BS EN 61784-3-2:2017
$215.11
Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 2
Published By | Publication Date | Number of Pages |
BSI | 2017 | 278 |
This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 2 of IEC 61784-1, IEC 61784-2 and IEC 61158 Type 2. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This safety communication layer is intended for implementation in safety devices only.
NOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.
This part1 defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2 for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.
This part provides guidelines for both developers and assessors of compliant devices and systems.
NOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system ā implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | English CONTENTS |
17 | FOREWORD |
19 | Figures FigureĀ 1 ā Relationships of IECĀ 617843 with other standards (machinery) |
20 | FigureĀ 2 ā Relationships of IECĀ 617843 with other standards (process) |
22 | 1 Scope 2 Normative references |
24 | 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 Terms and definitions 3.1.1 Common terms and definitions |
29 | 3.1.2 CPFĀ 2: Additional terms and definitions 3.2 Symbols and abbreviated terms 3.2.1 Common symbols and abbreviated terms |
30 | 3.2.2 CPFĀ 2: Additional symbols and abbreviated terms |
31 | 3.3 Conventions 4 Overview of FSCPĀ 2/1 (CIP Safetyā¢) 4.1 General 4.2 FSCPĀ 2/1 |
32 | 5 General 5.1 External documents providing specifications for the profile FigureĀ 3 ā Relationship of Safety Validators |
33 | 5.2 Safety functional requirements 5.3 Safety measures |
34 | 5.4 Safety communication layer structure Tables TableĀ 1 ā Communications errors and detection measures matrix |
35 | 5.5 Relationships with FAL (and DLL, PhL) 5.5.1 General 5.5.2 Data types 6 Safety communication layer services 6.1 Introduction FigureĀ 4 ā Communication layers |
36 | 6.2 Connection object 6.2.1 General 6.2.2 Class attribute extensions 6.2.3 Service extensions TableĀ 2 ā New class attributes |
37 | 6.2.4 Explicit message response format for SafetyOpen and SafetyClose 6.3 Connection Manager object 6.3.1 General TableĀ 3 ā Service extensions TableĀ 4 ā SafetyOpen and SafetyClose response format |
38 | 6.3.2 ForwardOpen for safety |
39 | FigureĀ 5 ā ForwardOpen with safety network segment |
40 | 6.3.3 Safety network segment TableĀ 5 ā Safety network segment identifier TableĀ 6 ā Safety network segment definition |
41 | FigureĀ 6 ā Safety network target format |
42 | TableĀ 7 ā Safety network segment router format TableĀ 8 ā Safety Network Segment Extended Format |
43 | 6.3.4 Originator rules for calculating the connection parameter CRC 6.3.5 SafetyOpen processing flowcharts |
44 | FigureĀ 7 ā Target Processing SafetyOpen with no configuration data(Form 2 SafetyOpen) |
45 | FigureĀ 8 ā Target Processing for SafetyOpen with configuration data(Form 1 SafetyOpen) |
46 | 6.3.6 Checks required by Multipoint producers with existing connections FigureĀ 9 ā Originator logic to determine which format to use |
47 | 6.3.7 Electronic key usage for safety 6.3.8 RPI vs. API in safety connections 6.3.9 Application path construction for safety TableĀ 9 ā Multipoint producer parameter evaluation rules |
48 | 6.3.10 Safety Validator connection types |
49 | TableĀ 10 ā ForwardOpen setting options for safety connections |
