Shopping Cart

No products in the cart.

BSI PD CLC/TS 50568-8:2015

$215.11

Electricity metering data exchange. The DLMS/COSEM suite – SMITP B-PSK PLC communication profile for neighbourhood networks. Including: The Original-SMITP PLC BPSK communication profile, The Original-SMITP Local data exchange profile and The Original-SMITP IP communication profile

Published By Publication Date Number of Pages
BSI 2015 294
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This Technical Specification contains 4 profile specifications

  1. the DLMS/COSEM SMITP B-PSK PLC Profile (clause 4)

  2. the Original-SMITP B-PSK PLC Profile (clause 5)

  3. the Original-SMITP IP Profile (clause 6)

  4. the Original-SMITP Local data exchange profile (clause 7)

The DLMS/COSEM SMITP B-PSK profile (see Clause 4) defines the use of the CLC/TS 50568-4 communication protocol and methods to access and exchange data modelled by the COSEM objects of EN 62056-6-2 via the EN 62056-5-3 application layer. This clause is in line with the DLMS/COSEM suite as described in EN 62056-1-0.

The Original-SMITP Profiles (Clauses 5, 6 and 7) define the use of the CLC/TS 50568-4 communication protocol and methods to access and exchange data modelled by the Original-SMITP Data Model (clause 10) via the Original-SMITP Application Layer (Clause 9). These clauses are not part of the DLMS/COSEM suite as described EN 62056-1-0.

NOTE The expression Original-SMITP refers to the open Smart Metering Information and Telecommunication Protocol originally developed and maintained by the Meters and More Association (see Foreword). The Original SMITP specifications were developed prior to the availability of the DLMS/COSEM SMITP B-PSK profile.

