SlideShare a Scribd company logo
Memory types
 Process-image input register (I)
Format:
Bit
Byte, Word, Double Word


I[byte address].[bit address] I0.1
I[size][starting byte address] IB4

Process-image output register (Q)

Format:
Bit
Byte, Word, Double Word


Q[byte address].[bit address] Q1.1
Q[size][starting byte address] QB5

Variable memory area (V)
You can use V memory to:
store intermediate results of the control logic operations. •
store other data pertaining to your process or task. •
Format:

Bit
Byte, Word, Double Word
81

V[byte address].[bit address] V10.2
V[size][starting byte address] VW100
Memory types
 Sequence control relay area (S)
They are used to organize machine operations or steps into equivalent
program segments. SCRs allow logical segmentation of the control
Format:
Bit
S[byte address].[bit address] S3.1
Byte, Word, Double Word S[size][starting byte address] SB4


Special memory bits (SM)

The SM bits provide a means for communicating information between the
CPU and your program. You can use these bits to select and control some
of the special functions of the S7-200 CPU, such as:
• A bit that turns on for the first scan cycle
• Bits that toggle at fixed rates
• Bits that show the status of math or operational instructions
Format:
Bit
SM[byte address].[bit address] SM0.1
Byte, Word, Double Word SM[size][starting byte address] SMB86
82
Memory types
 Local memory area (L)
The S7-200 PLCs provide 64 bytes of local (L) memory of which 60 can be
used as scratchpad memory or for passing formal parameters to subroutines.
Format:
Bit
L [byte address].[bit address] L0.0
Byte, Word, Double Word
L [size] [starting byte address] LB33

83
Memory types
 Analog inputs (AI)
The S7-200 converts a real-world, analog value (such as temperature
or voltage) into a word-length (16-bit) digital value. You access these
values by the area identifier (AI), size of the data (W), and the starting
byte address. Since analog inputs are words and always start on
even-number bytes (such as 0, 2, or 4), you access them with evennumber byte addresses (such as AIW0, AIW2, or AIW4),as shown in
Figure Analog input values are read-only values.
Format: AIW [starting byte address] AIW4

84
Memory types
•Analog outputs (AQ)

The S7-200 converts a word-length (16-bit) digital value into a current
or voltage, proportional to the digital value (such as for a current or
voltage). You write these values by the area identifier (AQ), size of the
data (W), and the starting by address. Since analog outputs are words
and always start on even-number bytes (such as 0, 2, or 4), you write
them with even-number byte addresses (AQW0, AQW2, AQW4),
Format: AQW [starting byte address] AQW4

85
Replacing Relay by PLC
First step- We have to translate all of the items
we're using into symbols the plc understands
A contact symbol

A coil symbol

86
Second step
- We must tell the plc where everything is
located. In other words we have to give all
the devices an address.

Final step
- We have to convert the schematic into a
logical sequence of events.

87
Ladder Diagram and Programming:
Load: The load (LD) instruction is a normally open contact

A Load (contact) symbol

LoadBar: The LoadBar instruction is a normally closed contact.

A LoadBar (normally closed contact) symbol
88
Out :The Out instruction is sometimes also called an Output Energize instruction.
The output instruction is like a relay coil

An OUT (coil) symbol

OutBar: The outbar instruction is like a normally closed relay coil

An OUTBar (normally closed coil) symbol

89
Logic elements

90

More Related Content

What's hot

B sc cs i bo-de u-iii combitional logic circuit
B sc cs i bo-de u-iii combitional logic circuitB sc cs i bo-de u-iii combitional logic circuit
B sc cs i bo-de u-iii combitional logic circuit
Rai University
 
Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
sabina deshar
 
STLD-Combinational logic design
STLD-Combinational  logic design STLD-Combinational  logic design
STLD-Combinational logic design
Abhinay Potlabathini
 
Arithmetic Operations
Arithmetic OperationsArithmetic Operations
Arithmetic Operations
gueste99d9a
 
2-bit comparator
2-bit comparator2-bit comparator
2-bit comparator
إسلام عادل
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuits
Jamnas Mundakkutty A
 

What's hot (6)

B sc cs i bo-de u-iii combitional logic circuit
B sc cs i bo-de u-iii combitional logic circuitB sc cs i bo-de u-iii combitional logic circuit
B sc cs i bo-de u-iii combitional logic circuit
 
Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
STLD-Combinational logic design
STLD-Combinational  logic design STLD-Combinational  logic design
STLD-Combinational logic design
 
Arithmetic Operations
Arithmetic OperationsArithmetic Operations
Arithmetic Operations
 
2-bit comparator
2-bit comparator2-bit comparator
2-bit comparator
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuits
 

Similar to 81 90

Plc Siemens Training Notes
Plc Siemens Training NotesPlc Siemens Training Notes
Plc Siemens Training Notes
plc_course
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
ragupathi90
 
Bt0064 logic design-de
Bt0064 logic design-deBt0064 logic design-de
Bt0064 logic design-de
smumbahelp
 
