BSI PD IEC/PAS 62734:2012
$215.11
Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications
Published By | Publication Date | Number of Pages |
BSI | 2012 | 832 |
IEC/PAS 62734:2012(E) defines the OSI layer specifications (e.g., PhL, DL, etc.), security specifications, and management (including network and device configuration) specifications for wireless devices serving application classes 1 through 5 and optionally class 0 for fixed, portable, and moving devices. It addresses the performance needs for periodic monitoring and process control where latencies on the order of 100 ms can be tolerated, with optional behavior for shorter latency.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
26 | FOREWORD |
28 | INTRODUCTION |
30 | 1 Scope 2 Normative references |
31 | 3 Terms, definitions, abbreviated terms, acronyms and conventions 3.1 (N)-layer and other terms and definitions from the open systems interconnection basic reference model |
36 | 3.2 Other terms and definitions |
51 | 3.3 Symbols |
52 | 3.4 Abbreviated terms and acronyms |
60 | 3.5 IEC service table conventions |
61 | 4 Overview 4.1 General 4.2 Interoperability 4.3 Quality of service 4.4 Worldwide applicability |
62 | 4.5 Network architecture |
63 | Figures Figure 1 โ Standard-compliant network |
64 | 4.6 Network characteristics Figure 2 โ Single protocol data unit Figure 3 โ Full protocol data unit |
69 | 5 Systems 5.1 General 5.2 Devices |
71 | Figure 4 โ Physical devices versus roles |
75 | Figure 5 โ Notional representation of device phases |
76 | 5.3 Networks |
77 | Figure 6 โ Simple star topology |
78 | Figure 7 โ Simple hub-and-spoke topology |
79 | Figure 8 โ Mesh topology |
80 | Figure 9 โ Simple star-mesh topology |
81 | Figure 10 โ Network and DL subnet overlap |
82 | Figure 11 โ Network and DL subnet differ |
83 | Figure 12 โ Network with multiple gateways |
84 | Figure 13 โ Basic network with backup gateway |
85 | Figure 14 โ Network with backbone |
86 | 5.4 Protocol suite structure Figureย 15 โ Network with backbone โ device roles |
87 | 5.5 Data flow Figure 16 โ Reference model |
88 | Figure 17 โ Basic data flow |
89 | Figure 18 โ Data flow between I/O devices |
90 | Figure 19 โ Data flow with legacy I/O device Figure 20 โ Data flow with backbone |
91 | Figure 21 โ Data flow between I/O devices via backbone |
92 | 5.6 Time reference Figure 22 โ Data flow to standard-aware control system |
93 | 5.7 Firmware upgrades 5.8 Wireless backbones and other infrastructures |
94 | 6 System management 6.1 General |
95 | Figure 23 โ Management architecture |
96 | 6.2 Device management application process |
98 | Figure 24 โ DMAP |
99 | Tables Table 1 โ Standard management object types in DMAP |
100 | Figure 25 โ Example of management SAP flow through standard protocol suite |
101 | Table 2 โ Meta_Data_Attribute data structure |
102 | Table 3 โ Alert types for communication diagnostic category |
103 | Table 4 โ Alert types for security alert category Table 5 โ Alert types for device diagnostic alert category Table 6 โ Alert types for process alert category |
105 | Table 7 โ ARMO attributes |
108 | Table 8 โ ARMO alerts |
109 | Table 9 โ Alarm_Recovery method |
112 | Tableย 10 โ DMO attributes |
118 | Table 11 โ DMO alerts |
119 | 6.3 System manager |
120 | Figure 26 โ System manager architecture concept |
121 | Table 12 โ System management object types |
123 | Table 13 โ DSO attributes Table 14 โ Address_Translation_Row data structure |
124 | Table 15 โ Read_Address_Row method |
125 | Table 16 โ Input argument usage Table 17 โ Output argument usage |
127 | Table 18 โ Attributes of SMO in system manager |
129 | Table 19 โ Proxy_System_Manager_Join method |
130 | Table 20 โ Proxy_System_Manager_Contract method |
131 | Table 21 โ Effect of Different Join Commands on Attribute Sets |
132 | Table 22 โ Attributes of DMSO in system manager |
133 | Table 23 โ System_Manager_Join method |
134 | Table 24 โ System_Manager_Contract method |
138 | Table 25 โ Attributes of STSO in system manager |
139 | Figure 27 โ UAP-system manager interaction during contract establishment |
141 | Figure 28 โ Contract-related interaction between DMO and SCO Table 26 โ Attributes of SCO in system manager |
144 | Table 27 โ SCO method for contract establishment, modification, or renewal |
149 | Table 28 โ Input argument usage |
150 | Table 29 โ Output argument usage |
151 | Figure 29 โ Contract source, destination, and intermediate devices |
153 | Table 30 โ Contract_Data data structure |
156 | Table 31 โ New_Device_Contract_Response data structure |
159 | Figure 30 โ Contract establishment example |
160 | Figure 31 โ Contract ID usage in source |
162 | Table 32 โ SCO method for contract termination, deactivation and reactivation Table 33 โ DMO method to terminate contract |
163 | Figure 32 โ Contract termination |
164 | Table 34 โ DMO method to modify contract |
165 | Figure 33 โ Contract modification with immediate effect |
166 | 7 Security 7.1 General |
167 | 7.2 Security services Figure 34 โ Examples of DPDU and TPDU scope |
171 | 7.3 Frame security Table 35 โ Security levels |
172 | Table 36 โ Structure of the security control field |
173 | Figure 37 โ DPDU structure |
174 | Figure 38 โ Outgoing messages โ DL and security |
176 | Figure 39 โ Incoming messages- DL and security |
177 | Table 37 โ Sec.DpduPrep.Request elements |
178 | Table 38 โ Sec.DpduPrep.Response elements Table 39 โ Sec.DLAckCheck.Request elements |
179 | Table 40 โ Sec. DLAckCheck.Response elements |
180 | Table 41 โ Sec.DpduCheck.Request elements |
181 | Table 42 โ Sec.DpduCheck.Response elements Table 43 โ Sec.DLAckPrep.Request elements |
182 | Table 44 โ Sec.DLAckPrep.Response elements |
183 | Table 45 โ Structure of the WISN DPDU nonce Table 46 โ Structure of the 32-bit truncated TAI time |
187 | Figure 40 โ TPDU structure and protected coverage |
