BS EN 62734:2015
$215.11
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
Published By | Publication Date | Number of Pages |
BSI | 2015 | 872 |
IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | English CONTENTS |
36 | 0 Introduction 0.1 General 0.2 Document structure 0.3 Potentially relevant patents |
38 | 1 Scope 2 Normative references |
39 | 3 Terms, definitions, abbreviated terms, acronyms, and conventions 3.1 Terms and definitions 3.1.1 (N)layer and other terms and definitions from the open systems interconnection Basic Reference Model |
48 | 3.1.2 Other terms and definitions |
66 | 3.1.3 Symbols for symmetric keys, and for asymmetric keys and certificates |
67 | 3.1.4 Terms used to describe device behavior |
68 | 3.2 Abbreviated terms and acronyms |
74 | 3.3 Conventions 3.3.1 Service interfaces |
75 | 3.3.2 Table cells 3.3.3 Italics |
76 | 3.3.4 Bold face 3.3.5 Informal declarations of named constants 4 Overview 4.1 General 4.2 Interoperability and related issues |
77 | 4.3 Quality of service 4.4 Worldwide applicability 4.5 Network architecture 4.5.1 Interfaces |
78 | 4.5.2 Data structures |
79 | 4.5.3 Network description Figures Figure 1 โ Standard-compliant network |
80 | 4.5.4 Generic protocol data unit construction Figure 2 โ Typical single-layer PDU without fragmenting or blocking Figure 3 โ Full multi-layer PDU structure used by this standard |
81 | 4.5.5 Abstract data and concrete representations |
83 | 4.6 Network characteristics 4.6.1 General 4.6.2 Scalability |
84 | 4.6.3 Extensibility 4.6.4 Simple operation 4.6.5 Site-license-exempt operation 4.6.6 Robustness in the presence of interference, including from other wireless systems 4.6.7 Determinism and contention-free media access |
85 | 4.6.8 Self-organizing networking with support for redundancy 4.6.9 Internet-protocol-compatible NL 4.6.10 Coexistence with other radio frequency systems |
87 | 4.6.11 Time-slotted assigned-channel Dtransactions as the basis for communication |
89 | 4.6.12 Robust and flexible security |
90 | 4.6.13 System management 4.6.14 Application process using standard objects 4.6.15 Tunneling 5 System 5.1 General |
91 | 5.2 Devices 5.2.1 General 5.2.2 Device interworkability 5.2.3 Profiles 5.2.4 Quality of service 5.2.5 Device worldwide applicability |
92 | 5.2.6 Device description |
93 | Figure 4 โ Physical devices versus roles |
96 | 5.2.7 Device addressing 5.2.8 Device phases |
97 | Figure 5 โ Notional representation of device phases |
98 | 5.2.9 Device energy sources 5.3 Networks 5.3.1 General 5.3.2 Minimal network |
99 | 5.3.3 Basic network topologies supported Figure 6 โ Simple star topology |
100 | Figure 7 โ Simple hub-and-spoke topology |
101 | Figure 8 โ Mesh topology |
102 | 5.3.4 Network configurations Figure 9 โ Simple star-mesh topology |
103 | Figure 10 โ Example where network and D-subnet overlap |
104 | Figure 11 โ Example where network and Dsubnet differ |
105 | Figure 12 โ Network with multiple gateways |
106 | Figure 13 โ Basic network with backup gateway |
107 | 5.3.5 Gateway, system manager, and security manager Figure 14 โ Network with backbone |
108 | 5.4 Protocol suite structure Figure 15 โ Network with backbone โ Device roles |
109 | 5.5 Data flow 5.5.1 General Figure 16 โ Reference model used by this standard |
110 | 5.5.2 Native communications 5.5.3 Basic data flow Figure 17 โ Basic data flow |
111 | 5.5.4 Data flow between I/O devices 5.5.5 Data flow with legacy I/O device Figure 18 โ Data flow between I/O devices |
112 | Figure 19 โ Data flow with legacy I/O device |
113 | Figure 20 โ Data flow with backbone-resident device |
114 | Figure 21 โ Data flow between I/O devices via backbone subnet |
115 | 5.5.6 Data flow with backbone 5.5.7 Data flow between I/O devices via backbone 5.5.8 Data flow to a standard-aware control system or device Figure 22 โ Data flow to standard-aware control system |
116 | 5.6 Time reference 5.6.1 General |
117 | 5.6.2 Time synchronization 5.7 Firmware upgrades 5.8 Wireless backbones and other infrastructures 6 System management role 6.1 General 6.1.1 Overview |
118 | 6.1.2 Components and architecture Figure 23 โ Management architecture |
119 | 6.1.3 Management functions 6.2 DMAP 6.2.1 General |
120 | 6.2.2 Architecture of device management 6.2.3 Definition of management objects 6.2.4 Management objects in DMAP |
121 | Figure 24 โ DMAP Tables Table 1 โ Standard management object types in DMAP |
122 | 6.2.5 Communications services provided to device management objects |
123 | 6.2.6 Attributes of management objects Figure 25 โ Example of management SAP flow through standard protocol suite |
124 | 6.2.7 Definitions of management objects in DMAP Table 2 โ Metadata_attribute data structure |
126 | Table 3 โ Alert types for communication diagnostic category Table 4 โ Alert types for security alert category Table 5 โ Alert types for device diagnostic alert category Table 6 โ Alert types for process alert category |
128 | Table 7 โ ARMO attributes (1 of 3) |
131 | Table 8 โ ARMO alerts |
132 | Table 9 โ Alarm_Recovery method |
133 | 6.2.8 Functions of device management and layer management |
134 | Table 10 โ DMO attributes (1 of 8) |
142 | Table 11 โ DMO alerts |
143 | 6.3 System manager 6.3.1 General 6.3.2 System management architecture |
144 | 6.3.3 Standard system management object types Figure 26 โ System manager architecture concept |
145 | 6.3.4 Security management Table 12 โ System management object types |
146 | 6.3.5 Addresses and address allocation |
147 | Table 13 โ DSO attributes |
148 | Table 14 โ Address_Translation_Row data structure Table 15 โ Read_Address_Row method |
150 | 6.3.6 Firmware upgrade Table 16 โ Input argument usage for Read_Address_Row method Table 17 โ Output argument usage for Read_Address_Row method |
151 | 6.3.7 System performance monitoring |
152 | 6.3.8 Device provisioning service 6.3.9 Device management services Table 18 โ Attributes of SMO in system manager |
154 | Table 19 โ Proxy_System_Manager_Join method |
156 | Table 20 โ Proxy_System_Manager_Contract method |
158 | Table 21 โ Effect of different join commands on attribute sets Table 22 โ Attributes of DMSO in the system manager |
159 | Table 23 โ System_Manager_Join method |
161 | 6.3.10 System time services Table 24 โ System_Manager_Contract method |
165 | 6.3.11 System communication configuration Table 25 โ Attributes of STSO in the system manager |
166 | Figure 27 โ UAP-system manager interaction during contract establishment |
168 | Table 26 โ Attributes of SCO in the system manager |
169 | Figure 28 โ Contract-related interaction between DMO and SCO |
172 | Table 27 โ SCO method for contract establishment, modification, or renewal (1 of 8) |
180 | Table 28 โ Input argument usage for SCO methodfor contract establishment, modification, or renewal |
181 | Table 29 โ Output argument usage for SCO methodfor contract establishment, modification, or renewal |
182 | Figure 29 โ Contract source, destination, and intermediate devices |
184 | Table 30 โ Contract_Data data structure (1 of 3) |
188 | Table 31 โ New_Device_Contract_Response data structure (1 of 2) |
