Shopping Cart

No products in the cart.

BSI PD IEC/PAS 62734:2012

$215.11

Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications

Published By Publication Date Number of Pages
BSI 2012 832
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

IEC/PAS 62734:2012(E) defines the OSI layer specifications (e.g., PhL, DL, etc.), security specifications, and management (including network and device configuration) specifications for wireless devices serving application classes 1 through 5 and optionally class 0 for fixed, portable, and moving devices. It addresses the performance needs for periodic monitoring and process control where latencies on the order of 100 ms can be tolerated, with optional behavior for shorter latency.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
26 FOREWORD
28 INTRODUCTION
30 1 Scope
2 Normative references
31 3 Terms, definitions, abbreviated terms, acronyms and conventions
3.1 (N)-layer and other terms and definitions from the open systems interconnection basic reference model
36 3.2 Other terms and definitions
51 3.3 Symbols
52 3.4 Abbreviated terms and acronyms
60 3.5 IEC service table conventions
61 4 Overview
4.1 General
4.2 Interoperability
4.3 Quality of service
4.4 Worldwide applicability
62 4.5 Network architecture
63 Figures
Figure 1 โ€“ Standard-compliant network
64 4.6 Network characteristics
Figure 2 โ€“ Single protocol data unit
Figure 3 โ€“ Full protocol data unit
69 5 Systems
5.1 General
5.2 Devices
71 Figure 4 โ€“ Physical devices versus roles
75 Figure 5 โ€“ Notional representation of device phases
76 5.3 Networks
77 Figure 6 โ€“ Simple star topology
78 Figure 7 โ€“ Simple hub-and-spoke topology
79 Figure 8 โ€“ Mesh topology
80 Figure 9 โ€“ Simple star-mesh topology
81 Figure 10 โ€“ Network and DL subnet overlap
82 Figure 11 โ€“ Network and DL subnet differ
83 Figure 12 โ€“ Network with multiple gateways
84 Figure 13 โ€“ Basic network with backup gateway
85 Figure 14 โ€“ Network with backbone
86 5.4 Protocol suite structure
Figureย 15 โ€“ Network with backbone โ€“ device roles
87 5.5 Data flow
Figure 16 โ€“ Reference model
88 Figure 17 โ€“ Basic data flow
89 Figure 18 โ€“ Data flow between I/O devices
90 Figure 19 โ€“ Data flow with legacy I/O device
Figure 20 โ€“ Data flow with backbone
91 Figure 21 โ€“ Data flow between I/O devices via backbone
92 5.6 Time reference
Figure 22 โ€“ Data flow to standard-aware control system
93 5.7 Firmware upgrades
5.8 Wireless backbones and other infrastructures
94 6 System management
6.1 General
95 Figure 23 โ€“ Management architecture
96 6.2 Device management application process
98 Figure 24 โ€“ DMAP
99 Tables
Table 1 โ€“ Standard management object types in DMAP
100 Figure 25 โ€“ Example of management SAP flow through standard protocol suite
101 Table 2 โ€“ Meta_Data_Attribute data structure
102 Table 3 โ€“ Alert types for communication diagnostic category
103 Table 4 โ€“ Alert types for security alert category
Table 5 โ€“ Alert types for device diagnostic alert category
Table 6 โ€“ Alert types for process alert category
105 Table 7 โ€“ ARMO attributes
108 Table 8 โ€“ ARMO alerts
109 Table 9 โ€“ Alarm_Recovery method
112 Tableย 10 โ€“ DMO attributes
118 Table 11 โ€“ DMO alerts
119 6.3 System manager
120 Figure 26 โ€“ System manager architecture concept
121 Table 12 โ€“ System management object types
123 Table 13 โ€“ DSO attributes
Table 14 โ€“ Address_Translation_Row data structure
124 Table 15 โ€“ Read_Address_Row method
125 Table 16 โ€“ Input argument usage
