Safety Considerations Guide, Tricon v9.0 - Tuv-fs.com
Safety Considerations Guide, Tricon v9.0 - Tuv-fs.com Safety Considerations Guide, Tricon v9.0 - Tuv-fs.com
72 Examples of Peer-to-Peer ApplicationsExamples of Peer-to-Peer ApplicationsPeer-to-Peer function blocks are designed to transfer limited amounts of databetween two applications. Therefore you should use these function blockssparingly in your applications. Ideally, you should control the execution of eachTR_USEND function block in such a way that each TR_USEND is initiated onlywhen the acknowledgment for the last TR_USEND is received and new data isavailable for sending. You can do this through effective use of the SENDFLGparameter in the TR_USEND function block and the STATUS output of theTR_USEND function block, as shown in Examples 2 and 3.The examples described below can be found in the Expeer.pt2 project on theTriStation CD.Fast Send to One Triconex NodeThis is a simple example of sending data as fast as possible from Node #2 to Node#3. Scan time in both controllers is set to 100 milliseconds.The example uses the following project elements:• PEER_EX1_SEND_FBD (for sending Node #2)• PEER_EX1_RCV_FBD (for receiving Node #3)Sending Data Every Second to One NodeThis is a simple example of sending data every second from Node #2 to Node #3.Scan time in both controllers is set to 100 milliseconds.The example uses the following project elements:• PEER_EX2_SEND_FBD (for sending Node #2)• PEER_EX2_RCV_FBD (for receiving Node #3)Tricon Safety Considerations Guide
Examples of Peer-to-Peer Applications 73Controlled Use of TR_USEND/TR_URCV Function BlocksThe networks in this example show how to use TR_USEND/TR_URCV functionblocks correctly, in a controlled way, so that a limited amount of important data canbe transferred between two applications when new data is ready to be sent.This example uses the following project elements:• PEER_EX3_SEND_FBD (for sending Node #2)• PEER_EX3_RCV_FBD (for receiving Node #3)Using TR_USEND/TR_URCV Function Blocks for Safety-Critical DataThis example shows how to use TR_USEND/TR_URCV function blocks fortransferring a limited amount of safety-critical data between the two applicationsas fast as possible. It also shows how to measure the actual maximum time fortransferring data from the sending node to the receiving node. Because this issafety-critical data, each controller must have two NCMs and two peer-to-peernetworks connected.Sending Node #1 Parameters:• Scan time (SS) = 150 milliseconds• Number of aliased variables in bytes = 2000• Time to transfer alias data over the communication bus in milliseconds (TS)= (2000/20000) * 1000 = 100 milliseconds• The sending controller has only one TR_USEND function block in theapplication, meeting the requirement to have five or fewer TR_USENDfunction blocks. The sendflag is on in the TR_USEND function block sothat, as soon as the last TR_USEND is acknowledged by the receivingcontroller, the sending controller initiates another TR_USENDReceiving Node #3 Parameters:• Scan time (SR) = 200 milliseconds• Number of aliased variables in bytes = 5000• Time to transfer aliased data over the communication bus in milliseconds(TR) = (5000/20000) * 1000 = 250 milliseconds• Process tolerance time = 4 secondsAppendix APeer-to-Peer Communication
- Page 37 and 38: General Guidelines 21• Under cert
- Page 39 and 40: Guidelines for Tricon Controllers 2
- Page 41 and 42: Guidelines for Tricon Controllers 2
- Page 43 and 44: Guidelines for Tricon Controllers 2
- Page 45 and 46: Guidelines for Tricon Controllers 2
- Page 47 and 48: Guidelines for Tricon Controllers 3
- Page 49 and 50: Guidelines for Tricon Controllers 3
- Page 51 and 52: Guidelines for Tricon Controllers 3
- Page 53 and 54: CHAPTER 3Fault ManagementThis chapt
- Page 55 and 56: System Diagnostics 39System Diagnos
- Page 57 and 58: Operating Modes 41Operating ModesEa
