You are on page 1of 5

Results of plagiarism analysis from 2017-02-16 07:01 UTC

Plag check.docx
1.5%
Date: 2017-02-16 06:58 UTC

All sources 8 Internet sources 8

https://quizlet.com/130522093/chapter-1-...omputer-flash-cards/
[0]
0.5% 1 matches

www.freepatentsonline.com/EP1585223.html
[1]
0.5% 1 matches

www.mdpi.com/1424-8220/16/4/500/pdf
[2]
0.5% 1 matches

www.mdpi.com/1424-8220/14/3/5004/pdf
[3]
0.5% 1 matches

www.mdpi.com/1424-8220/10/7/6307/pdf
[4]
0.5% 1 matches

www.mdpi.com/1424-8220/15/10/26838/pdf
[5]
0.5% 1 matches

www.mdpi.com/1424-8220/15/11/29273/pdf
[6]
0.5% 1 matches

www.mdpi.com/1424-8220/15/10/27374/pdf
[7]
0.5% 1 matches

4 pages, 1987 words

PlagLevel: selected / overall


3 matches from 8 sources, of which 8 are online sources.

Settings
Data policy: Compare with web sources
Sensitivity: Medium
Bibliography: Consider text
Citation detection: No detection
Whitelist: --
Electrically Alterable Read-Only Memory (EAROM):- EAROM in its functioning is very similar to
EPROM, but the difference in EAROM is that instead of using an ultraviolet light source for formatting the
data on this memory, an erasing voltage is sent to the erasing pin of an EAROM chip this will erase the all
the data stored in this memory. Only a very few number of controllers at present use EAROM as their
application memory, but EAROM is a nonvolatile memory like EPROM and can be used for storing the
program permanently if the programmer desires and hence it is also used as a backup to RAM-type
memories.
[2]
Electrically Erasable Programmable Read-Only Memory (EEPROM):- This memory combines the
advantages of ROM and RAM types of memory, this memory is nonvolatile like EPROM and ROM, by
nature, yet it provides a programming flexibility which is same as RAM . Many of controllers now a days
use only EEPROM as the memory of the system. It can not only provide permanent storage for the program
but the program can also be easily altered or erased with the help of a programming device. These two
features of EEPROM help in eliminating the problem of downtime and delays that are produced while
making programming changes which occur in other types of memories. A major drawback of using
EEPROM is to write a byte of memory, first that byte is to erased and after that only it is possible to write
on it, due to this a delay is produced. This delay is notable while making on-line programming editing in
the program. Another major drawback of using EEPROM is that there is a limitation on how many times
the erase/write operation can be performed on a single byte of memory. A single bit generally undergoes
up to 10000 erase/write operations.

In spite of the above mentioned disadvantages EEPROM is one of the most widely used memory types
because of the remarkable advantages that EEPROM provides.

Application memory:- The application memory is the memory which provides the space for user-
programmed instructions to be stored. The application memory area consists of different areas, which are
allocated for a specific function and use.

Application memory is of following type.

Scratch Pad: As the CPU performs various operations such as logic analysis, data manipulations, or
mathematical functions, it is necessary to temporarily hold data as calculations are performs decisions are
made. The work area that is being temporarily used for storing the binary information
[0]
of the processor is
scratch pad. RAM-type memory chips are used to perform scratch operations. RAM memory is volatile,
which means that if power supplied to these chips is removed, the contents will be lost.

Random-access memory (RAM):-This type memory is also commonly known as read/write memory
(R/W), is designed in such a way that information can be read on as well can be written on memory storage
area. Random-access memory loses its contents if power failure occurs hence this comes under volatile type
of memory. RAM usually uses a battery backup for retaining its contents during power outage. Now a day
almost every programmable logic controllers uses RAM having battery backup as its application memory.
Random-access memory is a very good means for easily creating new programs and altering the existing
programs, also it allows data entry. RAM is much faster than other types of memories. One of the problems
with a battery supported RAM is that the battery might eventually fail, to overcome this issue there is
constant monitoring on the status of the battery by the processor. Battery-supported RAM is generally found
to be sufficient for most programmable controller applications. If having battery backup is not possible then
RAM can be used in combination with the controller having a nonvolatile memory option. The benefits of
both volatile as well as nonvolatile memory can be achieved by using this type of memory arrangements.

Processor File: The control functions performed by the CPU are determined by the software program
written. The memory used for by the programmer for storing and manipulating the software is known as
the processor files. The CPU can hold one processor file at a time. The processor file consists of profiles
(upto 256 profiles/ controller), and data files (upto 256 data files/controller). There are four classifications
of program files and eleven classifications of data files, as shown in table

Program Files:- Program files are categorized into four types which are System functions,
Reserved, Main ladder programs, and Subroutine programs. An explanation of the four types of
program files is as follows :

File 0 System Functions. This file is used for a personal password, programs clarification, and
user-programmed information such as identifying which type of processor module is used and
which I/O modules are inserted into the slots of rack.

File 1 Reserved. If a block of memory is needed at some time in the future, this file is kept open
for that purpose.

