SlideShare a Scribd company logo
1 of 55
Download to read offline
Data Manipulation
and Math Instruction
Lino Hugun Saputra (23315309)
INSTITUT TEKNOLOGI BANDUNG
Data Manipulation and Math Instruction
Data Manipulation involves transfer of data and operation on data with math
instruction, data conversion, data comparison, and logical operations.
1. Data Transfer Operation
2. Data Compare Instructions
3. Math Instructions
Data Manipulation Instruction
Each data manipulation instruction requires two or more words of data memory for
operation
Data file, word, and bits
Data Transfer Operation
Data transfer concept
Data Transfer Operation
1. MOV (Move)
Moves the source value to destination
Source is the address of the data you want to move. The source can be a constant.
Destination is the address that identifies where the data is to be moved.
MOVE/LOGICAL
Data Transfer Operation
2. MVM (Masked Move)
Moves the source location to selected portion of the destination
Source is the address of the data you want to move.
Mask is the address of the mask through which the instruction moves data.
Destination is the address where the instruction moves the data.
MOVE/LOGICAL
Data Transfer Operation
Mask is the address of the mask through which the instruction moves data. The mask
can also be a hexadecimal value. You can enter the value in binary, decimal, or
hexadecimal. RSLogix 500Micro will make any necessary conversion and display
the hexadecimal value.
The mask acts like a filter for the destination. The pattern of characters in the mask
determines which bits will be passed from the source to the destination, and
which bits will be masked. Only bits in the mask that are set (1) will pass data to
the destination.
For example:
If before the move, the destination address contains 0000000000000000
and the bit values in the source word are - 1111000011110000
and the bit setting in the mask address are - 0000000011111111
after the move, the destination will contain - 0000000011110000
Data Transfer Operation
3. AND (And)
Performs a bitwise AND operation
Sources A and B can be either word addresses or constants; however, both
sources cannot be a constant.
The Destination must be a word address.
MOVE/LOGICAL
Data Transfer Operation
4. OR (Or)
Performs a bitwise OR operation
Sources A and B can be either word addresses or constants; however, both
sources cannot be a constant. You can enter a constant or a word address for
either Source parameter.
The destination must be a word address.
MOVE/LOGICAL
Data Transfer Operation
5. XOR (Exculive Or)
Performs a bitwise XOR operation
Sources A and B of the XOR instruction are Exclusive ORed bit by bit and stored in
the destination. Sources A and B can be either word addresses or constants;
however, both sources cannot be a constant.
MOVE/LOGICAL
Data Transfer Operation
6. NOT (Not)
Performs a NOT operation
The source of the NOT instruction is NOTed bit by bit and stored in the
destination.
The source and destination must be word addresses
MOVE/LOGICAL
Data Transfer Operation
7. CLR (Clear)
Sets all bits of a word to zero.
When rung conditions are true, this output instruction sets all the bits in a
word to zero. The destination must be a word address.
MOVE/LOGICAL
Data Manipulation Application
Changing the preset value of a timer using the move (MOV) instuction
Data Manipulation Application
Moving data using file instruction
Data Manipulation Application
SLC 500 word and file address
(a) Adrress N7:30 is a word address that represents a single word: word number 30 in integer
file 7
(b) Address #N7:30 represents the starting address of a group of conssecutive words in integer
file 7. The length shown is eight words, which is determained by the instruction where the
file address is used
Data Transfer Operation
1. COP (Copy)
Example file copy instruction
FILE/MISK
Data Transfer Operation
2. FLL
Example FLL instruction.
FILE/MISK
Data Transfer Application
Using the FFL instruction to change all the data in a file to zero
Q & A
1. Aplikasi data manipulation and math instruction di industri?
2. Pengoperasian filter yang ada pada perintah MVM (masked move)?
3. Jika ada dua perintah pada rung yang berbeda, tetapi mengirimkan data ke alamat
memori yang sama. Mana yang menang?
4. Word & file apakah istilah yang hanya digunakan di Allen Bradley atau yang lain
juga sama?
5. Kerja file to word bagaimana?
6. File to file jika ada beda length, apa yang terjadi?
