Selection data content
•
Bloc
k "Device Status": Information on the status of the safety laser scanner (e.g.,
cut-off paths, errors)
•
Block "Configuration of Data Output": Information on the actual angle range used (due
to technical conditions, data may be output from a slightly larger angle range than
the set angle range)
•
Block "Measurement Data" *: Distance data with reflector detection and RSSI
•
Block "Object detection" *: Data on the beams in the fields of the active monitoring
case in which an object was detected
•
Block "Application Data": State of the inputs and outputs used in the monitoring
case table
•
Block "Local I/Os": State of the local inputs and outputs
Angular range
Y
ou define in which range measurement data and data on detections in fields are
output.
Complementary information
F
or more information on data output, see the technical information “microScan3, out‐
doorScan3, nanoScan3: Data output via UDP and TCP/IP” (part number 8022706).
7.17 Transferring a configuration
Overview
A conf
iguration is first saved in your Safety Designer project as a configuration file. You
transfer the configuration to the connected device.
At the left, you see the values configured in the project for the device. If the device is
connected, you see the values saved in the device at the right.
The compatibility of the configuration is checked during transmission. An existing con‐
figuration on the device is overwritten.
Approach
1.
Check the configuration carefully before transmission.
2. Click on Identify the device to ensure that the desired device is connected.
✓
The display of the connected device flashes blue.
3. If the checksums on the computer and the device differ, click on Transfer to device.
✓
The transmission process is shown in Safety Designer and on the device.
✓
Safety Designer will notify you as soon as the transfer process is complete.
Further topics
•
"V
erify configuration", page 87
7.17.1 Verify configuration
Overview
B
y verifying the configuration, you can confirm that the configuration complies with the
planned safety function and fulfills the requirements in the risk assessment.
During verification, Safety Designer reads back the configuration transferred to the
device. It compares the configuration with the configuration saved in Safety Designer. If
both configurations are identical, Safety Designer displays the verification report. If the
user confirms that this is correct, the system is considered to be verified.
CONFIGURATION 7
8027909/2023-02-22 | SICK O P E R A T I N G I N S T R U C T I O N S | nanoScan3 – EtherNet/IP™
87
Subject to change without notice