HIMax Safety Manual - Tuv-fs.com

HIMax Safety Manual - Tuv-fs.com HIMax Safety Manual - Tuv-fs.com

12.07.2015 Views

10 User program HIMax10.2.10 Checklist for Creating a User ProgramTo comply with all safety-related aspects during the programming phase, HIMArecommends using the following checklist prior to and after loading a new or modifiedprogram.CompanyHIMaxChecklist for Creating a User ProgramV.1.0LocationObjectiveFile/ArchiveChecks Yes No RemarkWhile creating the program / Before modifying the programAre the user program and PES configurations based on asafety analysis? Are programming guidelines usedwhile creating the user program? Are functionally independent parts of the programencapsulated in functions and function blocks? Are only safe signals used for all safety functions? Does each safety-related signal source properly reach theuser program (also through communication)? Is each safety-related signal drain properly written (alsothrough communication)? After modifying the program – Before loading the programDid a person not involved in creating the program check thatthe user program complies with the mandatory system specifications?Is the test result documented and released (date/signature)? Was the user program compiled twice and were the tworesulting configuration CRCs compared upon completion? Has a copy of the entire project been archived? After modifying the program – After loading the programWas a sufficient number of tests performed for all safetyrelevantlogic operations (including I/O) and for all mathematic operations?Was all force information reset before starting safe operation? Do the enable switches "Readonly in Run" and "Reloaddeactivation" correspond to the settings for the maximum / defined protection?Were the versions (CRCs) of the operating systems of themodules officially approved and certified by the TÜV? Page 58 of 70HI 801 003 D Rev.2.0

HIMax11 Configuring Communication11 Configuring CommunicationIn addition to using the physical input and output variables, variables can also beexchanged with other system through a data connection. In this case, the variables aredeclared with the programming system SILworX , from within the Protocols area of thecorresponding resource.11.1 Standard ProtocolsMany communication protocols only ensure a non-safety-related data transmission. Theseprotocols can be used for the non-safety-related aspects of an automation task.DANGERPersonal injury due to usage of unsafe import dataDo not use any data imported from unsafe sources for safety functions in the userprogram.The following standard protocols are available:• On the Ethernet interfaces on the communication module- Modbus TCP (master/slave)- SNTP- Send/Receive TCP• On the fieldbus interfaces (RS 485) of the communication module according to thedevice model- Modbus (master/slave)- PROFIBUS DP (master/slave)11.2 Safety-Related Protocol (safeethernet)Use the safeethernet Editor to configure how safety-related communication is monitored.To do this, enter the monitoring time "ReceiveTMO“. If no variables are written within thedefined time period, they are set in the PES according to the Freeze Values on LostConnection [ms].For safety-related functions implemented via safeethernet, only the Use Initial Data settingmay be used.NOTICEUnintentional transition to the safe state possible!ReceiveTMO is a safety-related parameter!If all of the values must be transferred, the value of a given signal must be present forlonger than the "ReceiveTMO“ or it must be monitored using a loop-back function.ReceiveTMO is the monitoring time of PES 1 within which a correct response from PES 2must be received.HI 801 003 D Rev.2.0 Page 59 of 70

10 User program <strong>HIMax</strong>10.2.10 Checklist for Creating a User ProgramTo <strong>com</strong>ply with all safety-related aspects during the programming phase, HIMAre<strong>com</strong>mends using the following checklist prior to and after loading a new or modifiedprogram.Company<strong>HIMax</strong>Checklist for Creating a User ProgramV.1.0LocationObjectiveFile/ArchiveChecks Yes No RemarkWhile creating the program / Before modifying the programAre the user program and PES configurations based on asafety analysis? Are programming guidelines usedwhile creating the user program? Are functionally independent parts of the programencapsulated in functions and function blocks? Are only safe signals used for all safety functions? Does each safety-related signal source properly reach theuser program (also through <strong>com</strong>munication)? Is each safety-related signal drain properly written (alsothrough <strong>com</strong>munication)? After modifying the program – Before loading the programDid a person not involved in creating the program check thatthe user program <strong>com</strong>plies with the mandatory system specifications?Is the test result documented and released (date/signature)? Was the user program <strong>com</strong>piled twice and were the tworesulting configuration CRCs <strong>com</strong>pared upon <strong>com</strong>pletion? Has a copy of the entire project been archived? After modifying the program – After loading the programWas a sufficient number of tests performed for all safetyrelevantlogic operations (including I/O) and for all mathematic operations?Was all force information reset before starting safe operation? Do the enable switches "Readonly in Run" and "Reloaddeactivation" correspond to the settings for the maximum / defined protection?Were the versions (CRCs) of the operating systems of themodules officially approved and certified by the TÜV? Page 58 of 70HI 801 003 D Rev.2.0

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!