201101762 j 11 J〇twi.d〇c/n 六、發明說明: 【發明所屬之技術領域】 曰有ίΓ肢有關於—_路裝置與其操作方法,且特別 :有關於-種可以減少設計複雜度的網路裝置與其: 【先前技術】 〇 個網控會具有多 進行控制,錢行不同的操作。要處理器分別 圖1為習知網路裝置的示意圖。請參昭 ,置10",處理器110分別 制: =〜m Μ ’ Μ為正錄’錢㈣各幢=控2 ,。但是’上述線路的連接方式,可能會於印刷電^= Γ^ΓΓώΒο_Ρ(:Β)製作時,造成接地面被綱 成夕個邛为,而使得印刷電路板的電磁媒 (electromagnetic interference, ΕΜΙ)更加嚴重。 干擾 除此之外’為了方便處理器UG控制各網 M的操作’因此還需要分別給 = 12〇—W2G—Μ特定的設備識別碼,以便於處理器 供知作指令骑應_路控繼中。如此 匕 計上的複雜度。 胃丨日加!又 【發明内容】 3 201101762 31li)8twt.doc/n 少4===置與其操作方法,藉此可以減 少η又彳的奴雜度,亚改善電磁干擾的問題。 本發明提出一種網路裝置,包括處理器與多個網# 。處理☆用以提供操作指令,其中此操作指令具有— 識別碼。多個網路控制器各自具有第—介面二二 —設備識別碼,第1個網路杵制 二乐一;丨囱和 器,而第i個網路控制器的第二=第 收操作指令,並且網路㈣H會各自 ϋ :指令的識別碼,而決定是否執行操作指 在本發明之一實施例中,上述^個網路 ㈡=_令的識別碼不相同時,則將指 =制器的第二介面傳送到第⑼)個網二網 =發明-實施例中’上述當第丨個網路 出<備識別碼與操作指令的識別碼相同_ 查 令來進行相關操作。 ' 仃知作指 或資=^=關巾,上轉料令為資料寫入操作 在本發明一實施例中,上述操作指令 時,則第i個網路控制器會將一資料寫入第i、個:入呆作 器的暫存H或記憶體巾,其巾上述資料包括在操^路令控中制 Ο Ο 201101762 3 mstwt.doc/n 在本發明一貫施例中,上述操作指令為資料讀取操作 日守,則第i個網路控制器會從第i個網路控制器的暫存界 或記憶體中讀取資料而產生讀取訊息,並透過第丨個網ς 控制器的第-介面傳送上述讀取訊息,其t上述讀取資訊 包括一讀取訊息識別碼。 #在本發明一實施例中,上述當第α_υ個網路控制器 的第二介面接收讀取訊息時,則第(⑷個網路控制哭合 將讀取資,識別碼加上第二預設值而產生第二目標識^ 碼,並將第二目標識別碼置換為目前識別碼,再將讀取訊 息透過第(i-l)個網路控制器的第一介面傳送。 在本發明一貫施例中,上述第一介面為管理介面 irrgementinteffaee) ’ 第二介面㈣子可抹除可規 It (Electrically Erasable Programmable Read201101762 j 11 J〇twi.d〇c/n VI. Description of the invention: [Technical field to which the invention belongs] Γ Γ 有 有 — _ 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 装置 路 路 路 路 路 路 路 装置 路 路 路 路 路 路 路The network device and its: [Prior Art] One network control will have more control, and the money will operate differently. Processor 1 Figure 1 is a schematic diagram of a conventional network device. Please refer to the instructions, set 10 ", processor 110 separate system: = ~ m Μ Μ Μ is the record of the 'money (four) each building = control 2,. However, the connection method of the above-mentioned lines may cause the grounding surface to be smashed when the printed circuit is manufactured, and the electromagnetic interference (印刷) of the printed circuit board is further improved. serious. In addition to the interference, in order to facilitate the operation of the processor UG to control the operation of each network M, it is also necessary to separately give = 12 〇 - W2G - Μ a specific device identification code, so that the processor can be used as a command to ride the _ road control in. This is so complicated. Stomach 丨 丨 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加 加The invention provides a network device comprising a processor and a plurality of networks #. Processing ☆ is used to provide an operation instruction, wherein the operation instruction has an - identification code. Each of the plurality of network controllers has a first interface - a device identification code, a first network is configured to perform a second music, and a second and a second operation command of the i-th network controller And the network (four) H will each: 指令 the identification code of the instruction, and determining whether to perform the operation means that in an embodiment of the present invention, when the identification codes of the above-mentioned network (2)=_ commands are not the same, then The second interface of the device is transmitted to the (9)th network 2 network=invention-embodiment, the above-mentioned when the first network out < the identification code is the same as the identification code of the operation instruction _ check to perform related operations. In the embodiment of the present invention, the i-th network controller writes a data to the first operation. i, one: temporary storage H or memory towel into the stagnation device, the above information is included in the control