EasyManua.ls Logo

Siemens F IWLAN - Page 53

Siemens F IWLAN
100 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Planning the use
3.5 Planning protection zones in the RFID tag system
Wireless Teach Pendant F IWLAN V2
Operating Instructions, 08/2010, A5E02453837-01
53
Relationship between protection zone and RFID tag
The protection zone limit is defined by a clear spatial demarcation.
If the HMI device is logged onto a machine in the protected area with a RFID tag, it is
possible to operate the machine in fail-safe mode with an enabling button within the
protected area.
Requirements for the protection zone
The protection zone must meet the following requirements:
The protection zone must be completely demarcated and protected.
Protection zones may not overlap.
The protection zone must be fully visible to the operating personnel.
A hazardous location must be visible from every point of the protection zone.
You can find a configuration example in the Appendix.
The protection zone must be protected by a security system that prevents unauthorized
or erroneous use of the HMI device. The security system must have a safety category
that is sufficient to meet the plant requirements.
The following security systems are suitable:
Mesh fence with access
If you use a mesh fence for the protection zone, you can protect access through an
additional security system, for example, a light barrier or a contact pressure mat. This
allows open access for an escape route during operation of the plant.
Light barrier
Contact pressure mat
The security system can be controlled by a safety program, such as a program for robot
control conforming to a robotics directive.
See also
Example of an application (Page 267)
PRELIMINARY II
1.7.2010

Table of Contents

Related product manuals