5.6.4
IP-Adressen zuweisen ...............................................................................................................134
5.6.4.1
5.6.4.2
5.6.4.3
5.6.4.4
5.6.5
5.6.6
5.6.7
5.6.8
6
Programmiergrundlagen ........................................................................................................................ 147
6.1
6.2
6.3
6.3.1
Organisationsbaustein (OB).......................................................................................................151
6.3.2
Funktion (FC) .............................................................................................................................152
6.3.3
Funktionsbaustein (FB)..............................................................................................................153
6.3.4
Datenbaustein (DB) ...................................................................................................................154
6.4
Datenkonsistenz ........................................................................................................................155
6.5
Programmiersprache .................................................................................................................157
6.5.1
Kontaktplan (KOP) .....................................................................................................................157
6.5.2
Funktionsplan (FUP) ..................................................................................................................158
6.5.3
SCL ............................................................................................................................................158
6.5.4
6.6
Schutz ........................................................................................................................................167
6.6.1
Zugriffsschutz für die CPU .........................................................................................................167
6.6.2
Knowhow-Schutz .......................................................................................................................168
6.6.3
Kopierschutz ..............................................................................................................................169
6.7
6.8
Laden aus der CPU ...................................................................................................................171
6.8.1
6.8.2
6.9
6.9.1
6.9.2
6.9.3
6.9.4
7
Anweisungen ......................................................................................................................................... 177
7.1
Bitverknüpfung ...........................................................................................................................177
7.1.1
7.1.2
7.1.3
7.2
Zeiten .........................................................................................................................................185
7.3
Zähler .........................................................................................................................................193
7.4
Vergleichen ................................................................................................................................199
7.4.1
Vergleichen ................................................................................................................................199
S7-1200 Automatisierungssystem
Systemhandbuch, 11/2011, A5E02486681-05
Inhaltsverzeichnis
7