mtc200/trans200 system services
TRANSCRIPT
Application Manual
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
SYSTEM200
MTC200/TRANS200System Services
About this Documentation System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
MTC200/TRANS200
System Services
Application Manual
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Document Number 120-0400-B380-01/EN
This documentation describes the system services of the controllerfamilies MTC200, ISP200 and TRANS200 with the functions SystemConfigurator, Data Backup, E-mail Connection, License Management,WinLock and Logic Analysis.
Description ReleaseDate
Notes
120-0400-B380-01/EN 08.02 Valid from version 22
� 2002 Rexroth Indramat GmbH
Copying this document, giving it to others and the use or communicationof the contents thereof without express authority, are forbidden. Offendersare liable for the payment of damages. All rights are reserved in the eventof the grant of a patent or the registration of a utility model or design(DIN 34-1).
The specified data is for product description purposes only and may notbe deemed to be guaranteed unless expressly confirmed in the contract.All rights are reserved with respect to the content of this documentationand the availability of the product.
Rexroth Indramat GmbHBgm.-Dr.-Nebel-Str. 2 • D-97816 Lohr a. Main
Telephone +49 (0)93 52/40-0 • Tx 68 94 21 • Fax +49 (0)93 52/40-48 85
http://www.boschrexroth.de/
Dept. BRC/ESS (FW)
Dept. BRC/ESM6 (DiHa)
This document has been printed on chlorine-free bleached paper.
Title
Type of Documentation
Document Typecode
Internal File Reference
Purpose of Documentation
Record of Revisions
Copyright
Validity
Published by
Note
System Services Contents I
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Contents
1 General 1-1
1.1 Overview ........................................................................................................................................ 1-1
1.2 System Configurator ...................................................................................................................... 1-1
1.3 Data Backup................................................................................................................................... 1-1
1.4 Logic Analyzer................................................................................................................................ 1-1
1.5 E-mail Connection.......................................................................................................................... 1-1
1.6 License Management..................................................................................................................... 1-1
1.7 WinLock ......................................................................................................................................... 1-2
2 System Configurator 2-1
2.1 Overview of System Configurator .................................................................................................. 2-1
Field of Application................................................................................................................... 2-1
Menu Structure and Data Input................................................................................................ 2-1
Installating and Calling the System Configurator..................................................................... 2-2
Example Scenario.................................................................................................................... 2-2
2.2 Information about the System Configurator ................................................................................... 2-3
Device Type ............................................................................................................................. 2-3
Device/Device Address............................................................................................................ 2-3
Checking Free Serial Ports ...................................................................................................... 2-3
Communication Address.......................................................................................................... 2-4
Updating the Directory Structure.............................................................................................. 2-4
File Menu ................................................................................................................................. 2-4
Options Menu........................................................................................................................... 2-4
2.3 System Configurator Functions...................................................................................................... 2-5
Overview .................................................................................................................................. 2-5
Create New Device .................................................................................................................. 2-6
Edit Device............................................................................................................................... 2-8
Delete Device......................................................................................................................... 2-10
Cut Device.............................................................................................................................. 2-10
Copy Device........................................................................................................................... 2-10
Paste Device.......................................................................................................................... 2-10
Shift Device Up ...................................................................................................................... 2-11
Shift Device Down.................................................................................................................. 2-11
2.4 Assistant for Configuration Support of Serial Devices ................................................................. 2-11
Starting the Assistant ............................................................................................................. 2-12
Select Device Type ................................................................................................................ 2-12
Select Interface ...................................................................................................................... 2-13
Starting the Scan ................................................................................................................... 2-13
II Contents System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Results ................................................................................................................................... 2-14
3 Data Backup 3-1
3.1 Introduction..................................................................................................................................... 3-1
Chapter Overview .................................................................................................................... 3-1
Purpose of this Documentation................................................................................................ 3-1
Determining Hardware and Software Configuration ................................................................ 3-1
Software ................................................................................................................................... 3-2
Why Backup Data? .................................................................................................................. 3-2
Backup Mechanisms................................................................................................................ 3-3
Which Data should be Saved?................................................................................................. 3-4
When should Data be Backed up or Restored? ...................................................................... 3-4
3.2 Backup Strategies .......................................................................................................................... 3-5
Chapter Overview .................................................................................................................... 3-5
Backing up a Stand-alone Controller ....................................................................................... 3-5
Backing up a Networked Controller ......................................................................................... 3-6
3.3 Archiving User Data ....................................................................................................................... 3-7
Chapter Overview .................................................................................................................... 3-7
Procedure................................................................................................................................. 3-7
Selecting Data........................................................................................................................ 3-10
Batch Files ............................................................................................................................. 3-10
Executing a Backup ............................................................................................................... 3-12
Executing a Restore............................................................................................................... 3-18
Mapping Drives ...................................................................................................................... 3-21
3.4 Complete Backup......................................................................................................................... 3-22
Chapter Overview .................................................................................................................. 3-22
System Overview ................................................................................................................... 3-22
Carrying Out a Complete Backup .......................................................................................... 3-26
Carrying out a System Restore.............................................................................................. 3-28
Symantec Ghost 7.5 Hard Disk Imaging Software ................................................................ 3-32
Cloning a Controller with Symantec Ghost 7.5 ...................................................................... 3-36
4 Logic Analyzer 4-1
4.1 Introduction..................................................................................................................................... 4-1
4.2 Working with the Logic Analyzer.................................................................................................... 4-2
Creating a new measurement.................................................................................................. 4-2
Selecting variables to be recorded .......................................................................................... 4-3
Defining trigger conditions ....................................................................................................... 4-4
Making a recording .................................................................................................................. 4-6
Analyzing a recording .............................................................................................................. 4-7
4.3 Logic Analyzer Reference.............................................................................................................. 4-9
Function keys........................................................................................................................... 4-9
Status line .............................................................................................................................. 4-10
Menu structure ....................................................................................................................... 4-10
Variables list........................................................................................................................... 4-14
Trigger settings ...................................................................................................................... 4-15
System Services Contents III
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Options................................................................................................................................... 4-18
Working with markers ............................................................................................................ 4-20
5 E-mail Connection 5-1
5.1 Overview ........................................................................................................................................ 5-1
5.2 Performance Features ................................................................................................................... 5-1
5.3 Definition of Terms......................................................................................................................... 5-2
5.4 Exclusions ...................................................................................................................................... 5-3
5.5 System Requirements.................................................................................................................... 5-3
Hardware.................................................................................................................................. 5-3
Network Connection................................................................................................................. 5-3
Software ................................................................................................................................... 5-3
5.6 Installation ...................................................................................................................................... 5-4
User Rights .............................................................................................................................. 5-4
Licensing .................................................................................................................................. 5-4
5.7 E-mail Programming ...................................................................................................................... 5-5
Overview .................................................................................................................................. 5-5
Minimum Configuration ............................................................................................................ 5-6
Menu Settings .......................................................................................................................... 5-7
Recipient Menu ...................................................................................................................... 5-10
Group Menu ........................................................................................................................... 5-10
Messages Overview Menu..................................................................................................... 5-14
Which Message Classes Exist?............................................................................................. 5-15
6 License Management 6-1
6.1 General........................................................................................................................................... 6-1
6.2 Installation ...................................................................................................................................... 6-2
6.3 Use of Options ............................................................................................................................... 6-2
6.4 License Management Tool............................................................................................................. 6-3
Functionality............................................................................................................................. 6-3
Calling and User Rights ........................................................................................................... 6-3
"General" Tab........................................................................................................................... 6-4
"Code" Tab............................................................................................................................... 6-5
"Transfer" Tab.......................................................................................................................... 6-7
"Component Overview" Tab..................................................................................................... 6-8
7 WinLock 7-1
7.1 General........................................................................................................................................... 7-1
License..................................................................................................................................... 7-1
Mode Switching........................................................................................................................ 7-1
Exiting Windows....................................................................................................................... 7-2
Starting Programs.................................................................................................................... 7-2
Rights ....................................................................................................................................... 7-3
Multilingual Function ................................................................................................................ 7-3
Command Line Parameters ..................................................................................................... 7-3
Rear Door................................................................................................................................. 7-4
IV Contents System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Starting Services...................................................................................................................... 7-4
7.2 Installation ...................................................................................................................................... 7-5
Installing ................................................................................................................................... 7-5
7.3 Configuration.................................................................................................................................. 7-6
Windows Users ........................................................................................................................ 7-6
Operator Rights........................................................................................................................ 7-6
7.4 FAQ................................................................................................................................................ 7-7
Will Not Start in Protected Mode.............................................................................................. 7-7
Starts Only Once in Protected Mode ....................................................................................... 7-7
Rexroth Indramat User Administration Does Not Work ........................................................... 7-7
Multilingual Display Does Not Work......................................................................................... 7-7
OPC Server or DCOM Communication Does Not Work.......................................................... 7-7
8 List of Figures 8-1
9 Index 9-1
10 Service & Support 10-1
10.1 Helpdesk ...................................................................................................................................... 10-1
10.2 Service-Hotline............................................................................................................................. 10-1
10.3 Internet ......................................................................................................................................... 10-1
10.4 Vor der Kontaktaufnahme... - Before contacting us..................................................................... 10-1
10.5 Kundenbetreuungsstellen - Sales & Service Facilities ................................................................ 10-2
System Services General 1-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
1 General
1.1 Overview
This documentation describes the installation of the MTC200 andTRANS200 control systems. The following individual components aredescribed:
• System Configurator
• Data Backup
• Logic Analyzer
• E-mail Connection
• License Management
• WinLock
1.2 System Configurator
The System Configurator is an editor that is used to describe andconfigure the devices connected to the Control PC. The device address,the device type and the description of the communication path to the unitcan be configured. This creates a 1:1 image of the device structure that isconnected to the controller PC and determines the form ofcommunication between the user interface and the devices connected.
1.3 Data Backup
Backup of program, user and configuration data is an importantcomponent of an EDP system. The MTC200/TRANS200 system providesmultiple backup levels with differing data capacities. In addition, completebackups can be made using external programs.
This documentation describes the execution of a data backup at theworkstations of a MTC200/TRANS200 system unit.
1.4 Logic Analyzer
The Logic Analyzer allows recording, analysis and documentation ofinternal control processes. It monitors up to 16 variables and recordschanges in variable values. The variables to be monitored can be freelychosen. After recording, the variables are displayed as a curve on a timeaxis. In addition, display of events is possible.
1.5 E-mail Connection
The e-mail connection allows event-driven sending of messages, forexample maintenance instructions or fault messages, via e-mail, SMS orfax to various devices such as a PC, cell phone or pager.
1.6 License Management
This administers licensing of the number of MTGUI standard functions aswell as the release of certain additional components (options).
1-2 General System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
1.7 WinLock
WinLock allows blocking of the Windows interface so that only certainprograms can be started and prevents changes to the Windowsconfiguration.
System Services System Configurator 2-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
2 System Configurator
2.1 Overview of System Configurator
Field of ApplicationThe System Configurator is an editor that is used to describe the devicesconnected to the control PC. The device address, the device type and thedescription of the communication path to the unit are employed for thispurpose. The goal is to create an 1:1 image of the unit structure (knownas the system configuration) that is connected to the control PC. Thesystem configuration is stored in the control PC.
The System Configurator is used by the function interface and the userinterface (MTGUI) for organizing communication with devices connectedto the control PC.
Menu Structure and Data Input
The left-hand half of the screen shows a graphical representation of theconfigured units in a tree diagram. For the device selected in the tree, thecorresponding data is displayed on the right-hand side of the screen.
When entering data, for example when creating a new device or whenediting an existing device, the user is guided by an Assistant. TheAssistant splits the data entry into several steps.
SystemConfiguration.bmp
Fig. 2-1: System Configurator with two devices
Menu Structure
Data Input
2-2 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Installating and Calling the System ConfiguratorThe System Configurator is installed when installing the MTGUI. TheSystem Configurator is started automatically after installation.
Note: The System Configurator is an independent program and mustbe started at least once before starting the MTGUI. TheSystem Configurator and the user interface cannot besimultaneously active. The System Configurator must beexited before starting the MTGUI.
The setup program creates a link to the System Configurator on theDesktop. Simultaneously, a link is added in the Rexroth Indramat programpath in the start menu. In both cases, the System Configurator is starteddirectly by the “Syscon.exe” program call.
Example Scenario
If, for example, for an MTC200-R-G2, address 0 is selected at theselector switch, and is connected via RS232 to COM2 of the Control PC,the configuration must be entered in the System Configurator, i.e. adevice of type MTC200-R-G2, with device address 0, with acommunication address that includes the settings RS232 and COM2,etc..
If the physical configuration of a device is changed, the device must bemodified or edited in the System Configurator. If, for example, theconnection of device 0 to the Control PC is modified from COM2 toCOM1, device 0 must be edited in the System Configurator. This meansthat COM1 has to be selected instead of COM2 as the channel in thecorresponding communication address.
Connecting a New Device
Changing an Existing Device
System Services System Configurator 2-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
2.2 Information about the System Configurator
Device TypeThe device types available in this specific installation of the SystemConfigurator are shown in the "Device Type" selection list in the first stepof the "New Device" function (see step 1).
The following list shows device types which are available depending onthe installation.
Device Type Class Explanation
MTVNC MTCX Virtual MTC
MTC200-P-G2 MWCX MTC with PLC PC variant
MTC200-R-G2 MWCX MTC with PLC RECO variant
MTA200-P-G2 MTAX MTA with WIN-PLC PC variant
ISP200-P-G2 MWSX Standalone WIN-PLC PC variant
ISP200-R-G2 MWSX Standalone WIN-PLC RECO variant
SYNAX200-P MSYX SYNAX as PC variant
SYNAX200-R MSYX SYNAX as RECO variant
SYNAXISP200-P-G2 MWYX SYNAX with PLC
SYNAXISP200-R-G2 MWYX SYNAX with PLC
SERCANS-A MSCX SCS-A card
SERCANS-P MSCX SCS-P card
TRA200-R MTRX TRANS200 as RECO variant
ECODRIVE03 MECX ECODRIVE03
ISP200-S-G2 MWSX Soft ISP
MTC200-S-G2 MWCX Soft MTC
VMISP200-P-G2 MWMX VisualMotion with PLC
VMISP200-R-G2 MWMX VisualMotion with PLC
Fig. 2-2: Device types and classes
Device/Device AddressA device is understood to mean, for example, control hardware or a drivedevice.
The range of values for entering the device address is 0 to 63.
Checking Free Serial PortsA check of the free serial ports is performed. Serial ports already in use(e.g. mouse) are not offered when editing communication addresses inthe System Configurator.
The check can be disabled (Menu “Options”, Entry “Show only free COMports”).
2-4 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Communication AddressThe communication address is a Rexroth Indramat specific data setwhich describes the communication path to the device. Thecommunication address has a symbolic identifier which consists of thefixed part CommAddr and a number, e. g. CommAddr2. Up to 8communication addresses can be specified (CommAddr1 toCommAddr8).
Note: Devices connected to the same serial port have the samecommunication address.
Updating the Directory StructureWhen saving the system configuration data, an update of the directorystructure will be carried out if necessary. The update of the directories willonly be carried out if devices have been deleted or new devices havebeen added.
File MenuThe “File” Menu contains the “Save” and “Exit” menu items.
The system configuration is saved (see also chapter "Updating theDirectory Structure ").
If changes have been made, a message box will ask whether to save andexit or exit without saving.
Options Menu
See chapter "Information about the System Configurator".
The server service required for interconnection is started the next time theuser interface is started.
The device interrogation cycle is activated or deactivated, i.e. the devicestatus (error status, device online, ...) is continuously checked.
It is furthermore possible to determine how often this interrogation is to becarried out.
Synchronization of time and date between the control and the PC.
Setting to determine what, if any, information should be displayed duringuser interface start-up.
Save
Exit
List Free Ports
Network Active
Device Interrogation Cycle
Time/Date Synchronization
Startup Display
System Services System Configurator 2-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
2.3 System Configurator Functions
Overview
Menüauswahl.bmp
Fig. 2-3: Edit menu
The functions can be called in the Edit menu with the menu items New,Edit, Insert, Copy, Delete, Cut, Shift Up, Shift Down or with the toolbarbutton to which the command is assigned.
Note: The underlined words correspond to the function designationsin the Edit menu.
The command New has the effect that this new device will be insertedbefore the device currently selected in the tree.
The content of the functions create New device, Edit device and Pastedevice (See chapter Create New Device, Edit Device and Paste Device)depends on the device type. The following tables provide an overview ofthese functions.
Create NewDevice
Devices except MTVNC MTVNC
Step 1 Select device type Select device type
Step 2 Select device address Select device address
Step 3 Enter device name and devicestatus
Enter device name and devicestatus
Step 4 Select component type 1/2 No selection
Step 5 Enter communication address Configuration of MTVNC (startmode, memory size)
Fig. 2-4: Steps for creating new device
2-6 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Edit Device Devices except MTVNC MTVNC
Step 1 Enter device name and devicestatus
Enter device name and devicestatus
Step 2 Select component type 1/2 No selection
Step 3 Enter communication address Configuration of MTVNC (startmode, memory size)
Fig. 2-5: Steps for editing new device
Paste Device Devices except MTVNC MTVNC
Step 1 Select device address Select device address
Step 2 Enter device name and devicestatus
Enter device name and devicestatus
Step 3 Select component type 1/2 No selection
Step 4 Enter communication address Configuration of MTVNC (startmode, memory size)
Fig. 2-6: Steps for pasting device
Create New DeviceThe function can be called in the Edit Menu, via the menu item New orvia the toolbar button New. The new device is inserted ahead of thedevice currently marked in the tree.
When entering data, the user is guided by an Assistant. The Assistantsplits the data entry into several steps. The creation of a new device isfinished using the button Finish in the last step.
Menüauswahl_neu.bmp
Fig. 2-7: New menu selection
System Services System Configurator 2-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Create New Device, Step 1The device type is selected in this step. The device type must correspondto the device connected to the control PC.
Note: The device type cannot be changed after it has been created.
Create New Device, Step 2The device address is selected in this step.
If the device is connected to the control PC by a serial connection, thedevice address must correspond to the participant’s address selected atthe device by the selector switch.
Note: The device address must be unambiguous.
The device address cannot be changed after it has beencreated.
Create New Device, Step 3The device name is entered and the device status given. The devicename may include up to 32 characters and should not include specialcharacters.
Note: Set the device status to ON if the device exists and is ready,otherwise to OFF.
Create New Device, Step 4The component type is selected in this step. The selection list ofpermissible combinations can be opened with the ALT + ↓ keys.
Create New Device, Step 5A communication address is assigned to the device. A communicationaddress must first be selected in the “Comm. Address” selection list.
In the selection list, only communication addresses are offered thatcorrespond to the device type of the device being currently edited and thathave not yet been used by other devices. Devices connected via a serialport are an exception. See note.
If no communication address yet exists, it must be created by using theNew entry in the selection list or via the New toolbar button.
The communication address data depends on the device type and isdisplayed in the corresponding entry fields. The data must correspond tothe device settings.
� For further information on devices, please refer to the technicaldocumentation for the device.
Devices except MTVNC and SoftControl
2-8 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Note: If devices are connected to the control PC via a serialconnection, it is possible that several devices use the samecommunication path (the same communication address), forexample when using the RS485 protocol. The devices areaddressed by the participant’s device address selected by theselector switch.
The start mode of the MTVNC or Soft Control can be changed via theselection list:
ON: The device is started when starting the MTGUI.
OFF: The device is not started.
Note: If device status is ON, the start mode of the MTVNC isautomatically set to ON. The start mode can only be changedif the device status is set to OFF.
The amount of computer memory used by the MTVNC can be adjusted tomeet requirements:
Default: 512KB
Range of values: from 256KB to 16383KB in steps of 1 KB
The Options entry can be accessed using the Extended button. Theseoptions are not needed for normal use.
Note: For the Options entry, data may only be entered according toprior agreement with Rexroth Indramat personnel. In normaloperation, no data is entered.
Edit DeviceThe device to be edited must be selected in the “System Configuration”tree.
Editing of the device can be initiated by means of the Enter key or via theEdit device entry in the Edit Menu as well as via the Edit device toolbarbutton.
MTVNC and Soft Control
MTVNC
System Services System Configurator 2-9
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Menüauswahl_bearb.bmp
Fig. 2-8: Edit menu selection
When editing data, the user is guided by an Assistant. The Assistant splitsthe data entry into several steps. The Edit Device function will be finishedusing the Finish button in the last step.
Note: The device address and the device type cannot be changed.
Edit Device, Step 1The device name is entered and the device status given. The devicename may include up to 32 characters and should not include specialcharacters.
Note: Set the device status to ON if the device exists and is ready,otherwise to OFF.
Edit Device, Step 2The component type is selected in this step. The selection list ofpermissible combinations can be opened with the Alt + ↓ keys.
Edit Device, Step 3
The communication address data can be changed and a newcommunication address created. Furthermore, the communicationaddress currently assigned to a device can be changed.
The communication address selected in the selection box “Comm.Address” is assigned to the device.
In the selection list, only communication addresses are offered thatcorrespond to the device type of the device being currently edited and thathave not yet been used by other devices. Devices connected via a serialport are an exception. See note.
The communication address data depends on the device type and isdisplayed in the corresponding entry fields. This data must correspond tothe device settings. For further information on devices, please refer to thetechnical documentation for the device.
Devices except MTVNC and SoftControl
2-10 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Note: If devices are connected to the control PC via a serialconnection, it is possible that several devices use the samecommunication path (the same communication address), forexample when using the RS485 protocol. The devices areaddressed by the participant’s device address selected by theselector switch.
See Create New Device, Step 5
Delete DeviceThe device to be deleted must be selected in the “System Configuration”tree.
The selected device is deleted via the Delete entry in the Edit menu, orvia the Delete toolbar button, as well as via the <Del> keyboard key. Asecurity prompt then appears.
Note: By deleting a device, the data in the directory of this device willalso be deleted.
Cut DeviceThe device which is to be cut must be selected in the “SystemConfiguration” tree.
The selected device is deleted and copied into a temporary buffer via theCut entry in the Edit menu or via the Cut toolbar button. A securityprompt then appears.
For inserting the device, see chapter "Paste Device".
Copy DeviceThe device to be copied must be selected in the “System Configuration”tree.
The selected device is copied into a temporary buffer via the Copy entryin the Edit menu or via the Copy toolbar button.
For inserting the device, see chapter "Paste Device".
Paste DeviceIf a device is saved in the temporary buffer, it can be inserted via thePaste device function. The device will be inserted ahead of the devicecurrently selected in the “System Configuration” tree.
The user must enter a device address when the device is inserted. Ifnecessary, further settings may be changed. The user is guided throughthis process by an Assistant. The following general procedure is valid:
1. The device address must be assigned as in Step 1 (See 'Create NewDevice').
From Step 2 on, the same steps as for the Edit Device function are gonethrough.
2. In Step 2 of Insert Device, the device name and the device status areset.
3. In Step 3 of Insert Device, component type 1/2 is chosen.
4. In Step 4 of Insert Device, the communication address is edited or theMTVNC configured.
MTVNC
System Services System Configurator 2-11
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Note: Copy/Cut/Insert includes the device system configuration data(device type etc.). It does not include data such as NCprograms or message texts, which are located in the devicedirectories.
Shift Device UpThe device to be shifted must be selected in the “System Configuration”tree.
The selected device is shifted one entry up in the tree via the Shift deviceup entry in the Edit menu or via the Shift device up toolbar button.
Shift Device DownThe device to be shifted must be selected in the “System Configuration”tree.
The selected device is shifted one entry down in the tree via the Shiftdevice down entry in the Edit menu or via the Shift device down toolbarbutton.
2.4 Assistant for Configuration Support of Serial Devices
The System Configurator, with the help of an Assistant, offers aconvenient way of finding devices connected via a serial port . It scans theserial ports looking for connected devices and creates a systemconfiguration from its results for devices found. Device types TRA200-Rand Synax200-R are supported.
2-12 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Starting the AssistantThe Assistant can be started by the menu Tools -> Find serial devices.
ScanStart.bmp
Fig. 2-9: Starting the Assistant
Select Device TypeThe user must specify which kind of device the Assistant must look for onthe serial port. A device class must be selected which contains one ormore device types.
ScanChooseType.bmp
Fig. 2-10: Select device types
System Services System Configurator 2-13
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Select InterfaceIn this step, the serial interfaces to be searched for devices are entered.For this, the user must enter the channel, the Baud rate and the mode.The Extended button allows entry of additional parameters on parity,polarity and device address.
ScanChoosePortParams1.bmp
Fig. 2-11: Serial port parameters
Starting the ScanBy pressing the Next button, the recognition procedure is started. Theprogress of the automatic search is displayed.
ScanProgress.bmp
Fig. 2-12: Progress display
2-14 System Configurator System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
ResultsAfter the scan, devices found are displayed in the System Configurator.
ScanResult.bmp
Fig. 2-13: Scan results
The Finish button accepts the results of the scan. The Cancel buttonrejects the results of the scan.
If no devices corresponding to the parameters are found, the user isinformed via a message box. The procedure must, if necessary, berepeated with new settings.
System Services Data Backup 3-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3 Data Backup
3.1 Introduction
Chapter OverviewThis chapter gives an overview of the data structure, the backupmechanisms and the data organization of the SYSTEM200 control family.
Purpose of this DocumentationThis documentation describes the execution of a data backup at theworkstations of a SYSTEM200 system unit. Both stand-alone systemsand networked systems are considered.
Determining Hardware and Software ConfigurationThis description refers exclusively to the following components.
Hardware
The following hardware requirements must be met by the SYSTEM200control PC:
• IBM PC/AT or compatible system; recommended ≥ 80486DX2/66• min. RAM 32 MB• min. free space on hard drive 16 MB• Ethernet PCI-Network card 10/100 MB
The following requirements must be met by the backup server:
• IBM PC/AT or compatible system; recommended Pentium ≥ 400MHz• Operating system NT 4.0 with Service Pack ≥ 5 or WIN2000 with
Service Pack ≥ 2• min. RAM 64 MB (NT) or 128 MB (WIN2000)• Min. free hard drive space for a compressed system backup should be
around 60% of the data volume to be backed up. (e.g.: for 5 controllers,each with 2 GB to be backed up, the backup server should have a freehard drive capacity of 5 * 2GB * 0.6 = approx. 6 GB.
• Ethernet PCI-Network card 10/100 MB• For system backup, a NetBEUI or TCP/IP network connection is
necessary.
The following requirements must be met by the network:
• 10/100 MB Ethernet network
• The NetBEUI and TCP/IP protocols are supported by the systembackup.
• Depending on the backup protocol chosen (NetBEUI or TCP/IP), thenetwork must support this protocol from the controller to the backupserver. This also means that the protocol must be capable of beingrouted between different segments if needed.
• If the system backup is carried out using the TCP/IP settings pre-configured by Bosch Rexroth, the network must provide a DHCPconnection for the controller to be backed up.
SYSTEM200
Backup Server
Network
3-2 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Software
IBM PC-DOS V7.1 on the control PC (pre-installed).
To carry out a complete backup of a SYSTEM200 controller, the pre-installed Norton Ghost V7.5 hard drive imaging software is used.
All parts of this software are subject to a license contract and may only beused in conjunction with the license agreement. For installation andconfiguration follow the documentation notes supplied with the software.
Bosch Rexroth backup/restore software.
Why Backup Data?EDP systems are not static systems. Data is continuously created,modified, moved or deleted. Components are added or removed, updatesare carried out and settings are modified. There are many reasons forcarrying out a data backup:
• Saving of data in case of a hardware failure
• Restoring the system environment after incorrect operation
• Saving main system settings
• Archiving a system state before carrying out an update
• Providing an identical system environment
The SYSTEM200 provides multiple backup levels with differing datacapacities.
Operating System
Imaging Software
Backup/Restore of User Data
System Services Data Backup 3-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Backup MechanismsFor the backup and/or the restore of the different data areas, various backupmechanisms are available.
User data is backed up on a local or external backup drive using theBosch Rexroth "Backup" data backup program. After a system failure,user data can be restored using the Bosch Rexroth "Restore" program.
6BackupRestore.bmp
Fig. 3-1: Backup/Restore of user data
The complete backup is the most comprehensive backup method. Itencompasses all data and is carried out using the Norton Ghost harddrive imaging software. When creating a complete backup, an image ofthe complete hard drive or partition is created and written to an externaldrive in the form of an image file. This image contains, along with bootinformation, the complete operating system together with all userapplications installed and all user data to be found on the system.
6Imaging.bmp
Fig. 3-2: System backup/System restore
This complete backup is the only way of restoring an identical systemenvironment after a hardware failure.
User Data
Complete Backup
3-4 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Which Data should be Saved?
User data loaded in the controller (e.g. NC programs, NC variables etc.)should be among the data to be saved.
Further user data can be found on the hard disk, e.g. NC programs/PLCprograms, machine parameters, tool data, NC variable lists andconfiguration files, etc.
These include control interface program and language files.
These include WindowsNT interface program and configuration files, thenetwork environment, and service packs.
When should Data be Backed up or Restored?
User Data
• for archiving after the project is completed
• after setup
• before testing
• before carrying out software and firmware updates
• cyclically at fixed time intervals
• after an incorrect software and firmware update
• after incorrect operation
• after replacing PLC, NC or drives containing firmware
• after replacing a hard disk containing pre-installed software
Complete Backup
• at fixed time intervals
• before replacing hardware, e. g. installation of a larger hard disk
• after handing over to the customer
• after a hard disk failure
• after a complete control system crash
• for duplication of a control system
Note: Please take the operating system and the Bosch Rexrothsoftware licensing agreements into account when a hard diskor a partition is duplicated.
User Data
User Interface Data
Operating System Data
Backup
Restore
Backup
Restore
System Services Data Backup 3-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3.2 Backup Strategies
Chapter OverviewThis chapter describes the Bosch Rexroth AG data backup concept forbacking up and restoring system and user data for the WIN NT andWIN2000 operating systems.
This solution applies to current devices (BTV20.3 and BTV15) as well asthe new BTV16 and BTV40 generation of products. The Symantec GhostCorporate Edition Version 7.5 is used as the hard disk imaging software.
For maintenance and availability reasons, the solution uses standardcomponents only, generally already present in a system. For this reason,no use is made of external backup media such as MO drives, CDrewriters, etc.
Data backup essentially differentiates between the backup of a completesystem state and cyclical backup of user data. A system backup createsan image of the system, including all system data such as boot partition,operating system, etc., using a hard disk cloning tool, whereas a normaldata backup cyclically backs up user data such as PLC or CNC programsaccording to a backup plan. This procedure allows the user, should afailure occur, to independently return to a defined system state afterreplacing the hardware (e.g. hard disk) using the existing system andwithout additional aids.
Backing up a Stand-alone ControllerWhen backing up a stand-alone controller, a backup computer isconnected to the controller’s network card via cross-link cabling.
Using this connection, both backup of user data and a complete systembackup to the backup computer can be carried out.
On a backup computer (notebook) running the Windows operatingsystem NT or WIN2000.
1. Connect the backup computer to the controller’s network card via across-link cable.
2. Install the NetBEUI protocol or optionally the TCP/IP protocol on bothcontroller and backup computer. (recommended: NetBEUI)
3. Check the network connection by browsing the network environmentusing Windows Explorer.
What is the Data Saved On?
Network Connection
3-6 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
7StandAlone_BTV.bmp
Fig. 3-3: Backing up a stand-alone controller
Backing up a Networked ControllerNetworked controllers allow both backup of user data and a completesystem backup to a backup server in the network.
On a backup server running the Windows operating system WinNT orWIN2000. The server must have sufficient hardware installed (seechapter "Backing up a Networked Controller") to hold data from multiplecontrol systems in the installation.
The NetBEUI or TCP/IP protocols are supported by the data backup.
7Vernetztes_BTV.bmp
Fig. 3-4: Backing up a networked controller
What is the Data Saved On?
Network Connection
System Services Data Backup 3-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3.3 Archiving User Data
Chapter OverviewThis chapter describes how user data is archived (backup and restore)with the help of the archiving program delivered with the controller.
ProcedureData files on the hard disk are saved and can be restored as necessarywith the help of an archiving program. The files are compressed andwritten to the data storage medium during the archiving process.Diskettes, local or networked hard disks can be used as media forarchiving.
8Uebersicht.bmp
Fig. 3-5: User data archiving procedure
Data Not Included in ArchivingNot all of the total system data is saved with the archiving function.Optional Rexroth Indramat systems such as Dolfi, Application Builder,Screen Manager and SFP are not saved. In addition, external programssuch as the NC programming systems ARTIS, external SFP, etc., are notsaved. This data can only be saved by executing a complete backup.
3-8 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
PreparationBefore beginning the backup, data within the controller that can bemodified (residual PLC data, SERCOS parameters) must be saved tohard disk. This is done in the corresponding menus.
The remaining controller data (NC variables, NC events, D-corrections,NC programs, NC zero-point data, NC cycles, machine parameters andmachine data) are automatically offered for backup during a completebackup procedure and, if necessary, written to hard disk before thebackup starts.
The SERCOS parameters are saved by means of the “Drive Parameters”menu entry.
Current tools lists are present in the tools database on the hard disk andare also backed up.
PLC data are archived using the WinPcl "Archive".
BackupThe backup consists of two steps. The data to be saved is defined in abatch file. Firstly, all data to be saved is copied to a temporary bufferdirectory on the local hard disk. In addition to the temporary bufferdirectory, the structure file "archive.asl" is created. This structure fileincludes all necessary information about the saved data (e. g. origin, date,etc.). Compression is first done after ensuring that all files to be saved areavailable. The complete temporary buffer directory content is alwayscompressed. The result of compression is a ZIP file. A ZIP file whichexceeds the size of the selected storage medium is automatically splitacross multiple media. When compression is finished, the temporarybuffer directory and all sub-directories are deleted.
Create temporary directorystructure and files
Batchfile
Temp.director. file
Compress
ZIP file
Structure
3Abl-Back.FH7
Fig. 3-6: Procedure for saving user data
SERCOS Parameters
Tools Lists
PLC Data
System Services Data Backup 3-9
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
RestoreFrom the selected archive file (ZIP file), the files are decompressed into atemporary buffer directory. The complete archive file contents are alwaysdecompressed. Single files cannot be restored. The files are copied totheir destination directories only after fault-free decompression of all files.The temporary buffer directory is deleted after the files have beensuccessfully copied.
Dest.director.
Distribute to dest.directories
Decompress in temporarydirectory
ZIP file
Temp.Director. file
Structure
3Abl-Rest.FH7
Fig. 3-7: Procedure for restoring user data
Restoring Data to the ControllerIf an archive contains controller data, this is offered for downloadingbefore the restore process and automatically loaded back into thecontroller if necessary.
Note: Tools lists, residual PLC data and SERCOS parameters mustbe loaded into the controller using the appropriate menus.
3-10 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Selecting DataThe files to be saved are selected by means of batch files. This is doneso that the user does not have to select individual files. A range of pre-defined batch files lets the user determine the extent of the backup.Individual data types e.g. NC data or individual devices up to completebackup of all devices can be selected. The data packets can be selectedvia a list field.
3Dattyp.pcx
Fig. 3-8: Selection of data packets via a list field
Batch FilesIn addition to the pre-defined batch files for the backup of individual datatypes or devices, there are two user-specific files. The user can create hisown backup selection via these user-defined batch files.The batch files are called “BACKUP_USER_IND_1.ASD” and“BACKUP_USER_IND_2.ASD”. They are to be found in the directory
<drive>\...\Project_000\CustomData\Resource.
ASD files are ASCII files and can be modified using an editor.
;BACKUP_USER_IND_1.asd;$AREA$\CONFIG\ /DIR /DEL$AREA$\CONFIG\*.* /-
$AREA$\PROJECT_000\ /DIR /DEL$AREA$\PROJECT_000\*.* /- /SUB
Fig. 3-9: The batch file “BACKUP_USER_IND_1.ASD”
File StructureThe file consists of individual command lines in which the files/directoriesto be saved are indicated.
<Path information (logical path)><Filename><Space><Switches>
Example:
$AREA$\CONFIG\*.* /- /SUB
Syntax
System Services Data Backup 3-11
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Rules
Path information must always be given as logical paths, no physical pathsmust be used.
Logical path information is given at the beginning of the command lineand is enclosed by "$" characters.
File names can be indicated with wildcards (e. g. *.*, *.dat, ...).
Blank lines and comments are ignored.
Comments are introduced by a ";" character, the character may bepositioned at the beginning of a comment line and at the end of acommand line.
Example:
; a comment line
$AREA$\Project_000\*.* /SUB ; comment within a command line
SwitchesIn addition to path and file information, it is also possible to add additionalinformation to the command line by means of switches.
Any subdirectories present are taken into account.
If a file is not present, it is ignored. An error message is displayed for anyother case.
The directory indicated in the command line is always created during therestore process if it does not already exist. This is independent of whetherthere are files in this directory or not. Files to be copied into this directorymust, in addition, be indicated in a separate command line.
This switch is either standalone or in connection with /DEL.
During restore, the directory is emptied; any existing files are deleted.
During restore, files having this switch are not overwritten by files from thearchive that have the same name.
Example of a batch file:
;Area Files$Area$\*.* /SUB;Drive$Drive$\my_dir\myfile.dat
Paths
File Names
Comments
/SUB
/-
/DIR
/DEL
/EXC
3-12 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
This switch must be used if a file is not to be saved. It must be placed inthe same line as the files to be saved, so that archiving associates thefollowing line(s) with the current command line.
Example, where the directories "Logbook" and "Secondary Files" are notto be saved:
$AREA$\PROJECT_000\*.* /- /SUB /EXD
$AREA$\PROJECT_000\PROGRAMDATA\LOGBOOK /EXD
$AREA$\PROJECT_000\PROGRAMDATA\DEVICE_???\PLC\SECONDARY FILES /EXD
The third line contains wildcards (???). This causes "Secondary Files" in thedirectory "Device_000" to “Device_999" not to be saved.
Note: Any sub-directories of a directory marked with /EXD forexclusion will still be saved.
AreasPhysical path information is replaced by logical path information.These are split as follows:
$Area$: replaces the installation directory e.g. ...\MTGUIe.g. $Area$\*.* /SUB saves all files in the directory ...\MTGUI
including any subdirectories present.
$Drive$: replaces installation drive De.g. $Drive$\my_texts\myfile.dat:
saves the MYFILE.DAT file on theinstallation drive in the sub-directory \MY_TEXTS
Executing a Backup
Prerequisites• The data to be saved must be hard disk data. User data from
controller and drives must therefore be saved to the hard disk beforebackup.
• The backup program requires unlimited and exclusive access to thefiles to be saved. It is therefore necessary that all active applications(user interface, function interface, System Configurator) areterminated.
• Sufficient memory must be available on the drive to be archived to.Furthermore, the program requires enough memory on the hard disk forthe temporary files archive of the data to be saved. Several diskettesmust be available when backing up to a diskette drive. The diskettes donot have to be formatted. Formatting can be carried out by the programif so desired.
• It is recommended that only tested, fault-free diskettes are used. Mostproblems encountered when restoring are due to faulty diskettes.
Note: The archive diskettes must be clearly labeled, so that thecorrect diskette is inserted when prompted.
� Label a number of diskettes and number them sequentially.
