Shopping Cart

No products in the cart.

IEEE 1703 2012

$105.63

IEEE Standard for Local Area Network/Wide Area Network (LAN/WAN) Node Communication Protocol to Complement the Utility Industry End Device Data Tables

Published By Publication Date Number of Pages
IEEE 2012 239
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Active. A set of application layer messaging services are provided in this standard that are applicable for the enterprise and End Device ends of an Advanced Metering Infrastructure (AMI). The application services include those useful for managing the AMI network assets defined by this standard. These messages may be transported over a wide range of underlying network transports such as TCP/IP, UDP, IEEE 802.11, IEEE 802.15.4 IEEE 802.16, PLC, and SMS over GSM, over a wide range of physical media. Additionally, interfaces are defined for a Communication Module and a Local Port (e.g., an IEEE 1701 optical port).The described protocol is tailored for, but not limited to, the transport of IEEE 1377 Table data.Also, a means by which information can be sent in a secure manner using AES-128 and the EAX’ mode is provided in this standard. This standard was developed jointly with ANSI (published as ANSI C12.22) and Measurement Canada (published as MC12.22).

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 1703-2012 Front Cover
3 Title Page
6 Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
7 Patents
8 Participants
10 Introduction
11 Contents
13 Important Notice
1 Overview
1.1 Introduction
1.2 Scope
15 1.3 Purpose
16 2 Normative references
18 3 Definitions and syntax
3.1 Definitions
22 3.2 Document syntax
3.3 Table syntax
23 4 Reference topology
25 5 C12.22 Node to C12.22 Network Segment details
5.1 C12.22 Node to C12.22 Network Segment reference
26 5.2 Data encoding rules
5.2.1 Data order
5.2.2 Length fields encoding
5.2.3 Universal identifiers encoding
28 5.2.4 Universal identifiers canonical encoding
5.3 Layer 7—application layer
29 5.3.1 Data structure—utility industry data tables
5.3.2 EPSEM
5.3.2.1 Request codes
30 5.3.2.2 Response codes
33 5.3.2.3 Time-out
5.3.2.3.1 Session time-out
5.3.2.3.2 Application layer response time-out
34 5.3.2.4 Services
5.3.2.4.1 Identification service
37 5.3.2.4.2 Read service
38 5.3.2.4.3 Write service
40 5.3.2.4.4 Logon service
41 5.3.2.4.5 Security service
42 5.3.2.4.6 Logoff service
5.3.2.4.7 Terminate service
43 5.3.2.4.8 Disconnect service
44 5.3.2.4.9 Wait service
5.3.2.4.10 Registration service
52 5.3.2.4.11 Deregistration service
53 5.3.2.4.12 Resolve service
54 5.3.2.4.13 Trace service
5.3.2.5 Service sequence state control
56 5.3.2.6 Partial table access using index/element-count method
58 5.3.2.7 Partial table access using offset/octet-count method
59 5.3.3 EPSEM envelope structure
60 5.3.4 Association control—Association Control Service Element (ACSE)
61 5.3.4.1 Application Context Element (A1H)
62 5.3.4.2 Called AP Title Element (A2H)
5.3.4.3 Calling AP Title Element (A6H)
5.3.4.4 Universal Identifier of Called and Calling AP Title Element (06H)
5.3.4.5 Relative Universal Identifier of Called and Calling AP Title Element (80H)
63 5.3.4.6 Calling Application Entity Qualifier Element (A7H)
64 5.3.4.7 Mechanism Name Element (8BH)
5.3.4.8 Calling Authentication Value Element (ACH)
66 5.3.4.8.1 C12.22 Security Mechanism (.2.1)
69 5.3.4.8.2 C12.21 Security Mechanism (.2.0)
71 5.3.4.8.3 C12.22 Other security mechanisms
5.3.4.9 Called AP invocation ID element (A4H)
72 5.3.4.10 Calling AP invocation ID element (A8H)
74 5.3.4.11 User information element (BEH)
75 5.3.4.12 Use of subbranches of a registered ApTitle
78 5.3.4.13 C12.22 Security Mechanism
5.3.4.13.1 C12.22 Security Mechanism (.2.1)
5.3.4.13.1.1 Security modes
79 5.3.4.13.1.2 Rules for responses
5.3.4.13.1.3 Key ID
5.3.4.13.1.4 Access privileges
5.3.4.13.1.5 Initialization Vector
80 5.3.4.13.1.6 Calling AP Invocation ID
5.3.4.13.1.7 Syntax mapping
5.3.4.13.1.8 Cleartext with Authentication
83 5.3.4.13.1.9 Ciphertext with Authentication
85 5.3.4.13.1.10 Validating messages
5.3.5 Application Segmentation Sub-layer
86 5.3.5.1 APDU segmentation
5.3.5.2 APDU Segment
5.3.5.2.1 Called AE Qualifier Element (A3H)
87 5.3.5.2.2 Segment User Information Element (BEH)
5.3.5.2.2.1 Segment Association Information Element
88 5.3.5.2.2.2 Segment Data Elements
5.3.5.3 Segmentation and Reassembly
5.3.5.3.1 Segmentation Algorithm
90 5.3.5.3.2 Reassembly Algorithm
91 5.4 Layer 6—presentation layer
5.5 Layer 5—session layer
5.6 Layer 4—transport layer
5.7 Layer 3—network layer
5.8 Layer 2—data link layer
5.9 Layer 1—physical layer
92 6 Protocol Details: C12.22 Device to C12.22 Communication Module interface
6.1 Interface architecture