191 | Figure 30 โ Contract establishment example |
192 | Figure 31 โ Contract ID usage in source |
194 | Table 32 โ SCO method for contract termination, deactivation and reactivation |
195 | Table 33 โ DMO method to notify of contract termination |
196 | Figure 32 โ Contract termination |
197 | Table 34 โ DMO method to notify of contract modification |
198 | 6.3.12 Redundancy management Figure 33 โ Contract modification with immediate effect |
199 | 6.3.13 System management protocols 6.3.14 Management policies and policy administration 6.3.15 Operational interaction with plant operations or maintenance personnel 7 Security 7.1 General |
200 | 7.2 Security services 7.2.1 Overview Figure 34 โ Examples of DPDU and TPDU scope |
201 | 7.2.2 Keys |
202 | Figure 35 โ Keys and associated lifetimes |
204 | Figure 36 โ Key lifetimes |
205 | 7.3 PDU security 7.3.1 General Table 35 โ Security levels Table 36 โ Structure of the security control field |
206 | 7.3.2 DPDU security |
207 | Figure 37 โ DPDU structure |
208 | Figure 38 โ DLE and DLS processing for a Dtransaction initiator |
210 | Figure 39 โ Received DPDUs โ DLE and DSC |
211 | Table 37 โ Sec.DpduPrep.Request elements |
212 | Table 38 โ Sec.DpduPrep.Response elements Table 39 โ Sec.DAckCheck.Request elements |
213 | Table 40 โ Sec.DAckCheck.Response elements |
214 | Table 41 โ Sec.DInitialCheck.Request elements |
215 | Table 42 โ Sec.DInitialCheck.Response elements |
216 | Table 43 โ Sec.DAckPrep.Request elements |
217 | Table 44 โ Sec.DAckPrep.Response elements |
218 | Table 45 โ Structure of the WISN DPDU nonce Table 46 โ Structure of the 32bit truncated TAI time used in the Dnonce |
221 | 7.3.3 TL security functionality |
222 | Figure 40 โ TPDU structure and protected coverage |
223 | Figure 41 โ TMIC parameters Table 47 โ TSC pseudo-header structure |
224 | Figure 42 โ TL and TSC interaction, outgoing TPDU |
225 | Figure 43 โ TL and TSC interaction, incoming TPDU |
226 | Table 48 โ Sec.TpduOutCheck.Request elements Table 49 โ Sec.TpduOutCheck.Response elements |
227 | Table 50 โ Sec.TpduSecure.Request elements |
228 | Table 51 โ Sec. TpduSecure.Response elements |
229 | Table 52 โ Sec.TpduInCheck.Request elements |
230 | Table 53 โ Sec.TpduInCheck.Response elements |
231 | Table 54 โ Sec.TpduVerify.Request elements |
232 | Table 55 โ Sec.TpduVerify.Response elements Table 56 โ Structure of TL security header |
233 | Table 57 โ Structure of the TPDU nonce Table 58 โ Structure of 32bit truncated nominal TAI time used in the Tnonce |
237 | 7.4 Joining process 7.4.1 General 7.4.2 Prerequisites |
238 | 7.4.3 Desired device end state and properties 7.4.4 Joining process steps common for symmetric-key and asymmetric-key approaches |
241 | 7.4.5 Symmetric-key joining process |
242 | Figure 44 โ Example: Overview of the symmetric-key joining process |
243 | Figure 45 โ Example: Overview of the symmetric-key joining process of a backbone device |
245 | Table 59 โ Proxy_Security_Sym_Join method |
246 | Table 60 โ Security_Sym_Join method Table 61 โ Security_Confirm method |
247 | Table 62 โ Security_Sym_Join_Request data structure |
248 | Table 63 โ Security_Sym_Join_Response data structure |
249 | Table 64 โ Structure of compressed security level field |
250 | Table 65 โ Master key security level Table 66 โ Security_Sym_Confirm data structure |
251 | 7.4.6 Asymmetric-key joining process |
252 | Table 67 โ Implicit certificate format Table 68 โ Usage_serial_number structure |
253 | Figure 46 โ Asymmetric-key-authenticated key agreement scheme |
256 | Figure 47 โ Example: Overview of the asymmetric-key joining process for a device with a DL |
257 | Figure 48 โ Example: Overview of the asymmetric-key joining process of a backbone device |
259 | Table 69 โ Proxy_Security_Pub_Join method |
260 | Table 70 โ Security_Pub_Join method |
261 | Table 71 โ Proxy_Security_Pub_Confirm method Table 72 โ Security_Pub_Confirm method |
262 | Table 73 โ Network_Information_Confirmation method |
263 | Table 74 โ Format of asymmetric join request internal structure Table 75 โ Format of the protocol control field |
264 | Table 76 โ Format of asymmetric join response internal structure |
265 | Table 77 โ Format of first join confirmation internal structure |
266 | Table 78 โ Format of join confirmation response internal structure |
267 | 7.4.7 Joining process and device lifetime failure recovery |
268 | Table 79 โ Joining process and device lifetime state machine |
269 | 7.5 Session establishment 7.5.1 General 7.5.2 Description Figure 49 โ Device state transitions for joining process and device lifetime |
270 | Figure 50 โ High-level example of session establishment |
271 | 7.5.3 Application protocol data unit protection using the master key 7.5.4 Proxy security management object methods related to the session establishment Table 80 โ Security_New_Session method |
272 | Table 81 โ Security_New_Session_Request data structure |
273 | Table 82 โ Security_New_Session_Response data structure |
274 | 7.6 Key update 7.6.1 General 7.6.2 Description |
275 | 7.6.3 Device security management object methods related to Tkey update Figure 51 โ Key update protocol overview |
276 | Table 83 โ New_Key method |
277 | Table 84 โ Security_Key_and_Policies data structure |
279 | 7.6.4 Failure recovery Table 85 โ Security_Key_Update_Status data structure |
280 | Table 86 โ Tkey and Dkey state transition |
281 | 7.7 Functionality of the security manager role 7.7.1 Proxy security management object Figure 52 โ Device key establishment and key update state transition Table 87 โ Attributes of PSMO in the system manager |
282 | 7.7.2 Authorization of network devices and generation or derivation of initial master keys 7.7.3 Interaction with device security management objects 7.7.4 Management of operational keys |
283 | 7.8 Security policies 7.8.1 Definition of security policy 7.8.2 Policy extent |
284 | 7.8.3 Unconstrained security policy choices 7.8.4 Policy structures Table 88 โ Structure of policy field Table 89 โ Key_Type |
285 | Table 90 โ Key_Usage Table 91 โ Granularity |
286 | 7.9 Security functions available to the AL 7.9.1 Parameters on transport service requests that relate to security |
287 | 7.9.2 Direct access to cryptographic primitives |
288 | 7.9.3 Symmetric-key cryptography |
289 | 7.10 Security statistics collection, threat detection, and reporting |
290 | 7.11 DSMO functionality 7.11.1 General 7.11.2 DSMO attributes Table 92 โ DSMO attributes |
291 | 7.11.3 KeyDescriptor |
292 | Table 93 โ KeyDescriptor |
293 | Table 94 โ TkeyLookupData OctetString fields |
294 | Table 95 โ Delete key method |
295 | Table 96 โ Key_Policy_Update method |
296 | 7.11.4 DSMO alerts |
297 | 8 Physical layer 8.1 General Table 97 โ DSMO alerts |
298 | 8.2 Default physical layer 8.2.1 General requirements 8.2.2 Additional requirements of IEEEย 802.15.4 Table 98 โ Timing requirements |
299 | 8.2.3 Exceptions to the IEEEย 802.15.4 physical layer 9 Data-link layer 9.1 General 9.1.1 Overview |
300 | 9.1.2 Coexistence strategies in the DL 9.1.3 Allocation of digital bandwidth |