/EXD
Area
Drive
System Services Data Backup 3-13
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Using the Backup Program
The backup is carried out with the help of an Assistant. This guaranteeseasy handling. After selecting an option, pressing the “Next” button leadsto the subsequent dialog. The “Back” button leads to the previous dialog.In the final dialog, archiving is started by pressing “Execute”, and thepreviously-made settings are used.
Function key “F1” opens the help function at any time. The table ofcontents points to the required topic. The various backup mechanismsare described.
Saving Controller Data on Hard DiskModifiable controller data (NC variables, NC events, D-corrections, NCprograms, NC zero-point data, NC cycles, machine parameters andmachine data) are read during a complete backup, written to hard diskand automatically backed up.
Calling the Backup Program
The backup program is called via the Windows start menu.
� Open the backup program with the menu sequence “Start” –“Programs” – “Indramat – Backup”
The program is loaded. A dialog window with a selection list of pre-defined data packets is displayed.
The backup program is called via the Com Desktop. The following entryexists in Setup:
� Start BackupThe program is loaded. A dialog window with a selection list of pre-defined data packets is displayed.
Selecting Data Packets to be SavedThis lists the possibilities currently available for data backup. The datapackets delivered by Rexroth Indramat at installation include:
• Backup of all user data (complete backup: Directory...\Project_000\...),
• Backup of all HMI data (backup of HMI data: Directory...\Project_000\CustomData\..., as well as ...\Project_000\OemData\...)as well as
• Two packets are provided for users who only wish to save specialdirectories:User-defined backup 1 & 2.The associated files BACKUP_USER_IND_1.asd, andBACKUP_USER_IND_2.asd can be found in the directory...Project_000\CustomData\Resource.At installation time, their contents represent a complete backup. Thesefiles can be modified by the user.
Assistant
Online Help
Possibility 1
Possibility 2
3-14 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3ControlSave.bmp
Fig. 3-10: Selecting data packets to be saved
� Select the data package to be archived by marking it and pressing“Next”.
A dialog window for selection of the file archive is displayed.
If a complete backup is selected, the following message box appears:
3ControlSave.bmp
Fig. 3-11: Saving control data before the backup
With the "Yes" button, data from controllers in ONLINE mode are savedto hard disk before the actual backup.
PLC and tool data, as well as drive parameters, can not be saved.
Controller data:
Exceptions:
System Services Data Backup 3-15
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Entering the Destination File
3BackZiel_gr.bmp
Fig. 3-12: Selection dialog for destination file
There are three ways of selecting a destination file.
• Accept the proposed file name and drive, or enter a new file name anddrive. The proposed file name corresponds to the data packageselected.
• The “Archive List” button opens a list of previously-created archives. Itoffers an overview and the possibility to select an existing archive. Thisarchive is then overwritten.
• Create a new archive by opening a file selection window with the“Browse” button and determining drive, folder and file name. A filename for the archive file is also proposed here. It is also possible tosave via the network. During backup on a network drive, this drive isconnected.
� Select one of the possibilities.
Independently of the possibility selected, an entry field for additionalfile information is displayed.
Three Possibilities to Select anArchive
3-16 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Selecting an Existing ArchiveThe last archives, to a maximum of 8, are listed here. The user can selectone of these by clicking it. This existing archive is then overwritten.
3BackArchiv_gr.bmp
Fig. 3-13: Selection list for file archive
Entering Archive InformationThe user can enter his name and any commentary on the archive to becreated in this screen mask. Entry of a name is mandatory, a commentarymay be entered if so desired.
3BackInfo_gr.bmp
Fig. 3-14: Entry dialog for file information
System Services Data Backup 3-17
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
� Enter the name of the author; date and time will be enteredautomatically by the system. Enter any desired comment text in thetext field and press the “Execute” button.
The archiving is started.
If saving of control data is selected before a complete backup, thefunctional interface for reading and saving of the control data to harddisk is now started if this has not already been carried out.
The data is then copied to a temporary directory.
The following message box appears when control data is to be saved, butno controller is ONLINE or a failure has occurred when reading thecontrol data.
3WithoutControl.bmp
Fig. 3-15: Saving without control data
If a floppy drive has been selected as backup destination drive, a promptwill be displayed asking whether the diskette should be formatted.
3format.pcx
Fig. 3-16: Query dialog for formatting
1. Confirm with “Yes” if the diskette is to be formatted,- or -
2. press “No” if formatting is not required.3. Insert the first diskette into the drive when requested and press “Yes”.
The compression procedure then starts. A dialog window with aprogress display gives information on the archiving status. If thebackup file is to be saved on several diskettes, insertion of newdiskettes will be requested. When archiving is finished, the fileinformation window is again displayed.
3-18 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Finished ArchiveAfter the archive has been created, the information window for the just-created archive is displayed again for the last time.
3BackFertig_gr.bmp
Fig. 3-17: Final dialog after finishing backup
� Terminate archiving by pressing the “Finish” button.
Archiving is now completed, the program is exited.
Executing a Restore
Prerequisites• The restore program requires unlimited and exclusive access to the
files to be saved. It is therefore necessary that all active applications(user interface, function interface, System Configurator) areterminated.
• The drive with the archived data must be in the ready state. If the datais saved on diskettes, all diskettes must be available.
Note: Labels are assigned to the backup diskettes by the program.This designation is required for the restore procedure. Ifdiskettes are copied or forwarded electronically, the labelsassigned to the diskettes must be also forwarded.
Using the Restore Program
Restore is also carried out with the help of a dialog Assistant. Afterselecting an option, pressing the “Next” button leads to the subsequentdialog. The “Back” button leads to the previous dialog. The archivingprocedure is started in the last dialog by pressing “Execute”.
Function key “F1” opens the help function at any time. The table ofcontents points to the required topic. The various backup mechanismsare described.
Assistant
Online Help
System Services Data Backup 3-19
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Calling the Restore Program
The restore program is called via the Windows start menu.
� Open the program with the menu sequence “Start” – “Programs” –“Indramat – Restore”
The program is loaded. The dialog window with the selection list ofavailable file archives is displayed.
The backup program is called via the Com Desktop. The following entryexists in Setup:
� Start RestoreThe program is loaded. The dialog window with the selection list ofavailable file archives is displayed.
3RestArchiv_gr.bmp
Fig. 3-18: Selection list for file archive
In the selection list , all archive files already created are displayed.
1. Select the archive to be restored from the list
- or -
2. press the “Browse” button in order to select a valid ZIP archive notshown in the list. If the ZIP archive is saved on a diskette, a prompt tofirst insert the last archive diskette into the floppy drive will bedisplayed. The program requires this diskette in order to determinethe archive size. After archive selection, the file information window isdisplayed.
3. Press the “Execute” button to start the restore function.
A message box asks if existing user data is to be deleted duringrestore.
Possibility 1
Possibility 2
3-20 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3RestDel.pcx
Fig. 3-19: Delete existing user data?
4. If the dialog is answered with “Yes”, the directories will only includearchive data; temporary data will be lost.
- or -
5. If the question is answered with “No”, temporary data will remain.6. Answer the dialog “Is last medium in drive?” with “Yes” if the archive
is located on the inserted medium. Otherwise change the medium.
Note: Occasionally, several prompts to change the diskettes areissued. This is unavoidable if the internal ZIP archive file issplit onto two diskettes.
The ZIP data is decompressed to a temporary directory and thencopied to the destination directories. The procedure is shown in aprogress display.
When the restore is finished, the file information window is displayed.
7. Terminate the restore by pressing “Finish”.
The restore procedure is now completed, the program is exited.
Restoring Controller Data to the ControllerIf the control data is archived, it is offered for automatic download at thebeginning of the restore procedure. Modifiable controller data (NCvariables, NC events, D-corrections, NC programs, NC zero-point data,NC cycles, machine parameters and machine data) are loaded back intothe controller.
Tools lists, residual PLC data and SERCOS parameters are not savedand therefore cannot be reloaded.
Exception
System Services Data Backup 3-21
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Mapping Drives
If multiple controllers are networked together, backup of data inside thenetwork is possible. Backing up data from one controller only is moredifficult.
Diskette backup is no longer suitable from a certain data volumeupwards.
A temporarily connected notebook is suitable as an archiving destinationdevice. A prerequisite is that the network is active on both controller andnotebook and that both are connected together.
The problem is that a new participant is not reliably shown in an operatingnetwork. It is therefore necessary to temporarily map an assignednotebook directory to the controller for the duration of the backup. Withthis purpose in mind, the section [DRIVEMAP] has been entered in thefile "...\MTGUI\PROJECT_000\CustomData\Resource\ProArc_USR.ini".After installation, this contains only a data shell, which the user may fillwith real data.
Example with shell data:
...[DRIVEMAP]
TEMPDRIVE = LW: \\UNC_path /USER:Username Password
...
Example with real data:
...[DRIVEMAP]
TEMPDRIVE = X: \\NOTEBOOK\SAVE /USER:Username Password
...If the password has not been given for security reasons, an entry dialogappears.
After archiving, the archiving function uncouples the mapped drives.
The Problem
Backing up on Diskette
Backing up on Notebook
Uncoupling Drives
3-22 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3.4 Complete Backup
Chapter OverviewThis chapter describes complete backup using the Norton Ghost Version7.5 hard drive imaging software.
System Overview
System Structure
With the SYSTEM200, Bosch Rexroth delivers a system already set upfor backup that allows the user to carry out a complete controller backupvia the network.
For this purpose, the controller hard disk is sub-divided, having twopartitions.
• C: IBM PC DOS 7.1 (FAT16, max. 2000MB!!)
• D: WIN NT4.0 (NTFS)
When booting, the user has the possibility of starting the system via theNT boot manager in the "Backup/Recovery (Norton Ghost)" operationalmode, i.e. under DOS. When the system is started under DOS, the usercan choose, via a menu, the controller’s network card and the protocol(TCP/IP or NetBEUI) over which the complete backup is to be carried out.After loading the network driver, the controller connects itself to a networkdrive on a backup computer and automatically starts the Norton Ghostimaging software.The user can now create a complete backup or restore of the system.
9Systemuebersicht.bmp
Fig. 3-20: System overview – complete backup
System Description
System Services Data Backup 3-23
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
The following gives a short overview of the most important systemcomponents necessary to carry out a complete backup.
• C: Partition (FAT16, max. 2000MB!!)
→ IBM PC DOS 7.1 (reduced functionality)
→ Network software (NetBEUI and TCP/IP)
→ Norton Ghost 7.5 (Imaging software)
• D: Partition (NTFS)
→ WIN NT4.0
SYSTEM200 controllers are delivered by Bosch Rexroth with thisconfiguration.
System Configuration
Before a complete backup is carried out, the control PC must be initiallyconfigured for network connection under the DOS operating system. Thesystem must be started under DOS and the corresponding modificationsto the configuration made in the C:\AUTOEXEC.BAT file. For thisconfiguration, the computer name, the assigned drive on the backupcomputer and the user name must be made known.
Carry out the following steps to configure the system network under DOS:
1. Reboot the system and choose the menu point "Backup/Recovery(Norton Ghost)" in the NT boot manager.
9Bootmenue_NT.bmp
Fig. 3-21: NT boot menu
The startup window for the DOS session follows.
2. Choose the menu point "BTVxx (-xx) – without network" .
- the system now starts under DOS without the network.
9Bootmenue_DOS.bmp
Fig. 3-22: DOS boot menu (BTV20.3 with 2 network cards)
Components
SYSTEM200 Configuration
3-24 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
3. Open the AUTOEXEC.BAT file with the DOS editor "E". To do so,execute the following command: C:\E.EXE AUTOEXEC.BAT
4. In the “Configuration area” in AUTOEXEC.BAT, enter the followingparameters:
COMPUTERNAMEunique (local) controller computer name in network.
NETPATHUNC path (\\Computername\assignedname) of an assigned drive on abackup computer in the network.
USERUser name that has access rights for NETPATH. Use here, if possible, thedefault BACKUP_USER.
In the "Static IP configuration" areas in AUTOEXEC.BAT, a static TCP/IPaddress configuration may be entered if necessary. Contact theresponsible network administrator for this. When changes are made inthis area, the controller must be rebooted twice under DOS before thenew settings are accepted by the system.
9Autoexec_DOS.bmp
Fig. 3-23: Configuration in Autoexec.bat
5. Save AUTOEXEC.BAT after configuring.
The controller is now configured for the complete backup feature.
Note: To configure the Bosch Rexroth boot diskette, please edit theAUTOEXEC.BAT file on the boot diskette.
When performing a complete backup, a controller hard drive image issaved to an assigned drive on the backup computer connected to thecontroller.
Carry out the following steps to prepare the backup computer for thecomplete backup.
1. Determine that the backup computer is connected to the controller viaa network connection. (Network protocols TCP/IP and/or NetBEUI)
2. Set up a new user account with the following settings:
Configuration of Backup PC
System Services Data Backup 3-25
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
9Backup_User.bmp
Fig. 3-24: User BACKUP_USER on the backup computer
3. Create a backup directory (suggested: BACKUP) on a backupcomputer drive with enough capacity.
4. Release the previously created directory for the BACKUP_USER userwith ‘Full Access’ rights.
5. Create a sub-directory entitled GHOST in the BACKUP directory. Thedirectory structure should now look as follows:<Drive>:\BACKUP\GHOST
6. copy the files
7. GHOST.EXE, GHOST.INI, GDISK.EXE and GHSTWALK.EXE fromthe directory C:\GHOST of any control PC to the GHOST directory ofthe backup computer.
The backup computer is now configured for the complete backupfeature.
Note: The GHOST directory on the backup computer is onlynecessary for booting using the Bosch Rexroth boot diskette.
3-26 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Carrying Out a Complete Backup
Backing up a Stand-alone Controller
When backing up a stand-alone controller system, a backup computer isconnected to the controller’s network card via a cross-over cable (UTP).
All system data is saved during the complete backup,. All files musttherefore be closed and the system must be shut down. When rebooting,the system is started via the NT boot manager in the "Backup/Recovery(Norton Ghost)" operational mode. The network connection for completebackup can be chosen in the following menu. To keep configuration work assmall as possible, it is recommended to carry out complete backup of astand-alone controller via the NetBEUI protocol.
After choosing and subsequent authentication by a user authorized tocarry out backup, the system automatically starts with the Norton Ghostimaging software. An image of a partition or the complete hard drive cannow be created and written to an external drive on the backup computer.
9StandAlone_BTV.bmp
Fig. 3-25: Backing up a stand-alone controller
1. Ensure that the controller and the backup computer are configured asshown in the chapter "System Overview" - "System Configuration".
2. Reboot the system
3. In the NT boot manager, choose the "Backup/Recovery (NortonGhost)" operational mode.
4. In the DOS boot menu, choose the network adaptor (NetBEUI) that isconnected to the backup computer by a cross-over cable.
• Operating system is loaded
• Network drivers are loaded
• The user must identify himself as the system user.
• Drive X: is connected to the assigned drive on the backup computer(please authenticate with the BACKUP_USER user for whom thedrive assignation has been made.)
• Norton Ghost is started.
5. Carry out a complete system backup interactively or per batch file.
Overview
Saving Image Data
System Services Data Backup 3-27
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Backing up a Networked ControllerTo carry out a system backup on a networked controller, the data backupcomputer must have a network connection to the controller.
All system data is saved during the complete backup,. All files musttherefore be closed and the system must be shut down. When rebooting,the system is started via the NT boot manager in the "Backup/Recovery(Norton Ghost)" operational mode. The network connection for completebackup can be chosen in the following menu. Please establishbeforehand with the network administrator which network protocols aresupported by the network components and the backup computer.
After choosing and subsequent authentication by a user authorized tocarry out backup, the system automatically starts with the Norton Ghostimaging software. An image of a partition or the complete hard drive cannow be created and written to an external drive on the backup computer.
9Vernetztes_BTV.bmp
Fig. 3-26: Backing up a networked controller
1. Ensure that the controller and the backup computer are configured asshown in the chapter "System Overview" - "System Configuration".
6. Reboot the system
7. In the NT boot manager, choose the "Backup/Recovery (NortonGhost)" operational mode.
8. In the DOS boot menu, choose the network adaptor and the networkprotocol with which the network is connected, and the protocol(TCP/IP or NetBEUI) with which the backup is to be carried out.
• Operating system is loaded
• Network drivers are loaded
• The user must identify himself as the system user.
• Drive X: is connected to the assigned drive on the backup computer(please authenticate with the BACKUP_USER user for whom thedrive assignation has been made.)
• Norton Ghost is started.
9. Carry out a complete system backup interactively or per batch file.
Saving Image Data
3-28 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Carrying out a System Restore
In principle, the same procedure is used for a system restore as for acomplete backup of a system state. The hard disk content is completelyrecreated by writing back the image file.
1. Ensure that the controller and the backup computer are configured asshown in the chapter "System Overview - System Configuration".
10. Reboot the system
11. In the NT boot manager, choose the "Backup/Recovery (NortonGhost)" operational mode.
12. In the DOS boot menu, choose the network adaptor and the networkprotocol with which the network is connected, and the protocol(TCP/IP or NetBEUI) with which the backup is to be carried out.
• Operating system is loaded
• Network drivers are loaded
• The user must identify himself as the system user.
• Drive X: is connected to the assigned drive on the backup computer(please authenticate with the BACKUP_USER user for whom thedrive assignation has been made.)
• Norton Ghost is started.
13. Carry out a complete system restore interactively or per batch file.
Note: Important!
When restoring a complete hard disk image using Ghostsoftware, the partition size of drive C: must be set to 2000 MB.
If the full FAT16 size of approximately 2037 MB is set for C:,the system can no longer be booted in data backup mode!(See chapter "Important Note for Restoring Images").
Restoring after Replacing a Hard Disk (Bosch RexrothMaster Disk)
If a hardware failure that requires replacement of the hard disk occurs onthe system, always replace this with a Bosch Rexroth master diskdesignated for the controller system if possible.
This disk is already completely prepared for system backup with NortonGhost, i.e. the disk contains, as well as a bootable DOS partition, menu-driven network support for all controller network adaptors and pre-installed Norton Ghost imaging software.
Overview
Image System Restore
Overview
System Services Data Backup 3-29
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
9Recover_BRCHDD.bmp
Fig. 3-27: System restore with a Bosch Rexroth master disk
1. Check the BIOS settings for the new hard disk.
14. Ensure that the controller and the backup computer are configured asshown in the chapter "System OverviewSystem Configuration".
15. Reboot the system,
16. NT boot manager, "Backup/Recovery (Norton Ghost)" operationalmode.
17. In the DOS boot menu, choose the network adaptor and the networkprotocol with which the network is connected, and the protocol(TCP/IP or NetBEUI) with which the backup is to be carried out.
• Operating system is loaded.
• Network drivers are loaded.
• Authenticate use as the system user.
• Drive X: is connected to the assigned drive on the backup computer(please authenticate with the BACKUP_USER user for whom thedrive assignation has been made.)
• Norton Ghost is started.
18. Carry out a complete system restore interactively or per batch file.
Note: Important!
When restoring a complete hard disk image using Ghostsoftware, the partition size of drive C: must be set to 2000 MB.
If the full FAT16 size of approximately 2037 MB is set for C:,the system can no longer be booted in data backup mode!(See chapter "Important Note for Restoring Images").
Recovery - System Restore
3-30 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Restoring after Replacing a Hard Disk (Empty Disk)
If no Bosch Rexroth master disk is available after a disk failure but an“empty” disk is, the following must be taken into account:
• An empty disk does not contain the system configuration needed tocompletely backup or restore a system.
• To restore a previously saved system state on a system with an“empty” disk, the system must be started with a Bosch Rexroth bootdiskette. This boot diskette is already completely prepared for systembackup with Norton Ghost, i.e. the diskette contains, as well as aminimized DOS version, menu-driven network support for all controllernetwork adaptors.
9Recover_EmptyHDD.bmp
Fig. 3-28: System restore for a controller with empty disk
1. Check the BIOS settings for the new hard disk.
2. Ensure that the controller (0 boot diskette) and the backup computerare configured as shown in the chapter "System OverviewSystemConfiguration".
