12.3.3.5
Reservation input (RESIN).................................................................................................... 242
12.4
12.4.1
Identification..............................................................................................................................242
12.4.2
Application..................................................................................................................................242
12.4.3
Setting guidelines..................................................................................................................... 243
12.5
12.5.1
Identification..............................................................................................................................243
12.5.2
Application..................................................................................................................................243
12.5.3
Setting guidelines..................................................................................................................... 244
12.6
12.6.1
Identification..............................................................................................................................244
12.6.2
Application................................................................................................................................. 244
12.6.3
Setting guidelines..................................................................................................................... 245
12.7
12.7.1
Identification..............................................................................................................................245
12.7.2
Application..................................................................................................................................245
12.7.3
Setting guidelines..................................................................................................................... 246
12.8
12.8.1
Identification..............................................................................................................................246
12.8.2
Application..................................................................................................................................246
12.8.3
Setting guidelines..................................................................................................................... 246
12.9
12.9.1
Identification.............................................................................................................................. 247
12.9.2
Application..................................................................................................................................247
12.9.3
Setting guidelines..................................................................................................................... 248
13.1
13.1.1
Identification.............................................................................................................................. 251
13.1.2
Application.................................................................................................................................. 251
13.1.2.1
Blocking schemes................................................................................................................... 251
13.1.2.2
Delta blocking scheme.......................................................................................................... 252
13.1.2.3
Permissive schemes.............................................................................................................. 253
13.1.2.4
Intertrip scheme..................................................................................................................... 255
13.1.3
Setting guidelines..................................................................................................................... 256
13.1.3.1
Blocking scheme.................................................................................................................... 256
13.1.3.2
Delta blocking scheme..........................................................................................................256
13.1.3.3
13.1.3.4
13.1.3.5
Unblocking scheme................................................................................................................257
13.1.3.6
Intertrip scheme..................................................................................................................... 257
13.2
ZCRWPSCH ..................................................................................................................................... 257
13.2.1
Identification.............................................................................................................................. 257
13.2.2
Application..................................................................................................................................258
13.2.2.1
Current reversal logic............................................................................................................ 258
13.2.2.2
Weak-end infeed logic...........................................................................................................258
Application manual
Table of contents
7