsAppendix DD23Figure D.28SENDNET Subroutine11682SENDNETReset theBUFFER FlagRETURNAn Implementation-Dependent Routineto Put a Messag

Strany 144

AppendixEE-1Data Link LayerThe data link layer controls the flow of communication on the physicallink by acquiring and releasing access to the communi

Strany 145

Data Link LayerAppendix EE-2When a station gains control of the Data Highway to transmit messages, ithas become a master station. All other station i

Strany 146 - First Byte Second Byte

Communication ConceptsChapter 22-11As with reads, writes also are classified by the level of access to PCmemory. Non-physical writes can access only

Strany 147

Data Link LayerAppendix EE-3A station must have mastership of the Data Highway before it cantransmit any messages or polling sequences. As part of th

Strany 148

Data Link LayerAppendix EE-4Figure E.2Polling Scheme•••074075076077110111112113•••17417517617720020120220327427527627730030130230337337437537601001101

Strany 149

Data Link LayerAppendix EE-5A block check is used to detect errors at the link level. You can select aCRC instead of this block check. Any device co

Strany 150

AADDR, 57Addressing, 68Logical, 68Logical ASCII, 618PLC, 615PLC/PLC-2, 69PLC-2, 615PLC-3 and PLC-5, 610, 616PLC-3 Logical B

Strany 151 - 00110100 00000000

IndexI–2Full-Duplex Receiver Routine, D19HHalf-Duplex Protocol, 11, 41, 421, 422Half-Duplex Protocol, Diagrams, 432Half-Duplex Proto

Strany 152 - 00 0000 0001000110

Publication 1770-6.5.13 - March 1989 Supersedes Publication 1770-6.5.13 - August 1988AllenBradley, a Rockwell Automation Business, has been helping i

Strany 153

Communication ConceptsChapter 22-12Generally, you need not be concerned with the interaction of stationinterface modules on the network.This means tha

Strany 154

Chapter 33-1InstallationThis chapter explains how to install the 1770-KF2 module. There are fourparts to installation: Setting Communication Option S

Strany 155

InstallationChapter 33-2Figure 3.1Communication Option SwitchesOO12345OO12313529OO12OO123OO12OO1234NFFNFFNFFNFFNFFNFFStation Number(SW-2, SW-3, SW-4)A

Strany 156 - Error Reporting

InstallationChapter 33-3Switch 3 determines whether the asynchronous port of the KF2 modulecan detect duplicate messages transmitted to it.If You Want

Strany 157

InstallationChapter 33-4Figure 3.2Station NumberOO12NFFSwitch GroupsONOFFOO12NFF3OO12NFF3SW-2 SW-3 SW-4ONOFFONOFFIf You Wantto Set ThisDigit:Set Switc

Strany 158

InstallationChapter 33-5Figure 3.3Switch Settings for Network LinkOO12NFFBoth switches ON for57,600 bits per secondSW–513514Asynchronous Communication

Strany 159 - Chapter 7

Introduction 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General 11. . . . . . . . . . . . . . . . . . . . . . . .

Strany 160

InstallationChapter 33-6Switch 4 relates only to diagnostic commands sent to the KF2 modulefrom a remote Data Highway station. Since only computers c

Strany 161

InstallationChapter 33-7Selecting the Network LinkYou use Switch Assembly SW-7, a spare assembly in all Series Amodules, to select whether the KF2 tre

Strany 162

InstallationChapter 33-8Important: The asynchronous port of the KF2 module can communicateat a maximum rate of 9,600 bits per second. If your 1771-K

Strany 163

InstallationChapter 33-9The KF2 module has 3 connectors on its rear panel (Figure 3.5). Thecenter connector, labeled DATA HIGHWAY, connects to the Da

Strany 164 - Local Error Codes

InstallationChapter 33-10Mechanical CharacteristicsThe COMPUTER ASYNCHRONOUS connector on a KF2 module is amale 25-pin D-shell. This connector confor

Strany 165

InstallationChapter 33-11The definitions of the above signals are: TXD carries serialized data. It is an RS-232-C standard output fromthe module. R

Strany 166

InstallationChapter 33-12must be connected to the GND of the modem or computer. Note that thistype of connection does not provide electrical isolatio

Strany 167

InstallationChapter 33-13This type of connection includes the DTR signal to allow each end todetect the loss of the other end’s ability to communicate

Strany 168

InstallationChapter 33-14The module can be connected to standard American dial-up modems andsome European modems. Other European standards specify th

Strany 169

InstallationChapter 33-15Figure 3.8Connection to 1771-KG Module25-Pin Female Connector 15-Pin Male Connector(Cat. No. 1778-CR)AsynchronousPort Connect

Strany 170

Table of ContentsiiError Reporting 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General 71. . . . . . . . . . . . . . . .