188 | Figure 41 โ TMIC parameters Table 47 โ TSS โpseudo-headerโ structure |
189 | Figure 42 โ Transport layer and security sub-layer interaction, outgoing TPDU |
190 | Figure 43 โ Transport layer and security sub-layer interaction, incoming TPDU |
191 | Table 48 โ Sec.TpduOutCheck.Request elements Table 49 โ Sec.TpduOutCheck.Response elements |
192 | Table 50 โ Sec.TpduSecure.Request elements |
193 | Table 51 โ Sec. TpduSecure.Response elements |
194 | Table 52 โ Sec.TpduInCheck.Request elements |
195 | Table 53 โ Sec.TpduInCheck.Response elements Table 54 โ Sec.TpduVerify.Request elements |
196 | Table 55 โ Sec.TpduVerify.Response elements |
197 | Table 56 โ Structure of TL security header |
198 | Table 57 โ Structure of the TPDU nonce Table 58 โ Structure of 32-bit nominal TAI time |
202 | 7.4 The join process |
207 | Figure 44 โ Example: Overview of the symmetric key join process Figure 45 โ Example: Overview of the symmetric key join process of backbone device |
209 | Table 59 โ Proxy_Security_Sym_Join method |
210 | Table 60 โ Security_Sym_Join method Table 61 โ Security_Confirm method |
211 | Table 62 โ Security_Sym_Join_Request data structure |
212 | Table 63 โ Security_Sym_Join_Response data structure |
213 | Table 64 โ Structure of compressed Security level field |
214 | Table 65 โ Master key security level Table 66 โ Structure of KeyHardLifeSpan field |
215 | Table 67 โ Security_Sym_Confirm data structure |
216 | Table 68 โ Implicit certificate format |
217 | Figure 46 โ Asymmetric key-authenticated key agreement scheme Table 69 โ Usage_Serial structure |
220 | Figure 47 โ Example: Overview of the asymmetric key join processfor a device with a data link layer |
221 | Figure 48 โ Example: Overview of the asymmetric key join processof a backbone device |
222 | Table 70 โ Proxy_Security_Pub_Join method Table 71 โ Security_Pub_Join method |
223 | Table 72 โ Proxy_Security_Pub_Confirm method |
224 | Table 73 โ Security_Pub_Confirm method Table 74 โ Network_Information_Confirmation method |
225 | Table 75 โ Format of asymmetric join request internal structure Table 76 โ Format of the protocol control field |
226 | Table 77 โ Format of asymmetric join response internal structure |
227 | Table 78 โ Format of first join confirmation internal structure |
228 | Table 79 โ Format of join confirmation response internal structure |
230 | Figure 49 โ Device state transitions for join process and device lifetime Table 80 โ Join process and device lifetime state machine |
231 | 7.5 Session establishment Figure 50 โ High-level example of session establishment |
233 | Table 81 โ Security_New_Session method |
234 | Table 82 โ Security_New_Session_Request data structure |
236 | Table 83 โ Security_New_Session_Response data structure |
237 | 7.6 Key update Figure 51 โ Key update protocol overview |
238 | Table 84 โ New_Key method |
239 | Table 85 โ Security_Key_and_Policies data structure |
241 | Table 86 โ Security_Key_Update_Status data structure |
243 | Table 87 โ Session and DL key state transition |
244 | 7.7 Security manager functionality Figure 52 โ Device session establishment and key update state transition Table 88 โ Attributes of PSMO in the system manager |
246 | 7.8 Security policies |
247 | Table 89 โ Structure of Policy field Table 90 โ Key types Table 91 โ Key usage |
248 | Table 92 โ Granularity |
249 | 7.9 Security functions available to the application layer |
252 | 7.10 Security statistics collection, threat detection, and reporting 7.11 Device security management object functionality |
253 | Table 93 โ Device security management object attributes |
255 | Table 94 โ KeyDescriptor (INFORMATIVE) |
256 | Table 95 โ TL KeyLookupData OctetString fields |
257 | Table 96 โ Delete key method |
259 | Table 97 โ Key_Policy_Update method |
260 | 8 Physical layer 8.1 General Table 98 โ DSMO Alerts |
261 | 8.2 Default physical layer Table 99 โ Timing requirements |
262 | 9 Data link layer 9.1 General |
264 | Figure 53 โ DL protocol suite and PPDU/DPDU structure |
266 | Figure 54 โ Graph routing example |
267 | Table 100 โ Graph table on ND20 Table 101 โ Graph table on ND21 |
268 | Figureย 55 โ Inbound and outbound graphs |
272 | Figure 56 โ Slotted hopping Figure 57 โ Slow hopping |
273 | Figure 58 โ Hybrid operation |
274 | Figure 59 โ Radio spectrum usage |
276 | Figure 60 โ Default hopping pattern 1 Figure 61 โ Two groups of devices with different hopping pattern offsets |
277 | Figure 62 โ Interleaved hopping pattern 1 with 16 different hopping pattern offsets |
278 | Figure 63 โ Slotted hopping |
279 | Figure 64 โ Slow hopping |
280 | Figure 65 โ Hybrid mode with slotted and slow hopping Figure 66 โ Combining slotted hopping and slow hopping |
281 | Figure 67 โ Example of a three-timeslot superframe Figure 68 โ Superframes and links |
282 | Figure 69 โ Multiple superframes, with timeslots aligned |
286 | Figure 70 โ Slotted hopping |
287 | Figure 71 โ Slow hopping Figure 72 โ Components of a slow hop |
288 | Figure 73 โ Avoiding collisions among routers |
289 | Figure 74 โ Hybrid configuration |
291 | Figure 75 โ Timeslot allocation and the message queue |
294 | Figure 76 โ 250ย ms alignment intervals |
295 | Figure 77 โ Timeslot durations and timing |
296 | Table 102 โ Approximating nominal timing with 32ย kHz clock (INFORMATIVE) |
300 | Figure 78 โ Clock source acknowledges receipt of DPDU |
302 | Figure 79 โ Transaction timing attributes |
303 | Figure 80 โ Dedicated and shared transaction timeslots |
304 | Figure 81 โ Unicast transaction |
306 | Figure 82 โ PDU wait time (PWT) |
307 | Figure 83 โ Duocast support in the standard |
308 | Figure 84 โ Duocast transaction |
309 | Figure 85 โ Shared timeslots with CSMA-CA |
310 | Figure 86 โ Transaction during slow-hopping periods |
313 | Figure 87 โ DL management SAP flow through standard protocol suite |
