Sharp Z-336J manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 224 pages
- 2.29 mb
Aller à la page of
Les manuels d’utilisation similaires
-
All in One Printer
Sharp CINSE4653DS51
56 pages 1.04 mb -
All in One Printer
Sharp AL-1552
89 pages 2.1 mb -
All in One Printer
Sharp JW-20FLT
224 pages 2.29 mb -
All in One Printer
Sharp AR-275
130 pages 4.43 mb -
All in One Printer
Sharp MX-312NR
2 pages 0.15 mb -
All in One Printer
Sharp MX-M350N
110 pages 3.75 mb -
All in One Printer
Sharp MX-M623U
879 pages 25.87 mb -
All in One Printer
Sharp MX-6201N
12 pages 2.43 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Sharp Z-336J. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Sharp Z-336J ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Sharp Z-336J décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Sharp Z-336J devrait contenir:
- informations sur les caractéristiques techniques du dispositif Sharp Z-336J
- nom du fabricant et année de fabrication Sharp Z-336J
- instructions d'utilisation, de réglage et d’entretien de l'équipement Sharp Z-336J
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Sharp Z-336J ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Sharp Z-336J et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Sharp en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Sharp Z-336J, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Sharp Z-336J, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Sharp Z-336J. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
R Version 1.0 Produced in June 2002 Sharp Programmable Controller Module name FL-net User's Manual JW-20FL5 JW-20FLT JW-50FL Z-336J[...]
-
Page 2
Thank you for purchasing the FL-net module (board) for use with the sharp programmable controller. Please familiarize yourself with the module by reading this user's manual thoroughly. Keep this manual handy. We are confident that this manual will be helpful whenever you face a problem. In addition to this manual, the following manuals are ava[...]
-
Page 3
Safety Precautions Read this manual and attached documents carefully before installation, operation, maintenance and check- ing in order to use the machine correctly . Understand all of the machine knowledge, safety information, and cautions before starting to use. In this instruction manual, safety precautions are ranked into "danger" an[...]
-
Page 4
3) Use Danger - Don't touch the terminal while the power is being supplied or you may have an electric shock. - Assemble the emergency stop circuit and interlock circuit outside of the programmable controller. Otherwise breakdown or accident damage of the machine may be caused by the trouble of the programmable controller. Caution - Change of [...]
-
Page 5
■ User's Manual Chapter 1: Outline Chapter 2: Handling Precautions Chapter 3: System Configuration Chapter 4: Name and Function of Each Part Chapter 5: Installation Chapter 6: Connection/Wiring Chapter 7: Use Guide Chapter 8: Cyclic Transfer Chapter 9: Message Transfers Chapter 10: Communication Control Chapter 11: SEND/RECEIVE Fun[...]
-
Page 6
T able of Contents Chapter 1: Outline ...................................................................................................... 1-1 Chapter 2: Handling Precautions ............................................................................. 2-1 Chapter 3: System Configuration ...........................................................[...]
-
Page 7
(1) Cyclic transfer ............................................................................................................ ........ 7-10 (2) Message transfer ........................................................................................................... ..... 7-1 1 [5] T ransfer cycle ..............................................[...]
-
Page 8
(3) Execution condition ........................................................................................................ ... 9-21 (4) T able of commands .......................................................................................................... . 9-22 [3] Descriptions of each command ..........................................[...]
-
Page 9
[1] General specifications ..................................................................................................... ......... 14-3 [2] Communication specifications ............................................................................................... ... 14-3 [3] External dimension drawings ....................................[...]
-
Page 10
[6] Status management of the FL-net .......................................................................................... 15 -28 [7] Control message sequence number of the FL-net ................................................................. 15-28 15-5 Parts needed to build a network .........................................................[...]
-
Page 11
1-1 1 Chapter 1: Outline An FL-net module (JW-20FL5/20FL T , JW-50FL, FL-net board (Z-336J)) is an interface module use to connect a programmable controller (JW20H/30H, JW50H/70H/100H), J-board to an FL-net. FL-net is an open network that connects production equipment and controllers from multiple F A (factory automation) venders, to create a unifi[...]
-
Page 12
2-1 2 Chapter 2: Handling Precautions Make sure to follow the precautions bellow who using the JW-20FL5/20FL T , JW -50FL (hereafter referred to as this module) and Z-336J (hereafter referred to as this board). (1) Installation - Do not install or store this unit in the following conditions. 1 Locations close to a heating element 2 Sudden temperatu[...]
-
Page 13
3-1 3 Chapter 3: System Configuration [Connection example] - A basic system (segment) configuration consists of a 10BASE5 coaxial cable between 10m and 500 m long with nodes connected to this cable. (A maximum of 100 nodes can be connected per segment) - If the distance between nodes exceeds 500 m, use a repeater (maximum length 2,500 m). See 7-1[1[...]
-
Page 14
4-1 Chapter 4: Name and Function of Each Part 4 Chapter 4: Name and Function of Each Part 4-1 JW -20FL5 Name Function 1 Display panel Displays the JW-20FL5 operating status using LEDs. LN Lights when communicating normally. TX Blink at transmitting data. RX B[...]
-
Page 15
4-2 Chapter 4: Name and Function of Each Part 4 4-2 JW -20FL T 1 2 3 4 5 6 7 8 9 0 ON OFF S H I E L D JW - 20FLT LN TX RX 1 2 V T PE HE S7 S6 S5 S4 S3 S2 S1 S 0 1 Display panel 2 Connector for programmer 3 Connector for 10BASE-T 6 Reset switch Connector for shield switch for 10BASE-T 5 Module No. switch (Factory setting: 0) (Factory setting: ON) (F[...]
-
Page 16
4-3 Chapter 4: Name and Function of Each Part 4 4-3 Z-336J 2 1 O F F SWA ON SW1 SW1 SWA SW6 ON 8 9 0 1 2 3 4 5 6 7 SW6 ON S0 S1 S2 S3 S4 S5 S6 S7 HE PE T 12V RX TX LN S0 S1 S2 S3 S4 S5 S6 S7 HE PE T 12V RX TX LN 2 1 O F F 3 2 1 O F F FG 0V 12V ⑧ ⑦ ?[...]
-
Page 17
4-4 Chapter 4: Name and Function of Each Part 4 4-4 JW -50FL Note: Only 10BASE5 or 10BASE-T protocol is used. Mixed use of these two types is not permitted. JW-50FL S0 S1 S2 S3 S4 S5 S6 S7 LNK TX RX DC12V TEST PER HER P R O G R A R E M M 10B5 10B-T 12VIN (+) (−) FG RESET 8 9 0 1 2 3 4 5 6 7 SW3 OFF ON SW2 1 LED indicator 6 Reset switch 2 Connec[...]
-
Page 18
5-1 Chapter 5: Installation 5 Chapter 5: Installation 5-1 Installation of JW -20FL5/20FL T This section describes the installation procedures for the JW-20FL5/20FLT (hereafter referred to as the module) on the JW20H/30H basic rack panel. Turn off the power to[...]
-
Page 19
5-2 Chapter 5: Installation 5 5-2 Installation of Z-336J Board dimensions and assembled dimensions of the Z-336J are shown below. Board dimensions Assembled dimensions - For details about assembly/installation dimensions, see the manuals below. J-board Z-31 1J/312J User's Manual: Hardware V ersion. J-board Z-313J User's Manual: Hardware V[...]
-
Page 20
5-3 Chapter 5: Installation 5 J-board CPU board Total number of boards able to be mounted including Z-336J and other communication boards Z-300 series Z-311J Maximum 2 - When the total current flow a t5Vo f each mounted board exceeds 800 mA, the number of boa[...]
-
Page 21
5-4 Chapter 5: Installation 5 [2] Address allocation of I/O relay This section describes I/O relay addresses allocated to the Z-336J. (1) When mounted on Z-31 1J/312J The total number of Z-336J boards able to be mounted including other communication boards is two at maximum. Below the switch settings of the Z-336J and allocation of I/O relay are sh[...]
-
Page 22
5-5 Chapter 5: Installation 5 (2) When mounted on Z-313J The number of boards available mounted on the Z-336J including other communication boards is one at maximum. Below shows the switch setting of the Z-313J and Z-336J as well as I/O relay allocation of th[...]
-
Page 23
5-6 Chapter 5: Installation 5 (3) When mounted on Z-51 1J The number of boards available mounted on the Z-336J including other communication boards is two at maximum. Below shows the switch setting of the Z-51 1J and Z-336J as well as I/O relay allocation of the Z- 336J. When using one communication board (Z-336J) Switch setting The set switches SW[...]
-
Page 24
5-7 Chapter 5: Installation 5 When using two communication boards (Z-336J) Switch setting The set switches SW1 and SWA on the Z-551J and the number of communication boards setting switch SWA on the Z-336J are as follows. A llocation of I/O relay I/O relay add[...]
-
Page 25
5-8 Chapter 5: Installation 5 5-3 JW -50FL (1) Installation of cable for option module Install the optional cable on the basic rack panel that installed JW-50FL. Cable type for option module * If the ZW-6CC is used, a maximum of 6 optional modules can be installed. However, a limit of 5 optional modules can be used with JW-50FL, due to a parameter [...]
-
Page 26
6-1 Chapter 6: Connection/Wiring 6 Chapter 6: Connection/Wiring 6-1 Installing an Ethernet cable W orkers who will install or hook up an Ethernet cable must have special training and knowledge, such as the safety procedures and standards required by this technology (JIS X5252). We recommend that you contact a specialist for perform any installation[...]
-
Page 27
6-2 Chapter 6: Connection/Wiring 6 6-2 Connection [1] Connection of JW -20FL5 This paragraph describes how to connect 10BASE5 cable to the JW-20FL5. (1) Connecting the transceiver cable 1 Slide the lock on the 10BASE5 connector (on the JW-20FL5) up. 2 Insert the connector so that the two locking posts on the cable connector match the holes on the s[...]
