Shopping Cart

No products in the cart.

BS EN 61784-3-2:2017

$215.11

Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 2

Published By Publication Date Number of Pages
BSI 2017 278
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 2 of IEC 61784-1, IEC 61784-2 and IEC 61158 Type 2. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This safety communication layer is intended for implementation in safety devices only.

NOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.

This part1 defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2 for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.

This part provides guidelines for both developers and assessors of compliant devices and systems.

NOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system ā€“ implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.

PDF Catalog

PDF Pages PDF Title
2 National foreword
7 English
CONTENTS
17 FOREWORD
19 Figures
FigureĀ 1 ā€“ Relationships of IECĀ 617843 with other standards (machinery)
20 FigureĀ 2 ā€“ Relationships of IECĀ 617843 with other standards (process)
22 1 Scope
2 Normative references
24 3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions
3.1.1 Common terms and definitions
29 3.1.2 CPFĀ 2: Additional terms and definitions
3.2 Symbols and abbreviated terms
3.2.1 Common symbols and abbreviated terms
30 3.2.2 CPFĀ 2: Additional symbols and abbreviated terms
31 3.3 Conventions
4 Overview of FSCPĀ 2/1 (CIP Safetyā„¢)
4.1 General
4.2 FSCPĀ 2/1
32 5 General
5.1 External documents providing specifications for the profile
FigureĀ 3 ā€“ Relationship of Safety Validators
33 5.2 Safety functional requirements
5.3 Safety measures
34 5.4 Safety communication layer structure
Tables
TableĀ 1 ā€“ Communications errors and detection measures matrix
35 5.5 Relationships with FAL (and DLL, PhL)
5.5.1 General
5.5.2 Data types
6 Safety communication layer services
6.1 Introduction
FigureĀ 4 ā€“ Communication layers
36 6.2 Connection object
6.2.1 General
6.2.2 Class attribute extensions
6.2.3 Service extensions
TableĀ 2 ā€“ New class attributes
37 6.2.4 Explicit message response format for SafetyOpen and SafetyClose
6.3 Connection Manager object
6.3.1 General
TableĀ 3 ā€“ Service extensions
TableĀ 4 ā€“ SafetyOpen and SafetyClose response format
38 6.3.2 ForwardOpen for safety
39 FigureĀ 5 ā€“ ForwardOpen with safety network segment
40 6.3.3 Safety network segment
TableĀ 5 ā€“ Safety network segment identifier
TableĀ 6 ā€“ Safety network segment definition
41 FigureĀ 6 ā€“ Safety network target format
42 TableĀ 7 ā€“ Safety network segment router format
TableĀ 8 ā€“ Safety Network Segment Extended Format
43 6.3.4 Originator rules for calculating the connection parameter CRC
6.3.5 SafetyOpen processing flowcharts
44 FigureĀ 7 ā€“ Target Processing SafetyOpen with no configuration data(Form 2 SafetyOpen)
45 FigureĀ 8 ā€“ Target Processing for SafetyOpen with configuration data(Form 1 SafetyOpen)
46 6.3.6 Checks required by Multipoint producers with existing connections
FigureĀ 9 ā€“ Originator logic to determine which format to use
47 6.3.7 Electronic key usage for safety
6.3.8 RPI vs. API in safety connections
6.3.9 Application path construction for safety
TableĀ 9 ā€“ Multipoint producer parameter evaluation rules
48 6.3.10 Safety Validator connection types
49 TableĀ 10 ā€“ ForwardOpen setting options for safety connections
