{"id":244074,"date":"2024-10-19T16:01:41","date_gmt":"2024-10-19T16:01:41","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-61784-3-22010\/"},"modified":"2024-10-25T11:00:01","modified_gmt":"2024-10-25T11:00:01","slug":"bs-en-61784-3-22010","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-61784-3-22010\/","title":{"rendered":"BS EN 61784-3-2:2010"},"content":{"rendered":"

This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 2 of IEC 61784-1, IEC 61784-2 and IEC 61158 Type 2. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer.<\/p>\n

\n

NOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.<\/p>\n<\/blockquote>\n

This part1<\/sup> defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2<\/sup> for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.<\/p>\n

This part provides guidelines for both developers and assessors of compliant devices and systems.<\/p>\n

\n

NOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system \u2013 implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.<\/p>\n<\/blockquote>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
9<\/td>\nCONTENTS <\/td>\n<\/tr>\n
19<\/td>\n0 Introduction
0.1 General
Figures
Figure 1 \u2013 Relationships of IEC 61784-3 with other standards (machinery) <\/td>\n<\/tr>\n
20<\/td>\nFigure 2 \u2013 Relationships of IEC 61784-3 with other standards (process) <\/td>\n<\/tr>\n
21<\/td>\n0.2 Patent declaration <\/td>\n<\/tr>\n
22<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
23<\/td>\n3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
28<\/td>\n3.2 Symbols and abbreviated terms <\/td>\n<\/tr>\n
30<\/td>\n3.3 Conventions
4 Overview of FSCP\u00a02\/1 (CIP Safety\u2122)
4.1 General
4.2 FSCP\u00a02\/1 <\/td>\n<\/tr>\n
31<\/td>\n5 General
5.1 External documents providing specifications for the profile
Figure\u00a03 \u2013 Relationship of Safety Validators <\/td>\n<\/tr>\n
32<\/td>\n5.2 Safety functional requirements
5.3 Safety measures
Tables
Table\u00a01 \u2013 Communications errors and detection measures matrix <\/td>\n<\/tr>\n
33<\/td>\n5.4 Safety communication layer structure
5.5 Relationships with FAL (and DLL, PhL)
Figure\u00a04 \u2013 Communication layers <\/td>\n<\/tr>\n
34<\/td>\n6 Safety communication layer services
6.1 Introduction
6.2 Connection object
Table\u00a02 \u2013 New class attributes <\/td>\n<\/tr>\n
35<\/td>\nTable\u00a03 \u2013 Service extensions
Table\u00a04 \u2013 SafetyOpen and SafetyClose response format <\/td>\n<\/tr>\n
36<\/td>\n6.3 Connection Manager object <\/td>\n<\/tr>\n
37<\/td>\nFigure\u00a05 \u2013 ForwardOpen with safety network segment <\/td>\n<\/tr>\n
38<\/td>\nTable\u00a05 \u2013 Safety network segment identifier
Table\u00a06 \u2013 Safety network segment definition <\/td>\n<\/tr>\n
39<\/td>\nFigure\u00a06 \u2013 Safety network target format <\/td>\n<\/tr>\n
40<\/td>\nTable\u00a07 \u2013 Safety network segment router format
Table\u00a08 \u2013 Safety Network Segment Extended Format <\/td>\n<\/tr>\n
42<\/td>\nFigure\u00a07 \u2013 Target Processing SafetyOpen with no configuration data (Form 2 SafetyOpen) <\/td>\n<\/tr>\n
43<\/td>\nFigure\u00a08 \u2013 Target Processing for SafetyOpen with configuration data (Form 1 SafetyOpen) <\/td>\n<\/tr>\n
44<\/td>\nFigure\u00a09 \u2013 Originator logic to determine which format to use <\/td>\n<\/tr>\n
45<\/td>\nTable\u00a09 \u2013 Multipoint producer parameter evaluation rules <\/td>\n<\/tr>\n
47<\/td>\nTable\u00a010 \u2013 ForwardOpen setting options for safety connections <\/td>\n<\/tr>\n