Pneumatic systems engineering sjejej.pdf
Pneumatic systems engineering sjejej.pdfPneumatic systems engineering sjejej.pdf
Pneumatic systems engineering sjejej.pdf
PrabhathMahela1
 
An overview of siemens plc address mapping
An overview of siemens plc address mappingAn overview of siemens plc address mapping
An overview of siemens plc address mapping
JustEngineering
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
Siraj Ahmed
 
AVR arduino dasar
AVR arduino dasarAVR arduino dasar
AVR arduino dasar
Oktaf Kharisma
 
8085_Microprocessor(simar).ppt
8085_Microprocessor(simar).ppt8085_Microprocessor(simar).ppt
8085_Microprocessor(simar).ppt
KanikaJindal9
 
Unit 2 Instruction set.pdf
Unit 2 Instruction set.pdfUnit 2 Instruction set.pdf
Unit 2 Instruction set.pdf
HimanshuPant41
 
Unsigned and Signed fixed point Addition and subtraction
Unsigned and Signed  fixed point Addition and subtractionUnsigned and Signed  fixed point Addition and subtraction
Unsigned and Signed fixed point Addition and subtraction
ciyamala kushbu
 
06 comunicação mestre mestre
06 comunicação mestre mestre06 comunicação mestre mestre
06 comunicação mestre mestre
Marcio Miranda
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
saimawarsi
 
1204 Ppi 8255
1204 Ppi 82551204 Ppi 8255
1204 Ppi 8255
techbed
 
07 chapter03 05_siemens_tags_memory_structure_fa14
07 chapter03 05_siemens_tags_memory_structure_fa1407 chapter03 05_siemens_tags_memory_structure_fa14
07 chapter03 05_siemens_tags_memory_structure_fa14
John Todora
 
Project Report On 0-9 decade counter
Project Report On 0-9 decade counterProject Report On 0-9 decade counter
Project Report On 0-9 decade counter
Omkar Rane
 
Ree602 microprocessor unit ii
Ree602  microprocessor unit iiRee602  microprocessor unit ii
Ree602 microprocessor unit ii
MAHMOOD ilahi
 
8086 microprocessor pptx JNTUH ece 3rd year
8086 microprocessor pptx JNTUH ece 3rd year8086 microprocessor pptx JNTUH ece 3rd year
8086 microprocessor pptx JNTUH ece 3rd year
Bharghavteja1
 
Embedded systems optimization memory requirments.pptx
Embedded systems optimization memory requirments.pptxEmbedded systems optimization memory requirments.pptx
Embedded systems optimization memory requirments.pptx
satheeshKumar750
 

Similar to 81 90 (20)

Plc Siemens Training Notes
Plc Siemens Training NotesPlc Siemens Training Notes
Plc Siemens Training Notes
 
8255
82558255
8255
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Bt0064 logic design-de
Bt0064 logic design-deBt0064 logic design-de
Bt0064 logic design-de
 
Pneumatic systems engineering sjejej.pdf
Pneumatic systems engineering sjejej.pdfPneumatic systems engineering sjejej.pdf
Pneumatic systems engineering sjejej.pdf
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
An overview of siemens plc address mapping
An overview of siemens plc address mappingAn overview of siemens plc address mapping
An overview of siemens plc address mapping
 
Introduction of 8086 micro processor .
Introduction of 8086 micro processor .Introduction of 8086 micro processor .
Introduction of 8086 micro processor .
 
AVR arduino dasar
AVR arduino dasarAVR arduino dasar
AVR arduino dasar
 
8085_Microprocessor(simar).ppt
8085_Microprocessor(simar).ppt8085_Microprocessor(simar).ppt
8085_Microprocessor(simar).ppt
 
Unit 2 Instruction set.pdf
Unit 2 Instruction set.pdfUnit 2 Instruction set.pdf
Unit 2 Instruction set.pdf
 
Unsigned and Signed fixed point Addition and subtraction
Unsigned and Signed  fixed point Addition and subtractionUnsigned and Signed  fixed point Addition and subtraction
Unsigned and Signed fixed point Addition and subtraction
 
06 comunicação mestre mestre
06 comunicação mestre mestre06 comunicação mestre mestre
06 comunicação mestre mestre
 
Ch12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdfCh12- instruction sets- char & funct.pdf
Ch12- instruction sets- char & funct.pdf
 
1204 Ppi 8255
1204 Ppi 82551204 Ppi 8255
1204 Ppi 8255
 
07 chapter03 05_siemens_tags_memory_structure_fa14
07 chapter03 05_siemens_tags_memory_structure_fa1407 chapter03 05_siemens_tags_memory_structure_fa14
07 chapter03 05_siemens_tags_memory_structure_fa14
 
Project Report On 0-9 decade counter
Project Report On 0-9 decade counterProject Report On 0-9 decade counter
Project Report On 0-9 decade counter
 
Ree602 microprocessor unit ii
Ree602  microprocessor unit iiRee602  microprocessor unit ii
Ree602 microprocessor unit ii
 
