{"id":244074,"date":"2024-10-19T16:01:41","date_gmt":"2024-10-19T16:01:41","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-61784-3-22010\/"},"modified":"2024-10-25T11:00:01","modified_gmt":"2024-10-25T11:00:01","slug":"bs-en-61784-3-22010","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-61784-3-22010\/","title":{"rendered":"BS EN 61784-3-2:2010"},"content":{"rendered":"
This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 2 of IEC 61784-1, IEC 61784-2 and IEC 61158 Type 2. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer.<\/p>\n
\nNOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.<\/p>\n<\/blockquote>\n
This part1<\/sup> defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2<\/sup> for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.<\/p>\n
This part provides guidelines for both developers and assessors of compliant devices and systems.<\/p>\n
\nNOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system \u2013 implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.<\/p>\n<\/blockquote>\n
PDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 9<\/td>\n CONTENTS <\/td>\n<\/tr>\n \n 19<\/td>\n 0 Introduction
0.1 General
Figures
Figure 1 \u2013 Relationships of IEC 61784-3 with other standards (machinery) <\/td>\n<\/tr>\n\n 20<\/td>\n Figure 2 \u2013 Relationships of IEC 61784-3 with other standards (process) <\/td>\n<\/tr>\n \n 21<\/td>\n 0.2 Patent declaration <\/td>\n<\/tr>\n \n 22<\/td>\n 1 Scope
2 Normative references <\/td>\n<\/tr>\n\n 23<\/td>\n 3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n\n 28<\/td>\n 3.2 Symbols and abbreviated terms <\/td>\n<\/tr>\n \n 30<\/td>\n 3.3 Conventions
4 Overview of FSCP\u00a02\/1 (CIP Safety\u2122)
4.1 General
4.2 FSCP\u00a02\/1 <\/td>\n<\/tr>\n\n 31<\/td>\n 5 General
5.1 External documents providing specifications for the profile
Figure\u00a03 \u2013 Relationship of Safety Validators <\/td>\n<\/tr>\n\n 32<\/td>\n 5.2 Safety functional requirements
5.3 Safety measures
Tables
Table\u00a01 \u2013 Communications errors and detection measures matrix <\/td>\n<\/tr>\n\n 33<\/td>\n 5.4 Safety communication layer structure
5.5 Relationships with FAL (and DLL, PhL)
Figure\u00a04 \u2013 Communication layers <\/td>\n<\/tr>\n\n 34<\/td>\n 6 Safety communication layer services
6.1 Introduction
6.2 Connection object
Table\u00a02 \u2013 New class attributes <\/td>\n<\/tr>\n\n 35<\/td>\n Table\u00a03 \u2013 Service extensions
Table\u00a04 \u2013 SafetyOpen and SafetyClose response format <\/td>\n<\/tr>\n\n 36<\/td>\n 6.3 Connection Manager object <\/td>\n<\/tr>\n \n 37<\/td>\n Figure\u00a05 \u2013 ForwardOpen with safety network segment <\/td>\n<\/tr>\n \n 38<\/td>\n Table\u00a05 \u2013 Safety network segment identifier
Table\u00a06 \u2013 Safety network segment definition <\/td>\n<\/tr>\n\n 39<\/td>\n Figure\u00a06 \u2013 Safety network target format <\/td>\n<\/tr>\n \n 40<\/td>\n Table\u00a07 \u2013 Safety network segment router format
