☆Design changes
The upper and lower height of the CPU part is increased by 4mm, and the front and rear length is increased by 20mm.
A spring clamp terminal block is used.
The LEDs with built-in I/O are concentrated in the middle.
The display module has been cancelled.
☆Performance features
L04HCPU\L08HCPU\L16HCPU three specifications.
By using iQ-L CPU, the function upgrade of L series can be realized.
Existing L series products can be used as external modules.
Structured programming such as tags/FBs can be realized using GX Works3.
Keyword 1: Production efficiency
MELSEC iQ-L series, by changing the CPU module of the MELSEC-L series, various controls of the standard I/O functions, and significantly upgrading product performance from the MELSEC-L series,
help customers achieve higher results with smaller investments. benefits.
CPU performance is greatly improved and cycle time is shortened
Strengthen structured program correspondence
By implementing an FB (function block) execution method suitable for structured programs, the increase in program capacity is suppressed and program execution performance is improved. Through
the program execution method suitable for ST program execution, the usage capacity of pointer devices is reduced and the program execution performance is improved.
Simple CPU communication function
By using simple settings of GX Works3, device data such as production data can be transferred without a program. It can communicate easily with existing systems including MELSEC iQ-L series, MELSEC iQ-R series, iQ-F series, Q series and L series.
Security key authentication to protect engineering data
By writing a security key to the CPU module, the program can be locked to prevent illegal access; in addition, the CPU module without a registered security key cannot execute relevant programs, preventing the leakage of customer proprietary technology.
Prevent illegal access to control systems through the network
By registering the IP address that can access the CPU module using the IP filter function, unauthorized and improper access can be prevented. In addition, it is equipped with a remote password function for password protection.