BSI 23/30471808 DC:2023 Edition
$24.66
BS EN IEC/IEEE 60802. Time-sensitive networking profile for industrial automation
Published By | Publication Date | Number of Pages |
BSI | 2023 | 134 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
9 | FOREWORD |
11 | INTRODUCTION |
12 | 1 Scope 2 Normative References |
15 | 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 General 3.2 List of terms, abbreviated terms and definitions given in various standards |
17 | 3.3 Terms defined in this document |
19 | 3.4 Abbreviated terms and acronyms |
22 | 3.5 Conventions 3.5.1 Principles for (sub) clause selections of referenced documents 3.5.2 Convention for capitalizations 3.5.3 Unit conventions 3.5.4 Conventions for YANG contents |
23 | 4 Overview of TSN in industrial automation 4.1 Industrial application operation |
24 | 4.2 Industrial applications 4.2.1 General |
26 | 4.2.2 Control loop tasks |
27 | 4.2.3 Start of control loop tasks 4.3 IA-stations 4.4 Ethernet interface |
28 | 4.5 Mechanisms that can be used to meet control loop latency requirements |
29 | 4.6 Translation between middleware and network provisioning 4.6.1 Interfaces of type l2vlan |
30 | 4.6.2 PTP Instances |
32 | 4.7 Industrial traffic types 4.7.1 General 4.7.2 Traffic type characteristics 4.7.3 Traffic type categories 4.7.3.1 General 4.7.3.2 IA time-aware stream |
33 | 4.7.3.3 IA stream 4.7.3.4 IA traffic engineered non-stream 4.7.3.5 IA non-stream 4.7.4 Traffic types 4.7.4.1 General |
34 | 4.7.4.2 Isochronous 4.7.4.3 Cyclic-synchronous 4.7.4.4 Cyclic-asynchronous 4.7.4.5 Alarms and events 4.7.4.6 Configuration and diagnostics |
35 | 4.7.4.7 Network control 4.7.4.8 Best effort 4.7.4.9 Traffic class to traffic type mapping 4.8 Security for TSN-IA 4.8.1 General 4.8.2 Security configuration model |
36 | 4.8.3 NETCONF/YANG processing |
37 | 4.8.4 NETCONF/YANG access control |
38 | 4.8.5 Identity checking |
39 | 4.8.6 Secure device identity 4.8.6.1 Device Identity 4.8.6.2 Verifiable Device Identity 4.8.6.3 Verification Support Mechanisms 4.8.6.3.1 General 4.8.6.3.2 Secure Transports 4.8.6.3.3 Secure Information |
40 | 4.8.6.3.4 IDevID and LDevID Credentials 4.8.6.3.5 IDevID Items beyond IEEE Std 802.1AR |
41 | 4.8.6.3.6 Device Identity Representation in IDevID and LDevID Credentials 5 Conformance 5.1 General 5.2 Requirements terminology |
42 | 5.3 Profile conformance statement (PCS) 5.4 Conformance classes 5.5 IA-station requirements 5.5.1 IA-station PHY and MAC requirements for external ports |
43 | 5.5.2 IA-station topology discovery requirements 5.5.3 IA-station requirements for time synchronization |
44 | 5.5.4 IA-station requirements for security 5.5.5 IA-station requirements for management 5.5.5.1 General 5.5.5.2 Network Configuration Protocol (NETCONF) |
45 | 5.5.5.3 IA-station management YANG modules 5.5.6 IA-station requirements for digital data sheet 5.6 IA-station options 5.6.1 IA-station PHY and MAC options for external ports |
46 | 5.6.2 IA-station options for time synchronization 5.6.3 IA-station options for security 5.6.4 IA-station options for management |
47 | 5.7 Bridge component requirements 5.7.1 Common Bridge component requirements 5.7.2 ccA Bridge component requirements |
48 | 5.7.3 ccB Bridge component requirements 5.8 Bridge component options 5.8.1 Common Bridge component options 5.8.2 ccA Bridge component options |
49 | 5.8.3 ccB Bridge component options 5.9 End station component requirements 5.9.1 Common End Station Component Requirements |
