Printed in the Federal Republic of Germany
TR-Electronic GmbH 2016, All Rights Reserved
11/20/2018
TR - ECE - BA - DGB - 0128 - 01
Page 97 of 127
3.7.7 Identification protocols
3.7.7.1 LSS identify remote slave protocol
The given protocol has implemented the
LSS identify remote slave service
.
By means of the LSS master LSS slaves in the network can be identified within a
certain range. All LSS slaves with matching Vendor-ID, Product-Code, Revision-No.
Range and Serial-No. Range, response with the
LSS identify slave protocol
.
LSS-Master --> LSS-Slave
0
1
2
3
4
5
6
7
COB-ID
CS
Vendor-ID
(
≙Index 1018h:01)
Reserved by CiA
0x7E5
0x46
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Product-Code
(
≙Index 1018h:02)
Reserved by CiA
0x7E5
0x47
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Revision-No. LOW
Reserved by CiA
0x7E5
0x48
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Revision-No. HIGH
Reserved by CiA
0x7E5
0x49
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Serial-No. LOW
Reserved by CiA
0x7E5
0x4A
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Serial-No. HIGH
Reserved by CiA
0x7E5
0x4B
LSB
MSB
3.7.7.2 LSS identify slave protocol
The given protocol has implemented the
LSS identify slave service
. All LSS
slaves with matching LSS attributes given in the
LSS identify remote slave
protocol
, response with this protocol.
LSS-Slave --> LSS-Master
0
1
2
3
4
5
6
7
COB-ID
CS
Reserved by CiA
0x7E4
0x4F