Data Highway or Data Highway PlusAsynchronous (RS-232-C or RS-422-A)Interface ModuleCat. No. 1770-KF2)User Manual
IntroductionChapter 11-6In a multi-drop configuration, one intelligent asynchronous deviceconnects to several Data Highways through sets of modems and
Message Packet FormatsChapter 55-21Note that the interface module at the receiving PC station executes thiscommand by first making a copy of the addre
Message Packet FormatsChapter 55-22Unprotected WriteThis command writes words of data into ay area of PC data table memory.Use the SIZE field to speci
Message Packet FormatsChapter 55-23Disable OutputsThis command turns off all outputs of the PLC controller. Use thiscommand to disable the PLC’s outp
Message Packet FormatsChapter 55-24Enable ScanThis command restarts the PLC processor’s program scanner after aphysical write operation has been perfo
Message Packet FormatsChapter 55-25Physical WriteThis command writes bytes of data into the PC data table or programmemory. Use this command to downl
Message Packet FormatsChapter 55-26Enter Download ModeThis command puts the PLC-2 processor into the Download mode. Usethis command on a PLC-2 statio
Message Packet FormatsChapter 55-27Enter Upload ModeThis command puts the PLC-2 processor into the Upload mode. Use thiscommand on a PLC-2 station be
Message Packet FormatsChapter 55-28Physical ReadThis command reads bytes of data from the PC data table or programmemory. Use this command to upload
Message Packet FormatsChapter 55-29Set Data Table SizeThis command sets the data table size for the PLC-2 processor. Use thiscommand immediately befo
Message Packet FormatsChapter 55-30Only a computer can initiate privileged commands. Their primary use isfor uploading and downloading PLC-3 memory.O
IntroductionChapter 11-7In either type of configuration, there are three possible ways you canconnect a KF2 module: Direct connection to an intellige
Message Packet FormatsChapter 55-317. WORD OFFSET — Contains the word offset between the desiredword and the beginning of the addressed file. The o
Message Packet FormatsChapter 55-32Download RequestA computer can use this command to inform the 1775-KA module that itwants to do a download. If the
Message Packet FormatsChapter 55-33File WriteThis is a write command, starting address of which is either a file symbolor a block address. This start
Message Packet FormatsChapter 55-34Physical WriteThis is a write command where the starting address is a PLC-3 physicaladdress. It is used to downloa
Message Packet FormatsChapter 55-35Shutdown RequestThis command is used by the computer to ask the 1775-KA module toinitiate either a PLC-3 shutdown (
Message Packet FormatsChapter 55-36Word Range ReadThis is a read command whose starting address is either a word symbol, afile symbol plus a word offs
Message Packet FormatsChapter 55-37Word Range WriteThis is a write command whose starting address is either a word symbol, afile symbol plus a word of
Message Packet FormatsChapter 55-38The above are privileged commands. This means that only a computercan execute them. Their primary purpose is for
Message Packet FormatsChapter 55-39DeallocateThis command deallocates access privileges to the selected PLC-4controller.Reply Format:(EXT STS Byte Opt
Message Packet FormatsChapter 55-40Physical ReadThis command reads the specified number of bytes from the memory ofthe selected PLC-4 controller. Use
IntroductionChapter 11-8Figure 1.4A PCL Network Connected to a Data HighwayPLC-5 PLC-5 1770-KF2Computer1785-KAPCLData HighwayAdvisor 2+1770-KF2PLC-317
Message Packet FormatsChapter 55-41Physical Write with MaskThis command sets or resets bits in a memory word of the selectedcontroller. The ADDRESS f
Message Packet FormatsChapter 55-42Set to Program Load ModeThis command sets the selected controller to the Program Load mode.Reply Format:(EXT STS By
Message Packet FormatsChapter 55-43Set to Single-Scan Test ModeThis command sets the selected controller to the Single-Scan Test mode.Reply Format:(EX
Message Packet FormatsChapter 55-44PLC-5 CommandsPLC-5 stations can execute the basic command set with the followingexceptions: Set ENQs Set NAKs Set
Message Packet FormatsChapter 55-452. PLC-5 LOGICAL BINARY ADDRESS — Contains the logicaladdress of a PLC-5 file, element, and subelement. Chapter
Message Packet FormatsChapter 55-46The STS and EXT STS bytes contain status and error code information.For more information on these bytes, see the “E
Message Packet FormatsChapter 55-47The link ID (presently not used, set it to zero) and the station address areone byte while the file number is two b
Message Packet FormatsChapter 55-48The STS and EXT STS bytes contain status and error code information.For more information on these bytes, see the “E
Message Packet FormatsChapter 55-49have the privilege of placing the host in a Download mode. This erroroccurs when: the processor is in Program or
