Glossary | Murrelektronik

Murrelektronik glossary of decentralized automation technology

In the Murrelektronik glossary, important technical terms and abbreviations from the world of decentralized automation technology are simply explained - concisely and to the point. The glossary helps you to find your way around the Murrelektronik world and makes it easier for you to operate, configure and maintain our products.

The listed terms only represent a proportion of the wider terminology used in decentralized automation technology. If you are missing a technical term that you consider essential, please inform us by e-mail.
 

Address mapping is the mapping of one address onto another address system. Address mapping translates addresses of a protocol into addresses of another protocol. This allows systems using two different protocols to work with each other.

Analog Input

Analog input

Analog Output

Analog output

Fast Ethernet configuration protocol

Devices on the network agree on a transmission mode that every device is capable of (100 Mbit/s or 10 Mbit/s; Full-Duplex or HalfDuplex) before data is actually transferred.

The ability of a device to detect the transmission rate (10 Mbit/s or 100 Mbit/s) automatically and use it for sending/receiving.

Broadcast in a computer network is a message by means of which data packages are transferred from one point to all network devices.

COB-Identifier

Every communication object is clearly identified by means of the COB-ID. The COB-ID marks the priority of the communication object.

Dynamic Host Configuration Protocol

DHCP allows a server to dynamically distribute IP address and configuration information to clients. Normally, the DHCP server provides minimum the following basic information to the client: IP address, subnet mask, standard gateway.

Digital Input

Digital input

Digital Output

Digital output

Direct Parameter Page

Electromagnetic compatibility

Electrostatic discharge

Electrostatic discharge

In each Ethernet frame (data package), there are addresses of sender (source) and receiver (target). When a frame is received, the receiving unit of a receiving station compares the MAC target address with its own MAC address. When the addresses match, the receiving unit forwards the contents of the frame to a superior layer. If they do not match, the frame is discarded.

Fail-safe digital input

Fail-safe digital output

File Transfer Protocol

A network protocol that is used to transfer data from one computer to another over a public network, e.g., the Internet. FTP is not considered a secure protocol because passwords and the content of files are transferred in plain text without encryption. However, FTP can be securely implemented using SSH (Secure Shell) or other technologies.

The ability of a device to send and receive data at the same time. Collision detection is deactivated in full-duplex mode.

The address range in Profibus in which an active participant searches for other new active participants. This range is always between the own address and the address of the next active participant which already is in the token ring. The range between the highest address and 127 does not belong to the GAP range.

Device master data

The device master data describes the technical features of a Profibus or Profinet product. The GSD-file is required to configure a Profibus or Profinet system and is provided by the device manufacturer.

A device can either receive or send data at a particular time.

Hypertext Transfer Protocol

An open Internet protocol used to transfer information over the World Wide Web.

Hypertext Transfer Protocol Secure

A secure version of HTTP with authentication and encrypted communication across the World Wide Web. Used for communication with stringent security requirements, e.g. web-based login processes.

Internet Protocol address

Numeric code which serves to clearly identify a computer in a network.

IP Code (International Protection)

2: Protection against solid foreign objects with a diameter above 12.5 mm and against access by finger.
0: No protection.

IP Code (International Protection)

5: Protection against dust in dangerous amounts.
4: Protection against splash-water from every direction.

IP Code (International Protection)

6: Dustproof, protection against access by a wire.
7: Protection against the effects of temporary submersion in water.

IP Code (International Protection)

6: Dustproof, protection against access by a wire.
8: Protection against the effects of continuous submersion in water.

Isochronous-Real-Time

Profinet protocol for isochronous activation of data and functions on different modules.

Indexed Service Data Unit

Media Redundancy Protocol

A Profinet protocol for management of ring topologies. It is used to increase availablility of devices in the network.

Open systems interconnection reference model

The OSI reference model was published in 1972 by ISO (International Organization for Standardization) with the aim to facilitate connection between networks of different manufacturers with different topologies. The OSI model is a standard that classifies and defines according to which principles communication between the network components takes place using different protocols.

It consists of seven layers in total:

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer.

Protective Extra Low Voltage

Protective extra low voltage

Probability of Failure per Hour

Probability of failure per hour

Rapid Spanning Tree Protocol

The Rapid Spanning Tree Protocol (RSTP) is a network protocol that is used to deactivate redundant paths in local networks and reactivate them when they are required (when the connection fails). It was developed on the basis of the Spanning Tree Protocol (STP) and resolves the main criticisms facing the original protocol. It is defined in standard IEEE 802.1D-2004.

Remote Transmission Request

Request for data (telegram) in CANopen with the same identifier used for data transmission.

Screened Shielded Twisted Pair

The individually twisted pairs of a twisted pair cable are protected using foil for shielding. The two individually shielded pairs are surrounded by a shared copper braid shield.