51 6.3.11 Application reply data in a successful SafetyOpen response
TableĀ 11 ā€“ Network connection parameters for safety connections
TableĀ 12 ā€“ CPĀ 2/3 Safety target application reply (size: 10 octets)
52 TableĀ 13 ā€“ EF CPĀ 2/3 Safety target application reply (size: 14 octets)
TableĀ 14 ā€“ SafetyOpen target application reply (size: 18 octets)
53 6.3.12 Unsuccessful SafetyOpen response
TableĀ 15 ā€“ EF SafetyOpen target application reply (size: 22 octets)
TableĀ 16 ā€“ New and extended error codes for safety
54 TableĀ 17 ā€“ SafetyOpen error event guidance table
55 6.3.13 ForwardClose for safety
6.4 Identity object
6.4.1 General
6.4.2 Changes to common services
56 6.4.3 Extensions for CPĀ 16/3 devices
6.5 Link objects
6.5.1 DeviceNet object changes
TableĀ 18 ā€“ Identity object common service changes
TableĀ 19 ā€“ Identity object extensions for CPĀ 16/3 devices
TableĀ 20 ā€“ New DeviceNet object instance attribute
57 6.5.2 TCP/IP Interface object changes
6.5.3 SERCOS III Link object
TableĀ 21 ā€“ New TCP/IP Interface object instance attribute
TableĀ 22 ā€“ SERCOS III Link object class attributes
58 6.6 Safety Supervisor object
6.6.1 General
TableĀ 23 ā€“ SERCOS III Link object instance attributes
TableĀ 24 ā€“ SERCOS III Link Object Common Services
59 6.6.2 Safety Supervisor class attributes
6.6.3 Subclasses
6.6.4 Safety Supervisor instance attributes
TableĀ 25 ā€“ Safety Supervisor class attributes
60 TableĀ 26 ā€“ Safety Supervisor instance attributes
63 6.6.5 Semantics
64 TableĀ 27 ā€“ Device status attribute state values
TableĀ 28 ā€“ Exception status attribute format
65 TableĀ 29 ā€“ Common exception detail attribute values
66 TableĀ 30 ā€“ Exception detail format summary
68 TableĀ 31 ā€“ Summary of device behavior for various CFUNID values
69 6.6.6 Subclasses
6.6.7 Safety Supervisor common services
70 TableĀ 32 ā€“ Safety Supervisor common services
TableĀ 33 ā€“ Safety Supervisor object specific services
72 TableĀ 34 ā€“ Configure_Request message structure
TableĀ 35 ā€“ Validate_Configuration message structure
TableĀ 36 ā€“ Validate_Configuration success message structure
73 FigureĀ 10 ā€“ Applying device configuration
TableĀ 37 ā€“ Validate_Configuration error code
TableĀ 38 ā€“ Validate_Configuration extended codes
74 FigureĀ 11 ā€“ Configure and Validate processing flowcharts
75 TableĀ 39 ā€“ Set_Password message structure
TableĀ 40 ā€“ Reset_Password message structure
76 TableĀ 41 ā€“ Configuration_Lock/Unlock message structure
TableĀ 42 ā€“ Mode_Change message structure
77 TableĀ 43 ā€“ Safety_Reset message structure
TableĀ 44 ā€“ Safety Supervisor safety reset types
TableĀ 45 ā€“ Attribute bit map parameter
78 TableĀ 46 ā€“ Reset processing rules for reset types
TableĀ 47 ā€“ Propose_TUNID service
79 TableĀ 48 ā€“ Apply_TUNID service
80 6.6.8 Safety Supervisor behavior
FigureĀ 12 ā€“ UNID handling during ā€œWaiting for TUNIDā€
81 FigureĀ 13 ā€“ Safety Supervisor state diagram
TableĀ 49 ā€“ Safety Supervisor events
82 TableĀ 50 ā€“ State event matrix for Safety Supervisor
85 FigureĀ 14 ā€“ Configuration, testing and locked relationships
TableĀ 51 ā€“ Configuration owner control vs. device state
86 TableĀ 52 ā€“ State mapping of Safety Supervisor to Identity object
TableĀ 53 ā€“ Safety Supervisor object event mapping
87 6.7 Safety Validator object
6.7.1 General
6.7.2 Class attributes
TableĀ 54 ā€“ Identity object event mapping
88 6.7.3 Instance attributes
