Shopping Cart

No products in the cart.

BS EN 61784-3-2:2017 – TC:2020 Edition

$280.87

Tracked Changes. Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 2

Published By Publication Date Number of Pages
BSI 2020 559
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

IEC 61784 3-2:2016 specifies a safety communication layer (services and protocol) based on CPF 2 of IEC 61784-1, IEC 61784-2 and IEC 61158 Type 2. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This safety communication layer is intended for implementation in safety devices only. This third edition cancels and replaces the second edition published in 2010. This edition constitutes a technical revision. The main changes with respect to the previous edition are listed below (and highlighted in yellow in this document): – Added detailed requirements for use of FSCP 2/1 in conjunction with CP 16/3 (see 4.1, 6.4.3, 6.5.3, 8.2, 8.13, and miscellaneous references when referencing CPF 2 networks); – Defined object class section keywords for safety to EDS file definition in 8.10.2.1; – New sections on safety CRC overview in 7.1.2.1 and Rollover counts for EF format in 7.4; – Corrections to PFH calculations in 9.5.2; – Change from MACID to NodeID as general reference to network identifier.

PDF Catalog

PDF Pages PDF Title
281 National foreword
286 English
CONTENTS
296 FOREWORD
298 Figures
FigureĀ 1 ā€“ Relationships of IECĀ 617843 with other standards (machinery)
299 FigureĀ 2 ā€“ Relationships of IECĀ 617843 with other standards (process)
301 1 Scope
2 Normative references
303 3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions
3.1.1 Common terms and definitions
308 3.1.2 CPFĀ 2: Additional terms and definitions
3.2 Symbols and abbreviated terms
3.2.1 Common symbols and abbreviated terms
309 3.2.2 CPFĀ 2: Additional symbols and abbreviated terms
310 3.3 Conventions
4 Overview of FSCPĀ 2/1 (CIP Safetyā„¢)
4.1 General
4.2 FSCPĀ 2/1
311 5 General
5.1 External documents providing specifications for the profile
FigureĀ 3 ā€“ Relationship of Safety Validators
312 5.2 Safety functional requirements
5.3 Safety measures
313 5.4 Safety communication layer structure
Tables
TableĀ 1 ā€“ Communications errors and detection measures matrix
314 5.5 Relationships with FAL (and DLL, PhL)
5.5.1 General
5.5.2 Data types
6 Safety communication layer services
6.1 Introduction
FigureĀ 4 ā€“ Communication layers
315 6.2 Connection object
6.2.1 General
6.2.2 Class attribute extensions
6.2.3 Service extensions
TableĀ 2 ā€“ New class attributes
316 6.2.4 Explicit message response format for SafetyOpen and SafetyClose
6.3 Connection Manager object
6.3.1 General
TableĀ 3 ā€“ Service extensions
TableĀ 4 ā€“ SafetyOpen and SafetyClose response format
317 6.3.2 ForwardOpen for safety
318 FigureĀ 5 ā€“ ForwardOpen with safety network segment
319 6.3.3 Safety network segment
TableĀ 5 ā€“ Safety network segment identifier
TableĀ 6 ā€“ Safety network segment definition
320 FigureĀ 6 ā€“ Safety network target format
321 TableĀ 7 ā€“ Safety network segment router format
TableĀ 8 ā€“ Safety Network Segment Extended Format
322 6.3.4 Originator rules for calculating the connection parameter CRC
6.3.5 SafetyOpen processing flowcharts
323 FigureĀ 7 ā€“ Target Processing SafetyOpen with no configuration data(Form 2 SafetyOpen)
324 FigureĀ 8 ā€“ Target Processing for SafetyOpen with configuration data(Form 1 SafetyOpen)
325 6.3.6 Checks required by Multipoint producers with existing connections
FigureĀ 9 ā€“ Originator logic to determine which format to use
326 6.3.7 Electronic key usage for safety
6.3.8 RPI vs. API in safety connections
6.3.9 Application path construction for safety
TableĀ 9 ā€“ Multipoint producer parameter evaluation rules
327 6.3.10 Safety Validator connection types
328 TableĀ 10 ā€“ ForwardOpen setting options for safety connections
330 6.3.11 Application reply data in a successful SafetyOpen response
TableĀ 11 ā€“ Network connection parameters for safety connections
TableĀ 12 ā€“ CPĀ 2/3 Safety target application reply (size: 10 octets)
331 TableĀ 13 ā€“ EF CPĀ 2/3 Safety target application reply (size: 14 octets)
TableĀ 14 ā€“ SafetyOpen target application reply (size: 18 octets)
332 6.3.12 Unsuccessful SafetyOpen response
TableĀ 15 ā€“ EF SafetyOpen target application reply (size: 22 octets)
