201 x 88 (millimeters, width x depth) 254-319 x 135 x 183-239 (millimeters, width x depth x height)
Description:
The four-bar mechanism is the quintessential example of what Reuleaux called a kinematic chain. In this planar mechanism, four links are constrained by four cylindrical joints. When one link is fixed or grounded, the motion of a second link determines the motion of the third and fourth links. Compare the motion of different inversions of this linkage in the movies C01, C01a and C01b, and notice how the motion has changed. This inversion is called "crank-crank". For mathematical description of the motion of these inversions see tutorial "Mathematics of four bar linkages". The 220 models in Cornell University’s Reuleaux Collection were built in the late 19th century to demonstrate the elements of machine motion, as theorized by the German engineer Franz Reuleaux. The University acquired the models in 1882 for use in teaching and research. The Reuleaux models are classified according to the alphanumeric schema employed in the catalog of the manufacturer, Gustav Voigt. The letter in a model's ID (e.g., B14 or S35) refers to a class of mechanism; the number is a specific instance of the class. This classification scheme is a simplified version of the taxonomy of machine elements elaborated in Reuleaux's work.
This item is protected by copyright, and the copyright holder is Cornell University. It is licensed for reuse under a Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). The item was created as part of the Kinematic Models for Digital Design Library (KMODDL) by Kent Loeffler, Kathryn Gelsone, and Susan Peck between 2002-2006 from materials held by the Sibley School of Mechanical and Aerospace Engineering, Cornell University. Permission is required for any use that extends beyond what is authorized by the license, fair use, and/or other statutory exemptions. Responsibility for making an independent legal assessment of an item and securing any necessary permissions ultimately rests with persons desiring to use the item.