322 | Table 103 โ DL_Config_Info structure |
328 | 9.2 Data link layer data service access point |
329 | Table 104 โ DDData.request parameters |
330 | Table 105 โ DDData.confirm parameters Table 106 โ Value set for status parameter |
331 | 9.3 Data frames and acknowledgements Figure 88 โ PPDU and DPDU structure Table 107 โ DDData.indication parameters |
333 | Table 108 โ ExtDLUint, one-octet variant Table 109 โ ExtDLUint, two-octet variant |
334 | Table 110 โ Data frame MHR |
335 | Table 111 โ DHDR frame control octet Table 112 โ Data frame DMXHR |
336 | Table 113 โ DROUT structure, compressed variant |
337 | Table 114 โ DROUT structure, uncompressed variant |
338 | Table 115 โ DADDR structure |
339 | Figure 89 โ Typical acknowledgement frame layout Table 116 โ Acknowledgement frame MHR |
340 | Table 117 โ Acknowledgement frame DHR |
341 | Table 118 โ DHR ACK/NACK frame control |
342 | Table 119 โ Advertisement DAUX structure |
343 | Table 120 โ Advertisement selections elements Table 121 โ Advertisement selections Table 122 โ Advertisement time synchronization elements |
344 | Table 123 โ Advertisement time synchronization structure |
345 | Table 124 โ Join superframe information subfields Table 125 โ Join superframe information structure |
346 | Table 126 โ Superframe derived from advertisement Table 127 โ Join information elements |
347 | Table 128 โ Join information structure |
348 | Table 129 โ Defaults for links created from advertisements |
349 | Table 130 โ dlmo.Neighbor entry created from advertisements Table 131 โ dlmo.Graph entry created from advertisements Table 132 โ dlmo.Route entry created from advertisements |
351 | Table 133 โ Solicitation header subfields Table 134 โ Solicitation header structure Table 135 โ Solicitation DAUX fields |
352 | Table 136 โ Solicitation DAUX structure |
353 | Table 137 โ Activate link DAUX fields Table 138 โ Activate link DAUX structure |
354 | 9.4 Data link layer management information base Table 139 โ Reporting received signal quality DAUX fields Table 140 โ Report received signal quality DAUX structure |
355 | Table 141 โ DLMO attributes |
363 | Table 142 โ Subnet filter octets Table 143 โ dlmo.TaiAdjust OctetString fields Table 144 โ dlmo.TaiAdjust OctetString structure |
364 | Table 145 โ dlmo.EnergyDesign OctetString fields Table 146 โ dlmo.EnergyDesign OctetString structure Table 147 โ dlmo.DeviceCapability OctetString fields |
365 | Table 148 โ dlmo.DeviceCapability OctetString structure |
366 | Table 149 โ dlmo.DiscoveryAlert fields Table 150 โ dlmo.DiscoveryAlert structure |
367 | Table 151 โ dlmo.Candidates OctetString fields |
368 | Table 152 โ dlmo.Candidates structure |
369 | Table 153 โ dlmo.SmoothFactors OctetString fields Table 154 โ dlmo.SmoothFactors structure Table 155 โ dlmo.QueuePriority fields |
370 | Table 156 โ dlmo.QueuePriority structure |
371 | Table 157 โ dlmo.ChannelDiag fields Table 158 โ dlmo.ChannelDiag structure |
372 | Figure 90 โ Relationship among DLMO indexed attributes |
373 | Table 159 โ dlmo.Ch fields Table 160 โ dlmo.Ch structure |
376 | Table 161 โ Receive template fields Table 162 โ Receive template structure |
377 | Table 163 โ Transmit template fields Table 164 โ Transmit template structure |
378 | Table 165 โ Default receive template Table 166 โ Default transmit template Table 167 โ Default receive template for scanning |
380 | Table 168 โ dlmo.Neighbor fields Table 169 โ dlmo.Neighbor structure |
382 | Table 170 โ ExtendGraph fields Table 171 โ ExtGraph structure Table 172 โ dlmo.NeighborDiagReset fields |
383 | Table 173 โ dlmo.NeighborDiagReset structure |
384 | Table 174 โ dlmo.Superframe fields Table 175 โ dlmo.Superframe structure |
388 | Table 176 โdlmo.SuperframeIdle fields Table 177 โ dlmo.SuperframeIdle structure |
389 | Table 178 โ dlmo.Graph Table 179 โ dlmo.Graph structure |
390 | Table 180 โ dlmo.Link fields |
391 | Table 181 โ dlmo.Link structure |
392 | Table 182 โ dlmo.Link[].Type structure |
393 | Table 183 โ Allowed dlmo.Link[].Type combinations |
394 | Table 184 โ Values for dlmo.Link[].Schedule Table 185 โ dlmo.Route fields |
395 | Table 186 โ dlmo.Route structure |
396 | Table 187 โ dlmo.NeighborDiag fields Table 188 โ Diagnostic Summary OctetString fields |
397 | Table 189 โ Diagnostic Summary OctetString structure Table 190 โ Diagnostic ClockDetail OctetString fields |
398 | 9.5 Data link layer methods Table 191 โ Diagnostic ClockDetail OctetString structure |
399 | Table 192 โ Read_Row method Table 193 โ Write_Row method |
400 | 9.6 Data link layer alerts Table 194 โ Write_Row_Now method |
401 | Table 195 โ dlmo.AlertPolicy fields Table 196 โ dlmo.AlertPolicy OctetString structure |
402 | Table 197 โ DL_Connectivity alert Table 198 โ DL_Connectivity alert OctetString |
403 | 10 Network layer 10.1 General 10.2 Network layer functionality overview Table 199 โ NeighborDiscovery alert |
404 | Table 200 โ Link local address structure |
405 | Table 201 โ Address translation table (ATT) |
406 | Figure 91 โ Address translation process |
408 | Figure 92 โ Fragmentation process |
409 | Figure 93 โ Reassembly process |
410 | Table 202 โ Example of a routing table |
411 | Figure 94 โ Processing of a NSDU received from the transport layer |
412 | Figure 95 โ Processing of an incoming NPDU |
413 | Figure 96 โ Processing of a NPDU received from the backbone |
414 | Figure 97 โ Delivery of an incoming NPDU at its final destination Figure 98 โ Routing from a field device to a gateway on field โ no backbone routing |
415 | Figure 99 โ Protocol suite diagram for routing from a field device to a gateway on field โ no backbone routing |
416 | Figure 100 โ Routing a PDU from a field device to a gateway via a backbone router Figure 101 โ Protocol suite diagram for routing a PDU from a field deviceto a gateway via a backbone router |
