General Information

Library Overview

The MotionApplicationFunctionBlocks library implements function blocks to control a machine that performs operations on a moving part. Typical applications can include cutting, clamping, stamping, marking, sealing.

Characteristics of the Library

The table indicates the characteristics of the library:

Characteristic

Value

Library title

MotionApplicationFunctionBlocks

Company

Schneider Electric

Category

Application

Component

Motion

Default namespace

SE_MAFB

Language model attribute

Qualified-access-only

Forward compatible library

Yes FCL

NOTE: For this library, qualified-access-only is set. The POUs, data structures, enumerations, and constants must be accessed using the namespace of the library. The default namespace of the library is SE_MAFB.

Controller Platforms

The MotionApplicationFunctionBlocks library is supported by the following Modicon M262 Motion Controllers:

  • TM262M05MESS8T

  • TM262M15MESS8T

  • TM262M25MESS8T

  • TM262M35MESS8T

Configuration

The following configuration is supported:

  • The master can be configured as a physical axis or as an encoder.

  • The master can be configured as a virtual axis.

  • More than one slave can be synchronized with the same master.

  • In rotary knife applications, the slave must be defined as a rotary axis with the modulo value set equal to the value of the parameter lrPerimeter.

  • Several parallel instances of the function blocks FlyingShear and RotaryKnife are allowed per application.

  • The function blocks FlyingShear and RotaryKnife can be combined with additional motion application function blocks such as clamping or grouping in one application.

  • The master axis must be defined as a rotary axis (modulo axis).

NOTICE
UNSATISFACTORY EQUIPMENT OPERATION
Set the modulo value of the rotary master axis greater than the maximum distance between the products plus the value of the parameter lrTpDistToSyncPoint depending on the operating mode.
Failure to follow these instructions can result in equipment damage.
NOTE: For more information, refer to the lrTpDistToSyncPoint parameter description.

Task Concept

The FlyingShear and the RotaryKnife function blocks are based on the electronic cam functionality of the M262 PLCopen function block library. Therefore, consider the task concept described in the Motion Control chapter of the M262 Synchronized Motion Control Library Guide. The cycle time of the user application task in which the function block FlyingShear or RotaryKnife is called depends on the maximum velocity of the master axis and is typically 10 ms. The higher the task cycle time, the slower the reaction time. This has an impact on the processing period of input commands and cam calculations inside the FlyingShear and the RotaryKnife function blocks.

General Considerations

NOTE: Schneider Electric adheres to industry best practices in the development and implementation of control systems. This includes a "Defense-in-Depth" approach to secure an Industrial Control System. This approach places the controllers behind one or more firewalls to restrict access to authorized personnel and protocols only.
 WARNING
UNAUTHENTICATED ACCESS AND SUBSEQUENT UNAUTHORIZED MACHINE OPERATION
  • Evaluate whether your environment or your machines are connected to your critical infrastructure and, if so, take appropriate steps in terms of prevention, based on Defense-in-Depth, before connecting the automation system to any network.
  • Limit the number of devices connected to a network to the minimum necessary.
  • Isolate your industrial network from other networks inside your company.
  • Protect any network against unintended access by using firewalls, VPN, or other, proven security measures.
  • Monitor activities within your systems.
  • Prevent subject devices from direct access or direct link by unauthorized parties or unauthenticated actions.
  • Prepare a recovery plan including backup of your system and process information.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

For more information on organizational measures and rules covering access to infrastructures, refer to ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security and refer to Cybersecurity Guidelines for EcoStruxure Machine Expert, Modicon and PacDrive Controllers and Associated Equipment.