File 2 Main Ladder Logic. The programming instructions , which are written by the PLC user,
are stored in this type of memory. The information contained in these program is utilized by the
CPU to perform the control functions of the PLC. The user program instructions create the main
ladder diagrams used to perform longer functions, mathematical calculations, data manipulations,
and other operations.

File 3 Subroutine programs are created by the user. They are accessed during the run mode
from the main ladder program when subroutine instructions are used. Subroutine programs help
conserve memory or reduce scan time.

Most of the work of the program files is generally done in file 2, the main program files. This file
contains ladder logic program, which are created by the user to control any particular application.

Data Files Data files contains the information that is used by the program files. The status of
input or output field devices is generally present in these Data files, it contains information like,
the accumulated value of a counter, the time expired in a timer, the result in an arithmetic
operations etc. These files can also be used to store, standard recurring instructions recipes, and
tables (if required). The data files are organized by the type of data they contain. Each one is
assigned a separate address to distinguish it from the others. Usually, a number and a letter are
both used to indicate the address.

Each file contains registers that can store 16-bit words. The data in the registers is organized
into segments called elements. These elements are given numerical addresses. On the basis of the
type of file, the elements have different sizes. For example, file 3, which is the bit file, uses
elements that are one word in length. File 3 holds 256 words that are addressed 0 to 255. File 4
which is the timer file contains 768 registers. Each timer instructions uses elements that contain
three 16 bit memory registers. Each element is assigned a numerical address to distinguish it from
another element and to indicate where it is located in data file 4. File 4 holds 256 elements that
addressed 0 to 255 :

The following list shows how the 256 data files are organized:

File 0 Output:- This file contains all the output data bits generated by the ladder circuit. This
bits are transferred to the terminals of output module and are applied to field devices as logic 0 or
1 states. This file uses 256-16 bit elements

File 1 Input:- This file stores the logic signals, produced by input field devices that are connected
to the terminals of the input module, for the controller to process. It uses 256-16 bit word elements.

File 2 Status:- This file identifies faults and stores information concerning the processor
operation. Arithmetic status bits and the math register are contained in this file. It has 256 16 bit
word registers

File 3 Bit:- This file is used primarily for internal relay logic instructions. Internal relay
instructions pertain to input and output contacts that are created on a ladder diagram, but are not
directly associated with external field devices instead, they are primarily used by a rung to perform
logic functions, and to affect input contacts on other rungs. Bit files are also used for shift register
and sequencer instructions.

File 4 Timer:-This file controls timing operations performed by the PLC each timer instruction
consist of three word stored in three consecutive registers. The first word stores the status bits, the
second word stores the preset value, the third word stores an accumulated value. The file has 765
registers. Since each timer instruction uses three word, 256 timer instructions can be used if
additional timers are needed, the user create more of them in the 10-255 data files space
[1]
File 5- Counter:- This file controls the counting operations performed by the PLC. Each counter
uses three words. The first word stores the status bits: the second word stores a preset value; the
third word stores accumulated value this file has 256 registers, so about 84 counter instructions
can be used. Additional counter instruction can be created in 10-255 data files space.

File 6- Control:- Each control instruction uses three words, control files are used for shift register
and sequencer instruction; the first word stores the status bits; the second word stores the length
of stored data; the third word indicates the pointer position. The maximum number of control
instructions is about 84.additional control instructions can be created in the 10-255 data files space.

File 7 Integer:- This file is used to store numerical value or bit information at the word and bit
level. The maximum length of this file is 256 words
File 8 Floating point reserved:- This file stores single precision non extended 32 bit numbers.

File 9- Ordinary or Network:- This file can be used either as an ordinary data file when the
processor is not connected to a networking configuration, or when the processor is on a network
consisting of SLC-500 devices only. This file can also be used for network transfer if non SLC-
500 devices exits on RS-485 link

File 10- 255:- These files can be used if additional storage is required for the bit, timer, counter,
control, floating point, string or ASCII operation data can be created on two ways for this user-
configured memory.

a) Assign address to instruction in a program

b) Create files with a memory map.

The following figure shows the relationship between the number assigned to the data files assigned
in the memory and the number used by the I/O terminals. The figure contains an output module in
partial memory map of the data file, an output module and field devices. The ladder diagram at the
bottom shows two input switching contacts connected in series with an output symbol. The ladder
diagram is programmed into the user program memory (program files)

A push button is wired to terminal 1, and a limit switch is wired to terminal 5 of the input module
located in slot 2. Pressing the push button will cause the corresponding status bit 1 in the input
data file to go from 0 to 1, and the limit switch closure causes bit 5 to be set to a 1. This input
status creates a True logic condition in the rung and causes the bit 2 of the output data file to
become 1. As a result corresponding output terminal 2 of the module located in slot 4 becomes
energized and turns on the output field device to which it is connected. If the push button or the
limit switch is open, the corresponding bit in the data file will be a 0 and the logic condition of the
rung becomes false and makes bit 2 of the output data file logic 0. Note that the number following
the colon in an I/Oaddress is the

You might also like