418 | Figure 102 โ Routing from a field device on one subnet to another field deviceon a different subnet |
419 | Figure 103 โ Protocol suite diagram for routing from an I/O deviceon one subnet to another I/O device on a different subnet |
420 | Figure 104 โ Routing over an Ethernet backbone network |
421 | 10.3 Network layer data services Figure 105 โ Routing over a fieldbus backbone network |
422 | Table 203 โ NData.request elements Table 204 โ NData.confirm elements |
423 | Table 205 โ NData.indication elements |
424 | 10.4 Network layer management object |
425 | Table 206 โ NLMO attributes |
428 | Table 207 โ Contract table structure |
429 | Table 208 โ Route table elements Table 209 โ Address translation table structure |
431 | Table 210 โ NLMO structured MIB manipulation methods |
432 | 10.5 Network layer protocol data unit formats Table 211 โ Alert to indicate dropped PDU/PDU error |
433 | Figure 106 โ Distinguishing between NPDU header formats Table 212 โ Common header patterns |
434 | Table 213 โ Basic network layer header format |
435 | Table 214 โ Contract-enabled network layer header format |
436 | Table 215 โ 6LoWPAN_IPHC encoding format |
437 | Table 216 โ IPv6 network layer header format |
438 | Table 217 โ Full network layer header in the DL Table 218 โ Network layer header format for fragmented NPDUs |
439 | 11 Transport layer 11.1 General Table 219 โ First fragment header format Table 220 โ Second and subsequent fragment header format |
440 | 11.2 Transport layer reference model Figure 107 โ Transport layer reference model |
441 | 11.3 Transport security sub-layer 11.4 Transport data entity |
442 | Figure 108 โ UDP โpseudo-headerโ for IPv6 Table 221 โ UDP header encoding |
445 | 11.5 Transport layer protocol data unit encoding Figure 109 โ Transport layer protocol data unit |
446 | Table 222 โ UDP LowPAN_NHC encoding Table 223 โ Optimal UDP header encoding |
447 | 11.6 Transport layer model Table 224 โ UDP header encoding with checksum |
448 | Table 225 โ TData.request elements |
449 | Table 226 โ TData.confirm elements Table 227 โ TData.confirm status codes |
450 | Table 228 โ TData.indication elements |
452 | Table 229 โ TLMO attributes |
454 | Table 230 โ Transport layer management object methods โ Reset Table 231 โ Transport layer management object methods โ Halt |
455 | Table 232 โ Transport layer management object methods โ PortRangeInfo Table 233 โ Transport layer management object methods โ GetPortInfo |
456 | Table 234 โ Transport layer management object methods โ GetNextPortInfo Table 235 โ Transport layer management object alert types โ Illegal use of port |
457 | 12 Application layer 12.1 General Table 236 โ Transport layer management object alert types โTPDU received on unregistered port Table 237 โ Transport layer management object alert types โTPDU does not match security policies |
458 | 12.2 Energy considerations 12.3 Legacy control system considerations |
459 | 12.4 Introduction to object-oriented modeling |
460 | Figure 110 โ User application objects in a user application process |
461 | 12.5 Object model |
462 | 12.6 Object attribute model |
464 | 12.7 Method model |
465 | 12.8 Alert model 12.9 Alarm state model Table 238 โ State table for alarm transitions |
466 | 12.10 Event state model Figure 111 โ Alarm state model Table 239 โ State table for event transitions |
467 | 12.11 Alert reporting Figure 112 โ Event model |
469 | 12.12 Communication interaction model |
472 | Figure 113 โ A successful example of multiple outstanding requests,with response concatenation |
473 | Figure 114 โ An example of multiple outstanding unordered requests,with second write request initially unsuccessful |
474 | Figure 115 โ An example of multiple outstanding ordered requests,with second write request initially unsuccessful |
476 | Figure 116 โ Send window example 1, with current send window smallerthan maximum send window |
477 | Figure 117 โ Send window example 2, with current send window the same sizeas maximum send window, and non-zero usable send window width Figure 118 โ Send window example 3, with current send window the same sizeas maximum send window, and usable send window width of zero (0) |
479 | 12.13 Application layer addressing Figure 119 โ General addressing model |
482 | 12.14 Management objects 12.15 User objects |
484 | Table 240 โ UAP management object attributes |
485 | Table 241 โ State table for UAP management object |
486 | Figure 120 โ UAP management object state diagram Table 242 โ UAP management object methods |
487 | Table 243 โ Alert receiving object attributes Table 244 โ State table for handling an AlertReport reception |
488 | Figure 121 โ Alert report reception state diagram Figure 122 โ Alert reporting example Table 245 โ AlertReceiving object methods |
490 | Table 246 โ UploadDownload object attributes |
494 | Table 247 โ UploadDownload object methods |
495 | Table 248 โ UploadDownload object StartDownload method |
496 | Table 249 โ UploadDownload object DownloadData method |
498 | Table 250 โ UploadDownload object EndDownload method |
499 | Table 251 โ UploadDownload object StartUpload method |
500 | Table 252 โ UploadDownload object UploadData method |
501 | Table 253 โ UploadDownload object EndUpload method |
503 | Table 254 โ Download state table for unicast operation mode |
504 | Figure 123 โ Upload/Download object download state diagram |
505 | Table 255 โ Upload state table for unicast operation mode |
506 | Figure 124 โ Upload/Download object upload state diagram |
508 | Table 256 โ Concentrator object attributes |
509 | Table 257 โ Concentrator object methods |
510 | Table 258 โ Dispersion object attributes |
511 | Table 259 โ Dispersion object methods |
512 | Table 260 โ Tunnel object attributes |
514 | Table 261 โ Tunnel object methods |
515 | 12.16 Data types Table 262 โ Interface object attributes Table 263 โ Interface object methods |
