JUMO Logoscreen Operating Instructions Manual page 7

Paperless recorder for secure acquisition of fda-compliant measurement data
Hide thumbs Also See for Logoscreen:
Table of Contents

Advertisement

B 95.5011.2.0
B 95.5011.2.1
B 95.5011.2.3
B 95.5011.4
T 95.5011
B 95.5094.0
B 95.5095.0
B 95.5096.0
Interface Description (Modbus)
This provides information on the communication (RS232; RS422/RS485) with
supervisory systems.
Interface Description (Ethernet interface)
This provides information on the connection of a paperless recorder to a
company-internal network. The description is integrated in the B 95.5011.2.0.
Interface Description (LON interface)
This provides information on the connection and use of modules of the
"JUMO mTRON automation system".
Interface Description (PROFIBUS-DP interface)
This provides information on the connection of a paperless recorder to a
PROFIBUS-DP system.
Installation Instructions
The installation instructions describe the installation of the recorder and the
connection of the supply and signal cables. The instructions also contain a list
of the technical data.
Data Sheet
The data sheet contains general information, the order details and the
technical data.
PC Evaluation Software (PCA3000)
The operating manual describes the operation and the features of the PC
evaluation software.
PCA3000 serves to visualize and evaluate process data (measurement data,
batch data, messages, instrument audit trails, ...). The process data can be
read in via the CompactFlash memory card, or made available through the
PCC software.
PCA Communications Software (PCC)
The operating manual describes the operation and the features of the PCA
communications software.
PCC is responsible for the data transfer from the recorder to a PC, or to a
network.
PC Security Manager Software (PCS)
The operating manual describes the operation and the features of the PC
Security Manager software.
The PCS ensures that only authorized persons can gain access to the system
components (instrument, PC software) and use electronic signatures on
electronic documents.
The configuration of the Security Manager can only be performed by the
system administrator.
1 Introduction
7

Advertisement

Table of Contents
loading

Table of Contents