- Page 59 and 60: Module Diagnostics 43Module Diagnos
- Page 61 and 62: Module Diagnostics 45Relay Output M
- Page 63 and 64: Module Diagnostics 47System Attribu
- Page 65 and 66: CHAPTER 4Application DevelopmentThi
- Page 67 and 68: Important TriStation Commands 51Imp
- Page 69 and 70: Setting Scan Time 53Setting Scan Ti
- Page 71 and 72: Sample Safety-Shutdown Programs 55S
- Page 73 and 74: Sample Safety-Shutdown Programs 57I
- Page 75 and 76: Sample Safety-Shutdown Programs 59A
- Page 77 and 78: Sample Safety-Shutdown Programs 61P
- Page 79 and 80: Sample Safety-Shutdown Programs 63O
- Page 81 and 82: Sample Safety-Shutdown Programs 65D
- Page 83 and 84: Sample Safety-Shutdown Programs 67P
- Page 85 and 86: APPENDIX APeer-to-Peer Communicatio
- Page 87: Data Transfer Time 71ParameterTS =S
- Page 91 and 92: TR_CRITICAL_IO Function Block 75TR_
- Page 93 and 94: TR_CRITICAL_IO Function Block 77Par
- Page 95 and 96: TR_CRITICAL_IO Function Block 79Str
- Page 97 and 98: TR_CRITICAL_IO Function Block 81CO
- Page 99 and 100: TR_SHUTDOWN Function Block 83Parame
- Page 101 and 102: TR_SHUTDOWN Function Block 85Relate
- Page 103 and 104: TR_SHUTDOWN Function Block 87* Exam
- Page 105 and 106: TR_SHUTDOWN Function Block 89TIMER_
- Page 107 and 108: TR_VOTE_MODE Function Block 91Param
- Page 109 and 110: TR_VOTE_MODE Function Block 93Appen
- Page 111 and 112: APPENDIX BShutdown Function BlocksT
- Page 113 and 114: TR_CRITICAL_IO Function Block 974 R
- Page 115 and 116: TR_CRITICAL_IO Function Block 99Rel
- Page 117 and 118: TR_CRITICAL_IO Function Block 101*
- Page 119 and 120: TR_SHUTDOWN Function Block 103TR_SH
- Page 121 and 122: TR_SHUTDOWN Function Block 105Param
- Page 123 and 124: TR_SHUTDOWN Function Block 107Struc
- Page 125 and 126: TR_SHUTDOWN Function Block 109IF CI
- Page 127 and 128: TR_VOTE_MODE Function Block 111TR_V
- Page 129 and 130: TR_VOTE_MODE Function Block 113Stru
- Page 131 and 132: Index 115IndexAactual scan time 53a
- Page 133 and 134: Index 117Modbus master functions 25
- Page 135 and 136: Index 119timescan 53TMR architectur
Examples of Peer-to-Peer Applications 73Controlled Use of TR_USEND/TR_URCV Function BlocksThe networks in this example show how to use TR_USEND/TR_URCV functionblocks correctly, in a controlled way, so that a limited amount of important data canbe transferred between two applications when new data is ready to be sent.This example uses the following project elements:• PEER_EX3_SEND_FBD (for sending Node #2)• PEER_EX3_RCV_FBD (for receiving Node #3)Using TR_USEND/TR_URCV Function Blocks for <strong>Safety</strong>-Critical DataThis example shows how to use TR_USEND/TR_URCV function blocks fortransferring a limited amount of safety-critical data between the two applicationsas fast as possible. It also shows how to measure the actual maximum time fortransferring data from the sending node to the receiving node. Because this issafety-critical data, each controller must have two NCMs and two peer-to-peernetworks connected.Sending Node #1 Parameters:• Scan time (SS) = 150 milliseconds• Number of aliased variables in bytes = 2000• Time to transfer alias data over the <strong>com</strong>munication bus in milliseconds (TS)= (2000/20000) * 1000 = 100 milliseconds• The sending controller has only one TR_USEND function block in theapplication, meeting the requirement to have five or fewer TR_USENDfunction blocks. The sendflag is on in the TR_USEND function block sothat, as soon as the last TR_USEND is acknowledged by the receivingcontroller, the sending controller initiates another TR_USENDReceiving Node #3 Parameters:• Scan time (SR) = 200 milliseconds• Number of aliased variables in bytes = 5000• Time to transfer aliased data over the <strong>com</strong>munication bus in milliseconds(TR) = (5000/20000) * 1000 = 250 milliseconds• Process tolerance time = 4 secondsAppendix APeer-to-Peer Communication