Rockwell Automation 1771-KA2 Communication Adapter Module User Manual

Page 40

Advertising
background image

Commands

Chapter 4

4-4

Figure 4.2
Protected/Unprotected Command Distinction

>

010

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

ЙЙЙЙЙЙЙЙЙ

>

Memory
Word
Address

End of
Data
Table

A protected
command can access
only specified
areas (determined
by memory access
rung in receiving
station) of memory

021
022
023

An unprotected
command can
access any area
of data table
memeory at a
receiving station
processor

a. Access Definition

G

G

G

021

023

Branch Start
Instruction

b. Memory Access Branch (typical)

10866-I

NOTE: For most write and bit write operations between station
processors, protected commands should be used. Because memory access
must be allowed by the program at the receiving station processor,
protected commands allow programmed write protection, which gives the
programmer an added degree of control over command execution.
Unprotected commands provide the same functions in transferring data,
but without this write protection at the receiving station.

A write command transfers word data from the local station processor to a
remote station. A single write command can send from 1 to 121
consecutive data table words.

There are 2 types of write commands that can be sent from a station
communication adapter module:

Protected write
Unprotected write

The distinction between these types of commands is their memory access.
Protected write commands are not executed by the receiving station unless
a memory access rung is programmed at that station and switch 1 on write
options is set. Because this allows added control over data transfer, use of
protected commands is recommended.

Write Commands

Advertising