8086 microprocessor pptx JNTUH ece 3rd year
8086 microprocessor pptx JNTUH ece 3rd year8086 microprocessor pptx JNTUH ece 3rd year
8086 microprocessor pptx JNTUH ece 3rd year
 
Embedded systems optimization memory requirments.pptx
Embedded systems optimization memory requirments.pptxEmbedded systems optimization memory requirments.pptx
Embedded systems optimization memory requirments.pptx
 

More from Enhmandah Hemeelee (20)

Lab 02
Lab 02Lab 02
Lab 02
 
Bd 01
Bd 01Bd 01
Bd 01
 
Semenar 02
Semenar 02Semenar 02
Semenar 02
 
Li354 plc lects 2011a
Li354  plc lects 2011aLi354  plc lects 2011a
Li354 plc lects 2011a
 
111 120
111 120111 120
111 120
 
101 110
101 110101 110
101 110
 
91 100
91 10091 100
91 100
 
61 70
61 7061 70
61 70
 
51 60
51 6051 60
51 60
 
41 50
41 5041 50
41 50
 
31 40
31 4031 40
31 40
 
21 30
21 3021 30
21 30
 
11 20
11 2011 20
11 20
 
1 10
1 101 10
1 10
 
1 10
1 101 10
1 10
 
Bd1 munkhbayar
Bd1 munkhbayarBd1 munkhbayar
Bd1 munkhbayar
 
Bd1 gantumur mon e 1
Bd1 gantumur mon e 1Bd1 gantumur mon e 1
Bd1 gantumur mon e 1
 
Bd1 gantumur eng e 1
Bd1 gantumur eng e 1Bd1 gantumur eng e 1
Bd1 gantumur eng e 1
 
Orchuulga
OrchuulgaOrchuulga
Orchuulga
 
Control precedence program
Control precedence programControl precedence program
Control precedence program
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

81 90

  • 1. Memory types  Process-image input register (I) Format: Bit Byte, Word, Double Word  I[byte address].[bit address] I0.1 I[size][starting byte address] IB4 Process-image output register (Q) Format: Bit Byte, Word, Double Word  Q[byte address].[bit address] Q1.1 Q[size][starting byte address] QB5 Variable memory area (V) You can use V memory to: store intermediate results of the control logic operations. • store other data pertaining to your process or task. • Format: Bit Byte, Word, Double Word 81 V[byte address].[bit address] V10.2 V[size][starting byte address] VW100
  • 2. Memory types  Sequence control relay area (S) They are used to organize machine operations or steps into equivalent program segments. SCRs allow logical segmentation of the control Format: Bit S[byte address].[bit address] S3.1 Byte, Word, Double Word S[size][starting byte address] SB4  Special memory bits (SM) The SM bits provide a means for communicating information between the CPU and your program. You can use these bits to select and control some of the special functions of the S7-200 CPU, such as: • A bit that turns on for the first scan cycle • Bits that toggle at fixed rates • Bits that show the status of math or operational instructions Format: Bit SM[byte address].[bit address] SM0.1 Byte, Word, Double Word SM[size][starting byte address] SMB86 82
  • 3. Memory types  Local memory area (L) The S7-200 PLCs provide 64 bytes of local (L) memory of which 60 can be used as scratchpad memory or for passing formal parameters to subroutines. Format: Bit L [byte address].[bit address] L0.0 Byte, Word, Double Word L [size] [starting byte address] LB33 83
  • 4. Memory types  Analog inputs (AI) The S7-200 converts a real-world, analog value (such as temperature or voltage) into a word-length (16-bit) digital value. You access these values by the area identifier (AI), size of the data (W), and the starting byte address. Since analog inputs are words and always start on even-number bytes (such as 0, 2, or 4), you access them with evennumber byte addresses (such as AIW0, AIW2, or AIW4),as shown in Figure Analog input values are read-only values. Format: AIW [starting byte address] AIW4 84
  • 5. Memory types •Analog outputs (AQ) The S7-200 converts a word-length (16-bit) digital value into a current or voltage, proportional to the digital value (such as for a current or voltage). You write these values by the area identifier (AQ), size of the data (W), and the starting by address. Since analog outputs are words and always start on even-number bytes (such as 0, 2, or 4), you write them with even-number byte addresses (AQW0, AQW2, AQW4), Format: AQW [starting byte address] AQW4 85
  • 6. Replacing Relay by PLC First step- We have to translate all of the items we're using into symbols the plc understands A contact symbol A coil symbol 86
  • 7. Second step - We must tell the plc where everything is located. In other words we have to give all the devices an address. Final step - We have to convert the schematic into a logical sequence of events. 87
  • 8. Ladder Diagram and Programming: Load: The load (LD) instruction is a normally open contact A Load (contact) symbol LoadBar: The LoadBar instruction is a normally closed contact. A LoadBar (normally closed contact) symbol 88
  • 9. Out :The Out instruction is sometimes also called an Output Energize instruction. The output instruction is like a relay coil An OUT (coil) symbol OutBar: The outbar instruction is like a normally closed relay coil An OUTBar (normally closed coil) symbol 89