system Ο Ο 201101762 3 mstwt.doc / n In the consistent embodiment of the invention, the above operation instructions For the data read operation, the i-th network controller reads the data from the temporary storage boundary or the memory of the i-th network controller to generate a read message, and controls through the third network. The first interface of the device transmits the read message, and the read information includes a read message identifier. In an embodiment of the present invention, when the second interface of the α_υ network controller receives the read message, the ((4) network control crying will read the capital, the identification code plus the second pre- The second target identifier is generated by setting the value, and the second target identifier is replaced with the current identifier, and then the read message is transmitted through the first interface of the (il) network controller. In the example, the first interface is a management interface (irrgementinteffaee)). The second interface (four) can be erased. (Electrically Erasable Programmable Read
Only Memory, EEPROM)介面。 本發明提出一種網路裝置的操作方法,此網路裝置且 ^個網路控制器與處理器,上述網路控制器各自具有第 一介面與第二介面和設備識別碼,第1個網路控制器的第 耗接該處理器’第i個網路控制器的第二介面耦接 弟㈤)個網路控制器的第一介面,i為 =的操作方法包括下列步驟。首先,提供操作指令1 Γ杳】作It具有識別碼。接著,依序接收操作指令,並 路控制器的設備識別碼與操作指令的識別 馬而決疋疋否執行操作指令來進行相關操作。 在本發明一實施例中,上述檢查第i個網路控制器的 5 201101762 31158twf.doc/n °又備識別碼與操作指令的識別碼的步驟包括當檢查出第i 7網路控制器的設備識別碼與操作指令的識別碼不相同 ^ ’則將操作指令的識別碼減去第一預設值,並將操作指 令透過第1個網路控制器的第二介面傳送到第(i+Ι)個網 路控制器的第—介面。 ^ >在本發明—實施例中,上述檢查第i個網路控制器的 °又備識別碼與操作指令的識別碼的步驟包括當檢查出第i ©j路控制器的設備識別碼與操作指令的朗碼相同時, 、’執行操作指令來進行相關操作。 ,本發明—實施例中,上述操作指令為資料寫 或貧料讀取操作。 作,— f施例中,上述操作指令為資料寫入操 網路控_的暫存器或記憶體中,其中上述資^ 包括在上述操作指令中。 <貝了十 作,上述_令騎料讀取操 網路控树相嶋作財騎括從第⑽ 息,並透過第體中讀取資料而產生讀取訊 息,其中上述取$自=制—第―介面傳送上述讀取訊 y 士 &息包括—讀取訊息識別碼。 在本發明—每始乂 存器或記憶體中;取:::,,十述從f 1個網路控制器的暫 -介面傳送讀取訊=,域過第1侧路控制器的第 控制器的第二介面以收之f更包括當第(“)個網路 讀取Λ息時’則將讀取訊息識別碼Only Memory, EEPROM) interface. The present invention provides a method for operating a network device, the network device and a network controller and a processor, each of the network controllers having a first interface and a second interface and a device identification code, the first network The operation of the controller is the first interface of the network controller, and the second interface of the i-th network controller is coupled to the first interface of the network controller. The operation method of i is = the following steps. First, the operation command 1 is provided as It has an identification code. Then, the operation instruction is sequentially received, and the device identification code of the parallel controller and the identification of the operation instruction are executed, and the operation instruction is executed to perform the related operation. In an embodiment of the present invention, the step of checking the identification code of the identification code and the operation instruction of the 5th 201101762 31158 twf.doc/n ° of the i-th network controller includes: when checking the i i 7 network controller The device identification code is different from the identification code of the operation instruction ^ ', the identification code of the operation instruction is subtracted from the first preset value, and the operation instruction is transmitted to the first interface through the second interface of the first network controller (i+ Ι) The first interface of a network controller. In the embodiment of the present invention, the step of checking the identification code of the i-th network controller and the identification code of the operation instruction includes checking the device identification code of the i-th