3. Reboot the system with a Bosch Rexroth boot diskette.
4. In the DOS boot menu, choose the network adaptor and the networkprotocol with which the network is connected, and the protocol(TCP/IP or NetBEUI) with which the backup is to be carried out.
• Operating system is loaded.
• Network drivers are loaded.
• Authenticate use as the system user.
• Drive X: is connected to the assigned drive on the backup computer(please authenticate with the BACKUP_USER user for whom thedrive assignation has been made).
• Norton Ghost is started automatically by the backup computer.
19. Carry out a complete system restore interactively or per batch file.
Overview
Image System Restore
System Services Data Backup 3-31
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Note: The Norton Ghost V7.5 imaging software must already beinstalled on the backup computer on the assigned drive in thedirectory \GHOST when starting a system via the bootdiskette. A description of this can be found in chapter "SystemConfiguration".
Please note that that the C: partition size for a previouslypartitioned disk must be set to a maximum of 2000 MB. If thefull FAT16 size of approximately 2037 MB is set for C:, thesystem can no longer be booted! If necessary, use the GDISKtool in the C:\GHOST directory in the controller to delete thepartition.
Note: Important!
When restoring a complete hard disk image using Ghostsoftware, the partition size of drive C: must be set to 2000 MB.
If the full FAT16 size of approximately 2037 MB is set for C:,the system can no longer be booted in data backup mode!(See chapter "Important Note for Restoring Images").
3-32 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Symantec Ghost 7.5 Hard Disk Imaging SoftwareThe Norton Ghost 7.5 program from Symantec is a DOS program. It is notpossible to start it in the DOS window under Windows NT. Windows NTdoes not permit exclusive access to data media. Two modes are availablefor program settings and data backup.
The software is set up and operated via menu calls. The selection of theareas of data to be saved and the settings of destination drives, etc. aredone by means of program dialogs.
The program can be started in batch mode for fast, automatic processing.Various parameters can be added to the call name of the program in abatch file. The backup and/or restore operation can then be run fullyautomatically by calling the batch file.
9GhostSichern.bmp
Fig. 3-29: Creating a hard disk image
Setting Options for Interactive OperationThe program options are set in the “Options” menu.
For example, the image file can be set up such that it is split onto multipledata storage media (spanning) or that safety prompts are not displayed(Sure).
1. Select the “Options” menu.
An entry field with flags is displayed.
2. Move from flag to flag with the <Tab> key.
3. Confirm <Enter> in order to activate the option.
A check mark displays that the option is selected.
4. Set the desired options.
5. Press the “Accept” button.
This accepts the settings for this session.
6. Change to the “Save settings” tab.
7. Click the “Save settings” button.
This accepts the settings for all sessions.
Interactive Operation
Batch Operation
System Services Data Backup 3-33
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
9GhostOptionen.bmp
Fig. 3-30: Options menu settings
Important Note for Restoring ImagesWhen restoring hard disk images (partially applies to partition images),the user can set the size of the destination partition. As standard,Symantec Ghost sets up the new partitions with the same sizerelationship as given in the image.
Under certain conditions, this may lead to problems. If, during the restoreprocedure, Symantec Ghost proposes a partition size for drive C: a valuegreater than 2000 MB, the user must set this to a value of 2000 MB (orless).
9GhostRecovery.bmp
Fig. 3-31: Important: Set the C: partition to 2000 MB when restoring
3-34 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
If, when restoring, a C: partition of more than 2000 MB is created, thesystem is no longer bootable via the boot manager entry"Backup/Recovery (Norton Ghost)". The complete backup function is notavailable in this case (the Windows NT system is not affected).
If a C: partition of more than 2000 MB has accidentally been created, thenrepeat the restore with Ghost and set the C: partition size to 2000 MB.Alternatively, the size of the C: partition can also be changed to 2000 MBby using a partition administration tool such as Partition Magic for thispurpose.
Calling the Ghost Software via a Batch FileThe program settings are added as parameters to the call names of theprogram with the help of a batch file. The batch file should be structuredas follows.
Batch File for Backup in an Image File
����������������� ����������������� ����������� ���� ������������ �!��"�������#�������$�����$%&�$'!(�$�'!)*������*�����+����*����+&*���+��,���-.&�/01
2 � �3 ���������� ��� ���� ��
)"��������������4�5����������������������� �����
)"����������������������6��������������#���7� ��78
2� ���# �����������������������(2�� �����
2� ���# ���������������������9���)(:)�)(� �����
� ����������6��� ����� ��8
)����� �2��#�����3��3 ��������6&���� ������#�8
2����� ��������#��� � ��������� �������3 ���������
Batch-Datei für Sicherung.FH7
Fig. 3-32: Batch File for backup in an image file
� Open the batch file in an ASCII editor and edit the destination driveand the file name of the backup file as necessary.
System Services Data Backup 3-35
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Batch File for Restoring from an Image File
������)�1���������������������������� ������������� ���� ����������������#� ��������$�����$%&�$'!(�$�'!)*������*�����+�� �*���#+�*��-.&�/01*���+&
2 � �3 ���������� ��� ���� ��
)"��������������4�5����������������������� �����
)"����������������������6��������������#���7� ��78
2� ���# �����������������������(2�� �����
2� ���# ������������������������)(:)�)(� �����
2����� �����& �0 �������
)����� �2��#��� � ���� ������3 ���������
� ����������6���� ���� ��8
Batch-Datei für Rücksicherung.FH7
Fig. 3-33: Batch File for restoring from an image file
Optional Parameters
Using the parameter "-z", two modes can be selected for compression ofthe image file.
-z1: Compression "fast"; the image file is compressed to approximate-ly 60% of the original size. This is the compression moderecommended.
-z2: Compression "high"; the image file is compressed to approxi-mately 50% of the original size. However, the backup takesapproximately three times longer than without compression. Thiscompression mode is therefore not recommended.
Note: Further settings, for example copying of individual partitions,can be found in the Norton Ghost product documentation, orby starting the Ghost software with the call"C:\GHOST\GHOST.EXE -?" to get a complete overview of allparameters.
-z
3-36 Data Backup System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Cloning a Controller with Symantec Ghost 7.5Controller system must have a unique identity to be able to be used in anetwork. This is achieved by use of a Security ID (SID) and the computername. When a controller is cloned be restoring an image to multiplecontroller systems, unique security Ids must be assigned as part of thisoperation. The Ghost Walker tool (GHSTWALK.EXE) is available underDOS to carry out this task and can be found in the C:\GHOST directory inthe controller.
9GhstWalk.bmp
Fig. 3-34: Changing SID and computer name using Ghost Walker
Note: An exact description can be found in the Norton Ghost productdocumentation.
System Services Logic Analyzer 4-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
4 Logic Analyzer
4.1 Introduction
The Logic Analyzer allows recording, analysis and documentation ofinternal control processes. It monitors up to 16 variables and recordschanges in variable values. The variables to be monitored can be freelychosen. After recording, the variables are displayed as a curve on a timeaxis. In addition, display of events is possible.
org_IntroMainScreen.bmp
Fig. 4-1: Logic Analyzer main screen
Recording in the Logic Analyzer is event-driven. Recording only takesplace when the state of one of the variables being monitored changes.The change of state of the variable recorded is written to a recordingbuffer together with the actual time of the change.
This procedure gives a long recording period with high resolution andrequires relatively little memory.
The actual recording is done inside the controller. Evaluation of triggerconditions or monitoring of variables to be recorded is carried out aftereach PLC cycle.
Time stamps have an accuracy of 2ms.
The maximum time period for a recording is 49 days.
The maximum recording capacity is 800 events.
General
Event-driven recording
Recording accuracy
Max. recording period
Max. recording capacity
4-2 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
4.2 Working with the Logic Analyzer
The following presents, by means of an example, a typical workingprocedure followed when carrying out a measurement with the LogicAnalyzer.
In this example, the variables in a PLC program are to be recorded. Theprogram name is “Prog1”. Four Boolean variables (bool1 to bool4) andfour integer variables (int1 to int4) will be recorded.
Creating a new measurementA measurement, in the Logic Analyzer sense, is a data set containing thefollowing information:
• A list of variables to be recorded
• Trigger condition
• Recorded data
• Additional information (e.g. a short description)
1. To create a new data set for a measurement, in the “File” menu,choose the option “New Measurement”
- or -
2. Press the Ctrl+N key combination.3. In the dialog that follows, enter a name and a short description for the
measurement.4. Confirm the entries with the “OK” button.
org_NeueMessung.bmp
Fig. 4-2: New measurement
5. Select the variables to be recorded and define a trigger condition.
System Services Logic Analyzer 4-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Selecting variables to be recorded1. In the “Edit” menu, select the “Variables” option.- or -
2. press the F2 function key.The “Edit variables list” dialog is now entered.
org_VariablenlisteBearbeiten.bmp
Fig. 4-3: Edit variables list
3. Select the controller in which the recording is to be made. Use the“Device” drop-down list for this. In this example, the controllerISP200-R-G2 with a device address of 00 is selected as the device.
4. Enter the first variable to be recorded in the “Variable” edit field.The entry must be in the format <Program name>.<Variable name>,for example Prog1.bool1.
5. After the variable has been entered, press Return- or -
6. press the “Add” button.The variable is now added to the list of variables to be recorded.
In the same way, enter all other variables to be recorded.
1. To remove a variable from the list, mark the appropriate list entry and2. press the “Remove” button.
1. To change an entry in the list, mark the appropriate list entry.2. Change variable names in the “Variable” edit field.3. Press the “Change” button.
The marked entry is now changed.
4. After all needed variables have been entered, confirm the entry bypressing “OK”.
Select device
Selecting variables to berecorded
Add variable
Remove variable
Change variable
4-4 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Defining trigger conditionsThe trigger conditions for this example should be defined such thatrecording starts immediately if the following conditions are simultaneouslymet:
• Prog1.bool1 = TRUE
• Prog1.bool2 = FALSE
• Prog1.int3 > 5
1. In the “Edit” menu, select the “Trigger” option- or -
2. press the F3 function key.The “Trigger settings” dialog is now entered.
org_TriggereinstellungenBearbeiten.bmp
Fig. 4-4: Trigger settings
3. In “Trigger mode”, select the “ Start recording if triggered” option.Recording will start when the trigger condition is met.
The other option, “Start recording immediately”, starts recordingimmediately after the F4 function key is pressed.
The “Number of state changes” edit field allows entry of the number ofevents for which recording memory in the controller is to be reserved.The maximum value is 800.
The “Pre/Post-trigger” slider allows entry of the number of events thatshould be recorded before or after the trigger event.
In this example, the standard values already entered for the number ofstate changes and for the pre/post-trigger can be used.
Trigger mode
Further trigger settings
System Services Logic Analyzer 4-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
The controls in the lower area of the “Trigger settings” dialog are used todefine the trigger conditions.
As described above, in this example three simple trigger conditions
• Prog1.bool1 = TRUE
• Prog1.bool2 = FALSE
• Prog1.int3 > 5
are combined to form
• (bool1 = TRUE) AND (bool2 = FALSE) AND (int3 > 5),
a complex trigger condition.
1. in the drop-down list “Variable”, select the variable Prog1.bool1. In thedrop-down list “Condition”, select the “=” equalizing operator and enter“TRUE” or “1” as comparison value.
2. Press the “Add” button to accept this first simple trigger condition.It appears in the dialog text field.
org_Triggerbedingung_Schritt1.bmp
Fig. 4-5: Trigger condition step 1
As soon as a simple trigger condition exists, the “Operator” drop-down list becomes active.
It is now possible to create further conditions and combine these withprevious conditions by means of an operator.
3. in the drop-down list “Operators”, select the “AND” operator and"Prog1.bool2 = FALSE" as a further condition.
4. Press the “Add” button again.A complex trigger condition, consisting of the two simple triggerconditions, can now be seen in the text box.
org_Triggerbedingung_Schritt2.bmp
Fig. 4-6: Trigger condition step 2
5. Complete the trigger condition by defining the third, and therefore last,simple trigger condition.
• AND Prog1.int3 > 5
6. Press the “Add” button again.
Trigger conditions
4-6 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
org_Triggerbedingung_Schritt3.bmp
Fig. 4-7: Trigger condition step 3
The desired trigger condition is now ready.
7. Press the “OK” button in the dialog to confirm the entered triggercondition.All necessary preparatory steps have now been taken to make arecording.
Making a recording1. In the “Record” menu, select the “Start” option- or -
2. press the F4 function key.A dialog showing the current status of the recording is now opened.
org_ProgressWaitingForTrigger.bmp
Fig. 4-8: Status: Waiting for trigger …
The “Start time” field shows the time at which recording was started.
The “State changes before trigger” counts all variable state changesoccurring before the trigger event.
The progress display, set to 0% at the beginning, shows the currentstatus of “Waiting for trigger…” in text form.
As soon as the trigger condition is met, actual recording starts. The“Trigger time” field shows the time at which the trigger condition wasfulfilled. As soon as one of the variables changes, the “State changesafter trigger” start counting up.
The progress display moves in the direction of 100% and “Recording inprogress…” is given as status.
System Services Logic Analyzer 4-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
org_ProgressRecordingInProgress.bmp
Fig. 4-9: Status: Recording in progress
Recording stops when the recording buffer is full, or beforehand if the“Stop” button is pressed.
The recorded data is then immediately loaded from the controller andgraphically displayed.
Analyzing a recording
org_FertigeAufzeichnung.bmp
Fig. 4-10: Analyzing recorded data
The recorded data is shown in the form of a curve for each variable,similar to a multi-channel oscilloscope. The left-hand side of the screendisplays additional information on each channel.
org_Kanalbeschriftung.bmp
Fig. 4-11: Channel labels
Display
4-8 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
(1) Variable name
(2) Value of variable at current cursor position
(3) Lowest recorded value of the variable
(4) Highest recorded value of the variable
Use the F7 or F8 function key to change the basic timebase of thedisplay. Change to the timebase occurs in 1-2-5 steps, just as for anoscilloscope.
The following possibilities are available for navigation in the graphicdisplay:
→ Moves the cursor one pixel position to the right
← Moves the cursor one pixel position to the left
Ctrl+→ Places the cursor on the next event
Ctrl+← Places the cursor on the previous event
Ctrl+T Places the cursor at the trigger point
Pos1 Places the cursor on the first recorded event
End Places the cursor on the last recorded event
Pict ↑ Scrolls one page to the left
Pict ↓ Scrolls one page to the right
The status line is divided into five areas, showing the following information(from left to right):
• file name where the measurement has been recorded,
• current timebase setting,
• time (relative to zero) at current cursor position,
• time difference between the M1 and M2 markers, and
• status of the logic analyzer.
TImebase
Navigation
Status line
System Services Logic Analyzer 4-9
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
4.3 Logic Analyzer Reference
Function keysThe logic analyzer function keys are organized in two levels:
• Level 1 contains all important functions for preparing and making arecording.
• Level 2 contains functions for working with markers.
To get to level 2 from level 1, press the F6 function key in level 1.
To return from level 2 to level 1, press the F9 function key in level 2.
Note: The timebase functions are available in both levels.
F2 Variables (Edit variables list)
F3 Trigger (Edit trigger settings)
F4 Start/Stop recording
F5 Options(Edit options)
F6 Markers (switch to level 2)
F7 TImebase (zoom out)
F8 TImebase (zoom in)
F9 Exit (Exit Logic Analyzer)
org_FKeysLevel1.bmp
Fig. 4-12: Level 1 function keys
F2 Set marker 1
F3 Set marker 2
F4 Display/Hide markers
F5 Free
F6 Free
F7 TImebase (zoom out)
F8 TImebase (zoom in)
F9 Back (switch to level 1)
org_FKeysLevel2.bmp
Fig. 4-13: Level 2 function keys
Level 1
Level 2
4-10 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Status lineThe status line displays important information about the logic analyzeroperating status.
org_Statusbar.bmp
Fig. 4-14: Status line
The status line is divided into five fields. The following information isdisplayed:
(1) File name of the current measurement
(2) Current timebase setting
(3) Time at current cursor position
(4) Time difference between the M1 and M2 markers
(5) Status
Menu structure
OverviewThe following overview shows all logic analyzer commands and theirpositioning in the menu. In addition, the shortcut and the correspondingfunction key for each menu point are shown if these are present.
File Function key/Key combination
New measurement Ctrl + N
Open Ctrl + O
Save Ctrl + S
Save as
Export
Exit Logic Analyzer F9 (level 1)
Fig. 4-15: “File” menu
File Function key/Key combination
Variables F2 (level 1)
Trigger F3 (level 1)
Options F5 (level 1)
Measurement information
Fig. 4-16: “Edit” menu
File Function key/Key combination
Zoom in F8 (level 1/2)
Zoom out F7 (level 1/2)
Fig. 4-17: “View” menu
“File” menu
“Edit” menu
“View” menu
System Services Logic Analyzer 4-11
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
File Function key/Key combination
Start F4 (level 1)
Stop F4 (level 1)
Fig. 4-18: “Record” menu
...
File Function key/Key combination
Set marker 1 Ctrl + 1 F2 (level 2)
Set marker 2 Ctrl +2 F3 (level 2)
Show Ctrl + M F4 (level 2)
Hide Ctrl + M F4 (level 2)
Fig. 4-19: “Marker” menu
File menu
1. To create a new measurement, in the “File” menu, select the option“New measurement”
- or -
2. use the Ctrl+N shortcut.3. In the dialog that follows, enter a name and a comment for the
measurement.4. To finish the procedure, press the “OK” button.
org_NeueMessungInit.bmp
Fig. 4-20: Creating a new measurement
5. Enter a short name for the measurement in the “Name” field. A namemust be entered.
6. In the “Comment” field, enter a comment or a short description of themeasurement.Entry of a comment is optional.
1. To load an existing measurement, select the option “Open” in the“File” menu.
- or -
2. use the Ctrl+O shortcut.3. In the following file selection dialog, select the file to be opened.
4. Confirm the selection with the “Select” button.
“Record” menu
“Marker” menu
Creating a new measurement
Open
4-12 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
1. To save a measurement in a file, select the option “Save” in the “File”menu
- or -
2. use the Ctrl+S shortcut.
1. To save a measurement under a new filename, select the option“Save as” in the “File” menu.
2. In the following file dialog, enter the desired name for the file and3. press the “Save” button.
The “Print file” menu has three sub-menu points that allow printing ofvarious areas of the recording.
If one page is not sufficient for the printout, the area to be printed isautomatically distributed across several pages. The X and Y axes and thelabels are also printed out on each page.
If the printout needs more than 10 pages, a check question on whetherprinting should really be performed is asked.
The following sub-menu points for printing are available:
• "All" Select this sub-menu point to print thecomplete recording.
• “Area between markers” Select this sub-menu point to print thearea between the markers M1 and M2.
• “Current screen” Select this sub-menu point to print thesection of the recording currently visibleon the screen.
The Export function allows saving of a recording as a text file. The file issaved as tab-separated text. This data format can be further processed,for example with Excel.
Select this menu point to exit the logic analyzer.
Edit menu
1. To access the variables list, select the option “Variables” in the “File”menu
- or -
2. press the F2 function key.3. In the variables list, select which variables are to be recorded. In
addition, various variable properties that influence the recording or thegraphic display can be set.
A comprehensive description of Variables list is dealt with in a separatechapter.
� In the “Edit” menu, select the “Trigger” option- or -
� press the F3 function key to access the trigger settings.The trigger settings control the start of data recording in the logicanalyzer. It is thus possible to wait and start recording only with anexactly defined status.
A comprehensive description of Trigger settings is dealt with in a separatechapter.
Save
Save as
Export
Exit
Variables
Trigger
System Services Logic Analyzer 4-13
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
� To access the options dialog, select “Options” in the “File” menu- or -
� press the F5 function key.In the options dialog, various settings can be made affecting both thegraphic display and internal recording modes.