-
Page 28
6-3 Chapter 6: Connection/Wiring 6 (2) Wiring the power source When a 10BASE5 is used, 12 VDC power should be supplied to the transceiver . Supply power to the 12 VDC power supply input terminal using a commercial constant voltage power supply unit. Remarks - Use a power supply that is dedicated for use by the JW-20FL5. - Do not reverse the positiv[...]
-
Page 29
6-4 Chapter 6: Connection/Wiring 6 [2] When connecting to a JW-20FL T Connect a 10BASE-T twisted pair cable to the 10BASE-T connector on the JW-20FLT. 10BASE-T twisted pair cable 10BASE-T connector[...]
-
Page 30
6-5 Chapter 6: Connection/Wiring 6 [3] Connection of Z-336J (1) When connecting to a 10BASE5 This paragraph describes how to connect 10BASE5 cable to the Z-336J. Connecting the transceiver cable 1 Slide the lock on the 10BASE5 connector (on the Z-336J) up. 2 Insert the connector so that the two locking posts on the cable connector match the holes o[...]
-
Page 31
6-6 Chapter 6: Connection/Wiring 6 Wiring the power source When a 10BASE5 is used, 12 VDC power should be supplied to the transceiver . Supply power to the 12 VDC power supply input terminal of the Z-336J using a commercial constant voltage power supply unit. Remarks - Use a power supply that is dedicated for use by the Z-336J. - Do not reverse the[...]
-
Page 32
6-7 Chapter 6: Connection/Wiring 6 (2) When connecting to a 10BASE-T Connect a 10BASE-T twisted pair cable to the 10BASE-T connector on the Z-336J. 2 1 O F F SWA ON SW1 SW6 ON S0 S1 S2 S3 S4 S5 S6 S7 HE PE T 12V RX TX LN Z-336J 10BASE-T twisted pair cable 10BASE-T connector[...]
-
Page 33
6-8 Chapter 6: Connection/Wiring 6 [4] Connection of JW-50FL (1) Connection of 10BASE5 This paragraph describes how to connect 10BASE5 cable to the JW-50FL. Connecting the transceiver cable 1 Slide the lock on the 10BASE5 connector (on the JW-50FL) up. 2 Insert the connector so that the two locking posts on the cable connector match the holes on th[...]
-
Page 34
6-9 Chapter 6: Connection/Wiring 6 (2) When connecting to a 10BASE-T Connect a 10BASE-T twisted pair cable to the 10BASE-T connector on the JW-50FL. 10BASE-T twisted pair cable 10BASE-T connector[...]
-
Page 35
7-1 Chapter 7: Computer Link Function 7 Chapter 7: Use Guide Max. 500 m Segment : Coaxial cable : Transceiver cable (AUI cable) : Singe port transceiver : Multi-port transceiver : Node : Terminator 7-1 Ethernet [1] 10BASE5 system The basic configuration of a10BASE5 system consists of one coaxial cable, with a maximum length of 500 m, and nodes conn[...]
-
Page 36
7-2 Chapter 7: Computer Link Function 7 If the distance between nodes is greater than 500 m, connect a repeater as shown below, or to increase the number of segments by branching. The figure below is an example of a system with a maximum of 1500 m of cable. Arrange the configuration so that there are never more than two repeaters between any two no[...]
-
Page 37
7-3 Chapter 7: Computer Link Function 7 The example shown below allows up to 2,500m between nodes. In order to extend communication distance, link cables are used (with repeaters at both ends). The maximum length of one link is 500 m. These cables are referred to as "link segments." The link segments must not connect nodes directly. Howev[...]
-
Page 38
7-4 Chapter 7: Computer Link Function 7 Parameters related to the system configuration are summed up below. General specifications for configuring an Ethernet system [2] 10BASE-T system Connect a hub to a transceiver using a transceiver cable, and the hub can be connected to multiple nodes. This system is shown below. When you want to connect a nod[...]
-
Page 39
7-5 Chapter 7: Computer Link Function 7 [3] IP addresses on an Ethernet In general, the UDP/IP uses a 32-bit logical address called the "IP address." The IP address consists of a network address and a host address. Normally, a class C configuration is used in the FA industry. IP address classifications on an Ethernet Each 8 bits of the ad[...]
-
Page 40
7-6 Chapter 7: Computer Link Function 7 7-2 FL-net [1] Description of the FL-net (1) The FL-net concept FL-net is an F A control network that uses an Ethernet protocol. FL-net has a cyclic transfer function and a message transfer function. The basic concepts of the FL-net are as follows. 1 Ethernet protocols are used for communication (physically a[...]
-
Page 41
7-7 Chapter 7: Computer Link Function 7 (2) FL-net protocol The FL-net consists of the following 6 protocol layers. FL-net protocol F A link protocol Note: The transport layer and network layer use the UDP/IP addressing scheme. The data link layer and physical layer use the Ethernet scheme. (3) Features of the FL-net transfer system The FL-net data[...]
-
Page 42
7-8 Chapter 7: Computer Link Function 7 (4) FL-net's IP address scheme Each node in the FL-net should be set independently using class C addresses. An "IP address" is an address used to identify a specific node (station) when sending data and using an Internet Protocol (IP). Therefore a unique IP address should be assigned to each no[...]
-
Page 43
7-9 Chapter 7: Computer Link Function 7 [3] Data communication type FL-net data communication supports both "cyclic transfer" and "message transfer." T ype of data communication on the FL-net (1) Cyclic transfer With cyclic transfer , the JW-50FL sends data at certain intervals. Each node can share data through a common (shared)[...]
-
Page 44
7-10 Chapter 7: Computer Link Function 7 (2) Message transfer In the message transfer operation, the JW-50FL sends data non-cyclically . Normally , when a request to send occurs, the FL-net will communicate with a certain node. Example of a message transfer [4] T ransfer data volume (1) Cyclic transfer In a cyclic transfer , the FL-net has an 8 K b[...]
-
Page 45
7-11 Chapter 7: Computer Link Function 7 (2) Message transfer The maximum amount of data that can be transferred in one message frame is 1024 bytes (exclud- ing the header section). Message transfer data limit [5] T ransfer cycle In the cyclic transfer operation, the JW-50FL refreshes the common memory almost constantly. The JW-50FL controls the tr[...]
-
Page 46
7-12 Chapter 7: Computer Link Function 7 [6] Data area and memory Data area and memory FL-net communication module Cyclic transfer Common memory area 1 Common memory area 2 Message transfer buffer area FL-net management table area FL-net parameter area Physical memory CPU module Message transfer[...]
-
Page 47
7-13 Chapter 7: Computer Link Function 7 [7] Communication management table The status of each node is controlled using an individual node management table (maintained by the node itself), a participating node management table, and a network management table. (1) Local node management table The settings in each local node management table are contr[...]
-
Page 48
7-14 Chapter 7: Computer Link Function 7 (2) Participating node management table The participating node management table contains data related to the nodes currently participating in the network. Participating node management table - "0x1ff" is the hexadecimal notation for 1FF (HEX) . - For details about the participation node management [...]
-
Page 49
7-15 Chapter 7: Computer Link Function 7 [8] Cyclic transfer and data area (1) Outline of the cyclic transfer process The cyclic transfer process is a function that supports cyclic data exchanges that occur between nodes. 1 Establishes the common memory function. 2 T ransmits when a node receives the token. 3 Nodes which do not execute cyclic trans[...]
-
Page 50
7-16 Chapter 7: Computer Link Function 7 (2) Common memory The description of the common memory is as follows. 1 The common memory allows the memory to be shared between nodes performing a cyclic transfer . 2 T wo types of areas (area 1 and area 2) are allocated for each node. 3 If an area needed by a node to send its data exceeds the transfer size[...]
-
Page 51
7-17 Chapter 7: Computer Link Function 7 The common memory can also be used exclusively as a receiving area. Example 2: Common memory during a cyclic transfer (3) Area 1 and area 2 One node can be allocated two data areas (area 1 and area 2) for common memory . T o determine the sending area, specify a top address and the size of the area. To acces[...]
-
Page 52
7-18 Chapter 7: Computer Link Function 7 (4) Guarantee of simultaneity The cyclic transfer divides data into frames, depending on the amount of data being sent. The FL-net guarantees the simultaneity on common memory of each node using the following proce- dures. Note: When area 2 exceeds 3084 bytes, the JW-50FL cannot guarantee the simultaneity of[...]
-
Page 53
7-19 Chapter 7: Computer Link Function 7 [9] Message transfers (1) Outline of the message transfer process The message transfer process is a function that allows asynchronous data to be exchanged be- tween nodes. The basic operation of the message transfer process is shown below . 1 When a node receives a token, it will send a maximum of one frame [...]
-
Page 54
7-20 Chapter 7: Computer Link Function 7 (2) T able of support messages T able of support messages No. Message Request Response Pages to refer 1 Read byte-block data O O 7-21 2 Write byte-block data O O 7-22 3 Read word-block data O O 7-23 4 Write word-block data O O 7-24 5 Read network parameters O O 7-25 6 Write network parameters O O 7-26 7 Star[...]
-
Page 55
7-21 Chapter 7: Computer Link Function 7 (3) Details of the support messages 1 1 1 1 1 Read byte-block data This is a message function used to read a virtual address space (32-bit address space) in a target node on the network, in units of one byte at a time (each address = 8-bits). Be careful because the internal address map varies with the FL-net[...]
-
Page 56
7-22 Chapter 7: Computer Link Function 7 2 2 2 2 2 W rite byte-block data This is a message function used to write to a virtual address space (32-bit address space) in a target node on the network, in units of one byte at a time (each address = 8-bits). Be careful because the internal address map varies with the FL-net module you are using. Request[...]