516 | Table 264 โ Data type: ObjectAttributeIndexAndSize |
517 | Table 265 โ Data type: Communication association endpoint |
518 | Table 266 โ Data type: Communication contract data |
519 | Table 267 โ Data type: Alert communication endpoint Table 268 โ Data type: Tunnel endpoint |
520 | Table 269 โ Data type: Alert report descriptor Table 270 โ Data type: Process control alarm report descriptor for analogwith single reference condition |
521 | 12.17 Application services provided by application sub-layer Table 271 โ Data type: ObjectIDandType Table 272 โ Data type: Unscheduled correspondent |
522 | Table 273 โ AL services |
524 | Figure 125 โ Publish sequence of service primitives |
526 | Table 274 โ Publish service |
529 | Figure 126 โ Client/server model two-part interactions |
530 | Figure 127 โ Client/server model four-part interactions: Successful delivery Figure 128 โ Client/server model four-part interactions: Request delivery failure |
531 | Figure 129 โ Client/server model four-part interactions: Response delivery failure |
533 | Table 275 โ Read service |
537 | Table 276 โ Write service |
541 | Table 277 โ Execute service |
545 | Figure 130 โ AlertReport and AlertAcknowledge, delivery success |
546 | Figure 131 โ AlertReport, delivery failure Figure 132 โ Alert Report, acknowledgment failure |
547 | Table 278 โ AlertReport service |
550 | Table 279 โ AlertAcknowledge service |
553 | Figure 133 โ Concatenated response for multiple outstandingwrite requests (no message loss) |
554 | Table 280 โ Tunnel service |
557 | 12.18 Application layer flow use to lower layer services Table 281 โ Application flow characteristics |
558 | 12.19 Application layer management Table 282 โ Application service primitive to transport service primitive mapping |
559 | Figure 134 โ Management and handling of malformed APDUs received from device X |
560 | Table 283 โ ASLMO attributes |
561 | Table 284 โ Application sub-layer management object methods |
562 | Table 285 โReset method |
563 | Table 286 โ ASLMO alerts |
566 | Table 287 โ Analog input object attributes |
567 | Table 288 โ Analog input object methods |
568 | Table 289 โ Analog input alerts |
569 | Table 290 โ Analog output attributes |
570 | Table 291 โ Analog output object methods |
571 | Table 292 โ Analog output alerts |
573 | Table 293 โ Binary input object attributes |
574 | Table 294 โ Binary input object methods Table 295 โ Binary input alerts |
575 | Table 296 โ Binary output attributes |
576 | Table 297 โ Binary output object methods Table 298 โ Binary output alerts |
577 | 12.20 Process control industry standard data structures |
578 | Table 299 โ Status octet Table 300 โ Data type: Process value and status for analog value |
579 | Table 301 โ Data type: Process value and status for binary value Table 302 โ Data type: Process control mode |
580 | 12.21 Additional tables Table 303 โ Data type: Process control mode bitstring Table 304 โ Data type: Process control scaling |
581 | 12.22 Coding Table 305 โ Process control standard objects Table 306 โ Services |
582 | Table 307 โ Application messaging format Table 308 โ Concatenated APDUs in a single TSDU Table 309 โ Object addressing |
583 | Table 310 โ Four-bit addressing mode APDU header construction Table 311 โ Eight-bit addressing mode APDU header construction Table 312 โ Sixteen-bit addressing mode APDU header construction |
584 | Table 313 โ Inferred addressing use case example Table 314 โ Inferred addressing mode APDU header construction |
585 | Table 315 โ Six-bit attribute identifier, not indexed Table 316 โ Six-bit attribute identifier, singly indexed, with seven-bit index Table 317 โ Six-bit attribute identifier, singly indexed, with fifteen-bit index Table 318 โ Six-bit attribute identifier, doubly indexed, with two seven-bit indices |
586 | Table 319 โ Six-bit attribute identifier, doubly indexed, with two fifteen-bit indices Table 320 โ Six-bit attribute identifier, doubly indexed,with first index seven-bits long and second index fifteen bits long Table 321 โ Six-bit attribute bit attribute identifier, doubly indexed,with first index fifteen bits long and second index seven bits long Table 322 โ Twelve-bit attribute identifier, not indexed |
587 | Table 323 โ Twelve-bit attribute identifier, singly indexed with seven-bit index Table 324 โ Twelve-bit attribute identifier, singly indexed with fifteen bit identifier Table 325 โ Twelve-bit attribute identifier, doubly indexed with two seven bit indices Table 326 โ Twelve-bit attribute identifier, doubly indexed with two fifteen bit indices Table 327 โ Twelve-bit attribute identifier, doubly indexed with first index seven-bits long and second index fifteen-bits long |
588 | Table 328 โ Twelve-bit attribute identifier, doubly indexed with the first index fifteen bits long and the second index seven bits long Table 329 โ Twelve-bit attribute identifier, reserved form Table 330 โ Coding rules for read service request Table 331 โ Coding rules for read service response with seven bit length field |
589 | Table 332 โ Coding rules for read service response with fifteen-bit length field Table 333 โ Coding rules for write service request with seven bit length field Table 334 โ Coding rules for write service request with fifteen-bit length field Table 335 โ Coding rules for write service response |
590 | Table 336 โ Coding rules for execute service request with seven-bit length field Table 337 โ Coding rules for execute service request with fifteen-bit length field Table 338 โ Coding rules for execute service response with 7-bit length field Table 339 โ Coding rules for execute service response with 15-bit length field |
