Allen-Bradley 1779-KFM User manual

Type
User manual

This manual is also suitable for

User Manual
Data Highway II
Synchronous-
Device Interface
(Cat. No. 1779-KFM,
KFMR)
AllenBradley
Using This Manual 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manual's Purpose 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Audience 11
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Vocabulary 11
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manual Organization 12
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introducing the 1779KFM Interface 21. . . . . . . . . . . . . . . . . .
Chapter
Objectives
21. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What Is the 1779KFM Interface? 21
. . . . . . . . . . . . . . . . . . . . . . . .
What
Is Its Function?
23. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Compatible Host Devices 24
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Communication Connections 24
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Node Interfaces 26
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Highway II Network 26
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Media Access Method 210
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bridges to Other Data Highway II Links 210
. . . . . . . . . . . . . . . . . . . .
Command/Reply 211
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Message Priority 214
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Message Sets Available 215
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Redundant
Cabling
215. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 216
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing Cabling Hardware for the Data Highway II Link 31. .
Chapter
Objectives
31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Identifying the Hardware 31
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Coaxial Cable 32
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Crimping Tool 34
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terminator 34
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning Your Cabling Configuration 35
. . . . . . . . . . . . . . . . . . . . . .
Installing Taps 310
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing the Trunkline 311
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cutting the Cable 311
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Attaching the Plugs 312
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Plugging
into the T
ap 314. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing Droplines 315
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hardware Manufacturers' Addresses and Phone Numbers 316
. . . . . .
Chapter Summary 316
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents
Table of Contentsii
Installing the 1779KFM Interface 41. . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
41. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning the Layout 41
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mounting the 1779KFM Interface 43
. . . . . . . . . . . . . . . . . . . . . . . .
Setting Link Address 44
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting HostBoard Switches 44
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting MACBoard Switches 48
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Connecting
Communication Cables
410. . . . . . . . . . . . . . . . . . . . . . .
Connecting Power and Ground 414
. . . . . . . . . . . . . . . . . . . . . . . . . .
Power
Distribution
416. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 417
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operation and Troubleshooting 51. . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
51. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Indicators 51
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operation Switches 54
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operating the 1779KFM Interface 55
. . . . . . . . . . . . . . . . . . . . . . . .
Replacing Boards 56
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting the Interface 512
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter Summary 513
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
HDLC DataLink Layer 61. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
61. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What Is HDLC? 61
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Layered Approach to Software 61
. . . . . . . . . . . . . . . . . . . . . . . . . .
DataLink Control Method 62
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Frame Structure 64
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Control Field Formats 610
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
States and Modes 612
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Commands and Responses 615
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Exception Condition Reporting and Recovery 619
. . . . . . . . . . . . . . . .
Timeout Functions 622
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protocol
Environment Definition
622. . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring Transmissions 625
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 627
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introduction to Message Sets 71. . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Message Sets Available 71
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Network through Application Layer 74
. . . . . . . . . . . . . . . . . . . . . . .
Command Initiators/Executors 76
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 76
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents iii
Data Highway Message Set 81. . . . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
81. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting Data Highway Messages 81
. . . . . . . . . . . . . . . . . . . . . . .
Packet Format 81
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Diagnostic Message Formats 88
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Basic Message Formats 817
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC2 Message Formats 821
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC2 Upload/Download Procedures 825
. . . . . . . . . . . . . . . . . . . . .
PLC3 Message Packets 828
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC3 Upload/Download Procedures 836
. . . . . . . . . . . . . . . . . . . . . .
Chapter Summary 837
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TimeCritical Message Set 91. . . . . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
91. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting TimeCritical Message Sets 91
. . . . . . . . . . . . . . . . . . . . .
Packet Format 91
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application Message Formats 96
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 912
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Remote Command Control Message Set 101. . . . . . . . . . . . . .
Chapter
Objectives
101. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Controlling Remote Commands 101
. . . . . . . . . . . . . . . . . . . . . . . . . .
Packet Format 104
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specific Message Formats 1012
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 1016
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PAD Message Set 111. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
111. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting PAD 111
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Packet Format for Native Mode 111
. . . . . . . . . . . . . . . . . . . . . . . . . .