Table\u00a08 \u2013 Safety Network Segment Extended Format <\/td>\n<\/tr>\n\n 42<\/td>\n Figure\u00a07 \u2013 Target Processing SafetyOpen with no configuration data (Form 2 SafetyOpen) <\/td>\n<\/tr>\n \n 43<\/td>\n Figure\u00a08 \u2013 Target Processing for SafetyOpen with configuration data (Form 1 SafetyOpen) <\/td>\n<\/tr>\n \n 44<\/td>\n Figure\u00a09 \u2013 Originator logic to determine which format to use <\/td>\n<\/tr>\n \n 45<\/td>\n Table\u00a09 \u2013 Multipoint producer parameter evaluation rules <\/td>\n<\/tr>\n \n 47<\/td>\n Table\u00a010 \u2013 ForwardOpen setting options for safety connections <\/td>\n<\/tr>\n \n 48<\/td>\n Table\u00a011 \u2013 Network connection parameters for safety connections <\/td>\n<\/tr>\n \n 49<\/td>\n Table\u00a012 \u2013 CP\u00a02\/3 Safety target application reply (size: 10 octets)
Table\u00a013 \u2013 EF CP\u00a02\/3 Safety target application reply (size: 14 octets) <\/td>\n<\/tr>\n\n 50<\/td>\n Table\u00a014 \u2013 SafetyOpen target application reply (size: 18 octets)
Table\u00a015 \u2013 EF SafetyOpen target application reply (size: 22 octets) <\/td>\n<\/tr>\n\n 51<\/td>\n Table\u00a016 \u2013 New and extended error codes for safety
Table\u00a017 \u2013 SafetyOpen error event guidance table <\/td>\n<\/tr>\n\n 53<\/td>\n 6.4 Identity object
6.5 Link objects
Table\u00a018 \u2013 Identity object common service changes
Table\u00a019 \u2013 New DeviceNet object instance attribute <\/td>\n<\/tr>\n\n 54<\/td>\n 6.6 Safety Supervisor object
Table\u00a020 \u2013 New TCP\/IP Interface object Instance Attribute <\/td>\n<\/tr>\n\n 55<\/td>\n Table\u00a021 \u2013 Safety Supervisor class attributes
Table\u00a022 \u2013 Safety Supervisor instance attributes <\/td>\n<\/tr>\n\n 59<\/td>\n Table\u00a023 \u2013 Device status attribute state values <\/td>\n<\/tr>\n \n 60<\/td>\n Table\u00a024 \u2013 Exception status attribute format <\/td>\n<\/tr>\n \n 61<\/td>\n Table\u00a025 \u2013 Common exception detail attribute values <\/td>\n<\/tr>\n \n 62<\/td>\n Table\u00a026 \u2013 Exception detail format summary <\/td>\n<\/tr>\n \n 64<\/td>\n Table\u00a027 \u2013 Summary of device behavior for various CFUNID values <\/td>\n<\/tr>\n \n 66<\/td>\n Table\u00a028 \u2013 Safety Supervisor common services
Table\u00a029 \u2013 Safety Supervisor object specific services <\/td>\n<\/tr>\n\n 68<\/td>\n Table\u00a030 \u2013 Configure_Request message structure
Table\u00a031 \u2013 Validate_Configuration message structure
Table\u00a032 \u2013 Validate_Configuration success message structure <\/td>\n<\/tr>\n\n 69<\/td>\n Figure\u00a010 \u2013 Applying device configuration
Table\u00a033 \u2013 Validate_Configuration error code
Table\u00a034 \u2013 Validate_Configuration extended codes <\/td>\n<\/tr>\n\n 70<\/td>\n Figure\u00a011 \u2013 Configure and Validate processing flowcharts <\/td>\n<\/tr>\n \n 71<\/td>\n Table\u00a035 \u2013 Set_Password message structure
Table\u00a036 \u2013 Reset_Password message structure <\/td>\n<\/tr>\n\n 72<\/td>\n Table\u00a037 \u2013 Configuration_Lock\/Unlock message structure
Table\u00a038 \u2013 Mode_Change message structure
