PS69-DPS
♦
CompactLogix or MicroLogix Platform
Configuration and Start-Up
Profibus DP Slave Communication Module
Page 36 of 94
ProSoft Technology, Inc.
January 12, 2009
2.4.2 GSD
File
A GSD file is kind of an electronic datasheet for a particular Slave device. The
GSD-File for the PS69-DPS slave named "PSFT097A.gsd" is located on the CD
supplied with the module. You have to provide this file to the configuration tool for
the network master. Refer to the Master's user manual of how to import GSD
files.
2.4.3 Configuration
by
Master
The "Configuration by Master" is the easiest way to configure the Slave. The
projects on the CD-ROM contain examples which show the use of this method.
During the network startup phase, the PROFIBUS Master sends the expected
slave configuration over the network to compare it with the real configuration of
the Slaves connected to the bus. The slave PS69-DPS automatically takes over
the configuration which is sent by the master during its comparison of the
configuration. This method is activated by default, since the parameter "Force
User Config" in the configuration area is set to 0. The only setting required by the
user is setting the Address rotary switches on the front of the module to the
required network address.
Note:
This is the easiest way to configure the Slave. But be aware that the master can send a new
configuration to the slave at any time. This can cause inconsistency, if the new configuration does
not match to the controller application. For more safety use the method "Configuration by Controller
Application". With this method the slave module does not start any communication as long as the
slave configuration and the master configuration don't match to each other.
2.4.4 Configuration
by
Controller Application
The second option to configure the Slave module is to let the controller
application decide on the configuration. To do so the parameter "Force User
Config" in the configuration array has to be set to 1. By setting this parameter
and initialization of the other values the controller program can configure the
slave. With this method the slave module will not start any network
communication as long as the master and slave configuration don't match to
each other. The following table shows the outline of the mapping of the
configuration data image.
Word Offset Configuration word
Data type Low/High
Byte Description
Valid
values
LOW Byte
Busaddress
0 ... 125
0 Local:
1:C.Data[0]
INT
HIGH Byte
Force User
Configuration
0 = ForceMasterConfig
1 = ForceUserConfig
1 Local:
1:C.Data[1]
INT
Reserved
2 Local:
1:C.Data[2]
INT
Watchdog Time
0 … FFFFh
3 Local:
1:C.Data[3]
INT
Number of valid config
bytes
(starting with
Local:1:C.Data[8])
2 ... 48
4 Local:
1:C.Data[4]
INT
Reserved