TableĀ 55 ā€“ Safety Validator class attributes
TableĀ 56 ā€“ Safety Validator instance attributes
90 TableĀ 57 ā€“ Safety Validator state assignments
91 FigureĀ 15 ā€“ Safety connection types
TableĀ 58 ā€“ Safety Validator type, bit field assignments
92 TableĀ 59 ā€“ Multipoint producer SafetyOpen parameter evaluation rules
93 6.7.4 Class services
TableĀ 60 ā€“ Safety Validator class services
94 6.7.5 Instance services
6.7.6 Object behavior
TableĀ 61 ā€“ Safety Validator instance services
TableĀ 62 ā€“ Safety Validator Get_Attributes_All service data
95 FigureĀ 16 ā€“ Safety Validator state transition diagram
96 TableĀ 63 ā€“ Safety Validator state event matrix
97 6.8 Connection Configuration Object
6.8.1 General
6.8.2 Class attribute extensions
6.8.3 Instance attributes, additions and extensions.
TableĀ 64 ā€“ State mapping between Safety Supervisor and Safety Validator objects
TableĀ 65 ā€“ Connection configuration object class attribute extensions
TableĀ 66 ā€“ Connection Configuration Object instance attribute additions/extensions
100 6.8.4 Instance attribute semantics extensions or restrictions for safety
TableĀ 67 ā€“ Connection flag bit definitions
101 TableĀ 68 ā€“ O-to-T connection parameters
102 TableĀ 69 ā€“ T-to-O connection parameters
103 TableĀ 70 ā€“ Data map formats
104 6.8.5 Special Safety Related Parameters ā€“ (Attribute 13)
TableĀ 71 ā€“ Data map format 0
TableĀ 72 ā€“ Data map format 1
106 TableĀ 73 ā€“ Target deviceā€™s SCCRC values
TableĀ 74 ā€“ Target deviceā€™s SCTS values
107 TableĀ 75 ā€“ Time correction connection parameters for multipoint connection
108 TableĀ 76 ā€“ Format Type attribute meaning
109 FigureĀ 17 ā€“ Logic for Auto-detecting format type
TableĀ 77 ā€“ Format Status attribute meaning
110 6.8.6 Object-specific services
6.8.7 Common service extensions for safety
TableĀ 78 ā€“ Connection Configuration Object-specific services
TableĀ 79 ā€“ Get_Attributes_All Response service data (added attributes )
111 TableĀ 80 ā€“ Get_Attributes_All Response service data (added parameters )
TableĀ 81 ā€“ Set_Attributes_All Request service data (added attributes)
TableĀ 82 ā€“ Set_Attributes_All Response service data (added parameters )
112 6.8.8 Object behavior
FigureĀ 18 ā€“ Connection Configuration Object state diagram
TableĀ 83 ā€“ State Mapping between Safety Supervisor and the CCO objects
113 7 Safety communication layer protocol
7.1 Safety PDU format
7.1.1 Safety PDU encoding
FigureĀ 19 ā€“ Connection Configuration Object data flow
114 Figure 20 ā€“ Format of the mode octet
TableĀ 84 ā€“ Connection sections and PDU formats
115 FigureĀ 21 ā€“ 1 or 2 octet data section, Base Format
TableĀ 85 ā€“ Mode octet variables
116 FigureĀ 22 ā€“ 1 or 2 octet data section, Extended Format
FigureĀ 23 ā€“ 3 to 250 octet data section format, Base Format
117 FigureĀ 24 ā€“ 3 to 250 octet data section format, Extended Format
118 FigureĀ 25 ā€“ Time Stamp section format, Base Format
TableĀ 86 ā€“ Time Stamp variables
119 FigureĀ 26 ā€“ BF Time Coordination message encoding
FigureĀ 27 ā€“ EF Time Coordination message encoding
TableĀ 87 ā€“ Time Coordination message variables
120 FigureĀ 28 ā€“ BF Time Correction message encoding
FigureĀ 29 ā€“ EF Time Correction message encoding
121 TableĀ 88 ā€“ Time Correction Message variables
122 FigureĀ 30 ā€“ 1 or 2 octet point-to-point PDU encoding
FigureĀ 31 ā€“ 1 or 2 Octet multipoint PDU encoding