48<\/td>\nTable\u00a011 \u2013 Network connection parameters for safety connections <\/td>\n<\/tr>\n
49<\/td>\nTable\u00a012 \u2013 CP\u00a02\/3 Safety target application reply (size: 10 octets)
Table\u00a013 \u2013 EF CP\u00a02\/3 Safety target application reply (size: 14 octets) <\/td>\n<\/tr>\n
50<\/td>\nTable\u00a014 \u2013 SafetyOpen target application reply (size: 18 octets)
Table\u00a015 \u2013 EF SafetyOpen target application reply (size: 22 octets) <\/td>\n<\/tr>\n
51<\/td>\nTable\u00a016 \u2013 New and extended error codes for safety
Table\u00a017 \u2013 SafetyOpen error event guidance table <\/td>\n<\/tr>\n
53<\/td>\n6.4 Identity object
6.5 Link objects
Table\u00a018 \u2013 Identity object common service changes
Table\u00a019 \u2013 New DeviceNet object instance attribute <\/td>\n<\/tr>\n
54<\/td>\n6.6 Safety Supervisor object
Table\u00a020 \u2013 New TCP\/IP Interface object Instance Attribute <\/td>\n<\/tr>\n
55<\/td>\nTable\u00a021 \u2013 Safety Supervisor class attributes
Table\u00a022 \u2013 Safety Supervisor instance attributes <\/td>\n<\/tr>\n
59<\/td>\nTable\u00a023 \u2013 Device status attribute state values <\/td>\n<\/tr>\n
60<\/td>\nTable\u00a024 \u2013 Exception status attribute format <\/td>\n<\/tr>\n
61<\/td>\nTable\u00a025 \u2013 Common exception detail attribute values <\/td>\n<\/tr>\n
62<\/td>\nTable\u00a026 \u2013 Exception detail format summary <\/td>\n<\/tr>\n
64<\/td>\nTable\u00a027 \u2013 Summary of device behavior for various CFUNID values <\/td>\n<\/tr>\n
66<\/td>\nTable\u00a028 \u2013 Safety Supervisor common services
Table\u00a029 \u2013 Safety Supervisor object specific services <\/td>\n<\/tr>\n
68<\/td>\nTable\u00a030 \u2013 Configure_Request message structure
Table\u00a031 \u2013 Validate_Configuration message structure
Table\u00a032 \u2013 Validate_Configuration success message structure <\/td>\n<\/tr>\n
69<\/td>\nFigure\u00a010 \u2013 Applying device configuration
Table\u00a033 \u2013 Validate_Configuration error code
Table\u00a034 \u2013 Validate_Configuration extended codes <\/td>\n<\/tr>\n
70<\/td>\nFigure\u00a011 \u2013 Configure and Validate processing flowcharts <\/td>\n<\/tr>\n
71<\/td>\nTable\u00a035 \u2013 Set_Password message structure
Table\u00a036 \u2013 Reset_Password message structure <\/td>\n<\/tr>\n
72<\/td>\nTable\u00a037 \u2013 Configuration_Lock\/Unlock message structure
Table\u00a038 \u2013 Mode_Change message structure
Table\u00a039 \u2013 Safety_Reset message structure <\/td>\n<\/tr>\n
73<\/td>\nTable\u00a040 \u2013 Safety Supervisor safety reset types
Table\u00a041 \u2013 Attribute bit map parameter
Table\u00a042 \u2013 Reset processing rules for rest types <\/td>\n<\/tr>\n
74<\/td>\nTable\u00a043 \u2013 Propose_TUNID service <\/td>\n<\/tr>\n
75<\/td>\nTable\u00a044 \u2013 Apply_TUNID service <\/td>\n<\/tr>\n
76<\/td>\nFigure\u00a012 \u2013 UNID handling during \u201cWaiting for TUNID\u201d <\/td>\n<\/tr>\n
77<\/td>\nFigure\u00a013 \u2013 Safety Supervisor state diagram
Table\u00a045 \u2013 Safety Supervisor events <\/td>\n<\/tr>\n
78<\/td>\nTable\u00a046 \u2013 State event matrix for Safety Supervisor <\/td>\n<\/tr>\n
81<\/td>\nFigure\u00a014 \u2013 Configuration, testing and locked relationships
Table\u00a047 \u2013 Configuration owner control vs. device state <\/td>\n<\/tr>\n
82<\/td>\nTable\u00a048 \u2013 State mapping of Safety Supervisor to Identity object
Table\u00a049 \u2013 Safety Supervisor object event mapping <\/td>\n<\/tr>\n