7. Beda FFL dan COP?
8. Tujuan block ladder selalu diberi input?
9. Cara memindahkan data bit to word? Dari Input ke N (integer) ?
10. Cara memindahkan data word to bit? Dari N (integer) ke O?
Data Transfer Operation
1. Batch Process
Consist of a sequence of one or more steps in a difined order.
Data Transfer Operation
5. FAL (file arithmatic and logic)
Example FAL instruction.
Data Transfer Operation
9. BTD (bit distribute)
Example BTD instruction.
Data Compare Instructions
Basic PLC data compare instructions
Data Compare Instructions
Compare menu tab
Data Compare Instructions
EQU logic rung
(Tests whether two values are equal)
Data Compare Instructions
NEQ logic rung
(Tests whether one values is not equal to a second value)
Data Compare Instructions
GRT logic rung
(Tests whether one values is greater than a second value)
Data Compare Instructions
LES logic rung
(Tests whether one values is less than a second value)
Data Compare Instructions
GEQ logic rung
(Tests whether one values is greater than or equal to a second value)
Data Compare Instructions
LEQ logic rung
(Tests whether one values is less than or equal to a second value)
Data Compare Instructions
LIM instruction where the low limit value is less then the high limit value
(Tests whether one values is within the limit range of two other value)
Data Compare Instructions
LIM instruction where the low limit value is greater then the high limit
value
(Tests whether one values is within the limit range of two other value)
Data Compare Instructions
Masked comparison for equal (MEQ) logic rung
(Tests portion of two values to see whether they are equal. Compare 16-bit data of a source
address to 16-bit data at a reference address thrugh mask)
Application of Data Compare Instructions
Timer program using the EQU instruction
Application of Data Compare Instructions
Counter program using the LES instruction
Math Instructions
Compute/Math menu tab
Math Instructions
CPT ( compute) instruction
(Evaluate an expression and stores the result in the destination)
Math Instructions
ADD instruction
(Adds source A to source B and stores the result in the destination)
Application of Math Instructions
Counter program that uses the ADD instruction
Math Instructions
SUB instruction
(Subtracts source B from source A and stores the result in the destination)
Math Instructions
Multiply instruction (MUL)
(Multiplies sourch A by source B and stores the result in the destination)
Application of Math Instructions
Multiply (MUL) instruction used to calculate the product of two sources
Math Instructions
Divide instruction (DIV)
(Divide sourch A by source B and stores the result in the destination and math register)
Application of Math Instructions
Divide (DIV) instruction used to calculate the value that result from dividing sources
A by sources B
Math Instructions
Square instruction (SQR)
(Calculates the square root of the source and places the integer result in the destination)
Math Instructions
Negate instruction (NEG)
(Changes the sign of the source and places it in destination)
Math Instructions
TOD (convert to BCD) instruction
(Converts a 16-bit integer source value to BCD and stores it in the math register or the destination)
Math Instructions
FRD (convert from BCD) instruction
(Converts a BCD value in the math register or the source to an integer and stores it in the destination)
Q & A
1. Fasilitas instruksi dari masing-masing menu tab sudah tetap atau bisa di upgrade?
2. Pada instruksi compute apakah semua operasi matematis bisa dilakukan?
3. Apakah bisa menggunakan memori float pada memori tujuan dari hasil matematis
yang dilakukan pada perintah compute?
4. Kalau Hexadesimal  BCD bisa menggunakan input huruf tidak? Huruf A sebagai
pengganti nomor 10 misalnya?
5. Bisakah rumus di blok compute disimpan dulu agar dapat digunakan/ dipanggil
kembali untuk perhitungan lainnya?
6. Apa implementasi convert to BCD (TOD)?
7. Apa implementasi convert from BCD (FRD)?
8. Adakah intruksi yang digunakan untuk mengkonversi BCD ke graycode?
9. Apa fungsi DDV?
Math Instructions
DDV instruction
Application of Data Manipulation Instructions
Memindahkan tiap bit data yang ada pada input ke output
Application of Data Manipulation Instructions
Set-point control program
Application of Math Instructions
Converting Celsius temperature to Fahrenheit
Application of Math Instructions
Vessel overfill alarm program
Application of Math Instructions
Temperature control program