Table\u00a039 \u2013 Safety_Reset message structure <\/td>\n<\/tr>\n\n 73<\/td>\n Table\u00a040 \u2013 Safety Supervisor safety reset types
Table\u00a041 \u2013 Attribute bit map parameter
Table\u00a042 \u2013 Reset processing rules for rest types <\/td>\n<\/tr>\n\n 74<\/td>\n Table\u00a043 \u2013 Propose_TUNID service <\/td>\n<\/tr>\n \n 75<\/td>\n Table\u00a044 \u2013 Apply_TUNID service <\/td>\n<\/tr>\n \n 76<\/td>\n Figure\u00a012 \u2013 UNID handling during \u201cWaiting for TUNID\u201d <\/td>\n<\/tr>\n \n 77<\/td>\n Figure\u00a013 \u2013 Safety Supervisor state diagram
Table\u00a045 \u2013 Safety Supervisor events <\/td>\n<\/tr>\n\n 78<\/td>\n Table\u00a046 \u2013 State event matrix for Safety Supervisor <\/td>\n<\/tr>\n \n 81<\/td>\n Figure\u00a014 \u2013 Configuration, testing and locked relationships
Table\u00a047 \u2013 Configuration owner control vs. device state <\/td>\n<\/tr>\n\n 82<\/td>\n Table\u00a048 \u2013 State mapping of Safety Supervisor to Identity object
Table\u00a049 \u2013 Safety Supervisor object event mapping <\/td>\n<\/tr>\n\n 83<\/td>\n 6.7 Safety Validator object
Table\u00a050 \u2013 Identity object event mapping <\/td>\n<\/tr>\n\n 84<\/td>\n Table\u00a051 \u2013 Safety Validator class attributes
Table\u00a052 \u2013 Safety Validator instance attributes <\/td>\n<\/tr>\n\n 86<\/td>\n Table\u00a053 \u2013 Safety Validator state assignments <\/td>\n<\/tr>\n \n 87<\/td>\n Figure\u00a015 \u2013 Safety connection types
Table\u00a054 \u2013 Safety Validator type, bit field assignments <\/td>\n<\/tr>\n\n 88<\/td>\n Table\u00a055 \u2013 Multipoint producer SafetyOpen parameter evaluation rules <\/td>\n<\/tr>\n \n 89<\/td>\n Table\u00a056 \u2013 Safety Validator class services <\/td>\n<\/tr>\n \n 90<\/td>\n Table\u00a057 \u2013 Safety Validator instance services
Table\u00a058 \u2013 Safety Validator Get_Attributes_All service data <\/td>\n<\/tr>\n\n 91<\/td>\n Figure\u00a016 \u2013 Safety Validator state transition diagram <\/td>\n<\/tr>\n \n 92<\/td>\n 6.8 Connection Configuration Object
Table\u00a059 \u2013 Safety Validator state event matrix
Table\u00a060 \u2013 State mapping between Safety Supervisor and Safety Validator objects <\/td>\n<\/tr>\n\n 93<\/td>\n Table\u00a061 \u2013 Connection configuration object class attribute extensions
Table\u00a062 \u2013 Connection Configuration Object instance attribute additions\/extensions <\/td>\n<\/tr>\n\n 95<\/td>\n Table\u00a063 \u2013 Connection flag bit definitions <\/td>\n<\/tr>\n \n 97<\/td>\n Table\u00a064 \u2013 O-to-T connection parameters <\/td>\n<\/tr>\n \n 98<\/td>\n Table\u00a065 \u2013 T-to-O connection parameters <\/td>\n<\/tr>\n \n 99<\/td>\n Table\u00a066 \u2013 Data map formats <\/td>\n<\/tr>\n \n 100<\/td>\n Table\u00a067 \u2013 Data map format 0
Table\u00a068 \u2013 Data map format 1 <\/td>\n<\/tr>\n\n 102<\/td>\n Table\u00a069 \u2013 Target device\u2019s SCCRC values <\/td>\n<\/tr>\n \n 103<\/td>\n Table\u00a070 \u2013 Target device\u2019s SCTS values
Table\u00a071 \u2013 Time correction connection parameters for multipoint connection <\/td>\n<\/tr>\n\n 104<\/td>\n Table\u00a072 \u2013 Format Type attribute meaning <\/td>\n<\/tr>\n \n 105<\/td>\n Figure\u00a017 \u2013 Logic for Auto-detecting format type
