Printed in the Federal Republic of Germany
TR-Electronic GmbH 2010, All Rights Reserved
01/20/2017
TR - ELA - BA - DGB - 0016 - 04
Page 137 of 183
3.9.6 Identification protocols
3.9.6.1 LSS identify remote slave protocol
The given protocol has implemented the
LSS identify remote slave service
.
By means of the LSS master LSS slaves in the network can be identified within a
certain range. All LSS slaves with matching Vendor-ID, Product-Code, Revision-No.
Range and Serial-No. Range, response with the
LSS identify slave protocol
.
LSS-Master --> LSS-Slave
0
1
2
3
4
5
6
7
COB-ID
CS
Vendor-ID
(
≙Index 1018h:01)
Reserved by CiA
0x7E5
70
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Product-Code
(
≙Index 1018h:02)
Reserved by CiA
0x7E5
71
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Revision-No. LOW
Reserved by CiA
0x7E5
72
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Revision-No. HIGH
Reserved by CiA
0x7E5
73
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Serial-No. LOW
Reserved by CiA
0x7E5
74
LSB
MSB
0
1
2
3
4
5
6
7
COB-ID
CS
Serial-No. HIGH
Reserved by CiA
0x7E5
75
LSB
MSB
3.9.6.2 LSS identify slave protocol
The given protocol has implemented the
LSS identify slave service
. All LSS
slaves with matching LSS attributes given in the
LSS identify remote slave
protocol
, response with this protocol.
LSS-Slave --> LSS-Master
0
1
2
3
4
5
6
7
COB-ID
CS
Reserved by CiA
0x7E4
79