Message Packet FormatsChapter 55-50For example, if you wanted to set the processor to Run mode, your flagbyte would look like this:Bit 765432100000001
Chapter 22-1Communication ConceptsThis chapter presents some of the concepts of communication with theKF2 module. It describes the physical communica
Message Packet FormatsChapter 55-51The format for the Typed Write message is as follows:TNSSTSCMD0FSRCDST FNC67PACKETOFFSETTOTALTRANSPLC-5 SYSTEMADDRE
Message Packet FormatsChapter 55-52Table 5.FData Types/ID ValuesValue Mnemonic Name01234567891516ENDBBSCSITCRFAADRDLast Element Indicator/No Type Spe
Message Packet FormatsChapter 55-53Data Type SizeIf Bit 3 is a zero (0), the data type defined in the ID Value Field uses 7 orless bytes for each piec
Message Packet FormatsChapter 55-54The following example shows a type “A” (array) type/data parameter.The array data type includes one descriptor as p
Message Packet FormatsChapter 55-55The message format is as follows:Command Format:Reply Format:TNSSTSCMD0FSRCDSTTNSSTSCMD4FSRCDSTFNC53EXTSTSThe STS a
Message Packet FormatsChapter 55-56Write Bytes PhysicalUse this command to perform a Download Only after a Download (orUpload) All Request has been su
Message Packet FormatsChapter 55-57The packet offset and total transaction are two bytes each, while the sizeis only one byte. The format is as follo
Message Packet FormatsChapter 55-58Error CodesEach command has a status (STS) byte in its reply format to indicate: if the command was successfully c
Chapter 66-1Data Encoding and AddressingThis chapter explains two areas of special concern when you aretransmitting messages between computers and PCs
Data Encoding and AddressingChapter 66-2BinaryThe binary number system is probably the simplest to use for computerand PC applications because it is t
Communication ConceptsChapter 22-2the application and network layers, refer to Chapters 5 and 6. For moreon the data link layer of the asynchronous l
Data Encoding and AddressingChapter 66-3Binary Coded DecimalPC data is often represented in binary coded decimal (BCD) form. In thissystem, each grou
Data Encoding and AddressingChapter 66-4DecimalThe decimal number system is probably the easiest for us to use because itis the most familiar to us.
Data Encoding and AddressingChapter 66-5Figure 6.4Hexadecimal Numbers00 0000 0110100111113350 x 23 = 00 x 22 = 00 x 21 = 00 x 20 = 00 x 23 = 00 x 22 =
Data Encoding and AddressingChapter 66-6corresponding place value and add the results of the multiplications.Figure 6.5 shows the octal representation
Data Encoding and AddressingChapter 66-7This does not present a problem at PC stations on the link because PCsstore and retrieve their data in this sa
Data Encoding and AddressingChapter 66-8Figure 6.6Results of Transmitting Low Byte First17 16 15 14 13 12 11 10 07 06 05 04 03 02 01 0010 0110 0101110
Data Encoding and AddressingChapter 66-9addressing in a PLC’s ladder diagram program to allow it to access itsown data table memory.Due to the differe
Data Encoding and AddressingChapter 66-10PLC-3 and PLC-5PLC-3 and PLC-5 controllers use a form of logical addressing known as“extended addressing.” W
Data Encoding and AddressingChapter 66-11In Figure 6.7, the Level 5 address is 260 (decimal), which is too large tofit in one byte. Therefore, a byte
Data Encoding and AddressingChapter 66-12To send a command message to a PLC-5 station, you put the extendedaddress of the station in the field labeled
Communication ConceptsChapter 22-3Figure 2.1Data Highway NetworkPLC-3Processor1775-KAModuleComputerMODEMAdvisor 2+MODEM1770-KF2Module1770-KF2Module177
Data Encoding and AddressingChapter 66-13Figure 6.9PLC-5 Logical ASCII AddressingDisplayed Logical Address SymbolFile-Type IdentifierFile NumberDelimi
Data Encoding and AddressingChapter 66-14PLC-4 MicrotrolPLC-4 Microtrol controllers use a form of logical addressing that specifiesthe identification
Data Encoding and AddressingChapter 66-15PLCPLC controllers use physical addresses that are exactly the same values asthe corresponding logical addres
Data Encoding and AddressingChapter 66-16PLC-3 and PLC-5PLC-3 and PLC-5 controllers use physical addresses that are related tological addresses by mea
Data Encoding and AddressingChapter 66-17PLC-4 MicrotrolPLC-4 Microtrol controllers use physical addresses that begin at 00 forthe first word of memor
Data Encoding and AddressingChapter 66-18The symbolic address field can be from 1 to 8 bytes long. The first bytecontains the ASCII code for the firs
Chapter 771Error ReportingThis chapter contains a list of error codes associated with network start-upand run-time situations. The error information
Error ReportingChapter 772An error code word specified in the header rung is the primary source ofexplanation for programming problems and run-time p
Error ReportingChapter 773Prescan errors always cause the module to turn on the PROG light andenter an error state. When the keylock is turned to PR