PDF Catalog

PDF Pages PDF Title
11 Foreword
12 Introduction
13 1 Scope
14 2 Normative references
15 3 Acronyms and abbreviations, terms, definitions and notations
3.1 Acronyms and abbreviations
16 3.2 Terms and definitions
17 3.3 Notations
18 4 The DLMS/COSEM SMITP B-PSK PLC profile
4.1 Structure of the profile
4.2 Physical layer
19 4.3 Data link layer
4.3.1 General
4.3.2 The MAC sub layer
4.3.3 The LLC sub layer
4.4 Application to data link convergence layer
4.4.1 General
4.4.2 Service specification for the DLMS/COSEM SMITP B-PSK-based convergence layer
4.4.2.1 General
20 4.4.2.2 CL-DATA.request
21 4.4.2.3 CL-DATA.confirm
22 4.4.2.4 CL-DATA.indication
4.4.3 Protocol specification for the DLMS/COSEM SMITP B-PSK-based transport layer
4.4.3.1 The convergence layer protocol data unit (CLPDU)
23 4.4.3.2 Maximum transfer unit size and segment size
24 4.4.3.3 Exchange of frames not requiring segmentation (confirmed service)
4.4.3.3.1 General
4.4.3.3.2 Client transmitting phase
4.4.3.3.3 Server transmitting phase
25 4.4.3.4 Exchange of frames requiring segmentation (unconfirmed service)
4.4.3.4.1 General
4.4.3.4.2 Client in transmitting phase
26 4.4.3.4.3 Server in transmitting phase
27 4.4.3.5 Exchange of frames requiring segmentation (unconfirmed service)
28 4.4.3.6 Management of errors in the procedure
4.5 Application layer
4.6 Application process
4.6.1 General
29 4.6.2 Establishing application association
4.6.3 Releasing application association
4.6.4 Service parameters of the COSEM-OPEN, -RELEASE and -ABORT services
4.6.5 Transporting messages
4.6.6 Transporting long messages
4.6.7 Broadcasting
4.7 PLC network management
4.7.1 Introduction
30 4.7.2 The Discover services
4.7.3 The Register service
4.7.4 The Deregister service
4.7.5 The DiscoverForward service
31 4.7.6 The DiscoverReport service
4.7.7 The DiscoverForwardReport service
4.7.8 The RegisterReport service
4.7.9 The TCTset service
4.7.10 The Status Service
4.7.11 The Ping service
4.7.12 Applying filtering criteria to Discovery procedure
32 4.7.13 Meter discovery procedure
4.7.13.1 General
4.7.13.2 Routing table updating
33 4.8 Addressing
4.9 System variables
34 5 The Original-SMITP B-PSK PLC profile
5.1 Overview
5.2 Structure of the profile
35 5.3 Physical layer
5.3.1 Introduction
5.3.2 Crosstalk management
36 5.3.3 Communication performance assessment and management
5.4 Data Link layer
5.5 Application layer
37 5.6 SMITP Data model
5.7 Application process
5.7.1 Meter discovery procedure
5.7.2 Routing table updating
38 5.7.3 Meter’s clock synchronization
39 5.7.4 Reading and writing operations
5.7.4.1 Primitives for SMITP data model
5.7.4.2 Reading operations
40 5.7.4.3 Writing operations
5.7.5 Download procedure
42 5.7.6 Display management
5.7.6.1 Introduction
43 5.7.6.2 Display mode management
45 6 The Original-SMITP IP profile
6.1 Overview
6.2 Structure of profile
46 6.3 Physical and data link layers
6.4 Transport and network layers
6.4.1 General
47 6.4.2 TCP Service Request Primitives
6.4.2.1 UNSPECIFIED-PASSIVE-OPEN.request
6.4.2.2 FULLY-SPECIFIED-PASSIVE-OPEN.request
6.4.2.3 ACTIVE-OPEN.request
6.4.2.4 ACTIVE-OPEN-WITH-DATA.request
6.4.2.5 SEND.request
6.4.2.6 ALLOCATE.request
6.4.2.7 CLOSE.request
6.4.2.8 ABORT.request
6.4.2.9 Status.request
48 6.4.3 TCP Service Response Primitives:
6.4.3.1 OPEN-ID.confirm
6.4.3.2 OPEN-FAILURE.confirm
6.4.3.3 OPEN-SUCCESS.confirm
6.4.3.4 DELIVER.indication
6.4.3.5 CLOSING.indication
6.4.3.6 TERMINATE.confirm
6.4.3.7 STATUS-RESPONSE.confirm
6.4.3.8 ERROR.indication
6.4.4 Example of primitives working
50 6.5 Application layer
6.6 SMITP Data model
51 7 Original-SMITP Local Optical interface profile
7.1 Overview
7.2 Physical layer
7.2.1 Physical Support
52 7.2.2 Character format
7.3 Data transmission protocol
7.3.1 Introduction
7.3.2 Prologue
7.3.3 Connection procedure
53 7.3.4 Prologue’s timers
7.4 Packet’s protocol format
7.4.1 Introduction
7.4.2 Packet’s format for the prologue
7.4.2.1 General
54 7.4.2.2 Request message
7.4.2.3 Identification message
55 7.4.2.4 Acknowledgement message
7.5 Data Link Layer
57 8 Discovery and registration services
8.1 DLMS/COSEM over B-PSK discovery and registration services
8.1.1 Primitives description
8.1.1.1 General
59 8.1.1.2 Discover.request (.indication)
60 8.1.1.3 DiscoverReport.response (.confirm)
62 8.1.1.4 TCTset.request (.indication)
8.1.1.5 DiscoverForward.request (.indication)
63 8.1.1.6 DiscoverForwardReport.response (.confirm)
65 8.1.1.7 Status.response (.confirm)
66 8.1.1.8 Register.request (.indication)
67 8.1.1.9 RegisterReport.response (.confirm)
68 8.1.1.10 Deregister.request (.indication)