A comprehensive description of Trigger settings is dealt with in a separatechapter.
� In the “Edit” menu, select the “Measurement info” option to access theinformation dialog.This dialog has already been seen when creating a measurement.The additional information for a measurement already entered at thebeginning can be edited here.
View menu
� In the “View” menu, select the “Zoom in” option to show the signaldisplay with the next-smaller timebase.
- or -
� press the F8 function key.
Note: The smallest timebase setting possible (maximum zoom) is1ms/div. If “Zoom in” is again selected, the display mode isswitched from a time display to an event display.
� In the “View” menu, select the “Zoom out” option to show the signaldisplay with the next-larger timebase.
- or -
� press the F7 function key.
Record menu
� In the “Record” menu, select the “Start” option to start recording in theLogic Analyzer.
� To stop recording in the Logic Analyzer, select the option “Stop” in the“Record” menu.
Marker menu
� In the “Marker” menu, select the “Set marker 1” option to set marker 1at the current cursor position.
� In the “Marker” menu, select the “Set marker 2” option to set marker 2at the current cursor position.
� To show markers on the screen, select the “Show” option in the“Marker” menu.
� To hide markers on the screen, select the “Hide” option in the menu.
Options
Measurement info
Zoom in
Zoom out
Start
Stop
Set marker 1
Set marker 2
Show
Hide
4-14 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Variables list1. Variables to be recorded can be selected in the variables list dialog.2. In addition, settings can be made affecting the graphic display of
recorded data for the variable concerned.
org_Variablenliste.bmp
Fig. 4-21: Variables list
Select device
The Logic Analyzer can only record variables exactly for one device.
� Therefore select first the device in which the variables are to berecorded. Use the “Device” drop-down box for this.
Adding variables
� To add a variable to the variables list, enter the variable into the“Variable” edit field.The entry must be in the format <Program name>.<Variable name>.
� A short text for each variable can be entered in the “Comment” editfield.
� In the “Y zoom” drop-down box, enter a vertical zoom factor withwhich the variable is to be displayed.
� Uncheck the “Monitor” check box if a change in the value of thisvariable should not start a recording. Normally, this check box shouldbe left checked.
� Use the “Show” check box to determine whether this variable shouldbe visible as a signal trace in the graphic display.
� After all entries or settings have been made, press the “Add” button.The variable is now added to the variables list.
Device
Variable
Comment
Y zoom
Monitor
Show
System Services Logic Analyzer 4-15
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Changing a variable1. Select the entry in the variables list that is to be changed.
The control elements "Variable", "Type", "Comment", "Y zoom","Monitor" and "Visible" are updated with data from the selectedvariable.
2. Make the changes desired.3. Press the “Change” button.
The selected entry in the variables list is overwritten with the currentdata.
Removing a variable1. To remove a variable from the variables list, select the appropriate
entry and2. then press the “Remove” button.
Changing sequenceThe sequence of variables in the variables list determines the sequenceof the corresponding signal traces in the Logic Analyzer graphic display.To change the sequence of variables in the graphic display, the positionof the corresponding variable in the variables list entries must thereforebe shifted.
1. Select an entry in the variables list.2. Then press the “Up” or “Down” buttons to position the entry as
desired.
Trigger settingsin the trigger dialog settings, the trigger conditions are defined and thenumber of pre/post-trigger entries that the Logic Analyzer should record isdetermined.
org_Triggerdialog.bmp
Fig. 4-22: Trigger settings
4-16 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Basic settings
The “Number of state changes” edit field sets the size of the recordingbuffer in the controller. Values between 10 and 800 are allowed, thedefault value being 800. The recording buffer is large enough to hold 800state changes.
This default value should be left unchanged, in order to use the maximumrecording capacity.
The Logic Analyzer can be operated in two different trigger modes.
In the “Start recording immediately” trigger mode, the Logic Analyzerbegins recording data as soon as recording is started. Recording is endedas soon as it is manually stopped or the internal controller buffer is full.
The graphic display shows the signal from the time at which it was starteduntil the time at which it was stopped or the recording buffer became full.
Since neither the trigger condition nor pre/post settings play a role in thistrigger mode, the corresponding control elements in the dialog aredeactivated.
In the “Start recording on trigger” trigger mode, the Logic Analyzer initiallymonitors only the defined trigger condition for start of recording. At thesame time, it is recording data that may possible be needed for thedisplay of pre-trigger events.
If the trigger condition is fulfilled, the Logic Analyzer continues recordingthe amount of data needed for display of post-trigger events. Recording isthen ended.
The graphic display shows signals before or after the trigger point. Howmuch pre-history or post-history is shown depends on the pre/post-triggerslider setting. If the slider is in mid-position, the same amount of pre-trigger and post-trigger data will be recorded. The trigger point liesapproximately in the middle of the signal trace shown (assuming thatenough events occur before the trigger condition is fulfilled).
The slider positioning allows movement of the trigger point in the signaltrace.
Trigger condition
Simple trigger conditions consist of variables, comparison operations andcomparison values.
Example: Prog1.bool1 = 0
A simple trigger condition is fulfilled as soon as its result delivers thevalue “TRUE”.
Complex trigger conditions consist of multiple simple trigger conditions,combined with “AND” or “OR” operators.
Example: Prog1.bool1 = 0
AND Prog1.bool2 = 1
AND Prog1.real1 > 5
A complex trigger condition is fulfilled as soon as the combination ofresults of the individual trigger conditions delivers the value “TRUE”.
The combining operators “AND” and “OR” have equal ranking and thelogical combinations are carried out in the same sequence as they areprogrammed (not “AND” before “OR”).
Number of state changes
Trigger mode
Start recording immediately
Start recording on trigger
Pre/Post-trigger
Simple trigger condition
Complex trigger condition
System Services Logic Analyzer 4-17
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
1. To enter a trigger condition, first select a variable and a comparisonoperation and
2. then enter a comparison value in the “Condition” edit field.3. Press the “Add” button to accept the trigger condition.
A simple trigger condition has now been defined. As soon as the firstsimple trigger condition is defined, the “Operator” drop-down fieldbecomes active.
4. Select one of the combination operators from this field.5. Then select a further variable and a comparison operator and enter a
comparison value.6. Press the “Add” button.
The condition just defined with the selected comparison operators isattached to the existing condition, thus forming a complex triggercondition.
Up to 16 simple trigger conditions can be combined to form a complextrigger condition.
1. To change a trigger condition, mark the appropriate lines of thetrigger condition.
2. Now use the elements "Operator", "Variable" and "Condition" tochange the trigger condition.
3. Pressing the “Change” button accepts the change.
1. To delete parts of a trigger condition, mark the appropriate lines of thetrigger condition.
2. Press the “Remove” button.The marked part of the trigger condition is now removed.
Entering a trigger condition
Edit a trigger condition
4-18 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
OptionsThe options dialog brings all important Logic Analyzer settingspossibilities together at a central point. The options are split into twogroups:
• The first options group is concerned with graphic display of therecorded data.
• The options in the second group affect how the recording is made andoffer advanced possibilities to experienced users.
This splitting of options is reflected in the two fields “Display” and“Advanced” in the options dialog.
DisplayIn the “Display” field in the options dialog, the Logic Analyzer graphicdisplay can be set up to meet individual needs.
org_OptionenAnzeige.bmp
Fig. 4-23: “Display” options
The Logic Analyzer can optionally underlay the signal display with a raster.The “Raster” check box switches the raster in or out.
The “Diagram type” selection defines how the recorded data is to bedisplayed.
In the “Time diagram” mode, the X axis functions as a time axis. Thedisplay, just as for an oscilloscope, is time-dependent.
In the “Event diagram” mode, all events are represented with the samewidth, independently of the time relationships.
The selection “zero point” determines the position of the zero point on theX axis. The zero point can be placed either on the trigger position or at thebeginning of the diagram.
To prevent important information being lost when long variable names aredisplayed, a possibility of configuring the display of variable names isoffered. Depending on the setting selected, the beginning or the end ofvariable names is cut off if not enough space is available to show thewhole name.
Raster
Diagram type
Zero point
Long variable names
System Services Logic Analyzer 4-19
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
AdvancedIn the “Advanced” field in the options dialog, options are available thataffect how the Logic Analyzer records data.
org_OptionenErweitert.bmp
Fig. 4-24: Advanced options
The offline mode determines the behavior of the Logic Analyzer when itsuser interface is stopped by a recording running in the background.
The procedure for background recording is in the beginning the same asthat for normal recording.
1. A new measurement is created,2. the variables to be recorded are entered in the variables list and3. a trigger condition is defined if desired.4. The “Start” option in the “Record” menu is selected- or -
5. press the F4 function key.The dialog showing the current status of the recording is now opened.
org_AufzeichnungsStatusSchliessen.bmp
Fig. 4-25: Recording status
Offline mode
4-20 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
6. Now press the “Close” button.The dialog is closed and the Logic Analyzer main menu is re-entered.All commands are blocked except for “Stop recording” and “Exit LogicAnalyzer”.
The offline mode determines the procedure carried out when theLogic Analyzer is exited.
• Stop recording (standard setting)
In this mode, the recording taking place in the controller is stopped assoon as the Logic Analyzer is exited. This standard setting guaranteesthat no memory or computing power is used when the Logic Analyzeris not running.
• Record further. Stop recording when switched off.
In this mode, the recording taking place in the controller is continuedwhen the Logic Analyzer is exited. If the Logic Analyzer is startedagain, the recorded data in the controller can be obtained by the LogicAnalyzer and displayed. Recording is stopped, however, if thecontroller is switched off and then switched back on again.
• Record further. Start recording again if switched off and back on
In this mode, the recording taking place in the controller is continuedwhen the Logic Analyzer is exited. If the controller is switched off andthen switched back on again, recording starts again immediately afterswitch-on. Everything (trigger condition, pre/post-trigger, etc.) functionsexactly the same as for a “normal” recording started by the user. Thismode is particularly useful when switch-on problems occur before theuser interface is up and running.
The recording mode determines for which event recording of the variablevalues is to be done.
• Record if value changes (standard setting)
In this mode, recording starts as soon as two conditions are met:
i. The value of a variable in the variables list changes.
ii. This variable is being monitored (“Monitor” check box is checked).
• Record on trigger
In this mode, recording starts when the trigger condition is met. Thismode should be used if data is only required to be recorded in certainspecial situations.
Note: In the “Record on trigger” mode, the setting of the “Pre/post-trigger” slider is ignored. The maximum number of eventspossible is always recorded.
Working with markers
Markers are used in the Logic Analyzer to mark a specific area in therecorded signal trace. Markers are used to measure the time betweenstate changes. In addition, markers serve the purpose of marking a partialarea for printing.
Functions available for working with markers can be found in the “Marker”menu or in the level 2 function keys. To switch to the second function keylevel, press the F6 function key.
The Logic Analyzer specifically uses two markers (“M1” and “M2”). Bothmarkers are always valid, i.e. they always mark two positions on thesignal trace even if they are not shown.
Recording mode
Purpose
Basic principle
System Services Logic Analyzer 4-21
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Immediately after finishing a recording, “M1” is set at the first eventrecorded and “M2” is set at the last event recorded. The markers arehidden, i.e. not displayed.
� To display both markers, select the “Display” option in the “Marker”menu.
- or -
� press the F4 function key (level 2).
� To hide the markers, select the “Hide” option in the “Marker” menu.
- or -
� press the F4 function key (level 2).
1. To change the position of a marker, first move the cursor to the newposition desired.
2. Then in the “Marker” menu, select the “Set marker 1” or “Set marker2” option.
- or -
3. press the F2 or F3 function key (level 2).The marker selected is now moved to the current cursor position.
Note: If the cursor is not exactly positioned at an event, but betweentwo events, the marker is positioned at the event immediatelybefore the cursor.
Markers are a most useful way of measuring the time between any twoevents in the recorded signal trace. Position the markers at both of theevents for which the time between is to be measured. It is unimportantwhether “M1” comes before or after “M2”.
The status line displays the time between the markers.
org_DifferenzZeit.bmp
Fig. 4-26: Measuring time difference
1. To print out a section of the recorded signal trace, first set themarkers at the beginning and end of the section to be printed.The marked section may occupy several screen pages.
2. Select the “Print” option in the file menu and then
3. “Section between markers” in the sub-menu.
The marked section is then printed out.
Display/Hide markers
Positioning markers
Measuring time with markers
Printing a section betweenmarkers
4-22 Logic Analyzer System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
System Services E-mail Connection 5-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
5 E-mail Connection
5.1 Overview
Version 22 of the MTGUI tool machine interface provides for the first timean e-mail controller connection as a licensable component.
The e-mail connection allows event-driven sending of messages, forexample maintenance instructions or fault messages, via e-mail, SMS orfax to various devices such as a PC, cell phone or pager.
This allows fast, targeted messaging to departments responsible forfailure or maintenance cases. This keeps downtime to a minimum andincreases productivity while decreasing costs.
1Uebersicht.bmp
Fig. 5-1: E-mail connection overview
5.2 Performance Features
Powerful software for the e-mail connection to the controller is availablefor the SYSTEM200. The system has the following features:
• Sending of events via e-mail, conversion to SMS, fax, pager, beeper,voice or printer is possible.
• Fixed or time-dependent recipients or recipient groups can beprogrammed.
• Repeat sending of messages at programmed time intervals is possible(first transmission, repeat transmission).
• Different recipients for first and repeat transmissions is possible.
• Buffering of transmit instructions.
• Prioritized transmissions.
• Supported protocols: SMTP, ESMTP, MAPI.
• Typical applications:Maintenance instructions, messaging system, transmission of softwareand firmware version statuses.
5-2 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
5.3 Definition of Terms
Same as pager but only emits one tone when messaged.
Extended Simple Mail Transfer ProtocolExtension of SMTP. Among the officially defined extensions arenotification of mail delivery status or the AUTH authentication command.
Messaging Application Programming InterfaceMicrosoft-defined interface allowing sending of e-mails from any Windowsapplication.
The e-mail subsystem generates a message from an registered event,describing the event. Depending on the type of transmission, thismessage is delivered to the recipient in the form of an e-mail, an SMS,Pager or Beeper message, or a fax, etc.
Event → Message → E-Mail/SMS/Pager message.
System for transmission of messages. AddOn E-Mail is such a system. Theso-called “Unified Messaging” also contains voice messages.
Small device with display that receives messages via the cell phonenetwork in the form of number codes or symbols. Each pager has aunique number (ID) in its cell phone network.
Post Office Protocol – Version 3A standard belonging to the TCP/IP family for requesting e-mails from ane-mail server.
Short Message SystemA system for sending and receiving short text messages on a GSM cellphone.
Simple Mail Transfer ProtocolText-oriented protocol based on TCP/IP for distribution of electronic mailin a LAN or in the Internet. A message consists of a header and bodydata. The header contains, among other data, the date, reference,recipient, sender and recipient of copies. The body data section usuallyconsists of free ASCII text. Messages with multiple recipients on onetarget host are only sent once to the target and distributed further fromthere.
Transmission Control Protocol/Internet ProtocolA protocol family originally developed for UNIX; now available for almostall operating systems. The entire Internet is based on TCP/IP. Eachcomputer in the network receives a unique address – the IP address.Important TCP/IP application protocols in the Internet are HTTP, FTP andDNS, among others.
Beeper
ESMTP
MAPI
Message
Messaging System
Pager
POP3
SMS
SMTP
TCP/IP Protocol
System Services E-mail Connection 5-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
5.4 Exclusions
The statements made in this description are purely for informationpurposes. They have been made to the best of our current knowledge.However, we cannot accept any liability arising from them. Furthermore,we explicitly point out that at the current state of technology it is notpossible to exclude errors in production under all application conditions,especially regarding software programs. Especially when used incombination with other products, particularly those from third-partymanufacturers where we have had no influence on the design, situationscould arise that result in the faulty functioning of individual products or of asystem.
5.5 System Requirements
HardwareUsable in SYSTEM200 controller family devices in the machine toolsector for the MTC200, ISP200, MTA200 and TRANS200 systems.
Network ConnectionTo use e-mail components, the controller must have a networkconnection with a corresponding e-mail interconnect to a mail server. Themail server can be in a company LAN or, for example, at an InternetService Provider.
if necessary, incoming transmissions from the controller are forwarded tothe appropriate Internet agents (mail server, SMS gateways…) and sentto the addressed recipients.
2Topologie.bmp
Fig. 5-2: Network topology for e-mail interconnect
Software• Target operating system is Windows NT 4.0 or Windows 2000.
• Installed machine tool interface MTGUI 22VRS.
5-4 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
5.6 Installation
The software for the e-mail connection to the controller for theSYSTEM200 is part of the machine tool interface MTGUI 22VRS. Thismeans that every system on which MTGUI 22VRS is installed alreadycontains the software for e-mail connection. If necessary this feature canbe activated via the MTGUI license management.
The exact description of the MTGUI installation can be found in theapplication description "22VRS Installation ".
User RightsE-mail programming takes place inside the machine tool interface in thesetup menu, which can be selected via the MTGUI main menu.
When the setup menu is selected, user authentication is requested.
3Setup_Login.bmp
Fig. 5-3: Login for setup menu
No additional user rights are necessary to process e-mail programs.
LicensingE-mail is a licensed component that must be activated via licensemanagement in the setup menu in the machine tool MTGUI.
System Services E-mail Connection 5-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
5.7 E-mail Programming
OverviewE-mail programming is started via the MTGUI setup menu and containsthe following main configuration possibilities:
• Which events generate an e-mail?
• Which message is sent when an event occurs?
• To which user or user groups is sent, and at what times?
• Should a message be repeated, and if so, who are the recipients forthe repeated message?
4Uebersicht.bmp
Fig. 5-4: Main screen for e-mail programming
Creation of new messages and deleting or editing of messages. As wellas message contents such as header, body and attachments, themessages are here assigned to recipients or recipient groups. In additionthe message can here be prioritized and repeat commands programmed.
General settings such as SMTP server connection, sender informationand information on data filing.
Entry of possible recipients in an address book.
Assignment of recipient to groups such as Hotline or Service.
Overview in tabular form of all messages currently waiting to be repeated.
New/Delete/Edit
Settings
Recipient
Groups
Overview of Repeat Instructions
5-6 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Minimum ConfigurationTo gain experience with the system, it makes sense to first operate the e-mail connection in a minimum configuration and perform full programmingof the system at a later time.
By using this procedure, it is possible to send information aboutsoftware/firmware versions to any recipient via e-mail after a fewconfiguration steps.
To make a minimum configuration, proceed as follows:
1. In the “Settings” menu, program the “General” tab as described in thechapter “Logic Analyzer Reference”.
2. In the “Settings” menu, program the “Send” tab as described in thechapter “Logic Analyzer Reference”.
3. Open the machine tool interface info dialog and press the “Send info”button.
4Info_dialog.bmp
Fig. 5-5: MTGUI info dialog
The e-mail send dialog (similar to MS Outlook) follows with anoverview of the complete e-mail.
4. At this point, complete the recipient addressing and press the “Send”button.The e-mail is then sent to the mail server, which forwards it on.
The recipient should receive an e-mail containing information on thecontroller software/firmware version.
System Services E-mail Connection 5-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Menu SettingsInformation on data filing, mail server connection and further senderdetails are entered into the e-mail programming “Settings” menu. Inaddition, the e-mail connection can be activated or deactivated here.
GeneralThe next picture shows the “General” tab in the “Settings” menu.
4Einstellungen_Allgemein.bmp
Fig. 5-6: Settings menu: “General” tab
This check box activate or deactivates the complete e-mail connection,i.e. blocks it.
In the following field, the group database version is shown if this is filedcentrally. The date shows when the last write access to this database wasmade.
