CANopen - Schnittstellenbeschreibung
HYDAC ELECTRONIC GMBH
07.10.2010
Mat. Nr. 669824
Seite 3 von 63
Inhaltsverzeichnis
Inhaltsverzeichnis..........................................................................................................................3
1 Allgemeines.................................................................................................................................6
1.1 Geltungsbereich .................................................................................................................6
1.2 Referenzen.........................................................................................................................7
1.3 Verwendete Abkürzungen / Begriffe....................................................................................8
2 Zusätzliche Sicherheitshinweise ...............................................................................................9
2.1 Symbol- und Hinweis-Definition ..........................................................................................9
2.2 Ergänzende Hinweise zur bestimmungsgemäßen Verwendung ..........................................9
2.3 Organisatorische Maßnahmen............................................................................................10
3 Elektrische Kenndaten ...............................................................................................................11
4 CANopen Informationen.............................................................................................................12
4.1 CANopen – Kommunikationsprofil ......................................................................................13
4.2 Prozess- und Service-Daten-Objekte..................................................................................14
4.3 Objektverzeichnis (Object Dictionary).................................................................................15
4.4 CANopen Default Identifier, COB-ID...................................................................................15
4.5 Übertragung von SDO Nachrichten.....................................................................................16
4.5.1 SDO-Nachrichtenformat ......................................................................................16
4.5.2 Lese SDO............................................................................................................18
4.5.3 Schreibe SDO .....................................................................................................19
4.6 Netzwerkmanagement, NMT ..............................................................................................20
4.6.1 Netzwerkmanagement-Dienste............................................................................21
4.6.1.1 NMT-Dienste zur Gerätekontrolle...................................................................................................21
4.6.1.2 NMT-Dienste zur Verbindungsüberwachung .................................................................................22
4.7 Layer setting services (LSS) und Protokolle........................................................................23
4.7.1 LSS-Modes und Dienste......................................................................................24
4.7.2 Übertragung von LSS-Diensten ...........................................................................26
4.7.2.1 LSS-Nachrichtenformat ..................................................................................................................26
4.7.3 Switch mode Protokolle.......................................................................................26
4.7.3.1 Switch mode global Protokoll..........................................................................................................26
4.7.3.2 Switch mode selective Protokoll......................................................................................................27
4.7.4 Configuration Protokolle ......................................................................................28
4.7.4.1 Configure Node-Id Protokoll............................................................................................................28
4.7.4.2 Configure bit timing parameters Protokoll .......................................................................................29
4.7.4.3 Activate bit timing parameters Protokoll ..........................................................................................30
4.7.4.4 Store configuration Protokoll...........................................................................................................30
4.7.5 Inquire LSS-Address Protokolle...........................................................................31
4.7.5.1 Inquire Identity Vendor-ID Protokoll ................................................................................................31
4.7.5.2 Inquire Identity Product-Code Protokoll ..........................................................................................31
4.7.5.3 Inquire Identity Revision-Number Protokoll.....................................................................................32
4.7.5.4 Inquire Identity Serial-Number Protokoll..........................................................................................32
4.7.5.5 Inquire Node-ID Protokoll................................................................................................................33
4.7.6 Identification Protokolle .......................................................................................34
4.7.6.1 LSS identify remote slave Protokoll.................................................................................................34
4.7.6.2 LSS identify slave Protokoll.............................................................................................................35
4.7.6.3 LSS identify non-configured remote slave Protokoll........................................................................35