301 | 9.1.4 Structure of the DPDU 9.1.5 The DL and the IEEEย 802.15.4 MAC Figure 53 โ DL protocol suite and PhPDU/DPDU structure |
302 | 9.1.6 Routes and graphs |
304 | Figure 54 โ Graph routing example Table 99 โ Graph table on ND20 Table 100 โ Graph table on ND21 |
306 | Figure 55 โ Inbound and outbound graphs |
309 | 9.1.7 Slotted-channel-hopping, slow-channel-hopping, and timeslots |
310 | Figure 56 โ Slotted-channel-hopping |
311 | Figure 57 โ Slow-channel-hopping Figure 58 โ Hybrid operation |
312 | Figure 59 โ Radio spectrum usage |
314 | Figure 60 โ Predefined channel-hopping-pattern1 |
315 | Figure 61 โ Two groups of DLEs with different channel-hopping-pattern-offsets |
316 | Figure 62 โ Interleaved channel-hopping-pattern1 with sixteen different channel-hopping-pattern-offsets |
317 | Figure 63 โ Example timeslot allocation for slotted-channel-hopping |
318 | Figure 64 โ Example timeslot allocation for slow-channel-hopping |
319 | Figure 65 โ Hybrid mode with slotted-channel-hopping and slow-channel-hopping Figure 66 โ Combining slow-channel-hopping and slotted-channel-hopping |
320 | 9.1.8 Superframes Figure 67 โ Example of a three-timeslot superframe and how it repeats Figure 68 โ Superframes and links |
321 | Figure 69 โ Multiple superframes with aligned timeslots |
325 | Figure 70 โ Example superframe for slotted-channel-hopping |
326 | Figure 71 โ Example superframe for slow-channel-hopping Figure 72 โ Components of a slow-channel-hopping superframe |
327 | Figure 73 โ Example configuration for avoiding collisions among routers |
328 | Figure 74 โ Hybrid configuration |
330 | Figure 75 โ Timeslot allocation and message queue |
332 | 9.1.9 DL time keeping |
333 | Figure 76 โ 250ย ms alignment intervals |
334 | Figure 77 โ Timeslot durations and timing |
335 | Table 101 โ Approximating nominal timing with 32ย KiHz clock |
339 | Figure 78 โ Clock source acknowledges receipt of a Data DPDU |
341 | Figure 79 โ Transaction timing attributes |
342 | Figure 80 โ Dedicated and shared transaction timeslots |
343 | Figure 81 โ Unicast transaction |
346 | Figure 82 โ PDU wait time (PWT) |
347 | Figure 83 โ Duocast support in the standard |
348 | Figure 84 โ Duocast transaction |
349 | Figure 85 โ Shared timeslots with active CSMA/CA |
350 | Figure 86 โ Transaction during slow-channel-hopping periods |
351 | 9.1.10 Dsubnet addressing |
352 | 9.1.11 DL management service |
353 | Figure 87 โ DL management SAP flow through standard protocol suite |
354 | 9.1.12 Relationship between DLE and DSC |
355 | 9.1.13 DLE neighbor discovery |
358 | 9.1.14 Neighbor discovery and joining โ DL considerations |
361 | Table 102 โ DL_Config_Info structure |
363 | 9.1.15 Radio link control and quality measurement |
367 | Table 103 โ CountryCode |
368 | 9.1.16 DLE roles and options 9.1.17 DLE energy considerations |
369 | 9.2 DDSAP 9.2.1 General 9.2.2 DDData.request |
370 | Table 104 โ DDData.request parameters |
371 | 9.2.3 DDData.confirm 9.2.4 DDData.indication Table 105 โ DDData.confirm parameters Table 106 โ Value set for status parameter Table 107 โ DDData.indication parameters |
372 | 9.3 Data DPDUs and ACK/NAK DPDUs 9.3.1 General Figure 88 โ PhPDU and DPDU structure |
373 | 9.3.2 Octet and bit ordering |
374 | 9.3.3 Media access control headers Table 108 โ ExtDLUint, one-octet variant Table 109 โ ExtDLUint, two-octet variant |
375 | Table 110 โ Data DPDU MHR |
377 | Table 111 โ Data DPDU DHDR Table 112 โ Data DPDU DMXHR |
378 | Table 113 โ DROUT structure, compressed variant |
379 | Table 114 โ DROUT structure, uncompressed variant |
380 | Table 115 โ DADDR structure |
381 | 9.3.4 MAC acknowledgment DPDUs Figure 89 โ Typical ACK/NAK DPDU layout Table 116 โ ACK/NAK DPDU MHR |
382 | Table 117 โ ACK/NAK DPDU DHR |
383 | Table 118 โ ACK/NAK DPDU DHDR |
384 | 9.3.5 DL auxiliary subheader Table 119 โ Advertisement DAUX structure |
385 | Table 120 โ Advertisement selections elements |
386 | Table 121 โ Advertisement selections Table 122 โ Advertisement time synchronization elements Table 123 โ Advertisement time synchronization structure |
388 | Table 124 โ Join superframe information subfields Table 125 โ Join superframe information structure |
389 | Table 126 โ Superframe derived from advertisement |
390 | Table 127 โ Join information elements Table 128 โ Join information structure |
391 | Table 129 โ Defaults for links created from advertisements |
392 | Table 130 โ dlmo.Neighbor entry created from advertisements Table 131 โ dlmo.Graph entry created from advertisements |
393 | Table 132 โ dlmo.Route entry created from advertisements |
395 | Table 133 โ Solicitation header subfields |
396 | Table 134 โ Solicitation header structure Table 135 โ Solicitation DAUX fields Table 136 โ Solicitation DAUX structure |
398 | Table 137 โ Activate link DAUX fields Table 138 โ Activate link DAUX structure Table 139 โ Report received signal quality DAUX fields |
399 | 9.4 DL management information base 9.4.1 General 9.4.2 DL management object attributes Table 140 โ Report received signal quality DAUX structure Table 141 โ DLMO attributes (1 of 7) |
409 | Table 142 โ Dsubnet filter octets Table 143 โ dlmo.TaiAdjust OctetString fields |
410 | Table 144 โ dlmo.TaiAdjust OctetString structure Table 145 โ dlmo.EnergyDesign OctetString fields Table 146 โ dlmo.EnergyDesign OctetString structure |
411 | Table 147 โ dlmo.DeviceCapability OctetString fields Table 148 โ dlmo.DeviceCapability OctetString structure |
413 | Table 149 โ dlmo.DiscoveryAlert fields Table 150 โ dlmo.DiscoveryAlert structure |
414 | Table 151 โ dlmo.Candidates OctetString fields |
415 | Table 152 โ dlmo.Candidates structure |
416 | Table 153 โ dlmo.SmoothFactors OctetString fields Table 154 โ dlmo.SmoothFactors structure |
417 | Table 155 โ dlmo.QueuePriority fields Table 156 โ dlmo.QueuePriority structure |
418 | Table 157 โ dlmo.ChannelDiag fields |
419 | 9.4.3 DLMO attributes (indexed OctetStrings) Figure 90 โ Relationship among DLMO indexed attributes Table 158 โ dlmo.ChannelDiag structure |
421 | Table 159 โ dlmo.Ch fields Table 160 โ dlmo.Ch structure |
424 | Table 161 โ Transaction receiver template fields Table 162 โ Transaction receiver template structure |
425 | Table 163 โ Transaction initiator template fields Table 164 โ Transaction initiator template structure |
426 | Table 165 โ Default transaction responder template, used during joining process Table 166 โ Default transaction initiator template, used during joining process |
427 | Table 167 โ Default transaction responder template, used during joining process |
429 | Table 168 โ dlmo.Neighbor fields |
430 | Table 169 โ dlmo.Neighbor structure |
431 | Table 170 โ ExtendGraph fields Table 171 โ ExtGraph structure |
432 | Table 172 โ dlmo.NeighborDiagReset fields Table 173 โ dlmo.NeighborDiagReset structure |
433 | Table 174 โ dlmo.Superframe fields |
434 | Table 175 โ dlmo.Superframe structure |
438 | Table 176 โ dlmo.SuperframeIdle fields Table 177 โ dlmo.SuperframeIdle structure |
439 | Table 178 โ dlmo.Graph Table 179 โ dlmo.Graph structure |
440 | Table 180 โ dlmo.Link fields |
441 | Table 181 โ dlmo.Link structure |
442 | Table 182 โ dlmo.Link[ย ].Type structure |
