Bradley Smoker PLC-5 user manual Protecting Your Programs

Models: PLC-5

1 388
Download 388 pages 13.97 Kb
Page 9
Image 9

 

Table of Contents 5

 

 

 

 

Using BOOTP to Configure Channel 2

 

 

for Controllers on Subnets

11-13

 

Using Domain Name Service

11-15

 

Using the Embedded Web Server

11-16

 

Generating User Provided Web Pages

11-22

 

Importing User Page Files to the PLC-5 Controller

11-26

 

Using Multihop Messaging

11-29

 

Multihop Examples

11-30

 

Comparing Multihop and Non-Multihop Messages

 

 

Over Ethernet

11-32

 

Communicating with ControlLogix Devices

11-32

 

TCP/IP

11-32

 

Interpreting Error Codes

11-33

 

Interpreting Ethernet Status Data

11-34

 

Monitoring general Ethernet status

11-35

 

Monitoring Ethernet commands

11-36

 

Monitoring Ethernet replies

11-36

 

Ethernet PLC-5 Performance Considerations

11-37

 

Performance: Host to Ethernet PLC-5 Controller

11-37

 

Performance: Ethernet PLC-5 Controller to Ethernet

 

 

PLC-5 Controller

11-38

 

Chapter 12

 

Protecting Your Programs

Using This Chapter

. 12-1

 

About Passwords and Privileges

. 12-2

 

Defining Privilege Classes

. 12-3

 

Assigning a Privilege Class to a Channel or Offline File

. 12-4

 

Assigning a Privilege Class to a Node

. 12-4

 

Assigning Read/Write Privileges to a Program File

. 12-5

 

Assigning Read/Write Privileges to a Data File

. 12-5

 

Chapter 13

 

Programming Considerations

Using This Chapter

. 13-1

 

Forcing

. 13-1

 

Forcing Inputs and Outputs

. 13-1

 

Forcing SFC Transitions

. 13-2

 

Extended Forcing

. 13-2

 

Increased Program Scan Time

. 13-4

 

I/O Force Privileges

. 13-4

 

Using Protected Controllers

. 13-5

 

Using Selectable Timed Interrupts (STIs)

 

 

and Controller Input Interrupts (PIIs)

. 13-5

 

Setting Up and Using Extended Forcing

. 13-5

 

Step 1 - Select Which Group of Data You Want to Force . . .

. 13-6

Publication 1785-UM012D-EN-P - July 2005

Page 9
Image 9
Bradley Smoker PLC-5 user manual Protecting Your Programs