51 | 6.3.11 Application reply data in a successful SafetyOpen response TableĀ 11 ā Network connection parameters for safety connections TableĀ 12 ā CPĀ 2/3 Safety target application reply (size: 10 octets) |
52 | TableĀ 13 ā EF CPĀ 2/3 Safety target application reply (size: 14 octets) TableĀ 14 ā SafetyOpen target application reply (size: 18 octets) |
53 | 6.3.12 Unsuccessful SafetyOpen response TableĀ 15 ā EF SafetyOpen target application reply (size: 22 octets) TableĀ 16 ā New and extended error codes for safety |
54 | TableĀ 17 ā SafetyOpen error event guidance table |
55 | 6.3.13 ForwardClose for safety 6.4 Identity object 6.4.1 General 6.4.2 Changes to common services |
56 | 6.4.3 Extensions for CPĀ 16/3 devices 6.5 Link objects 6.5.1 DeviceNet object changes TableĀ 18 ā Identity object common service changes TableĀ 19 ā Identity object extensions for CPĀ 16/3 devices TableĀ 20 ā New DeviceNet object instance attribute |
57 | 6.5.2 TCP/IP Interface object changes 6.5.3 SERCOS III Link object TableĀ 21 ā New TCP/IP Interface object instance attribute TableĀ 22 ā SERCOS III Link object class attributes |
58 | 6.6 Safety Supervisor object 6.6.1 General TableĀ 23 ā SERCOS III Link object instance attributes TableĀ 24 ā SERCOS III Link Object Common Services |
59 | 6.6.2 Safety Supervisor class attributes 6.6.3 Subclasses 6.6.4 Safety Supervisor instance attributes TableĀ 25 ā Safety Supervisor class attributes |
60 | TableĀ 26 ā Safety Supervisor instance attributes |
63 | 6.6.5 Semantics |
64 | TableĀ 27 ā Device status attribute state values TableĀ 28 ā Exception status attribute format |
65 | TableĀ 29 ā Common exception detail attribute values |
66 | TableĀ 30 ā Exception detail format summary |
68 | TableĀ 31 ā Summary of device behavior for various CFUNID values |
69 | 6.6.6 Subclasses 6.6.7 Safety Supervisor common services |
70 | TableĀ 32 ā Safety Supervisor common services TableĀ 33 ā Safety Supervisor object specific services |
72 | TableĀ 34 ā Configure_Request message structure TableĀ 35 ā Validate_Configuration message structure TableĀ 36 ā Validate_Configuration success message structure |
73 | FigureĀ 10 ā Applying device configuration TableĀ 37 ā Validate_Configuration error code TableĀ 38 ā Validate_Configuration extended codes |
74 | FigureĀ 11 ā Configure and Validate processing flowcharts |
75 | TableĀ 39 ā Set_Password message structure TableĀ 40 ā Reset_Password message structure |
76 | TableĀ 41 ā Configuration_Lock/Unlock message structure TableĀ 42 ā Mode_Change message structure |
77 | TableĀ 43 ā Safety_Reset message structure TableĀ 44 ā Safety Supervisor safety reset types TableĀ 45 ā Attribute bit map parameter |
78 | TableĀ 46 ā Reset processing rules for reset types TableĀ 47 ā Propose_TUNID service |
79 | TableĀ 48 ā Apply_TUNID service |
80 | 6.6.8 Safety Supervisor behavior FigureĀ 12 ā UNID handling during āWaiting for TUNIDā |
81 | FigureĀ 13 ā Safety Supervisor state diagram TableĀ 49 ā Safety Supervisor events |
82 | TableĀ 50 ā State event matrix for Safety Supervisor |
85 | FigureĀ 14 ā Configuration, testing and locked relationships TableĀ 51 ā Configuration owner control vs. device state |
86 | TableĀ 52 ā State mapping of Safety Supervisor to Identity object TableĀ 53 ā Safety Supervisor object event mapping |
87 | 6.7 Safety Validator object 6.7.1 General 6.7.2 Class attributes TableĀ 54 ā Identity object event mapping |
88 | 6.7.3 Instance attributes TableĀ 55 ā Safety Validator class attributes TableĀ 56 ā Safety Validator instance attributes |