TableĀ 16 ā€“ New and extended error codes for safety
333 TableĀ 17 ā€“ SafetyOpen error event guidance table
334 6.3.13 ForwardClose for safety
6.4 Identity object
6.4.1 General
6.4.2 Changes to common services
335 6.4.3 Extensions for CPĀ 16/3 devices
6.5 Link objects
6.5.1 DeviceNet object changes
TableĀ 18 ā€“ Identity object common service changes
TableĀ 19 ā€“ Identity object extensions for CPĀ 16/3 devices
TableĀ 20 ā€“ New DeviceNet object instance attribute
336 6.5.2 TCP/IP Interface object changes
6.5.3 SERCOS III Link object
TableĀ 21 ā€“ New TCP/IP Interface object instance attribute
TableĀ 22 ā€“ SERCOS III Link object class attributes
337 6.6 Safety Supervisor object
6.6.1 General
TableĀ 23 ā€“ SERCOS III Link object instance attributes
TableĀ 24 ā€“ SERCOS III Link Object Common Services
338 6.6.2 Safety Supervisor class attributes
6.6.3 Subclasses
6.6.4 Safety Supervisor instance attributes
TableĀ 25 ā€“ Safety Supervisor class attributes
339 TableĀ 26 ā€“ Safety Supervisor instance attributes
342 6.6.5 Semantics
343 TableĀ 27 ā€“ Device status attribute state values
TableĀ 28 ā€“ Exception status attribute format
344 TableĀ 29 ā€“ Common exception detail attribute values
345 TableĀ 30 ā€“ Exception detail format summary
347 TableĀ 31 ā€“ Summary of device behavior for various CFUNID values
348 6.6.6 Subclasses
6.6.7 Safety Supervisor common services
349 TableĀ 32 ā€“ Safety Supervisor common services
TableĀ 33 ā€“ Safety Supervisor object specific services
351 TableĀ 34 ā€“ Configure_Request message structure
TableĀ 35 ā€“ Validate_Configuration message structure
TableĀ 36 ā€“ Validate_Configuration success message structure
352 FigureĀ 10 ā€“ Applying device configuration
TableĀ 37 ā€“ Validate_Configuration error code
TableĀ 38 ā€“ Validate_Configuration extended codes
353 FigureĀ 11 ā€“ Configure and Validate processing flowcharts
354 TableĀ 39 ā€“ Set_Password message structure
TableĀ 40 ā€“ Reset_Password message structure
355 TableĀ 41 ā€“ Configuration_Lock/Unlock message structure
TableĀ 42 ā€“ Mode_Change message structure
356 TableĀ 43 ā€“ Safety_Reset message structure
TableĀ 44 ā€“ Safety Supervisor safety reset types
TableĀ 45 ā€“ Attribute bit map parameter
357 TableĀ 46 ā€“ Reset processing rules for reset types
TableĀ 47 ā€“ Propose_TUNID service
358 TableĀ 48 ā€“ Apply_TUNID service
359 6.6.8 Safety Supervisor behavior
FigureĀ 12 ā€“ UNID handling during ā€œWaiting for TUNIDā€
360 FigureĀ 13 ā€“ Safety Supervisor state diagram
TableĀ 49 ā€“ Safety Supervisor events
361 TableĀ 50 ā€“ State event matrix for Safety Supervisor
364 FigureĀ 14 ā€“ Configuration, testing and locked relationships
TableĀ 51 ā€“ Configuration owner control vs. device state
365 TableĀ 52 ā€“ State mapping of Safety Supervisor to Identity object
TableĀ 53 ā€“ Safety Supervisor object event mapping
366 6.7 Safety Validator object
6.7.1 General
6.7.2 Class attributes
TableĀ 54 ā€“ Identity object event mapping
367 6.7.3 Instance attributes
TableĀ 55 ā€“ Safety Validator class attributes
TableĀ 56 ā€“ Safety Validator instance attributes
369 TableĀ 57 ā€“ Safety Validator state assignments
370 FigureĀ 15 ā€“ Safety connection types
TableĀ 58 ā€“ Safety Validator type, bit field assignments
371 TableĀ 59 ā€“ Multipoint producer SafetyOpen parameter evaluation rules