The group database contains addressing information for group recipientsand their assignment to individual recipient groups. If the same groupdatabase is used for multiple machines, this can be filed on a centralnetworked computer or on a controller. The path to the group databasemust be entered here. The path name must be structured as follows:
\\<Computername>\<Assignment>\<Path>\IndEMail_Grp.mdb
Example:
\\BTV20_04\MTGUI_PRJ\PROGRAMDATA\E-Mail\IndEMail_Grp.mdb
BTV20_04 → Computer name
MTGUI_PRJ → Assignment to computer BTV20_04
PROGRAMDATA\E-Mail → Further path to group database
IndEMail_Grp.mdb → Name of group database
The path can also be found by browsing in the associated file dialog in thenetwork.
Blocking E-mails
Database Version
Path to Group Database
5-8 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Unit_1.1 Unit_1.2 Unit_1.3
Ethernet
IndEMail_Grp.MDBIndEMail_Grp.MDB IndEMail_Grp.MDB
Unit_2.1
IndEMail_Grp.MDB
Unit_2.2
IndEMail_Grp.MDB
Unit_2.3
IndEMail_Grp.MDB
\\Unit_1.2 \D\...\IndEMail_Grp.mdb \\Unit_1.2 \D\...\IndEMail_Grp.mdb
\\Unit_2.3 \D\...\IndEMail_Grp.mdb\\Unit_2.3 \D\...\IndEMail_Grp.mdb
E-Mail-P
roj.
UDP-Broadcast "\\Unit_1.2\..."
UDP-Broadcast "\\Unit_2.3\..."
E-Mail-Proj.
4Einstellungen_Gruppen.FH7
Fig. 5-7: Joint group database
The picture “Joint group database” shows two networks, each using ajoint group database. The path to the associated database is entered foreach network on each BTV. No path may be entered on the BTVcontaining the group database.
When using a joint group database on a central server, the individualclients (controllers) contain a local copy of this database. This keeps thee-mail connection running even if the connection to the central groupdatabase is broken. If the central database is modified on a clientcomputer, then the computer that has made these modifications sends aUDP broadcast that informs all stations that the group database has beenmodified. The stations using this database then retrieve a new copy of thegroup database.
A free port is needed for communication with UDP broadcasts. The portmust have the same settings for both server and client. To determine afree port, please contact the network administrator responsible.
Address extensions for recipient addresses can be indicated here. Anaddress extension begins with the @ symbol, followed by the postboxsupplier, i.e. the company or the Internet provider.
Possible address extensions are, for example:
• @bosch.com (company name)
• @t-online.de (Internet provider)
• etc.
All address extensions entered here are available in a context menu whenfurther programming recipient addresses and thus simplify the entry ofnew recipient addresses.
UDP Port for Broadcast
Context Menu for RecipientAddresses
System Services E-mail Connection 5-9
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
SendingThe next picture shows the “Send” tab in the “Settings” menu. Within thisdialog, settings for the sender or the mail server connection can beentered.
4Einstellungen_Senden.bmp
Fig. 5-8: Settings menu: “Send” tab
Sender name such as computer name of the transmitting station. Thisname appears for the recipient as the sender name.
E-mail address of transmitting station. The address is displayed for themessage recipient as the sender address.
The actual e-mail address for an answer is set here. For failed e-mails,which could not be distributed, the mail server generates a transmissionrecord and sends it back to the programmed answer address.
Enter here the address of the SMTP server that forwards the controllersend instructions. Contact the responsible system administrator or theInternet Service Provider for this.
if the SMTP server supports ESMTP (Extended Simple Mail TransferProtocol), the desired ESMTP authentication mode can be set here. Tooperate using ESMTP, a corresponding user account must be set up onthe mail server. Contact the responsible system administrator or theInternet Service Provider for this.
User name when ESMTP protocol is used.
Password when ESMTP protocol is used.
ReceivingThis area is reserved for future options.
Sender
Sender Address
Answer Address
SMTP Server
ESMTP Authentication
ESMTP User Name
ESMTP Password
5-10 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Recipient MenuThe next picture shows the “Recipient” tab in the e-mail program. Allrecipient addresses can be programmed here. All addresses entered areavailable in a selection list (address book) for further programming steps.
4Empfaenger.bmp
Fig. 5-9: Recipient menu
1. In the right-hand area of the dialog, enter the recipient name, theassociated e-mail address and a comment describing the recipient’sfunction in the company. A context menu is available for previouslyset address extensions on the right-hand side next to the field for e-mail addresses and above the arrow button.
2. To create or delete a list entry, use the corresponding MTGUI menupoints or the F2 / F3 function keys.
Group MenuThe “group” menu contains the assignments of individual group recipientsto the various recipient groups. The system uses two internal databasesfor this purpose. One database contains the previously programmed localrecipients, the other (the so-called group database) contains informationon the groups and group recipients.
Note: While the recipient database is always held on the localcontroller, the group database can also be held on a centralserver and thus be available for other controllers.
Data exchange between recipient and group databases is supported byan integrated export/import function.
System Services E-mail Connection 5-11
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Group RecipientsThe next picture shows the “Group recipients” menu.
4GruppenEmpf.bmp
Fig. 5-10: Groups menu: “Group recipients” tab
1. To assign individual recipients to different groups, a first stepdetermines which recipient should be made available for furtherprogramming as a group recipient. For this, it is necessary to set up anew group recipient as shown in the dialog, or to import this from thepreviously set up local recipient database.
2. To import local recipients, press the “Import local recipient” button.3. In the overview that follows, select the local recipients to be imported.4. After pressing the “Import” button, the selected entries are imported
and are available as group recipients for further editing.To set up new group recipients, use the same procedure as described inthe chapter on “Recipient menu”.
Group recipients can be exported from the group database to the localrecipient database in the same way as local recipients are imported.
1. To do so, press the “Export to local recipients” button.2. In the selection that follows, the entries to be exported can be chosen.3. After pressing the “Export” button, the corresponding entries are
exported to the local recipient database.
5-12 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
GroupsThe next picture shows the “Groups” menu.
4Gruppen.bmp
Fig. 5-11: Groups menu: “Groups” tab
The system supports forming of groups. For example, it can be useful togroup persons who are responsible for a certain manufacturing area intoa responsibility-related group (here: Service Line 5). If this group isprogrammed to receive a certain message, this message will be sent toall persons in the group.
This leads to simpler and clearer addressing of messages.
1. Press the “New” button on the MTGUI interface to create a group.2. Give a name for the new group in the following entry dialog.
In the right-hand window area, “Other group recipients” shows a list ofall group recipients who can be entered into this new group.
3. Mark a recipient in this list and enter it into the new group with the“<<” button.
1. To remove a recipient from the group, mark the appropriate entry inthe “Recipients in this group” list.
2. Press the “>>” button.The entry is removed from the group and reappears in the “Recipientsin this group” list.
1. To delete a group, select an appropriate group from the “Selectgroup” list.
2. Now press the MTGUI “Delete” button.After confirming the security query, the group is deleted.
Editing Groups
System Services E-mail Connection 5-13
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Under certain circumstances such as shift work, short-term responsibilityor employee vacation, it may be necessary to program time-dependentdelivery.
1. Select the appropriate group recipient from the “Recipients in thisgroup” list.
2. Then, in the “Recipient is responsible in this timeframe” table, enterthe timeframe in which the recipient may receive a message.
Example 1: Hotline employee Inga Reiss, early shift 08:00 – 14:00 hr.
4Zeit_Bsp1.bmp
Fig. 5-12: Time-dependent delivery: shift work
Example 2: Peter Specht, on vacation from Thursday, on duty beforethen.
4Zeit_Bsp2.bmp
Fig. 5-13: Time-dependent delivery: employee vacation
Note: If no time-dependent delivery has been programmed for agroup recipient, the message will always be delivered.
Note: When recipient absence is prolonged (e.g. vacation), anadditional possibility exists to program the recipient’s OfficeAssistant (e.g. with MS Exchange/MS Outlook) such that e-mails are forwarded to a stand-in.
Time-dependent Delivery
5-14 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Messages Overview MenuAfter programming of recipients and groups is finished, the next stepstarts handling message programming.
1. Change to the main screen for e-mail programming.2. The message list can be edited using the MTGUI “New/Delete” and
“Edit” buttons.3. Set up a new message via “New” (F2).
A new entry appears in the message list in the form"[New Name] <Seq. No.>" (see picture).
4Nachrichten_Liste.bmp
Fig. 5-14: Message overview: Setting up a new message
Message Classes and Name Assignment
The following sources in the system can be used to generate a message:
• CNC faults/messages
• MTA200 faults/messages
• IndraStep diagnostics
• ProVi messages
• System faults
• Preventative maintenance announcements
• Transmission of info dialog
Each of these sources creates a specific message class with a fixeddefined message name structure. If for example a ProVi message isgenerated by the system and sent to the e-mail component, this messagemust be programmed. An e-mail is generated with the help of theassociated program and sent to the mail server connected.
The task of e-mail programming is to create an entry with a suitablemessage name for all messages that should be processed as an e-mailand configure them correctly.
Message Classes - General
System Services E-mail Connection 5-15
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
The message name for each message class consists of several partialnames.
<Message class>_<Partial name1>_<Partial name2>_<Partial name3>
General Rules:
• The "* Operator" can be used as a wildcard in a partial name.
e.g.: PLC-ProVi_Error_00_1_10*
• Not all partial names need to be entered. The message must becomplete, however, from left to right up to the missing partial names.All messages generated by the system that correspond to the parts ofthe message name programmed are assigned to them.
e.g.: PLC-ProVi_Error � all ProVi faults occurring on allcontrollers are assigned to this message name.
Numbers in Partial Names:
• No leading zeros (when working without the Assistant)
• Separators allowed, separator operators: .. or ... or -
e.g.: PLC-ProVi_Error_00_1_1000...2000
Which Message Classes Exist?Before configuring messages, the following overview of special messageclasses supported by the system is given.
Marked by:
• Process number
• Fault number (in short: number)
• Identification fault/message
• Drive address and fault number
• NC memory
• NC program
• Block number
Structure of Message Name:
NC – MTC_Error_<Dev>_<Mod>_<Proc>_<No>
NC – MTC_Message_<Dev>_<Mod>_<Proc>_<No>
Marked by:
• Group
• Number
• Identification fault/message
Structure of Message Name:
NC – MTA_Error_<Dev>_<Mod>_<Grp>_<No>
NC – MTA_Message_<Dev>_<Mod>_<Grp>_<No>
Structure of the Message Name
CNC Faults/Messages
MTA200 Faults/Messages
5-16 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Marked by:
• Controller, module, step chain instance name
• Name of faulty step and/or faulty action
• Identification of timing/monitoring error
• Bitmap of fault condition in KOP form
Structure of Message Name:
PLC – IndraStep_<Dev>_<Mod>_<Instance name>_Time
PLC – IndraStep_<Dev>_<Mod>_<Instance name>_RMon
PLC – IndraStep_<Dev>_<Mod>_<Instance name>_FMon
Marked by:
• Type = fault, Message→ controller, module and message numberType = warning, startup prerequisite, setup diagnostic→ controller andmessage number
• Number
• Identification incoming/outgoing
Structure of Message Name:
PLC – ProVi_Error_<Dev>_<Mod>_<No>
PLC – ProVi_Message_<Dev>_<Mod>_<No>
PLC – ProVi_Warning_<Dev>_0_<No>
PLC – ProVi_Setup_<Dev>_0_<No>
PLC – ProVi_StartCondition_<Dev>_0_<No>
Marked by:
• Controller number
• Additional information about system fault
• Software/Firmware status
• Message number
Structure of Message Name:
SYSTEM_Error_<Dev>_<No>
Marked by:
• Operating times: Warning level exceeded/interval time reached
• Controller number
• Type
• Processing unit
• Entry number
Structure of Message Name:
Maint_Warning_<Dev>_<Type>_<Unit>_<Num>
Maint_Max_<Dev>_<Type>_<Unit>_<Num>
IndraStep Diagnostics
ProVi Messages
System faults
Preventative MaintenanceMessages
System Services E-mail Connection 5-17
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Configuring MessagesIn the “Message overview” menu, select a message or set up a newmessage. The screen changes to the Message Editor after pressing theMTGUI “Edit” button.
4Nachrichten_Neu.bmp
Fig. 5-15: Edit message
The following settings can be made for each message here:
• Activate/deactivate message
• Message name (describes which events have triggered the message)
• Addressing (Recipient/Groups, To/Cc/Bcc)
• Header/Body/Attachment
• Message priority
• Number of repetitions and repetition time
• Activate send dialog
It is possible to block or unblock the current message by pressing thisbutton.
This button allows entry of a name for the current message. The nameshould be chosen such that it corresponds to the description in thesections “Message classes and name assignment” and “Which messagesexist?”.
Note: As far as possible, always use the Message Assistant to entera message name.
Block/Unblock Message
Configure Message Name
5-18 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
The Message Assistant simplifies entry of the message name. Allmessage classes or partial names described in the section “Whichmessages exist?” are made available via selection lists.
Enter a short comment for the current message. This comment can thenbe viewed in the “Message overview” menu.
This button allows addressing in a similar fashion to every standard e-mailsoftware. After the button is pressed, the following dialog for addressentry appears:
4Nachrichten_Adr.bmp
Fig. 5-16: Enter recipient
All local recipients and all groups programmed are available in this dialog.Select the desired recipient or groups in the left-hand list and transferthese to the right-hand table with "→".
In addition it is possible to set whether the first message (check box E.N)and/or the repeat message (W.N) should be sent to each recipient. If bothcheck boxes are here deactivated, the first message and the repeatmessage are sent to this recipient.
Every message source that generates a message (for example,preventative maintenance) generates a complete message includingheader and body. If additional information in the header or body isneeded, this can be entered here. The message contains the text enteredhere as well as the original text.
All messages waiting are first buffered by the system and then processedin the order of priority. A value of 1 has high priority and a value of 3 alower priority.
Time interval after which a message is sent again, i.e. repeated. With arepeat time of 0:0, the message is not repeated. If the “Number ofrepeats” is 0, the message is repeated at the programmed time interval.
Starting the Message Assistant
Message Comment
Address Message
Including Additional Header andBody
Setting Message Priority
Setting Time Interval for Repeat
System Services E-mail Connection 5-19
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
= 0 → No limits to number of repeats
> 0 → Number of repeats
A send dialog can be activated via this check box that is opened for everymessage occurring. The message can be modified and sent manuallywith this dialog.
This button allows inclusion of one or more attachments in the currentmessage or their deletion. All e-mail attachments appear in the lowerwindow area of the Message Editor.
A signature (e.g. to identify the station) can be entered here. Thesignature is added to the message body. One signature can be used bymultiple or all messages.
Note: Since messages generated by the system already have aheader and body, no additional entry in the Message Editor isnecessary here.
Repeat Messages Overview MenuThe following menu gives an overview of the status of active repeatinstructions.
4Wh_Auftraege.bmp
Fig. 5-17: “Repeat messages” overview menu
Setting Number of Repeats
Send Dialog
File Attachment
Sign Message
5-20 E-mail Connection System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
System Services License Management 6-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
6 License Management
6.1 General
From version V22, a license management system (LMS) is integrated intothe MTGUI. This administers:
• Licensing of MTGUI standard functions and
• authorization of certain additional components (options).
License:
Permission to use a software product.
Electronic Licensing:
Non-hardware based storage of license information on a computer.
License Management System (LMS):
Administration of licenses (here electronic licenses) on a computer.
Type of License:
Our LMS recognizes the following types of licenses:
1. License without time limit- always valid- can only be issued by the license provider
2. License with time limit- loses its validity after a certain period- can only be issued by the license provider
3. Test license- loses its validity after a certain period- can be activated by the customer- cannot be reactivated after expiry
Site Code:
A hexadecimal number containing information about the licensed productand the target computer.
Site Key:
A Site Key based on a Site Code is generated by the license provider thatcontains the following information:
• The product to be licensed
• Type of license
• Options authorized for use
Basic Terms
6-2 License Management System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
6.2 Installation
The LMS is installed along with the product (machine tool interface).
During installation, the product serial number is manually entered andstored. After completing installation, the plant computer still does not havea license for the product; the licensing procedure must be carried out (seebelow).
Each license issued refers to a specific product serial number.
Upgrading (within a version) has no effect on an issued license.
An issued license is only valid for a specific product version.
6.3 Use of Options
Options can only be used if:
• a product license has been issued and
• these options have been authorized within the product license.
If this is not the case, usage is blocked, i.e. the options are deactivatedand a message appears at startup.
LicGui_MsgBox.bmp
Fig. 6-1: Message: “Components not licensed”
First-time Installation
Upgrading
System Services License Management 6-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
6.4 License Management Tool
FunctionalityThe license management tool (LMT) servers the purpose of administeringlicenses on the customer’s computer.
It shows the license status, can generate a time-limited test license, storean unlimited license, extend (use of further options) and transfer toanother computer. In addition it shows the authorization status of possibleoptions for the product in question.
Calling and User RightsUse of the LMT must be authorized by user administration.
LIC_User_gr.bmp
Fig. 6-2: User rights
The LMT is called via the setup menu.
6-4 License Management System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
"General" TabThis tab shows whether:
• a product license has been issued and
• which type of license (test or unlimited license).
LICGUI_NoLicense_gr.bmp
Fig. 6-3: License management: “License not present”
A product license has not been issued.
LICGUI_WithLicense_gr.bmp
Fig. 6-4: License management: “License present”
A product license has been issued.
System Services License Management 6-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
LicGui_TestLic_gr.bmp
Fig. 6-5: License management: “Test license present”
A test license has been activated.
"Code" TabVia this tab a:
• Test license can be created, or
• an unlimited license can be created or extended.
LICGUI_Code_gr.bmp
Fig. 6-6: License management: “Code”
6-6 License Management System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
A test license can be created when no unlimited license is present but theproduct is licensed for test or emergency operation and all options are tobe authorized.
Pressing the “Create test license” button creates a 30.day limited license.
This procedure will not work if a test license has already been created inthe past.
A fault message is shown.
LICGUI_ErrrorTestLic.bmp
Fig. 6-7: Fault message
Procedure to create an electronic license on a customer computer.
• The Site Code given in this tab is sent to the license provider. Inaddition, the serial number and the list of options to be authorized isneeded.
• The license provider generates the Site Key from this information.This is handed to the customer and entered into the Site Key field.
• The license is stored by pressing “OK” or “Accept”.
Note: A Site Key only fits that computer from which the Site Codecame.
The “Copy” and “Paste” buttons can be used to avoid typing mistakes.
Pressing this button starts the Windows Notepad editor and transfers allrelevant information to it. This information can be saved in a file and usedto simplify the ordering procedure.
LicGUI_LicInfo_gr.bmp
Fig. 6-8: License information
Creating a Test License
Creating or Extending anUnlimited License
Ordering Information
System Services License Management 6-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
The serial number is entered during the installation procedure and isnormally kept unless the license is transferred to another computer. Inthis case it is deleted on the original computer. If a new license has beenobtained, the serial number must be entered.
"Transfer" TabAn electronic license can be transferred from one computer to another.
Procedure:A license is to be transferred from computer A to computer B.
1. Step: Computer B:A transfer file is created in any directory (can also be on diskette).
erstellen.bmp
Fig. 6-9: Step 1
2. Step: Computer A deposits its license in the transfer file created.
export.bmp
Fig. 6-10: Step 2
3. Step: Computer B reads the license from the transfer file.
einlesen.bmp
Fig. 6-11: Step 3
After the transfer, the license is no longer present on computer A.
The serial number is transferred along with the license. The serial numberon computer A is deleted.
Serial number
6-8 License Management System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
"Component Overview" TabThis tab shows, independently of the system, the list of options that canbe authorized in the product license. A ticked check box means that thecorresponding option is authorized. Entries are not possible.
LICGUI_Komponenten_gr.bmp
Fig. 6-12: License overview
System Services WinLock 7-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
7 WinLock
7.1 General
WinLock allows locking of the Windows interface so that only certainprograms can be started and prevents changes to the Windowsconfiguration.In addition, exiting Windows is only possible with the appropriate rights.
