Honeywell HC900 Benutzerhandbuch

Seite von 228
Components and Architecture - Ethernet Devices/Considerations 
Revision 5 
  HC900 Hybrid Controller Installation and User Guide 
15 
9/03  
Implementing peer-to-peer communications involves: 
•  Interconnecting controllers with Ethernet media and networking devices (cables, hubs, switches, etc) 
•  Configuration (via Hybrid Control Designer): 
− 
Controller configuration, which includes entry of an IP address (and if applicable, a Subnet Mask) and 
a Controller Name for each controller.  (The Controller Name is used only by the Honeywell 
proprietary software for network access between controllers; it should not be confused with a 
Network Domain Name or Workgroup Name.) 
− 
Peer Data Exchange (PDE) function blocks, which are included in the control strategy (configuration 
file).  PDE function blocks include PDE Control, PDE Write, and PDE
 
Read.  (Refer to the HC900 
Hybrid Controller Function Block User Guide for additional information.) 
An illustration of HC900 Controller Peer-to-Peer on a Local Area Network (LAN) is given in Figure 13.  
Typically, a Router is used for interconnection to another network (LAN, WAN, or other). 
 
Figure 13 - Modular Network Structure 
Connection to PC Hosts 
Connection to PC hosts can be via Modbus/TCP as well as serial Modbus RTU over either the RS485 or 
RS232 communications ports. Both ports support Modbus RTU and are configurable as master or slave. 
The 5 TCP hosts can be concurrent with Modbus hosts on one or both of the other ports.  Any given 
controller is capable of concurrent communication with up to five PC hosts.  (The meaning of the term 
"host" varies, but for this definition, a PC host is any PC that is on the same LAN as the controller, or on 
any LAN or WAN (Wide Area Network) that is network-connected to the controller.  
Each HC900 Controller has five "sockets" (software and memory resources), each of which can service 
data requests from any networked PC on a client (host)/server (controller) basis.  The sockets are available 
on a first-come, first-served basis.  Typically, when the data service for any PC Host request is completed 
or times out, it allows the socket to become available to any other PC Host in the hierarchy of networks.