1661899671052 Article 558 Beckhoff Twincat

Shazam! It's a real-time controller!

Dec. 21, 2005
The TwinCAT software line from Beckhoff Automation has brought users the ability to turn any compatible PC into a real-time controller.
Product Exclusive from Beckhoff AutomationFOR SEVERAL years, the TwinCAT software line from Beckhoff Automation has brought users the ability to turn any compatible PC into a real-time controller with a multiple PLC system, NC axis control, programming environment and operating station. TwinCAT provides conventional PLCs, NC/CNC controllers and operating devices with open, PC hardware. Several programming environments are available within TwinCAT through compliance with IEC 61131-3, the only global standard for industrial controls programming.
The latest major revision in the TwinCAT product line is now available with TwinCAT version 2.10.  TwinCAT 2.10 has, according to the company, some significant new features, including:
  • Improved hardware scanning - TwinCAT 2.10 provides faster and easier diagnostics to identify hardware on the network
  • Comprehensive support for EtherCAT and EtherCAT-networked devices
  • Improved ability to set different update rates for different drives.
  • CPU is no longer burdened with target positions of drives, with TwinCAT 2.10, control loops are run only as often as necessary.
  • Fully functional programming of remote target systems for easier programming of Beckhoff BC, BX, CX and PC controllers. 
  • Communication can be set up via TCP/IP, HTTP and serial connections.

TwinCAT has always been able to support multiple fieldbus networks simultaneously and can synchronize multiple deterministic networks together. Now, according to Shane Novacek of Beckhoff, “TwinCAT 2.10 has functions for scanning hardware connected to systems via Profibus, CANopen, DeviceNet, SERCOS, real time Ethernet, Lightbus and high speed, deterministic EtherCAT from Beckhoff.” Novacek continued, “In addition to the ability to quickly scan networks and find devices, TwinCAT 2.10 provides faster and easier diagnostics by comparing networks to system configurations and identifying what hardware is physically present.”

TwinCAT 2.10 has the ability to set different update rates for different drives. Some drives require the torque, velocity and position control loops to be closed inside the PC and a new torque command issued every 50 to 125 ms. Other drives on the network may only need to have their target positions updated every 2 ms and the drive will internally close the position, velocity and torque loops. In the past, all drive control loops were run at the fastest rate required, with TwinCAT 2.10, the CPU is no longer burdened because it only runs control loops as often as is necessary. 

TwinCAT 2.10 also provides fully functional programming of remote target systems for easier programming of Beckhoff BC, BX, CX and PC controllers.  Communication can be set up via TCP/IP, HTTP and serial connections. 

  For More Information
Beckhoff Automation LLC, 12150 Nicollet Ave. S, Burnsville, MN 55337. Phone: 952/890-0000; Fax: 952/890-2888; e-mail: [email protected]; website: www.beckhoffautomation.com/twincat.

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.