菜单
  

    In a PLC/computer network, as shown in Fig. 4C, all communications are initiated by the host computer, which is connected to all the PLCs in a daisy-chain fashion. This computer inpidually addresses each of its networked PLCs and asks for specific information. The addressed PLC then sends this information to the computer for storage and further analysis. This cycle occurs hundreds of times per second.
    Host computers also can aid in programming PLCs; powerful programming and documentation software is available for program development. Programs then can be written on the computer in relay ladder logic and downloaded into the PLC. In this way, you can create, modify, debug, and monitor PLC programs via a computer terminal.
    In addition to host computers, PLCs often must interface with other devices, such as operator interface terminals for large security and building management systems. Although many intelligent devices can communicate directly with PLCs via conventional RS232C ports and serial ASCII code, some don't have the software ability to interface with inpidual PLC models. Instead, they typically send and receive data in fixed formats. It's the PLC programmer's responsibility to provide the necessary software interface.
    The easiest way to provide such an interface to fixed-format intelligent devices is to use an ASCII/BASIC module on the PLC. This module is essentially a small computer that plugs into the bus of the PLC. Equipped with RS232 ports and programmed in BASIC, the module easily can handle ASCII communications with peripheral devices, data acquisition functions, programming sequences, "number crunching," report and display generation, and other requirements.
    Access, protocol, and modulation functions of LANs
    By using standard interfaces and protocols, LANs allow a mix of devices (PLCs, PCs, mainframe computers, operator interface terminals, etc.) from many different vendors to communicate with others on the network.
    Access: A LAN's access method prevents the occurrence of more than one message on the network at a time. There are two common access methods.
    Collision detection is where the nodes "listen" to the network and transmit only if there are no other messages on the network. If two nodes transmit simultaneously, the collision is detected and both nodes retransmit until their messages get through properly.
    Token passing allows each node to transmit only if it's in possession of a special electronic message called a token. The token is passed from node to node, allowing each an opportunity to transmit without interference. Tokens usually have a time limit to prevent a single node from tying up the token for a long period of time.
    Protocol: Network protocols define the way messages are arranged and coded for transmission on the LAN. The following are two common types.
    Proprietary protocols are unique message arrangements and coding developed by a specific vendor for use with that vendor's product only.
    Open protocols are based on industry standards such as TCP/IP or ISO/OSI models and are openly published.
    Modulation: Network modulation refers to the way messages are encoded for transmission over a cable. The two most common types are broadband and baseband.
    Network transmission interfaces
    The vast majority of PLC communications is done via RS232C and twisted pair cables. Most PLCs have an RS232 port and are capable of handling communications with host computers, printers, terminals, and other devices. Maximum transmission speed is 19.2 Kbps.
    The distance and data transmission rates are standards for the various interfaces. Their actual performance is a function of the driving devices and varies significantly between manufacturers. As such, you should consult the manufacturer's specifications for actual distance and data transmission rate capabilities.
    The only real limitation on RS232C is the 50-ft recommended distance between devices. While RS232C installations often can achieve cabling distances greater than this, the "unbalanced" design of the interface results in a greater susceptibility to surrounding electrical noise and reduced data integrity. This is particularly true where electromagnetic interference (EMI) and radio-frequency interference (RFI) are known to exist.
  1. 上一篇:建筑抗震评价方法英文文献和中文翻译
  2. 下一篇:开槽板翅式换热器英文文献和中文翻译
  1. PLC仿真的虚拟工厂英文文献和中文翻译

  2. PLC可编程控制器的介绍英文文献和中文翻译

  3. 模糊PLC系统的伺服机构英文文献和中文翻译

  4. PLC自动化制造系统英文文献和中文翻译

  5. 动力分析和控制器设计英文文献和中文翻译

  6. PLC工业机器人英文文献和中文翻译

  7. PLC相关问题英文文献和中文翻译

  8. 现代简约美式风格在室内家装中的运用

  9. C++最短路径算法研究和程序设计

  10. 浅析中国古代宗法制度

  11. 中国传统元素在游戏角色...

  12. 高警觉工作人群的元情绪...

  13. 上市公司股权结构对经营绩效的影响研究

  14. NFC协议物理层的软件实现+文献综述

  15. 巴金《激流三部曲》高觉新的悲剧命运

  16. 江苏省某高中学生体质现状的调查研究

  17. g-C3N4光催化剂的制备和光催化性能研究

  

About

优尔论文网手机版...

主页:http://www.youerw.com

关闭返回