More Related Content

What's hot

PLC (Ladder Logic Diagram)
PLC (Ladder Logic Diagram)PLC (Ladder Logic Diagram)
PLC (Ladder Logic Diagram)Sisubalan Selvan
 
Exercices corriges en electricite triphase
Exercices corriges en electricite triphaseExercices corriges en electricite triphase
Exercices corriges en electricite triphasemorin moli
 
Distributed control system
Distributed control systemDistributed control system
Distributed control systemTilahun Shibru
 
Allenbradley Control Logix PLC Network Architecture
Allenbradley Control Logix PLC Network  ArchitectureAllenbradley Control Logix PLC Network  Architecture
Allenbradley Control Logix PLC Network ArchitectureDEEPAK GORAI
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic ControllerValai Ganesh
 
les-automates-programmables-industriels
les-automates-programmables-industrielsles-automates-programmables-industriels
les-automates-programmables-industrielselectrolouhla
 
M207 Commande électronique des machines Mantaly.pptx
M207 Commande électronique des machines Mantaly.pptxM207 Commande électronique des machines Mantaly.pptx
M207 Commande électronique des machines Mantaly.pptxsaaid6
 
DCS PRESENTATION
DCS PRESENTATIONDCS PRESENTATION
DCS PRESENTATIONbvent2005
 
4 representationprocessindustrielslastversion
4 representationprocessindustrielslastversion4 representationprocessindustrielslastversion
4 representationprocessindustrielslastversionRachid Lajouad
 
Copie avec correction ds1 1 a-(tm)2014
Copie avec correction ds1  1 a-(tm)2014Copie avec correction ds1  1 a-(tm)2014
Copie avec correction ds1 1 a-(tm)2014Mohamed Trabelsi
 
Cours machine asynchrone (cours et problèmes)
Cours machine asynchrone (cours et problèmes)Cours machine asynchrone (cours et problèmes)
Cours machine asynchrone (cours et problèmes)OMAR EL MOUDEN
 
Automates programmables industriels
Automates programmables industrielsAutomates programmables industriels
Automates programmables industrielsHafsaELMessaoudi
 
PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)Manoj Gowda K
 
Pe 3231 week 15 18 plc
Pe 3231 week 15 18  plcPe 3231 week 15 18  plc
Pe 3231 week 15 18 plcCharlton Inao
 

What's hot (20)

PLC (Ladder Logic Diagram)
PLC (Ladder Logic Diagram)PLC (Ladder Logic Diagram)
PLC (Ladder Logic Diagram)
 
Exercices corriges en electricite triphase
Exercices corriges en electricite triphaseExercices corriges en electricite triphase
Exercices corriges en electricite triphase
 
Distributed control system
Distributed control systemDistributed control system
Distributed control system
 
Allenbradley Control Logix PLC Network Architecture
Allenbradley Control Logix PLC Network  ArchitectureAllenbradley Control Logix PLC Network  Architecture
Allenbradley Control Logix PLC Network Architecture
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic Controller
 
les-automates-programmables-industriels
les-automates-programmables-industrielsles-automates-programmables-industriels
les-automates-programmables-industriels
 
Allen bradley
Allen bradleyAllen bradley
Allen bradley
 
HMI- Human Machine Interface
HMI-  Human Machine InterfaceHMI-  Human Machine Interface
HMI- Human Machine Interface
 
M207 Commande électronique des machines Mantaly.pptx
M207 Commande électronique des machines Mantaly.pptxM207 Commande électronique des machines Mantaly.pptx
M207 Commande électronique des machines Mantaly.pptx
 
DCS PRESENTATION
DCS PRESENTATIONDCS PRESENTATION
DCS PRESENTATION
 
4 representationprocessindustrielslastversion
4 representationprocessindustrielslastversion4 representationprocessindustrielslastversion
4 representationprocessindustrielslastversion
 
PLC LADDER DIAGRAM
PLC LADDER DIAGRAMPLC LADDER DIAGRAM
PLC LADDER DIAGRAM
 
Copie avec correction ds1 1 a-(tm)2014
Copie avec correction ds1  1 a-(tm)2014Copie avec correction ds1  1 a-(tm)2014
Copie avec correction ds1 1 a-(tm)2014
 
Cours machine asynchrone (cours et problèmes)
Cours machine asynchrone (cours et problèmes)Cours machine asynchrone (cours et problèmes)
Cours machine asynchrone (cours et problèmes)
 
08 pid.controller
08 pid.controller08 pid.controller
08 pid.controller
 
Automates programmables industriels
Automates programmables industrielsAutomates programmables industriels
Automates programmables industriels
 
PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)PLC (PROGRAMMABLE LOGIC CONTROLLER)
PLC (PROGRAMMABLE LOGIC CONTROLLER)
 
Pe 3231 week 15 18 plc
Pe 3231 week 15 18  plcPe 3231 week 15 18  plc
Pe 3231 week 15 18 plc
 
PLC Brief
PLC BriefPLC Brief
PLC Brief
 
Plc basics
Plc basicsPlc basics
Plc basics
 

Similar to Data Manipulation and Math Instruction on RSLogix 500

Addressing mode & data transfer instruction of 8085
Addressing mode & data transfer instruction of 8085Addressing mode & data transfer instruction of 8085
Addressing mode & data transfer instruction of 8085Chinmayee samal
 
Move mask moves_rev01_fa16
Move mask moves_rev01_fa16Move mask moves_rev01_fa16
Move mask moves_rev01_fa16John Todora
 
Computer science_xii_2016
 Computer science_xii_2016 Computer science_xii_2016
Computer science_xii_2016Ritika sahu
 
instruction format and addressing modes
instruction format and addressing modesinstruction format and addressing modes
instruction format and addressing modesRamaPrabha24
 
11 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa1411 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa14John Todora
 
Assignment on different types of addressing modes
Assignment on different types of addressing modesAssignment on different types of addressing modes
Assignment on different types of addressing modesNusratJahan263
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questionsSunil0108
 
String_manipulations.pdf
String_manipulations.pdfString_manipulations.pdf
String_manipulations.pdfAnonymous611358
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questionsDr P Deepak
 
Assembly language.pptx
Assembly language.pptxAssembly language.pptx
Assembly language.pptxShaistaRiaz4
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Static Analysis of Computer programs
Static Analysis of Computer programs Static Analysis of Computer programs
Static Analysis of Computer programs Arvind Devaraj
 
Advance data structure
Advance data structureAdvance data structure
Advance data structureashok kumar
 

Similar to Data Manipulation and Math Instruction on RSLogix 500 (20)

Addressing mode & data transfer instruction of 8085
Addressing mode & data transfer instruction of 8085Addressing mode & data transfer instruction of 8085
Addressing mode & data transfer instruction of 8085
 
Move mask moves_rev01_fa16
Move mask moves_rev01_fa16Move mask moves_rev01_fa16
Move mask moves_rev01_fa16
 
Computer science_xii_2016
 Computer science_xii_2016 Computer science_xii_2016
Computer science_xii_2016
 
instruction format and addressing modes
instruction format and addressing modesinstruction format and addressing modes
instruction format and addressing modes
 
11 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa1411 chapter06 slc_int_float_mov_mvm_fa14
11 chapter06 slc_int_float_mov_mvm_fa14
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Al2ed chapter4
Al2ed chapter4Al2ed chapter4
Al2ed chapter4
 
Part 1.pptx
Part 1.pptxPart 1.pptx
Part 1.pptx
 
Assignment on different types of addressing modes
Assignment on different types of addressing modesAssignment on different types of addressing modes
Assignment on different types of addressing modes
 
Al2ed chapter9
Al2ed chapter9Al2ed chapter9
Al2ed chapter9
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questions
 
String_manipulations.pdf
String_manipulations.pdfString_manipulations.pdf
String_manipulations.pdf
 
Ca unit v 27 9-2020
Ca unit v 27 9-2020Ca unit v 27 9-2020
Ca unit v 27 9-2020
 
Data_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptxData_Transfer&Manupulation Instructions.pptx
Data_Transfer&Manupulation Instructions.pptx
 
Microprocessor
MicroprocessorMicroprocessor
Microprocessor
 
Base sas interview questions
Base sas interview questionsBase sas interview questions
Base sas interview questions
 
Assembly language.pptx
Assembly language.pptxAssembly language.pptx
Assembly language.pptx
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Static Analysis of Computer programs
Static Analysis of Computer programs Static Analysis of Computer programs
Static Analysis of Computer programs
 
Advance data structure
Advance data structureAdvance data structure
Advance data structure
 

Recently uploaded

Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorShane Coughlan
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfBrain Inventory
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageDista
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 

Recently uploaded (20)

Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS Calculator
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdf
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 