WinLock runs under the WindowsNT operating system on RexrothIndramat operator panels.
WinLock Dialog.bmp
Fig. 7-1: WinLock
LicenseThe appropriate license must be obtained in order to use WinLock.
If this license has expired and WinLock is started in Protected mode, theprogram automatically switches to Standard mode without asking for apassword.
Mode SwitchingWinLock can differentiate between two modes (Standard and Protected);the desired mode must be selected via each “Radio” button.
The mode switch first becomes active after a renewed Windows logon.The logoff must be carried out from within WinLock.
Note: A normal logoff from Windows (e.g.: Ctrl+Alt+Delete) does notlead to a mode switch. After the renewed Windows logon, theold mode is still active.
Mode switching is only possible with the appropriate rights (see chapter"Rights").
7-2 WinLock System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Switching from Standard to Protected mode takes place as follows:
1. Start WinLock2. Switch mode to “Protected”3. Log off
The following procedure is used to switch from Protected to Standardmode:
1. Exit all programs (except WinLock)2. Switch mode to “Standard”3. Log off
Exiting WindowsIn Protected mode, shutting down, restarting and a renewed Windowslogon is only possible via WinLock.
If a new mode is selected, this first becomes active after a renewedWindows logon.
Exiting Windows is only possible with the appropriate rights (see chapter"Rights").
Starting ProgramsIn Protected mode, WinLock automatically starts all programs in theAutostart directory as well as the Run entry in the Registry . These arethe same as those started in Standard mode by Windows Explorer.
Note: Under no circumstances may a program be started that callsother, undesirable, programs (e.g. Explorer.exe, entryrequests, etc.)
After exiting the program, this can only be restarted be restartingWindows (a renewed logon is sufficient).
Switching from Standard toProtected Mode
Switching from Protected toStandard Mode
System Services WinLock 7-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
RightsWinLock uses the Rexroth Indramat interface user administration todetermine rights.
Two separate rights (“Exiting from Windows” and “Switch WinLockmode”) in the user administration are available for switching modes andexiting Windows.
If the current user does not have the corresponding right, the useradministration dialog opens. Each function can only be executed with thecorresponding right.
The rights, users and passwords are assigned in the Rexroth Indramatuser manager and can also be modified there.
UserMan.bmp
Fig. 7-2: Rexroth Indramat user administration: “Assigning rights”
Multilingual Function
WinLock uses the Rexroth Indramat interface language administration todisplay text in the language currently set. Changing the current languageis only possible in the Rexroth Indramat interface.
Command Line Parameters
With the "/ForceProtected" command line parameter, WinLock can beswitched to Protected mode without any further entries.
Note: This call automatically carried out a renewed logon.
Rexroth Indramat LanguageAdministration
/ForceProtected
7-4 WinLock System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Rear DoorTo be able to remove the lock on Windows functions in an emergency(e.g. a forgotten password), WinLock can be forced by another Windowsuser (see chapter "Windows Users") to start again in Standard mode.
Procedure:
1. Log on as another Windows user (User 1).2. In the Registry entry
HKEY_LOCAL_MACHINE_\Software\Indramat\WinLockthe value "ForceDefaultMode" (DWORD) must be entered and set tothe value "1".
3. Log on as the blocked Windows user (User 2).ATTENTION: The user is immediately logged off again.
4. Log on under Windows and either remove the Registry entry or set itsvalue to “0”.
Note: As long as the "/ForceDefaultMode" value is set to “1”,WinLock will no longer start in Protected mode.
Starting ServicesFor both multilingual operation and the Rexroth Indramat useradministration, the RPC service is needed. Starting this service can takesomewhat longer on certain machines. For this reason, WinLock waits forthis service when starting. During this period a dialog showing the waittime opens.
WaitService.bmp
Fig. 7-3: Waiting for the RPC service to start
If for some reason the service does not start, the dialog can be closed atany time be pressing “Cancel”.
The dialog automatically closes after two minutes or when the servicestarts up.
The language displayed is always English.
Note: PCs with a fast RPC service startup do not show this dialog.
System Services WinLock 7-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
7.2 Installation
InstallingWinLock is a stand-alone program, automatically installed by the RexrothIndramat interface installation program when the interface is beinginstalled. The installation program directly generates a shortcut toWinLock from which it can be started. The appropriate license must beobtained and authorized in order to use WinLock.
If multiple versions of the Rexroth Indramat interface are installed on thePC, WinLock works only with the interface in whose directory it isinstalled.
WinLock may not be started on substituted drives.
Note: If WinLock is started on a substituted drive, Protected modecannot be activated.
WinLock itself does not offer a way of starting programs. It is thereforenecessary, before activating Protected mode, to ensure that a link to theRexroth Indramat interface is entered into the Autostart directory. Furtherlinks to other programs to be started may also be added if necessary.
When the Rexroth Indramat interface user is exited, The WinLock windowis the only one to remain visible. To restart the interface, either “Exit” or“Restart” must therefore be selected.
Note: After installation, WinLock is in Standard mode, i.e. Windowsis not yet locked. To switch to Protected mode, see chapterMode Switching.
Multiple Installations
Substituted Drives
Starting Applications via theAutostart Directory
7-6 WinLock System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
7.3 Configuration
Windows UsersThere should be at least two Windows users present.
The first user is there to be able to remove the WinLock lock for the otheruser at any time (see chapter "Rear Door"). This user must possessadministrator rights to do so. WinLock should never be started when thisuser is logged on.
Note: The first user is only there for security reasons, to be able tounlock Windows at any time. Normally, this user is notneeded.
WinLock and the Rexroth Indramat interface run under the second user.No administrator rights are needed for this user (see chapter"Installation").
Operator RightsThe operator for whom the Windows system is to be locked must onlyhave the right to be able to log on under the locked user in Windows.
Note: If the operator can log on as the other user, the Windowssystem is no longer locked for him there and he also has thepossibility, if necessary, to remove the WinLock lock.
The operator must not have the right to be able to switch the WinLockmode (see chapter "Rights"), although he may possess the ”ExitWindows“ right, since he cannot reach the Windows system in this way.
System Services WinLock 7-7
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
7.4 FAQ
Will Not Start in Protected ModeAlthough WinLock is switched to Protected mode, the normal Windowsinterface starts again.
Possible causes:
• A user other than the “WinLock” user has logged on in Windows.
• ForceDefaultMode is set to the value "1"(see chapter "Rear Door").
• WinLock has been started from a substituted drive.
Starts Only Once in Protected ModeWinLock starts only once in Protected mode. The second time, theprogram starts again in Standard mode.
Possible cause:
• The Windows user had no administrator rights at installation time andtherefore WinLock was not properly installed (see chapter"Installation").
Rexroth Indramat User Administration Does Not WorkAlthough a copy of Rexroth Indramat user administration is installed,WinLock always asks for its own password.
Possible cause:
• The RPC service is not starting or the wait dialog for the service hasbeen prematurely exited with “Cancel” (see chapter "StartingServices").
Multilingual Display Does Not WorkAlthough the standard language is not set to English, the WinLockinterface is displayed in English.
Possible cause:
• The RPC service is not starting or the wait dialog for the service hasbeen prematurely exited with “Cancel” (see chapter "StartingServices").
OPC Server or DCOM Communication Does Not WorkA DCOM connection to the computer on which WinLock is running inProtected mode can not be made.
Possible cause:
• The WinLock file name does not agree with that of the standardWindows shell (normally Explorer.exe).
7-8 WinLock System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
System Services List of Figures 8-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
8 List of FiguresFig. 2-1: System Configurator with two devices 2-1
Fig. 2-2: Device types and classes 2-3
Fig. 2-3: Edit menu 2-5
Fig. 2-4: Steps for creating new device 2-5
Fig. 2-5: Steps for editing new device 2-6
Fig. 2-6: Steps for pasting device 2-6
Fig. 2-7: New menu selection 2-6
Fig. 2-8: Edit menu selection 2-9
Fig. 2-9: Starting the Assistant 2-12
Fig. 2-10:Select device types 2-12
Fig. 2-11:Serial port parameters 2-13
Fig. 2-12:Progress display 2-13
Fig. 2-13:Scan results 2-14
Fig. 3-1: Backup/Restore of user data 3-3
Fig. 3-2: System backup/System restore 3-3
Fig. 3-3: Backing up a stand-alone controller 3-6
Fig. 3-4: Backing up a networked controller 3-6
Fig. 3-5: User data archiving procedure 3-7
Fig. 3-6: Procedure for saving user data 3-8
Fig. 3-7: Procedure for restoring user data 3-9
Fig. 3-8: Selection of data packets via a list field 3-10
Fig. 3-9: The batch file “BACKUP_USER_IND_1.ASD” 3-10
Fig. 3-10:Selecting data packets to be saved 3-14
Fig. 3-11:Saving control data before the backup 3-14
Fig. 3-12:Selection dialog for destination file 3-15
Fig. 3-13:Selection list for file archive 3-16
Fig. 3-14:Entry dialog for file information 3-16
Fig. 3-15:Saving without control data 3-17
Fig. 3-16:Query dialog for formatting 3-17
Fig. 3-17:Final dialog after finishing backup 3-18
Fig. 3-18:Selection list for file archive 3-19
Fig. 3-19:Delete existing user data? 3-20
Fig. 3-20:System overview – complete backup 3-22
Fig. 3-21:NT boot menu 3-23
Fig. 3-22:DOS boot menu (BTV20.3 with 2 network cards) 3-23
Fig. 3-23:Configuration in Autoexec.bat 3-24
Fig. 3-24:User BACKUP_USER on the backup computer 3-25
Fig. 3-25:Backing up a stand-alone controller 3-26
Fig. 3-26:Backing up a networked controller 3-27
Fig. 3-27:System restore with a Bosch Rexroth master disk 3-29
Fig. 3-28:System restore for a controller with empty disk 3-30
Fig. 3-29:Creating a hard disk image 3-32
8-2 List of Figures System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Fig. 3-30:Options menu settings 3-33
Fig. 3-31:Important: Set the C: partition to 2000 MB when restoring 3-33
Fig. 3-32:Batch File for backup in an image file 3-34
Fig. 3-33:Batch File for restoring from an image file 3-35
Fig. 3-34:Changing SID and computer name using Ghost Walker 3-36
Fig. 4-1: Logic Analyzer main screen 4-1
Fig. 4-2: New measurement 4-2
Fig. 4-3: Edit variables list 4-3
Fig. 4-4: Trigger settings 4-4
Fig. 4-5: Trigger condition step 1 4-5
Fig. 4-6: Trigger condition step 2 4-5
Fig. 4-7: Trigger condition step 3 4-6
Fig. 4-8: Status: Waiting for trigger … 4-6
Fig. 4-9: Status: Recording in progress 4-7
Fig. 4-10:Analyzing recorded data 4-7
Fig. 4-11:Channel labels 4-7
Fig. 4-12:Level 1 function keys 4-9
Fig. 4-13:Level 2 function keys 4-9
Fig. 4-14:Status line 4-10
Fig. 4-15:“File” menu 4-10
Fig. 4-16:“Edit” menu 4-10
Fig. 4-17:“View” menu 4-10
Fig. 4-18:“Record” menu 4-11
Fig. 4-19:“Marker” menu 4-11
Fig. 4-20:Creating a new measurement 4-11
Fig. 4-21:Variables list 4-14
Fig. 4-22:Trigger settings 4-15
Fig. 4-23:“Display” options 4-18
Fig. 4-24:Advanced options 4-19
Fig. 4-25:Recording status 4-19
Fig. 4-26:Measuring time difference 4-21
Fig. 5-1: E-mail connection overview 5-1
Fig. 5-2: Network topology for e-mail interconnect 5-3
Fig. 5-3: Login for setup menu 5-4
Fig. 5-4: Main screen for e-mail programming 5-5
Fig. 5-5: MTGUI info dialog 5-6
Fig. 5-6: Settings menu: “General” tab 5-7
Fig. 5-7: Joint group database 5-8
Fig. 5-8: Settings menu: “Send” tab 5-9
Fig. 5-9: Recipient menu 5-10
Fig. 5-10:Groups menu: “Group recipients” tab 5-11
Fig. 5-11:Groups menu: “Groups” tab 5-12
Fig. 5-12:Time-dependent delivery: shift work 5-13
Fig. 5-13:Time-dependent delivery: employee vacation 5-13
System Services List of Figures 8-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Fig. 5-14:Message overview: Setting up a new message 5-14
Fig. 5-15:Edit message 5-17
Fig. 5-16:Enter recipient 5-18
Fig. 5-17:“Repeat messages” overview menu 5-19
Fig. 6-1: Message: “Components not licensed” 6-2
Fig. 6-2: User rights 6-3
Fig. 6-3: License management: “License not present” 6-4
Fig. 6-4: License management: “License present” 6-4
Fig. 6-5: License management: “Test license present” 6-5
Fig. 6-6: License management: “Code” 6-5
Fig. 6-7: Fault message 6-6
Fig. 6-8: License information 6-6
Fig. 6-9: Step 1 6-7
Fig. 6-10:Step 2 6-7
Fig. 6-11:Step 3 6-7
Fig. 6-12:License overview 6-8
Fig. 7-1: WinLock 7-1
Fig. 7-2: Rexroth Indramat user administration: “Assigning rights” 7-3
Fig. 7-3: Waiting for the RPC service to start 7-4
8-4 List of Figures System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
System Services Index 9-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
9 Index
AArchive 3-15, 3-19Archiving 3-7, 3-14Autostart Directory 7-2
BBackup 3-8, 3-10, 3-12, 3-13Backup mechanisms 3-1, 3-3Backup Strategies 3-5Batch file 3-8, 3-10, 3-11, 3-34, 3-35
CCalling the System Configurator 2-2Changing an Existing Device 2-2Checking Free Serial Ports 2-3Communication Address 2-4Complete backup 3-3, 3-22, 3-26, 3-27Complete Backup 3-3Compression 3-8Configuration 7-6Connecting a New Device 2-2Controller Data 3-13, 3-20
DData backup 1-1, 3-1Data structure 3-1DCOM Communication Does Not Work 7-7Decompress 3-9Device / Device Address 2-3Device interrogation cycle 2-4Device Type 2-3Directory Structure 2-4
EEditor 3-10Exiting Windows 7-2
FFAQ 7-7File Menu 2-4ForceDefaultMode 7-4ForceProtected 7-3Forgotten Password 7-4
HHard disk 3-4Hardware Environment 7-1
IInformation about the System Configurator 2-3Installating and Calling the System Configurator 2-2Installation 7-5Interconnection 2-4
9-2 Index System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
LLanguage Administration 7-3Language Administration Does Not Work 7-7License 7-1
MMenu Structure and Data Input 2-1Mode Switching 7-1Multilingual Display Does Not Work 7-7Multiple Installations 7-5
OOPC Server Communication Does Not Work 7-7Operating system 3-26, 3-27, 3-28, 3-29, 3-30, 7-1Operator Rights 7-6
PPaths 3-11Program Start 7-2Protected Mode 7-2
RRear Door 7-4Registry 7-2, 7-4Restore 3-9, 3-18, 3-19Rexroth Indramat Language Administration 7-3Rexroth Indramat Language Administration Does Not Work 7-7Rexroth Indramat User Administration Does Not Work 7-7Rights 7-3RPC Service 7-4
SSelecting Data 3-10Selection list 3-13, 3-14, 3-19Serial Ports 2-3Standard Mode 7-2Starting Programs 7-2Starting Services 7-4Starts Only Once in Protected Mode 7-7Structure file 3-8Substituted Drives 7-5Switches 3-10, 3-11Switching from Protected to Standard Mode 7-2Switching from Standard to Protected Mode 7-2
UUpdating the Directory Structure 2-4User Administration Does Not Work 7-7User data 3-3, 3-4User Interface Data 3-4
WWill Not Start in Protected Mode 7-7Windows users 7-6WinNT 7-1
ZZIP archive 3-19
System Services Service & Support 10-1
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
10 Service & Support
10.1 Helpdesk
Unser Kundendienst-Helpdesk im Hauptwerk Lohram Main steht Ihnen mit Rat und Tat zur Seite.Sie erreichen uns
- telefonisch: +49 (0) 9352 40 50 60über Service Call Entry Center Mo-Fr 07:00-18:00
- per Fax: +49 (0) 9352 40 49 41
- per e-Mail: [email protected]
Our service helpdesk at our headquarters in Lohr amMain, Germany can assist you in all kinds of inquiries.Contact us
- by phone: +49 (0) 9352 40 50 60via Service Call Entry Center Mo-Fr 7:00 am - 6:00 pm
- by fax: +49 (0) 9352 40 49 41
- by e-mail: [email protected]
10.2 Service-Hotline
Außerhalb der Helpdesk-Zeiten ist der Servicedirekt ansprechbar unter
+49 (0) 171 333 88 26oder +49 (0) 172 660 04 06
After helpdesk hours, contact our servicedepartment directly at
+49 (0) 171 333 88 26or +49 (0) 172 660 04 06
10.3 Internet
Unter www.indramat.de finden Sieergänzende Hinweise zu Service, Reparatur undTraining sowie die aktuellen Adressen *) unsererauf den folgenden Seiten aufgeführten Vertriebs-und Servicebüros.
Verkaufsniederlassungen
Niederlassungen mit Kundendienst
Außerhalb Deutschlands nehmen Sie bitte zuerst Kontakt mitunserem für Sie nächstgelegenen Ansprechpartner auf.
*) http://www.indramat.de/de/kontakt/adressenDie Angaben in der vorliegenden Dokumentation könnenseit Drucklegung überholt sein.
At www.indramat.de you may find additionalnotes about service, repairs and training in theInternet, as well as the actual addresses *) of oursales- and service facilities figuring on the followingpages.
sales agencies
offices providing service
Please contact our sales / service office in your area first.
*) http://www.indramat.de/en/kontakt/adressenData in the present documentation may have becomeobsolete since printing.
10.4 Vor der Kontaktaufnahme... - Before contacting us...
Wir können Ihnen schnell und effizient helfen wennSie folgende Informationen bereithalten:
detaillierte Beschreibung der Störung und derUmstände.
Angaben auf dem Typenschild der betreffendenProdukte, insbesondere Typenschlüssel undSeriennummern.
Tel.-/Faxnummern und e-Mail-Adresse, unterdenen Sie für Rückfragen zu erreichen sind.
For quick and efficient help, please have thefollowing information ready:
1. Detailed description of the failure andcircumstances.
2. Information on the type plate of the affectedproducts, especially type codes and serialnumbers.
3. Your phone/fax numbers and e-mail address,so we can contact you in case of questions.
10-2 Service & Support System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
10.5 Kundenbetreuungsstellen - Sales & Service Facilities
Deutschland – Germany vom Ausland: (0) nach Landeskennziffer weglassen!from abroad: don’t dial (0) after country code!