591 | Table 340 โ Coding rules for tunnel service request with seven-bit length field Table 341 โ Coding rules for tunnel service request with fifteen-bit length field Table 342 โ Coding rules for tunnel service response with seven-bit length field Table 343 โ Coding rules for tunnel service response with fifteen-bit length field |
592 | Table 344 โ Coding rules for AlertReport service with seven bit length field Table 345 โ Coding rules for AlertReport service with fifteen-bit length field Table 346 โ Coding rules for AlertAcknowledge service |
593 | Table 347 โ Coding rules for publish service for a native sequence of values Table 348 โ Coding rules for publish service โ non-native (for tunnel support) Table 349 โ Coding rules for concatenate service Table 350 โ General coding rule for size-invariant application data |
594 | Table 351 โ Coding rules for application data of varying size Table 352 โ Coding rules for Boolean data โ true Table 353 โ Coding rules for Boolean data โ false |
595 | Table 354 โ Coding rules for Unsigned8 Table 355 โ Coding rules for Unsigned16 |
596 | Table 356 โ Coding rules for Unsigned32 Table 357 โ Coding rules for Unsigned64 |
597 | Table 358 โ Coding rules for Unsigned128 Table 359 โ Coding rules for Float |
598 | Table 360 โ Coding rules for double-precision float Table 361 โ Coding rules for VisibleString Table 362 โ Coding rules for OctetString |
599 | Table 363 โ Coding rules for Bitstring Table 364 โ Example of coding for Bitstring of size 8 |
600 | Table 365 โ Coding rules for TAITimeDifference Table 366 โ Coding rules for TAINetworkTimeValue Table 367 โ Coding rules for TAITimeRounded |
602 | 12.23 Syntax |
615 | 12.24 Detailed coding examples (INFORMATIVE) Table 368 โ Coding example: Read request for a non-indexed attribute |
616 | 13 Gateway 13.1 General Table 369 โ Coding example: Read response (corresponding to request containedin the preceding table) Table 370 โ Coding example: Tunnel service request |
618 | Figure 135 โ Gateway scenarios |
619 | Figure 136 โ Basic gateway model |
620 | 13.2 Service access point |
621 | Table 371 โ Summary of gateway high side interface services |
622 | Figure 137 โ Sequence of primitives for session service Figure 138 โ Sequence of primitives for lease management service |
623 | Figure 139 โ Sequence of primitives for system report services Figure 140 โ Sequence of primitives for time service |
624 | Figure 141 โ Sequence of primitives for client/server service initiated from gateway Figure 142 โ Sequence of primitives for publish service initiated from gateway |
625 | Figure 143 โ Sequence of primitives for subscribe service initiated from device Figure 144 โ Sequence of primitives for publisher timer initiated from gateway Figure 145 โ Sequence of primitives for subscriber timers initiated from device |
626 | Figure 146 โ Sequence of primitives for the bulk transfer service Figure 147 โ Sequence of primitives for the alert subscription service |
627 | Figure 148 โ Sequence of primitives for the alert notification service Figure 149 โ Sequence of primitives for gateway management services |
630 | Table 372 โ Primitive G_Session parameter usage |
631 | Table 373 โ GS_Status for G_Session confirm |
632 | Table 374 โ Primitive G_Lease parameter usage |
633 | Table 375 โ GS_Lease_Type for G_Lease request |
634 | Table 376 โ GS_Status for G_Lease confirm |
635 | Table 377 โ Primitive G_Device_List_Report parameter usage |
636 | Table 378 โ GS_Status for G_Device_List_Report confirm Table 379 โ Primitive G_Topology_Report parameter usage |
637 | Table 380 โ GS_Status for G_Topology_Report confirm |
638 | Table 381 โ Primitive G_Schedule_Report parameter usage |
639 | Table 382 โ GS_Status for G_Schedule_Report confirm |
640 | Table 383 โ Primitive G_Device_Health_Report parameter usage Table 384 โ GS_Status for G_Device_Health_Report confirm |
641 | Table 385 โ Primitive G_Neighbor_Health_Report parameter usage |
642 | Table 386 โ GS_Status for G_Device_Health_Report confirm |
643 | Table 387 โ Primitive G_Network_Health_Report parameter usage |
644 | Table 388 โ GS_Status for G_Network_Health_Report confirm |
645 | Table 389 โ Primitive G_Time parameter usage Table 390 โ GS_Status for G_Time confirm |
646 | Table 391 โ Primitive G_Client_Server parameter usage |
647 | Table 392 โ GS_Status for G_Client_Server confirm |
649 | Table 393 โ Primitive G_Publish parameter usage |
650 | Table 394 โ GS_Status for G_Publish confirm Table 395 โ Primitive G_Subscribe parameter usage |
651 | Table 396 โ GS_Status for G_Subscribe confirm Table 397 โ Primitive G_Publish_Timer parameter usage Table 398 โ Primitive G_Subscribe_Timer parameter usage |
652 | Table 399 โ Primitive G_Publish_Watchdog parameter usage |
653 | Table 400 โ Primitive G_Bulk_Open parameter usage |
654 | Table 401 โ GS_Status for G_Bulk_Open confirm Table 402 โ Primitive G_Bulk_Transfer parameter usage Table 403 โ GS_Status for G_Bulk_Transfer confirm |
655 | Table 404 โ Primitive G_Bulk_Close parameter usage Table 405 โ GS_Status for G_Bulk_Close confirm |
656 | Table 406 โ Primitive G_Alert_Subscription parameter usage |
657 | Table 407 โ GS_Status for G_Alert_Subscription confirm Table 408 โ Primitive G_Alert_Notification parameter usage |
658 | Table 409 โ Primitive G_Read_Gateway_Configuration parameter usage |
659 | Table 410 โ GS_Attribute_Identifier values Table 411 โ GS_Status for G_Read_Gateway_Configuration confirm Table 412 โ Primitive G_Write_Gateway_Configuration parameter usage |
660 | Table 413 โ GS_Attribute_Identifier values Table 414 โ GS_Status for G_Write_Gateway_Configuration confirm |
661 | Table 415 โ Primitive G_Write_Device_Configuration parameter usage |
662 | Table 416 โ GS_Status for G_Write_Device_Configuration confirm Table 417 โ Primitive G_Read_Device_Configuration parameter usage |
663 | 13.3 Protocol Figure 150 โ Tunnel object model Table 418 โ GS_Status for G_Read_Device_Configuration confirm |
664 | Figure 151 โ Distributed tunnel endpoints |
