2. Data Manipulation and Math Instruction
Data Manipulation involves transfer of data and operation on data with math
instruction, data conversion, data comparison, and logical operations.
1. Data Transfer Operation
2. Data Compare Instructions
3. Math Instructions
3. Data Manipulation Instruction
Each data manipulation instruction requires two or more words of data memory for
operation
Data file, word, and bits
5. Data Transfer Operation
1. MOV (Move)
Moves the source value to destination
Source is the address of the data you want to move. The source can be a constant.
Destination is the address that identifies where the data is to be moved.
MOVE/LOGICAL
6. Data Transfer Operation
2. MVM (Masked Move)
Moves the source location to selected portion of the destination
Source is the address of the data you want to move.
Mask is the address of the mask through which the instruction moves data.
Destination is the address where the instruction moves the data.
MOVE/LOGICAL
7. Data Transfer Operation
Mask is the address of the mask through which the instruction moves data. The mask
can also be a hexadecimal value. You can enter the value in binary, decimal, or
hexadecimal. RSLogix 500Micro will make any necessary conversion and display
the hexadecimal value.
The mask acts like a filter for the destination. The pattern of characters in the mask
determines which bits will be passed from the source to the destination, and
which bits will be masked. Only bits in the mask that are set (1) will pass data to
the destination.
For example:
If before the move, the destination address contains 0000000000000000
and the bit values in the source word are - 1111000011110000
and the bit setting in the mask address are - 0000000011111111
after the move, the destination will contain - 0000000011110000
8. Data Transfer Operation
3. AND (And)
Performs a bitwise AND operation
Sources A and B can be either word addresses or constants; however, both
sources cannot be a constant.
The Destination must be a word address.
MOVE/LOGICAL
9. Data Transfer Operation
4. OR (Or)
Performs a bitwise OR operation
Sources A and B can be either word addresses or constants; however, both
sources cannot be a constant. You can enter a constant or a word address for
either Source parameter.
The destination must be a word address.
MOVE/LOGICAL
10. Data Transfer Operation
5. XOR (Exculive Or)
Performs a bitwise XOR operation
Sources A and B of the XOR instruction are Exclusive ORed bit by bit and stored in
the destination. Sources A and B can be either word addresses or constants;
however, both sources cannot be a constant.
MOVE/LOGICAL
11. Data Transfer Operation
6. NOT (Not)
Performs a NOT operation
The source of the NOT instruction is NOTed bit by bit and stored in the
destination.
The source and destination must be word addresses
MOVE/LOGICAL
12. Data Transfer Operation
7. CLR (Clear)
Sets all bits of a word to zero.
When rung conditions are true, this output instruction sets all the bits in a
word to zero. The destination must be a word address.
MOVE/LOGICAL
15. Data Manipulation Application
SLC 500 word and file address
(a) Adrress N7:30 is a word address that represents a single word: word number 30 in integer
file 7
(b) Address #N7:30 represents the starting address of a group of conssecutive words in integer
file 7. The length shown is eight words, which is determained by the instruction where the
file address is used
19. Q & A
1. Aplikasi data manipulation and math instruction di industri?
2. Pengoperasian filter yang ada pada perintah MVM (masked move)?
3. Jika ada dua perintah pada rung yang berbeda, tetapi mengirimkan data ke alamat
memori yang sama. Mana yang menang?
4. Word & file apakah istilah yang hanya digunakan di Allen Bradley atau yang lain
juga sama?
5. Kerja file to word bagaimana?
6. File to file jika ada beda length, apa yang terjadi?
7. Beda FFL dan COP?
8. Tujuan block ladder selalu diberi input?
9. Cara memindahkan data bit to word? Dari Input ke N (integer) ?
10. Cara memindahkan data word to bit? Dari N (integer) ke O?
31. Data Compare Instructions
LIM instruction where the low limit value is less then the high limit value
(Tests whether one values is within the limit range of two other value)
32. Data Compare Instructions
LIM instruction where the low limit value is greater then the high limit
value
(Tests whether one values is within the limit range of two other value)
33. Data Compare Instructions
Masked comparison for equal (MEQ) logic rung
(Tests portion of two values to see whether they are equal. Compare 16-bit data of a source
address to 16-bit data at a reference address thrugh mask)
34. Application of Data Compare Instructions
Timer program using the EQU instruction
35. Application of Data Compare Instructions
Counter program using the LES instruction
47. Math Instructions
TOD (convert to BCD) instruction
(Converts a 16-bit integer source value to BCD and stores it in the math register or the destination)
48. Math Instructions
FRD (convert from BCD) instruction
(Converts a BCD value in the math register or the source to an integer and stores it in the destination)
49. Q & A
1. Fasilitas instruksi dari masing-masing menu tab sudah tetap atau bisa di upgrade?
2. Pada instruksi compute apakah semua operasi matematis bisa dilakukan?
3. Apakah bisa menggunakan memori float pada memori tujuan dari hasil matematis
yang dilakukan pada perintah compute?
4. Kalau Hexadesimal BCD bisa menggunakan input huruf tidak? Huruf A sebagai
pengganti nomor 10 misalnya?
5. Bisakah rumus di blok compute disimpan dulu agar dapat digunakan/ dipanggil
kembali untuk perhitungan lainnya?
6. Apa implementasi convert to BCD (TOD)?
7. Apa implementasi convert from BCD (FRD)?
8. Adakah intruksi yang digunakan untuk mengkonversi BCD ke graycode?
9. Apa fungsi DDV?
This presentation demonstrates the new capabilities of PowerPoint and it is best viewed in Slide Show. These slides are designed to give you great ideas for the presentations you’ll create in PowerPoint 2010!
For more sample templates, click the File tab, and then on the New tab, click Sample Templates.