443 | Table 183 โ Allowed dlmo.Link[ย ].Type combinations |
444 | Table 184 โ Values for dlmo.Link[ย ].Schedule Table 185 โ dlmo.Route fields |
445 | Table 186 โ dlmo.Route structure |
446 | Table 187 โ dlmo.NeighborDiag fields Table 188 โ Diagnostic summary OctetString fields |
447 | Table 189 โ Diagnostic summary OctetString structure Table 190 โ Diagnostic ClockDetail OctetString fields |
448 | 9.5 DLE methods 9.5.1 Method for synchronized cutover of DLE attributes 9.5.2 Methods to access indexed OctetString attributes Table 191 โ Diagnostic ClockDetail OctetString structure |
449 | Table 192 โ Read_Row method Table 193 โ Write_Row method |
450 | 9.6 DL alerts 9.6.1 DL_Connectivity alert Table 194 โ Write_Row_Now method |
451 | Table 195 โ dlmo.AlertPolicy fields Table 196 โ dlmo.AlertPolicy OctetString structure |
452 | 9.6.2 NeighborDiscovery alert Table 197 โ DL_Connectivity alert Table 198 โ DL_Connectivity alert OctetString |
453 | 10 Network layer 10.1 General 10.2 NL functionality overview 10.2.1 General Table 199 โ NeighborDiscovery alert |
454 | 10.2.2 Addressing 10.2.3 Address translation Table 200 โ Link-local address structure |
455 | Table 201 โ Address translation table (ATT) |
456 | 10.2.4 Network protocol data unit headers 10.2.5 Fragmentation and reassembly Figure 91 โ Address translation process |
458 | Figure 92 โ Fragmentation process |
459 | 10.2.6 Routing Figure 93 โ Reassembly process |
460 | Table 202 โ Example of a routing table |
461 | Figure 94 โ Processing of an NSDU received from a TLE |
462 | Figure 95 โ Processing of a received NPDU |
464 | Figure 96 โ Processing of a NPDU received by a NLE from the backbone |
465 | 10.2.7 Routing examples Figure 97 โ Delivery of a received NPDU at its final destination NLE |
466 | Figure 98 โ Routing from a field device direct to a field-connected gatewaywithout backbone routing |
467 | Figure 99 โ Protocol suite diagram for routing from a field device direct to a field-connected gateway without backbone routing |
468 | Figure 100 โ Routing an NPDU from a field device to a gateway via a backbone router |
469 | Figure 101 โ Protocol suite diagram for routing an APDU from a field device to a gateway via a backbone router |
470 | Figure 102 โ Routing from a field device on one Dsubnet to another field device on a different Dsubnet |
471 | Figure 103 โ Protocol suite diagram for routing from an I/O device on one Dsubnet to another I/O device on a different Dsubnet |
472 | Figure 104 โ Example of routing over an Ethernet backbone network |
473 | 10.3 NLE data services 10.3.1 General Figure 105 โ Example of routing over a fieldbus backbone network |
474 | 10.3.2 NData.request Table 203 โ NData.request elements |
475 | 10.3.3 NData.confirm 10.3.4 NData.indication Table 204 โ NData.confirm elements |
476 | 10.4 NL management object 10.4.1 NL management information base Table 205 โ NData.indication elements |
477 | Table 206 โ NLMO attributes (1 of 3) |
480 | 10.4.2 Structured management information bases Table 207 โ Contract table structure |
481 | 10.4.3 NL management object methods Table 208 โ Route table elements Table 209 โ Address translation table structure |
483 | Table 210 โ NLMO structured MIB manipulation methods |
484 | 10.5 NPDU formats 10.5.1 General Table 211 โ Alert to indicate dropped PDU/PDU error |
485 | Figure 106 โ Distinguishing between NPDU header formats |
486 | 10.5.2 Basic header format for NL Table 212 โ Common header patterns Table 213 โ Basic NL header format |
487 | 10.5.3 Contract-enabled network header format |
488 | Table 214 โ Contract-enabled NL header format Table 215 โ 6LoWPAN_IPHC encoding format |
489 | 10.5.4 Full header (IPv6) format Table 216 โ IPv6 NL header format |
490 | Table 217 โ Full NL header in the DL |
491 | 10.5.5 Fragmentation header format Table 218 โ NL header format for fragmented NPDUs Table 219 โ Format of first fragment header |
492 | 11 Transport layer 11.1 General Table 220 โ Format of second and subsequent fragment headers |
493 | 11.2 TLE reference model 11.3 Transport security entity 11.3.1 General 11.3.2 Securing the TL Figure 107 โ TLE reference model |
494 | 11.4 Transport data entity 11.4.1 General |
495 | 11.4.2 UDP over IPv6 11.4.3 UDP header transmission and compression Figure 108 โ UDP pseudo-header for IPv6 |
496 | Table 221 โ UDP header encoding |
498 | 11.4.4 TSAPs and UDP ports |
499 | 11.4.5 Good network citizenship 11.5 TPDU encoding 11.5.1 General 11.5.2 Header compression โ User datagram protocol encoding Figure 109 โ TPDU structure |
500 | Table 222 โ UDP 6LoWPAN_NHC-for-UDP encoding octet Table 223 โ Optimal UDP header encoding |
501 | 11.5.3 TPDU security header 11.6 TL model 11.6.1 General 11.6.2 Data services Table 224 โ UDP header encoding with checksum and compressed port numbers |
502 | Table 225 โ TData.request elements |
503 | Table 226 โ TData.confirm elements Table 227 โ TData.confirm status codes |
504 | Table 228 โ TData.indication elements |
505 | Table 229 โ TLMO attributes (1 of 2) |
507 | Table 230 โ TL management object methods โ Reset Table 231 โ TL management object methods โ Halt |
508 | Table 232 โ TL management object methods โ PortRangeInfo Table 233 โ TL management object methods โ GetPortInfo |
509 | Table 234 โ TL management object methods โ GetNextPortInfo Table 235 โ TL management object alert types โ Illegal use of port |
510 | 12 Application layer 12.1 General Table 236 โ TL management object alert types โ TPDU received on unregistered port Table 237 โ TL management object alert types โ TPDU does not match security policies |
511 | 12.2 Energy considerations 12.3 Legacy control system considerations |
512 | 12.4 Overview of object-oriented modeling 12.4.1 General 12.4.2 Object-to-object communication concept |
513 | 12.4.3 AL structure 12.4.4 UAP structure Figure 110 โ User application objects in a UAP |
514 | 12.5 Object model |
515 | 12.6 Object attribute model 12.6.1 General |
516 | 12.6.2 Attributes of standard objects 12.6.3 Attribute classification |
517 | 12.6.4 Attribute accessibility 12.7 Method model |
518 | 12.8 Alert model 12.9 Alarm state model Table 238 โ State table for alarm transitions |
519 | 12.10 Event state model 12.10.1 General 12.10.2 State table and transitions Figure 111 โ Alarm state model Table 239 โ State table for event transitions |
520 | 12.11 Alert reporting 12.11.1 General 12.11.2 Alert types Figure 112 โ Event model |
521 | 12.11.3 Alert report information |
522 | 12.11.4 Alarm state recovery 12.12 Communication interaction model 12.12.1 General 12.12.2 Buffered unidirectional publication communication |
523 | 12.12.3 Queued unidirectional communication 12.12.4 Queued bidirectional communication |
524 | Figure 113 โ A successful example of multiple outstanding requests, with response concatenation |
526 | Figure 114 โ An example of multiple outstanding unordered requests, with second write request initially unsuccessful |
527 | Figure 115 โ An example of multiple outstanding ordered requests, with second write request initially unsuccessful |