Table\u00a073 \u2013 Format Status attribute meaning <\/td>\n<\/tr>\n\n 106<\/td>\n Table\u00a074 \u2013 Connection Configuration Object-specific services
Table\u00a075 \u2013 Get_Attributes_All Response service data (added attributes ) <\/td>\n<\/tr>\n\n 107<\/td>\n Table\u00a076 \u2013 Get_Attributes_All Response service data (added parameters )
Table\u00a077 \u2013 Set_Attributes_All Request service data (added attributes) <\/td>\n<\/tr>\n\n 108<\/td>\n Figure\u00a018 \u2013 Connection Configuration Object state diagram
Table\u00a078 \u2013 Set_Attributes_All Response service data (added parameters )
Table\u00a079 \u2013 State Mapping between Safety Supervisor and the CCO objects <\/td>\n<\/tr>\n\n 109<\/td>\n 7 Safety communication layer protocol
7.1 Safety PDU format
Figure\u00a019 \u2013 Connection Configuration Object data flow <\/td>\n<\/tr>\n\n 110<\/td>\n Figure 20 \u2013 Format of the mode octet
Table\u00a080 \u2013 Connection sections and PDU formats <\/td>\n<\/tr>\n\n 111<\/td>\n Figure\u00a021 \u2013 1 or 2 octet data section, Base Format
Table\u00a081 \u2013 Mode octet variables <\/td>\n<\/tr>\n\n 112<\/td>\n Figure\u00a022 \u2013 1 or 2 octet data section, Extended Format
Figure\u00a023 \u2013 3 to 250 octet data section format, Base Format <\/td>\n<\/tr>\n\n 113<\/td>\n Figure\u00a024 \u2013 3 to 250 octet data section format, Extended Format <\/td>\n<\/tr>\n \n 114<\/td>\n Figure\u00a025 \u2013 Time Stamp section format, Base Format
Table\u00a082 \u2013 Time Stamp variables <\/td>\n<\/tr>\n\n 115<\/td>\n Figure\u00a026 \u2013 BF Time Coordination message encoding
Figure\u00a027 \u2013 EF Time Coordination message encoding
Table\u00a083 \u2013 Time Coordination message variables <\/td>\n<\/tr>\n\n 116<\/td>\n Figure\u00a028 \u2013 BF Time Correction message encoding
Figure\u00a029 \u2013 EF Time Correction message encoding <\/td>\n<\/tr>\n\n 117<\/td>\n Table\u00a084 \u2013 Time Correction Message variables <\/td>\n<\/tr>\n \n 118<\/td>\n Figure\u00a030 \u2013 1 or 2 octet point-to-point PDU encoding
Figure\u00a031 \u2013 1 or 2 Octet multipoint PDU encoding <\/td>\n<\/tr>\n\n 119<\/td>\n Figure\u00a032 \u2013 1 or 2 Octet, multipoint, Format 2 safety connection format
Figure\u00a033 \u2013 3 to 250 Octet Point-to-point PDU encoding <\/td>\n<\/tr>\n\n 120<\/td>\n Figure\u00a034 \u2013 3 to 248 Octet Multipoint PDU encoding
Figure\u00a035 \u2013 3 to 248 Octet, Multipoint, safety connection format <\/td>\n<\/tr>\n\n 121<\/td>\n Figure\u00a036 \u2013 CRC Calculation order for Extended Format messages
Table\u00a085 \u2013 CRC polynomials used <\/td>\n<\/tr>\n\n 122<\/td>\n 7.2 Communication protocol behavior
Table\u00a086 \u2013 Connection sections and message formats <\/td>\n<\/tr>\n\n 123<\/td>\n 7.3 Time stamp operation
Figure\u00a037 \u2013 Time stamp sequence <\/td>\n<\/tr>\n\n 124<\/td>\n 7.4 Protocol sequence diagrams
