O P E R AT I N G I N S T R U C T I O N S | Bulkscan®
8014829/ZV98/2018-05-07| S I C K
Subject to change without notice
1 3
ON SAFETY
2.4
Quick stop and quick restart
To stop the Bulkscan® LMS511 or Bulkscan® LMS111, switch it off.
Switch off the Bulkscan® power supply or disconnect the M12 supply cable.
The Bulkscan® retains parameters stored in the internal non-volatile memory. Parame-
ters that have not been saved as well as the measured values at the interface are lost.
To restart the Bulkscan®, switch it on.
Switch on the power supply to the Bulkscan® or re-connect the M12 supply cable.
The Bulkscan® restarts operation with the last saved parameters.
2.5
Environmental protection
The Bulkscan® LMS511 and Bulkscan® LMS111 have been designed to minimize its
impact on the environment. They consume only a minimum of energy.
At work, always act in an environmentally responsible manner. For this reason, please
note the following information on disposal.
2.5.1
Power consumption
• The Bulkscan® LMS511 consumes a maximum of 25 W in operation without output
loads.
• If the operating temperature of the sensor drops below 5°C, the Bulkscan® LMS511
switches on the heating. The sensor then consumes a maximum of 90 W.
• The Bulkscan® LMS111 consumes a maximum of 10 W in operation without output
loads.
• If the operating temperature of the sensor drops below 10°C, the Bulkscan®
LMS111 switches on the heating. The sensor then consumes a maximum of 55 W.
2.5.2
Disposal after final decommissioning
Always dispose of unusable or irreparable devices in accordance with the applicable
specific national waste disposal regulations.
Dispose of all electronic assemblies as hazardous waste. The electronic assemblies
are easy to dismantle.
SICK AG does not currently take back devices that are unusable or irreparable.
2.6
IP technology
SICK uses standard IP technology in its products. The emphasis is placed on availability
of products and services. SICK always assumes the following prerequisites:
• The
customer will ensured the integrity and confidentiality of the data and rights
affected by the use of the aforementioned products.
•
In all cases, appropriate security measures, such as network separation, firewalls,
virus protection, and patch management, is be taken by the customer on the basis of
the situation in question.
Note