Table 17 โ€“ Output argument usage
127 Table 18 โ€“ Attributes of SMO in system manager
129 Table 19 โ€“ Proxy_System_Manager_Join method
130 Table 20 โ€“ Proxy_System_Manager_Contract method
131 Table 21 โ€“ Effect of Different Join Commands on Attribute Sets
132 Table 22 โ€“ Attributes of DMSO in system manager
133 Table 23 โ€“ System_Manager_Join method
134 Table 24 โ€“ System_Manager_Contract method
138 Table 25 โ€“ Attributes of STSO in system manager
139 Figure 27 โ€“ UAP-system manager interaction during contract establishment
141 Figure 28 โ€“ Contract-related interaction between DMO and SCO
Table 26 โ€“ Attributes of SCO in system manager
144 Table 27 โ€“ SCO method for contract establishment, modification, or renewal
149 Table 28 โ€“ Input argument usage
150 Table 29 โ€“ Output argument usage
151 Figure 29 โ€“ Contract source, destination, and intermediate devices
153 Table 30 โ€“ Contract_Data data structure
156 Table 31 โ€“ New_Device_Contract_Response data structure
159 Figure 30 โ€“ Contract establishment example
160 Figure 31 โ€“ Contract ID usage in source
162 Table 32 โ€“ SCO method for contract termination, deactivation and reactivation
Table 33 โ€“ DMO method to terminate contract
163 Figure 32 โ€“ Contract termination
164 Table 34 โ€“ DMO method to modify contract
165 Figure 33 โ€“ Contract modification with immediate effect
166 7 Security
7.1 General
167 7.2 Security services
Figure 34 โ€“ Examples of DPDU and TPDU scope
171 7.3 Frame security
Table 35 โ€“ Security levels
172 Table 36 โ€“ Structure of the security control field
173 Figure 37 โ€“ DPDU structure
174 Figure 38 โ€“ Outgoing messages โ€“ DL and security
176 Figure 39 โ€“ Incoming messages- DL and security
177 Table 37 โ€“ Sec.DpduPrep.Request elements
178 Table 38 โ€“ Sec.DpduPrep.Response elements
Table 39 โ€“ Sec.DLAckCheck.Request elements
179 Table 40 โ€“ Sec. DLAckCheck.Response elements
180 Table 41 โ€“ Sec.DpduCheck.Request elements
181 Table 42 โ€“ Sec.DpduCheck.Response elements
Table 43 โ€“ Sec.DLAckPrep.Request elements
182 Table 44 โ€“ Sec.DLAckPrep.Response elements
183 Table 45 โ€“ Structure of the WISN DPDU nonce
Table 46 โ€“ Structure of the 32-bit truncated TAI time
187 Figure 40 โ€“ TPDU structure and protected coverage
188 Figure 41 โ€“ TMIC parameters
Table 47 โ€“ TSS โ€œpseudo-headerโ€ structure
189 Figure 42 โ€“ Transport layer and security sub-layer interaction, outgoing TPDU
190 Figure 43 โ€“ Transport layer and security sub-layer interaction, incoming TPDU
191 Table 48 โ€“ Sec.TpduOutCheck.Request elements
Table 49 โ€“ Sec.TpduOutCheck.Response elements
192 Table 50 โ€“ Sec.TpduSecure.Request elements
193 Table 51 โ€“ Sec. TpduSecure.Response elements
194 Table 52 โ€“ Sec.TpduInCheck.Request elements
195 Table 53 โ€“ Sec.TpduInCheck.Response elements
Table 54 โ€“ Sec.TpduVerify.Request elements
196 Table 55 โ€“ Sec.TpduVerify.Response elements
197 Table 56 โ€“ Structure of TL security header
198 Table 57 โ€“ Structure of the TPDU nonce
Table 58 โ€“ Structure of 32-bit nominal TAI time
202 7.4 The join process
207 Figure 44 โ€“ Example: Overview of the symmetric key join process
Figure 45 โ€“ Example: Overview of the symmetric key join process of backbone device
209 Table 59 โ€“ Proxy_Security_Sym_Join method
210 Table 60 โ€“ Security_Sym_Join method
Table 61 โ€“ Security_Confirm method
211 Table 62 โ€“ Security_Sym_Join_Request data structure
212 Table 63 โ€“ Security_Sym_Join_Response data structure