Error ReportingChapter 77403The KA or KG does not have enough internal memory to store the start bit index. Thisshould only occur if the communicati
Communication ConceptsChapter 22-4One station consists of an Advisor 2+TM Color Graphic System connectedto a KF2 module through an RS-232-C link limit
Error ReportingChapter 77530A command rung syntax error has been detected in RUN mode after the prescan. Thismeans that either the communication zon
Error ReportingChapter 77653A reply message has been received for which the start bit is off. This could mean thatthe user program turned off the st
Error ReportingChapter 77788Execution of protected commands at the remote station is inhibited because its PROGlight is on. This error results in se
Error ReportingChapter 778Local and Remote Error BitsAs a diagnostic tool, these bits are useful to identify the rung that causedan 80- or 90-series
Error ReportingChapter 779Local Error CodesThe 1775-KA module stores local error codes under the user symbolERROR. Possible local errors are listed
Error ReportingChapter 7710Code (If Applies)EXT STS STSMeaningErrorCode124Illegal destination in an assignment command. This does notnecessaril
Error ReportingChapter 7711Code (If Applies)EXT STS STSMeaningErrorCode159Bad level specified in extended address.1.More than 9 levels were spec
Error ReportingChapter 7712Code (If Applies)EXT STS STSMeaningErrorCode194Expression is too complex.199Attempt to divide by zero.200Bad port spe
Error ReportingChapter 7713Code (If Applies)EXT STS STSMeaningErrorCode215The value resulting from operations specified on the left side ofan as
Error ReportingChapter 7714Code (If Applies)EXT STS STSErrorCodeMeaningDIAGNOSTIC READ COMMAND10 81 1.A 2byte ADDR field and a 1byte SIZE fiel
Communication ConceptsChapter 22-5StationsA station consists of a computer, or PC processor, and the module ormodules that interface it with the PCL.
Error ReportingChapter 7715Code (If Applies)EXT STS STSMeaningErrorCodePLC/PLC2 READ COMMANDS10 81 1.The required 2byte ADDR field and 1byte
Error ReportingChapter 7716Code (If Applies)EXT STS STSMeaningErrorCodePLC3 WRITE COMMANDS10 81 1.There are not at least 2 bytes of data after
Error ReportingChapter 7717Code (If Applies)EXT STS STSMeaningErrorCodeA F0 240Sum of total transaction size and the word level of PLC3addressi
Error ReportingChapter 7718Code (If Applies)EXT STS STSMeaningErrorCode8 F0 238The file size decreased between packets of a multipackettransact
Error ReportingChapter 7719The meaning of a particular remote error code will vary, depending on thetype of communication interface module at the rem
Error ReportingChapter 7720They apply to activity on their respective links. Obviously, the 1771-KAwill have only Data Highway counters. Most modul
Error ReportingChapter 77217. False Poll: Counts the number of times that this station has tried torelinquish mastership and the station that was ex
Error ReportingChapter 772215. Retransmits: Counts the number of duplicate frames received. Aduplicate frame is sent by a transmitter when it fails
Error ReportingChapter 772325. Replies Received: A 16-bit counter that records the number of replymessages that were received that resulted in the s
Error ReportingChapter 77243. Bad ACK Status: Counts the number of times the ACK wassuccessfully received but contained a non-zero status code other
Communication ConceptsChapter 22-6Computer ProgrammingThe communication protocol for the PCL is transparent to a computer onthe network. However, for
Error ReportingChapter 772510. Wrong Destination Address: Counts the number of frames thatwere rejected because the destination address was incorrec
Error ReportingChapter 772619. Received Messages: A 16-bit counter that records the number ofmessages successfully received.20. Not used.21. Number
Error ReportingChapter 77270. Bad CRC or I/O error on ACK. Same causes as bad CRC onmessages.1. ACK Timeout: Counts the number of times that the se
Error ReportingChapter 7728hear it, the old master will record a false poll and continue polling;and the new master will start polling also. This us
Error ReportingChapter 772916. Aborts: Counts the number of aborts received. The HDLC abortsignal is not used on the Data Highway but can be detect
Error ReportingChapter 773031. Number of ENQs sent.32. Number of messages that could not be successfully sent.33. Number of reply messages that could
Error ReportingChapter 773147. Number of broadcast messages received.48. Number of broadcast messages that were successfully received.49. Number of m
Error ReportingChapter 77328. Number of NAKs passed from the separator to the transmitter.9. Number of timeouts waiting for a response.10. Number of
Error ReportingChapter 773324. Number of times the DLE ACK response was delayed because of alack of buffer space for the next message.25. Number of t
Error ReportingChapter 773441. Number of messages with incorrect network address.42. 16-bit count of messages sent by command initiator.43. Not used.