69 8.1.1.11 Ping.request (.indication) and Ping response (.confirm)
70 8.2 Original-SMITP over B-PSK discovery and registration services
8.2.1 Introduction
8.2.2 Messages for LMON synchronization
8.2.2.1 Challenge Request
71 8.2.2.2 Challenge Response
8.2.3 Network management commands
8.2.3.1 Introduction
8.2.3.2 ACA Request
72 8.2.3.3 TCT Setting
73 8.2.3.4 Request of ACA Request
74 8.2.3.5 Response of ACA
8.2.3.6 Response of several ACA
75 8.2.3.7 ACK/NACK Response
77 9 The Original-SMITP AL Services
9.1 Application messages exchanged in distribution line networks
9.1.1 Management of reserved elements
9.1.2 Overview
78 9.1.3 Application messages protection
9.1.4 Data access rights
9.1.5 List of messages
80 9.1.6 SMITP primitives
9.1.6.1 Preliminary remarks
9.1.6.1.1 General
9.1.6.1.2 Access to SMITP data model
9.1.6.2 Parameters programming activity (distribution line network)
9.1.6.2.1 Introduction
9.1.6.2.2 Non authenticated single parameter programming
81 9.1.6.2.3 Authenticated single parameter programming
82 9.1.6.2.4 Non authenticated block programming
83 9.1.6.2.5 Authenticated block programming
84 9.1.6.2.6 Non authenticated Custom table set
85 9.1.6.2.7 Authenticated Custom table set
9.1.6.2.7.1 General
86 9.1.6.2.7.2 Example of setting a Custom table
87 9.1.6.2.8 Non authenticated default values reset
9.1.6.2.9 Authenticated default values reset
88 9.1.6.3 Data exchange activity
9.1.6.3.1 Introduction
9.1.6.3.2 Single parameter data exchange
9.1.6.3.2.1 Non authenticated Read Request
89 9.1.6.3.2.2 Non authenticated Read Response
9.1.6.3.3 Block data exchange
9.1.6.3.3.1 Non authenticated ReadTab Request (with selection)
90 9.1.6.3.3.2 Non authenticated ReadTab Response (with selection)
91 9.1.6.3.3.3 Non authenticated ReadTab Request (block read)
9.1.6.3.3.4 Non authenticated ReadTab Response (block read)
92 9.1.6.3.4 Non authenticated Custom table Get
9.1.6.3.4.1 General
9.1.6.3.4.2 Request
9.1.6.3.4.3 Non authenticated Response
93 9.1.6.3.5 Authenticated data exchange
9.1.6.3.5.1 General
9.1.6.3.5.2 Authenticated Read Request
94 9.1.6.3.5.3 Authenticated Read Response
9.1.6.3.5.4 Authenticated ReadTab Request (with selection)
95 9.1.6.3.5.5 Authenticated ReadTab Response (with selection)
96 9.1.6.3.5.6 Authenticated ReadTab Request (block read)
9.1.6.3.5.7 Authenticated ReadTab Response (block read)
97 9.1.6.3.5.8 Authenticated Custom table Get Request
98 9.1.6.3.5.9 Authenticated Custom table Get Response
9.1.6.4 Messages updating B-Node with A-Node data
9.1.6.4.1 Introduction
9.1.6.4.2 Request A-Node to transmit data to B-Node
100 9.1.6.4.3 Authenticated Request A-Node to transmit data to B-Node
101 9.1.6.4.4 Sending data from A-Node to B-Node
9.1.6.4.5 Authenticated Sending data from A-Node to B-Node
102 9.1.7 Network primitives
9.1.7.1 Software download messages
9.1.7.1.1 Introduction
9.1.7.1.2 Local programming
103 9.1.7.1.3 Broadcast programming
9.1.7.2 Special messages
9.1.7.2.1 Introduction
9.1.7.2.2 Sending a command to a node
104 9.1.7.2.3 Authenticated Sending a command to a node
105 9.1.7.3 Acknowledgements (distribution line networks)
9.1.7.3.1 Introduction
9.1.7.3.2 A-Node Ack
106 9.1.7.3.3 A-Node Nack
107 9.1.7.3.4 B-Node Ack
108 9.1.7.3.5 B-Node Nack
109 9.2 Application messages exchanged in telecommunication public networks
9.2.1 Object
110 9.2.2 Management of reserved elements
9.2.3 Terms
9.2.4 Messages general architecture
9.2.4.1 Introduction
9.2.4.2 Message Header
111 9.2.4.3 Message Data
112 9.2.4.4 Protocol translation
113 9.2.4.5 List of messages
114 9.2.4.6 TB messages flow diagrams
9.2.4.6.1 Introduction
9.2.4.6.2 “On-Line” transaction scenario
116 9.2.4.6.3 “Off-Line” transaction scenario
117 9.2.4.6.4 Transaction deleting
9.2.5 SMITP primitives
9.2.5.1 Parameters programming activity (telecommunication public networks)
9.2.5.1.1 Introduction
9.2.5.1.2 Single parameter programming
118 9.2.5.1.3 Meter clock synchronization
119 9.2.5.1.4 Block programming
120 9.2.5.1.5 Custom table set
121 9.2.5.1.6 Block Reset
122 9.2.5.1.7 Custom table get request
9.2.5.1.8 Table Get response
123 9.2.5.2 Data read activity
9.2.5.2.1 Introduction
9.2.5.2.2 Data read by Register ID
9.2.5.2.2.1 Read Request
124 9.2.5.2.2.2 Read Response
9.2.5.2.3 Block data exchange ID
9.2.5.2.3.1 ReadTab Request (with selection)
125 9.2.5.2.3.2 ReadTab Response (with selection)
126 9.2.5.2.3.3 ReadTab Request (block read)
9.2.5.2.3.4 ReadTab Response (block read)
127 9.2.6 Network primitives
9.2.6.1 Commands delivery
9.2.6.1.1 Introduction
9.2.6.1.2 Generic command
9.2.6.2 Transaction result reading
128 9.2.6.3 Transaction deleting
9.2.6.4 Software download
9.2.6.4.1 Introduction