213 Table 64 โ€“ Structure of compressed Security level field
214 Table 65 โ€“ Master key security level
Table 66 โ€“ Structure of KeyHardLifeSpan field
215 Table 67 โ€“ Security_Sym_Confirm data structure
216 Table 68 โ€“ Implicit certificate format
217 Figure 46 โ€“ Asymmetric key-authenticated key agreement scheme
Table 69 โ€“ Usage_Serial structure
220 Figure 47 โ€“ Example: Overview of the asymmetric key join processfor a device with a data link layer
221 Figure 48 โ€“ Example: Overview of the asymmetric key join processof a backbone device
222 Table 70 โ€“ Proxy_Security_Pub_Join method
Table 71 โ€“ Security_Pub_Join method
223 Table 72 โ€“ Proxy_Security_Pub_Confirm method
224 Table 73 โ€“ Security_Pub_Confirm method
Table 74 โ€“ Network_Information_Confirmation method
225 Table 75 โ€“ Format of asymmetric join request internal structure
Table 76 โ€“ Format of the protocol control field
226 Table 77 โ€“ Format of asymmetric join response internal structure
227 Table 78 โ€“ Format of first join confirmation internal structure
228 Table 79 โ€“ Format of join confirmation response internal structure
230 Figure 49 โ€“ Device state transitions for join process and device lifetime
Table 80 โ€“ Join process and device lifetime state machine
231 7.5 Session establishment
Figure 50 โ€“ High-level example of session establishment
233 Table 81 โ€“ Security_New_Session method
234 Table 82 โ€“ Security_New_Session_Request data structure
236 Table 83 โ€“ Security_New_Session_Response data structure
237 7.6 Key update
Figure 51 โ€“ Key update protocol overview
238 Table 84 โ€“ New_Key method
239 Table 85 โ€“ Security_Key_and_Policies data structure
241 Table 86 โ€“ Security_Key_Update_Status data structure
243 Table 87 โ€“ Session and DL key state transition
244 7.7 Security manager functionality
Figure 52 โ€“ Device session establishment and key update state transition
Table 88 โ€“ Attributes of PSMO in the system manager
246 7.8 Security policies
247 Table 89 โ€“ Structure of Policy field
Table 90 โ€“ Key types
Table 91 โ€“ Key usage
248 Table 92 โ€“ Granularity
249 7.9 Security functions available to the application layer
252 7.10 Security statistics collection, threat detection, and reporting
7.11 Device security management object functionality
253 Table 93 โ€“ Device security management object attributes
255 Table 94 โ€“ KeyDescriptor (INFORMATIVE)
256 Table 95 โ€“ TL KeyLookupData OctetString fields
257 Table 96 โ€“ Delete key method
259 Table 97 โ€“ Key_Policy_Update method
260 8 Physical layer
8.1 General
Table 98 โ€“ DSMO Alerts
261 8.2 Default physical layer
Table 99 โ€“ Timing requirements
262 9 Data link layer
9.1 General
264 Figure 53 โ€“ DL protocol suite and PPDU/DPDU structure
266 Figure 54 โ€“ Graph routing example
267 Table 100 โ€“ Graph table on ND20
Table 101 โ€“ Graph table on ND21
268 Figureย 55 โ€“ Inbound and outbound graphs
272 Figure 56 โ€“ Slotted hopping
Figure 57 โ€“ Slow hopping
273 Figure 58 โ€“ Hybrid operation
274 Figure 59 โ€“ Radio spectrum usage
276 Figure 60 โ€“ Default hopping pattern 1
Figure 61 โ€“ Two groups of devices with different hopping pattern offsets
277 Figure 62 โ€“ Interleaved hopping pattern 1 with 16 different hopping pattern offsets
278 Figure 63 โ€“ Slotted hopping
279 Figure 64 โ€“ Slow hopping
280 Figure 65 โ€“ Hybrid mode with slotted and slow hopping
Figure 66 โ€“ Combining slotted hopping and slow hopping
281 Figure 67 โ€“ Example of a three-timeslot superframe
Figure 68 โ€“ Superframes and links
