Shopping Cart

No products in the cart.

BS EN IEC 62325-503:2018

$215.11

Framework for energy market communications – Market data exchanges guidelines for the IEC 62325-351 profile

Published By Publication Date Number of Pages
BSI 2018 94
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

IEC 62325-503:2018 specifies a standard for a communication platform which every Transmission System Operator (TSO) in Europe can use to exchange reliably and securely documents for the energy market. Consequently a European market participant (TSO, regional supervision centre, distribution utility, power exchange, etc.) could benefit from a single, common, harmonised and secure platform for message exchange with other participants; thus, reducing the cost of building different information technology (IT) platforms to interface with all the parties involved. This edition cancels and replaces IEC TS 62325-503 published in 2014. This edition includes the following significant technical changes with respect to the previous edition: a) Use of ISO/IEC 19464:2014, Advanced Message Queuing Protocol (AMQP) v1.0 specification; b) Splitting of the node described in the IEC TS 62325-503:2014 into a broker that implements the messaging function and a directory; c) Increase of operability and resilience of the communication system with the ability for an endpoint to send and receive messages through several brokers; d) Benefits of standardisation, performance and scalability of the AMQP protocol for transferring messages.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 English
CONTENTS
12 FOREWORD
14 INTRODUCTION
15 1 Scope
2 Normative references
16 3 Terms and definitions
17 4 High level concepts
4.1 What is the purpose of MADES?
Figures
Figure 1 โ€“ MADES overall view
18 4.2 Overview
Figure 2 โ€“ MADES scope in a layered architecture
19 4.3 Transparent and reliable message delivery
Figure 3 โ€“ MADES message delivery
20 4.4 Components of a MADES system
4.4.1 Endpoint, broker and component-directory
Figure 4 โ€“ MADES components, interactions and protocols
21 4.4.2 Delivery routes and acknowledgements
Figure 5 โ€“ Possible routes for delivering a message
22 4.4.3 Sharing configuration data of the system
Figure 6 โ€“ Communication protocols for delivering a message
23 Figure 7 โ€“ Data flows between a component-directory and its registered components
24 4.4.4 Interfaces exposed by the components
Figure 8 โ€“ Data flows with several component-directories
Figure 9 โ€“ Component-directory services and protocols
25 Figure 10 โ€“ MADES Interfaces, services and protocols
26 4.4.5 Architecture examples of MADES systems
Figure 11 โ€“ Minimal MADES system (without broker)
Figure 12 โ€“ Minimal MADES system (with broker)
27 Figure 13 โ€“ MADES system with a party in a central role
28 Figure 14 โ€“ MADES system with several brokers
29 4.5 Security and message integrity
4.5.1 Security goals and security solution
Figure 15 โ€“ Using a single endpoint for several business processes
30 4.5.2 Transport-layer security
Figure 16 โ€“ MADES transport security
Figure 17 โ€“ Security: protected endpoint
31 4.5.3 Message-level security: signing and encryption
Figure 18 โ€“ Security: exposed endpoint
Figure 19 โ€“ Message signing and signature verification
32 4.5.4 Non-repudiation
Figure 20 โ€“ Message encryption and decryption
33 Figure 21 โ€“ Non-repudiation
34 5 Delivering the messages
5.1 Unique identification of components and messages
5.2 Message-type of a message
5.3 Message route towards a recipient endpoint: message-paths
36 5.4 Restriction on the routes by a broker
5.5 Message acceptance by a sender endpoint
5.6 Tracking the delivery of a message
5.6.1 Message-status of a message
37 5.6.2 Delivery events and acknowledgements
Figure 22 โ€“ Message-status along the delivery
38 Figure 23 โ€“ Tracking events while delivering a message
39 5.7 Message expiration
Tables
Table 1 โ€“ Characteristics of the tracking events
40 5.8 Reliable transfer of a message
5.8.1 Rationale
41 5.8.2 Transfer between sender application and sender endpoint
Figure 24 โ€“ Reliable transfer
Figure 25 โ€“Transfer between sender application and sender endpoint
42 5.8.3 Transfer between components using the AMQP protocol
5.8.4 Transfer between recipient endpoint and recipient application
Figure 26 โ€“ Transfer between recipient endpoint and recipient application
43 5.9 Storing internal messages in components
5.10 Message priority
5.11 Message delivery order
5.12 Testing a route between two endpoints: tracing-messages
Table 2 โ€“ Final state of a message in an endpoint
44 6 Transferring messages using the AMQP protocol
6.1 Main principles of the AMQP specification
6.1.1 Introduction
45 6.1.2 Connection Open
6.1.3 Session begin
Figure 27 โ€“ The nine AMQP frames
46 6.1.4 Link attachment
6.1.5 Message transfer
6.1.6 Link recovery and resends
6.1.7 Error management
6.1.8 Message structure
47 6.2 AMQP high-level implementation: the client/broker model
