Manufacturer Part Number

Specifications of EA-IF-E2

No SVHC (18-Jun-2010)
Accessory Type
Interface Card
Engineering Laboratory And Complex Industrial Application
Approval Bodies
Rohs Compliant
For Use With
EA Elektro-Automatik PSU
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
© 009, Elektro-Automatik GmbH & Co. KG
9.3 Communication object lists
9.3.1 Column definition
This list is the reference when creating user-defined appli-
cations apart from LabView, which are intended to control
our various devices.
address). This number has to be assigned to the byte
in the telegram.
only be queried from the device or if it can also be written.
Reading is always possible, also called monitoring. Setting
values or status requires enabling of the remote control mode
(if device is not in „local mode“ or similiar). Also see 9..
object. The execution of these objects additionally depends
on one of the below conditions. If the condition is not given,
the object is not executed and the device will return an er-
ror message which contains an error code. Meaning of the
1 = The output/input of the device has to be switched off
(The object is only accepted and executed by the device if the power out-
put/input is in standby mode)
2 = Option „Internal resistance“ has to be unlocked*
(The object is only accepted and executed by the device if the option „Internal
resistance“ is unlocked)
3 = Transfer of the function data has to be enabled*
(The object is only accepted and executed by the device if it has been
instructed before by a different object to receive and set function data)
4 = Function manager activated*
(The object is only accepted and executed by the device if the function
manager has already been activated manually in the device menu or by
a different object)
5 = Function manager not activated*
(The object is only accepted and executed by the device if the function
manager is not active)
* only at series PSI 9000
of the telegram. Commonly known data types are used.
objects with data type „string“ this byte defines the maximum
length of the string. The string has to be terminated with an
EOL (end of line, =0 ) or it ends after the given number of
bytes. Strings are transmitted in up to three split telegrams
when using CAN. See also „7.5. Telegram structure IF-
The mask defines which bits may be set or unset. In the
telegram, the first byte of the
second byte is the control byte, which will be masked by the
first byte. It defines the bits that will be changed. Objects of
other data types do not use a mask.
Attention! It is generally required to set the device into
remote control mode before sending objects that will
change any value on the device.
5th column
3rd column
6th column
4th column
7th column
1st column
defines the type of the data in the
defines the data length of the
defines if the object is read only, i.e. it can
defines a special access condition of an
is used to mask out data of type „char“.
contains the object number (=object
data field
is the mask and the
data field
field. At
Columns 8 & 9
Some objects use a two-byte time format, which is explai-
ned in section 9..1.
9.3.2 Object examples and explanations
 A description of the object list columns can be found in
section 9.3.1.
 All numbers are in decimal, if not marked as hexadecimal
by a leading 0x.
 Important! The mask in column 7 has to be placed at
the first byte position in the data field of a telegram, directly
behind the object number and before the control byte (at
certain objects). The mask given in the table is either a main
mask which stands for all bits that can be changed (if only
one mask is given) or dedicated to a certain bit or group
of bits. In order to change single bits or groups of bits, the
correct mask has to be used. Example: the mask of object
54 is 0x51, means for the bits 0, 4 and 6. If bit 0 shall be
changed, you need to use mask 0x01. The mask is also
returned when querying objects that use a mask. Then the
first byte of the answer is always the mask the second one
the status byte, while the mask can be ignored.
I. Function manager (objects 54, 56, 73, 74, 75, 78, 90-146)
When using the function manager, the order of using the
objects becomes very important. Since setup and control of
the function manager is complex it is not handled here, but
in an external PDF file named „an001_function_manager_
de_en.pdf“, which you can also find on the included CD in
the folder \manuals.
II. Object 54
Switches the device into remote control operation (primarily)
or switches the power input/output, depending on the device
type, on or off. The mask has to be defined and sent always,
describing the bit(s) to set or unset.
Example: Activate remote control -> Bit 4 ->Value of bit 4
= 0x10 -> Mask 0x10 -> control byte also 0x10. The object
0x3 will then contain the data 0x1010. Deactivate remote
control, the same way: Mask 0x10 -> Control byte 0x00 ->
data 0x1000.
Generally applies: Never set input/output and remote control
simultaneously, though it‘s possible by the bits.
When reading objects that require a mask, the main mask
is also returned, but is only of informative value.
III. Object 56
The bits are here, understandably, only allowed to be set
individually. Else the actions are not executed properly.
explain details about the
data field

Related parts for EA-IF-E2