Strany 171

InstallationChapter 33-16Figure 3.9Connection to 1773-KA or 1775-KA Module25-Pin Female Connector 25-Pin Male Connector(Cat. No. 1778-CR)AsynchronousP

Strany 172

InstallationChapter 33-17After detecting DCD, the module continues to monitor the DCD line. IfDCD goes off, the module restarts the timeout. If DCD

Strany 173

InstallationChapter 33-18There are 6 LED indicators on the front of a KF2 module (Figure 3.10).These indicators can help you in diagnosing problems wi

Strany 174

InstallationChapter 33-19The ACTV light remains on as long as the cable between theCOMPUTER ASYNCHRONOUS socket and the interfacingasynchronous device

Strany 175

Chapter 44-1Asynchronous Link ProtocolsThis chapter describes the communication protocol used on theasynchronous link to the KF2 module. If you are c

Strany 176

Asynchronous Link ProtocolsChapter 44-2Important: Some Allen-Bradley documentation might refer tofull-duplex and half-duplex protocols as DF1 and pol

Strany 177

Asynchronous Link ProtocolsChapter 44-3 Data Codes:- Data (single characters having values 00-0F and 11-FF hex)- DLE DLE (to represent the value 10 he

Strany 178

Asynchronous Link ProtocolsChapter 44-4Figure 4.1Packet Format for Full-Duplex ProtocolCMD STS Command/Response BlockDST SRC CMD STS TNSData(From Appl

Strany 179

Asynchronous Link ProtocolsChapter 44-5The sum of the data bytes in this message packet is 20 hex. The BCC isthe 2’s complement of this sum, or E0 he

Strany 180

Asynchronous Link ProtocolsChapter 44-61010 0000 0000 0001As each additional byte is transmitted, it is included in the value in theregister the same

Strany 181

Chapter 11-1IntroductionA 1770-KF2 Series B module is a communication interface that linksintelligent RS-232-C or RS-422-A (asynchronous) devices to a

Strany 182

Asynchronous Link ProtocolsChapter 44-7To implement all of these data paths with only two physical circuits, asoftware multiplexer combines the messag

Strany 183

Asynchronous Link ProtocolsChapter 44-8Figure 4.4 shows Path 1 with unrelated parts of Figure 4.3 removed.Paths 2, 3, and 4 could be similarly shown.F

Strany 184

Asynchronous Link ProtocolsChapter 44-9Although the protocols on each subsystem operate independently of eachother, there will be a slight interaction

Strany 185

Asynchronous Link ProtocolsChapter 44-10Message CharacteristicsIdeally the link protocol should not be at all concerned with the content orform of the

Strany 186

Asynchronous Link ProtocolsChapter 44-11If the timeout expires before a response is received, the transmitter sendsa DLE ENQ on Path 1 to request a re

Strany 187

Asynchronous Link ProtocolsChapter 44-12Table 4.ATransmitter for Full-Duplex ProtocolTRANSMITTER is defined asloopMessage = GET-MESSAGE-TO-SENDStatus

Strany 188

Asynchronous Link ProtocolsChapter 44-13Receiver ActionsSince the receiver gets “dirty” input from the physical world, it is morecomplex and must be c

Strany 189

Asynchronous Link ProtocolsChapter 44-14If a DLE STX is received, the BCC and the message buffer are reset; andthe receiver starts building a message.