372 6.7.4 Class services
TableĀ 60 ā€“ Safety Validator class services
373 6.7.5 Instance services
6.7.6 Object behavior
TableĀ 61 ā€“ Safety Validator instance services
TableĀ 62 ā€“ Safety Validator Get_Attributes_All service data
374 FigureĀ 16 ā€“ Safety Validator state transition diagram
375 TableĀ 63 ā€“ Safety Validator state event matrix
376 6.8 Connection Configuration Object
6.8.1 General
6.8.2 Class attribute extensions
6.8.3 Instance attributes, additions and extensions.
TableĀ 64 ā€“ State mapping between Safety Supervisor and Safety Validator objects
TableĀ 65 ā€“ Connection configuration object class attribute extensions
TableĀ 66 ā€“ Connection Configuration Object instance attribute additions/extensions
379 6.8.4 Instance attribute semantics extensions or restrictions for safety
TableĀ 67 ā€“ Connection flag bit definitions
380 TableĀ 68 ā€“ O-to-T connection parameters
381 TableĀ 69 ā€“ T-to-O connection parameters
382 TableĀ 70 ā€“ Data map formats
383 6.8.5 Special Safety Related Parameters ā€“ (Attribute 13)
TableĀ 71 ā€“ Data map format 0
TableĀ 72 ā€“ Data map format 1
385 TableĀ 73 ā€“ Target deviceā€™s SCCRC values
TableĀ 74 ā€“ Target deviceā€™s SCTS values
386 TableĀ 75 ā€“ Time correction connection parameters for multipoint connection
387 TableĀ 76 ā€“ Format Type attribute meaning
388 FigureĀ 17 ā€“ Logic for Auto-detecting format type
TableĀ 77 ā€“ Format Status attribute meaning
389 6.8.6 Object-specific services
6.8.7 Common service extensions for safety
TableĀ 78 ā€“ Connection Configuration Object-specific services
TableĀ 79 ā€“ Get_Attributes_All Response service data (added attributes )
390 TableĀ 80 ā€“ Get_Attributes_All Response service data (added parameters )
TableĀ 81 ā€“ Set_Attributes_All Request service data (added attributes)
TableĀ 82 ā€“ Set_Attributes_All Response service data (added parameters )
391 6.8.8 Object behavior
FigureĀ 18 ā€“ Connection Configuration Object state diagram
TableĀ 83 ā€“ State Mapping between Safety Supervisor and the CCO objects
392 7 Safety communication layer protocol
7.1 Safety PDU format
7.1.1 Safety PDU encoding
FigureĀ 19 ā€“ Connection Configuration Object data flow
393 Figure 20 ā€“ Format of the mode octet
TableĀ 84 ā€“ Connection sections and PDU formats
394 FigureĀ 21 ā€“ 1 or 2 octet data section, Base Format
TableĀ 85 ā€“ Mode octet variables
395 FigureĀ 22 ā€“ 1 or 2 octet data section, Extended Format
FigureĀ 23 ā€“ 3 to 250 octet data section format, Base Format
396 FigureĀ 24 ā€“ 3 to 250 octet data section format, Extended Format
397 FigureĀ 25 ā€“ Time Stamp section format, Base Format
TableĀ 86 ā€“ Time Stamp variables
398 FigureĀ 26 ā€“ BF Time Coordination message encoding
FigureĀ 27 ā€“ EF Time Coordination message encoding
TableĀ 87 ā€“ Time Coordination message variables
399 FigureĀ 28 ā€“ BF Time Correction message encoding
FigureĀ 29 ā€“ EF Time Correction message encoding
400 TableĀ 88 ā€“ Time Correction Message variables
401 FigureĀ 30 ā€“ 1 or 2 octet point-to-point PDU encoding
FigureĀ 31 ā€“ 1 or 2 Octet multipoint PDU encoding
402 FigureĀ 32 ā€“ 1 or 2 Octet, multipoint, Format 2 safety connection format
FigureĀ 33 ā€“ 3 to 250 Octet Point-to-point PDU encoding
403 FigureĀ 34 ā€“ 3 to 248 Octet Multipoint PDU encoding
FigureĀ 35 ā€“ 3 to 248 Octet, Multipoint, safety connection format