Safety Extra Low Voltage

Safety extra low voltage

Protocol extension of a PNIO device for establishing simultaneous commnnication links with several PNIO controllers.

a

Address mapping is the mapping of one address onto another address system. Address mapping translates addresses of a protocol into addresses of another protocol. This allows systems using two different protocols to work with each other.

Analog Input

Analog input

Analog Output

Analog output

Fast Ethernet configuration protocol

Devices on the network agree on a transmission mode that every device is capable of (100 Mbit/s or 10 Mbit/s; Full-Duplex or HalfDuplex) before data is actually transferred.

The ability of a device to detect the transmission rate (10 Mbit/s or 100 Mbit/s) automatically and use it for sending/receiving.

b

Broadcast in a computer network is a message by means of which data packages are transferred from one point to all network devices.

c

COB-Identifier

Every communication object is clearly identified by means of the COB-ID. The COB-ID marks the priority of the communication object.

d

Dynamic Host Configuration Protocol

DHCP allows a server to dynamically distribute IP address and configuration information to clients. Normally, the DHCP server provides minimum the following basic information to the client: IP address, subnet mask, standard gateway.

Digital Input

Digital input

Digital Output

Digital output

Direct Parameter Page

e

Electromagnetic compatibility

Electrostatic discharge

Electrostatic discharge

In each Ethernet frame (data package), there are addresses of sender (source) and receiver (target). When a frame is received, the receiving unit of a receiving station compares the MAC target address with its own MAC address. When the addresses match, the receiving unit forwards the contents of the frame to a superior layer. If they do not match, the frame is discarded.

f

Fail-safe digital input

Fail-safe digital output

File Transfer Protocol

A network protocol that is used to transfer data from one computer to another over a public network, e.g., the Internet. FTP is not considered a secure protocol because passwords and the content of files are transferred in plain text without encryption. However, FTP can be securely implemented using SSH (Secure Shell) or other technologies.

The ability of a device to send and receive data at the same time. Collision detection is deactivated in full-duplex mode.

g

The address range in Profibus in which an active participant searches for other new active participants. This range is always between the own address and the address of the next active participant which already is in the token ring. The range between the highest address and 127 does not belong to the GAP range.

Device master data

The device master data describes the technical features of a Profibus or Profinet product. The GSD-file is required to configure a Profibus or Profinet system and is provided by the device manufacturer.

h

A device can either receive or send data at a particular time.

Hypertext Transfer Protocol

An open Internet protocol used to transfer information over the World Wide Web.

Hypertext Transfer Protocol Secure

A secure version of HTTP with authentication and encrypted communication across the World Wide Web. Used for communication with stringent security requirements, e.g. web-based login processes.

i

Internet Protocol address

Numeric code which serves to clearly identify a computer in a network.

IP Code (International Protection)

2: Protection against solid foreign objects with a diameter above 12.5 mm and against access by finger.
0: No protection.

IP Code (International Protection)

5: Protection against dust in dangerous amounts.
4: Protection against splash-water from every direction.

IP Code (International Protection)

6: Dustproof, protection against access by a wire.
7: Protection against the effects of temporary submersion in water.

IP Code (International Protection)

6: Dustproof, protection against access by a wire.
8: Protection against the effects of continuous submersion in water.

Isochronous-Real-Time

Profinet protocol for isochronous activation of data and functions on different modules.

Indexed Service Data Unit

m

Media Redundancy Protocol

A Profinet protocol for management of ring topologies. It is used to increase availablility of devices in the network.

o

Open systems interconnection reference model

The OSI reference model was published in 1972 by ISO (International Organization for Standardization) with the aim to facilitate connection between networks of different manufacturers with different topologies. The OSI model is a standard that classifies and defines according to which principles communication between the network components takes place using different protocols.

It consists of seven layers in total:

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer.

p

Protective Extra Low Voltage

Protective extra low voltage

Probability of Failure per Hour

Probability of failure per hour

r

Rapid Spanning Tree Protocol

The Rapid Spanning Tree Protocol (RSTP) is a network protocol that is used to deactivate redundant paths in local networks and reactivate them when they are required (when the connection fails). It was developed on the basis of the Spanning Tree Protocol (STP) and resolves the main criticisms facing the original protocol. It is defined in standard IEEE 802.1D-2004.

Remote Transmission Request

Request for data (telegram) in CANopen with the same identifier used for data transmission.

s

Screened Shielded Twisted Pair

The individually twisted pairs of a twisted pair cable are protected using foil for shielding. The two individually shielded pairs are surrounded by a shared copper braid shield.

Safety Extra Low Voltage

Safety extra low voltage

Protocol extension of a PNIO device for establishing simultaneous commnnication links with several PNIO controllers.

No term found.

Career
Join our team!
Newsletter
Always up to date!
Always available!
We take care of your questions...