665 | Figure 152 โ Multicast, broadcast, and one-to-many messaging |
666 | Figure 153 โ Tunnel object buffering |
669 | Figure 154 โ Publish/subscribe publisher CoSt flowchart Figure 155 โ Publish/subscribe publisher periodic flowchart |
670 | Figure 156 โ Publish/subscribe subscriber common periodic and CoSt flowchart |
671 | Figure 157 โ Network address mappings |
672 | Figure 158 โ Connection_Info usage in protocol translation |
673 | Figure 159 โ Transaction_Info usage in protocol translation |
674 | Figure 160 โ Interoperable tunneling mechanism overview diagram |
676 | Figure 161 โ Bulk transfer model |
677 | Figure 162 โ Alert model |
678 | Figure 163 โ Alert cascading |
679 | Figure 164 โ Native P/S and C/S access |
681 | Table 419 โ UAP management object extended attributes |
682 | 14 Provisioning 14.1 General 14.2 Terms and definitions |
684 | 14.3 Provisioning procedures 14.4 Pre-installed symmetric keys |
685 | 14.5 Provisioning using out-of-band mechanisms 14.6 Provisioning networks |
686 | Figure 165 โ The provisioning network |
688 | 14.7 State transition diagrams Figure 166 โ State transition diagrams outlining provisioning stepsduring a device life cycle |
689 | Table 420 โ Factory default settings |
691 | Figure 167 โ State transition diagram showing various pathsto joining a secured network |
693 | 14.8 Device management application protocol objects for provisioning Figure 168 โ Provisioning objects and interactions |
694 | 14.9 Management objects |
695 | Table 421 โ Device provisioning object |
699 | 14.10 Device provisioning service object Table 422 โ Reset_To_Default method Table 423 โ Write symmetric join key method |
700 | Table 424 โ Device provisioning service object |
703 | Table 425 โ DPSOWhiteListTbl data structure |
705 | Table 426 โ Array manipulation table Table 427 โ DPSO alert to indicate join by a device not on the WhiteList |
706 | 14.11 Provisioning functions (INFORMATIVE) Table 428 โ DPSO alert to indicate inadequate device join capability |
710 | Annex A (informative) Protocol implementation conformance statement proforma A.1 General |
713 | A.2 System Table 429 โ Field media type Table 430 โ Protocol layer support |
714 | Table 431 โ Device PICS Table 432 โ PICS for device implementing I/O role Table 433 โ PICS for device implementing router role Table 434 โ PICS for backbone router |
715 | Table 435 โ PICS for gateway Table 436 โ PICS for system manager Table 437 โ PICS for provisioning device Table 438 โ PICS for security manager Table 439 โ PICS for device implementing system time source role |
716 | A.3 System management Table 440 โ System PICS |
717 | Table 441 โ Device PICS Table 442 โ Router and backbone router PICS |
718 | Table 443 โ PICS for system time source |
719 | Table 444 โ PICS for system manager Table 445 โ PICS for provisioning role |
720 | A.4 Security manager Table 446 โ Device PICS |
721 | A.5 Physical layer Table 447 โ PICS for provisioning role Table 448 โ PICS for security manager |
722 | Table 449 โ PhL roles Table 450 โ PhL frequency of operation Table 451 โ PhL functions |
723 | A.6 Data link layer Table 452 โ PhL packet Table 453 โ DL roles Table 454 โ DL PICS for device implementing I/O role Table 455 โ DL PICS for device implementing router role |
724 | A.7 Network layer Table 456 โ DL PICS for device implementing backbone router role Table 457 โ PICS for devices implementing I/O role |
725 | Table 458 โ PICS for device implementing router role Table 459 โ PICS for devices implementing backbone router role |
726 | A.8 Transport layer Table 460 โ PICS for device implementing I/O role Table 461 โ PICS for routing device Table 462 โ PICS for backbone router |
727 | A.9 Application layer Table 463 โ AL implementation option Table 464 โ PICS part 2: Optional industry-independent objects |
728 | Table 465 โ PICS part 2: Supported standard services for I/O device role |
729 | Table 466 โ PICS part 2: Supported standard services for system manager role |
730 | Table 467 โ PICS part 2: Supported standard services for gateway rolewhen supporting native access |
731 | Table 468 โ PICS part 2: Supported standard services for gateway rolewhen supporting interoperable tunneling and for adapters |
732 | Table 469 โ PICS part 2: Supported standard services for routing device role |
733 | Table 470 โ PICS part 2: Supported standard services for backbone router role |
734 | Table 471 โ PICS part 2: Supported standard services for provisioning role Table 472 โ PICS part 2: Supported standard services for system time source role Table 473 โ Process control conformance: Supported objects |
735 | A.10 Gateway Table 474 โ Process control conformance: Supported alerts |
736 | Table 475 โ PICS: Gateway |
737 | A.11 Provisioning |
738 | Table 476 โ PICS: I/O devices, routing devices, gateways, and backbone routers Table 477 โ PICS: Provisioning devices |
739 | Annex B (normative) Role profiles B.1 General |
740 | B.2 System B.3 System manager Table 478 โ Protocol layer device roles Table 479 โ Over-the-air upgrades |
741 | B.4 Security manager Table 480 โ Session support profiles Table 481 โ Baseline profiles |
742 | B.5 Physical layer B.6 Data link layer Table 482 โ PhL roles Table 483 โ DL required for listed roles |
743 | Table 484 โ Role profiles: General DLMO attributes |
744 | Table 485 โ Role profiles: dlmo.Device_Capability |
745 | Table 486 โ Role profiles: dlmo.Ch (channel hopping) Table 487 โ Role profiles: dlmo.TsTemplate Table 488 โ Role profiles: dlmo.Neighbor |
746 | Table 489 โ Role profiles: dlmo. NeighborDiag Table 490 โ Role profiles: dlmo.Superframe Table 491 โ Role profiles: dlmo.Graph |
747 | B.7 Network layer Table 492 โ Role profiles: dlmo.Link Table 493 โ Role profiles: dlmo.Route Table 494 โ Role profiles: dlmo.Queue_Priority Table 495 โ Routing table size |