123 FigureĀ 32 ā€“ 1 or 2 Octet, multipoint, Format 2 safety connection format
FigureĀ 33 ā€“ 3 to 250 Octet Point-to-point PDU encoding
124 FigureĀ 34 ā€“ 3 to 248 Octet Multipoint PDU encoding
FigureĀ 35 ā€“ 3 to 248 Octet, Multipoint, safety connection format
125 7.1.2 Safety CRC
FigureĀ 36 ā€“ CRC Calculation order for Extended Format messages
TableĀ 89 ā€“ CRC polynomials used
126 7.2 Communication protocol behavior
7.2.1 Sequence of safety checks
7.2.2 Connection termination
7.2.3 Cross checking error
TableĀ 90 ā€“ Connection sections and message formats
127 7.3 Time stamp operation
FigureĀ 37 ā€“ Time stamp sequence
128 7.4 Rollover counts in the EF
7.5 Protocol sequence diagrams
7.5.1 General
7.5.2 Normal safety transmission
FigureĀ 38 ā€“ Sequence diagram of a normal producer/consumer safety sequence
129 7.5.3 Lost, corrupted and delayed message transmission
FigureĀ 39 ā€“ Sequence diagram of a normal producer/consumersafety sequence (production repeated)
130 FigureĀ 40 ā€“ Sequence diagram of a corrupted producer to consumer message
131 FigureĀ 41 ā€“ Sequence diagram of a lost producer to consumer message
132 7.5.4 Lost, corrupted or delayed message transmission with production repeated
FigureĀ 42 ā€“ Sequence diagram of a delayed message
133 FigureĀ 43 ā€“ Sequence diagram of a corrupted producer to consumer message with production repeated
134 7.5.5 Point-to-point ping
FigureĀ 44 ā€“ Sequence diagram of a connection terminated due to delays
FigureĀ 45 ā€“ Sequence diagram of a failure of safety CRC check
135 7.5.6 Multipoint ping on CPĀ 2/3 Safety
FigureĀ 46 ā€“ Sequence diagram of a point-to-point ping ā€“ normal response
136 7.5.7 Multipoint ping on CPĀ 2/2 safety networks
FigureĀ 47 ā€“ Sequence diagram of a successful multipoint ping, CPĀ 2/3 safety
137 7.5.8 Multipoint ping ā€“ retry with success
FigureĀ 48 ā€“ Sequence diagram of a successful multipoint ping, CPĀ 2/2 safety
138 7.5.9 Multipoint ping ā€“ retry with timeout
FigureĀ 49 ā€“ Sequence diagram of a multipoint ping retry
FigureĀ 50 ā€“ Sequence diagram of a multipoint ping timeout
139 7.6 Safety protocol definition
7.6.1 General
7.6.2 High level view of a safety device
7.6.3 Safety Validator object
FigureĀ 51 ā€“ Safety device reference model entity relation diagram
140 7.6.4 Relationship between SafetyValidatorServer and SafetyValidatorClient
7.6.5 Extended Format time stamp rollover handling
FigureĀ 52 ā€“ Two devices interchanging safety data via a SafetyValidatorClient and a SafetyValidatorServer
142 FigureĀ 53 ā€“ Point-to-point, originating consumer. target producer
143 FigureĀ 54 ā€“ Point-to-point, originator producer, target consumer
144 FigureĀ 55 ā€“ Multi-point, originator consumer, target producer
145 7.6.6 SafetyValidatorClient function definition
FigureĀ 56 ā€“ Safety production data flow
153 7.6.7 SafetyValidatorServer function definition
154 FigureĀ 57 ā€“ Consumer safety data monitoring
155 FigureĀ 58 ā€“ SafetyValidatorServer ā€“ application triggered
156 TableĀ 91 ā€“ Data reception ā€“ Link triggered
TableĀ 92 ā€“ Time_Correction reception ā€“ Link triggered
TableĀ 93 ā€“ Data reception ā€“ Application triggered
157 TableĀ 94 ā€“ Time_Correction reception ā€“ Application triggered
TableĀ 95 ā€“ Consuming application ā€“ Safety data monitoring
166 7.7 Safety message and protocol data specifications
7.7.1 Mode octet
167 7.7.2 Time Stamp Section