Using NativeMode PAD Messages 115
. . . . . . . . . . . . . . . . . . . . . . .
Packet Format for PAD Mode 116
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using PADMode PAD Messages 116
. . . . . . . . . . . . . . . . . . . . . . . .
Summary 117
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Station Management Message Set 121. . . . . . . . . . . . . . . . . . .
Chapter
Objectives
121. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting Station Management Messages 121
. . . . . . . . . . . . . . . . . .
Packet Format 121
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Application Message Formats 126
. . . . . . . . . . . . . . . . . . . . . . . . . . .
ErrorReply Messages 1215
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary 1217
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contentsiv
Status Codes A1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What This Appendix Contains A1. . . . . . . . . . . . . . . . . . . . . . . . . . .
Data
Manipulation
B1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What This Appendix Contains B1. . . . . . . . . . . . . . . . . . . . . . . . . . .
Addressing PLC2 and PLC3 Controllers B1
. . . . . . . . . . . . . . . . . .
Logical Addressing B1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC2 Logical Addressing B1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC3 Logical Addressing B3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Physical Addressing B6
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC2 Physical Addressing B6
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PLC3 Physical Addressing B7
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Order
of T
ransmission B7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifications C1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifications C1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Counters D1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter
Objectives
D1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Supervisory Message Format D4
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter
1
11
Using This Manual
This manual tells you about the Synchronous-Device/DHII Interface
(Cat. No. 1779-KFM) and the Redundant Synchronous-Device/DHII
Interface (Cat. No. 1779-KFMR). This manual tells you how to install
and use a 1779-KFM interface in a Data Highway II communication
network.
Plant electricians who install Data Highway II hardware need to read
Chapters 1 through 4 of this manual.
The people who program the synchronous RS-422/499 compatible device
need to read all but Chapter 3. To use the 1779-KFM interface, you must
know how to address the memory of Allen-Bradley programmable
controllers. In this manual, we assume that you know how to do this. If
you don’t, refer to the appropriate manual for the controller you will be
using. Consult our Publication Index (Publication SD499) for a list of our
publications.
The redundant 1779-KFMR interface has all of the functions of the
1779-KFM interface. Therefore, when we refer to the 1779-KFM
interface in this manual it applies to both. We will only mention the
redundant 1779-KFMR interface in describing a difference.
When referring to an Allen-Bradley programmable controller in this
manual, we use the Allen-Bradley registered trademark PLC.
Some node interfaces have the function of interfacing with an intelligent
device, such as a computer. These devices must have the computer-like
intelligence to communicate in the prescribed protocol. Although some of
these devices may not be thought of as computers, for simplicity we refer
to them all in this manual as computers.
Manual's Purpose
Audience
Vocabulary
Using This Manual
Chapter 1
12
This manual is organized into the following chapters:
Chapter Title What's
Covered
1
Using This Manual The manual's purpose, its audience, its vocabulary
, and its organization.
2
Introducing the 1779KFM Interface
An overview of the 1779KFM interface, its function, its application, and
the messages that it is capable of sending and receiving.
3
Installing Data Highway II Link Cabling
Hardware
Installing the taps, droplines, and trunkline for the Data Highway II link.
4
Installing the 1779KFM Interface
Installing the 1779KFM interface and connecting it to the synchronous
RS422/449 compatible device.
5
Operation and T
roubleshooting
Operating the 1779KFM interface, troubleshooting problems within the
local station, and replacing faulty boards.
6
HDLC DataLink Layer
The HDLC frames, the fields within the frames, and the sequence of
transmitting and receiving frames at the datalink layer
.
7
Introduction to Message Sets
The dif
ferent message sets from which you can choose for sending and
receiving messages between your host device and the 1779KFM
interface.
8
Data Highway Message Set
The fields in each protocol layer above the datalink layer and the
specific fields required with each specific Data Highway message.
9 T
imeCritical Message Set
The fields in each protocol layer above the datalink layer and the
specific fields required with each specific timecritical message.
10
Remote Command Control Message Set
The fields in each protocol layer above the datalink layer and the
specific fields required with each specific remote command control
message.
