Eaton easyE4 series Manual page 616

Hide thumbs Also See for easyE4 series:
Table of Contents

Advertisement

Command sequence
Path information List of the commands that the
device operator must tap in succession in order
to get to the location described; for example:
Start\Project Overview\Variables folder.
Communication
The transfer of data between the panel and the
PLC, controller, or peripheral connected to it.
CRC
Operating system checksum
D
Data Set Ready
The transmitter is ready to send data.
Data Terminal Ready
The receiver is ready to receive data.
DCF77
German longwave time signal, Frankfurt fre-
quency 77
DHCP
Dynamic Host Configuration Protocol
DHCP (used to obtain an IP address automatically)
You can enable this setting if you do not want to
configure every single individual computer
within a network, provided there is a DHCP
server on the network. When this setting is
enabled, the computer will get information such
as an IP address, subnet mask, gateway, and
DNS from the DHCP server. In most cases, the
router used on a network will also feature a
DHCP server.
DNS
Domaine Name System
DNS (Domain Name Server)
When you enter an address such as www.in-
tel.com into a browser or FTP client, your com-
puter will first need to ask a server for the IP
address behind the name in order to actually be
612
easyE4 11/18 MN050009 EN www.eaton.com
able to reach the address. The server that
provides this information is known as a
"domain name server." Every single Internet pro-
vider provides this service, and most providers
have a secondary DNS in case their primary
DNS fails. and most providers have a sec-
ondary DNS in case their primary DNS
fails.DNS records are the IP addresses for
these servers.
DSR
Data Set Ready
DST
Daylight Saving Time
DTR
Data Terminal Ready
E
EDP
Easy Device Programming - programming
method
F
FAT
File Allocation Table
File Allocation Table
FATs are used to define filesystems.
Firewall
Firewalls are used to prevent outside attempts
to access IP addresses on a private network.
In other words, they are used to protect internal
data. When configured correctly, they can also
be used to set up rules or lists that prevent spe-
cific URLs from being requested, e.g., when
they are in violation of company policy. A fire-
wall's main task is to use the information in a
packet (the source and destination IP
addresses, as well as the port) to decide
whether the packet should be rejected or
allowed to pass. This also prevents packets not

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents