BS EN 62541-6:2011:2012 Edition
$215.11
OPC unified architecture – Mappings
Published By | Publication Date | Number of Pages |
BSI | 2012 | 74 |
This part of IEC 62541 specifies the OPC Unified Architecture (OPC UA) mapping between the security model described in IEC 62541-2, the abstract service definitions, described in IEC 62541-4, the data structures defined in IEC 62541-5 and the physical network protocols that can be used to implement the OPC UA specification.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | English CONTENTS |
11 | FOREWORD |
13 | INTRODUCTION |
14 | 1 Scope 2 Normative references |
16 | 3 Terms, definitions and abbreviations 3.1 Terms and definitions |
17 | 3.2 Abbreviations 4 Overview |
18 | 5 Data Encoding 5.1 General Figures Figure 1 – The OPC UA Stack Overview |
19 | Tables Table 1 – Built-in data types Table 2 – Guid Structure |
20 | 5.2 OPC UA Binary |
21 | Figure 2 – Encoding Integers in a Binary Stream Table 3 – Supported Floating Point Types |
22 | Figure 3 – Encoding Floating Points in a Binary Stream Figure 4 – Encoding Strings in a Binary Stream |
23 | Figure 5 – Encoding Guids in a Binary Stream Figure 6 – Encoding XmlElements in a Binary Stream |
24 | Figure 7 – A String NodeId Table 4 – NodeId Components Table 5 – NodeId Encoding Values Table 6 – Standard NodeId Binary Encoding |
25 | Figure 8 – A Two Byte NodeId Figure 9 – A Four Byte NodeId Table 7 – Two Byte NodeId Binary Encoding Table 8 – Four Byte NodeId Binary Encoding |
26 | Table 9 – ExpandedNodeId Binary Encoding Table 10 – DiagnosticInfo Binary Encoding |
27 | Table 11 – QualifiedName Binary Encoding Table 12 – LocalizedText Binary Encoding |
28 | Table 13 – Extension Object Binary Encoding Table 14 – Variant Binary Encoding |
29 | Table 15 – Data Value Binary Encoding |
30 | Table 16 – Sample OPC UA Binary Encoded Structure |
31 | 5.3 XML Table 17 – XML Data Type Mappings for Integers Table 18 – XML Data Type Mappings for Floating Points |
33 | Table 19 – Components of NodeId Table 20 – Components of ExpandedNodeId |
36 | Table 21 – Components of Enumeration |
38 | 6 Security Protocols 6.1 Security Handshake Figure 10 – Security Handshake |
39 | 6.2 Certificates Table 22 – SecurityPolicy |
40 | Table 23 – ApplicationInstanceCertificate |
41 | 6.3 WS Secure Conversation Table 24 – SignedSoftwareCertificate |
42 | Figure 11 – Relevant XML Web Services Specifications Figure 12 – The WS Secure Conversation Handshake |
43 | Table 25 – WS-* Namespace Prefixes |
44 | Table 26 – RST/SCT Mapping to an OpenSecureChannel Request |
45 | Table 27 – RSTR/SCT Mapping to an OpenSecureChannel Response |
46 | 6.4 OPC UA Secure Conversation Figure 13 – OPC UA Secure Conversation MessageChunk |
47 | Table 28 – OPC UA Secure Conversation Message Header Table 29 – Asymmetric Algorithm Security Header |
48 | Table 30 – Symmetric Algorithm Security Header Table 31 – Sequence Header |
49 | Table 32 – OPC UA Secure Conversation Message Footer |
50 | Table 33 – OPC UA Secure Conversation Message Abort Body Table 34 – OPC UA Secure Conversation OpenSecureChannel Service |
51 | Table 35 – Cryptography Key Generation Parameters |
53 | 7 Transport Protocols 7.1 OPC UA TCP Table 36 – OPC UA TCP Message Header |
54 | Table 37 – OPC UA TCP Hello Message Table 38 – OPC UA TCP Acknowledge Message |
55 | Figure 14 – OPC UA TCP Message Structure Table 39 – OPC UA TCP Error Message |
56 | Figure 15 – Establishing a OPC UA TCP Connection Figure 16 – Closing a OPC UA TCP Connection |
57 | Table 40 – OPC UA TCP Error Codes |
58 | Figure 17 – Recovering an OPC UA TCP Connection |
59 | 7.2 SOAP/HTTP Table 41 – WS-Addressing Headers |
61 | 7.3 Well Known Addresses 8 Normative Contracts 8.1 OPC Binary Schema 8.2 XML Schema and WSDL Table 42 – Well Known Addresses for Local Discovery Servers |
62 | Annex A (normative) Constants Table A.1 – Identifiers Assigned to Attributes |
64 | Annex B (normative) Type Declarations for the OPC UA Native Mapping |
65 | Annex C (normative) WSDL for the XML Mapping |
66 | Annex D (normative) Security Settings Management |
67 | Table D.1 – SecuredApplication |
69 | Table D.2 – CertificateIdentfier |
70 | Table D.3 – CertificateStoreIdentfier |
71 | Table D.4 – CertificateTrustList Table D.5 – CertificateValidationOptions |
72 | Table D.6 – ApplicationAccessRule Table D.7 – ApplicationSecurityPolicy |