Communication ConceptsChapter 22-7Configuration ConsiderationsAllen-Bradley manufactures a variety of communication interfacemodules for different app
Error ReportingChapter 77357. False polls (failure to transfer).8. Received acknowledgment when not master.9. Message size too small (less than 5 byt
Error ReportingChapter 773627. Reply messages sent.28. Not used.MODEM CHANNEL COUNTERS29. Command messages sent.30. Not used.31. Reply messages recei
Error ReportingChapter 773746. Computer link timeout (preset to 500 msec).47. Not used.48. Maximum number of NAKs accepted per message (preset to 10)
Error ReportingChapter 77381770KF2 and 1785KA PCL Link Error CountersFor the KF2, the block of counters in this section are followed by a blockof m
Error ReportingChapter 7739PLC5 Diagnostic CountersByte No.0123456789101112131415161718192021222324252627293031ACK TimeoutsNAK No Memory ReceivedNum
Error ReportingChapter 7740The remote station then formatted a reply with the STS byte containingsome error code. Local errors mean that the network
Error ReportingChapter 7741Here is a list of relevant PLC-3 status codes for the STS byte and theEXT STS byte.Bits Hex Value MeaningSTS Byte0407 0Su
AppendixAA1Switch SettingsHere is a reference for switch settings for a 1770-KF2 communicationinterface module.Table A.AAsynchronous Link Features (S
Switch SettingsAppendix AA2Table A.BStation Number (SW2, SW3, SW4)A. First Digit (SW2)SwitchDigit 1 20123OFFOFFONONOFFONOFFONFor a PLC network l
Switch SettingsAppendix AA3Table A.ENetwork Link Selection (SW7)Local Area Network Switch 1 Switch 2Data HighwayOFF OFFPeer Communication LinkON OFF
Because of the variety of uses for the products described in this publication,those responsible for the application and use of this control equipment
Communication ConceptsChapter 22-8Each of the physical links just described requires three layers of softwareto enable communication to take place. T
AppendixBB1Message FormatsTable B.AASCII Codes and Their Numerical ValuesHex Binary ASCII Hex Binary ASCII Hex Binary ASCII000102030405060708090A0B0C
AppendixCC1General Asynchronous Link Error Codes(STS, EXT STS)Asynchronous link (RS-232-C) error codes are passed in the link messagepackets. You ca
General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC2Remote STS Error CodesThe remote STS error code nibble contains errors found by the re
General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC3You will have an EXT STS code if your STS code is F0 (hex). The EXTSTS has different
General Asynchronous Link Error Codes(STS, EXT STS)Appendix CC4EXT STS Codes for Command Code 0F (Hex)The following table contains EXT STS codes (in
AppendixDD1Detailed FlowchartsThis appendix presents flowcharts that give detailed views of an exampleof software logic for implementing full-duplex
Detailed FlowchartsAppendix DD2Figure D.1Data Flow Diagram for FullDuplex ProtocolDLE ACKDLE ACKDLE NAKUARTMultiplexerData Link LayerPhysical Link
Detailed FlowchartsAppendix DD3Figure D.2Transmitter Routine for FullDuplex ProtocolXMITGETMSGGet Messagefrom Network LayerReset NAKand TimeoutCo
Detailed FlowchartsAppendix DD4Figure D.3WTAK SubroutineRETURNGet the Response Code (if Any) from RESPSTOPTIMECancel theACK TimerCommon• WTR
Detailed FlowchartsAppendix DD5Figure D.4SENDM SubroutineRETURNSENDETX SendDLE ETX CRCLink Data Done ?CRC IncludeByte in CRCSENDDATASe
Communication ConceptsChapter 22-9automatically fills the protocol bytes. If the transaction originates from acomputer station, your computer softwar
Detailed FlowchartsAppendix DD6Figure D.5STARTTIME Subroutine11658STARTTIMERETURNAn Implementation-DependentRoutine that Schedules TIMEOUT to Be Exec
Detailed FlowchartsAppendix DD7Figure D.7TIMEOUT Subroutine11660TIMEOUTRETURNScheduled By•Aborted By•WAKEUPWake Up the ProcessSleeping at WTRESP(If A
Detailed FlowchartsAppendix DD8Figure D.9SIGOK/SIGFAIL SubroutineSIGOK Place SuccessCode in Message Control BlockLINKPlace Message on RETURN Queue
