Emerson

Emerson DeltaV™ PK Flex controller

Emerson DeltaV™ PK Flex controller

Product Description

DeltaV™ PK Flex was originally as powerful as other PK controllers in the system, but now it has added flexible and scalable features through a subscription-based license. Users can subscribe to only the services they need and add functions over time.

Specification

DST limits between 50 and 1500

The module execution rates are 25ms, 50ms, 100ms, 500ms, 1s, 2s, 5s, 10s, 30s, and 60s

User memory controller memory

The required input power is 24V DC

The protocols supported locally on the PK FLEX controller include Modbus TCP (server and client), Ethernet /IP (Client: Class 1 and Class 3), OPC UA server, and PROFINET (controller). PROFINET supports APL transmitters. Other available protocols.

Operating temperature: -40° C to 60°C (-40° F to 140°F)

Storage temperature: -40° C to 85°C (-40° C to 185°F)

Relative humidity 5 to 95%, non-condensing, protection grade IP20. NEMA 12

Atmospheric pollutant ISA-S71.04-1985 Atmospheric pollutant grade G3 conformal coating impact resistance (normal operating conditions) 10g ½ -sine wave, lasting for 11ms

Vibration (operating limit) 1mm peak value (from 5Hz to 13.2Hz), 0.7g (from 13.2Hz to 150Hz)

DeltaV PK Flex Controller

Features

Provided as a subscription service to enhance flexibility and reduce capital expenditure

Eliminate costly and time-consuming data mapping operations

By fully utilizing the six built-in Ethernet ports, cabinet space is saved

Supports 1:1 redundancy without the need to increase occupied space or change the configuration

Flexible I/O ensures that you can choose from M series, S series traditional Charms I/O cards and wireless I/O cards, fully meeting your needs

Integrated security, with DeltaV SIS electronic grouping and DeltaV SlS 1508 security logic solver

It is convenient to connect third-party devices such as dashboard human-machine interfaces and continuously variable transmissions from this machine without the need for dedicated Ethernet or I/O cards.

By enhancing protection and encryption technologies, secure access is achieved to prevent unauthorized access

Faster logical execution ability

Leave a Reply

Your email address will not be published. Required fields are marked *