404 7.1.2 Safety CRC
FigureĀ 36 ā€“ CRC Calculation order for Extended Format messages
TableĀ 89 ā€“ CRC polynomials used
405 7.2 Communication protocol behavior
7.2.1 Sequence of safety checks
7.2.2 Connection termination
7.2.3 Cross checking error
TableĀ 90 ā€“ Connection sections and message formats
406 7.3 Time stamp operation
FigureĀ 37 ā€“ Time stamp sequence
407 7.4 Rollover counts in the EF
7.5 Protocol sequence diagrams
7.5.1 General
7.5.2 Normal safety transmission
FigureĀ 38 ā€“ Sequence diagram of a normal producer/consumer safety sequence
408 7.5.3 Lost, corrupted and delayed message transmission
FigureĀ 39 ā€“ Sequence diagram of a normal producer/consumersafety sequence (production repeated)
409 FigureĀ 40 ā€“ Sequence diagram of a corrupted producer to consumer message
410 FigureĀ 41 ā€“ Sequence diagram of a lost producer to consumer message
411 7.5.4 Lost, corrupted or delayed message transmission with production repeated
FigureĀ 42 ā€“ Sequence diagram of a delayed message
412 FigureĀ 43 ā€“ Sequence diagram of a corrupted producer to consumer message with production repeated
413 7.5.5 Point-to-point ping
FigureĀ 44 ā€“ Sequence diagram of a connection terminated due to delays
FigureĀ 45 ā€“ Sequence diagram of a failure of safety CRC check
414 7.5.6 Multipoint ping on CPĀ 2/3 Safety
FigureĀ 46 ā€“ Sequence diagram of a point-to-point ping ā€“ normal response
415 7.5.7 Multipoint ping on CPĀ 2/2 safety networks
FigureĀ 47 ā€“ Sequence diagram of a successful multipoint ping, CPĀ 2/3 safety
416 7.5.8 Multipoint ping ā€“ retry with success
FigureĀ 48 ā€“ Sequence diagram of a successful multipoint ping, CPĀ 2/2 safety
417 7.5.9 Multipoint ping ā€“ retry with timeout
FigureĀ 49 ā€“ Sequence diagram of a multipoint ping retry
FigureĀ 50 ā€“ Sequence diagram of a multipoint ping timeout
418 7.6 Safety protocol definition
7.6.1 General
7.6.2 High level view of a safety device
7.6.3 Safety Validator object
FigureĀ 51 ā€“ Safety device reference model entity relation diagram
419 7.6.4 Relationship between SafetyValidatorServer and SafetyValidatorClient
7.6.5 Extended Format time stamp rollover handling
FigureĀ 52 ā€“ Two devices interchanging safety data via a SafetyValidatorClient and a SafetyValidatorServer
421 FigureĀ 53 ā€“ Point-to-point, originating consumer. target producer
422 FigureĀ 54 ā€“ Point-to-point, originator producer, target consumer
423 FigureĀ 55 ā€“ Multi-point, originator consumer, target producer
424 7.6.6 SafetyValidatorClient function definition
FigureĀ 56 ā€“ Safety production data flow
432 7.6.7 SafetyValidatorServer function definition
433 FigureĀ 57 ā€“ Consumer safety data monitoring
434 FigureĀ 58 ā€“ SafetyValidatorServer ā€“ application triggered
435 TableĀ 91 ā€“ Data reception ā€“ Link triggered
TableĀ 92 ā€“ Time_Correction reception ā€“ Link triggered
TableĀ 93 ā€“ Data reception ā€“ Application triggered
436 TableĀ 94 ā€“ Time_Correction reception ā€“ Application triggered
TableĀ 95 ā€“ Consuming application ā€“ Safety data monitoring
445 7.7 Safety message and protocol data specifications
7.7.1 Mode octet
446 7.7.2 Time Stamp Section
7.7.3 Time Coordination Message
447 7.7.4 Time correction message
7.7.5 Safety data production
448 TableĀ 96 ā€“ Producer connection status determination
455 7.7.6 Producer dynamic variables