-
Page 57
7-23 Chapter 7: Computer Link Function 7 3 3 3 3 3 Read word-block data This is a message function used to read a virtual address space (32-bit address space) in a target node on the network in units of one word at a time (one address = 16-bits). Be careful because the internal address map varies with the FL-net module you are using. Request messag[...]
-
Page 58
7-24 Chapter 7: Computer Link Function 7 4 4 4 4 4 Wr ite word-block data This is a message function used to write to a virtual address space (32-bit address space) in a target node on the network in units of one word at a time (one address = 16-bits). Be careful because the internal address map varies with the FL-net module you are using. Request [...]
-
Page 59
7-25 Chapter 7: Computer Link Function 7 5 5 5 5 5 Read network parameters This is a function used to read the network parameter data for a target node through the network. It reads the following data. Network parameter data - Node number - Vender name - Manufacturer model name - Node name (facility name) - Address and size of common memory - Token[...]
-
Page 60
7-26 Chapter 7: Computer Link Function 7 6 6 6 6 6 Write network parameters This is a function used to change the network parameter data of a receiving node through the network. The following data can be changed. - Node name (facility name) - Address and size of common memory When the address and size of the common memory is changed, the receiving [...]
-
Page 61
7-27 Chapter 7: Computer Link Function 7 7 7 7 7 7 Start, stop commands This is a function used to remotely start and stop the operation of equipment that is connected to the FL-net. Request message Response message Operation Operation instruction Request message Response message Stop Stop instruction[...]
-
Page 62
7-28 Chapter 7: Computer Link Function 7 8 8 8 8 8 Read profile This is a function used to remotely set the system parameters of a device profile that is the data for the receiving node. The following parameters are included in the system parameters. - Common parameters (essential) - Parameters peculiar to each device (optional) Request message Res[...]
-
Page 63
7-29 Chapter 7: Computer Link Function 7 9 9 9 9 9 Read log data This is a function used to read the log data of the receiving node. 0 0 0 0 0 Clear log data This is a function used to clear log data of the receiving node. Request message Response message Request message Response message Communication log data Clear Communication log data[...]
-
Page 64
7-30 Chapter 7: Computer Link Function 7 q q q q q Return message This is a function used to send back a message that has been received. The FL-net automatically returns messages. w w w w w T ransfer transmission message This is a function used to provide a transmission service to the FL-net upper layer . This function informs received message to t[...]
-
Page 65
8-1 Chapter 8: Cyclic Transfer 8 Chapter 8: Cyclic T ransfer Common memory area Area 1 8K bits (8192 bits = 1024 bytes) 8.5K words Area 2 8K words (8192 words = 16384 bytes) Set item Reference number of the figure above Parameter address (8) Area 1 Top address and file number on a PC 1 20 to 22 Top address of sending area (this node) 2 10 to 11 Sen[...]
-
Page 66
8-2 Chapter 8: Cyclic Transfer 8 Notes on the common memory areas The common memory areas (area 1 and 2) can also be set using the following procedures. 1. There is no need to allocate sequential node numbers. [Example] 2. There is no need to assign data memory areas in node number order. [Example] 3. There is no need for continuous data memory are[...]
-
Page 67
8-3 Chapter 8: Cyclic Transfer 8 8-1 Setting procedures This section describes all of the FL-net module setting procedures. For details about message transfers, the communication management area, and the SEND/RECEIVE function, see the respective chapters. 1 1 1 1 1 Specify a parameter area See Chapter 12. A parameter area is allocated within the co[...]
-
Page 68
8-4 Chapter 8: Cyclic Transfer 8 8-2 Areas that can be allocated as the common memory area The data memory area that can be allocated as the common memory areas (area 1 and 2) vary with the model of the module used. (1) For the JW20H or J-board (Z-300 series) - The top address parameter is a word based address. See page 8-8. FL-net module Host PC C[...]
-
Page 69
8-5 Chapter 8: Cyclic Transfer 8 (2) For the JW30H or J-board (Z-500 series) - The relationship between the control module (on which the memory module is installed) and the file memory is as follows. * File memory of J-board (Z-500 series) is the same as that of JW-32CUH1. - The top address parameter is a word based address. See page 8-9. Address o[...]
-
Page 70
8-6 Chapter 8: Cyclic Transfer 8 (3) For the JW50H/70H/100H * コ 1300 to コ 1477 (file addresses 001300 to 001477) are for shared use with the general-purpose relays. Therefore, if a timer/counter is set up with 1024 points, these file addresses cannot be used for the general-purpose relays. - The relationship between the PC model (on which the m[...]
-
Page 71
8-7 Chapter 8: Cyclic Transfer 8 8-3 Parameter settings for cyclic transfers The parameters related to cyclic transfers are as follows. Corresponds to 1 to 6 on page 8-1. (For parameter details See Chapter 12.) - Enter the top address in word units (* above). Pages 8-8 to 8-12. Ex.: Enter コ 1600 to コ 1601 (word address 01C0 (H) ) as the top add[...]
-
Page 72
8-8 Chapter 8: Cyclic Transfer 8 [1] Word addresses used for the top address The top address entered in the parameters for cyclic transfers on the FL-net are word addresses. Variations among the PLC models that can be installed are shown below. (1) For the JW20H or J-board (Z-300 series) JW20H/J-board (Z-300series) address Top address set in FL-net[...]
-
Page 73
8-9 Chapter 8: Cyclic Transfer 8 (2) For the JW30H or J-board (Z-500 series) File 0 JW30H/J-board (Z-500 series) address Top address set in FL-net cyclic transfer Byte address (8) File address (8) Word unit: Octal Word unit: Hex. Relay コ 0000, コ 0001 000000, 000001 000000 0000 コ 0002, コ 0003 000002, 000003 000001 0001 to to to to コ 1576, [...]
-
Page 74
8-10 Chapter 8: Cyclic Transfer 8 JW30H/J-board (Z-500 series) address Top address set in FL-net cyclic transfer Byte address (8) File address (8) Word unit: Octal Word unit: Hex. File 0 Register (Possible to register error history) E6000, E6001 024000, 024001 012000 1400 to to to to E7776, E7777 025776, 025777 012777 15FF TMR/CNT/MD current value [...]
-
Page 75
8-11 Chapter 8: Cyclic Transfer 8 (3) For the JW50H/70H/100H JW30H/J-board (Z-500 series) address Top address set in FL-net cyclic transfer Byte address (8) File address (8) Word unit: Octal Word unit: Hex. Relay コ 0000, コ 0001 000000, 000001 000000 0000 コ 0002, コ 0003 000002, 000003 000001 0001 to to to to コ 1576, コ 1577 001576, 001577[...]
-
Page 76
8-12 Chapter 8: Cyclic Transfer 8 From the previous page - The relationship between the PC model, the memory module that is installed, and file memory is as follows. JW50H/70H/100H address Top address set in FL-net cyclic transfer Byte address (8) File address (8) Word unit: Octal Word unit: Hex. File 1 000000, 000001 000000 0000 to to to 03777[...]
-
Page 77
8-13 Chapter 8: Cyclic Transfer 8 8-4 Communication time [1] T oken round time The token round time can be obtained as follows. m Token round time = ∑ △ Tn n=1 (Total of the space (time) between data from this node and all previous nodes.) "Tn" varies with the amount of data sent by the previous station. It also varies with the proces[...]
-
Page 78
9-1 Chapter 9: Message transfers 9 *1 Client function Use Do not use Use Do not use Use Do not use Use Do not use Use Do not use 81 (H) 83 (H) 81 (H) 80 (H) 82 (H) 00 (H) Message transfer of the module Transmission message *2 Remote function (SHARP’s proprietary function) FL-net Send data (request) Receive data (response) Address (8) 30 33 34 37 [...]
-
Page 79
9-2 Chapter 9: Message transfers 9 9-1 Message sending procedures and data reception details This section describes procedures used for the settings needed to send (or request) messages using the message transfer function, as well as the details for receiving data from a node. (JW-50FL general setting procedures See page 8-3.) 1 1 1 1 1 Setting the[...]
-
Page 80
9-3 Chapter 9: Message transfers 9 From the previous page 2 2 2 2 2 Setting transmission buffer (set the sending details) Specify the [information section] and [data section] to be used for sending messages to the transmission buffer (addresses +2000 to 3777 (8) , +4040 to 4055 (8) ). (Transmission buffer Next page.) 3 3 3 3 3 Execute a transmissio[...]
-
Page 81
9-4 Chapter 9: Message transfers 9 9-2 T ransmission buffer This section describes the transmission buffer that is used for sending and receiving data for the message transfer . The transmission buffer area (+0000 to 4055 (8) ) is determined by entering top address to parameter (address 34 to 36 (8) ). (Parameter See Chapter 12.) *1: The data in th[...]
-
Page 82
9-5 Chapter 9: Message transfers 9 FL-net board Host J-board CPU board Details Z-336J Z-300 series Z-311J/312J/313J See below Z-500 series Z-511J Next page [1] Allocation of available areas for the transmission buffer The allocation of available areas for the transmission buffer varies with the module on which the FL-net is installed. (1) For the J[...]
-
Page 83
9-6 Chapter 9: Message transfers 9 (2) For the JW30H or J-board (Z-500 series) - The relationship between the control module (on which the memory module is installed) and the file memory is as follows. * File memory of J-board (Z-500 series) is the same as that of JW-32CUH1. Note: Be careful not to allow the transmission buffer area to overlap with[...]
-
Page 84
9-7 Chapter 9: Message transfers 9 (3) For the JW50H/70H/100H * コ 1300 to コ 1477 (file addresses 001300 to 001477) are for shared use with the general-purpose relays. Therefore, if a timer/counter is set up with 1024 points, these file addresses cannot be used as general-purpose relays. - The relationship between the PC model (on which the memo[...]