path controller and When the lang code of the operation command is the same, 'execute the operation command to perform the related operation. In the present invention - the embodiment, the operation command is a data write or a lean read operation. In the example, the above operation instruction is a data write into a register or a memory of the operation control network, wherein the above-mentioned information is included in the above operation instruction. <Bei's ten works, the above-mentioned _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - The first interface transmits the above-mentioned read message & the information includes - reading the message identifier. In the present invention - every time the memory or the memory is stored; take::,, the ten-time transmission from the temporary interface of the f network controller is read =, the domain passes the first side controller The second interface of the controller will include the message ID when the (") network reads the message.
GG
O 201101762 i o〇iwi.d〇c/n 力上第一預设值,並將讀取訊息透 器的第—介面傳送。 弟(卜1)個網路控制 ,本發明—實施例中,上述第—介 本發月之網路控制器以串接 路控制器,域料明錢接線;器與網 r刀割成多個部分,而造成電磁干擾的門的接地 控制器藉由將操作指令中的識別瑪外’網路 操作指令到各網路控制器,而各網路㈣ 依序傳送 本身的設傷識別碼與目前識別媽,以4:=由檢查其 令來進行相關操作,並且再藉由將目前=執行操作指 依序透過各網路^广遞增方式 :器確認是否從指定的網_中處 來’網路控制器不需各別給予特 、科。如此- 減少設計的複雜度。 職別碼,將可以 ,讓本刺之上述特徵和優點能更觸㈣ 舉只施例,亚配合所附圖式作詳細說明如下。下文特 【實施方式】 圖為本發明—實關之網路裝置的矛 參照圖2,網路裝置包括處理器21〇與網 220J〜220_N,其中N為正整數。 控制器 處理器210用以提供操作指令 一識別石馬,以便於控制網路控制器22〇 i〜;^具有 -^的操作。 201101762 31158twf.doc/n 網路控制态220—1〜220一N各自具有第一介面與第二 介面和設備識別碼,並且第i個網路控制器220」的第一 介面耦接處理器210,第1個網路控制器22〇j的第二介 面耦接周路控制态220—2的第一界面,第2個網路控制器 220一2的第二介面耦接第3個網路控制器22〇一3的第一界 面,第3個網路控制器220一3的第二介面耦接第4個網路 控制器220一4的第一介面,…,第N-1個網路控制器 220一N-1的第二介面耦接第N個網路控制器22〇_N的第— 介面。而網路控制器220J〜22〇_N會依序接收上述操作指 令:並且會各自依據檢查設備識別碼與目前識別碼,而決 定是否執行操作指令來進行相關操作。 舉例來說’假設網路控制器22〇一1〜220—N的設備識別 碼都設定為,,第-預設值與第二預設值分別設定為 1 。另外,將操作指令中的識別碼假設為“2” ,以便 將操作指令傳送到對應的網路控制器,而進行後續操作。 首先,當網路控制器220一1接收處理器210所提供的 操作指令時,會檢查設備識別碼與目前識別碼。由於第i 個=路控制器220_1的設備識別碼為“〇”,而目前識別碼 為“2”,因此,第ί個網路控制器22〇會檢查出設備識別 碼與目前識別碼不相同。 “此時,第1個網路控制器220J會將操作指令的識別 碼‘2’’減去第一預設值“丨”(亦即2_1=1),並將操作 扣令透過弟1個網路控制器220一1的第二介面傳送到第2 個網路控制器220_2的第一介面。 Ο 〇 201101762 jn〇6iwi.doc/n 當第2個網路控制器22GJ接收到 查:職別碼與目前識別碼。由於第2個網路控:二= 的,識別碼為“〇’’ ’而目前識別碼已更新為第—目標識 別碼Ϊ ,因此第2個網路控制哭220 2人;&不任日 別碼與目標識別碼不相同。 〇—2冒檢查出設備識 碑‘Ί接著/ Λ2個網路控制器220—2會將操作指令的識別 220、二第八,ΐ呆作指令透過第2個網路控制器 介面弟二;#送到第3個網路控制器220」的第一 當第3個網路控制器22〇」接收到操作指令時,合檢 查設備識別碼與目前識別碼。由於第3個網路控制哭3 的7=1為“〇,,’而操作指令的識別碼已麟為 应目乂二民3 制11 220-3會檢查出設備識別碼 ”目碼相同,並且執行操作指令來進行相關操作。 “咨财士貫施例中’操作指令包括“資料寫入操作,,或 取操作:。“於是,當第3個網路控制器220_3接 器咖^指令為“資料寫入操作,,時’第3個網路控制 二—θ將包括在操作指令中的資料寫入到第3個網路 :β 220」的暫存器或記憶體中,以進行後續的相關操 另> 方面’當第3個網路控制器接收到的操作指令為 貧;^取操作時’第3烟路控㈣22Q—3會從第3 口、’再路控制盗220一3的暫存器或記憶體中讀取資料而產生 201101762 3n^«twraoc/n 5貝取5孔息,並且將§買取§fl息透過第3個網路控制界220 3 的第一介面傳送,其中讀取訊息包括一讀取訊息識別碼二 在本實施例中,假設讀取訊息識別碼設定為“〇”,但不限 制其範圍,亦即使用者可視需求自行更換設定。 接著’‘弟2個網路控制器22〇_2的第二介面接收到 上述讀取訊息時,第2個網路控制器220一2會將讀取訊息 識別碼“0” (此時讀取訊息識別碼為“〇”)加上第二預 設值“Γ (亦即0+1=1),並將讀取訊息透過第2個網路 控制盗220—2的第一介面傳送。 、=後,當第1個網路控制器220J的第二介面接收到 上述讀取訊息時,第1個網路控制器220—丨會將 識別碼“1”(此時讀取訊息識別碼已更新為“r )加上 第二預設值“Γ (亦即1+1喝,並將讀取訊息透過第ι 個網路控制器22CU的第一介面傳送到處理器21〇,使得 處理器21„資料是從第3個網路控制器220—3所讀取 的’以進彳亍後績的相關操作。 如此一來,本實施例之網路控制H 220HN不需 特置識別碼’而是藉由用遞減操作指令的識別 =方式祕作指令,或是遞增讀取减識別碼的方 垃將可以減少設計的複雜度。另外,在 220 Γ^Ο 立二 —' P席電路板的接地面不會被切割成多個 部分,因f有效地避免電磁干擾的問I成夕们 在本η%例中,第—介 10 x.doc/n 201101762 interface),而第二介面為電子可抹除可規劃唯讀記憶體 (Electrically Erasable Programmable Read Only Memory, EEPROM)介面。 值得一提的是’上述網路控制器22〇—的設備 ^碼都蚊為“0”,第-舰值與第^倾值分別設定 為1,而讀取訊息識別碼設定為“〇”,為僅為本發明 Ο Ο Ϊ了’但本發明不限於此。另外,操作指令的識別 變=理益210要控制哪一個網路控制器的操作而改 有通常知識者’可視需求自行更換上述 S3 _施_說明’推得其他實施例的 麵作方式’故在此不再贅述。 法,例’可歸納—種網路裂I 2_操作方 〃木作方法說明如下。圖场 網路裝置的操財妓_ J a施例之 個網路控制㈣處㈣=本^例_路裝置具有多 與第二介而網路控制器各自具有第-介面 ^接兮严理哭°又裳::別碼’ * 1個網路控制器的第-介面 耦接該處理态,第Hg]網路 尔 w 個網路控制器的第—介;°面輕接第(i+1) 第-介面為管理介面::第數。