Detailed FlowchartsAppendix DD9Figure D.10Sharing the Transmit Side of the UARTTXALLOCUART UsageTXFREEXMIT RCVEXMIT RCVENot-in-UseSignal11664Since th
Detailed FlowchartsAppendix DD10Figure D.11SENDCTL SubroutineSENDCTLTXALLOCAllocate UART or WaitSENDTransmit DLESEND TransmitControlCodeTXFREED
Detailed FlowchartsAppendix DD11Figure D.12SENDTX Subroutine11665SENDTXTXALLOCAllocate UART or WaitSENDTransmit DLESENDTransmit ETXSENDTransmit C
Detailed FlowchartsAppendix DD12Figure D.13SEND SubroutineSENDDisable Processor Interrupts Enable UARTTransmit Interrupt UARTTransmitter
Detailed FlowchartsAppendix DD13Figure D.14SENDDATA SubroutineSENDDATATXALLOCAllocate UART or WaitSENDTransmit Link Data Byte Is DataByte DLE
Detailed FlowchartsAppendix DD14Figure D.15TXALLOC SubroutineTXALLOC UARTin Use ?Set IN-USE FlagRETURNSLEEPWait at TXALWTUntil UART Is FreeIn
Detailed FlowchartsAppendix DD15Figure D.17TRANSMIT INTERRUPT Subroutine11670WAKEUPTRANSMITINTERRUPTINTERRUPTRETURNResume ProcessNOTE: a Z80 S10.Th
Communication ConceptsChapter 22-10required. Using an excessive number of high priority commands defeatsthe purpose of this feature and could delay o
Detailed FlowchartsAppendix DD16Figure D.19SLEEP and WAKEUP InteractionPROCESS A PROCESS B PROCESS CSLEEPA Previous WakeupLaterWAKEUP2178365Sequence
Detailed FlowchartsAppendix DD17Figure D.20POWERUP Subroutine11673POWERUPSPAWN RCVESPAWN XMITContinueInitializationPOWERUPAt power-up the Z-80starts
Detailed FlowchartsAppendix DD18Figure D.22UNLINK SubroutineRETURNAn Implementation-InputUNLINK11675Address of QueueOutput Message Control BlockDep
Detailed FlowchartsAppendix DD19Figure D.24Receiver Routine for FullDuplex ProtocolRCVEReset Buffer Flag: SetHeader to Illegal ValueGET BUFFERGet a
Detailed FlowchartsAppendix DD20Figure D.25XMSG SubroutineXMSGGETBUFCheck Availabil-ityof Receive BufferClear CRCAccumulatorGETCODEGet a CodeLinkData
Detailed FlowchartsAppendix DD21Figure D.26GETCODE SubroutineGETCODEGETRAWGet Byte from UARTDLE ?GETRAWGet Byte from UARTDLE ?NoYesBCCAdd Data Byte
Detailed FlowchartsAppendix DD22Figure D.27GETRAW SubroutineGETRAWDisable Proces-sor Interrupts Enable UARTReceive InterruptByte inUART ? D
Detailed FlowchartsAppendix DD23Figure D.28SENDNET Subroutine11682SENDNETReset theBUFFER FlagRETURNAn Implementation-Dependent Routineto Put a Messag
AppendixEE-1Data Link LayerThe data link layer controls the flow of communication on the physicallink by acquiring and releasing access to the communi
Data Link LayerAppendix EE-2When a station gains control of the Data Highway to transmit messages, ithas become a master station. All other station i
Communication ConceptsChapter 22-11As with reads, writes also are classified by the level of access to PCmemory. Non-physical writes can access only
Data Link LayerAppendix EE-3A station must have mastership of the Data Highway before it cantransmit any messages or polling sequences. As part of th
Data Link LayerAppendix EE-4Figure E.2Polling Scheme•••074075076077110111112113•••17417517617720020120220327427527627730030130230337337437537601001101
Data Link LayerAppendix EE-5A block check is used to detect errors at the link level. You can select aCRC instead of this block check. Any device co
AADDR, 57Addressing, 68Logical, 68Logical ASCII, 618PLC, 615PLC/PLC-2, 69PLC-2, 615PLC-3 and PLC-5, 610, 616PLC-3 Logical B
IndexI–2Full-Duplex Receiver Routine, D19HHalf-Duplex Protocol, 11, 41, 421, 422Half-Duplex Protocol, Diagrams, 432Half-Duplex Proto
Publication 1770-6.5.13 - March 1989 Supersedes Publication 1770-6.5.13 - August 1988AllenBradley, a Rockwell Automation Business, has been helping i
Communication ConceptsChapter 22-12Generally, you need not be concerned with the interaction of stationinterface modules on the network.This means tha
Chapter 33-1InstallationThis chapter explains how to install the 1770-KF2 module. There are fourparts to installation: Setting Communication Option S
InstallationChapter 33-2Figure 3.1Communication Option SwitchesOO12345OO12313529OO12OO123OO12OO1234NFFNFFNFFNFFNFFNFFStation Number(SW-2, SW-3, SW-4)A