-
Page 85
9-8 Chapter 9: Message transfers 9 9-3 Message transaction codes and execution conditions The transaction codes (TCD) and execution conditions for the messages supported by the JW-50FL are as follows. TCD: T ransaction code * When the high word (pages 9-10 to 15) is "0x0000 to 0x002C," execution is possible regardless of the host PC statu[...]
-
Page 86
9-9 Chapter 9: Message transfers 9 9-4 Use of virtual address space and PC memory space This section describes the addresses used in the host PC by the FL-net. FL-net module Host PC Control module Details JW-20FL5 JW-20FLT JW20H JW-21CU/22CU Next page JW30H JW-31CUH1 Page 9-11 to 9-13 JW-32CUH1 JW-33CUH1/2/3 FL-net board Host J-board CPU board Deta[...]
-
Page 87
9-10 Chapter 9: Message transfers 9 PC memory space Virtual address space High word Low word Byte block Word block Relay area コ 0000 to コ 0077 0x0000 0x0000 to 0x003F 0x0000 to 0x001F コ 0100 to コ 0177 0x0040 to 0x007F 0x0020 to 0x003F コ 0200 to コ 0377 0x0080 to 0x00FF 0x0040 to 0x007F コ 0400 to コ 0677 0x0100 to 0x01BF 0x0080 to 0x00[...]
-
Page 88
9-11 Chapter 9: Message transfers 9 (2) For the JW30H or J-board (Z-500 series) Files 0 PC memory space Virtual address space High word Low word Byte block Word block Relay area コ 0000 to コ 0077 0x0000 0x0000 to 0x003F 0x0000 to 0x001F コ 0100 to コ 0177 0x0040 to 0x007F 0x0020 to 0x003F コ 0200 to コ 0377 0x0080 to 0x00FF 0x0040 to 0x007F [...]
-
Page 89
9-12 Chapter 9: Message transfers 9 From the previous page PC memory space Virtual address space High word Low word Byte block Word block Special I/O parameter T00-000 to 177 0x00F0 0x0000 to 0x007F 0x0000 to 0x003F T01-000 to 177 0x0080 to 0x00FF 0x0040 to 0x007F T02-000 to 177 0x0100 to 0x017F 0x0080 to 0x00BF T03-000 to 177 0x0180 to 0x01FF 0x00[...]
-
Page 90
9-13 Chapter 9: Message transfers 9 Files 1 to 3 and 10 to 2C (H) - The relationship between the control module (on which the memory module is installed) and the file memory is as follows. * File memory of J-board (Z-500 series) is the same as that of JW-32CUH1. Control module File memory JW-31CUH1 File 0 JW-32CUH1 * File 0, 1, and 2 (File 2 can be[...]
-
Page 91
9-14 Chapter 9: Message transfers 9 * When the timer/counter is set to use 1024 points, コ 1300 to コ 1400 cannot be used as general- purpose relays. (3) For the JW50H/70H/100H Files 0 PC memory address Virtual address space High word Low word Byte block Word block Relay area コ 0000 to コ 0077 0x0000 0x0000 to 0x003F 00x0000 to 0x001F コ 0100[...]
-
Page 92
9-15 Chapter 9: Message transfers 9 Files 1 to 7 - Relationship between the host PC (memory module) and the file memory is as follows. PC memory address Virtual address space High word Low word File No. File address (8) Byte block Word block 1 000000 to 177777 0x0001 0x0000 to 0xFFFF 00x0000 to 0x7FFF 2 000000 to 177777 0x0002 0x0000 to 0xFFFF 00x0[...]
-
Page 93
9-16 Chapter 9: Message transfers 9 9-5 Computer link function (Compatible with Satellite net: SHARP's proprietary message format) The computer link function is SHARP's proprietary transmission message format (request TCD1000, response TCD12000, and can be used between PCs equipped with a SHARP FL-net module (board). 1 Specify the node nu[...]
-
Page 94
9-17 Chapter 9: Message transfers 9 Command page 9- 14. Transmission buffer address (8) Details +2000 Header (40 bytes) - Normally, all 40 bytes to 00 (H) . When you want to communicate crossover two layers including Ethernet, enter expansion header. - [5] Two layer communication with Ethernet. Sending [data section] to +2047 +2050 c-ID: 47 (H) +20[...]
-
Page 95
9-18 Chapter 9: Message transfers 9 From the previous page 3 3 3 3 3 Receive (response details) The details of the data received (response) from the node to communicate is stored in the transmis- sion buffer (base address +0000 to 1777 (8) , and base address +4000 to 4015 (8) ). Response the next page. Transmission buffer address (8) Details +0000 [...]
-
Page 96
9-19 Chapter 9: Message transfers 9 [2] Basic format of computer link commands (1) Communication format When a computer link is used, data sent from this node to a target node is referred to as a [com- mand], and data received from the target node by this node is referred to as a [response]. The communication format for commands and responses is as[...]
-
Page 97
9-20 Chapter 9: Message transfers 9 (2) Memory address expression format The format expressing memory address contained in the command (command text/response text) is as shown below . ( For more details, refer to "[3] Descriptions of each command.") PSEG : Program segment (corresponds to the file number .) - Memory capacity varies with ty[...]
-
Page 98
9-21 Chapter 9: Message transfers 9 Write enable mode Details Mode 0 Mode 1 Mode 2 Writing to all of memory is prohibited Writing is only enabled to data memory Writing is enabled to all of memory BLOC : Bit location on the data memory The register (file register) is to be designated using DSEG and DADR. [Example] Register 09000 : DSEG = 00 (H) , D[...]
-
Page 99
9-22 Chapter 9: Message transfers 9 (4) T able of commands 04 (H) 9-34 Reading program 14 (H) 9-35 Write program 20 (H) 9-25 Monitoring relay 23 (H) 9-28 The current value monitor of the timers/counters 24 (H) 9-29 Monitoring register 30 (H) 9-26 Set/reset relay 32 (H) 9-27 Set/reset timer/counter 34 (H) 9-30 Write in register 35 (H) 9-31 Write sam[...]
-
Page 100
9-23 Chapter 9: Message transfers 9 [3] Descriptions of each command This section describes the "COM" settings and the items thereafter of the communication formats (page 9-19). Read out write enable mode (COM=E9 (H) ) [Format] COM = E9 (H) WMOD = 00 (H) : Mode 0 (All memory write-disabled) 01 (H) : Mode 1 (Only the data memory write-enab[...]
-
Page 101
9-24 Chapter 9: Message transfers 9 Selecting the write enable mode COM = F9 (H) [Format] COM = F9 (H) WMOD = 00 (H) : Mode 0 (All memory write-disabled) 01 (H) : Mode 1 (Only the data memory write-enabled) 02 (H) : Mode 2 (All memory write-enabled) [Function] - Selecting the write enable mode. [Execution condition] - Write enable mode : Mode 0, mo[...]
-
Page 102
9-25 Chapter 9: Message transfers 9 Monitoring relay (COM = 20 (H) ) [Format] COM = 20 (H) DSED = Segment (00 to 07, 10 to 2C (H) ) See page 9-20. DADR L, H = Byte address (0000 (H) to FFFF (H) ) See page 9-20. BLOC = Bit position (00 (H) to 07 (H) ) DA TA = Read data (00 (H) : OFF , 01 (H) : ON) [Function] - Read the bit data (relay) shown in DSEG[...]
-
Page 103
9-26 Chapter 9: Message transfers 9 Set/reset relay (COM = 30 (H) ) [Format] COM = 30 (H) DSED = Segment (00 to 07, 10 to 2C (H) ) See page 9-20. DADR L, H = Byte address (0000 (H) to FFFF (H) ) See page 9-20. BLOC = Bit position (00 (H) to 07 (H) ) DA TA = Set/reset data (00 (H) : reset, 01 (H) : set) [Function] - Set/reset the relays shown in DSE[...]
-
Page 104
9-27 Chapter 9: Message transfers 9 Set/reset timer/counter (COM = 32 (H) ) [Format] COM = 32 (H) T ADR L, H = Timer-counter number (0000 (H) to 03FF (H) ) See page 9-21. DA T A = Set/reset data (00 (H) : reset, 01 (H) : set) [Function] - Set/reset the timer/counter displayed on T ADR. [Execution condition] - Write enable mode : Mode 1 and mode 2 -[...]
-
Page 105
9-28 Chapter 9: Message transfers 9 The current value monitor of the timers/counters (COM = 23 (H) ) [Format] COM = 23 (H) T ADR L, H = Timer and counter number (0000 (H) to 03FF (H) ) See page 9-21. L L, H = Number of data to read DA T A 1 to N = The current value data (read current value field of the timer and the counter) A TTR 1 to N = The attr[...]
-
Page 106
9-29 Chapter 9: Message transfers 9 Monitoring register COM = 24 (H) [Format] COM = 24 (H) DSEG = Segment (00 to 07, 10 to 2C (H) ) See page 9-20. DADR L, H = Byte address (0000 (H) to FFFF (H) ) See page 9-20. L L, H = Data length (Number of bytes) DA T A 1 to N = Read data [Function] - Read the register data with the length shown by L, starting f[...]
-
Page 107
9-30 Chapter 9: Message transfers 9 Write in register (COM = 34 (H) ) [Format] COM = 34 (H) DSEG = Segment (00 to 07, 10 to 2C (H) ) See page 9-20. DADR L, H = Byte address (0000 (H) to FFFF (H) ) See page 9-20. L L, H = Data length (number of bytes) DA T A 1 to N = Write data [Function] - Write the register data with the length shown by L, startin[...]
-
Page 108
9-31 Chapter 9: Message transfers 9 Ë Command Ë Response COM DSEG DADR L DADR H L L L H DATA COM RSLT DSEG DADR L DADR H L L L H Write same data to register (COM = 35 (H) ) [Format] COM = 35 (H) DSEG = Segment (00 to 07, 10 to 2C (H) ) See page 9-20. DADR L, H = Byte address (0000 (H) to FFFF (H) ) See page 9-20. L L,H = Data length (number of by[...]