Figure\u00a038 \u2013 Sequence diagram of a normal producer\/consumer safety sequence <\/td>\n<\/tr>\n\n 125<\/td>\n Figure\u00a039 \u2013 Sequence diagram of a normal producer\/consumer safety sequence (production repeated) <\/td>\n<\/tr>\n \n 126<\/td>\n Figure\u00a040 \u2013 Sequence diagram of a corrupted producer to consumer message
Figure\u00a041 \u2013 Sequence diagram of a lost producer to consumer message <\/td>\n<\/tr>\n\n 127<\/td>\n Figure\u00a042 \u2013 Sequence diagram of a delayed message <\/td>\n<\/tr>\n \n 128<\/td>\n Figure\u00a043 \u2013 Sequence diagram of a corrupted producer to consumer message with production repeated <\/td>\n<\/tr>\n \n 129<\/td>\n Figure\u00a044 \u2013 Sequence diagram of a connection terminated due to delays
Figure\u00a045 \u2013 Sequence diagram of a failure of safety CRC check <\/td>\n<\/tr>\n\n 130<\/td>\n Figure\u00a046 \u2013 Sequence diagram of a point-to-point ping – normal response <\/td>\n<\/tr>\n \n 131<\/td>\n Figure\u00a047 \u2013 Sequence diagram of a successful multipoint ping, CP\u00a02\/3 safety <\/td>\n<\/tr>\n \n 132<\/td>\n Figure\u00a048 \u2013 Sequence diagram of a successful multipoint ping, CP\u00a02\/2 safety <\/td>\n<\/tr>\n \n 133<\/td>\n Figure\u00a049 \u2013 Sequence diagram of a multipoint ping retry
Figure\u00a050 \u2013 Sequence diagram of a multipoint ping timeout <\/td>\n<\/tr>\n\n 134<\/td>\n 7.5 Safety protocol definition
Figure\u00a051 \u2013 Safety device reference model entity relation diagram <\/td>\n<\/tr>\n\n 135<\/td>\n Figure\u00a052 \u2013 Two devices interchanging safety data via a SafetyValidatorClient and a SafetyValidatorServer <\/td>\n<\/tr>\n \n 137<\/td>\n Figure\u00a053 \u2013 Point-to-point, originating consumer. target producer <\/td>\n<\/tr>\n \n 138<\/td>\n Figure\u00a054 \u2013 Point-to-point, originator producer, target consumer <\/td>\n<\/tr>\n \n 139<\/td>\n Figure\u00a055 \u2013 Multi-point, originator consumer, target producer <\/td>\n<\/tr>\n \n 140<\/td>\n Figure\u00a056 \u2013 Safety production data flow <\/td>\n<\/tr>\n \n 149<\/td>\n Figure\u00a057 \u2013 Consumer safety data monitoring <\/td>\n<\/tr>\n \n 150<\/td>\n Figure\u00a058 \u2013 SafetyValidatorServer – application triggered <\/td>\n<\/tr>\n \n 151<\/td>\n Table\u00a087 \u2013 Data reception – Link triggered
Table\u00a088 \u2013 Time_Correction reception – Link triggered
Table\u00a089 \u2013 Data reception – Application triggered <\/td>\n<\/tr>\n\n 152<\/td>\n Table\u00a090 \u2013 Time_Correction reception – Application triggered
Table\u00a091 \u2013 Consuming application \u2013 Safety data monitoring <\/td>\n<\/tr>\n\n 161<\/td>\n 7.6 Safety message and protocol data specifications <\/td>\n<\/tr>\n \n 164<\/td>\n Table\u00a092 \u2013 Producer connection status determination <\/td>\n<\/tr>\n \n 175<\/td>\n Table\u00a093 \u2013 Consuming safety connection status <\/td>\n<\/tr>\n \n 179<\/td>\n 8 Safety communication layer management
8.1 Overview
8.2 Definition of the measures used during connection establishment
Table\u00a094 \u2013 Connection establishment errors and measures to detect errors <\/td>\n<\/tr>\n\n 180<\/td>\n Table\u00a095 \u2013 SNN Date\/Time allocations