90 | TableĀ 57 ā Safety Validator state assignments |
91 | FigureĀ 15 ā Safety connection types TableĀ 58 ā Safety Validator type, bit field assignments |
92 | TableĀ 59 ā Multipoint producer SafetyOpen parameter evaluation rules |
93 | 6.7.4 Class services TableĀ 60 ā Safety Validator class services |
94 | 6.7.5 Instance services 6.7.6 Object behavior TableĀ 61 ā Safety Validator instance services TableĀ 62 ā Safety Validator Get_Attributes_All service data |
95 | FigureĀ 16 ā Safety Validator state transition diagram |
96 | TableĀ 63 ā Safety Validator state event matrix |
97 | 6.8 Connection Configuration Object 6.8.1 General 6.8.2 Class attribute extensions 6.8.3 Instance attributes, additions and extensions. TableĀ 64 ā State mapping between Safety Supervisor and Safety Validator objects TableĀ 65 ā Connection configuration object class attribute extensions TableĀ 66 ā Connection Configuration Object instance attribute additions/extensions |
100 | 6.8.4 Instance attribute semantics extensions or restrictions for safety TableĀ 67 ā Connection flag bit definitions |
101 | TableĀ 68 ā O-to-T connection parameters |
102 | TableĀ 69 ā T-to-O connection parameters |
103 | TableĀ 70 ā Data map formats |
104 | 6.8.5 Special Safety Related Parameters ā (Attribute 13) TableĀ 71 ā Data map format 0 TableĀ 72 ā Data map format 1 |
106 | TableĀ 73 ā Target deviceās SCCRC values TableĀ 74 ā Target deviceās SCTS values |
107 | TableĀ 75 ā Time correction connection parameters for multipoint connection |
108 | TableĀ 76 ā Format Type attribute meaning |
109 | FigureĀ 17 ā Logic for Auto-detecting format type TableĀ 77 ā Format Status attribute meaning |
110 | 6.8.6 Object-specific services 6.8.7 Common service extensions for safety TableĀ 78 ā Connection Configuration Object-specific services TableĀ 79 ā Get_Attributes_All Response service data (added attributes ) |
111 | TableĀ 80 ā Get_Attributes_All Response service data (added parameters ) TableĀ 81 ā Set_Attributes_All Request service data (added attributes) TableĀ 82 ā Set_Attributes_All Response service data (added parameters ) |
112 | 6.8.8 Object behavior FigureĀ 18 ā Connection Configuration Object state diagram TableĀ 83 ā State Mapping between Safety Supervisor and the CCO objects |
113 | 7 Safety communication layer protocol 7.1 Safety PDU format 7.1.1 Safety PDU encoding FigureĀ 19 ā Connection Configuration Object data flow |
114 | Figure 20 ā Format of the mode octet TableĀ 84 ā Connection sections and PDU formats |
115 | FigureĀ 21 ā 1 or 2 octet data section, Base Format TableĀ 85 ā Mode octet variables |
116 | FigureĀ 22 ā 1 or 2 octet data section, Extended Format FigureĀ 23 ā 3 to 250 octet data section format, Base Format |
117 | FigureĀ 24 ā 3 to 250 octet data section format, Extended Format |
118 | FigureĀ 25 ā Time Stamp section format, Base Format TableĀ 86 ā Time Stamp variables |
119 | FigureĀ 26 ā BF Time Coordination message encoding FigureĀ 27 ā EF Time Coordination message encoding TableĀ 87 ā Time Coordination message variables |
120 | FigureĀ 28 ā BF Time Correction message encoding FigureĀ 29 ā EF Time Correction message encoding |
121 | TableĀ 88 ā Time Correction Message variables |
122 | FigureĀ 30 ā 1 or 2 octet point-to-point PDU encoding FigureĀ 31 ā 1 or 2 Octet multipoint PDU encoding |
123 | FigureĀ 32 ā 1 or 2 Octet, multipoint, Format 2 safety connection format FigureĀ 33 ā 3 to 250 Octet Point-to-point PDU encoding |