在本實施例中, 讀記憶體介®。 —φ錢子可絲可規劃唯 請參照圖3 ’首先,在步驟S3 其中此操作指令具有識^ ^供㈣和令’ 由處理器所提供。接著 2:知例中’操作指令是 指令,並檢查第i個纟 中,依序接收操作 才工制的s又備識別碼與操作指令 11 201101762 31158twf.doc/n 的識別碼,而決定疋否執行操作指令來進行相關操作。 為了更清楚地描述上述操作方法的各步驟,以下再舉 一實施例來說明本發明之操作方法的詳細流程。圖4繪二 為本發明另一實施例之網路裴置的操作方法流程圖。 照圖4,在步驟S410中,提供操作指令,此操作指令 識別碼。在此實施例中’操作指令是由處理器所提供。接 著,在步驟S420中,第i個網路控制器接收操作指令,i 為正整數。之後’在步驟S430中,檢查第i個網路控^器1 的設備識別碼與操作指令的識別碼是否相同。 當檢查出第1個網路控制器的設備識別碼與操作护人 的識別碼不相同時’進行步驟S440,將操作指^的識另^ 減去第一預設值,並將操作指令透過第丨個網路控制器的 第二介面傳送到第(i+1)個網路控制器的第—介面。之 回到步驟S430與步驟S440,以進行後續操作。 ’ 另一方面 田似旦禾1调網路控制器的設備識別碼 操作指令的識別碼相同時,進行步驟S45〇 ’執行 來進行相關操#。在本實施例中,操作指令可以為^ 入操作或資料讀轉作。因此,當操作指令為資料寫入 2,進行步驟S451 ’將資料寫入第“固網路控制器的 子器或記憶體中,其中上述:#料包括在操作指令中。4 另-方面,當操作指令為資料讀取操作時, 二從第:網路控制器的暫存器或記憶體中讀取, 、、,生項取:’亚透過第i個網路控制器的第—介3 社述讀取訊息,其巾上述_取訊息包括—讀取= 12O 201101762 i o〇iwi.d〇c/n Force the first preset value and transmit the first interface of the read message. The younger brother (Bu 1) network control, in the embodiment of the present invention, the network controller of the above-mentioned first-period is connected by a series controller, and the domain material is connected with money; a part, and the grounding controller of the door causing electromagnetic interference transmits the own identification code and the network (4) sequentially by transmitting the network operation command in the operation command to each network controller. At present, the mother is identified, and the relevant operation is performed by checking the order of 4:=, and then the current=execution operation finger is sequentially passed through each network to determine whether it is from the specified network_ Network controllers do not need to be given special sections. So - reduce the complexity of the design. The job code will be able to make the above characteristics and advantages of the thorns more touching. (4) Only the example is given. The sub-combination with the drawings is described in detail below. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention is a spear of a network device of the present invention. Referring to FIG. 2, the network device includes a processor 21A and a network 220J 220 220_N, where N is a positive integer. The controller processor 210 is configured to provide an operation command to identify the stone horse so as to control the network controller 22 to operate. The network control states 220-1 to 220-N each have a first interface and a second interface and a device identifier, and the first interface of the i-th network controller 220" is coupled to the processor 210. The second interface of the first network controller 22〇j is coupled to the first interface of the peripheral control state 220-2, and the second interface of the second network controller 220-2 is coupled to the third network. The first interface of the third network controller 220-3 is coupled to the first interface of the fourth network controller 220-4, ..., the N-1th network The second interface of the path controller 220-N-1 is coupled to the first interface of the Nth network controller 22〇_N. The network controllers 220J~22〇_N will sequentially receive the above operation instructions: and determine whether to execute the operation instructions to perform related operations according to the check device identification code and the current identification code. For example, it is assumed that the device identification codes of the network controller 22〇1~220-N are all set to, and the first preset value and the second preset value are respectively set to 1. In addition, the identification code in the operation command is assumed to