Figure 28 โ€“ Structure of an AMQP message
48 6.3 AMQP implementation in MADES components
Table 3 โ€“ Services of the client / broker model
49 Figure 29 โ€“ AMQP in MADES components
50 6.4 Management of AMQP connections and attachments by an endpoint
Table 4 โ€“ Rules for setting up connection/attachment and for message transfer
51 6.5 Internal message format
6.5.1 Definitions, design and security checks
6.5.2 AMQP format for transferring internal messages
Table 5 โ€“ Internal message โ€“ AMQP format: header section
Table 6 โ€“ Internal message โ€“ AMQP format: properties section
52 6.5.3 Encryption
Table 7 โ€“ Internal message โ€“ AMQP format: application-properties section
Table 8 โ€“ Internal message โ€“ AMQP format: application-data section
53 6.5.4 Signing
Table 9 โ€“ Encryption โ€“ Processing metadata attributes for the “AES-256” cipher
54 6.5.5 Internal message metadata
Table 10 โ€“ Signing โ€“ Processing metadata attributes for the “SHA-512” Algorithm
55 Table 11 โ€“ MessageMetadata (type)
56 Table 12 โ€“ InternalMessageType (type: string enumeration)
Table 13 โ€“ ProcessingMetadata (type)
Table 14 โ€“ MessageProcessor (type)
Table 15 โ€“ Map (type)
Table 16 โ€“ MapEntry (type)
57 Table 17 โ€“ ValueType (type: string enumeration)
58 6.5.6 XML signature example
59 7 Managing configuration data of the system
7.1 Rationale
7.2 Directory content and information ownership
60 Table 18 โ€“ Component-directory โ€“ content of an entry
Table 19 โ€“ Certificate (type)
61 7.3 On the consistency of configuration data
7.3.1 Component consistency
Table 20 โ€“ MadesImplementation (type)
Table 21 โ€“ MessagePath (type)
Table 22 โ€“ BrokerRestriction (type)
62 7.3.2 System consistency
7.3.3 Distributed update implementation
7.3.4 Eventual consistency
7.4 Connection to a component-directory
63 7.5 REST API implementation and available resources
Table 23 โ€“ HTTP operations
Table 24 โ€“ HTTP return codes
64 7.6 Registration process
Table 25 โ€“ Component-directory API
65 7.7 Synchronisation process
7.7.1 Validity period of replicated data: time-to-live
7.7.2 Limitation of the synchronisation flow
66 7.7.3 Configuration of the synchronisation process
7.8 XML schemas of the APIs requests and responses
7.8.1 Shared types
68 7.8.2 registrations resource
70 7.8.3 endpoints, brokers and components resources
71 8 Managing the certificates
8.1 Definitions and principles
72 8.2 Certificates: format and unique ID
8.3 Used certificates and issuers certificates authorities
8.3.1 Overview
8.3.2 Transport-layer security (authorise data exchanges)
Figure 30 โ€“ Certificates and certification authorities (CAs) of a MADES system
73 8.3.3 Message-level security (protect message confidentiality and authenticate message issuer)
8.4 Trusting the certificates of others components
8.4.1 Authentication
8.4.2 Signing and encryption
8.5 Renewing the (nearly) expired certificates
74 8.6 Revoking a component
9 Managing the version of the MADES specification
9.1 MADES version of this document
9.2 Issue, version meaning, upgrading recommendations
75 9.3 Changing the signature or the encryption algorithms
10 Administrating and operating the components
76 11 Interfaces for the applications
11.1 Endpoint webservice interface for applications
11.1.1 Overview
77 11.1.2 SendMessage service
Table 26 โ€“ Endpoint interface โ€“ Generic error
Table 27 โ€“ Endpoint interface โ€“ Value for errorCode
Table 28 โ€“ SendMessage โ€“ Request elements
78 11.1.3 ReceiveMessage service
Table 29 โ€“ SentMessage (type)
Table 30 โ€“ SendMessage โ€“ Response elements
Table 31 โ€“ SendMessage โ€“ Additional error elements
79 Table 32 โ€“ ReceiveMessage โ€“ Request elements
Table 33 โ€“ ReceiveMessage โ€“ Response elements
Table 34 โ€“ ReceivedMessage (type)
Table 35 โ€“ ReceiveMessage โ€“ Additional error elements
80 11.1.4 ConfirmReceiveMessage service
11.1.5 CheckMessageStatus service
Table 36 โ€“ ConfirmReceiveMessage โ€“ Request elements
Table 37 โ€“ ConfirmReceiveMessage โ€“ Response elements
Table 38 โ€“ ConfirmReceiveMessage โ€“ Additional error elements
Table 39 โ€“ CheckMessageStatus โ€“ Request elements
81 Table 40 โ€“ CheckMessageStatus โ€“ Response elements
Table 41 โ€“ MessageStatus (type)
Table 42 โ€“ MessageTraceItem (type)
Table 43 โ€“ MessageState or MessageTraceState (Type: string enumeration)
82 11.1.6 ConnectivityTest service
11.1.7 WSDL for the endpoint webservice interface
Table 44 โ€“ CheckMessageStatus โ€“ Additional error elements
Table 45 โ€“ ConnectivityTest โ€“ Request elements
Table 46 โ€“ ConnectivityTest โ€“ Response elements
Table 47 โ€“ ConnectivityTest โ€“ Additional error elements
83 Figure 31 โ€“ WSDL 1.1 definitions
89 11.2 File System Shared Folders (FSSF)
11.2.1 Overview
11.2.2 Folders and file naming convention
90 Table 48 โ€“ FSSF โ€“ Folders and filename format
Table 49 โ€“ FSSF โ€“ Tokens used to generate the filenames
91 11.2.3 Concurrent access to files
11.2.4 Configuring FSSF
92 Bibliography
BS EN IEC 62325-503:2018
$215.11