Data Manipulation and Math Instruction on RSLogix 500

  • 1. Data Manipulation and Math Instruction Lino Hugun Saputra (23315309) INSTITUT TEKNOLOGI BANDUNG
  • 2. Data Manipulation and Math Instruction Data Manipulation involves transfer of data and operation on data with math instruction, data conversion, data comparison, and logical operations. 1. Data Transfer Operation 2. Data Compare Instructions 3. Math Instructions
  • 3. Data Manipulation Instruction Each data manipulation instruction requires two or more words of data memory for operation Data file, word, and bits
  • 4. Data Transfer Operation Data transfer concept
  • 5. Data Transfer Operation 1. MOV (Move) Moves the source value to destination Source is the address of the data you want to move. The source can be a constant. Destination is the address that identifies where the data is to be moved. MOVE/LOGICAL
  • 6. Data Transfer Operation 2. MVM (Masked Move) Moves the source location to selected portion of the destination Source is the address of the data you want to move. Mask is the address of the mask through which the instruction moves data. Destination is the address where the instruction moves the data. MOVE/LOGICAL
  • 7. Data Transfer Operation Mask is the address of the mask through which the instruction moves data. The mask can also be a hexadecimal value. You can enter the value in binary, decimal, or hexadecimal. RSLogix 500Micro will make any necessary conversion and display the hexadecimal value. The mask acts like a filter for the destination. The pattern of characters in the mask determines which bits will be passed from the source to the destination, and which bits will be masked. Only bits in the mask that are set (1) will pass data to the destination. For example: If before the move, the destination address contains 0000000000000000 and the bit values in the source word are - 1111000011110000 and the bit setting in the mask address are - 0000000011111111 after the move, the destination will contain - 0000000011110000
  • 8. Data Transfer Operation 3. AND (And) Performs a bitwise AND operation Sources A and B can be either word addresses or constants; however, both sources cannot be a constant. The Destination must be a word address. MOVE/LOGICAL
  • 9. Data Transfer Operation 4. OR (Or) Performs a bitwise OR operation Sources A and B can be either word addresses or constants; however, both sources cannot be a constant. You can enter a constant or a word address for either Source parameter. The destination must be a word address. MOVE/LOGICAL
  • 10. Data Transfer Operation 5. XOR (Exculive Or) Performs a bitwise XOR operation Sources A and B of the XOR instruction are Exclusive ORed bit by bit and stored in the destination. Sources A and B can be either word addresses or constants; however, both sources cannot be a constant. MOVE/LOGICAL
  • 11. Data Transfer Operation 6. NOT (Not) Performs a NOT operation The source of the NOT instruction is NOTed bit by bit and stored in the destination. The source and destination must be word addresses MOVE/LOGICAL
  • 12. Data Transfer Operation 7. CLR (Clear) Sets all bits of a word to zero. When rung conditions are true, this output instruction sets all the bits in a word to zero. The destination must be a word address. MOVE/LOGICAL
  • 13. Data Manipulation Application Changing the preset value of a timer using the move (MOV) instuction
  • 14. Data Manipulation Application Moving data using file instruction
  • 15. Data Manipulation Application SLC 500 word and file address (a) Adrress N7:30 is a word address that represents a single word: word number 30 in integer file 7 (b) Address #N7:30 represents the starting address of a group of conssecutive words in integer file 7. The length shown is eight words, which is determained by the instruction where the file address is used
  • 16. Data Transfer Operation 1. COP (Copy) Example file copy instruction FILE/MISK
  • 17. Data Transfer Operation 2. FLL Example FLL instruction. FILE/MISK
  • 18. Data Transfer Application Using the FFL instruction to change all the data in a file to zero
  • 19. Q & A 1. Aplikasi data manipulation and math instruction di industri? 2. Pengoperasian filter yang ada pada perintah MVM (masked move)? 3. Jika ada dua perintah pada rung yang berbeda, tetapi mengirimkan data ke alamat memori yang sama. Mana yang menang? 4. Word & file apakah istilah yang hanya digunakan di Allen Bradley atau yang lain juga sama? 5. Kerja file to word bagaimana? 6. File to file jika ada beda length, apa yang terjadi? 7. Beda FFL dan COP? 8. Tujuan block ladder selalu diberi input? 9. Cara memindahkan data bit to word? Dari Input ke N (integer) ? 10. Cara memindahkan data word to bit? Dari N (integer) ke O?