7.7.3 Time Coordination Message
168 7.7.4 Time correction message
7.7.5 Safety data production
169 TableĀ 96 ā€“ Producer connection status determination
176 7.7.6 Producer dynamic variables
178 7.7.7 Producer per consumer dynamic variables
179 7.7.8 Consumer data variables
180 TableĀ 97 ā€“ Consuming safety connection status
181 7.7.9 Consumer input static variables
182 7.7.10 Consumer dynamic variables
184 8 Safety communication layer management
8.1 Overview
8.2 Definition of the measures used during connection establishment
TableĀ 98 ā€“ Connection establishment errors and measures to detect errors
185 TableĀ 99 ā€“ SNN Date/Time allocations
TableĀ 100 ā€“ SNN legal range of time values
188 8.3 Originator-Target relationship validation
8.4 Detection of mis-routed connection requests
FigureĀ 59 ā€“ Target ownership
189 8.5 SafetyOpen processing
8.6 Ownership management
FigureĀ 60 ā€“ SafetyOpen forms
190 8.7 Bridging different physical layers
FigureĀ 61 ā€“ Connection ownership state chart
FigureĀ 62 ā€“ SafetyOpen UNID mapping
191 FigureĀ 63 ā€“ Common CPFĀ 2 application layer
FigureĀ 64 ā€“ End-to-End routing example
192 8.8 Safety connection establishment
8.8.1 Overview
8.8.2 Basic facts for connection establishment
8.8.3 Configuring safety connections
193 TableĀ 101 ā€“ Safety connection parameters
194 8.8.4 Network time expectation multiplier
FigureĀ 65 ā€“ Sources for safety related connection parameters
195 8.8.5 Establishing connections
FigureĀ 66 ā€“ Parameter mapping between originator and target
196 TableĀ 102 ā€“ SafetyOpen summary
197 FigureĀ 67 ā€“ CPĀ 2/3 Safety connection establishment in targets for Form 2a SafetyOpen
198 8.8.6 Recommendations for consumer number allocation
FigureĀ 68 ā€“ General sequence to detect configuration is required
199 8.8.7 Recommendations for connection establishment
8.8.8 Ownership establishment
200 8.8.9 Ownership use cases
203 8.8.10 PID/CID usage and establishment
8.8.11 Proper PID/CID usage in multipoint and point-to-point connections
FigureĀ 69 ā€“ PID/CID exchanges for two originator scenarios
204 FigureĀ 70 ā€“ Seed generation for multipoint connections
205 8.8.12 Network supported services
FigureĀ 71 ā€“ PID/CID runtime handling
206 8.8.13 FSCPĀ 2/1 safety device type
207 TableĀ 103 ā€“ Originator/Target service mapping
TableĀ 104 ā€“ Unsupported originator/target service types
208 FigureĀ 72 ā€“ Connection categories and supported services
209 FigureĀ 73 ā€“ Recommended connection types
FigureĀ 74 ā€“ Logic-to-logic supported services
210 8.9 Safety configuration process
8.9.1 Introduction to safety configuration
8.9.2 Configuration goals
FigureĀ 75 ā€“ Recommended connection types for logic to logic
211 8.9.3 Configuration overview
FigureĀ 76 ā€“ Configuration data transfers
TableĀ 105 ā€“ Configuration goals
212 8.9.4 User configuration guidelines
213 8.9.5 Configuration process SIL3 justification
FigureĀ 77 ā€“ Protection measures in safety devices
214 8.9.6 Device functions for tool configuration
8.9.7 Password security
8.9.8 SNCT interface services
8.9.9 Configuration lock
215 8.9.10 Effect of configuration lock on device behavior
FigureĀ 78 ā€“ Configuration, testing and locked relationships
216 8.9.11 Configuration ownership
8.9.12 Configuration mode
8.9.13 Measures used to ensure integrity of configuration process
TableĀ 106 ā€“ Configuration owner control vs. device state
217 FigureĀ 79 ā€“ Originator’s configuration data