282 Figure 69 โ€“ Multiple superframes, with timeslots aligned
286 Figure 70 โ€“ Slotted hopping
287 Figure 71 โ€“ Slow hopping
Figure 72 โ€“ Components of a slow hop
288 Figure 73 โ€“ Avoiding collisions among routers
289 Figure 74 โ€“ Hybrid configuration
291 Figure 75 โ€“ Timeslot allocation and the message queue
294 Figure 76 โ€“ 250ย ms alignment intervals
295 Figure 77 โ€“ Timeslot durations and timing
296 Table 102 โ€“ Approximating nominal timing with 32ย kHz clock (INFORMATIVE)
300 Figure 78 โ€“ Clock source acknowledges receipt of DPDU
302 Figure 79 โ€“ Transaction timing attributes
303 Figure 80 โ€“ Dedicated and shared transaction timeslots
304 Figure 81 โ€“ Unicast transaction
306 Figure 82 โ€“ PDU wait time (PWT)
307 Figure 83 โ€“ Duocast support in the standard
308 Figure 84 โ€“ Duocast transaction
309 Figure 85 โ€“ Shared timeslots with CSMA-CA
310 Figure 86 โ€“ Transaction during slow-hopping periods
313 Figure 87 โ€“ DL management SAP flow through standard protocol suite
322 Table 103 โ€“ DL_Config_Info structure
328 9.2 Data link layer data service access point
329 Table 104 โ€“ DDData.request parameters
330 Table 105 โ€“ DDData.confirm parameters
Table 106 โ€“ Value set for status parameter
331 9.3 Data frames and acknowledgements
Figure 88 โ€“ PPDU and DPDU structure
Table 107 โ€“ DDData.indication parameters
333 Table 108 โ€“ ExtDLUint, one-octet variant
Table 109 โ€“ ExtDLUint, two-octet variant
334 Table 110 โ€“ Data frame MHR
335 Table 111 โ€“ DHDR frame control octet
Table 112 โ€“ Data frame DMXHR
336 Table 113 โ€“ DROUT structure, compressed variant
337 Table 114 โ€“ DROUT structure, uncompressed variant
338 Table 115 โ€“ DADDR structure
339 Figure 89 โ€“ Typical acknowledgement frame layout
Table 116 โ€“ Acknowledgement frame MHR
340 Table 117 โ€“ Acknowledgement frame DHR
341 Table 118 โ€“ DHR ACK/NACK frame control
342 Table 119 โ€“ Advertisement DAUX structure
343 Table 120 โ€“ Advertisement selections elements
Table 121 โ€“ Advertisement selections
Table 122 โ€“ Advertisement time synchronization elements
344 Table 123 โ€“ Advertisement time synchronization structure
345 Table 124 โ€“ Join superframe information subfields
Table 125 โ€“ Join superframe information structure
346 Table 126 โ€“ Superframe derived from advertisement
Table 127 โ€“ Join information elements
347 Table 128 โ€“ Join information structure
348 Table 129 โ€“ Defaults for links created from advertisements
349 Table 130 โ€“ dlmo.Neighbor entry created from advertisements
Table 131 โ€“ dlmo.Graph entry created from advertisements
Table 132 โ€“ dlmo.Route entry created from advertisements
351 Table 133 โ€“ Solicitation header subfields
Table 134 โ€“ Solicitation header structure
Table 135 โ€“ Solicitation DAUX fields
352 Table 136 โ€“ Solicitation DAUX structure
353 Table 137 โ€“ Activate link DAUX fields
Table 138 โ€“ Activate link DAUX structure
354 9.4 Data link layer management information base
Table 139 โ€“ Reporting received signal quality DAUX fields
Table 140 โ€“ Report received signal quality DAUX structure
355 Table 141 โ€“ DLMO attributes
363 Table 142 โ€“ Subnet filter octets
Table 143 โ€“ dlmo.TaiAdjust OctetString fields
Table 144 โ€“ dlmo.TaiAdjust OctetString structure
364 Table 145 โ€“ dlmo.EnergyDesign OctetString fields
Table 146 โ€“ dlmo.EnergyDesign OctetString structure
Table 147 โ€“ dlmo.DeviceCapability OctetString fields
365 Table 148 โ€“ dlmo.DeviceCapability OctetString structure
366 Table 149 โ€“ dlmo.DiscoveryAlert fields