  • 20. Data Transfer Operation 1. Batch Process Consist of a sequence of one or more steps in a difined order.
  • 21. Data Transfer Operation 5. FAL (file arithmatic and logic) Example FAL instruction.
  • 22. Data Transfer Operation 9. BTD (bit distribute) Example BTD instruction.
  • 23. Data Compare Instructions Basic PLC data compare instructions
  • 25. Data Compare Instructions EQU logic rung (Tests whether two values are equal)
  • 26. Data Compare Instructions NEQ logic rung (Tests whether one values is not equal to a second value)
  • 27. Data Compare Instructions GRT logic rung (Tests whether one values is greater than a second value)
  • 28. Data Compare Instructions LES logic rung (Tests whether one values is less than a second value)
  • 29. Data Compare Instructions GEQ logic rung (Tests whether one values is greater than or equal to a second value)
  • 30. Data Compare Instructions LEQ logic rung (Tests whether one values is less than or equal to a second value)
  • 31. Data Compare Instructions LIM instruction where the low limit value is less then the high limit value (Tests whether one values is within the limit range of two other value)
  • 32. Data Compare Instructions LIM instruction where the low limit value is greater then the high limit value (Tests whether one values is within the limit range of two other value)
  • 33. Data Compare Instructions Masked comparison for equal (MEQ) logic rung (Tests portion of two values to see whether they are equal. Compare 16-bit data of a source address to 16-bit data at a reference address thrugh mask)
  • 34. Application of Data Compare Instructions Timer program using the EQU instruction
  • 35. Application of Data Compare Instructions Counter program using the LES instruction
  • 37. Math Instructions CPT ( compute) instruction (Evaluate an expression and stores the result in the destination)
  • 38. Math Instructions ADD instruction (Adds source A to source B and stores the result in the destination)
  • 39. Application of Math Instructions Counter program that uses the ADD instruction
  • 40. Math Instructions SUB instruction (Subtracts source B from source A and stores the result in the destination)
  • 41. Math Instructions Multiply instruction (MUL) (Multiplies sourch A by source B and stores the result in the destination)
  • 42. Application of Math Instructions Multiply (MUL) instruction used to calculate the product of two sources
  • 43. Math Instructions Divide instruction (DIV) (Divide sourch A by source B and stores the result in the destination and math register)
  • 44. Application of Math Instructions Divide (DIV) instruction used to calculate the value that result from dividing sources A by sources B
  • 45. Math Instructions Square instruction (SQR) (Calculates the square root of the source and places the integer result in the destination)
  • 46. Math Instructions Negate instruction (NEG) (Changes the sign of the source and places it in destination)
  • 47. Math Instructions TOD (convert to BCD) instruction (Converts a 16-bit integer source value to BCD and stores it in the math register or the destination)
  • 48. Math Instructions FRD (convert from BCD) instruction (Converts a BCD value in the math register or the source to an integer and stores it in the destination)
  • 49. Q & A 1. Fasilitas instruksi dari masing-masing menu tab sudah tetap atau bisa di upgrade? 2. Pada instruksi compute apakah semua operasi matematis bisa dilakukan? 3. Apakah bisa menggunakan memori float pada memori tujuan dari hasil matematis yang dilakukan pada perintah compute? 4. Kalau Hexadesimal  BCD bisa menggunakan input huruf tidak? Huruf A sebagai pengganti nomor 10 misalnya? 5. Bisakah rumus di blok compute disimpan dulu agar dapat digunakan/ dipanggil kembali untuk perhitungan lainnya? 6. Apa implementasi convert to BCD (TOD)? 7. Apa implementasi convert from BCD (FRD)? 8. Adakah intruksi yang digunakan untuk mengkonversi BCD ke graycode? 9. Apa fungsi DDV?
  • 51. Application of Data Manipulation Instructions Memindahkan tiap bit data yang ada pada input ke output
  • 52. Application of Data Manipulation Instructions Set-point control program
  • 53. Application of Math Instructions Converting Celsius temperature to Fahrenheit
  • 54. Application of Math Instructions Vessel overfill alarm program
  • 55. Application of Math Instructions Temperature control program

Editor's Notes

  1. This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010! For more sample templates, click the File tab, and then on the New tab, click Sample Templates.