-
Page 109
9-32 Chapter 9: Message transfers 9 Read out the system memory (COM = 44 (H) ) [Format] COM = 44 (H) SEG = Segment (08 (H) ) SADRL,H = System memory address (0000 (H) to 047F (H) ) See page 9-21. L L,H = Data length (number of bytes) DA T A 1 to N = Read data [Function] - Read the system memory data with the length shown by L, starting from SEG, SA[...]
-
Page 110
9-33 Chapter 9: Message transfers 9 Write to the system memory (COM = 54 (H) ) [Format] COM = 54 (H) SEG = Segment (08 (H) ) SADR L, H = System memory address (0000 (H) to 047F (H) ) See page 9-21. L L, H = Data length (number of bytes) DA T A L to N = Write data [Function] - Write the system memory data with the length shown by L, starting from SE[...]
-
Page 111
9-34 Chapter 9: Message transfers 9 Reading program (COM = 04 (H) ) [Format] COM = 04 (H) PSEG = Program segment (08 (H) , 09 (H) ) See page 9-20. P ADR L,H = Program address (0000 (H) to 7DFF (H) ) See page 9-20. L L,H = Data length (number of words) DA T A 1 to N = Read data (2 bytes = one step) [Function] - Read a program with a length (number o[...]
-
Page 112
9-35 Chapter 9: Message transfers 9 Write program (COM = 14 (H) ) [Format] COM = 14 (H) PSEG = Program segment (08 (H) , 09 (H) ) See page 9-20. P ADR L, H = Program address (0000 (H) to 7DFF (H) ) See page 9-20. L L, H = Data length (number of words) DA T A 1 to N = Write data (2 bytes = one step) [Function] - Write a program with a length (number[...]
-
Page 113
9-36 Chapter 9: Message transfers 9 Read date (COM = A2 (H) ) [Format] COM = A2 (H) Y= Y ear (express lower two digits of Western year , 00 (H) to 99 (H) ) M= Month (01 (H) to 12 (H) ) D= Date (01 (H) to 31 (H) ) DW = Day of week (00 (H) : Sunday , 01 (H) : Monday , 02 (H) : T uesday , 03 (H) : Wednesday , 04 (H) : Thurs day , 05 (H) : Friday , 06 [...]
-
Page 114
9-37 Chapter 9: Message transfers 9 Set date (COM = B2 (H) ) [Format] COM = B2 (H) Y= Y ear (express lower two digits of Western year in BCD. 00 (H) to 99 (H) ) M= Month (01 (H) to 12 (H) ) D= Date (01 (H) to 31 (H) ) DW = Day of week (00 (H) : Sunday , 01 (H) : Monday , 02 (H) : T uesday , 03 (H) : Wednesday , 04 (H) : Thurs day , 05 (H) : Friday [...]
-
Page 115
9-38 Chapter 9: Message transfers 9 Read time (COM = A3 (H) ) [Format] COM = A3 (H) H= Hour (00 (H) to 23 (H) : BCD) M= Minute (00 (H) to 59 (H) : BCD) S= Second (00 (H) to 59 (H) : BCD) [Function] - Read time data. [Execution condition] - Write enable mode : Mode 0, mode 1 and mode 2 - PC operation status : Stopping, operating [Example] - Read tim[...]
-
Page 116
9-39 Chapter 9: Message transfers 9 Set time (COM = B3 (H) ) [Format] COM =B3 (H) H= Hour (00 (H) to 23 (H) : BCD) M= Minute (00 (H) to 59 (H) : BCD) S= Second (00 (H) to 59 (H) : BCD) CTRL = Control data 00 (H) : Run clock 01 (H) : Stop clock [Function] - Write time data [Execution condition] - Write enable mode : Mode 1 and mode 2 - PC operation [...]
-
Page 117
9-40 Chapter 9: Message transfers 9 Monitor PC operation status (COM = E8 (H) ) [Format] COM = E8 (H) MODE = 00 (H) : Operating 01 (H) : Stopped operation by an instruction from other module. 02 (H) : Stopped operation by an instruction from this module. [Function] - Monitor PC run/stop status. [Execution condition] - Write enable mode : Mode 0, mo[...]
-
Page 118
9-41 Chapter 9: Message transfers 9 Halt and release halting of PC(COM = F8 (H) ) [Format] COM = F8 (H) MODE = 00 (H) : Release halt 01 (H) : Halt [Function] - Halt/release halting of PC operation. [Execution condition] - Write enable mode : Mode 0, mode 1 and mode 2 - PC operation status : Stopping, operating [Example] - Halt PC operation Ë Comma[...]
-
Page 119
9-42 Chapter 9: Message transfers 9 [4] Computer link error code table Details 00 01 06 07 0F 13 10 RSLT (Hexadecimal) Normally end Format error PC does not stop operation Verify error of write command. Time out while accessing memory. Tried to set/reset TMR/CNT while PC stops operation. Miss match write enable mode.[...]
-
Page 120
9-43 Chapter 9: Message transfers 9 [5] T wo-layer communication with the Ethernet In order to communicate with the Ethernet on a different layer, use the following information in the communication format header (see page 9-19) as an extension header. - When making a two-layer communication with the FL-net, the frame needs to contain the informatio[...]
-
Page 121
9-44 Chapter 9: Message transfers 9 Note The two-layer communication is possible only with the computer link to the module on the FL-net from the host computer on the Ethernet via transit stations. Communication in the reverse direction, or the computer link from the host computer on the FL-net to this module, is not possible. Example: In the follo[...]
-
Page 122
9-45 Chapter 9: Message transfers 9 9-6 Remote programming and remote monitor functions The remote programming and remote monitor functions are methods for operating a PC on another node connected to the FL-net. These are proprietary SHARP functions. These functions can be used only between PCs that are quipped with SHARP FL-net modules (boards). Y[...]
-
Page 123
9-46 Chapter 9: Message transfers 9 [2] Example operation The example below shows the procedure for using the JW-100SP ladder logic programming software. For details about the operation of other support tools, see their respective manuals. 1 1 1 1 1 Connect a personal computer to the module on the FL-net. 2 2 2 2 2 Communication settings Set the JW[...]
-
Page 124
9-47 Chapter 9: Message transfers 9 3 3 3 3 3 Network settings Select whether a node (target station) that will be used to execute remote programming and remote monitoring is on a standard network connection or an extended connection. In the figure below , nodes numbered 10 to 12 are standard connections. Nodes numbered 1 to 3 are extended network [...]
-
Page 125
10-1 Chapter 10: Communication Control 10 Chapter 10: Communication Control A participating node list flag, an operation status flag, error status flag, local node management table, participating nodes management table, and network management table are set up in the communica- tion control area of the JW-50FL. (Complete setting procedure for the JW[...]
-
Page 126
10-2 Chapter 10: Communication Control 10 [1] Participating nodes list flag Shows the participation status of each node in the network *1: Addresses +000 to 037 (8) are offset addresses calculated from the top address that is stored in the parameter at addresses 30 to 32 (8) . *2: 1 to 254 express each node number. By turning the bits in these addr[...]
-
Page 127
10-3 Chapter 10: Communication Control 10 [2] Operation status flag Shows the operation information for each node *1: Addresses +040 to 077 (8) are offset address calculated from the top address that is stored in the parameter at addresses 30 to 32 (8) ). *2: 1 to 254 express each node number. By turning the bits in these addresses on and off, the [...]
-
Page 128
10-4 Chapter 10: Communication Control 10 [3] Error status flag Shows the error information for each node *1: Addresses +100 to 137 (8) are offset addresses calculated from the top address that is stored in the parameter at addresses 30 to 32 (8) ). *2: 1 to 254 are express node number. By turning the bits in these addresses on and off, the partici[...]
-
Page 129
10-5 Chapter 10: Communication Control 10 [4] Local node management table This section shows the information about the local node as part of the network control information. *1: Addresses +140 to 223 (8) are offset addresses calculated from the top address that is stored in the parameter at addresses 30 to 32 (8) . FA link layer status (LKS) Shows [...]
-
Page 130
10-6 Chapter 10: Communication Control 10 [5] Participating node management table Shows the information for the node numbers at address offset +300 for each table. - Addresses +224 to 253 (8) are offset addresses calculated from the top address that is stored in the parameter at addresses 30 to 32 (8) . - The details of the offset addresses at +234[...]
-
Page 131
11-1 Chapter 1 1: SEND/RECEIVE function 11 Chapter 1 1: SEND/RECEIVE function The SEND/RECEIVE functions are exclusive SHARP functions. These can only be used between PCs equipped with FL-net modules (board). Note: The SEND/RECEIVE functions can be used only when a JW30H, JW50H/70H/100H, or a J- board (Z-500 series) is used as the host PC. This fun[...]
-
Page 132
11-2 Chapter 1 1: SEND/RECEIVE function 11 F-203 OPCH UN- CH-ST fileN F-204 SEND n S D Flag status during and after the operation Zero 07357 Carry 07356 Error 07355 Non- carry 07354 Description No response from the module (board) 00 1 0 Set value on the UN and module No. switch set value of the communication module are different. Communi- cation ja[...]
-
Page 133
11-3 Chapter 1 1: SEND/RECEIVE function 11 Zero 07357 Carry 07356 Error 07355 Non- carry 07354 Description No response from port 00 1 0 The value entered for the PORT and the actual installed port number may be different. Communi- cation jam 000 1 This condition may instantaneously occur while other send instruction is being executed. However, as s[...]
-
Page 134
11-4 Chapter 1 1: SEND/RECEIVE function 11 Sample of program (for the JW30H) When transferring 8 bytes of data from source station register コ 1000 to the register 09000 of the target station number 3 : Local node JW-20FL Module No. Switch : 2 Channel used : 0 Note - The entry condition of F-203/204 instruction needs to be kept ON until the execut[...]