Table\u00a096 \u2013 SNN legal range of time values <\/td>\n<\/tr>\n\n 183<\/td>\n 8.3 Originator-Target relationship validation
Figure\u00a059 \u2013 Target ownership <\/td>\n<\/tr>\n\n 184<\/td>\n 8.4 Detection of mis-routed connection requests
8.5 SafetyOpen processing
8.6 Ownership management
Figure\u00a060 \u2013 SafetyOpen forms <\/td>\n<\/tr>\n\n 185<\/td>\n 8.7 Bridging different physical layers
Figure\u00a061 \u2013 Connection ownership state chart
Figure\u00a062 \u2013 SafetyOpen UNID mapping <\/td>\n<\/tr>\n\n 186<\/td>\n Figure\u00a063 \u2013 Common CPF\u00a02 application layer
Figure\u00a064 \u2013 End-to-End routing example <\/td>\n<\/tr>\n\n 187<\/td>\n 8.8 Safety connection establishment <\/td>\n<\/tr>\n \n 188<\/td>\n Table\u00a097 \u2013 Safety connection parameters <\/td>\n<\/tr>\n \n 189<\/td>\n Figure\u00a065 \u2013 Sources for safety related connection parameters <\/td>\n<\/tr>\n \n 190<\/td>\n Figure\u00a066 \u2013 Parameter mapping between originator and target <\/td>\n<\/tr>\n \n 191<\/td>\n Table\u00a098 \u2013 SafetyOpen summary <\/td>\n<\/tr>\n \n 192<\/td>\n Figure\u00a067 \u2013 CP\u00a02\/3 Safety connection establishment in targets for Form 2a SafetyOpen <\/td>\n<\/tr>\n \n 193<\/td>\n Figure\u00a068 \u2013 General sequence to detect configuration is required <\/td>\n<\/tr>\n \n 198<\/td>\n Figure\u00a069 \u2013 PID\/CID exchanges for two originator scenarios <\/td>\n<\/tr>\n \n 199<\/td>\n Figure\u00a070 \u2013 Seed generation for multipoint connections <\/td>\n<\/tr>\n \n 200<\/td>\n Figure\u00a071 \u2013 PID\/CID runtime handling <\/td>\n<\/tr>\n \n 202<\/td>\n Table\u00a099 \u2013 Originator\/Target service mapping
Table\u00a0100 \u2013 Unsupported originator\/target service types <\/td>\n<\/tr>\n\n 203<\/td>\n Figure\u00a072 \u2013 Connection categories and supported services <\/td>\n<\/tr>\n \n 204<\/td>\n Figure\u00a073 \u2013 Recommended connection types
Figure\u00a074 \u2013 Logic-to-logic supported services <\/td>\n<\/tr>\n\n 205<\/td>\n 8.9 Safety configuration process
Figure\u00a075 \u2013 Recommended connection types for logic to logic <\/td>\n<\/tr>\n\n 206<\/td>\n Figure\u00a076 \u2013 Configuration data transfers
Table\u00a0101 \u2013 Configuration goals <\/td>\n<\/tr>\n\n 208<\/td>\n Figure\u00a077 \u2013 Protection measures in safety devices <\/td>\n<\/tr>\n \n 210<\/td>\n Figure\u00a078 \u2013 Configuration, testing and locked relationships <\/td>\n<\/tr>\n \n 211<\/td>\n Table\u00a0102 \u2013 Configuration owner control vs. device state <\/td>\n<\/tr>\n \n 212<\/td>\n Figure\u00a079 \u2013 Originator’s configuration data <\/td>\n<\/tr>\n \n 214<\/td>\n Figure\u00a080 \u2013 SNCT to device download process <\/td>\n<\/tr>\n \n 215<\/td>\n Figure\u00a081 \u2013 SNCT Downloads to originators that perform Form 1 configuration <\/td>\n<\/tr>\n \n 217<\/td>\n Figure\u00a082 \u2013 Protection from locking and ownership <\/td>\n<\/tr>\n \n 218<\/td>\n Figure\u00a083 \u2013 Example of read back and comparison of original and printout <\/td>\n<\/tr>\n \n 219<\/td>\n Figure\u00a084 \u2013 Diverse display without full data read back