124 | FigureĀ 34 ā 3 to 248 Octet Multipoint PDU encoding FigureĀ 35 ā 3 to 248 Octet, Multipoint, safety connection format |
125 | 7.1.2 Safety CRC FigureĀ 36 ā CRC Calculation order for Extended Format messages TableĀ 89 ā CRC polynomials used |
126 | 7.2 Communication protocol behavior 7.2.1 Sequence of safety checks 7.2.2 Connection termination 7.2.3 Cross checking error TableĀ 90 ā Connection sections and message formats |
127 | 7.3 Time stamp operation FigureĀ 37 ā Time stamp sequence |
128 | 7.4 Rollover counts in the EF 7.5 Protocol sequence diagrams 7.5.1 General 7.5.2 Normal safety transmission FigureĀ 38 ā Sequence diagram of a normal producer/consumer safety sequence |
129 | 7.5.3 Lost, corrupted and delayed message transmission FigureĀ 39 ā Sequence diagram of a normal producer/consumersafety sequence (production repeated) |
130 | FigureĀ 40 ā Sequence diagram of a corrupted producer to consumer message |
131 | FigureĀ 41 ā Sequence diagram of a lost producer to consumer message |
132 | 7.5.4 Lost, corrupted or delayed message transmission with production repeated FigureĀ 42 ā Sequence diagram of a delayed message |
133 | FigureĀ 43 ā Sequence diagram of a corrupted producer to consumer message with production repeated |
134 | 7.5.5 Point-to-point ping FigureĀ 44 ā Sequence diagram of a connection terminated due to delays FigureĀ 45 ā Sequence diagram of a failure of safety CRC check |
135 | 7.5.6 Multipoint ping on CPĀ 2/3 Safety FigureĀ 46 ā Sequence diagram of a point-to-point ping ā normal response |
136 | 7.5.7 Multipoint ping on CPĀ 2/2 safety networks FigureĀ 47 ā Sequence diagram of a successful multipoint ping, CPĀ 2/3 safety |
137 | 7.5.8 Multipoint ping ā retry with success FigureĀ 48 ā Sequence diagram of a successful multipoint ping, CPĀ 2/2 safety |
138 | 7.5.9 Multipoint ping ā retry with timeout FigureĀ 49 ā Sequence diagram of a multipoint ping retry FigureĀ 50 ā Sequence diagram of a multipoint ping timeout |
139 | 7.6 Safety protocol definition 7.6.1 General 7.6.2 High level view of a safety device 7.6.3 Safety Validator object FigureĀ 51 ā Safety device reference model entity relation diagram |
140 | 7.6.4 Relationship between SafetyValidatorServer and SafetyValidatorClient 7.6.5 Extended Format time stamp rollover handling FigureĀ 52 ā Two devices interchanging safety data via a SafetyValidatorClient and a SafetyValidatorServer |
142 | FigureĀ 53 ā Point-to-point, originating consumer. target producer |
143 | FigureĀ 54 ā Point-to-point, originator producer, target consumer |
144 | FigureĀ 55 ā Multi-point, originator consumer, target producer |
145 | 7.6.6 SafetyValidatorClient function definition FigureĀ 56 ā Safety production data flow |
153 | 7.6.7 SafetyValidatorServer function definition |
154 | FigureĀ 57 ā Consumer safety data monitoring |
155 | FigureĀ 58 ā SafetyValidatorServer ā application triggered |
156 | TableĀ 91 ā Data reception ā Link triggered TableĀ 92 ā Time_Correction reception ā Link triggered TableĀ 93 ā Data reception ā Application triggered |
157 | TableĀ 94 ā Time_Correction reception ā Application triggered TableĀ 95 ā Consuming application ā Safety data monitoring |
166 | 7.7 Safety message and protocol data specifications 7.7.1 Mode octet |
167 | 7.7.2 Time Stamp Section 7.7.3 Time Coordination Message |
168 | 7.7.4 Time correction message 7.7.5 Safety data production |