InstallationChapter 33-3Switch 3 determines whether the asynchronous port of the KF2 modulecan detect duplicate messages transmitted to it.If You Want
InstallationChapter 33-4Figure 3.2Station NumberOO12NFFSwitch GroupsONOFFOO12NFF3OO12NFF3SW-2 SW-3 SW-4ONOFFONOFFIf You Wantto Set ThisDigit:Set Switc
InstallationChapter 33-5Figure 3.3Switch Settings for Network LinkOO12NFFBoth switches ON for57,600 bits per secondSW–513514Asynchronous Communication
Introduction 11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General 11. . . . . . . . . . . . . . . . . . . . . . . .
InstallationChapter 33-6Switch 4 relates only to diagnostic commands sent to the KF2 modulefrom a remote Data Highway station. Since only computers c
InstallationChapter 33-7Selecting the Network LinkYou use Switch Assembly SW-7, a spare assembly in all Series Amodules, to select whether the KF2 tre
InstallationChapter 33-8Important: The asynchronous port of the KF2 module can communicateat a maximum rate of 9,600 bits per second. If your 1771-K
InstallationChapter 33-9The KF2 module has 3 connectors on its rear panel (Figure 3.5). Thecenter connector, labeled DATA HIGHWAY, connects to the Da
InstallationChapter 33-10Mechanical CharacteristicsThe COMPUTER ASYNCHRONOUS connector on a KF2 module is amale 25-pin D-shell. This connector confor
InstallationChapter 33-11The definitions of the above signals are: TXD carries serialized data. It is an RS-232-C standard output fromthe module. R
InstallationChapter 33-12must be connected to the GND of the modem or computer. Note that thistype of connection does not provide electrical isolatio
InstallationChapter 33-13This type of connection includes the DTR signal to allow each end todetect the loss of the other end’s ability to communicate
InstallationChapter 33-14The module can be connected to standard American dial-up modems andsome European modems. Other European standards specify th
InstallationChapter 33-15Figure 3.8Connection to 1771-KG Module25-Pin Female Connector 15-Pin Male Connector(Cat. No. 1778-CR)AsynchronousPort Connect
Table of ContentsiiError Reporting 71. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General 71. . . . . . . . . . . . . . . .
InstallationChapter 33-16Figure 3.9Connection to 1773-KA or 1775-KA Module25-Pin Female Connector 25-Pin Male Connector(Cat. No. 1778-CR)AsynchronousP
InstallationChapter 33-17After detecting DCD, the module continues to monitor the DCD line. IfDCD goes off, the module restarts the timeout. If DCD
InstallationChapter 33-18There are 6 LED indicators on the front of a KF2 module (Figure 3.10).These indicators can help you in diagnosing problems wi
InstallationChapter 33-19The ACTV light remains on as long as the cable between theCOMPUTER ASYNCHRONOUS socket and the interfacingasynchronous device
Chapter 44-1Asynchronous Link ProtocolsThis chapter describes the communication protocol used on theasynchronous link to the KF2 module. If you are c
Asynchronous Link ProtocolsChapter 44-2Important: Some Allen-Bradley documentation might refer tofull-duplex and half-duplex protocols as DF1 and pol
Asynchronous Link ProtocolsChapter 44-3 Data Codes:- Data (single characters having values 00-0F and 11-FF hex)- DLE DLE (to represent the value 10 he
Asynchronous Link ProtocolsChapter 44-4Figure 4.1Packet Format for Full-Duplex ProtocolCMD STS Command/Response BlockDST SRC CMD STS TNSData(From Appl
Asynchronous Link ProtocolsChapter 44-5The sum of the data bytes in this message packet is 20 hex. The BCC isthe 2’s complement of this sum, or E0 he
Asynchronous Link ProtocolsChapter 44-61010 0000 0000 0001As each additional byte is transmitted, it is included in the value in theregister the same
Chapter 11-1IntroductionA 1770-KF2 Series B module is a communication interface that linksintelligent RS-232-C or RS-422-A (asynchronous) devices to a
Asynchronous Link ProtocolsChapter 44-7To implement all of these data paths with only two physical circuits, asoftware multiplexer combines the messag