Figure\u00a085 \u2013 Verification process including all alternatives <\/td>\n<\/tr>\n\n 220<\/td>\n Table\u00a0103 \u2013 Errors and detection measures <\/td>\n<\/tr>\n \n 223<\/td>\n 8.10 Electronic Data Sheets extensions for safety <\/td>\n<\/tr>\n \n 225<\/td>\n Table\u00a0104 \u2013 Parameter class keywords
Table\u00a0105 \u2013 New Connection Manager section keywords for safety <\/td>\n<\/tr>\n\n 226<\/td>\n Table\u00a0106 \u2013 Connection Manager field usage for safety <\/td>\n<\/tr>\n \n 228<\/td>\n 8.11 Requirements for CP\u00a02\/2
Table\u00a0107 \u2013 Connection parameter field settings for safety <\/td>\n<\/tr>\n\n 229<\/td>\n 8.12 Requirements for CP\u00a02\/3
Table\u00a0108 \u2013 CP\u00a02\/3 ID assignment rules <\/td>\n<\/tr>\n\n 232<\/td>\n 8.13 CP\u00a016\/3 requirements
Figure\u00a086 \u2013 CP\u00a016\/3 device model <\/td>\n<\/tr>\n\n 234<\/td>\n Figure\u00a087 \u2013 Adding a standard module to a modular device <\/td>\n<\/tr>\n \n 235<\/td>\n 9 System requirements
9.1 Indicators and switches
Table\u00a0109 \u2013 LED indications for setting UNID <\/td>\n<\/tr>\n\n 236<\/td>\n Table\u00a0110 \u2013 Module Status LED
Table\u00a0111 \u2013 Network status LED states <\/td>\n<\/tr>\n\n 239<\/td>\n Figure\u00a088 \u2013 Safety device MACID processing logic <\/td>\n<\/tr>\n \n 240<\/td>\n 9.2 Installation guidelines
9.3 Safety function response time
Figure\u00a089 \u2013 Safety function response time <\/td>\n<\/tr>\n\n 241<\/td>\n Table\u00a0112 \u2013 Connection reaction time type \u2013 producing\/consuming applications <\/td>\n<\/tr>\n \n 242<\/td>\n Figure\u00a090 \u2013 Safety function response time components <\/td>\n<\/tr>\n \n 243<\/td>\n 9.4 Duration of demands
9.5 Constraints for calculation of system characteristics
Figure\u00a091 \u2013 Network protocol reliability block diagram (RBD) <\/td>\n<\/tr>\n\n 245<\/td>\n Figure\u00a092 \u2013 Network PFH summary <\/td>\n<\/tr>\n \n 246<\/td>\n Figure\u00a093 \u2013 Extended Format PFH summary <\/td>\n<\/tr>\n \n 247<\/td>\n 9.6 Maintenance
9.7 Safety manual
10 Assessment <\/td>\n<\/tr>\n\n 248<\/td>\n Annex A (informative) Additional information for functional safety communication profiles of CPF 2 <\/td>\n<\/tr>\n \n 263<\/td>\n Annex B (informative) Information for assessment of the functional safety communication profiles of CPF 2 <\/td>\n<\/tr>\n \n 264<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 2<\/b><\/p>\n
\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2010<\/td>\n 268<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244076,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[668,2641],"product_tag":[],"class_list":{"0":"post-244074","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-05","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244076"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244074"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244074"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}