457 7.7.7 Producer per consumer dynamic variables
458 7.7.8 Consumer data variables
459 TableĀ 97 ā€“ Consuming safety connection status
460 7.7.9 Consumer input static variables
461 7.7.10 Consumer dynamic variables
463 8 Safety communication layer management
8.1 Overview
8.2 Definition of the measures used during connection establishment
TableĀ 98 ā€“ Connection establishment errors and measures to detect errors
464 TableĀ 99 ā€“ SNN Date/Time allocations
TableĀ 100 ā€“ SNN legal range of time values
467 8.3 Originator-Target relationship validation
8.4 Detection of mis-routed connection requests
FigureĀ 59 ā€“ Target ownership
468 8.5 SafetyOpen processing
8.6 Ownership management
FigureĀ 60 ā€“ SafetyOpen forms
469 8.7 Bridging different physical layers
FigureĀ 61 ā€“ Connection ownership state chart
FigureĀ 62 ā€“ SafetyOpen UNID mapping
470 FigureĀ 63 ā€“ Common CPFĀ 2 application layer
FigureĀ 64 ā€“ End-to-End routing example
471 8.8 Safety connection establishment
8.8.1 Overview
8.8.2 Basic facts for connection establishment
8.8.3 Configuring safety connections
472 TableĀ 101 ā€“ Safety connection parameters
473 8.8.4 Network time expectation multiplier
FigureĀ 65 ā€“ Sources for safety related connection parameters
474 8.8.5 Establishing connections
FigureĀ 66 ā€“ Parameter mapping between originator and target
475 TableĀ 102 ā€“ SafetyOpen summary
476 FigureĀ 67 ā€“ CPĀ 2/3 Safety connection establishment in targets for Form 2a SafetyOpen
477 8.8.6 Recommendations for consumer number allocation
FigureĀ 68 ā€“ General sequence to detect configuration is required
478 8.8.7 Recommendations for connection establishment
8.8.8 Ownership establishment
479 8.8.9 Ownership use cases
482 8.8.10 PID/CID usage and establishment
8.8.11 Proper PID/CID usage in multipoint and point-to-point connections
FigureĀ 69 ā€“ PID/CID exchanges for two originator scenarios
483 FigureĀ 70 ā€“ Seed generation for multipoint connections
484 8.8.12 Network supported services
FigureĀ 71 ā€“ PID/CID runtime handling
485 8.8.13 FSCPĀ 2/1 safety device type
486 TableĀ 103 ā€“ Originator/Target service mapping
TableĀ 104 ā€“ Unsupported originator/target service types
487 FigureĀ 72 ā€“ Connection categories and supported services
488 FigureĀ 73 ā€“ Recommended connection types
FigureĀ 74 ā€“ Logic-to-logic supported services
489 8.9 Safety configuration process
8.9.1 Introduction to safety configuration
8.9.2 Configuration goals
FigureĀ 75 ā€“ Recommended connection types for logic to logic
490 8.9.3 Configuration overview
FigureĀ 76 ā€“ Configuration data transfers
TableĀ 105 ā€“ Configuration goals
491 8.9.4 User configuration guidelines
492 8.9.5 Configuration process SIL3 justification
FigureĀ 77 ā€“ Protection measures in safety devices
493 8.9.6 Device functions for tool configuration
8.9.7 Password security
8.9.8 SNCT interface services
8.9.9 Configuration lock
494 8.9.10 Effect of configuration lock on device behavior
FigureĀ 78 ā€“ Configuration, testing and locked relationships
495 8.9.11 Configuration ownership
8.9.12 Configuration mode
8.9.13 Measures used to ensure integrity of configuration process
TableĀ 106 ā€“ Configuration owner control vs. device state
496 FigureĀ 79 ā€“ Originator’s configuration data
497 8.9.14 Download process
498 FigureĀ 80 ā€“ SNCT to device download process