218 8.9.14 Download process
219 FigureĀ 80 ā€“ SNCT to device download process
220 FigureĀ 81 ā€“ SNCT Downloads to originators that perform Form 1 configuration
221 8.9.15 Verification process
222 FigureĀ 82 ā€“ Protection from locking and ownership
FigureĀ 83 ā€“ Example of read back and comparison of original and printout
223 8.9.16 Verification process
FigureĀ 84 ā€“ Diverse display without full data read back
224 8.9.17 Configuration error analysis
FigureĀ 85 ā€“ Verification process including all alternatives
225 TableĀ 107 ā€“ Errors and detection measures
228 8.10 Electronic Data Sheets extensions for safety
8.10.1 General rules for EDS based safety devices
229 8.10.2 EDS extensions for safety
TableĀ 108 ā€“ Object Class section keywords
230 TableĀ 109 ā€“ Safety Classx entry format
TableĀ 110 ā€“ Parameter class keywords
231 TableĀ 111 ā€“ New Connection Manager section keywords for safety
232 TableĀ 112 ā€“ Connection Manager field usage for safety
233 TableĀ 113 ā€“ Connection parameter field settings for safety
234 8.11 Requirements for CPĀ 2/2
8.11.1 EPI rules for safety messages that travel over CPĀ 2/2
8.11.2 Default safety I/O service
8.11.3 Duplicate IP detection
8.11.4 Priority for safety connections
235 8.12 Requirements for CPĀ 2/3
8.12.1 Allocation of CPĀ 2/3 identifiers
TableĀ 114 ā€“ CPĀ 2/3 ID assignment rules
237 8.12.2 Additional requirements
8.13 CPĀ 16/3 requirements
8.13.1 General architecture for CPFĀ 2 on CPĀ 16/3
238 8.13.2 Baseline FSCPĀ 2/1 on CPĀ 16/3 device
FigureĀ 86 ā€“ Baseline FSCPĀ 2/1 on CPĀ 16/3 device
239 8.13.3 Supported objects and services in CPĀ 16/3 devices
8.13.4 Transport layer requirements
241 FigureĀ 87 ā€“ FSCPĀ 2/1 Adaptation Layer and SMP interaction
242 8.13.5 FSCPĀ 2/1 and the CPĀ 16/3 device model
FigureĀ 88 ā€“ FSCPĀ 2/1 Adaptation
243 8.13.6 UNID assignment on CPĀ 16/3
FigureĀ 89 ā€“ CPĀ 16/3 device model
245 FigureĀ 90 ā€“ Adding a standard module to a modular device
246 9 System requirements
9.1 Indicators and switches
9.1.1 General indicator requirements
9.1.2 LED indications for setting the device UNID
9.1.3 Module Status LED
TableĀ 115 ā€“ LED indications for setting UNID
247 9.1.4 Indicator warning
9.1.5 Network Status LED
TableĀ 116 ā€“ Module Status LED
TableĀ 117 ā€“ Network status LED states
248 9.1.6 Switches
250 9.2 Installation guidelines
FigureĀ 91 ā€“ Safety device NodeID processing logic
251 9.3 Safety function response time
9.3.1 Overview
9.3.2 Network time expectation
FigureĀ 92 ā€“ Safety function response time
252 9.3.3 Equations for calculating network reaction times
TableĀ 118 ā€“ Connection reaction time type ā€“ producing/consuming applications
253 FigureĀ 93 ā€“ Safety function response time components
254 9.4 Duration of demands
9.5 Constraints for calculation of system characteristics
9.5.1 Number of nodes
9.5.2 Network PFH
FigureĀ 94 ā€“ Network protocol reliability block diagram (RBD)
256 FigureĀ 95 ā€“ Network PFH summary
257 9.5.3 Bit Error Rate (BER)
FigureĀ 96 ā€“ Extended Format PFH summary
258 9.6 Maintenance
9.7 Safety manual
10 Assessment
259 Annex A (informative) Additional information for functional safety communication profiles of CPF 2
A.1 Hash function example code
273 A.2 ā€¦
274 Annex B (informative) Information for assessment of the functional safety communication profiles of CPF 2
275 Bibliography
BS EN 61784-3-2:2017
$215.11