83<\/td>\n6.7 Safety Validator object
Table\u00a050 \u2013 Identity object event mapping <\/td>\n<\/tr>\n
84<\/td>\nTable\u00a051 \u2013 Safety Validator class attributes
Table\u00a052 \u2013 Safety Validator instance attributes <\/td>\n<\/tr>\n
86<\/td>\nTable\u00a053 \u2013 Safety Validator state assignments <\/td>\n<\/tr>\n
87<\/td>\nFigure\u00a015 \u2013 Safety connection types
Table\u00a054 \u2013 Safety Validator type, bit field assignments <\/td>\n<\/tr>\n
88<\/td>\nTable\u00a055 \u2013 Multipoint producer SafetyOpen parameter evaluation rules <\/td>\n<\/tr>\n
89<\/td>\nTable\u00a056 \u2013 Safety Validator class services <\/td>\n<\/tr>\n
90<\/td>\nTable\u00a057 \u2013 Safety Validator instance services
Table\u00a058 \u2013 Safety Validator Get_Attributes_All service data <\/td>\n<\/tr>\n
91<\/td>\nFigure\u00a016 \u2013 Safety Validator state transition diagram <\/td>\n<\/tr>\n
92<\/td>\n6.8 Connection Configuration Object
Table\u00a059 \u2013 Safety Validator state event matrix
Table\u00a060 \u2013 State mapping between Safety Supervisor and Safety Validator objects <\/td>\n<\/tr>\n
93<\/td>\nTable\u00a061 \u2013 Connection configuration object class attribute extensions
Table\u00a062 \u2013 Connection Configuration Object instance attribute additions\/extensions <\/td>\n<\/tr>\n
95<\/td>\nTable\u00a063 \u2013 Connection flag bit definitions <\/td>\n<\/tr>\n
97<\/td>\nTable\u00a064 \u2013 O-to-T connection parameters <\/td>\n<\/tr>\n
98<\/td>\nTable\u00a065 \u2013 T-to-O connection parameters <\/td>\n<\/tr>\n
99<\/td>\nTable\u00a066 \u2013 Data map formats <\/td>\n<\/tr>\n
100<\/td>\nTable\u00a067 \u2013 Data map format 0
Table\u00a068 \u2013 Data map format 1 <\/td>\n<\/tr>\n
102<\/td>\nTable\u00a069 \u2013 Target device\u2019s SCCRC values <\/td>\n<\/tr>\n
103<\/td>\nTable\u00a070 \u2013 Target device\u2019s SCTS values
Table\u00a071 \u2013 Time correction connection parameters for multipoint connection <\/td>\n<\/tr>\n
104<\/td>\nTable\u00a072 \u2013 Format Type attribute meaning <\/td>\n<\/tr>\n
105<\/td>\nFigure\u00a017 \u2013 Logic for Auto-detecting format type
Table\u00a073 \u2013 Format Status attribute meaning <\/td>\n<\/tr>\n
106<\/td>\nTable\u00a074 \u2013 Connection Configuration Object-specific services
Table\u00a075 \u2013 Get_Attributes_All Response service data (added attributes ) <\/td>\n<\/tr>\n
107<\/td>\nTable\u00a076 \u2013 Get_Attributes_All Response service data (added parameters )
Table\u00a077 \u2013 Set_Attributes_All Request service data (added attributes) <\/td>\n<\/tr>\n
108<\/td>\nFigure\u00a018 \u2013 Connection Configuration Object state diagram
Table\u00a078 \u2013 Set_Attributes_All Response service data (added parameters )
Table\u00a079 \u2013 State Mapping between Safety Supervisor and the CCO objects <\/td>\n<\/tr>\n
109<\/td>\n7 Safety communication layer protocol
7.1 Safety PDU format
Figure\u00a019 \u2013 Connection Configuration Object data flow <\/td>\n<\/tr>\n
110<\/td>\nFigure 20 \u2013 Format of the mode octet
Table\u00a080 \u2013 Connection sections and PDU formats <\/td>\n<\/tr>\n
111<\/td>\nFigure\u00a021 \u2013 1 or 2 octet data section, Base Format
Table\u00a081 \u2013 Mode octet variables <\/td>\n<\/tr>\n
112<\/td>\nFigure\u00a022 \u2013 1 or 2 octet data section, Extended Format
Figure\u00a023 \u2013 3 to 250 octet data section format, Base Format <\/td>\n<\/tr>\n
113<\/td>\nFigure\u00a024 \u2013 3 to 250 octet data section format, Extended Format <\/td>\n<\/tr>\n