169 | TableĀ 96 ā Producer connection status determination |
176 | 7.7.6 Producer dynamic variables |
178 | 7.7.7 Producer per consumer dynamic variables |
179 | 7.7.8 Consumer data variables |
180 | TableĀ 97 ā Consuming safety connection status |
181 | 7.7.9 Consumer input static variables |
182 | 7.7.10 Consumer dynamic variables |
184 | 8 Safety communication layer management 8.1 Overview 8.2 Definition of the measures used during connection establishment TableĀ 98 ā Connection establishment errors and measures to detect errors |
185 | TableĀ 99 ā SNN Date/Time allocations TableĀ 100 ā SNN legal range of time values |
188 | 8.3 Originator-Target relationship validation 8.4 Detection of mis-routed connection requests FigureĀ 59 ā Target ownership |
189 | 8.5 SafetyOpen processing 8.6 Ownership management FigureĀ 60 ā SafetyOpen forms |
190 | 8.7 Bridging different physical layers FigureĀ 61 ā Connection ownership state chart FigureĀ 62 ā SafetyOpen UNID mapping |
191 | FigureĀ 63 ā Common CPFĀ 2 application layer FigureĀ 64 ā End-to-End routing example |
192 | 8.8 Safety connection establishment 8.8.1 Overview 8.8.2 Basic facts for connection establishment 8.8.3 Configuring safety connections |
193 | TableĀ 101 ā Safety connection parameters |
194 | 8.8.4 Network time expectation multiplier FigureĀ 65 ā Sources for safety related connection parameters |
195 | 8.8.5 Establishing connections FigureĀ 66 ā Parameter mapping between originator and target |
196 | TableĀ 102 ā SafetyOpen summary |
197 | FigureĀ 67 ā CPĀ 2/3 Safety connection establishment in targets for Form 2a SafetyOpen |
198 | 8.8.6 Recommendations for consumer number allocation FigureĀ 68 ā General sequence to detect configuration is required |
199 | 8.8.7 Recommendations for connection establishment 8.8.8 Ownership establishment |
200 | 8.8.9 Ownership use cases |
203 | 8.8.10 PID/CID usage and establishment 8.8.11 Proper PID/CID usage in multipoint and point-to-point connections FigureĀ 69 ā PID/CID exchanges for two originator scenarios |
204 | FigureĀ 70 ā Seed generation for multipoint connections |
205 | 8.8.12 Network supported services FigureĀ 71 ā PID/CID runtime handling |
206 | 8.8.13 FSCPĀ 2/1 safety device type |
207 | TableĀ 103 ā Originator/Target service mapping TableĀ 104 ā Unsupported originator/target service types |
208 | FigureĀ 72 ā Connection categories and supported services |
209 | FigureĀ 73 ā Recommended connection types FigureĀ 74 ā Logic-to-logic supported services |
210 | 8.9 Safety configuration process 8.9.1 Introduction to safety configuration 8.9.2 Configuration goals FigureĀ 75 ā Recommended connection types for logic to logic |
211 | 8.9.3 Configuration overview FigureĀ 76 ā Configuration data transfers TableĀ 105 ā Configuration goals |
212 | 8.9.4 User configuration guidelines |
213 | 8.9.5 Configuration process SIL3 justification FigureĀ 77 ā Protection measures in safety devices |
214 | 8.9.6 Device functions for tool configuration 8.9.7 Password security 8.9.8 SNCT interface services 8.9.9 Configuration lock |
215 | 8.9.10 Effect of configuration lock on device behavior FigureĀ 78 ā Configuration, testing and locked relationships |
216 | 8.9.11 Configuration ownership 8.9.12 Configuration mode 8.9.13 Measures used to ensure integrity of configuration process TableĀ 106 ā Configuration owner control vs. device state |
217 | FigureĀ 79 ā Originator’s configuration data |