529 | Figure 116 โ Send window example 1, with current send window smaller than maximum send window Figure 117 โ Send window example 2, with current send window the same size as maximum send window, and non-zero usable send window width |
530 | Figure 118 โ Send window example 3, with current send window the same size as maximum send window, and usable send window width of zero |
531 | 12.12.5 Communication service contract |
532 | 12.13 AL addressing 12.13.1 General 12.13.2 Object addressing Figure 119 โ General addressing model |
533 | 12.13.3 Object attribute addressing 12.13.4 Object attribute addressing |
535 | 12.13.5 Object method addressing 12.14 Management objects |
536 | 12.15 User objects 12.15.1 General 12.15.2 Industry-independent objects |
537 | Table 240 โ UAP management object attributes (1 of 2) |
539 | Figure 120 โ UAP management object state diagram Table 241 โ State table for UAP management object Table 242 โ UAP management object methods |
540 | Table 243 โ Alert-receiving object attributes |
541 | Figure 121 โ Alert report reception state diagram Figure 122 โ Alert-reporting example Table 244 โ State table for handling an AlertReport reception |
542 | Table 245 โ AlertReceiving object methods |
543 | Table 246 โ UploadDownload object attributes (1 of 4) |
548 | Table 247 โ UploadDownload object methods |
549 | Table 248 โ UploadDownload object StartDownload method |
550 | Table 249 โ UploadDownload object DownloadData method |
552 | Table 250 โ UploadDownload object EndDownload method |
553 | Table 251 โ UploadDownload object StartUpload method |
554 | Table 252 โ UploadDownload object UploadData method |
555 | Table 253 โ UploadDownload object EndUpload method |
556 | Table 254 โ Download state table for unicast operation mode (1 of 2) |
558 | Figure 123 โ UploadDownload object download state diagram Figure 124 โ UploadDownload object upload state diagram |
559 | Table 255 โ Upload state table for unicast operation mode (1 of 2) |
561 | Table 256 โ Concentrator object attributes (1 of 2) |
562 | Table 257 โ Concentrator object methods |
563 | Table 258 โ Dispersion object attributes (1 of 2) |
564 | Table 259 โ Dispersion object methods |
565 | Table 260 โ Tunnel object attributes (1 of 3) |
567 | Table 261 โ Tunnel object methods |
568 | Table 262 โ Interface object attributes Table 263 โ Interface object methods |
569 | 12.16 Data types 12.16.1 Basic data types 12.16.2 Derived atomic data types 12.16.3 Industry-independent standard data structures |
570 | Table 264 โ Data type: ObjectAttributeIndexAndSize |
571 | Table 265 โ Data type: Communication association endpoint (1 of 2) |
573 | Table 266 โ Data type: Communication contract data |
574 | Table 267 โ Data type: Alert communication endpoint Table 268 โ Data type: Tunnel endpoint |
575 | Table 269 โ Data type: Alert report descriptor Table 270 โ Data type: Process control alarm report descriptorfor analog with single reference condition |
576 | 12.17 Application services provided by application sublayer 12.17.1 General Table 271 โ Data type: ObjectIDandType Table 272 โ Data type: UnscheduledCorrespondent |
577 | 12.17.2 Publish/subscribe application communication model Table 273 โ AL services |
578 | 12.17.3 Scheduled periodic buffered communication |
579 | Figure 125 โ Publish sequence of service primitives |
581 | Table 274 โ Publish service |
583 | 12.17.4 Client/server interactions |
584 | Figure 126 โ Client/server model two-part interactions Figure 127 โ Client/server model four-part interactions: Successful delivery |
585 | Figure 128 โ Client/server model four-part interactions: Request delivery failure Figure 129 โ Client/server model four-part interactions: Response delivery failure |
587 | Table 275 โ Read service |
592 | Table 276 โ Write service |
596 | Table 277 โ Execute service |
599 | 12.17.5 Unscheduled acyclic queued unidirectional messages (source/sink) |
600 | Figure 130 โ AlertReport and AlertAcknowledge, delivery success Figure 131 โ AlertReport, delivery failure |
601 | Figure 132 โ AlertReport, acknowledgment failure |
602 | Table 278 โ AlertReport service |
605 | Table 279 โ AlertAcknowledge service |
606 | 12.17.6 Client/server and source/sink commonalities |
608 | Figure 133 โ Concatenated response for multiple outstanding write requests(no message loss) |
609 | Table 280 โ Tunnel service |
612 | 12.18 AL flow use of lower layer services 12.18.1 General 12.18.2 AL use of TDSAPs 12.18.3 Mapping AL service primitives to TL service primitives Table 281 โ Application flow characteristics |
613 | 12.19 AL management 12.19.1 General 12.19.2 Application sublayer handling of malformed application protocol data units Table 282 โ AL service primitive to TL service primitive mapping |
614 | 12.19.3 Application sublayer management object attributes Figure 134 โ Management and handling of malformed APDUs received from device X |
615 | Table 283 โ ASLMO attributes (1 of 2) |
616 | 12.19.4 Application sublayer management object methods Table 284 โ Application sublayer management object methods |
617 | 12.19.5 Application sublayer management object alerts Table 285 โ Reset method |
618 | 12.19.6 DMAP services invoked by application sublayer Table 286 โ ASLMO alerts |
619 | 12.19.7 Process industries standard objects |
621 | Table 287 โ Analog input object attributes |
622 | Table 288 โ Analog input object methods |
623 | Table 289 โ Analog input alerts |
624 | Table 290 โ Analog output attributes (1 of 2) |
625 | Table 291 โ Analog output object methods |
626 | Table 292 โ Analog output alerts |
627 | Table 293 โ Binary input object attributes |
628 | Table 294 โ Binary input object methods Table 295 โ Binary input alerts |
629 | Table 296 โ Binary output attributes |
630 | 12.19.8 Factory automation industries profile Table 297 โ Binary output object methods Table 298 โ Binary output alerts |
631 | 12.20 Process control industry standard data structures 12.20.1 General 12.20.2 Status for analog information |
632 | 12.20.3 Value and status for analog information 12.20.4 Value and status for binary information Table 299 โ Status octet Table 300 โ Data type: Process control value and status for analog value |
633 | 12.20.5 Process control mode Table 301 โ Data type: Process control value and status for binary value Table 302 โ Data type: Process control mode Table 303 โ Data type: Process control mode bitstring |
634 | 12.20.6 Scaling 12.21 Additional tables 12.21.1 Process control profile standard objects Table 304 โ Data type: Process control scaling Table 305 โ Process control standard objects |
635 | 12.21.2 Services 12.22 Coding 12.22.1 General 12.22.2 Coding rules for application protocol data units Table 306 โ Services Table 307 โ Application messaging format |
636 | Table 308 โ Concatenated APDUs in a single TSDU Table 309 โ Object addressing |
637 | Table 310 โ Four-bit addressing mode APDU header construction Table 311 โ Eight-bit addressing mode APDU header construction Table 312 โ Sixteen-bit addressing mode APDU header construction |
638 | Table 313 โ Inferred addressing use case example Table 314 โ Inferred addressing mode APDU header construction |