114<\/td>\nFigure\u00a025 \u2013 Time Stamp section format, Base Format
Table\u00a082 \u2013 Time Stamp variables <\/td>\n<\/tr>\n
115<\/td>\nFigure\u00a026 \u2013 BF Time Coordination message encoding
Figure\u00a027 \u2013 EF Time Coordination message encoding
Table\u00a083 \u2013 Time Coordination message variables <\/td>\n<\/tr>\n
116<\/td>\nFigure\u00a028 \u2013 BF Time Correction message encoding
Figure\u00a029 \u2013 EF Time Correction message encoding <\/td>\n<\/tr>\n
117<\/td>\nTable\u00a084 \u2013 Time Correction Message variables <\/td>\n<\/tr>\n
118<\/td>\nFigure\u00a030 \u2013 1 or 2 octet point-to-point PDU encoding
Figure\u00a031 \u2013 1 or 2 Octet multipoint PDU encoding <\/td>\n<\/tr>\n
119<\/td>\nFigure\u00a032 \u2013 1 or 2 Octet, multipoint, Format 2 safety connection format
Figure\u00a033 \u2013 3 to 250 Octet Point-to-point PDU encoding <\/td>\n<\/tr>\n
120<\/td>\nFigure\u00a034 \u2013 3 to 248 Octet Multipoint PDU encoding
Figure\u00a035 \u2013 3 to 248 Octet, Multipoint, safety connection format <\/td>\n<\/tr>\n
121<\/td>\nFigure\u00a036 \u2013 CRC Calculation order for Extended Format messages
Table\u00a085 \u2013 CRC polynomials used <\/td>\n<\/tr>\n
122<\/td>\n7.2 Communication protocol behavior
Table\u00a086 \u2013 Connection sections and message formats <\/td>\n<\/tr>\n
123<\/td>\n7.3 Time stamp operation
Figure\u00a037 \u2013 Time stamp sequence <\/td>\n<\/tr>\n
124<\/td>\n7.4 Protocol sequence diagrams
Figure\u00a038 \u2013 Sequence diagram of a normal producer\/consumer safety sequence <\/td>\n<\/tr>\n
125<\/td>\nFigure\u00a039 \u2013 Sequence diagram of a normal producer\/consumer safety sequence (production repeated) <\/td>\n<\/tr>\n
126<\/td>\nFigure\u00a040 \u2013 Sequence diagram of a corrupted producer to consumer message
Figure\u00a041 \u2013 Sequence diagram of a lost producer to consumer message <\/td>\n<\/tr>\n
127<\/td>\nFigure\u00a042 \u2013 Sequence diagram of a delayed message <\/td>\n<\/tr>\n
128<\/td>\nFigure\u00a043 \u2013 Sequence diagram of a corrupted producer to consumer message with production repeated <\/td>\n<\/tr>\n
129<\/td>\nFigure\u00a044 \u2013 Sequence diagram of a connection terminated due to delays
Figure\u00a045 \u2013 Sequence diagram of a failure of safety CRC check <\/td>\n<\/tr>\n
130<\/td>\nFigure\u00a046 \u2013 Sequence diagram of a point-to-point ping – normal response <\/td>\n<\/tr>\n
131<\/td>\nFigure\u00a047 \u2013 Sequence diagram of a successful multipoint ping, CP\u00a02\/3 safety <\/td>\n<\/tr>\n
132<\/td>\nFigure\u00a048 \u2013 Sequence diagram of a successful multipoint ping, CP\u00a02\/2 safety <\/td>\n<\/tr>\n
133<\/td>\nFigure\u00a049 \u2013 Sequence diagram of a multipoint ping retry
Figure\u00a050 \u2013 Sequence diagram of a multipoint ping timeout <\/td>\n<\/tr>\n
134<\/td>\n7.5 Safety protocol definition
Figure\u00a051 \u2013 Safety device reference model entity relation diagram <\/td>\n<\/tr>\n
135<\/td>\nFigure\u00a052 \u2013 Two devices interchanging safety data via a SafetyValidatorClient and a SafetyValidatorServer <\/td>\n<\/tr>\n
137<\/td>\nFigure\u00a053 \u2013 Point-to-point, originating consumer. target producer <\/td>\n<\/tr>\n
138<\/td>\nFigure\u00a054 \u2013 Point-to-point, originator producer, target consumer <\/td>\n<\/tr>\n
139<\/td>\nFigure\u00a055 \u2013 Multi-point, originator consumer, target producer <\/td>\n<\/tr>\n
140<\/td>\nFigure\u00a056 \u2013 Safety production data flow <\/td>\n<\/tr>\n