Strany 190

Asynchronous Link ProtocolsChapter 44-15Table 4.BReceiver for Full-Duplex ProtocolRECEIVER is defined asvariablesLAST-HEADER is 4 bytes copied out of

Strany 191

Asynchronous Link ProtocolsChapter 44-16Figure 4.8Receiver for Full-Duplex ProtocolYesNoNoYesYesNo11699RCVELAST = NAKReceiveDLEENQ ?ReceiveMessag

Strany 192

IntroductionChapter 11-2Table 1.ARelated DocumentationPublicationNumberOld PublicationNumberTitle1770-6.2.1 1770-810Data Highway Cable Assembly and In

Strany 193

Asynchronous Link ProtocolsChapter 44-17Full-Duplex Protocol DiagramsThe following figures show some events that can occur on the variousinterfaces.

Strany 194

Asynchronous Link ProtocolsChapter 44-18Figure 4.11Message Transfer with Timeout and ENQNot FullDLE ACKOKxxxxDLE ENQxxxxSOURCE XMTR LINK RCVR SINK

Strany 195

Asynchronous Link ProtocolsChapter 44-19Figure 4.13Message Transfer with Message Sink FullNot FullOKxxxxxxxxSOURCE XMTR LINK RCVR SINK11565DLE NAKDL

Strany 196 - EXT STS byte

Asynchronous Link ProtocolsChapter 44-20ExamplesIf a line monitor were connected to the wires between Stations A and B,and only the A to B subsystem w

Strany 197 - Switch Settings

Asynchronous Link ProtocolsChapter 44-21Half-duplex protocol is the alternative to full-duplex protocol. You canselect half-duplex protocol by settin

Strany 198 - Appendix A

Asynchronous Link ProtocolsChapter 44-22One station is designated as master, and it controls which station hasaccess to the link. You can use a 1771-

Strany 199

Asynchronous Link ProtocolsChapter 44-23The term “code” means (in the following paragraphs) an indivisiblesequence of one or more bytes having a speci

Strany 200 - Message Formats

Asynchronous Link ProtocolsChapter 44-24Link-Layer PacketsHalf-duplex protocol uses three types of transmissions: Polling Packet Master Message Packe

Strany 201 - (STS, EXT STS)

Asynchronous Link ProtocolsChapter 44-25At the end of each polling packet there is a BCC byte. At the end of eachmessage packet, there is either a on

Strany 202

Asynchronous Link ProtocolsChapter 44-26In this case, the sum of the data bytes is 2E hex because only one DLEtext code is included in the BCC. So th

Strany 203

IntroductionChapter 11-3Figure 1.1 shows the 1770-KF2 module’s hardware features: Diagnostic Indicators Connectors for Data Highway and RS-232-C Devi

Strany 204

Asynchronous Link ProtocolsChapter 44-27transceiver is illustrated in Figure 4.15, and the master transceiver isillustrated in Figure 4.16.To fully de

Strany 205 - Detailed Flowcharts

Asynchronous Link ProtocolsChapter 44-282. Some protocol implementations require that the first byte of amessage match the station address. These rec

Strany 206 - Appendix D

Asynchronous Link ProtocolsChapter 44-29Figure 4.16Half-Duplex Master TransceiverXCVRSelect StationPoll Selected StationStart TimeoutReceiveNoReceiveY

Strany 207

Asynchronous Link ProtocolsChapter 44-30Slave Transceiver ActionsSince the transceiver receives “dirty” input from the physical world, itmust be capab

Strany 208

Asynchronous Link ProtocolsChapter 44-31summing the BCC, but the data is discarded. If an error is detected, it isrecorded. If any control code othe

Strany 209

Asynchronous Link ProtocolsChapter 44-32When a DLE NAK is received, the transceiver takes messages from thesource until it is empty. Each message wil

Strany 210

Asynchronous Link ProtocolsChapter 44-33Figure 4.19Message Transfer with ACK DestroyedNot FullOKxxxxxxxxSINK MASTER LINK SLAVE SINK11569DLE ACKSOURC

Strany 211

Asynchronous Link ProtocolsChapter 44-34Figure 4.22Duplicate Message TransmissionxxxxxxxxOKNot FullSINK MASTER LINK SLAVE SINK11572DLE ACKSOURCE/ SO

Strany 212

Asynchronous Link ProtocolsChapter 44-35Figure 4.24Message Sink Full, Case 2FullOKxxxxxxxxSINK MASTER LINK SLAVE SINK11575DLE ACKSOURCE/ SOURCE/BCCD