11 P
AD Message Set
The fields in each protocol layer above the datalink layer for P
AD
messages in both the PAD mode and the Native mode.
12
Station Management Message Set The fields in each protocol layer above the datalink layer and the
specific fields required with each specific station management message.
Manual Organization
Chapter
2
21
Introducing the 1779KFM Interface
This chapter gives you an overview of the 1779-KFM interface, its
function, its application in a communication network, and the type of
messages it can send and receive.
A 1779-KFM interface is a stand-alone unit which consists of:
One Stationary Frame
One Removable Frame
One Power-Supply Board (Cat. No. 1779-PH2)
One Host Board (Cat. No. 1779-JFM)
One Media Access Control Board (Cat. No. 1779-JMA)
A redundant 1779-KFMR interface has a Redundant Media Access
Control Board (Cat. No. 1779-JMAR) instead of a Media Access Control
board.
The stationary frame mounts on a back panel (Figure 2.1). The removable
frame fastens to the stationary frame.
The removable frame assembly contains the power-supply board, the host
board, and the Media Access Control (MAC) board. A shield separates
the power-supply board from the host board and the MAC board
(Figure 2.2).
Chapter Objectives
What Is the 1779KFM Interface?
Introducing the 1779KFM Interface
Chapter 2
22
Figure 2.1
1779KFM
Interface with Removable Frame Separated from Stationary Frame
Stationary Frame
Removable Frame
Introducing the 1779KFM Interface
Chapter 2
23
Figure 2.2
Rear
V
iew of the Removable Frame Assembly
Shield
Power
Supply
Board
MAC
Board
Host
Board
12617
3M NO. 3394
3M NO. 3394
The 1779-KFM interface functions as a communication interface between
a synchronous RS-422/449 compatible intelligent device (host device) and
other nodes of a Data Highway II link (Figure 2.3).
The power-supply board converts AC power to DC power which the host
board and the MAC board use. The power-supply board accepts either
115V AC or 230V AC. The host board communicates with the host
device. The MAC board communicates with the other nodes of the Data
Highway II link through the coaxial cable medium.
What Is Its Function?
Introducing the 1779KFM Interface
Chapter 2
24
Figure 2.3
A
Computer Communicating with Other Nodes through a 1779KFM Interface
Synchronous
RS422/449
Compatible
Computer
Other Nodes
of the
Data Highway II
Communication
Link
PowerSupply
Board
Media
Access
Board
Host
Board
Host Device
1779KFM Interface
The 1779-KFM interface is compatible only with host devices that have
the following attributes:
The host device must provide HDLC link-layer protocol.
The host device must communicate through a port compatible with both
the RS-422 and RS-449 standards.
The host device must provide synchronization signals as the data
terminal equipment (DTE) device on the link. The 1779-KFM is the
data circuit-terminating equipment (DCE) device.
To communicate with the 1779-KFM interface in a Native-mode
message set, the host device must be a programmable device, such as a
computer.
The 1779-KFM interface communicates through connectors on its front
surface (Figure 2.4).
The RS-449 CHANNEL connector provides cable connection to the host
computer.
The DATA HWY II jack provides dropline cable connection to a tap on a
Data Highway II link. A redundant 1779-KFMR interface has a second
DATA HWY II jack for a redundant set of cabling for the link.
Your Data Highway II cable redundant interface module
(Cat. Nos. 1779-KFLR, -KFMR, -KP2R, -KP3R) has a connector on the
front panel labeled DHII AUX ACCESS. This connector is for future use.
Do not connect any cable to this connector.
Compatible Host Devices
Communication Connections
Introducing the 1779KFM Interface
Chapter 2
25
CAUTION: Your redundant module is shipped with a
conductive cap to help protect the DHII AUX ACCESS
connector from electrostatic discharge. This cap must remain
on the connector at all times to help prevent electrostatic
discharge damage to your redundant module.