-
Page 135
11-5 Chapter 1 1: SEND/RECEIVE function 11 [2] RECEIVE This function operates by the combination of F-203 (OPCH) and F-205 (RCV). (1) When the module is used (host PC: JW30H, J-board (Z-500 series)) UN : Module No. switch set value (0 to 6) of the communication module CH : Channel number within the specified module (board) (0 to 3). In the PC progr[...]
-
Page 136
11-6 Chapter 1 1: SEND/RECEIVE function 11 - Setting range of D コ 0000 to コ 1577 b0000 to b1777 09000 to 99777 E0000 to E1777 @ コ 0000 to @ コ 1574 @b0000 to @b1774 @09000 to @99774 @E0000 to @E1774 Zero 07357 Carry 07356 Error 07355 Non- carry 07354 Description No response from port 00 1 0 The value entered for the PORT and the actual insta[...]
-
Page 137
11-7 Chapter 1 1: SEND/RECEIVE function 11 Sample of program (for the JW30H) When transferring 8 bytes of data from source station register コ 1000 to the register 09000 of the target station number 3 : Local node JW-20FL Module No. Switch : 2 Channel used : 0 Note - The entry condition of F-203/205 instruction needs to be kept ON until the execut[...]
-
Page 138
11-8 Chapter 1 1: SEND/RECEIVE function 11 1 1-2 T imeout time for SEND/RECEIVE instructions Enter a timeout time for the SEND/RECEIVE functions in the parameter at address 60 (8) . T imeout time parameter - The specified timeout time will be ef fective for all target nodes. - The allowable range is 0.01 (0.1 sec.) to 255 (25.5 sec.), in decimal no[...]
-
Page 139
12-1 Chapter 12: Parameters 12 Chapter 12: Parameters This chapter describes the parameters that can be set in the module. The parameter area is set in the control module (CPU board). "12-3 How to set parameters." 12-1 T able of parameters Address (8) Details Reference page 00 IP address When FF (H) is written to address 03, the module wi[...]
-
Page 140
12-2 Chapter 12: Parameters 12 12-2 Details of each of the parameters (1) Enable/disable the use of the transmission buffer (Setting parameter address 37 (8) ) Select whether to enable/disable the buffer for each message by entering the appropriate value at parameter address 37 (8) . * 80 to 83 (H) are the valid values for parameter address 37 (8) [...]
-
Page 141
12-3 Chapter 12: Parameters 12 12-3 How to set parameters [1] When the JW-20FL5/20FL T or Z-366J is used Set parameters of JW-20FL5/20FLT and Z-336J as optional parameters of the control module (CPU board). Determine the area of the optional parameters using the module No. switch set value of JW- 20FL5/20FLT and Z-336J. The parameters occupy 64 byt[...]
-
Page 142
12-4 Chapter 12: Parameters 12 Switch SW3 setting 0 1 2 3 4 Parameter address (8) (system memory) #0300 to #0377 #1400 to #1477 #1500 to #1577 #1600 to #1677 #1700 to #1777 Connection cable (ZW-3KC) JW-14PG Control module (JW-100CUH) JW-50FL (The modules shown below are installation examples) FL-net module Host PC Control module JW-50FL JW50H JW-50[...]
-
Page 143
12-5 Chapter 12: Parameters 12 Parameter address (System memory address) Parameter address (8) Set value for switch SW3 Details of parameter (Details - - - - - See page 12-1) 0 1 2 3 4 00 #0300 #1400 #1500 #1600 #1700 IP address 01 #0301 #1401 #1501 #1601 #1701 IP address 02 #0302 #1402 #1502 #1602 #1702 IP address 03 #0303 #1403 #1503 #1603 #1703 [...]
-
Page 144
13-1 Chapter 13: T roubleshooting 13 Chapter 13: T roubleshooting 13-1 Before you conclude that the machine is faulty Check item Description 1 Check whether the modules and boards are installed properly. 2 Are the switches on the module and boards set properly? 3 Check whether the network IP addresses are set properly. 4 Are the common memory areas[...]
-
Page 145
13-2 Chapter 13: T roubleshooting 13 13-2 General network problems and countermeasures [1] Problems concerning the network and appropriate countermeasures (when unable to communicate) Symptom Check points Check details Countermeasure Unable to communicate Power source Is the indicator on the power supply lit? Check and reconnect the power cable. Ch[...]
-
Page 146
13-3 Chapter 13: T roubleshooting 13 [2] Problems concerning the network and appropriate countermeasures (when communications are unstable) Symptom Check points Check details Countermeasures Unable to communicate, or unstable communication Communication route Make sure the external conductive shields of all the coaxial cables are connected to groun[...]
-
Page 147
13-4 Chapter 13: T roubleshooting 13 [3] How to check an IP address using the Ping function on a personal computer Even without specialized tools, such as the FL-net network analyzer, you can check the connections and IP addresses of FL-net equipment using an ordinary personal computer running Windows95 etc. The method for using the Ping function i[...]
-
Page 148
13-5 Chapter 13: T roubleshooting 13 13-3 General precautions related to the FL-net For details about the FL-net transfer route standards, see the previous section and IEEE802.3. In addi- tion, the following limitations and precautions should be noted. Network address Node number 192.168.250 1 to 249 Description 1 Do not place communication data fr[...]
-
Page 149
13-6 Chapter 13: T roubleshooting 13 13-4 Error indicators on the display panel If an error occurs while communicating with the module, the error details can be checked by reading the error code on the display panel (LED display) of the module. Find the cause of the error by looking up the error code that is displayed. Then take the appropriate cou[...]
-
Page 150
14-1 Chapter 14: Specifications 14 Chapter 14: Specifications 14-1 JW -20FL5/20FL T [1] General specifications [2] Communication specifications (1) Communication section specifications *1: Maximum transfer distance between stations when connecting more than one segment using re- peaters. *2: Maximum transfer distance between stations when connectin[...]
-
Page 151
14-2 Chapter 14: Specifications 14 [3] External dimension drawings JW-20FL5 JW-20FLT ON OFF FG RESET S H I E L D JW - 20FL5 35 116 110 6 130 LN TX RX 1 2V T PE HE S7 S6 S5 S4 S3 S2 S1 S0 (Unit: mm) Basic rack panel ON OFF RESET 10B-T S H I E L D JW - 20FL T 35 116 110 6 130 LN TX RX 1 2V T PE HE S7 S6 S5 S4 S3 S2 S1 S 0 Basic rack panel (Unit: mm)[...]
-
Page 152
14-3 Chapter 14: Specifications 14 14-2 Z-336J [1] General specifications [2] Communication specifications (1) Communication section specifications *1: Maximum transfer distance between stations when connecting more than one segment using re- peaters. *2: Maximum transfer distance between stations when connecting more than one 10BASE-T segment usin[...]
-
Page 153
14-4 Chapter 14: Specifications 14 14-3 JW -50FL [1] General specifications *1: The JW-50FL cannot be installed on a W70H/100H. [2] Communication specifications (1) Communication section specifications *2: Maximum transfer distance between stations when connecting more than one segment using re- peaters. *3: Maximum transfer distance between statio[...]
-
Page 154
14-5 Chapter 14: Specifications 14 Item Specifications Communication control method Master-less token method Number of stations supported Maximum 254 Communication function Cyclic transfer (n: n, 8K bits + 8K words) Message transfer (1: 1, 1: n) Maximum data length of one frame is 1K bytes 105 33.5 250 6 5 116 (Unit: mm) Basic rack panel JW-50FL S0[...]
-
Page 155
15-1 Chapter 15: Appendix 15 Chapter 15: Appendix 15-1 System configuration guide [1] Brief description of the Ethernet Ethernet is a standardized LAN (Local Area Network) arrangement used to communicate between personal computers and printers. It prescribes the communication data format, cables and connectors to use. The Ethernet standards are est[...]
-
Page 156
15-2 Chapter 15: Appendix 15 [2] 10BASE5 Specifications 10BASE5 is a connection method for creating an Ethernet network using a coaxial cable approximately 10 mm thick (The thick cable is also called the "yellow cable"). The "10" in "10BASE5" refers to a data transfer speed of 10Mbps. The word "BASE" means th[...]
-
Page 157
15-3 Chapter 15: Appendix 15 [3] 10BASE-T Specifications 10BASE-T is a connection method for creating an Ethernet network using twisted pair cables. The "10" in "10BASE-T" refers to the data transfer speed of 10Mbps. The word "BASE" means that the data transfer system is a "base band system." The "-T&quo[...]
-
Page 158
15-4 Chapter 15: Appendix 15 [4] Other Ethernet Specifications (1) 10BASE2 10BASE2 is a connection method for creating an Ethernet network using a coaxial cable approxi- mately 5 mm thick (This cable is also called a "Thin cable"). The "10" in "10BASE2" refers to a data transfer speed of 10Mbps. The word "BASE&quo[...]
-
Page 159
15-5 Chapter 15: Appendix 15 15-2 Examples of system configurations [1] Small scale configuration Using a single, multi-port transceiver or hub, you can construct a network system connecting a few devices. Examples of small scale configurations T wisted pair cable [UTP: Categor y 5] (Maximum cab le length: 100 m) Multi-por t transceiv er A UI cable[...]
-
Page 160
15-6 Chapter 15: Appendix 15 [2] Basic configuration Connect several multi-port transceivers and hubs to a single coaxial cable, and construct a network of dozens of devices. An example of a basic configuration - Up to four repeaters and hubs can be placed between any two terminals. - A maximum of 50m total cable length (using an AUI cable) can be [...]
-
Page 161
15-7 Chapter 15: Appendix 15 [3] Configuration of a large-scale network By connecting several 10BASE5 network segments using repeaters, you can construct a network con- sisting of several hundred devices. An example of a large-scale configuration Coaxial cable (Maximum cable length: 500 m) AUI cable (maximum cable length: 50 m) Repeater Multi-port [...]