be "2" to transmit the operation instruction to the corresponding network controller for subsequent operations. First, when the network controller 220-1 receives the operation command provided by the processor 210, it checks the device identification code and the current identification code. Since the device identification code of the i-th road controller 220_1 is "〇" and the current identification code is "2", the 网路th network controller 22〇 checks that the device identification code is different from the current identification code. . "At this time, the first network controller 220J will subtract the first preset value "丨" (that is, 2_1=1) from the identification code '2'' of the operation command, and the operation will be deducted by the brother 1 The second interface of the network controller 220-1 is transmitted to the first interface of the second network controller 220_2. Ο 〇201101762 jn〇6iwi.doc/n When the second network controller 22GJ receives the check: The code and the current identification code. Because the second network control: two =, the identification code is "〇" ' and the current identification code has been updated to the first - target identification code Ϊ, so the second network control cry 220 2 people; & no-day code is not the same as the target ID. 〇—2 Detecting the device to know the monument' Ί Then / Λ 2 network controllers 220-2 will recognize the operation command 220, the second and eighth, ΐ 作 指令 command through the second network controller interface 2; The first when the third network controller 220 is sent to the third network controller 220, when the operation command is received, the device identification code and the current identification code are checked. Because the third network controls the 7=1 of the crying 3 is “〇,,” and the identification code of the operation command has been the same as the target number of the two people, the system ID is the same. And execute operation instructions to perform related operations. The “Operational Code” operation instruction includes “data write operation, or take operation:”. "So, when the third network controller 220_3 connector is called "data write operation," the third network control two - θ will write the data included in the operation command to the third Network: β 220" in the scratchpad or memory for subsequent related operations> Aspect 'When the third network controller receives the operation command is poor; ^ when the operation is 'the third cigarette The road control (4) 22Q-3 will read the data from the third port, the 're-channel control thief 220-3 register or memory, and generate 201101762 3n^«twraoc/n 5 to take 5 holes, and will buy § The information is transmitted through the first interface of the third network control community 220 3 , wherein the read message includes a read message identifier 2. In this embodiment, the read message identifier is set to “〇”, but not Limit the scope, that is, the user can change the settings by themselves. Then, when the second interface of the two network controllers 22〇_2 receives the read message, the second network controller 220-2 will read the message identifier “0” (read at this time) The message identifier is “〇”) plus the second preset value “Γ (ie, 0+1=1), and the read message is transmitted through the first interface of the second network control pirate 220-2. After the second interface of the first network controller 220J receives the read message, the first network controller 220 detects the code "1" (the message identifier is read at this time). Updated to "r" plus the second preset value "Γ (that is, 1+1 drink, and the read message is transmitted to the processor 21 through the first interface of the ι network controller 22CU, so that the processing is performed The data of the device 21 is read from the third network controller 220-3. The network control H 220HN of the embodiment does not need the special identification code. 