About DMA-EZCCM-001

Product Description

The DMA-EZCCM-001 is a communication module for DataMan readers, which supports daisy chaining over Industrial Ethernet. This device is developed in cooperation with the company Turck.

DMA-EZCCM-001 provides the following features:

  • Data Exchange via Multiprotocol functionality Ethernet/IP™ Device or PROFINET IO Device
  • 2x M8, 4-pole, Ethernet connection
  • Integrated Ethernet switch, which allows line topology
  • Transmission speed 10 Mbps/100 Mbps
  • 4-pole M8-connectors for voltage supply
  • Separated power groups for safety shutdown
  • Two interfaces for DataMan connection
  • Two universal ports for PNP inputs, which can be configured for trigger
  • Integrated web server
  • LED displays and diagnostics
  • Fiberglass reinforced housing
  • Shock and vibration tested
  • Fully potted module electronics
  • Degree of protection IP65/IP67/IP69K

Functional Principle

The devices provide a multiprotocol Ethernet interface for EtherNet/IP™ and PROFINET. The device is connected to Ethernet as PROFINET IO Device or EtherNet/IP™ Device via the Ethernet interface. Process data between Ethernet and DMA-EZCCM-001 are exchanged during runtime. The DataMan interfaces are used for connecting Cognex DataMan Barcode Readers.

Supported DataMan Readers

The following DataMan Series readers can be connected to the device:

  • DataMan 70 Series readers
  • DataMan 150 Series readers
  • DataMan 260 Series readers
  • DataMan 360 Series readers
  • DataMan 370 series readers
  • DataMan 470 Series readers

Multiprotocol Functionality

The compact communication modules of the EZCCM product line combine two Ethernet-protocols:

  • PROFINET
  • EtherNet/IP™

A multi-protocol device can be operated without intervention from the user (which means, without changes in the parameterization) in both Ethernet protocols mentioned.

During start-up, after a power-on, the module runs in "snooping" mode and detects the Ethernet protocol which requests a link connection by listening to the traffic. If a protocol is detected, the device is set automatically to the respective protocol. After this an access to the device from other protocols is read-only.