218 | 8.9.14 Download process |
219 | FigureĀ 80 ā SNCT to device download process |
220 | FigureĀ 81 ā SNCT Downloads to originators that perform Form 1 configuration |
221 | 8.9.15 Verification process |
222 | FigureĀ 82 ā Protection from locking and ownership FigureĀ 83 ā Example of read back and comparison of original and printout |
223 | 8.9.16 Verification process FigureĀ 84 ā Diverse display without full data read back |
224 | 8.9.17 Configuration error analysis FigureĀ 85 ā Verification process including all alternatives |
225 | TableĀ 107 ā Errors and detection measures |
228 | 8.10 Electronic Data Sheets extensions for safety 8.10.1 General rules for EDS based safety devices |
229 | 8.10.2 EDS extensions for safety TableĀ 108 ā Object Class section keywords |
230 | TableĀ 109 ā Safety Classx entry format TableĀ 110 ā Parameter class keywords |
231 | TableĀ 111 ā New Connection Manager section keywords for safety |
232 | TableĀ 112 ā Connection Manager field usage for safety |
233 | TableĀ 113 ā Connection parameter field settings for safety |
234 | 8.11 Requirements for CPĀ 2/2 8.11.1 EPI rules for safety messages that travel over CPĀ 2/2 8.11.2 Default safety I/O service 8.11.3 Duplicate IP detection 8.11.4 Priority for safety connections |
235 | 8.12 Requirements for CPĀ 2/3 8.12.1 Allocation of CPĀ 2/3 identifiers TableĀ 114 ā CPĀ 2/3 ID assignment rules |
237 | 8.12.2 Additional requirements 8.13 CPĀ 16/3 requirements 8.13.1 General architecture for CPFĀ 2 on CPĀ 16/3 |
238 | 8.13.2 Baseline FSCPĀ 2/1 on CPĀ 16/3 device FigureĀ 86 ā Baseline FSCPĀ 2/1 on CPĀ 16/3 device |
239 | 8.13.3 Supported objects and services in CPĀ 16/3 devices 8.13.4 Transport layer requirements |
241 | FigureĀ 87 ā FSCPĀ 2/1 Adaptation Layer and SMP interaction |
242 | 8.13.5 FSCPĀ 2/1 and the CPĀ 16/3 device model FigureĀ 88 ā FSCPĀ 2/1 Adaptation |
243 | 8.13.6 UNID assignment on CPĀ 16/3 FigureĀ 89 ā CPĀ 16/3 device model |
245 | FigureĀ 90 ā Adding a standard module to a modular device |
246 | 9 System requirements 9.1 Indicators and switches 9.1.1 General indicator requirements 9.1.2 LED indications for setting the device UNID 9.1.3 Module Status LED TableĀ 115 ā LED indications for setting UNID |
247 | 9.1.4 Indicator warning 9.1.5 Network Status LED TableĀ 116 ā Module Status LED TableĀ 117 ā Network status LED states |
248 | 9.1.6 Switches |
250 | 9.2 Installation guidelines FigureĀ 91 ā Safety device NodeID processing logic |
251 | 9.3 Safety function response time 9.3.1 Overview 9.3.2 Network time expectation FigureĀ 92 ā Safety function response time |
252 | 9.3.3 Equations for calculating network reaction times TableĀ 118 ā Connection reaction time type ā producing/consuming applications |
253 | FigureĀ 93 ā Safety function response time components |
254 | 9.4 Duration of demands 9.5 Constraints for calculation of system characteristics 9.5.1 Number of nodes 9.5.2 Network PFH FigureĀ 94 ā Network protocol reliability block diagram (RBD) |
256 | FigureĀ 95 ā Network PFH summary |
257 | 9.5.3 Bit Error Rate (BER) FigureĀ 96 ā Extended Format PFH summary |
258 | 9.6 Maintenance 9.7 Safety manual 10 Assessment |
259 | Annex A (informative) Additional information for functional safety communication profiles of CPF 2 A.1 Hash function example code |
273 | A.2 ā¦ |
274 | Annex B (informative) Information for assessment of the functional safety communication profiles of CPF 2 |
275 | Bibliography |