50 | 5.9.2 ccA end station component requirements 5.9.3 ccB end station component requirements 5.10 End station component options 5.10.1 Common end station component options |
51 | 5.10.2 ccA end station component options 5.10.3 ccB end station component options 5.11 CNC requirements |
52 | 5.12 CNC options 5.13 CUC requirements 6 Required functions for an industrial network 6.1 General 6.2 Synchronization 6.2.1 General 6.2.2 PTP Instance requirements |
53 | 6.2.3 PTP protocol requirements |
56 | 6.2.4 Clock states |
57 | 6.2.5 Grandmaster PTP Instance requirements 6.2.6 Application framework |
58 | 6.2.7 Working Clock domain framework |
59 | 6.2.8 Global Time domain framework 6.2.9 IA-station model for clocks |
61 | 6.2.10 Clock usage for the Ethernet interface 6.2.10.1 Time-aware offset control 6.2.10.2 Gating cycle |
62 | 6.2.11 Error model |
63 | 6.2.12 gPTP domains and PTP Instances 6.2.13 Split and combine cases for a PTP domain |
65 | 6.3 Security model 6.3.1 General |
66 | 6.3.2 Security functionality 6.3.2.1 Message exchange protection 6.3.2.1.1 General 6.3.2.1.2 TLS profile 6.3.2.1.3 Certificate-to-name mapping |
67 | 6.3.2.1.4 Role extension 6.3.2.2 Resource access authorization |
68 | 6.3.3 IDevID Profile 6.3.3.1 General 6.3.3.2 Object Contents 6.3.3.2.1 General 6.3.3.2.2 IA-Station Identity |
69 | 6.3.3.2.3 Signature Suites 6.3.3.3 Information Model 6.3.3.3.1 General 6.3.3.3.2 Entries 6.3.3.3.3 Entry Manifoldness |
70 | 6.3.3.3.4 Entry Naming 6.3.3.4 Processing Model 6.3.3.4.1 General 6.3.3.4.2 Credentials 6.3.3.4.2.1 General 6.3.3.4.2.2 Creation 6.3.3.4.2.3 Distribution 6.3.3.4.2.4 Use |
71 | 6.3.3.4.2.5 Storage 6.3.3.4.2.6 Revocation 6.3.3.4.3 Trust Anchors 6.3.3.4.3.1 General |
72 | 6.3.3.4.3.2 Creation 6.3.3.4.3.3 Distribution 6.3.3.4.3.4 Use 6.3.3.4.3.5 Storage 6.3.3.4.3.6 Revocation 6.3.4 Security setup based on IDevID 6.3.4.1 General 6.3.4.2 imprintTrustAnchor |
74 | 6.3.4.3 imprintCredential 6.3.4.3.1 General 6.3.4.3.2 Internal key generation |
75 | 6.3.4.3.3 External key generation 6.3.4.4 imprintCertToNameMapping |
76 | 6.3.5 Secure configuration based on LDevID-NETCONF 6.4 Bridge delay Requirements 6.5 Bridge FDB requirements |
77 | 6.6 Bridge reporting requirements 6.7 Management 6.7.1 General 6.7.2 IA-station management model 6.7.2.1 General 6.7.2.2 IEEE 802.1Q management model |
78 | 6.7.2.3 Internal LAN connection model |
79 | 6.7.2.4 Spanning Tree, VLAN and TE-MSTID configuration |
81 | 6.7.2.5 l2vlan type interfaces |
82 | 6.7.3 Discovery of IA-station internal structure 6.7.4 Network engineering model |
86 | 6.7.5 Operation 6.7.5.1 General |
88 | 6.7.5.2 Domain port states |
90 | 6.7.5.3 Engineered network |
91 | 6.7.5.4 Dynamic topology 6.7.5.4.1 General 6.7.5.4.2 Adding an IA-station 6.7.5.4.3 Removing an IA-station |
92 | 6.7.5.4.4 Replacing an IA-station 6.7.5.5 Engineered network extended by dynamic topology 6.7.6 Engineered time-synchronization spanning tree 6.7.6.1 General 6.7.6.2 Sync tree requirements 6.7.6.3 STE phases 6.7.6.3.1 General 6.7.6.3.2 Discovery phase |
93 | 6.7.6.3.3 Provisioning phase 6.7.6.3.4 Monitoring phase 6.7.6.3.4.1 General 6.7.6.3.4.2 Status monitoring 6.7.6.3.4.3 Performance monitoring |
94 | 6.7.6.4 Adding an IA-station 6.7.6.5 Removing an IA-station 6.7.6.6 Replacing an IA-station 6.7.7 Diagnostics 6.7.7.1 General |
95 | 6.7.7.2 Observer model 6.7.7.3 Usage of YANG Push |