639 | Table 315 โ Six-bit attribute identifier, not indexed Table 316 โ Six-bit attribute identifier, singly indexed, with 7bit index Table 317 โ Six-bit attribute identifier, singly indexed, with 15bit index |
640 | Table 318 โ Six-bit attribute identifier, doubly indexed, with two 7bit indices Table 319 โ Six-bit attribute identifier, doubly indexed, with two 15bit indices Table 320 โ Six-bit attribute identifier, doubly indexed, withfirst index seven bits long and second index fifteen bits long Table 321 โ Six-bit attribute bit attribute identifier, doubly indexed, with first index fifteen bits long and second index seven bits long |
641 | Table 322 โ Twelve-bit attribute identifier, not indexed Table 323 โ Twelve-bit attribute identifier, singly indexed with 7bit index Table 324 โ Twelve-bit attribute identifier, singly indexed with 15bit index Table 325 โ Twelve-bit attribute identifier, doubly indexed with two 7bit indices |
642 | Table 326 โ Twelve-bit attribute identifier, doubly indexed with two 15bit indices Table 327 โ Twelve-bit attribute identifier, doubly indexedwith first index 7 bits long and second index 15 bits long Table 328 โ Twelve-bit attribute identifier, doubly indexedwith the first index 15 bits long and the second index 7 bits long Table 329 โ Twelve-bit attribute identifier, reserved form |
643 | Table 330 โ Coding rules for read service request Table 331 โ Coding rules for read service response with 7-bit size field Table 332 โ Coding rules for read service response with 15-bit size field |
644 | Table 333 โ Coding rules for write service request with 7bit size field Table 334 โ Coding rules for write service request with 15bit size field Table 335 โ Coding rules for write service response |
645 | Table 336 โ Coding rules for execute service request with 7bit size field Table 337 โ Coding rules for execute service request with 15bit size field Table 338 โ Coding rules for execute service response with 7-bit size field |
646 | Table 339 โ Coding rules for execute service response with 15-bit size field Table 340 โ Coding rules for tunnel service request with 7-bit size field Table 341 โ Coding rules for tunnel service request with 15-bit size field Table 342 โ Coding rules for tunnel service response with 7-bit size field |
647 | Table 343 โ Coding rules for tunnel service response with 15-bit size field Table 344 โ Coding rules for AlertReport service with 7-bit associated-data size field Table 345 โ Coding rules for AlertReport service with 15-bit associated-data size field |
648 | Table 346 โ Coding rules for AlertAcknowledge service Table 347 โ Coding rules for publish service for a native sequence of values Table 348 โ Coding rules for publish service โ non-native (for tunnel support) Table 349 โ Coding rules for concatenate service |
649 | 12.22.3 Coding of application data Table 350 โ General coding rule for size-invariant application data Table 351 โ General coding rule for size-varying application data of 0..255 octets |
651 | Table 352 โ Coding rules for Unsigned8 Table 353 โ Coding rules for Unsigned16 |
652 | Table 354 โ Coding rules for Unsigned32 Table 355 โ Coding rules for Unsigned64 |
653 | Table 356 โ Coding rules for Unsigned128 |
654 | Table 357 โ Coding rules for single-precision float Table 358 โ Coding rules for double-precision float |
655 | Table 359 โ Coding rules for VisibleString Table 360 โ Coding rules for OctetString |
656 | 12.22.4 Time-related data types Table 361 โ Coding rules for BitString |
657 | Table 362 โ Coding rules for TAINetworkTime,and for TAITimeDifference when interpreted as a modulo difference Table 363 โ Coding rules for TAITimeRounded |
659 | 12.23 Syntax 12.23.1 Application protocol data unit |
666 | 12.23.2 Alert reports and acknowledgments |
668 | 12.23.3 Service feedback code |
670 | 12.23.4 Read, write, and execute 12.23.5 Tunnel |
671 | 12.23.6 End of contained module 12.24 Detailed coding examples (informative) 12.24.1 Read 12.24.2 Tunnel Table 364 โ Coding example: Read request for a non-indexed attribute Table 365 โ Coding example: Read response for a non-indexed attribute Table 366 โ Coding example: Tunnel service request |
672 | 13 Provisioning 13.1 General 13.2 Terms and definitions for devices with various roles or states |
674 | 13.3 Provisioning procedures 13.4 Pre-installed symmetric keys |
675 | 13.5 Provisioning using out-of-band mechanisms 13.6 Provisioning networks 13.6.1 General |
676 | 13.6.2 Provisioning over-the-air using asymmetric cryptography Figure 135 โ The provisioning network |
677 | 13.6.3 Provisioning over-the-air using an open symmetric join key |
678 | 13.7 State transition diagrams Figure 136 โ State transition diagrams outlining provisioning steps during a device lifecycle |
679 | Table 367 โ Factory default settings |
681 | Figure 137 โ State transition diagram showing various paths to joining a secured network |
682 | 13.8 Device management application protocol objects used during provisioning |
683 | Figure 138 โ Provisioning objects and interactions |
685 | 13.9 Management objects 13.9.1 Device provisioning object Table 368 โ Device provisioning object (1 of 6) |
690 | 13.9.2 Device provisioning object methods and alerts Table 369 โ Reset_To_Default method |
691 | 13.10 Device provisioning service object 13.10.1 Device provisioning service object attributes Table 370 โ Write symmetric join key method |
692 | Table 371 โ Device provisioning service object (1 of 4) |
695 | 13.10.2 Device provisioning service object structured attributes |
696 | Table 372 โ DPSOWhiteListTbl data structure (1 of 2) |
697 | 13.10.3 Device provisioning service object methods |
698 | 13.10.4 Device provisioning service object alerts Table 373 โ Array manipulation table Table 374 โ DPSO alert to indicate join by a device not on the WhiteList |
699 | 13.10.5 Summary of attributes that can be provisioned 13.11 Provisioning functions (informative) 13.11.1 General Table 375 โ DPSO alert to indicate inadequate device join capability |
700 | 13.11.2 Examples of provisioning methods |
703 | Annexes Annex A (informative) User layer/application profiles A.1 Overview A.2 User layer A.3 Application profile |
705 | Annex B (normative) Communication role profiles B.1 Overview B.1.1 General B.1.2 Purpose B.1.3 System size B.1.4 Abbreviations and special symbols B.1.5 Role profiles |
706 | B.2 System B.3 System manager Table B.1 โ Protocol layer device roles Table B.2 โ Over-the-air upgrades |
707 | B.4 Security manager Table B.3 โ Session support profiles |
708 | B.5 Physical layer B.6 Data-link layer B.6.1 General Table B.4 โ Baseline profiles Table B.5 โ PhL roles |
709 | B.6.2 Role profiles Table B.6 โ DL required for listed roles |
710 | Table B.7 โ Role profiles: General DLMO attributes Table B.8 โ Role profiles: dlmo.Device_Capability |
711 | Table B.9 โ Role profiles: dlmo.Ch (channel-hopping) Table B.10 โ Role profiles: dlmo.TsTemplate Table B.11 โ Role profiles: dlmo.Neighbor |
712 | Table B.12 โ Role profiles: dlmo.NeighborDiag Table B.13 โ Role profiles: dlmo.Superframe Table B.14 โ Role profiles: dlmo.Graph |