149<\/td>\nFigure\u00a057 \u2013 Consumer safety data monitoring <\/td>\n<\/tr>\n
150<\/td>\nFigure\u00a058 \u2013 SafetyValidatorServer – application triggered <\/td>\n<\/tr>\n
151<\/td>\nTable\u00a087 \u2013 Data reception – Link triggered
Table\u00a088 \u2013 Time_Correction reception – Link triggered
Table\u00a089 \u2013 Data reception – Application triggered <\/td>\n<\/tr>\n
152<\/td>\nTable\u00a090 \u2013 Time_Correction reception – Application triggered
Table\u00a091 \u2013 Consuming application \u2013 Safety data monitoring <\/td>\n<\/tr>\n
161<\/td>\n7.6 Safety message and protocol data specifications <\/td>\n<\/tr>\n
164<\/td>\nTable\u00a092 \u2013 Producer connection status determination <\/td>\n<\/tr>\n
175<\/td>\nTable\u00a093 \u2013 Consuming safety connection status <\/td>\n<\/tr>\n
179<\/td>\n8 Safety communication layer management
8.1 Overview
8.2 Definition of the measures used during connection establishment
Table\u00a094 \u2013 Connection establishment errors and measures to detect errors <\/td>\n<\/tr>\n
180<\/td>\nTable\u00a095 \u2013 SNN Date\/Time allocations
Table\u00a096 \u2013 SNN legal range of time values <\/td>\n<\/tr>\n
183<\/td>\n8.3 Originator-Target relationship validation
Figure\u00a059 \u2013 Target ownership <\/td>\n<\/tr>\n
184<\/td>\n8.4 Detection of mis-routed connection requests
8.5 SafetyOpen processing
8.6 Ownership management
Figure\u00a060 \u2013 SafetyOpen forms <\/td>\n<\/tr>\n
185<\/td>\n8.7 Bridging different physical layers
Figure\u00a061 \u2013 Connection ownership state chart
Figure\u00a062 \u2013 SafetyOpen UNID mapping <\/td>\n<\/tr>\n
186<\/td>\nFigure\u00a063 \u2013 Common CPF\u00a02 application layer
Figure\u00a064 \u2013 End-to-End routing example <\/td>\n<\/tr>\n
187<\/td>\n8.8 Safety connection establishment <\/td>\n<\/tr>\n
188<\/td>\nTable\u00a097 \u2013 Safety connection parameters <\/td>\n<\/tr>\n
189<\/td>\nFigure\u00a065 \u2013 Sources for safety related connection parameters <\/td>\n<\/tr>\n
190<\/td>\nFigure\u00a066 \u2013 Parameter mapping between originator and target <\/td>\n<\/tr>\n
191<\/td>\nTable\u00a098 \u2013 SafetyOpen summary <\/td>\n<\/tr>\n
192<\/td>\nFigure\u00a067 \u2013 CP\u00a02\/3 Safety connection establishment in targets for Form 2a SafetyOpen <\/td>\n<\/tr>\n
193<\/td>\nFigure\u00a068 \u2013 General sequence to detect configuration is required <\/td>\n<\/tr>\n
198<\/td>\nFigure\u00a069 \u2013 PID\/CID exchanges for two originator scenarios <\/td>\n<\/tr>\n
199<\/td>\nFigure\u00a070 \u2013 Seed generation for multipoint connections <\/td>\n<\/tr>\n
200<\/td>\nFigure\u00a071 \u2013 PID\/CID runtime handling <\/td>\n<\/tr>\n
202<\/td>\nTable\u00a099 \u2013 Originator\/Target service mapping
Table\u00a0100 \u2013 Unsupported originator\/target service types <\/td>\n<\/tr>\n
203<\/td>\nFigure\u00a072 \u2013 Connection categories and supported services <\/td>\n<\/tr>\n
204<\/td>\nFigure\u00a073 \u2013 Recommended connection types
Figure\u00a074 \u2013 Logic-to-logic supported services <\/td>\n<\/tr>\n
205<\/td>\n8.9 Safety configuration process
Figure\u00a075 \u2013 Recommended connection types for logic to logic <\/td>\n<\/tr>\n
206<\/td>\nFigure\u00a076 \u2013 Configuration data transfers
Table\u00a0101 \u2013 Configuration goals <\/td>\n<\/tr>\n
208<\/td>\nFigure\u00a077 \u2013 Protection measures in safety devices <\/td>\n<\/tr>\n
210<\/td>\nFigure\u00a078 \u2013 Configuration, testing and locked relationships <\/td>\n<\/tr>\n