129 9.2.6.4.2 TB Reprog
9.2.6.5 Acknowledgements (telecommunication public networks)
9.2.6.5.1 Introduction
9.2.6.5.2 AMM system TB Ack
130 9.2.6.5.3 TB Ack Req (request reception)
9.2.6.5.4 TB Ack Sts (transaction status)
9.2.6.5.5 AMM system TB Nack
131 9.2.6.5.6 TB Nack
132 9.2.6.5.7 TB Ack Sts (transaction status) Error Codes table
133 9.2.6.5.8 TB Nack Error Codes Table
9.3 Encryption, Authentication and Playback Attacks Protection
9.3.1 Application fields
9.3.2 Introduction
9.3.3 AES-ECB encryption
134 9.3.4 AES-CTR encryption
9.3.4.1 Introduction
9.3.4.2 Generation of encryption and authentication key “K”
9.3.5 AES-CMAC authentication
9.3.6 Last Message Order Number (LMON)
9.3.6.1 Introduction
9.3.6.2 Generation of random and unpredictable numbers N
135 9.3.6.3 Storage of the last valid received protected message
9.3.6.4 LMON Recovery
136 9.3.6.5 Use of LMON
138 9.4 Enconding examples
9.4.1 Introduction
9.4.2 Meter’s discovery procedure
142 9.4.3 Writing and reading examples
143 9.5 TCP/IP encapsulation example of SMITP TB Application layer message
9.5.1 Overview
9.5.2 AMM to Concentrator message
144 9.5.3 Concentrator to AMM message
146 10 The Original-SMITP Data model
10.1 Introduction
147 10.2 Internal parameters
10.2.1 Object
150 10.2.2 SW_READR working example
10.3 Total energies
151 10.4 Daily energies
152 10.5 Load profiles and setting parameters
10.5.1 Object
155 10.6 Communication address and keys of authentication
158 10.7 Meter identification information
159 10.8 Temporal information
10.8.1 Object
162 10.9 Billing period information
164 10.10 Software, Hardware and Security information
167 10.11 Supply contract information
10.11.1 Object
168 10.11.2 Supply contract information for contract #1
170 10.11.3 Supply contract information for contract #2
171 10.12 Weekly tariff information
10.12.1 Object
172 10.12.2 Weekly tariff information for contract #1
176 10.12.3 Weekly tariff information for contract #2
181 10.13 Annual tariff information
10.13.1 Object
10.13.2 Annual tariff information for contract #1
182 10.13.3 Annual tariff information for contract #2
183 10.14 Public holidays programming
184 10.15 Load modulation parameters
187 10.16 Voltage interruption information
193 10.17 Voltage variation information
199 10.18 Control information
202 10.19 Normal Status Word
10.19.1 Object
204 10.20 Extended Status Word
10.20.1 Object
206 10.21 Cut-off device control information
208 10.22 Display management
10.22.1 Object
210 10.22.2 Message displaying example
10.22.3 Special message example
10.23 Download parameters
10.23.1 Object
213 10.24 Measurand profiles and parameters
10.24.1 Object
217 10.25 Synchronized measurand registers
221 10.26 Event log management
223 10.27 Billing data information
239 10.28 Virtual billing data registers
248 10.29 Time stamp of maximum power demand
254 10.30 Measurand information
257 10.31 Reading mode management
258 10.32 Management of log’s events
10.32.1 List of events
263 Annex A (informative) Node discovery procedure example using the DLMS/COSEM SMITP B-PSK PLC profile
A.1 Node Discovery
A.1.1 Discover nodes directly accessible from the Concentrator
265 A.1.2 Enable L1 meters to discover nodes not directly accessible from the Concentrator
A.1.3 Gathering discovered nodes from L1 meters
267 A.1.4 Repeating the process with L1 meters until no new meters are discovered
270 A.2 Registration and routing management
272 Annex B (informative) Node discovery procedure example using the Original-SMITP over B-PSK PLC profile
B.1 Node Discovery
B.1.1 Discover nodes directly accessible from the Concentrator
274 B.1.2 Enable L1 meters to discover nodes not directly accessible from the Concentrator
B.1.3 Gathering discovered nodes from L1 meters
276 B.1.4 Repeating the process with L1 meters until no new meters are discovered
280 B.2 Registration and routing management
282 Annex C (informative) SMITP specific definitions
C.1 Management of reserved elements
C.2 ECTL structure
283 Annex D (normative) MIB and COSEM Set-up class interface
D.1 General
The MIB elements used in the original-SMITP profile are described in Clause 10.
D.2 Types definition
D.3 SMITP configuration attributes
286 D.4 SMITP statistical attributes
287 Annex E (informative) Specification of communication mode F for direct local data exchange
E.1 Introduction
E.2 Mode F for direct local data exchange
E.2.1 General
E.2.2 Sign-on flow
288 E.2.3 Physical layer primitives
289 E.2.4 Timers
E.3 Sign on example
E.3.1 Identifier request -300 baud- (TP)
E.3.2 Meter identifier response from meter -300 baud-
290 E.3.3 Work mode selection -300 baud- (HHU)
BSI PD CLC/TS 50568-8:2015
$215.11