713 | B.7 Network layer Table B.15 โ Role profiles: dlmo.Link Table B.16 โ Role profiles: dlmo.Route Table B.17 โ Role profiles: dlmo.Queue_Priority |
714 | B.8 Transport layer B.9 Application layer Table B.18 โ Routing table size Table B.19 โ Address table size Table B.20 โ Port support size Table B.21 โ APs |
715 | B.10 Provisioning B.11 Gateway (informative) Table B.22 โ Role profiles: I/O, routers, gateways, and backbone routers Table B.23 โ Role profile: Gateway Table B.24 โ Role profile: Gateway native access |
716 | Table B.25 โ Role profile: Gateway interworkable tunnel mechanism |
717 | Annex C (informative) Background information C.1 Industrial needs C.2 Usage classes C.2.1 General |
718 | C.2.2 Class examples Table C.1 โ Usage classes |
719 | C.2.3 Other uploading and downloading alarms (human or automated action) C.3 The Open Systems Interconnection Basic Reference Model C.3.1 Overview Figure C.1 โ OSI Basic Reference Model |
720 | C.3.2 Application layer |
721 | C.3.3 Transport layer C.3.4 Network layer C.3.5 Data-link layer C.3.6 Physical layer |
723 | Annex D (normative) Configuration defaults D.1 General D.2 System management Table D.1 โ System management configuration defaults |
724 | D.3 Security D.4 Data-link layer Table D.2 โ Security configuration defaults |
725 | Table D.3 โ DLE configuration defaults |
726 | D.5 Network layer D.6 Transport layer D.7 Application layer Table D.4 โ NLE configuration defaults Table D.5 โ TLE configuration defaults |
727 | Table D.6 โ ALE configuration defaults |
728 | D.8 Provisioning |
729 | D.9 Gateway (informative) Table D.7 โ Provisioning configuration defaults Table D.8 โ Gateway configuration defaults |
730 | Annex E (informative) Use of backbone networks E.1 General E.2 Recommended characteristics E.3 Internet protocol backbones E.3.1 Methods of IPv6 protocol data unit transmission |
731 | E.3.2 Backbone router peer device discovery E.3.3 Security |
733 | Annex F (normative) Basic security concepts โ Notation and representation F.1 Strings and string operations F.2 Integers, octets, and their representation F.3 Entities |
734 | Annex G (informative) Using certificate chains for over-the-air provisioning |
735 | Annex H (normative) Security building blocks H.1 Symmetric key cryptographic building blocks H.1.1 Overview H.1.2 Symmetric key domain parameters H.1.3 Block cipher H.1.4 Mode of operation H.1.5 Cryptographic hash function H.1.6 Keyed hash function for message authentication |
736 | H.1.7 Specialized keyed hash function for message authentication H.1.8 Challenge domain parameters H.2 Asymmetric-key cryptographic building blocks H.2.1 General H.2.2 Elliptic curve domain parameters H.2.3 Elliptic curve point representation H.2.4 Elliptic curve public-key pair H.3 Keying information H.3.1 General |
737 | H.3.2 Elliptic curve cryptography implicit certificates H.3.3 Elliptic curve cryptography manual certificates |
738 | H.3.4 Additional information H.4 Key agreement schemes H.4.1 Symmetric-key key agreement scheme H.4.2 Asymmetric-key key agreement scheme H.5 Keying information schemes H.5.1 Implicit certificate scheme |
739 | H.5.2 Manual certificate scheme H.6 Challenge domain parameter generation and validation H.6.1 Overview H.6.2 Challenge domain parameter generation H.6.3 Challenge domain parameter verification |
740 | H.7 Challenge validation primitive H.8 Secret key generation (SKG) primitive |
741 | H.9 Block-cipher-based cryptographic hash function |
742 | H.10 Elliptic curve cryptography manual certificate scheme H.10.1 Overview |
743 | H.10.2 Elliptic curve cryptography manual certificate generation transformation H.10.3 Elliptic curve cryptography manual certificate processing transformation |
745 | Annex I (informative) Definition templates I.1 Object type template I.2 Standard object attributes template Table I.1 โ Table of standard object types |
746 | I.3 Standard object methods Table I.2 โ Template for standard object attributes |
747 | I.4 Standard object alert reporting template Table I.3 โ Template for standard object methods |
748 | I.5 Data structure definition Table I.4 โ Template for standard object alert reporting |
749 | Table I.5 โ Template for data structures |
750 | Annex J (informative) Operations on attributes J.1 Operations on attributes J.1.1 General J.1.2 Attribute classification J.1.3 Retrieving, setting, and resetting attributes |
751 | J.1.4 Retrieving and setting structured attributes Table J.1 โ Scheduled_Write method template |
752 | Table J.2 โ Read_Row method template Table J.3 โ Write_Row method template |
753 | J.1.5 Resetting structured attribute values J.1.6 Deleting structured attribute values Table J.4 โ Reset_Row method template |
754 | J.2 Synchronized cutover Table J.5 โ Delete_Row method template |
755 | Annex K (normative) Standard object types |
756 | Table K.1 โ Standard object types |
758 | Table K.2 โ Standard object instances |
760 | Annex L (informative) Standard data types Table L.1 โ Standard data types |
762 | Annex M (normative) Identification of tunneled legacy fieldbus protocols Table M.1 โ Identification of tunneled legacy fieldbus protocols |
763 | Annex N (informative) Tunneling and native object mapping N.1 Overview N.2 Tunneling N.3 Foreign protocol application communication |
764 | N.4 Native object mapping N.5 Tunneling and native object mapping tradeoffs |
765 | Annex O (informative) Generic protocol translation O.1 Overview O.2 Publish Figure O.1 โ Generic protocol translation publish diagram |
766 | O.3 Subscribe Figure O.2 โ Generic protocol translation subscribe diagram |
767 | O.4 Client Figure O.3 โ Generic protocol translation client/server transmission diagram |
768 | O.5 Server Figure O.4 โ Generic protocol translation client/server reception diagram |
769 | Annex P (informative) Exemplary GIAP adaptations for this standard P.1 General P.2 Parameters P.3 Session P.4 Lease |
770 | P.5 Device list report P.6 Topology report P.7 Schedule report P.8 Device health report P.9 Neighbor health report P.10 Network health report P.11 Time P.12 Client/server P.12.1 General P.12.2 Native access |
771 | P.12.3 Foreign access P.13 Publish/subscribe P.13.1 General P.13.2 Native access |
772 | P.13.3 Foreign access P.14 Bulk transfer P.15 Alert |
773 | P.16 Gateway configuration P.17 Device configuration |
774 | Annex Q (informative) Exemplary GIAP adaptations for IEC 62591 Q.1 General Q.1.1 Overview Q.1.2 Reference Q.1.3 Addressing Q.1.4 Stack interface |
775 | Q.1.5 Tunneling Q.1.6 Entities Q.1.7 Delayed response Q.2 Parameters Q.3 Session |
776 | Q.4 Lease Q.5 Device list report Q.6 Topology report |
777 | Q.7 Schedule report Q.8 Device health report |
778 | Q.9 Neighbor health report Q.10 Network health report |
779 | Q.11 Time Q.12 Client/server |
780 | Q.13 Publish/subscribe Q.13.1 General Q.13.2 Lease establishment |
781 | Q.13.3 Buffering Q.14 Bulk transfer Q.15 Alert |
782 | Q.16 Gateway configuration Q.17 Device configuration |
783 | Annex R (informative) Host system interface to standard-compliant devices via a gateway R.1 Background R.1.1 Host system integration reference model R.1.2 Asset management tools R.1.3 Configuration tools Figure R.1 โ Host integration reference model |
