ETAT Glossary

There are currently 16 names in this directory beginning with the letter T.
A unit of a user program the execution of which can be controlled with Task Control Instructions or interrupt conditions. The CS, CJ, CP, and NSJ-series PLCs support task programming. Programming ending in an END instruction can be assigned to a task. There are basically two types of task: 1) cyclic tasks, which are executed cyclically and controlled with the Task Control Instructions and 2) interrupt tasks (including I/O interrupt tasks, scheduled interrupt tasks, power OFF interrupt tasks, and external interrupt tasks), which are executed when the interrupt conditions are met.

Transmission Control Protocol/Internet Protocol: a method for insuring that data is transmitted properly

To program a manipulator arm by manually guiding it through a series of motions and recording the position in the robot controller memory for playback.

Teach Lock
While the Teach Lock is set, the mode of operation is tied to the Teach Mode and the machines cannot be played back using either [START] or external input. For safety purposes, always set the mode switch to “TEACH” before beginning to teach.

Teach Mode
A robot controller mode in which a robot manipulator is programmed by manually guiding it through a series of motions and recording the position in the robot controller memory for playback. Industrial robots that do not have an active Power and Force Limiting Function require the use of a Three Position Enable Switch in Teach Mode.

Teach Pendant
A handheld control box, which is used by an operator to remotely guide a robot through the motions of its tasks. The motions are recorded by the robot control system for future playback. Modern industrial robots come with programming pendants, which not only allow robot teaching, but also support full feature robot programming and safety user interface.

This is the sensor data, process data, and other engineering values of interest to control engineers. It may also refer to the server used to collect such data and there is some crossover in these systems with an Historian.

text file
A file object able to read and write str objects. Often, a text file actually accesses a byte-oriented datastream and handles the text encoding automatically.

The workspace has a row of tabs along the top; one for each flow and any subflows that have been opened."

There are three types of context;

They can be used to reduce some visual complexity of a flow
or to package up a group of nodes as a reusable component used in multiple places."

Thick Client
A Thick Client is a “traditional” application that implements client functionality in a client/server architecture. Unlike a Thin Client that are automatically downloaded from a web page, Thick Client applications must be installed on each individual computer and are typically larger than their Thin Client counterparts. The advantage of Thick Clients over Thin Clients is that they typically have more functionality and are tightly bound to the local system on which they execute. Consequently, they are typically faster too, but this is a practical observation, rather than a technical constraint.

Thin Client
A Thin Client is an applet that implements client functionality in a client/server architecture. In the past, the term “Thin Client” had a close relationship to its size and complexity, but today the term Thin Client mostly refers to applets that can be executed without a formal installation process. The advantage of such applications is the ease of support from a central administrative source. For example, IT personnel no longer have to inquire about the version of software being executed, because a simple refresh will retrieve the latest copy from the web page. In sharp contrast, a Thick Client must be formally installed, and is not automatically downloaded.

A token can be thought of as a circulating envelope. This envelope is circulated through the network and the person who receives the envelope will put a destination and a memo into the envelope to send his or her message to somebody else. This method is called "token passing." The Controller Link Network is a bus network that uses token passing."

Refers to physical connection and position of network devices.

Twisted Pair
Copper cable in which the transmit/receive pairs are twisted to reduce crosstalk; Cat5e uses 4 pairs; can be shielded or unshielded

Submit a name