GE GFK-0787B Noise Reduction Machine User Manual


 
6
6-4 Genius Modular Redundancy Flexible Triple Modular Redundant (TMR) System
User’s Manual – March 1995
GFK-0787B
Using the GMR Configuration Software
The GMR Configuration Software is used to enter data needed by the GMR program
software.
Autotest interval
CPU type for the system
I/O limits for the system
initialization data for the system
fault actions for the system
all GBC (bus controller) groups, with all Genius I/O blocks that will use GMR
features
The GMR Configuration Software is not part of the Logicmaster 90 software package. It
is a separate utility that operates on an IBM PC or compatible computer. It runs under
DOS. Either a keyboard or mouse can be used for making entries.
After all the necessary configuration entries have been made, the data is added to the
GMR system software. The GMR system software is provided as a Logicmaster 90
Program Folder, to which the application program is then added.
To assure matching the entries made with the GMR Configuration Software to
corresponding entries made during Logicmaster 90 configuration and Genius block
configuration, the GMR configuration data should be printed out and used as a
reference.
The GMR software requires that:
all PLCs have the same number of bus controllers in the same positions (not
including “non-GMR” bus controllers).
all PLCs are connected to the same “GMR” Genius busses.
Genius busses used for either I/O or communications that are not common to all PLCs in
the system, or that do not use bus addresses as described above must not be included in
the GMR configuration.
GMR Configuration Software Revision and Checksum
The system monitors the checksums of both the configuration data and the application
program, including the GMR software modules. As part of the GMR configuration, you
can select whether to permit online changes. If online changes are permitted, a
configuration mismatch will not stop the PLC. If online changes are not permitted, a
configuration mismatch will stop the PLC. The table on page 4-3 shows in detail what
happens if a configuration mismatch is detected.