Figure 2.4
Communication
Connections
MSD
LINK
ADDRESS
EXIT
COMPLETE
EXIT
REQUEST
G IN RING
Y SEEKING MEM
DUP
ADDR
REDUN WARN
PORT READY
SIG QUAL
TAP FAIL
DC POWER ON
AC POWER ON
DATA
HWY
II
PORT
2
ON
AC POWER
OFF
FUSE
SLOW BLOW
2A, 250V
DH II
EXTENDED
TAP
CONFIG
DATA
HWY
II
PORT
DATA
HWY
II
PORT
2
RS-449
CAT. NO. 1779-KFMR DHII MEDIUM-SPEED COMPUTER INTERFACE
115V AC/230V AC
INTERNALLY
SWITCH
SELECTABLE
L1
L2/N
GND
MAC FAULT
MAC TEST
NODE PASS
HOST FAULT
NODE TEST
TEST
RUN
RESET
ACTIVITY
SAT
NORM
TRANSMIT
RECEIVE
1
READY
CHANNEL
AUX
ACCESS
PORT READY
SIG QUAL
TAP FAIL
DATA
HWY
II
PORT
1
Host
Computer
Tap
User-Supplied
Cable
Introducing the 1779KFM Interface
Chapter 2
26
The following node interfaces can be used in a Data Highway II link:
Asynchronous-Device/DHII Interface (Cat. No. 1779-KFL)
Redundant Asynchronous-Device/DHII Interface
(Cat. No. 1779-KFLR)
Synchronous-Device/DHII Interface (Cat. No. 1779-KFM)
Redundant Synchronous-Device/DHII Interface
(Cat. No. 1779-KFMR)
PLC-2/DHII Interface (Cat. No. 1779-KP2)
Redundant PLC-2/DHII Interface (Cat. No. 1779-KP2R)
PLC-3/DHII Interface (Cat. No. 1779-KP3)
Redundant PLC-3/DHII Interface (Cat. No. 1779-KP3R)
The Data Highway II network is an industrial area network which
provides peer-to-peer communication between nodes. A Data
Highway II network is illustrated in Figure 2.5.
Stations/Nodes
At each node interface, you must assign a unique link address to each
node of the link. A host (computer or PLC processor) and its interface to
the Data Highway II link make up a station. A station is an input/output
point in the communication system. A node is the point at which each
station accesses the medium. Because each station communicates through
a node on the Data Highway II link, it may appear that we use the terms
node and station interchangeably at times. However, we will show later
that there is not always a one-to-one relationship between stations and
nodes.
Within a station that contains a synchronous-device or
asynchronous-device interface, a local host/interface link is required for
access to the Data Highway II link. Two such stations are shown in
Figure 2.5.
One node is comprised of a 1779-KFM interface to a computer through
an RS-422/449 link limited to 4,000 cable-feet.
Another node is comprised of a 1779-KFL interface to two host
devices. Each 1779-KFL interface has two channels for connection to
two standard-link devices at the same time. Through either channel it
can interface either an RS-232-C compatible device or an RS-422
compatible device to the Data Highway II link.
Although the host/interface links are not Data Highway II links, they are a
part of the Data Highway II network.
Node Interfaces
Data Highway II Network
Introducing the 1779KFM Interface
Chapter 2
27
In each case, the device is the host for the interface. A host device is a
node on one end of its host/interface link, and its interface to the Data
Highway II link is a node on the other end of the host/interface link.
However, to the other nodes of the Data Highway II link, the host device
and its interface, combined, are accessed as a single node of the Data
Highway II link.
Figure 2.5
A
Data Highway II Network with T
wo Data Highway II Links
PLC3
Processor
PLC2/15
Processor
PLC2/30
Processor
1779KP3
Interface
1779KP2
Interface
1779KP2
Interface
Bridge
1779KFM
Interface
1779KFL
Interface
Computer
8200KDHW
Interface
Dumb
Terminal
8200
CNC
Data Highway II Link Data Highway II Link
RS422/449 Link
4,000 CableFeet Max.
RS232C Link
50 CableFeet Max.
RS422 Link
4,000 CableFeet Max.
13291
Introducing the 1779KFM Interface
Chapter 2
28
Programming
The program in a host device at one node can initiate a transfer of a
message to or from any other node in the network. Programming a host
computer for communication through a 1779-KFM interface is described
in later chapters.