'Rather, by using the identification of the decrementing operation command = secret command, or incrementally reading the subtraction code, the design complexity can be reduced. In addition, at 220 Γ ^ Ο立二—'The ground plane of the P-seat board will not be cut into multiple parts, because the effective avoidance of electromagnetic interference is caused by the fact that in the present η% example, the first 10 x.doc/n 201101762 interface), and the second interface is an Electronically Erasable Programmable Read Only Memory (EEPROM) interface. It is worth mentioning that the device code of the above network controller 22 is "0", the first ship value and the first tilt value are set to 1, and the read message identification code is set to "〇". For the sole purpose of the present invention, the invention is not limited thereto. In addition, the recognition of the operation command = the benefit of the network controller to control which network controller is to be changed, and the general knowledge person 'replaces the above S3 _ _ _ description 'to push the other way of doing the embodiment' I will not repeat them here. The law, the example ' can be summarized - the type of network crack I 2_ operator The method of the elm is described below. The operation of the network device of the field network _ J a instance of the network control (four) at (four) = this ^ example _ road device has more than the second and the network controller has the first interface - interface Cry ° and dress:: Do not code ' * 1 network controller's interface - coupled to the processing state, the first Hg] network w network controller's first -; +1) The first interface is the management interface:: the first number. In this embodiment, the memory is read. - φ money can be planned only by referring to Fig. 3' First, in step S3, the operation instruction has the knowledge (4) and the order 'provided by the processor. Then 2: In the example, the 'operation instruction is the instruction, and check the i-th ,, the s-received operation code and the identification code of the operation instruction 11 201101762 31158twf.doc/n are determined. Do not execute the operation instructions to perform related operations. In order to more clearly describe the steps of the above-described operation method, an embodiment will be further described below to explain the detailed flow of the operation method of the present invention. FIG. 4 is a flow chart of a method for operating a network device according to another embodiment of the present invention. Referring to Fig. 4, in step S410, an operation command is provided, which instructs the identification code. In this embodiment the 'operational instructions' are provided by the processor. Next, in step S420, the i th network controller receives the operation command, and i is a positive integer. Thereafter, in step S430, it is checked whether the device identification code of the i-th network controller 1 is identical to the identification code of the operation command. When it is checked that the device identifier of the first network controller is different from the identifier of the operation protector, proceeding to step S440, the identification of the operation finger is subtracted from the first preset value, and the operation command is transmitted through The