Asynchronous Link ProtocolsChapter 44-8Figure 4.4 shows Path 1 with unrelated parts of Figure 4.3 removed.Paths 2, 3, and 4 could be similarly shown.F
Asynchronous Link ProtocolsChapter 44-9Although the protocols on each subsystem operate independently of eachother, there will be a slight interaction
Asynchronous Link ProtocolsChapter 44-10Message CharacteristicsIdeally the link protocol should not be at all concerned with the content orform of the
Asynchronous Link ProtocolsChapter 44-11If the timeout expires before a response is received, the transmitter sendsa DLE ENQ on Path 1 to request a re
Asynchronous Link ProtocolsChapter 44-12Table 4.ATransmitter for Full-Duplex ProtocolTRANSMITTER is defined asloopMessage = GET-MESSAGE-TO-SENDStatus
Asynchronous Link ProtocolsChapter 44-13Receiver ActionsSince the receiver gets “dirty” input from the physical world, it is morecomplex and must be c
Asynchronous Link ProtocolsChapter 44-14If a DLE STX is received, the BCC and the message buffer are reset; andthe receiver starts building a message.
Asynchronous Link ProtocolsChapter 44-15Table 4.BReceiver for Full-Duplex ProtocolRECEIVER is defined asvariablesLAST-HEADER is 4 bytes copied out of
Asynchronous Link ProtocolsChapter 44-16Figure 4.8Receiver for Full-Duplex ProtocolYesNoNoYesYesNo11699RCVELAST = NAKReceiveDLEENQ ?ReceiveMessag
IntroductionChapter 11-2Table 1.ARelated DocumentationPublicationNumberOld PublicationNumberTitle1770-6.2.1 1770-810Data Highway Cable Assembly and In
Asynchronous Link ProtocolsChapter 44-17Full-Duplex Protocol DiagramsThe following figures show some events that can occur on the variousinterfaces.
Asynchronous Link ProtocolsChapter 44-18Figure 4.11Message Transfer with Timeout and ENQNot FullDLE ACKOKxxxxDLE ENQxxxxSOURCE XMTR LINK RCVR SINK
Asynchronous Link ProtocolsChapter 44-19Figure 4.13Message Transfer with Message Sink FullNot FullOKxxxxxxxxSOURCE XMTR LINK RCVR SINK11565DLE NAKDL
Asynchronous Link ProtocolsChapter 44-20ExamplesIf a line monitor were connected to the wires between Stations A and B,and only the A to B subsystem w
Asynchronous Link ProtocolsChapter 44-21Half-duplex protocol is the alternative to full-duplex protocol. You canselect half-duplex protocol by settin
Asynchronous Link ProtocolsChapter 44-22One station is designated as master, and it controls which station hasaccess to the link. You can use a 1771-
Asynchronous Link ProtocolsChapter 44-23The term “code” means (in the following paragraphs) an indivisiblesequence of one or more bytes having a speci
Asynchronous Link ProtocolsChapter 44-24Link-Layer PacketsHalf-duplex protocol uses three types of transmissions: Polling Packet Master Message Packe
Asynchronous Link ProtocolsChapter 44-25At the end of each polling packet there is a BCC byte. At the end of eachmessage packet, there is either a on
Asynchronous Link ProtocolsChapter 44-26In this case, the sum of the data bytes is 2E hex because only one DLEtext code is included in the BCC. So th
IntroductionChapter 11-3Figure 1.1 shows the 1770-KF2 module’s hardware features: Diagnostic Indicators Connectors for Data Highway and RS-232-C Devi
Asynchronous Link ProtocolsChapter 44-27transceiver is illustrated in Figure 4.15, and the master transceiver isillustrated in Figure 4.16.To fully de
Asynchronous Link ProtocolsChapter 44-282. Some protocol implementations require that the first byte of amessage match the station address. These rec
Asynchronous Link ProtocolsChapter 44-29Figure 4.16Half-Duplex Master TransceiverXCVRSelect StationPoll Selected StationStart TimeoutReceiveNoReceiveY
Asynchronous Link ProtocolsChapter 44-30Slave Transceiver ActionsSince the transceiver receives “dirty” input from the physical world, itmust be capab
Asynchronous Link ProtocolsChapter 44-31summing the BCC, but the data is discarded. If an error is detected, it isrecorded. If any control code othe