Host/Interface Links
In many applications, it is essential for nodes in a Data Highway II link to
communicate with devices such as:
Computers
Color-Graphic Terminals
Dumb Terminals
Robots
Computerized Numerical Controls (CNC)
For this type of device to communicate with nodes in a Data Highway II
link, it must communicate through a local host/interface link and a node
interface to the Data Highway II link (Figure 2.5).
Figure 2.5 shows three such devices, each communicating through a local
host/interface link and a node interface to a Data Highway II link.
A computer is shown communicating with other nodes of the Data
Highway II link through an RS-422/449 link and a 1779-KFM
interface. A 1779-KFM interface has a single RS-422/449 channel
through which it can interface an RS-422/449 compatible device to the
Data Highway II link.
An 8200 CNC is shown communicating with other nodes of the Data
Highway II link through its Factory Communication Module
(Cat. No. 8200-KDHW), an RS-422 link, and a 1779-KFL interface.
A dumb terminal is shown communicating through an RS-232-C link
and a 1779-KFL interface with other nodes of the Data Highway II
link. Each 1779-KFL interface has two channels for connection to two
host devices at the same time. Through either channel it can interface
either an RS-232-C compatible device or an RS-422 compatible device
to the Data Highway II link.
You can use a host device to communicate through either an RS-422/449
link to a 1779-KFM interface or an RS-232-C or RS-422 link to a
1779-KFL interface in a packet assembler/disassembler (PAD) protocol.
The PAD protocol is useful for communicating with robots and dumb
terminals.
Introducing the 1779KFM Interface
Chapter 2
29
A dumb terminal can only communicate across a Data Highway II
network through the PAD protocol because the terminal does not have the
intelligence to assemble or disassemble message packets. When a
computer sends a message across the network to a terminal node, at the
receiving node, the interface disassembles the packet and sends only the
data field to the terminal. Furthermore, by issuing a station-management
command from another station, you can establish a logical connection
from the terminal to the computer so that if the operator at the terminal
enters a data field, the interface assembles the data field into the proper
packet for the network to deliver the message to the computer.
The PAD protocol is also useful for devices, such as robots, which have a
fixed protocol. In sending a message to a robot, a computer could encode
the message data field with the protocol that the robot expects. At the
receiving node, the interface disassembles the packet and sends only the
data field to the robot. Since the computer encodes the data field, the
robot sees the protocol that it expects.
Data Highway II Link
In a Data Highway II link, nodes communicate with one another through
coaxial cable which provides a physical bus medium. The coaxial cable
forms the bus connection between the nodes in a trunkline/dropline
configuration.
The maximum length permissible for the trunkline depends on the number
of nodes, the type of cable, and the type of tap (local tap or extended tap).
For example, with RG-11-type coaxial cable approved by Allen-Bradley,
local taps, and 52 nodes in a link, the trunkline length can be up to
4,100 cable-feet. Refer to Chapter 3 for a list of approved cables and
other detailed information on planning cable lengths.
The Data Highway II link provides carrier-band signaling through
frequency shift keying. The carrier frequency is 5 MHz. The carrier is
modulated to 6.25 MHz for a data-high signal and 3.75 MHz for a
data-low signal. Because it has a carrier-band medium, the Data
Highway II link provides high noise immunity at its high data
transmission rate (1 Mbit/s) over its long permissible cable lengths.
Introducing the 1779KFM Interface
Chapter 2
210
Because the Data Highway II link has a carrier-band bus medium, only
one node can transmit at a time. However, each node in a Data
Highway II link has a regularly scheduled opportunity to access the
medium to transmit messages to other nodes.
This peer-to-peer communication between nodes is provided by the Data
Highway II link through token passing. The token passing is
self-initiating. The nodes form a logical ring. The token is passed around
the ring to each node on a regular schedule, thereby making throughput
and response time predictable. While a node possesses the token, it is the
master. Only the master can initiate communication. After a node has
had the opportunity to transmit messages for the prescribed period of
time, it passes the token on to the next node.
At this time, the Data Highway II network does not have bridges to join
Data Highway II links. However, the Data Highway II network was
designed with the flexibility to accommodate bridges at a later data. Any
discussion of bridges in this manual is only in regard to future product
development.
You could join two Data Highway II links with a bridge. The bridge
becomes a node on each of the two links. The two Data Highway II links
and their host/interface links combine to form a single Data Highway II
network (Figure 2.5).