second interface of the third network controller is transmitted to the first interface of the (i+1)th network controller. Returning to step S430 and step S440, a subsequent operation is performed. On the other hand, when the device identification code of the network controller is the same, the step S45〇' is executed to perform the related operation #. In this embodiment, the operation instruction may be an operation or a data read conversion. Therefore, when the operation instruction is the data write 2, the process proceeds to step S451 to write the data into the sub-mechanism or the memory of the "fixed network controller", wherein the above: # material is included in the operation instruction. When the operation instruction is a data reading operation, the second is read from the register or the memory of the network controller, and the raw item is taken: 'the first through the i-th network controller. 3 The society reads the message, and the above _ take message includes - read = 12
O o 201101762 ~ --»· w»..doo/jj 別碼。 接著,在步驟S453中,各 面接收讀取訊息時,則;=的 預坟值’亚將讀取訊息透 ^識別瑪加上弟- 介面傳送。 k第(1-1)個網路控制器的第一 器與======術式連接處理 網路控制器成電磁干擾的問題。另外, 送操作指“各網以遞撕 其本身的設備識別石馬網路器再藉由檢查 指令來進行相 〜引識别馬,以決定是否執行操作 增方式依序透識別碼以遞 便讓處if哭/ 控制W傳送頊取訊息到處理器,以 卜决心疋否從指定的網路控制器中讀取資料。如 m |稱㈣胃不^各別給予特定的設備朗碼,將 可以減少輯❸度。 肝 士恭Γ然本發明已以實施例揭露如上,然其並非用以限定 太ΐ明i Ϊ何所屬技術領域中具有通常知識者,在不脫離 X之精神和範_,#可作些許之更動與潤飾,故本 受之保5蒦範圍當視後附之申請專利範圍所界定者為準。 【圖式簡單說明】 圖1為習知網路裝置的示意圖。 圖2緣示為本發明—實施例之網路裝置的示意圖。 13 201101762 3113i$twt.aoc/n 圖3繪示為本發明一實施例之網路裝置的操作方法流 程圖。 圖4繪示為本發明另一實施例之網路裝置的操作方法 流程圖。 【主要元件符號說明】 100、200 :網路裝置 110、210 :處理器 120 1〜120 Μ、220 1〜220 N :網路控制器 — —— — S310〜S320 :本發明一實施例之網路裝置的操作方法 各步驟 S410〜S453 :本發明另一實施例之網路裝置的操作方 法各步驟 14O o 201101762 ~ --»· w»..doo/jj Do not code. Next, in step S453, when each side receives the read message, the pre-grain value of the == will read the message and the message will be transmitted. k The first (1-1) network controller's first device and the ====== surgical connection handle the network controller into electromagnetic interference. In addition, the sending operation means that each network recognizes the stone horse network device by tearing its own device and then uses the check command to perform the phase identification to determine whether to perform the operation increasing mode to sequentially transmit the identification code to facilitate the delivery. If you cry / control W to transfer the message to the processor, to determine whether to read data from the specified network controller. If m | said (four) stomach does not give a specific device code, will be The invention has been disclosed above by way of example, but it is not intended to limit the general knowledge of the technical field of the present, without departing from the spirit and scope of X, # A few changes and refinements can be made, so the scope of the warranty is subject to the definition of the patent application scope. [Simplified Schematic] Figure 1 is a schematic diagram of a conventional network device. FIG. 3 is a flow chart showing an operation method of a network device according to an embodiment of the present invention. FIG. 4 is a schematic diagram of the network device according to an embodiment of the present invention. Method for operating a network device of another embodiment [Main component symbol description] 100, 200: network device 110, 210: processor 120 1 to 120 Μ, 220 1 to 220 N: network controller - _ - S310 to S320: an embodiment of the present invention Steps S410 to S453 of the operation method of the network device: Step 14 of the operation method of the network device according to another embodiment of the present invention