6.2 Interface diagram
93 6.3 Implementation guidelines
6.3.1 C12.22 Communication Module
94 6.3.2 C12.22 Device
95 6.4 Layer 7—application layer
6.5 Layer 6—presentation layer
6.6 Layer 5—session layer
6.7 Layer 4—transport layer
6.7.1 Negotiate Service
97 6.7.2 Get Configuration Service
100 6.7.3 Link Control Service
102 6.7.4 Send Message Service
104 6.7.5 Get Status Service
105 6.7.6 Get Registration Status Service
107 6.7.7 Service Time Sequence Diagrams
110 6.7.8 Service Sequence States
112 6.8 Layer 3—network layer
6.9 Layer 2—data link layer
113 6.9.1 Basic data information
6.9.1.1 Fixed settings
6.9.1.2 Variable settings
6.9.2 Packet definition
115 6.9.3 CRC selection
116 6.9.4 Acknowledgment
6.9.5 Retry attempts
6.9.6 Timeouts
6.9.6.1 Traffic Time-out
6.9.6.2 Inter-character Time-out
6.9.6.3 Response Time-out
117 6.9.7 Turn Around Delay
6.9.8 Collision
6.9.9 Duplicate packets
6.9.10 Transparency
6.9.11 Supervision of the communications link
118 6.9.12 Local routing
119 6.9.13 Service sequence states
120 6.10 Layer 1—physical layer
6.10.1 Signal definition
6.10.2 Electrical properties of the connection
121 6.10.3 Mechanical and environmental properties
122 6.10.4 Supervision of the communications link
123 7 Local Port communication protocol details
7.1 Protocol definition
7.1.1 Layer 7—Application layer
7.1.2 Layer 6—Presentation layer
7.1.3 Layer 5—Session layer
7.1.4 Layer 4—Transport layer
124 7.1.5 Layer 3—Network layer
7.1.6 Layer 2—Data link layer
7.1.7 Layer 1—Physical layer
7.2 C12.22 Local Port communication using a C12.18 Optical Port
125 7.2.1 Establishment of ANSI C12.18 protocol compatibility mode
7.2.2 Establishment of ANSI C12.22 protocol compatibility mode
126 8 Backward compatibility
127 9 Compliance
128 Annex A (normative) Relays
A.1 Description
A.2 Hierarchical topology
A.3 C12.22 Master Relays
129 A.4 Registration notification
A.5 Registration algorithm details
A.6 C12.22 Node ApTitle auto-assignment
130 A.7 C12.22 Master Relay ApTitle auto-assignment
A.8 Obsolete routes
A.9 Multiple routes
131 A.10 Application layer supervision
A.11 Routing
132 Annex B (informative) Routing examples
B.1 C12.22 Relays with a single Service Provider
133 B.2 C12.22 Relays shared by multiple Service Providers
134 Annex C (normative) Modifications and extensions to ANSI C12.19
C.1 Overview
135 C.2 Decade 12: Node Network Control Tables
C.2.1 Table 120 Node Network Control Dimension Limits Table
139 C.2.2 Table 121 Actual Node Network Control Limiting Table
142 C.2.3 Table 122 Interface Control Table
145 C.2.4 Table 123 Exception Report Configuration Table
147 C.2.5 Table 124 Filtering Rules Table
149 C.2.6 Table 125 Interface Status Table
154 C.2.7 Table 126 Registration Status Table
156 C.2.8 Table 127 Network Statistics Selections Table
157 C.2.9 Table 128 Network Statistics Table
158 C.3 Decade 13: Network Relay Control Tables
C.3.1 Table 130 Relay Network Control Dimension Limits Table
161 C.3.2 Table 131 Actual Network Relay Limiting Table
163 C.3.3 Table 132 Registration List Table
166 C.3.4 Table 133 Static Routing Table
168 C.3.5 Table 134 Host Notification Table
170 C.3.6 Table 135 Master Relay Assignment Table
171 C.3.7 Table 136 Dynamic Routing Report Table
C.4 Universal ID pattern description of ApTitles
173 C.5 Additions to TABLE 07—Procedure Initiate Table
C.5.1 Procedure 23 Register
C.5.2 Procedure 24 Deregister
C.5.3 Procedure 25 Network Interface Control
175 C.5.4 Procedure 26 Exception Report
176 C.6 Table 46: Extended Key Table
178 C.7 Table 47: Host Access Security Table
182 Annex D (normative) Universal Identifier
184 Annex E (normative) One-way devices
186 Annex F (informative) APDU Response Timeout algorithm
188 Annex G (informative) Communication examples
G.1 Example #1: Unsecured session
189 G.2 Example #2: Unsecured sessionless
190 G.3 Example #3: Unsecured notification
G.4 Example #4: Authenticated session
193 G.5 Example #5: Authenticated sessionless
194 G.6 Example #6: Authenticated notification
195 G.7 Example #7: Encrypted session
198 G.8 Example #8: Encrypted sessionless
200 G.9 Example #9: Encrypted notification
201 Annex H (informative) CRC examples
H.1 Trace
202 H.2 CRC code example
203 Annex I (normative) The EAX’ Cryptographic Mode
I.1 EAX”² description
208 I.2 Justifications for selection of EAX rather than CCM
209 I.3 Justifications for the EAX’ optimizations
211 I.4 EAX”² C code example (informative)
215 I.5 AES C code example (informative)
220 Annex J (informative) Connectionless-ACSE-1 equivalent reduced syntax for C12.22 Message transmission
222 Annex K (informative) Bibliography
223 Annex L (informative) Listing of editorial errors and errors of omission in ANSI C12.22-2008
IEEE 1703 2012
$105.63