{"id":244209,"date":"2024-10-19T16:02:24","date_gmt":"2024-10-19T16:02:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62769-32015\/"},"modified":"2024-10-25T11:01:14","modified_gmt":"2024-10-25T11:01:14","slug":"bs-en-62769-32015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62769-32015\/","title":{"rendered":"BS EN 62769-3:2015"},"content":{"rendered":"
This part of IEC 62769 specifies the FDI Server. The overall FDI architecture is illustrated in Figure 1. The architectural components that are within the scope of this document have been highlighted in this figure.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1 Scope 2 Normative references Figures Figure 1 \u2013 FDI architecture diagram <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3 Terms, definitions, abbreviated terms and acronyms 3.1 Terms and definitions 3.2 Abbreviated terms and acronyms 4 Overview <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Information Model 5.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2 Online\/Offline 5.2.1 Overview 5.2.2 Transfer to device 5.2.3 Transfer from device <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 Access privileges 5.4 Private Parameters 5.5 Locking <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.6 EditContext 5.6.1 Concept and usage model Figure 2 \u2013 Locking services <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.6.2 Services Figure 3 \u2013 EditContext models <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.6.3 NodeIds 5.6.4 Reading 5.6.5 Writing <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.6.6 Writing dominant and dependent Variables 5.6.7 Actions (EDD METHODS) <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.6.8 UIDs 5.6.9 Synchronization 5.7 Reading 5.7.1 General Figure 4 \u2013 EditContext for EDD Methods <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.7.2 Reading offline variables Figure 5 \u2013 Offline variable read <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.7.3 Reading online variables Figure 6 \u2013 Online variable read <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.8 Writing 5.8.1 General 5.8.2 Write offline variables <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.8.3 Writing online variables Figure 7 \u2013 Offline variable write immediate <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Figure 8 \u2013 Online variable write immediate <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.8.4 Writing to an EditContext Figure 9 \u2013 Write with EditContext <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.9 Subscription 5.9.1 General 5.9.2 Subscription of offline variables <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.9.3 Subscription of online variables Figure 10 \u2013 Offline variable subscription <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure 11 \u2013 Online variable subscription <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.10 Device topology 5.10.1 General 5.10.2 Connection Points Figure 12 \u2013 Topology with Network objects (non-normative) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.10.3 Topology management <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Figure 13 \u2013 Add Device to topology <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Figure 14 \u2013 Remove Device from topology <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.10.4 Topology scanning Figure 15 \u2013 Scan topology <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.10.5 Use of SCAN function 5.10.6 Validation of defined topology <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.11 User Interface Elements 5.11.1 User Interface Descriptions <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.11.2 User Interface Plug-ins 5.12 Actions 5.12.1 FDI Server \u2013 FDI Client interaction <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Figure 16 \u2013 Action execution <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.12.2 Action state machine Figure 17 \u2013 Action state machine Tables Table 1 \u2013 Action states <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.12.3 Actions Proxies Table 2 \u2013 Action state transitions <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.12.4 Actions, EDD Actions and Actions Proxies Table 3 \u2013 EDD Action types and the EDD constructs that use them <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 6 OPC UA services 6.1 OPC UA profiles 6.2 Service error information 6.2.1 Overview <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6.2.2 OPC UA services and their response 6.2.3 Mappings of EDDL response codes to OPC UA service response Table 4 \u2013 OPC UA severity bits and EDDL response codes TYPE <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.3 Parameter value update during write service request 6.4 Localization <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 6.5 Audit events 7 Communication 7.1 Notation 7.2 General 7.2.1 Concepts Figure 18 \u2013 System communication integration example <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Figure 19 \u2013 FDI Communication Server integration example <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 7.2.2 Terms Figure 20 \u2013 Gateway integration example <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 7.3 Communication Service processing 7.3.1 Communication Service invocation 7.3.2 Analyze communication path <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 7.3.3 Manage communication relations 7.3.4 Communication service request mapping <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 7.3.5 Communication service request propagation Figure 21 \u2013 Message propagation example scenario <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 7.3.6 Communication error handling 7.4 FDI Communication Server specific handling 7.4.1 Discovery <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7.4.2 Information Model synchronization 8 Parallel Execution within the FDI Server 8.1 Motivation 8.2 Internal structure of the EDD interpreter <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 8.3 Rules for running an EDD entity <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Annex A (informative) FDI Server functional structure A.1 FDI functional elements Figure A.1 \u2013 Functional components of an FDI Server <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | A.2 FDI Server extension Figure A.2 \u2013 FDI Server extensions <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Annex B (informative) Access privileges and user roles B.1 User roles and usage case Figure B.1 \u2013 User roles and access privileges <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | B.2 Private data usage <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex C (informative) Parallel execution within the FDI Server \u2013 Examples C.1 Simple example for a synchronous execution C.2 Example for a concurrent execution Figure C.1 \u2013 Synchronous execution of two triggers Figure C.2 \u2013 Concurrent execution of two triggers (step1) <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Figure C.3 \u2013 Concurrent execution of two triggers (step 2) Figure C.4 \u2013 Concurrent execution of two triggers (step 3) Figure C.5 \u2013 Concurrent execution of two triggers (step 4) <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | C.3 Deadlock detection in concurrent execution Figure C.6 \u2013 Concurrent execution of two triggers <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Devices and integration in enterprise systems; Field Device Integration – FDI Server<\/b><\/p>\n |