-
Page 162
15-8 Chapter 15: Appendix 15 [4] Configuration of a long distance distribution system When constructing a large-scale network, if the distance between network segments exceeds the limit of the 10BASE5 cable (500 m), you can construct a network up to 2 km long by connecting optical repeaters between network segments. An example of a large-scale, lon[...]
-
Page 163
15-9 Chapter 15: Appendix 15 [5] Configuration of local concentrations In a location where several dozen devices are concentrated in close proximity, a network system can be constructed using a star coupling hub. An example of a configuration for a local concentration of devices Hub Star coupling hub T wisted pair cable [UTP: Categor y 5] (Maximum [...]
-
Page 164
15-10 Chapter 15: Appendix 15 [6] Configuration combining local and long distance distribution In the basic configuration, if a specific controller is located a long distance away, or if there is a high voltage power source or noise generating source near the network, divide the network into two seg- ments and connect an optical cable between the t[...]
-
Page 165
15-11 Chapter 15: Appendix 15 [7] Principles of the FL-net system The goal of an FL-net is real-time communication between controllers, such as programmable control- lers, robot controllers, and numeric control devices, in production systems. The FL-net constructs a token passing mechanism using an instantaneous information transfer based on Ethern[...]
-
Page 166
15-12 Chapter 15: Appendix 15 15-3 Definition of network systems [1] Communication protocol standards The term "Communication protocol" refers to the rules for exchanging information between systems on a particular communication circuit. The communication protocols used by FL-net conform to the follow- ing standards. FL-net communication [...]
-
Page 167
15-13 Chapter 15: Appendix 15 Fix ed De vice address Network address [3] Physical implementations of an FL-net There are five physical implementations of an Ethernet network that support a 10M bps data transfer speed. They are 10BASE5, 10BASE2, 10BASE-T, 10BASE-F, and 10BROAD36 (this is not common/). In addition to these implementations, a 100M bps[...]
-
Page 168
15-14 Chapter 15: Appendix 15 [5] FL-net sub net mask The sub net mask on an FL-net is always "255.255.255.0." The user does not need to set this sub net value. This value is identical to the original network address section and the device address section of the class C. [6] TCP/IP , UDP/IP protocols TCP, UDP, and IP are major protocols u[...]
-
Page 169
15-15 Chapter 15: Appendix 15 [8] FL-net data format (1) Outline of the FL-net data format Data that are sent and received over the FL-net are packed in each layer of the communication protocol as follows. Ethernet frame Less than 1024 bytes User data FL-net header User data UDP header FL-net data UDP segment IP header UDP header FL-net data IP dat[...]
-
Page 170
15-16 Chapter 15: Appendix 15 One frame of FL-net data that can be monitored in a communication circuit is shown below. In the example below, 128 bytes of cyclic data is being transferred. Sample frame of FL-net data Ethernet header User data FL-net header IP header UDP header[...]
-
Page 171
15-17 Chapter 15: Appendix 15 (2) FL-net header format The FL-net header is 64 to 96 bytes long. FL-net header An FL-net header is added to every frame, to comply with the FL-net protocol. [9] FL-net transaction code The FL-net provides the following services with the message transmission service. Message transmission service 64 to 96 by es Less th[...]
-
Page 172
15-18 Chapter 15: Appendix 15 Each message has a transaction code for requesting or responding in its header. It is used to identify the message frame. T able of transaction codes Transaction code Application 0t o 5999 Transmission message 60000 to 64999 Reserved 65000 Cyclic header (with token) 65001 Cyclic header (without token) 65002 Participati[...]
-
Page 173
15-19 Chapter 15: Appendix 15 15-4 Network control of the FL-net [1] T oken control of the FL-net (1) T oken Basically , a node can send data whenever it holds a token. A node can send data without holding a token when it reissues a token due to a time out of the token monitor time, or when it issues a participation request frame so that it can beg[...]
-
Page 174
15-20 Chapter 15: Appendix 15 (2) Flow of the token Basically , only one token exists on the same network. If there are two or more tokens on the same network, the token from the node with the smaller node number takes priority , and the other tokens are discarded. A frame with a token (a token frame) consists of a destination node number and the n[...]
-
Page 175
15-21 Chapter 15: Appendix 15 (3) T oken and data There are six data patterns that can be attached to and sent with a token, as follows. T oken and data No. 1 2 3 4 5 6 Item Details No data to attach Only sends the token To k e n Cyclic data only Only attaches cyclic data to the tok en To k en + Cyclic data Cyclic data sent in frames. Sends only cy[...]
-
Page 176
15-22 Chapter 15: Appendix 15 (4) Interval between frames (minimum allowable interval between frames) The time interval after a node receives a token until it sends a frame is referred to as the "frame interval." The minimum interval that each node must wait for , before sending a frame, is referred to as the "minimum allowable frame[...]
-
Page 177
15-23 Chapter 15: Appendix 15 [2] Joining and leaving an FL-net network (1) Participation in the FL-net Each node monitors the circuit while the FL-net starts up, to determine the interval of a participating token detection time. When that time has elapsed, if it does not receive a token, the node concludes that the network is just starting and tri[...]
-
Page 178
15-24 Chapter 15: Appendix 15 Participation in an existing network When the JW-50FL receives a token within the participating token detection time, it concludes that it is linked to a network that is already established, and waits for a participation request frame up to three token cycles. During this interval, it checks for duplicate use of its no[...]
-
Page 179
15-25 Chapter 15: Appendix 15 (2) Leaving an FL-net network Each node checks the node numbers each time it receives a token frame. If the JW-50FL does not receive a token frame from a certain node three times in a row , the node is regarded as having left the network. (This is also true when the node holding the token does not send the token after [...]
-
Page 180
15-26 Chapter 15: Appendix 15 [3] Node status control The status control of nodes consists of a local node management table, a participating nodes manage- ment table, and a network management table. An outline of each is shown below. Outline of each table used for node status control [4] FL-net Local node management table (1) Basic function Control[...]
-
Page 181
15-27 Chapter 15: Appendix 15 [5] FL-net Participating node management table (1) Basic functions The status of each node is monitored by the management table which each node keeps for itself. This table handles the data used to control each node participating in the network. The operation is outlined below . When starting, it receives a token frame[...]
-
Page 182
15-28 Chapter 15: Appendix 15 [6] Status management of the FL-net (1) Basic functions Control parameters related to the network. (2) Management data Network management table [7] Control message sequence number of the FL-net (1) Basic function The control sequence number and version of sequence number for a message transmission. (2) Sending control [...]
-
Page 183
15-29 Chapter 15: Appendix 15 15-5 Parts needed to build a network [1] Parts needed to configure an Ethernet The parts needed to configure an Ethernet are shown below. For details about these parts, see section [2] and [3]. Parts needed to construct an Ethernet Multi-port T ransceiver T ransceiver cable (AUI cable) Multi-port Coaxial cable Ground t[...]
-
Page 184
15-30 Chapter 15: Appendix 15 Secure using cable ties etc. (two positions) Tr ansceiver cab le (A UI cable) Leav e enough extr a length to be able to ensure the minimum bending radius (80 mm). Tr ansceiver (tap type) Coaxial cable Tr ansceiver cab le Tr ansceiver (tap type) Coaxial cable (y ellow cable) Label TR Retainer [2] Parts related to 10BASE[...]
-
Page 185
15-31 Chapter 15: Appendix 15 Installation of a tap in the main case of a transceiver T ransceiver (tap type) To connect a tap type transceiver to a coaxial cable, make a hole in the coaxial cable insulation and insert a probe that will make contact with center conductor in the coaxial cable. Remove the insula- tion around the coaxial cable using a[...]
-
Page 186
15-32 Chapter 15: Appendix 15 T ransceiver (connector type) Install the transceiver connector on a coaxial cable. Then, connect the transceiver to the connector . No special tools are needed for this connection, and it is easy to install and remove. The transceiver must be supplied with power from a node through a transceiver cable. T ransceiver (c[...]
-
Page 187
15-33 Chapter 15: Appendix 15 Multi-port transceiver The tap type transceiver and connector type transceiver can only be used to connect one terminal. A multi-port transceiver can connect a number of nodes. In practice, 4- and 8-port type transceivers are available. Note: Use a power supply cable to supply power to the transceiver . Multi-port tran[...]
-
Page 188
15-34 Chapter 15: Appendix 15 Repeater A repeater is used to relay or transfer signals. It is used for communication between segments using different media, to extend the length of a segment, to increase the number terminals that can be connected, or to convert from one cable type to another . A repeater reads the electronic signals from one segmen[...]
-
Page 189
15-35 Chapter 15: Appendix 15 (2) Coaxial cable Coaxial cable consists of a center conductor and an external conductive layer that functions as a shield. Coaxial cables used for Ethernet connections must have 50 ohms of impedance. An RG58A/ U cable can be used with 10BASE2 and a yellow cable can be used with 10BASE5. The maximum length of a single [...]
-
Page 190
15-36 Chapter 15: Appendix 15 (4) Relay connector This connector is used to make a connection between coaxial cables. Although the repeater is used to extend a segment, a relay connector is used to extend a cable in the same segment. Be careful because the use of multiple relay connectors on the same line may change the electrical resistance of the[...]
-
Page 191
15-37 Chapter 15: Appendix 15 (6) Ground terminal of a coaxial cable This device is used to prevent communication data errors that may be caused by electrical noise on a coaxial cable. There should only be one ground point on any single piece of coaxial cable. Provide class D grounding to connect this device. Coaxial cable ground terminal for Ether[...]