784 | R.1.4 Distributed control system R.1.5 Gateway R.2 Device application data integration with host systems R.2.1 General R.2.2 Native protocol integration via mapping R.2.3 Legacy device protocol integration via tunneling R.3 Host system configuration tool R.3.1 General R.3.2 Host configuration using electronic device description language |
785 | R.3.3 Host configuration using field device tool/device type manager Figure R.2 โ Configuration using an electronic device definition |
786 | R.4 Field device/distributed control systems integration R.4.1 General R.4.2 Foundation Fieldbus High Speed Ethernet R.4.3 Modbus R.4.4 Open connectivity for industrial automation Figure R.3 โ Configuration using FDT/DTM approach |
787 | R.5 Gateway R.5.1 General R.5.2 Devices supported R.5.3 Data subscription R.5.4 Data publication R.5.5 Client/server access R.5.6 Alerts reception R.6 Asset management application support R.6.1 General |
788 | R.6.2 Field device tool / device type manager R.6.3 HART R.6.4 OPC |
789 | Annex S (informative) Symmetric-key operation test vectors S.1 DPDU samples S.1.1 General S.1.2 DPDU with expected DMIC32 S.1.3 DPDU with expected ENC-DMIC32 |
790 | S.2 TPDU samples S.2.1 General S.2.2 TPDU with expected ENC-TMIC-32: S.2.3 TPDU with expected TMIC-32: |
792 | Annex T (informative) Data-link and network headers for join requests T.1 Overview T.2 MAC header (MHR) T.3 DL header (DHR) Table T.1 โ Sample MHR for join request |
793 | T.4 NL header Table T.2 โ Sample DHR for join request Table T.3 โ Network header for join messages |
794 | Annex U (informative) Gateway role U.1 General U.1.1 Overview |
795 | U.1.2 Notional gateway protocol suite diagrams for native devices and adapters U.1.3 Gateway scenarios |
796 | Figure U.1 โ Gateway scenarios |
797 | U.1.4 Basic gateway model Figure U.2 โ Basic gateway model |
798 | U.2 Notional GIAP U.2.1 Summary of interfaces and primitives |
799 | Table U.1 โ Summary of notional gateway high-side interface examples |
801 | U.2.2 Sequence of primitives Figure U.3 โ Internal sequence of primitives for session interface Figure U.4 โ Internal sequence of primitives for lease management interface |
802 | Figure U.5 โ Internal sequence of primitives for system report interfaces Figure U.6 โ Internal sequence of primitives for time interface |
803 | Figure U.7 โ Internal sequence of primitives forclient/server interface initiated from gateway to an adapter device Figure U.8 โ Internal sequence of primitives forpublish interface initiated from gateway to an adapter device |
804 | Figure U.9 โ Internal sequence of primitives for subscribe interface initiated from an adapter device Figure U.10 โ Internal sequence of primitives forpublisher timer initiated from gateway to an adapter device Figure U.11 โ Internal sequence of primitives forsubscriber timers initiated from an adapter device |
805 | Figure U.12 โ Internal sequence of primitives for the bulk transfer interface Figure U.13 โ Internal sequence of primitives for the alert subscription interface |
806 | U.2.3 Detailed description of parameters Figure U.14 โ Internal sequence of primitives for the alert notification interface Figure U.15 โ Internal sequence of primitives for gateway management interfaces |
808 | U.2.4 Detailed description of interfaces Table U.2 โ Primitive G_Session parameter usage |
810 | Table U.3 โ GS_Status for G_Session confirm |
811 | Table U.4 โ Primitive G_Lease parameter usage |
812 | Table U.5 โ GS_Lease_Type for G_Lease request |
813 | Table U.6 โ GS_Status for G_Lease confirm |
814 | Table U.7 โ Primitive G_Device_List_Report parameter usage |
815 | Table U.8 โ GS_Status for G_Device_List_Report confirm Table U.9 โ Primitive G_Topology_Report parameter usage |
817 | Table U.10 โ Primitive G_Schedule_Report parameter usage |
819 | Table U.11 โ Primitive G_Device_Health_Report parameter usage |
820 | Table U.12 โ Primitive G_Neighbor_Health_Report parameter usage |
822 | Table U.13 โ Primitive G_Network_Health_Report parameter usage |
824 | Table U.14 โ Primitive G_Time parameter usage Table U.15 โ GS_Status for G_Time confirm |
825 | Table U.16 โ Primitive G_Client_Server parameter usage |
826 | Table U.17 โ GS_Status for G_Client_Server confirm |
828 | Table U.18 โ Primitive G_Publish parameter usage |
829 | Table U.19 โ GS_Status for G_Publish confirm Table U.20 โ Primitive G_Subscribe parameter usage |
830 | Table U.21 โ GS_Status for G_Subscribe confirm Table U.22 โ Primitive G_Publish_Timer parameter usage Table U.23 โ Primitive G_Subscribe_Timer parameter usage |
831 | Table U.24 โ Primitive G_Publish_Watchdog parameter usage |
832 | Table U.25 โ Primitive G_Bulk_Open parameter usage |
833 | Table U.26 โ GS_Status for G_Bulk_Open confirm Table U.27 โ Primitive G_Bulk_Transfer parameter usage Table U.28 โ GS_Status for G_Bulk_Transfer confirm |
834 | Table U.29 โ Primitive G_Bulk_Close parameter usage |
835 | Table U.30 โ Primitive G_Alert_Subscription parameter usage |
836 | Table U.31 โ GS_Status for G_Alert_Subscription confirm Table U.32 โ Primitive G_Alert_Notification parameter usage |
837 | Table U.33 โ Primitive G_Read_Gateway_Configuration parameter usage |
838 | Table U.34 โ GS_Attribute_Identifier values for G_Read_Gateway_Configuration request Table U.35 โ Primitive G_Write_Gateway_Configuration parameter usage |
839 | Table U.36 โ GS_Attribute_Identifier values for G_Write_Gateway_Configuration request Table U.37 โ GS_Status for G_Write_Gateway_Configuration confirm |
840 | Table U.38 โ Primitive G_Write_Device_Configuration parameter usage |
841 | Table U.39 โ GS_Status for G_Write_Device_Configuration confirm Table U.40 โ Primitive G_Read_Device_Configuration parameter usage |
842 | U.3 Example uses of WISN standard services and objects U.3.1 Tunneling Figure U.16 โ Tunnel object model |
843 | Figure U.17 โ Distributed tunnel endpoints |
844 | Figure U.18 โ Multicast, broadcast, and one-to-many messaging |
845 | Figure U.19 โ Tunnel object buffering |
848 | Figure U.20 โ Publish/subscribe publisher CoSt flowchart Figure U.21 โ Publish/subscribe publisher periodic flowchart |
849 | Figure U.22 โ Publish/subscribe subscriber common periodic and CoSt flowchart |
850 | Figure U.23 โ Network address mappings |
851 | Figure U.24 โ Connection_Info usage in protocol translation |
852 | Figure U.25 โ Transaction_Info usage in protocol translation |
853 | Figure U.26 โ Interworkable tunneling mechanism overview diagram |
855 | U.3.2 Bulk transfer |
856 | U.3.3 Alerts Figure U.27 โ Bulk transfer model |
857 | Figure U.28 โ Alert model |
858 | U.3.4 Native publish/subscribe and client/server access Figure U.29 โ Alert cascading |
859 | U.3.5 Time management Figure U.30 โ Native publish/subscribe and client/server access |
860 | U.3.6 Security U.3.7 Configuration |
861 | U.3.8 Provisioning and joining Table U.41 โ Example of gateway configuration management attributes |
862 | Annex V (informative) Compliance with ETSI EN 300 328 v1.8.1 |
866 | Bibliography |