211<\/td>\nTable\u00a0102 \u2013 Configuration owner control vs. device state <\/td>\n<\/tr>\n
212<\/td>\nFigure\u00a079 \u2013 Originator’s configuration data <\/td>\n<\/tr>\n
214<\/td>\nFigure\u00a080 \u2013 SNCT to device download process <\/td>\n<\/tr>\n
215<\/td>\nFigure\u00a081 \u2013 SNCT Downloads to originators that perform Form 1 configuration <\/td>\n<\/tr>\n
217<\/td>\nFigure\u00a082 \u2013 Protection from locking and ownership <\/td>\n<\/tr>\n
218<\/td>\nFigure\u00a083 \u2013 Example of read back and comparison of original and printout <\/td>\n<\/tr>\n
219<\/td>\nFigure\u00a084 \u2013 Diverse display without full data read back
Figure\u00a085 \u2013 Verification process including all alternatives <\/td>\n<\/tr>\n
220<\/td>\nTable\u00a0103 \u2013 Errors and detection measures <\/td>\n<\/tr>\n
223<\/td>\n8.10 Electronic Data Sheets extensions for safety <\/td>\n<\/tr>\n
225<\/td>\nTable\u00a0104 \u2013 Parameter class keywords
Table\u00a0105 \u2013 New Connection Manager section keywords for safety <\/td>\n<\/tr>\n
226<\/td>\nTable\u00a0106 \u2013 Connection Manager field usage for safety <\/td>\n<\/tr>\n
228<\/td>\n8.11 Requirements for CP\u00a02\/2
Table\u00a0107 \u2013 Connection parameter field settings for safety <\/td>\n<\/tr>\n
229<\/td>\n8.12 Requirements for CP\u00a02\/3
Table\u00a0108 \u2013 CP\u00a02\/3 ID assignment rules <\/td>\n<\/tr>\n
232<\/td>\n8.13 CP\u00a016\/3 requirements
Figure\u00a086 \u2013 CP\u00a016\/3 device model <\/td>\n<\/tr>\n
234<\/td>\nFigure\u00a087 \u2013 Adding a standard module to a modular device <\/td>\n<\/tr>\n
235<\/td>\n9 System requirements
9.1 Indicators and switches
Table\u00a0109 \u2013 LED indications for setting UNID <\/td>\n<\/tr>\n
236<\/td>\nTable\u00a0110 \u2013 Module Status LED
Table\u00a0111 \u2013 Network status LED states <\/td>\n<\/tr>\n
239<\/td>\nFigure\u00a088 \u2013 Safety device MACID processing logic <\/td>\n<\/tr>\n
240<\/td>\n9.2 Installation guidelines
9.3 Safety function response time
Figure\u00a089 \u2013 Safety function response time <\/td>\n<\/tr>\n
241<\/td>\nTable\u00a0112 \u2013 Connection reaction time type \u2013 producing\/consuming applications <\/td>\n<\/tr>\n
242<\/td>\nFigure\u00a090 \u2013 Safety function response time components <\/td>\n<\/tr>\n
243<\/td>\n9.4 Duration of demands
9.5 Constraints for calculation of system characteristics
Figure\u00a091 \u2013 Network protocol reliability block diagram (RBD) <\/td>\n<\/tr>\n
245<\/td>\nFigure\u00a092 \u2013 Network PFH summary <\/td>\n<\/tr>\n
246<\/td>\nFigure\u00a093 \u2013 Extended Format PFH summary <\/td>\n<\/tr>\n
247<\/td>\n9.6 Maintenance
9.7 Safety manual
10 Assessment <\/td>\n<\/tr>\n
248<\/td>\nAnnex A (informative) Additional information for functional safety communication profiles of CPF 2 <\/td>\n<\/tr>\n
263<\/td>\nAnnex B (informative) Information for assessment of the functional safety communication profiles of CPF 2 <\/td>\n<\/tr>\n
264<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 2<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2010<\/td>\n268<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244076,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[668,2641],"product_tag":[],"class_list":{"0":"post-244074","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-05","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244076"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244074"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244074"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}