Asynchronous Link ProtocolsChapter 44-32When a DLE NAK is received, the transceiver takes messages from thesource until it is empty. Each message wil
Asynchronous Link ProtocolsChapter 44-33Figure 4.19Message Transfer with ACK DestroyedNot FullOKxxxxxxxxSINK MASTER LINK SLAVE SINK11569DLE ACKSOURC
Asynchronous Link ProtocolsChapter 44-34Figure 4.22Duplicate Message TransmissionxxxxxxxxOKNot FullSINK MASTER LINK SLAVE SINK11572DLE ACKSOURCE/ SO
Asynchronous Link ProtocolsChapter 44-35Figure 4.24Message Sink Full, Case 2FullOKxxxxxxxxSINK MASTER LINK SLAVE SINK11575DLE ACKSOURCE/ SOURCE/BCCD
Asynchronous Link ProtocolsChapter 44-36station alone may not work, since it could be that the only way to free upspace is to send a message to the ma
IntroductionChapter 11-4Table 1.B lists KF2 module specifications.Table 1.BKF2 Module SpecificationsSpecification RequirementsCommunication Rates•Data
Chapter 55-1Message Packet FormatsThis chapter describes how your computer application programs shouldformat command and reply messages for transmissi
Message Packet FormatsChapter 55-2Figure 5.1Network ModelRepliesCommandInitiatorCommandExecutorRepliesCommandsCommandsNetworkQQRRRQ= Routing Subroutin
Message Packet FormatsChapter 55-3The message bytes contain unsigned binary data from both the applicationlayer and the network layer. Figure 5.2 sho
Message Packet FormatsChapter 55-4The meanings of the bytes are: DST — Destination Station for the Message SRC — Source Station of the Message
Message Packet FormatsChapter 55-5Figure 5.4 shows the format for the CMD byte itself. Bits 0 through 3contain the command code. Bits 4 and 7 should
Message Packet FormatsChapter 55-6TNSA complete transaction consists of a command message transmitted by aPC station. The TNS (transaction) bytes con
Message Packet FormatsChapter 55-7ADDRThe ADDR (address) field contains the address of a memory location inthe command executor. ADDR specifies the a
Message Packet FormatsChapter 55-8Table 5.AMessage FormatsIf You Want ThisCommand:Use ThisCMD Code:Use ThisFNC Code:If You Want ThisCommand:Use ThisCM
Message Packet FormatsChapter 55-9Basic Command SetBasic commands include those that can generally be executed by any PCstation on the communication l
Message Packet FormatsChapter 55-10Diagnostic LoopYou can use this command to check the integrity of transmissions over thecommunication link. The co
IntroductionChapter 11-5A KF2 module provides either a point-to-point link or a multi-drop linkbetween an Allen-Bradley Data Highway and an intelligen
Message Packet FormatsChapter 55-11Diagnostic StatusThis command reads a block of status information from the stationinterface module. The reply to t
Message Packet FormatsChapter 55-12Table 5.BContents of Status DATA for 1771-KA2, -KC/KD, -KE/KF; 1770-KF2; 1771-KG, 1774-KA; and1785-KA ModulesByte B
Message Packet FormatsChapter 55-13Table 5.B ContinuedContents of Status DATA for 1771-KA2, -KC/KD, -KE/KF; 1770-KF2; 1771-KG, 1774-KA; and1785-KA Mod
Message Packet FormatsChapter 55-14Table 5.CContents of Status DATA for 1773-KA ModulesByte Bit Value Meaning1 Operating Status of Controllers on the
Message Packet FormatsChapter 55-15Table 5.DContents of Status DATA for 1775-KA ModulesByte Bit Value Meaning1Operating Status of PLC-3 Processor0-1 0
Message Packet FormatsChapter 55-16Table 5.EContents of Status DATA for PLC-5Byte Bit Value Meaning1 Operating Status of PLC-5 Processor0-2 01234567Pr
Message Packet FormatsChapter 55-17Protected Bit WriteThis command sets or resets individual bits within limited areas of the PCdata table memory. It
Message Packet FormatsChapter 55-18Protected WriteThis command writes words of data into limited areas of the PC data tablememory. Its access is limi
Message Packet FormatsChapter 55-19Set NAKSThis command sets the maximum number of NAKs that the stationinterface module will accept per message trans
Message Packet FormatsChapter 55-20Set VariablesThis command is a combination of the above three commands. It sets themaximum ENQs, NAKs, and timeout
Comentarios a estos manuales