EasyManua.ls Logo

Siemens Simatic ET200pro

Siemens Simatic ET200pro
146 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
CPU 1516pro-2 PN (6ES7516-2PN00-0AB0)
Operating Instructions, 09/2016, A5E35873416-AA
15
Product overview
2
2.1
Application
The CPU 1516pro-2 PN is a component of the ET 200pro distributed I/O system in degree of
protection IP65, IP66 and IP67. The CPU provides you with maximum performance
combined with excellent usability. It is suitable for a variety of demanding applications and
communication tasks in automation engineering. It features:
Integrated PROFINET interfaces
Integrated Web server
Integrated functionalities:
Trace
Motion control
Closed-loop control functions
Integrated technological functions
The CPU supports motion control functions. STEP 7 provides PLCopen standardized blocks
for configuring and connecting a drive to the CPU. Motion control functionalities support
speed-controlled, positioning and synchronous axes as well as external encoders.
For effective commissioning and fast optimization of drives and closed-loop controls, the
CPU supports extensive trace functions.
In addition to drive integration, the CPU has extensive closed-loop control functions, such as
easy-to-configure blocks for automatic optimization of the controller parameters for optimized
control quality.
Due to the supported technology functions, the CPU is suitable for controlling pumps, fans,
mixers, conveyor belts, lifting platforms, gate control systems, building management
systems, synchronized axes, cross cutters, etc.
Security Integrated
The CPU provides, in conjunction with STEP 7, password-based know-how protection
against unauthorized reading out or modification of the program blocks.
The copy protection provides reliable protection against unauthorized reproduction of
program blocks. With copy protection you associate individual blocks with the serial number
of the CPU or SIMATIC memory card.
In addition, you can assign various access rights to different user groups using four different
authorization levels.
Through an improved manipulation protection, the CPU detects modified or unauthorized
transmissions of engineering data.

Table of Contents

Related product manuals