-
Page 192
15-38 Chapter 15: Appendix 15 10BASE5 connector (male) LED 10BASE-T connector (f emale) Coaxial cable 10BASE-T Tr ansceiver Tr ansceiver cab le (A UI cable) (8) 10BASE5/10BASE-T converter This converter is used to connect a 10BASE5 cable to a 10BASE-T cable. 10BASE5/10BASE-T converter for Ethernet use Installation of a 10BASE5/10BASE-T converter fo[...]
-
Page 193
15-39 Chapter 15: Appendix 15 (9) Coaxial/optical converter , repeater This device converts electrical signals on a coaxial cable (10BASE5/10BASE2) into optical signals, and from optical signals to electrical signals. A FOIRL (Fiber Optic Inter Repeater Link) is used to connect repeaters in a 10BASE-FL network. The device is used to prevent noise a[...]
-
Page 194
15-40 Chapter 15: Appendix 15 [3] 10BASE-T related items (1) Hub A hub connects a number of twisted pair cables in a10BASE-T installation and it has a repeater function. Some types of hubs have a 10BASE2 interface or a cascade interface. When you need to cascade hubs, you can use up to 4 layers. A star coupling hub allows the use of one hub with se[...]
-
Page 195
15-41 Chapter 15: Appendix 15 (2) 10BASE-T cable This cable is also called "twisted pair cable" or "twisted couple cable." T wo copper wires are twisted around each other as a pair . These pairs are bundled together in sets and covered with external insulating cover . The following types are available. STP cable with a shield, a[...]
-
Page 196
15-42 Chapter 15: Appendix 15 15-6 Installation of an FL-net network [1] Wiring 10BASE5 coaxial cable (1) Laying and connecting cables V arious installation methods can be used, depending on local conditions. The major wiring methods are shown below . Exposed wiring on a wall. Free access, wiring beneath the floor . Wring inside cable racks Laying [...]
-
Page 197
15-43 Chapter 15: Appendix 15 (3) Major coaxial cable installation specifications The primary coaxial cable installation requirements are as follows: Coaxial cable installation information (4) Installation of coaxial connectors Install coaxial connectors (N-PC) as follows. Strip the PVC sheath Stripping the sheath (PVC sheath) on a coaxial cable It[...]
-
Page 198
15-44 Chapter 15: Appendix 15 Remove the aluminum braided screen around the cable 1. Remove aluminum screen around the cable 2. Remove the aluminum tape on the cable Strip the insulation material around the conductor . Assemble the connector and shield parts Shielding coaxial cables and soldering the pin. * Remov e all the aluminum tape on this par[...]
-
Page 199
15-45 Chapter 15: Appendix 15 Assemble the coaxial cable connector Note: The gap between the center pin and the insulator should not be larger than 1 mm. The insula- tion material must be intact. (5) T ransceiver Installing and securing a tap type transceiver The method and location for installing a transceiver depends on the local conditions. Howe[...]
-
Page 200
15-46 Chapter 15: Appendix 15 Handling and installation procedures 1. Names of the parts in the transceiver Securing screw Markers every 2.5 m on the coaxial cable cover . Install a probe at this position. Coaxial cable Shield crimping pin T ap case Coaxial probe Frame T ap screw Main case of the HL T -200TC[...]
-
Page 201
15-47 Chapter 15: Appendix 15 2. Insert a shield crimping pin into the tap case. 3. T ighten the case screw so that it will not loosen. 4. Place the tap case at one of the markers located every 2.5 m on the coaxial cable. Insert a frame into the slide and secure the case using the screw . (T ighten the screw so that distance between top of the tap [...]
-
Page 202
15-48 Chapter 15: Appendix 15 Insert into the transceiver tap frame and coaxial cable Note: When inserting a frame, make sure that the cable is at the center of the crimping pin. T ighten the screw a little and see if the clamping part is tilted very much. If so, loosen the screw and reposition the cable so that frame is at the center of the tap. 5[...]
-
Page 203
15-49 Chapter 15: Appendix 15 6. T ighten the core probe using a special spanner . Note: That completes the installation of a tap connector . The test method for a proper installation is shown below . - The shield-crimping pin shall be shorted. - When a terminator is installed at both ends of a coaxial cable, the resistance between the core probe a[...]
-
Page 204
15-50 Chapter 15: Appendix 15 8. If you think the shield-crimping pin or the core probe may be bent, pull them out. If they are inserted improperly , you may be able to see that they are bent. In this case, realign them. Insert the tap screw in the hole in the top of the case, and tighten it. Securing the transceiver's main case and tap Settin[...]
-
Page 205
15-51 Chapter 15: Appendix 15 (6) Installation of terminators (terminating resistors) Insulation on connectors and terminators Shown below is a method for insulating a relay connector and an "L" type connector . Insulating a relay connector Insulating an L type connector The method for insulating a terminator (T -NP male and T -NJ female)[...]
-
Page 206
15-52 Chapter 15: Appendix 15 (7) Installation of a transceiver cable An example of how to install a transceiver and transceiver cable is shown below . An example of how to install parts on a wall An example of how to install parts in the ceiling and below the floor An example of how to install a transceiver and transceiver cable on a wall An examp[...]
-
Page 207
15-53 Chapter 15: Appendix 15 Installation example of a transceiver and transceiver cable: 1 An example of an installation on a wall (3) Wooden board Wooden board An example of an installation on a wall (4) An example of an installation on a wall (2) (1600 x 180 x 1.0) (180 x 180 x 1.0)[...]
-
Page 208
15-54 Chapter 15: Appendix 15 Installation example of a transceiver and transceiver cable: 2 An e xample of an installation in a ceiling An e xample of an installation below a floor[...]
-
Page 209
15-55 Chapter 15: Appendix 15 (8) Installation of a ground terminal for a coaxial cable A method for installing a grounding terminal for a coaxial cable is shown below . Set up a single ground point (class 3 or better grounding) using a ground terminal (G-TM). Ground a coaxial cable at any one point. Ground terminal (G-TM) Class D or better groundi[...]
-
Page 210
15-56 Chapter 15: Appendix 15 [2] 10BASE-T (UTP) (1) How to create a 10BASE-T (UTP) cable Strip the sheath on a 10BASE-T (UTP) cable Cut the sheath 40 mm away from the end and untwist the cables. Lay them out in the same order as the terminals. Normally , you use a straight cable. T erminal arrangement Cut the signal lines in a 10BASE-T (UTP) cable[...]
-
Page 211
15-57 Chapter 15: Appendix 15 Insert the UTP cable signal lines into the connector Install the signal lines in the correct order , and check to make sure the wires reach all the way into the connector . Look at the connector from the front, top and bottom. Assembling a UTP cable connector After making sure the signal lines are fully inserted, crimp[...]
-
Page 212
15-58 Chapter 15: Appendix 15 15-7 Grounding the FL-net system [1] Outline of the grounding procedures for the FL-net system This section uses an example of how to ground an FL-net controller control panel when attaching the control panel to the steel frame of a building. In order to ground the control panel to a building frame, the following condi[...]
-
Page 213
15-59 Chapter 15: Appendix 15 [2] Wiring power lines and grounding equipment This section describes how to wire power lines and ground lines in a distribution panel, or controller panel for the FL-net system. When wiring power lines and making grounds, observe the precautions below. 1. Isolate the control power circuit from the controller power cir[...]
-
Page 214
15-60 Chapter 15: Appendix 15 [3] Wiring the power lines and grounding the network equipment in an FL-net This section describes how to wire the power lines and ground lines for the network equipment in an FL- net system. When wiring power lines and making ground connections, observe the precautions below. 1. Connect the coaxial cable ground termin[...]
-
Page 215
15-61 Chapter 15: Appendix 15 [4] Installation of network equipment in an FL-net Shown below is an example installation of network equipment in an FL-net system. 1. Install a transceiver in a metal box using a wooden board for insulation. The box must have a class D ground. 2. Run the transceiver cable to the controller control panel through metal [...]
-
Page 216
15-62 Chapter 15: Appendix 15 [5] Wiring and grounding through wiring ducts and conduits Shown below are methods for wiring and grounding through wiring ducts and conduits used on an FL- net. Observe the precautions below when wiring 1. When wiring using wiring ducts, separate the power lines and signal lines using a physical separator. The wiring [...]
-
Page 217
15-63 Chapter 15: Appendix 15 Cable Module (device) Hub ect. FL-net installation check sheet Communication line name: Station number: Date checked: Item to check Checked by: Are all the connectors securely locked? Are the cable curve radiuses within the specified value? Are the connectors protected by jackets, etc.? Are the wiring DI numbers (l[...]
-
Page 218
I-1 I Alphabetical Index [A] Address allocation of I/O relay ....................................................................................................... 5-4 Allocation of available areas for the transmission buffer ................................................................ 9-5 Area 1 and area 2 ....................................[...]
-
Page 219
I-2 I Connection/Wiring .......................................................................................................................... 6-1 Control data ................................................................................................................... ............ 15-28 Control message sequence number of the FL-net .....[...]
-
Page 220
I-3 I [G] General network problems and countermeasures ....................................................................... 13-2 General precautions related to the FL-net ................................................................................... 13-5 General specifications ................................................................[...]
-
Page 221
I-4 I Memory address expression format ............................................................................................. 9- 20 Message other than transmission ................................................................................................ 12-2 Message sending procedures and data reception details .......................[...]
-
Page 222
I-5 I Precautions for laying and hooking up ....................................................................................... 15- 42 Principles of the FL-net system ................................................................................................ .. 15-11 Problems and countermeasures (when unable to communicate) ...............[...]
-
Page 223
I-6 I Specifications ................................................................................................................. .............. 14-1 - JW-20FL5/20FLT ............................................................................................................... ........ 14-1 Z-336J .............................................[...]
-
Page 224
I-7 I [U] Upper layer status ............................................................................................................. ........... 10-5 Use guide ...................................................................................................................... ................. 7-1 Use of virtual address space and PC memory [...]