{"id":434745,"date":"2024-10-20T07:45:49","date_gmt":"2024-10-20T07:45:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62769-32023\/"},"modified":"2024-10-26T14:43:43","modified_gmt":"2024-10-26T14:43:43","slug":"bs-en-iec-62769-32023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62769-32023\/","title":{"rendered":"BS EN IEC 62769-3:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA (normative) Normative references to international publications with their corresponding European publications <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1 Scope 2 Normative references Figures Figure 1 \u2013 FDI\u00ae architecture diagram <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3 Terms, definitions, abbreviated terms and acronyms 3.1 Terms and definitions 3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.3 Conventions 4 Overview 5 Information Model 5.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2 Online\/Offline 5.2.1 Overview 5.2.2 Transfer to device <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2.3 Transfer from device 5.2.4 Interactive Transfer to device 5.3 Access privileges 5.4 Private Parameters <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5 Locking Figure 2 \u2013 Locking services <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.6 EditContext 5.6.1 Concept and usage model Figure 3 \u2013 EditContext models <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.6.2 Services 5.6.3 NodeIds 5.6.4 Reading <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.6.5 Writing 5.6.6 Writing dominant and dependent Variables Figure 4 \u2013 Online EditContext state diagram for dominant and dependent Variables <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.6.7 Actions (EDD METHODS) 5.6.8 UIDs Figure 5 \u2013 Offline EditContext state diagram for dominant and dependent Variables Figure 6 \u2013 EditContext for EDD Methods <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.6.9 Synchronization 5.7 Reading 5.7.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.7.2 Reading offline variables 5.7.3 Reading online variables Figure 7 \u2013 Offline variable read <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.8 Writing 5.8.1 General Figure 8 \u2013 Online variable read <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.8.2 Write offline variables Figure 9 \u2013 Offline variable write immediate <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.8.3 Writing online variables Figure 10 \u2013 Online variable write immediate <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.8.4 Writing to an EditContext <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.9 Subscription 5.9.1 General Figure 11 \u2013 Write with EditContext <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.9.2 Subscription of offline variables Figure 12 \u2013 Offline variable subscription <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.9.3 Subscription of online variables Figure 13 \u2013 Online variable subscription <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.10 Device topology 5.10.1 General 5.10.2 Connection Points Figure 14 \u2013 Topology with Network objects (non-normative) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.10.3 Topology management <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Figure 15 \u2013 Add Device to topology <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Figure 16 \u2013 Remove Device from topology <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.10.4 Topology scanning Figure 17 \u2013 Scan topology <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.10.5 Use of SCAN function 5.10.6 Validation of defined topology <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.11 User Interface Elements 5.11.1 User Interface Descriptions <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.11.2 User Interface Plug-ins 5.12 Actions 5.12.1 FDI\u00ae Server \u2013 FDI\u00ae Client interaction <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Figure 18 \u2013 Action execution <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.12.2 Action state machine Figure 19 \u2013 Action state machine Tables Table 1 \u2013 Action states <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.12.3 Actions Proxies Table 2 \u2013 Action state transitions <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.12.4 INTERACTIVE_TRANSFER_TO_DEVICE Action <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.12.5 Actions, EDD Actions and Actions Proxies Table 3 \u2013 EDD Action types and the EDD constructs that use them <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6 OPC UA services 6.1 OPC UA profiles 6.2 Service error information 6.2.1 Overview 6.2.2 OPC UA services and their response <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.2.3 Mappings of EDDL response codes to OPC UA service response Table 4 \u2013 OPC UA severity bits and EDDL response codes TYPE <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 6.3 Parameter value update during write service request 6.4 Localization 6.5 Audit events 7 Communication 7.1 Notation <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 7.2 General 7.2.1 Concepts Figure 20 \u2013 System communication integration example <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Figure 21 \u2013 FDI\u00ae Communication Server integration example <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 7.2.2 Terms Figure 22 \u2013 Gateway integration example <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 7.3 Communication Service processing 7.3.1 Communication Service invocation 7.3.2 Analyze communication path <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 7.3.3 Manage communication relations 7.3.4 Communication service request mapping <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 7.3.5 Communication service request propagation Figure 23 \u2013 Message propagation example scenario <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7.3.6 Communication error handling 7.4 FDI\u00ae Communication Server specific handling 7.4.1 Discovery <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7.4.2 Information Model synchronization 8 Parallel Execution within the FDI\u00ae Server 8.1 Motivation <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 8.2 Internal structure of the EDD interpreter 8.3 Rules for running an EDD entity <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Annex A (informative) FDI\u00ae Server functional structure A.1 FDI\u00ae functional elements Figure A.1 \u2013 Functional components of an FDI\u00ae Server <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | A.2 FDI\u00ae Server extension <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Figure A.2 \u2013 FDI\u00ae Server extensions <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex B (informative) Access privileges and user roles B.1 User roles and usage case Figure B.1 \u2013 User roles and access privileges <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | B.2 Private data usage <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Annex C (informative) Parallel execution within the FDI\u00ae Server \u2013 Examples C.1 Simple example for a synchronous execution C.2 Example for a concurrent execution Figure C.1 \u2013 Synchronous execution of two triggers Figure C.2 \u2013 Concurrent execution of two triggers (step1) <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Figure C.3 \u2013 Concurrent execution of two triggers (step 2) Figure C.4 \u2013 Concurrent execution of two triggers (step 3) Figure C.5 \u2013 Concurrent execution of two triggers (step 4) <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | C.3 Deadlock detection in concurrent execution Figure C.6 \u2013 Concurrent execution of two triggers <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Annex D (informative) Read-Only mode for UID Views D.1 Definition <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Field Device Integration (FDI\u00ae) – Server<\/b><\/p>\n |