Strany 213

Asynchronous Link ProtocolsChapter 44-36station alone may not work, since it could be that the only way to free upspace is to send a message to the ma

Strany 214

IntroductionChapter 11-4Table 1.B lists KF2 module specifications.Table 1.BKF2 Module SpecificationsSpecification RequirementsCommunication Rates•Data

Strany 215

Chapter 55-1Message Packet FormatsThis chapter describes how your computer application programs shouldformat command and reply messages for transmissi

Strany 216

Message Packet FormatsChapter 55-2Figure 5.1Network ModelRepliesCommandInitiatorCommandExecutorRepliesCommandsCommandsNetworkQQRRRQ= Routing Subroutin

Strany 217

Message Packet FormatsChapter 55-3The message bytes contain unsigned binary data from both the applicationlayer and the network layer. Figure 5.2 sho

Strany 218

Message Packet FormatsChapter 55-4The meanings of the bytes are: DST — Destination Station for the Message SRC — Source Station of the Message

Strany 219

Message Packet FormatsChapter 55-5Figure 5.4 shows the format for the CMD byte itself. Bits 0 through 3contain the command code. Bits 4 and 7 should

Strany 220

Message Packet FormatsChapter 55-6TNSA complete transaction consists of a command message transmitted by aPC station. The TNS (transaction) bytes con

Strany 221

Message Packet FormatsChapter 55-7ADDRThe ADDR (address) field contains the address of a memory location inthe command executor. ADDR specifies the a

Strany 222

Message Packet FormatsChapter 55-8Table 5.AMessage FormatsIf You Want ThisCommand:Use ThisCMD Code:Use ThisFNC Code:If You Want ThisCommand:Use ThisCM

Strany 223

Message Packet FormatsChapter 55-9Basic Command SetBasic commands include those that can generally be executed by any PCstation on the communication l

Strany 224

Message Packet FormatsChapter 55-10Diagnostic LoopYou can use this command to check the integrity of transmissions over thecommunication link. The co

Strany 225

IntroductionChapter 11-5A KF2 module provides either a point-to-point link or a multi-drop linkbetween an Allen-Bradley Data Highway and an intelligen

Strany 226

Message Packet FormatsChapter 55-11Diagnostic StatusThis command reads a block of status information from the stationinterface module. The reply to t

Strany 227

Message Packet FormatsChapter 55-12Table 5.BContents of Status DATA for 1771-KA2, -KC/KD, -KE/KF; 1770-KF2; 1771-KG, 1774-KA; and1785-KA ModulesByte B

Strany 228 - Data Link Layer

Message Packet FormatsChapter 55-13Table 5.B ContinuedContents of Status DATA for 1771-KA2, -KC/KD, -KE/KF; 1770-KF2; 1771-KG, 1774-KA; and1785-KA Mod

Strany 229 - Transition at Master Station

Message Packet FormatsChapter 55-14Table 5.CContents of Status DATA for 1773-KA ModulesByte Bit Value Meaning1 Operating Status of Controllers on the

Strany 230

Message Packet FormatsChapter 55-15Table 5.DContents of Status DATA for 1775-KA ModulesByte Bit Value Meaning1Operating Status of PLC-3 Processor0-1 0

Strany 231

Message Packet FormatsChapter 55-16Table 5.EContents of Status DATA for PLC-5Byte Bit Value Meaning1 Operating Status of PLC-5 Processor0-2 01234567Pr

Strany 232

Message Packet FormatsChapter 55-17Protected Bit WriteThis command sets or resets individual bits within limited areas of the PCdata table memory. It

Strany 233

Message Packet FormatsChapter 55-18Protected WriteThis command writes words of data into limited areas of the PC data tablememory. Its access is limi

Strany 234

Message Packet FormatsChapter 55-19Set NAKSThis command sets the maximum number of NAKs that the stationinterface module will accept per message trans

Strany 235 - Worldwide representation

Message Packet FormatsChapter 55-20Set VariablesThis command is a combination of the above three commands. It sets themaximum ENQs, NAKs, and timeout

Komentáře k této Příručce

Žádné komentáře