96 | 6.7.7.4 Mandatory RPCs 6.7.7.5 Mandatory notifications 6.7.7.6 Mandatory diagnostics data nodes 6.7.7.7 Usage of NETCONF notifications 6.7.8 Data sheet 6.7.8.1 General |
97 | 6.7.8.2 Digital data sheet of an IA-station |
98 | 6.7.8.3 Traffic requirements description 6.7.9 YANG representation of managed objects 6.7.9.1 General 6.7.9.2 Common YANG modules, features and leaves 6.7.9.2.1 General 6.7.9.2.2 IEEE standard for Ethernet |
99 | 6.7.9.2.3 Station and media access control connectivity discovery |
100 | 6.7.9.2.4 Synchronization 6.7.9.2.4.1 Timesync |
101 | 6.7.9.2.4.2 Timesync (draft ieee802-dot1as-ptp) |
102 | 6.7.9.2.4.3 Timesync (iecieee60802) 6.7.9.2.5 Security configuration modules 6.7.9.2.5.1 YANG module for a keystore |
103 | 6.7.9.2.5.2 Network configuration access control 6.7.9.2.5.3 A YANG data module for a truststore 6.7.9.2.6 IA-station management 6.7.9.2.6.1 System capabilities |
104 | 6.7.9.2.6.2 YANG library 6.7.9.2.6.3 NETCONF extensions to support the network management datastore architecture 6.7.9.2.6.4 YANG push 6.7.9.2.6.5 YANG notification capabilities 6.7.9.2.6.6 YANG notifications |
105 | 6.7.9.2.6.7 NETCONF monitoring 6.7.9.2.6.8 System management 6.7.9.2.6.9 Hardware management |
106 | 6.7.9.2.6.10 Interface management 6.7.9.2.6.11 Bridge component |
108 | 6.7.9.2.6.12 IEC/IEEE 60802 YANG module |
109 | 6.7.9.2.6.13 NETCONF Client 6.7.9.2.6.14 NETCONF Server 6.7.9.2.7 YANG Module for TSN UNI |
110 | 6.7.9.3 Optional YANG models, features and leaves 6.7.9.3.1 General 6.7.9.3.2 Scheduled traffic |
111 | 6.7.9.3.3 Frame preemption 6.7.9.3.4 Credit-based shaper 6.8 Topology discovery and verification 6.8.1 Topology discovery and verification requirements |
112 | 6.8.2 Topology discovery overview 6.8.2.1 General 6.8.2.2 LLDP operational control parameters |
113 | 6.8.2.3 LLDPDU transmission, reception, and addressing 6.8.2.4 LLDP TLV selection 6.8.2.4.1 General 6.8.2.4.2 Chassis ID TLV 6.8.2.4.3 Port ID TLV 6.8.2.4.4 Time To Live TLV |
114 | 6.8.2.4.5 System capabilities TLV 6.8.2.4.6 Management address TLV 6.8.2.5 LLDP remote systems data 6.8.3 Topology verification overview 6.9 CNC 6.9.1 General 6.9.2 Stream destination MAC address range |
116 | Annex A (normative) PCS proforma – Time-sensitive networking profile for industrial automation A.1 General A.2 Abbreviations and special symbols A.2.1 Status symbols A.2.2 General abbreviations |
117 | A.3 Instructions for completing the PCS proforma A.3.1 General structure of the PCS proforma A.3.2 Additional information A.3.3 Exception information |
118 | A.3.4 Conditional status A.3.4.1 Conditional items A.3.4.2 Predicates A.3.4.3 References to other standards A.3.5 Electronic datasheet |
119 | A.4 Common requirements A.4.1 Implementation identification A.4.2 Profile summary, IEC/IEEE 60802 A.4.3 Implementation type |
120 | Annex B (informative) Representative Configuration Domain |
121 | Annex C (informative) Error model C.1 General C.2 Time error components due to relaying of time |
122 | C.3 Time error components due to providing time to the Grandmaster or to an end application |
123 | Annex D (informative) Description of Clock Control System D.1 Introduction |
124 | D.2 Transfer function for control system |
125 | D.3 Frequency response for control system |
130 | D.4 Example |
132 | Annex Z (informative) Gaps Z.1 Gaps for Release 1: |
133 | Z.2 Topics for Edition 2: |
134 | Bibliography |