Actually, you could configure a Data Highway II network of many Data
Highway II links joined together with bridges. A node can address up to
254 links.
The advantage of configuring a network of several small links instead of
one large link is that separate message transmissions can take place within
each of the links all at the same time. Each link has its own token which
it passes around to its nodes. For example, in Figure 2.5, the computer
could send a message to the PLC-3 processor at the same time that the
PLC-2/30 processor is sending a message to the PLC-2/15 processor.
However, a message from a node on one link to a node on another link
would use up message transmission time in both links. By configuring
links within a network so that most messages do not cross from one link
to another, you can improve the performance of the network.
Media Access Method
Bridges to Other Data Highway II
Links
Introducing the 1779KFM Interface
Chapter 2
211
Communication is always initiated by a node transmitting a command
message. Only the node holding the token can initiate communication by
transmitting a command message. When a node transmits a command to
read an immediate-access block, the node receiving the command
immediately transmits a reply message while the initiating node still holds
the token. For any other command requiring a reply, the node receiving
the command must wait until it holds the token before it can transmit the
reply message.
Some commands call for the node receiving the command message to
transmit no reply message.
Reading a Block of Data
You can generate two types of commands to read a block of data:
Read Block
Read Immediate-Access Block
When a node interface receives a read block command from another node,
it reads the specified area of the host’s memory; then, when it receives the
token, it transmits the reply message containing the block of data
specified in the command.
For a node to reply to a command to read an immediate-access block, the
host must periodically write a specified block of data from the host’s
memory into a buffer in the node interface. When the node interface
receives a command from another node to read an immediate-access
block, it reads the specified block of data from its buffer and immediately
transmits the reply message without waiting to receive the token.
Writing a Block of Data
For write block commands, you specify a block of data from the local
host’s memory that you want to write into a specified block of memory in
the host at a remote node.
For a write block command, you can specify either:
Write with No Reply
Write with Reply
Write Verified
Command/Reply
Introducing the 1779KFM Interface
Chapter 2
212
If the local node transmits a command to write with no reply, the remote
node never transmits a reply (Figure 2.6). If the local node transmits a
command to write with reply, when the remote node interface receives
the token, it transmits a reply message to indicate whether it was able to
successfully write into the host’s memory (Figure 2.7).
Figure 2.6
Write
with No Reply Message T
ransfer
Node
1
Node
2
Command Message - Block of
data
to write into host at Node 2
Figure 2.7
Write
with Reply Message T
ransfer
Node
1
Node
2
Command Message - Block of data
to write into host at Node 2
Reply Message - Status of whether
the write was successful
If the local node host transmits a command to write verified, the local
node interface first transmits a command to write with reply. When the
remote node interface receives the token, it transmits a reply message to
indicate whether it was able to successfully write into the host’s memory.
When the local node interface receives the token again, it then
automatically transmits a command to read that same block of data. After
the remote node interface writes the data into its host’s memory, it reads
that data from the host’s memory. When the remote node receives the
token, the remote node interface then transmits this data back to the local
Introducing the 1779KFM Interface
Chapter 2
213
node. The local node interface then verifies that the data it received is
identical to what it had transmitted (Figure 2.8).
Figure 2.8
Write
V
erified Message T
ransfer
Node
1
Node
2
Command Message - Block of data
to write into host at Node 2
Reply Message - Status of whether
the write was successful
Command Message - Read
from host at Node 2
Reply Message - Block of data read
from host at Node 2
A write with no reply takes the least amount of time. A write verified
takes the most time.
All messages are transmitted across the Data Highway II link with
Manchester encoding and CRC-16 error checking to help ensure data
integrity before the interface writes data into its host’s memory. A write
verified command may provide added security in applications where the
level of electrical noise is very high. However, you should be aware that
the interface can report a false error in reply to a write verified command.
For example, after the data is written into the remote host’s memory, it
could be overwritten by the program in the host or by another Data
Highway II node before it could be sent back for verification. If you use a
write verified command, you must ensure that the data is not overwritten
before it can be sent back for verification.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211

Allen-Bradley 1779-KFM User manual

Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI