General Information

Library Overview

The Multicarrier library provides functions for controlling a Lexium™ MC multi carrier transport system.

The library covers the following tasks:

  • Moving individual carriers

  • Synchronizing the movements of carriers

  • Superimposing motions on running carrier movements

  • Synchronizing carrier motion with external movements

  • Avoiding collisions

Characteristics of the Library

The table indicates the characteristics of the library:

Characteristic

Value

Library name

Multicarrier

Company

Schneider Electric

Category

Application

Component

multi carrier

Default namespace

MCR

Language model attribute

Qualified-access-only

Forward compatible library (FCL)

Yes (FCL)

NOTE: For this library, qualified-access-only is set. The POUs, data structures, enumerations, and constants have to be accessed using the namespace of the library. The default namespace of the library is MCR.
NOTE: For this library, different types of diagnostic messages can be found in the POU diagnostic outputs (see Common Outputs) and in the Application Logger. For general information on the Application Logger, refer to Using the Application Logger.

Example Project

In conjunction with the library, the example project Multicarrier Example is provided. The example project demonstrates how to implement the components from the Multicarrier library.

The example project is installed on your PC along with the programming software. To open the project example, proceed as follows:

Step

Action

Comment

1

In the EcoStruxure Machine Expert Logic Builder, execute the command New Project .

2

In the New Project dialog box, select From Example from the Project type list.

3

On the right-hand side of the New Project dialog box, click the button Toggle Filter .

Result: Available examples are listed in the drop down menu.

4

Select your example from the drop down menu.

5

Select your controller from the Controllers list.

6

Enter a name for the new project, and select the file location.

7

Click the OK button.

Result: A new project is created based on the selected example.

General Considerations

NOTE: Schneider Electric adheres to industry best practices in the development and implementation of control systems. This includes a "Defense-in-Depth" approach to secure an Industrial Control System. This approach places the controllers behind one or more firewalls to restrict access to authorized personnel and protocols only.
 WARNING
UNAUTHENTICATED ACCESS AND SUBSEQUENT UNAUTHORIZED MACHINE OPERATION
  • Evaluate whether your environment or your machines are connected to your critical infrastructure and, if so, take appropriate steps in terms of prevention, based on Defense-in-Depth, before connecting the automation system to any network.
  • Limit the number of devices connected to a network to the minimum necessary.
  • Isolate your industrial network from other networks inside your company.
  • Protect any network against unintended access by using firewalls, VPN, or other, proven security measures.
  • Monitor activities within your systems.
  • Prevent subject devices from direct access or direct link by unauthorized parties or unauthenticated actions.
  • Prepare a recovery plan including backup of your system and process information.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

For more information on organizational measures and rules covering access to infrastructures, refer to ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security and refer to Cybersecurity Guidelines for EcoStruxure Machine Expert, Modicon and PacDrive Controllers and Associated Equipment.