748 | B.8 Transport layer B.9 Application layer B.10 Gateway Table 496 โ Address table size Table 497 โ Port support size Table 498 โ APs Table 499 โ Role profile: Gateway |
749 | B.11 Provisioning Table 500 โ Role profile: Gateway native access Table 501 โ Role profile: Gateway interoperable tunnel mechanism Table 502 โ Role profiles: I/O, routers, gateways, and backbone routers |
750 | Annex C (informative) Background information C.1 Industrial needs C.2 Usage classes |
751 | Table 503 โ Usage classes |
752 | C.3 Other uploading and downloading- alarms (human or automated action) C.4 The open systems interconnection basic reference model |
753 | Figure 169 โ Basic reference model |
756 | Annex D (normative) Configuration defaults D.1 General D.2 System management Table 504 โ System management configuration defaults |
757 | D.3 Security D.4 Data link layer Table 505 โ Security configuration defaults |
758 | D.5 Network layer Table 506 โ DL configuration defaults |
759 | D.6 Transport layer D.7 Application layer Table 507 โ Network configuration defaults Table 508 โ Transport configuration defaults |
760 | Table 509 โ Application configuration defaults |
761 | D.8 Gateway D.9 Provisioning Table 510 โ Gateway configuration defaults |
762 | Table 511 โ Provisioning configuration defaults |
763 | Annex E (informative) Use of backbone networks E.1 General E.2 Recommended characteristics E.3 Internet protocol backbones |
766 | Annex F (normative) Basic security concepts โ Notation and representation F.1 Strings and string operations F.2 Integers, octets, and their representation F.3 Entities |
767 | Annex G (informative) Using certificate chains for over-the-air provisioning |
768 | Annex H (normative) Security building blocks H.1 Symmetric key cryptographic building blocks |
769 | H.2 Asymmetric key cryptographic building blocks H.3 Keying information |
771 | H.4 Key agreement schemes H.5 Keying information schemes |
772 | H.6 Challenge domain parameter generation and validation |
773 | H.7 Challenge validation primitive H.8 Secret key generation (SKG) primitive |
774 | H.9 Block-cipher-based cryptographic hash function |
775 | H.10 Elliptic curve cryptography manual certificate scheme |
778 | Annex I (informative) Definition templates I.1 Object type template I.2 Standard object attributes template Table 512 โ Table of standard object types |
779 | I.3 Standard object methods Table 513 โ Template for standard object attributes |
780 | I.4 Standard object alert reporting template Table 514 โ Template for standard object methods |
781 | I.5 Data structure definition Table 515 โ Template for standard object alert reporting |
782 | Table 516 โ Template for data structures |
783 | Annex J (informative) Operations on attributes J.1 Operations on attributes Table 517 โ Scheduled_Write method template |
784 | Table 518 โ Read_Row method template |
785 | Table 519 โ Write_Row method template Table 520 โ Reset_Row method template |
786 | J.2 Synchronized cutover Table 521 โ Delete_Row method template |
788 | Annex K (normative) Standard object types |
790 | Table 522 โ Standard object types |
792 | Table 523 โ Standard object instances |
794 | Annex L (informative) Standard data types |
795 | Table 524 โ Standard data types |
796 | Annex M (normative) Protocol identification values Table 525 โ Protocol identification values |
797 | Annex N (informative) Tunneling and native object mapping N.1 Overview N.2 Tunneling N.3 Foreign protocol application communication |
798 | N.4 Native object mapping N.5 Tunneling and native object mapping tradeoffs |
799 | Annex O (informative) Generic protocol translation O.1 Overview O.2 Publish Figure 170 โ Generic protocol translation publish diagram |
800 | O.3 Subscribe Figure 171 โ Generic protocol translation subscribe diagram |
801 | O.4 Client Figure 172 โ Generic protocol translation client/server transmission diagram |
802 | O.5 Server Figure 173 โ Generic protocol translation client/server reception diagram |
803 | Annex P (informative) Gateway service access point adaptations for this specification P.1 General P.2 Parameters P.3 Session P.4 Lease |
804 | P.5 Device list report P.6 Topology report P.7 Schedule report P.8 Device health report P.9 Neighbor health report P.10 Network health report P.11 Time P.12 Client/server |
805 | P.13 Publish/subscribe |
806 | P.14 Bulk transfer |
807 | P.15 Alert P.16 Gateway configuration P.17 Device configuration |
808 | Annex Q (informative) Gateway service access point adaptations for WirelessHARTยฎ Q.1 General |
809 | Q.2 Parameters Q.3 Session |
810 | Q.4 Lease Q.5 Device list report |
811 | Q.6 Topology report Q.7 Schedule report Q.8 Device health report |
812 | Q.9 Neighbor health report Q.10 Network health report |
813 | Q.11 Time Q.12 Client/server |
814 | Q.13 Publish/subscribe |
815 | Q.14 Bulk transfer Q.15 Alert |
816 | Q.16 Gateway configuration Q.17 Device configuration |
817 | Annex R (informative) Host system interface to standard-compliant devices via a gateway R.1 Background Figure 174 โ Host integration reference model |
818 | R.2 Device application data integration with host systems R.3 Host system configuration tool |
819 | Figure 175 โ Configuration using an electronic device definition |
820 | R.4 Field device / distributed control systems integration Figure 176 โ Configuration using FDT/DTM approach |
821 | R.5 Gateway R.6 Asset management application support |
823 | Annex S (informative) Symmetric Key Operation Test Vectors S.1 DPDU samples |
824 | S.2 TPDU samples |
826 | Annex T (informative) Data link header and network header for join requests T.1 Overview T.2 MAC header (MHR) T.3 DL header (DHR) Table 526 โ Sample MHR for join request Table 527 โ Sample DHR for join request |
827 | T.4 NL header Table 528 โ Network header for join messages |
828 | Bibliography |