5.6
5.6.1
5.6.2
5.6.3
5.6.4
IP-Adressen zuweisen ...............................................................................................................143
5.6.4.1
5.6.4.2
5.6.4.3
5.6.4.4
5.6.5
5.6.6
5.6.7
5.6.8
6
Programmiergrundlagen ........................................................................................................................ 155
6.1
6.2
6.3
6.3.1
Organisationsbaustein (OB).......................................................................................................159
6.3.2
Funktion (FC) .............................................................................................................................160
6.3.3
Funktionsbaustein (FB)..............................................................................................................161
6.3.4
Datenbaustein (DB) ...................................................................................................................162
6.4
Datenkonsistenz ........................................................................................................................163
6.5
Programmiersprache .................................................................................................................165
6.5.1
Kontaktplan (KOP) .....................................................................................................................165
6.5.2
Funktionsplan (FUP) ..................................................................................................................166
6.5.3
SCL ............................................................................................................................................166
6.5.4
6.6
Schutz ........................................................................................................................................176
6.6.1
Zugriffsschutz für die CPU .........................................................................................................176
6.6.2
Knowhow-Schutz .......................................................................................................................177
6.6.3
Kopierschutz ..............................................................................................................................178
6.7
6.8
Laden aus der CPU ...................................................................................................................179
6.8.1
6.8.2
6.9
6.9.1
6.9.2
6.9.3
6.9.4
7
Anweisungen ......................................................................................................................................... 185
7.1
Bitverknüpfung ...........................................................................................................................185
7.1.1
7.1.2
7.1.3
7.2
Zeiten .........................................................................................................................................193
S7-1200 Automatisierungssystem
Systemhandbuch, 04/2012, A5E02486681-06
Inhaltsverzeichnis
7