499 FigureĀ 81 ā€“ SNCT Downloads to originators that perform Form 1 configuration
500 8.9.15 Verification process
501 FigureĀ 82 ā€“ Protection from locking and ownership
FigureĀ 83 ā€“ Example of read back and comparison of original and printout
502 8.9.16 Verification process
FigureĀ 84 ā€“ Diverse display without full data read back
503 8.9.17 Configuration error analysis
FigureĀ 85 ā€“ Verification process including all alternatives
504 TableĀ 107 ā€“ Errors and detection measures
507 8.10 Electronic Data Sheets extensions for safety
8.10.1 General rules for EDS based safety devices
508 8.10.2 EDS extensions for safety
TableĀ 108 ā€“ Object Class section keywords
509 TableĀ 109 ā€“ Safety Classx entry format
TableĀ 110 ā€“ Parameter class keywords
510 TableĀ 111 ā€“ New Connection Manager section keywords for safety
511 TableĀ 112 ā€“ Connection Manager field usage for safety
512 TableĀ 113 ā€“ Connection parameter field settings for safety
513 8.11 Requirements for CPĀ 2/2
8.11.1 EPI rules for safety messages that travel over CPĀ 2/2
8.11.2 Default safety I/O service
8.11.3 Duplicate IP detection
8.11.4 Priority for safety connections
514 8.12 Requirements for CPĀ 2/3
8.12.1 Allocation of CPĀ 2/3 identifiers
TableĀ 114 ā€“ CPĀ 2/3 ID assignment rules
516 8.12.2 Additional requirements
8.13 CPĀ 16/3 requirements
8.13.1 General architecture for CPFĀ 2 on CPĀ 16/3
517 8.13.2 Baseline FSCPĀ 2/1 on CPĀ 16/3 device
FigureĀ 86 ā€“ Baseline FSCPĀ 2/1 on CPĀ 16/3 device
518 8.13.3 Supported objects and services in CPĀ 16/3 devices
8.13.4 Transport layer requirements
520 FigureĀ 87 ā€“ FSCPĀ 2/1 Adaptation Layer and SMP interaction
521 8.13.5 FSCPĀ 2/1 and the CPĀ 16/3 device model
FigureĀ 88 ā€“ FSCPĀ 2/1 Adaptation
522 8.13.6 UNID assignment on CPĀ 16/3
FigureĀ 89 ā€“ CPĀ 16/3 device model
524 FigureĀ 90 ā€“ Adding a standard module to a modular device
525 9 System requirements
9.1 Indicators and switches
9.1.1 General indicator requirements
9.1.2 LED indications for setting the device UNID
9.1.3 Module Status LED
TableĀ 115 ā€“ LED indications for setting UNID
526 9.1.4 Indicator warning
9.1.5 Network Status LED
TableĀ 116 ā€“ Module Status LED
TableĀ 117 ā€“ Network status LED states
527 9.1.6 Switches
529 9.2 Installation guidelines
FigureĀ 91 ā€“ Safety device NodeID processing logic
530 9.3 Safety function response time
9.3.1 Overview
9.3.2 Network time expectation
FigureĀ 92 ā€“ Safety function response time
531 9.3.3 Equations for calculating network reaction times
TableĀ 118 ā€“ Connection reaction time type ā€“ producing/consuming applications
532 FigureĀ 93 ā€“ Safety function response time components
533 9.4 Duration of demands
9.5 Constraints for calculation of system characteristics
9.5.1 Number of nodes
9.5.2 Network PFH
FigureĀ 94 ā€“ Network protocol reliability block diagram (RBD)
535 FigureĀ 95 ā€“ Network PFH summary
536 9.5.3 Bit Error Rate (BER)
FigureĀ 96 ā€“ Extended Format PFH summary
537 9.6 Maintenance
9.7 Safety manual
10 Assessment
538 Annex A (informative) Additional information for functional safety communication profiles of CPF 2
A.1 Hash function example code
552 A.2 ā€¦
553 Annex B (informative) Information for assessment of the functional safety communication profiles of CPF 2
554 Bibliography
BS EN 61784-3-2:2017 - TC
$280.87