Vertriebsgebiet Mitte Germany Centre
Rexroth Indramat GmbHBgm.-Dr.-Nebel-Str. 2 / Postf. 135797816 Lohr am Main / 97803 Lohr
Kompetenz-Zentrum Europa
Tel.: +49 (0)9352 40-0Fax: +49 (0)9352 40-4885
S E R V I C E
C A L L E N T R Y C E N T E RMO – FR
von 07:00 - 18:00 Uhr
from 7 am – 6 pm
Tel. +49 (0) 9352 40 50 [email protected]
S E R V I C E
HOTLINEMO – FR
von 17:00 - 07:00 Uhrfrom 5 pm - 7 am
+ SA / SO
Tel.: +49 (0)172 660 04 06oder / or
Tel.: +49 (0)171 333 88 26
S E R V I C E
ERSATZTEILE / SPARESverlängerte Ansprechzeit- extended office time -
♦ nur an Werktagen- only on working days -
♦ von 07:00 - 18:00 Uhr- from 7 am - 6 pm -
Tel. +49 (0) 9352 40 42 22
Vertriebsgebiet Süd Germany South
Rexroth Indramat GmbHLandshuter Allee 8-1080637 München
Tel.: +49 (0)89 127 14-0Fax: +49 (0)89 127 14-490
Vertriebsgebiet West Germany West
Bosch Rexroth AGRegionalzentrum WestBorsigstrasse 1540880 Ratingen
Tel.: +49 (0)2102 409-0Fax: +49 (0)2102 409-406
Gebiet Südwest Germany South-West
Bosch Rexroth AGService-Regionalzentrum Süd-WestFellbacherstr.11570736 Fellbach
Tel.: +49 (0)711 54041–0Fax: +49 (0)711 54041–147
Gebiet Südwest Germany South-West
Bosch Rexroth AGRegionalzentrum SüdwestRingstrasse 70 / Postfach 114470736 Fellbach / 70701 Fellbach
Tel.: +49 (0)711 57 61–100Fax: +49 (0)711 57 61–125
Vertriebsgebiet Nord Germany North
Bosch Rexroth AGWalsroder Str. 9330853 Langenhagen
Tel.: +49 (0) 511 72 66 57-0Service: +49 (0) 511 72 66 57-256Fax: +49 (0) 511 72 66 57-93Service: +49 (0) 511 72 66 57-95
Vertriebsgebiet Mitte Germany Centre
Bosch Rexroth AGRegionalzentrum MitteWaldecker Straße 1364546 Mörfelden-Walldorf
Tel.: +49 (0) 61 05 702-3Fax: +49 (0) 61 05 702-444
Vertriebsgebiet Ost Germany East
Bosch Rexroth AGBeckerstraße 3109120 Chemnitz
Tel.: +49 (0)371 35 55-0Fax: +49 (0)371 35 55-333
Vertriebsgebiet Ost Germany East
Bosch Rexroth AGRegionalzentrum OstWalter-Köhn-Str. 4d04356 Leipzig
Tel.: +49 (0)341 25 61-0Fax: +49 (0)341 25 61-111
System Services Service & Support 10-3
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Europa (West) - Europe (West)
vom Ausland: (0) nach Landeskennziffer weglassen, Italien: 0 nach Landeskennziffer mitwählenfrom abroad: don’t dial (0) after country code, Italy: dial 0 after country code
Austria - Österreich
Bosch Rexroth GmbHBereich IndramatStachegasse 131120 Wien
Tel.: +43 (0)1 985 25 40Fax: +43 (0)1 985 25 40-93
Austria – Österreich
Bosch Rexroth G.m.b.H.Gesch.ber. Rexroth IndramatIndustriepark 184061 Pasching
Tel.: +43 (0)7221 605-0Fax: +43 (0)7221 605-21
Belgium - Belgien
Bosch Rexroth AGElectric Drives & ControlsIndustrielaan 81740 TernatTel.: +32 (0)2 5830719- service: +32 (0)2 5830717Fax: +32 (0)2 5830731 [email protected]
Denmark - Dänemark
BEC A/SZinkvej 68900 Randers
Tel.: +45 (0)87 11 90 60Fax: +45 (0)87 11 90 61
Great Britain – Großbritannien
Bosch Rexroth Ltd.Rexroth Indramat DivisionBroadway Lane, South CerneyCirencester, Glos GL7 5UH
Tel.: +44 (0)1285 863000Fax: +44 (0)1285 863030 [email protected] [email protected]
Finland - Finnland
Bosch Rexroth OyRexroth Indramat divisionAnsatie 6017 40 Vantaa
Tel.: +358 (0)9 84 91-11Fax: +358 (0)9 84 91-13 60
France - Frankreich
Bosch Rexroth S.A.Division Rexroth IndramatAvenue de la TrentaineBP. 7477503 Chelles Cedex
Tel.: +33 (0)164 72-70 00Fax: +33 (0)164 72-63 00Hotline: +33 (0)608 33 43 28
France - Frankreich
Bosch Rexroth S.A.Division Rexroth Indramat1270, Avenue de Lardenne31100 Toulouse
Tel.: +33 (0)5 61 49 95 19Fax: +33 (0)5 61 31 00 41
France - Frankreich
Bosch Rexroth S.A.Division Rexroth Indramat91, Bd. Irène Joliot-Curie69634 Vénissieux – Cedex
Tel.: +33 (0)4 78 78 53 65Fax: +33 (0)4 78 78 53 62
Italy - Italien
Bosch Rexroth S.p.A.Via G. Di Vittoria, 120063 Cernusco S/N.MI
Tel.: +39 02 92 365 1+39 02 92 365 326
Fax: +39 02 92 365 500+39 02 92 365 516378
Italy - Italien
Bosch Rexroth S.p.A.Via Paolo Veronesi, 25010148 Torino
Tel.: +39 011 224 88 11Fax: +39 011 224 88 30
Italy - Italien
Bosch Rexroth S.p.A.Via del Progresso, 16 (Zona Ind.)35020 Padova
Tel.: +39 049 8 70 13 70Fax: +39 049 8 70 13 77
Italy - Italien
Bosch Rexroth S.p.A.Via Mascia, 180053 Castellamare di Stabia NA
Tel.: +39 081 8 71 57 00Fax: +39 081 8 71 68 85
Italy - Italien
Bosch Rexroth S.p.A.Viale Oriani, 38/A40137 Bologna
Tel.: +39 051 34 14 14Fax: +39 051 34 14 22
Netherlands – Niederlande/Holland
Bosch Rexroth B.V.Kruisbroeksestraat 1(P.O. Box 32)5281 RV Boxtel
Tel.: +31 (0)411 65 19 51Fax: +31 (0)411 65 14 83 [email protected]
Netherlands - Niederlande/Holland
Bosch Rexroth Services B.V.Kruisbroeksestraat 1(P.O. Box 32)5281 RV Boxtel
Tel.: +31 (0)411 65 19 51Fax: +31 (0)411 67 78 14
Norway - Norwegen
Bosch Rexroth ASRexroth Indramat DivisionBerghagan 1 or: Box 30071405 Ski-Langhus 1402 Ski
Tel.: +47 (0)64 86 41 00Fax: +47 (0)64 86 90 62 [email protected]
Spain - Spanien
Bosch Rexroth S.A.Divisiòn Rexroth IndramatCentro Industrial SantigaObradors s/n08130 Santa Perpetua de MogodaBarcelona
Tel.: +34 9 37 47 94 00Fax: +34 9 37 47 94 01
Spain – Spanien
Goimendi S.A.División Rexroth IndramatParque Empresarial ZuatzuC/ Francisco Grandmontagne no.220018 San Sebastian
Tel.: +34 9 43 31 84 21- service: +34 9 43 31 84 56Fax: +34 9 43 31 84 27- service: +34 9 43 31 84 60 [email protected]
Sweden - Schweden
Rexroth Mecman Svenska ABRexroth Indramat Division- Varuvägen 7(Service: Konsumentvägen 4, Älfsjö)125 81 Stockholm
Tel.: +46 (0)8 727 92 00Fax: +46 (0)8 647 32 77
Sweden - Schweden
Rexroth Mecman Svenska ABIndramat SupportEkvändan 7254 67 Helsingborg
Tel.: +46 (0) 42 38 88 -50Fax: +46 (0) 42 38 88 -74
Switzerland West - Schweiz West
Bosch Rexroth Suisse SADépartement Rexroth IndramatRue du village 11020 Renens
Tel.: +41 (0)21 632 84 20Fax: +41 (0)21 632 84 21
Switzerland East - Schweiz Ost
Bosch Rexroth Schweiz AGGeschäftsbereich IndramatHemrietstrasse 28863 ButtikonTel. +41 (0) 55 46 46 111Fax +41 (0) 55 46 46 222
10-4 Service & Support System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Europa (Ost) - Europe (East)
vom Ausland: (0) nach Landeskennziffer weglassen
from abroad: don’t dial (0) after country code
Czech Republic - Tschechien
Bosch -Rexroth, spol.s.r.o.Hviezdoslavova 5627 00 Brno
Tel.: +420 (0)5 48 126 358Fax: +420 (0)5 48 126 112
Czech Republic - Tschechien
DEL a.s.Strojírenská 38591 01 Zdar nad SázavouTel.: +420 616 64 3144Fax: +420 616 62 1657
Hungary - Ungarn
Bosch Rexroth Kft.Angol utca 341149 Budapest
Tel.: +36 (1) 364 00 02Fax: +36 (1) 383 19 80
Poland – Polen
Bosch Rexroth Sp.zo.o.ul. Staszica 105-800 Pruszków
Tel.: +48 22 738 18 00– service: +48 22 738 18 46Fax: +48 22 758 87 35– service: +48 22 738 18 42
Poland – Polen
Bosch Rexroth Sp.zo.o.Biuro Poznanul. Dabrowskiego 81/8560-529 Poznan
Tel.: +48 061 847 64 62 /-63Fax: +48 061 847 64 02
Rumania - Rumänien
Bosch Rexroth Sp.zo.o.Str. Drobety nr. 4-10, app. 1470258 Bucuresti, Sector 2
Tel.: +40 (0)1 210 48 25+40 (0)1 210 29 50
Fax: +40 (0)1 210 29 52
Russia - Russland
Bosch Rexroth OOOWjatskaja ul. 27/15127015 Moskau
Tel.: +7-095-785 74 78+7-095 785 74 79
Fax: +7 095 785 74 77 [email protected]
Russia - Russland
ELMIS10, Internationalnaya246640 Gomel, Belarus
Tel.: +375/ 232 53 42 70+375/ 232 53 21 69
Fax: +375/ 232 53 37 69 [email protected]
Turkey - Türkei
Bosch Rexroth OtomasyonSan & Tic. A..S.Fevzi Cakmak Cad No. 334630 Sefaköy Istanbul
Tel.: +90 212 541 60 70Fax: +90 212 599 34 07
Slowenia - Slowenien
DOMELOtoki 2164 228 Zelezniki
Tel.: +386 5 5117 152Fax: +386 5 5117 225 [email protected]
System Services Service & Support 10-5
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Africa, Asia, Australia – incl. Pacific Rim
Australia - Australien
AIMS - Australian IndustrialMachinery Services Pty. Ltd.Unit 3/45 Horne STCampbellfield , VIC 3061MelbourneTel.: +61 393 590 228Fax: +61 393 590 286Hotline: +61 419 369 195 [email protected]
Australia - Australien
Bosch Rexroth Pty. Ltd.No. 7, Endeavour WayBraeside Victoria, 31 95Melbourne
Tel.: +61 3 95 80 39 33Fax: +61 3 95 80 17 33 [email protected]
China
Shanghai Bosch RexrothHydraulics & Automation Ltd.Waigaoqiao, Free Trade ZoneNo.122, Fu Te Dong Yi RoadShanghai 200131 - P.R.China
Tel.: +86 21 58 66 30 30Fax: +86 21 58 66 55 23 [email protected]
China
Bosch Rexroth China Ltd.15/F China World Trade Center1, Jianguomenwai AvenueBeijing 100004, P.R.China
Tel.: +86 10 65 05 03 80Fax: +86 10 65 05 03 79
China
Bosch Rexroth China Ltd.Guangzhou Repres. OfficeRoom 1014-1016, Metro Plaza,Tian He District, 183 Tian He Bei RdGuangzhou 510075, P.R.China
Tel.: +86 20 8755-0030+86 20 8755-0011
Fax: +86 20 8755-2387
China
Bosch Rexroth (China) Ltd.A-5F., 123 Lian Shan StreetSha He Kou DistrictDalian 116 023, P.R.China
Tel.: +86 411 46 78 930Fax: +86 411 46 78 932
China
Melchers GmbHBRC-SE, Tightening & Press-fit13 Floor Est Ocean CentreNo.588 Yanan Rd. East65 Yanan Rd. WestShanghai 200001
Tel.: +86 21 6352 8848Fax: +86 21 6351 3138
Hongkong
Bosch Rexroth (China) Ltd.6th
Floor,Yeung Yiu Chung No.6 Ind Bldg.19 Cheung Shun StreetCheung Sha Wan,Kowloon, Hongkong
Tel.: +852 22 62 51 00Fax: +852 27 41 33 44
India - Indien
Bosch Rexroth (India) Ltd.Rexroth Indramat DivisionPlot. A-58, TTC Industrial AreaThane Turbhe Midc RoadMahape VillageNavi Mumbai - 400 701
Tel.: +91 22 7 61 46 22Fax: +91 22 7 68 15 31
India - Indien
Bosch Rexroth (India) Ltd.Rexroth Indramat DivisionPlot. 96, Phase IIIPeenya Industrial AreaBangalore - 560058
Tel.: +91 80 41 70 211Fax: +91 80 83 94 345
India - Indien
Bosch Rexroth (India) Ltd.1st Floor, S-10Green Park ext. MarketNew Delhi – 110016
Tel.: +91 1 16 56 68 88Fax: +91 1 16 56 68 87
Indonesia - Indonesien
PT. Rexroth WijayakusumaBuilding # 202, CilandakCommercial EstateJl. Cilandak KKO, Jakarta 12560
Tel.: +62 21 7891169 (5 lines)Fax: +62 21 7891170 - 71
Japan
Bosch Rexroth Automation Corp.Service Center JapanYutakagaoka 1810, Meito-ku,NAGOYA 465-0035, Japan
Tel.: +81 52 777 88 41+81 52 777 88 53+81 52 777 88 79
Fax: +81 52 777 89 01
Japan
Bosch Rexroth Automation Corp.Rexroth Indramat Division1F, I.R. BuildingNakamachidai 4-26-44, Tsuzuki-kuYOKOHAMA 224-0041, Japan
Tel.: +81 45 942 72 10Fax: +81 45 942 03 41
Korea
Bosch Rexroth-Korea Ltd.Electric Drives and ControlsBongwoo Bldg. 7FL, 31-7, 1GaJangchoong-dong, Jung-guSeoul, 100-391
Tel.: +82 234 061 813Fax: +82 222 641 295
Korea
Bosch Rexroth-Korea Ltd.1515-14 Dadae-Dong, Saha-KuRexroth Indramat DivisionPusan Metropolitan City, 604-050
Tel.: +82 51 26 00 741Fax: +82 51 26 00 747 [email protected]
Malaysia
Bosch Rexroth Sdn.Bhd.11, Jalan U8/82Seksyen U840150 Shah AlamSelangor, Malaysia
Tel.: +60 3 78 44 80 00Fax: +60 3 78 45 48 00 [email protected] [email protected]
Singapore - Singapur
Bosch Rexroth SDN BHD.No.11, Jalan Astaka U8/82Seksyen U840150 Shah AlamSelangor Darul Ehsan
Tel.: +65 3 7844 8000Fax: +65 3 7845 4800
sanjay.nemade @boschrexroth.com.sg
South Africa - Südafrika
TECTRA Automation (Pty) Ltd.71 Watt Street, MeadowdaleEdenvale 1609
Tel.: +27 11 971 94 00Fax: +27 11 971 94 40Hotline: +27 82 903 29 23 [email protected]
Taiwan
Rexroth Uchida Co., Ltd.No.17, Alley 24, Lane 737Cheng Bei 1 Rd., YungkangTainan Hsien
Tel.: +886 6 25 36 565Fax: +886 6 25 34 754 [email protected]
Thailand
NC Advance Technology Co. Ltd.59/76 Moo 9Ramintra road 34Tharang, Bangkhen,Bangkok 10230
Tel.: +66 2 943 70 62 +66 2 943 71 21Fax: +66 2 509 23 62 [email protected]
10-6 Service & Support System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Nordamerika – North AmericaUSAHauptniederlassung - Headquarters
Bosch Rexroth CorporationRexroth Indramat Division5150 Prairie Stone ParkwayHoffman Estates, IL 60192-3707
Tel.: +1 847 6 45 36 00Fax: +1 847 6 45 62 [email protected] [email protected]
USA Central Region - Mitte
Bosch Rexroth CorporationRexroth Indramat DivisionCentral Region Technical Center1701 Harmon RoadAuburn Hills, MI 48326
Tel.: +1 248 3 93 33 30Fax: +1 248 3 93 29 06
USA Southeast Region - Südwest
Bosch Rexroth CorporationRexroth Indramat DivisionSoutheastern Technical Center3625 Swiftwater Park DriveSuwanee, Georgia 30124
Tel.: +1 770 9 32 32 00Fax: +1 770 9 32 19 03
USA SERVICE-HOTLINE
- 7 days x 24hrs -
+1-800-860-1055
USA East Region –Ost
Bosch Rexroth CorporationRexroth Indramat DivisionCharlotte Regional Sales Office14001 South Lakes DriveCharlotte, North Carolina 28273
Tel.: +1 704 5 83 97 62+1 704 5 83 14 86
USA Northeast Region – Nordost
Bosch Rexroth CorporationRexroth Indramat DivisionNortheastern Technical Center99 Rainbow RoadEast Granby, Connecticut 06026
Tel.: +1 860 8 44 83 77Fax: +1 860 8 44 85 95
USA West Region – West
Bosch Rexroth Corporation7901 Stoneridge Drive, Suite 220Pleasant Hill, California 94588
Tel.: +1 925 227 10 84Fax: +1 925 227 10 81
Canada East - Kanada Ost
Bosch Rexroth Canada CorporationBurlington Division3426 Mainway DriveBurlington, OntarioCanada L7M 1A8
Tel.: +1 905 335 55 11Fax: +1 905 335-41 84 [email protected]
Canada West - Kanada West
Bosch Rexroth Canada Corporation5345 Goring St.Burnaby, British ColumbiaCanada V7J 1R1
Tel. +1 604 205-5777Fax +1 604 205-6944 [email protected]
Mexico
Bosch Rexroth Mexico S.A. de C.V.Calle Neptuno 72Unidad Ind. Vallejo07700 Mexico, D.F.
Tel.: +52 5 754 17 11+52 5 754 36 84+52 5 754 12 60
Fax: +52 5 754 50 73+52 5 752 59 43
Mexico
Bosch Rexroth S.A. de C.V.Calle Argentina No 3913Fracc. las Torres64930 Monterrey, N.L.
Tel.: +52 8 333 88 34...36+52 8 349 80 91...93
Fax: +52 8 346 78 [email protected]
Südamerika – South AmericaArgentina - Argentinien
Bosch Rexroth S.A.I.C."The Drive & Control Company"Acassusso 48 41/471605 MunroProvincia de Buenos Aires
Tel.: +54 11 4756 01 40Fax: +54 11 4756 01 [email protected]
Argentina - Argentinien
NAKASEServicio Tecnico CNCCalle 49, No. 5764/66B1653AOX Villa BalesterProvincia de Buenos Aires
Tel.: +54 11 4768 36 43Fax: +54 11 4768 24 13 [email protected] [email protected] [email protected] (Service)
Brazil - Brasilien
Bosch Rexroth Ltda.Av. Tégula, 888Ponte Alta, Atibaia SPCEP 12942-440
Tel.: +55 11 4414 56 92+55 11 4414 56 84
Fax sales: +55 11 4414 57 07Fax serv.: +55 11 4414 56 86 [email protected]
Brazil - Brasilien
Bosch Rexroth Ltda.R. Dr.Humberto Pinheiro Vieira, 100Distrito Industrial [Caixa Postal 1273]89220-390 Joinville - SC
Tel./Fax: +55 47 473 58 33Mobil: +55 47 9974 6645 [email protected]
Columbia - Kolumbien
Reflutec de Colombia Ltda.Calle 37 No. 22-31Santafé de Bogotá, D.C.Colombia
Tel.: +57 1 368 82 67+57 1 368 02 59
Fax: +57 1 268 97 [email protected]
System Services
DOK-CONTRL-SYS*SER*V22-AW01-EN-P
Notes
Prin
ted
in G
erm
any2 9 4 4 9 2