Table 150 โ€“ dlmo.DiscoveryAlert structure
367 Table 151 โ€“ dlmo.Candidates OctetString fields
368 Table 152 โ€“ dlmo.Candidates structure
369 Table 153 โ€“ dlmo.SmoothFactors OctetString fields
Table 154 โ€“ dlmo.SmoothFactors structure
Table 155 โ€“ dlmo.QueuePriority fields
370 Table 156 โ€“ dlmo.QueuePriority structure
371 Table 157 โ€“ dlmo.ChannelDiag fields
Table 158 โ€“ dlmo.ChannelDiag structure
372 Figure 90 โ€“ Relationship among DLMO indexed attributes
373 Table 159 โ€“ dlmo.Ch fields
Table 160 โ€“ dlmo.Ch structure
376 Table 161 โ€“ Receive template fields
Table 162 โ€“ Receive template structure
377 Table 163 โ€“ Transmit template fields
Table 164 โ€“ Transmit template structure
378 Table 165 โ€“ Default receive template
Table 166 โ€“ Default transmit template
Table 167 โ€“ Default receive template for scanning
380 Table 168 โ€“ dlmo.Neighbor fields
Table 169 โ€“ dlmo.Neighbor structure
382 Table 170 โ€“ ExtendGraph fields
Table 171 โ€“ ExtGraph structure
Table 172 โ€“ dlmo.NeighborDiagReset fields
383 Table 173 โ€“ dlmo.NeighborDiagReset structure
384 Table 174 โ€“ dlmo.Superframe fields
Table 175 โ€“ dlmo.Superframe structure
388 Table 176 โ€“dlmo.SuperframeIdle fields
Table 177 โ€“ dlmo.SuperframeIdle structure
389 Table 178 โ€“ dlmo.Graph
Table 179 โ€“ dlmo.Graph structure
390 Table 180 โ€“ dlmo.Link fields
391 Table 181 โ€“ dlmo.Link structure
392 Table 182 โ€“ dlmo.Link[].Type structure
393 Table 183 โ€“ Allowed dlmo.Link[].Type combinations
394 Table 184 โ€“ Values for dlmo.Link[].Schedule
Table 185 โ€“ dlmo.Route fields
395 Table 186 โ€“ dlmo.Route structure
396 Table 187 โ€“ dlmo.NeighborDiag fields
Table 188 โ€“ Diagnostic Summary OctetString fields
397 Table 189 โ€“ Diagnostic Summary OctetString structure
Table 190 โ€“ Diagnostic ClockDetail OctetString fields
398 9.5 Data link layer methods
Table 191 โ€“ Diagnostic ClockDetail OctetString structure
399 Table 192 โ€“ Read_Row method
Table 193 โ€“ Write_Row method
400 9.6 Data link layer alerts
Table 194 โ€“ Write_Row_Now method
401 Table 195 โ€“ dlmo.AlertPolicy fields
Table 196 โ€“ dlmo.AlertPolicy OctetString structure
402 Table 197 โ€“ DL_Connectivity alert
Table 198 โ€“ DL_Connectivity alert OctetString
403 10 Network layer
10.1 General
10.2 Network layer functionality overview
Table 199 โ€“ NeighborDiscovery alert
404 Table 200 โ€“ Link local address structure
405 Table 201 โ€“ Address translation table (ATT)
406 Figure 91 โ€“ Address translation process
408 Figure 92 โ€“ Fragmentation process
409 Figure 93 โ€“ Reassembly process
410 Table 202 โ€“ Example of a routing table
411 Figure 94 โ€“ Processing of a NSDU received from the transport layer
412 Figure 95 โ€“ Processing of an incoming NPDU
413 Figure 96 โ€“ Processing of a NPDU received from the backbone
414 Figure 97 โ€“ Delivery of an incoming NPDU at its final destination
Figure 98 โ€“ Routing from a field device to a gateway on field โ€“ no backbone routing
415 Figure 99 โ€“ Protocol suite diagram for routing from a field device to a gateway on field โ€“ no backbone routing
416 Figure 100 โ€“ Routing a PDU from a field device to a gateway via a backbone router
Figure 101 โ€“ Protocol suite diagram for routing a PDU from a field deviceto a gateway via a backbone router
418 Figure 102 โ€“ Routing from a field device on one subnet to another field deviceon a different subnet
419 Figure 103 โ€“ Protocol suite diagram for routing from an I/O deviceon one subnet to another I/O device on a different subnet
420 Figure 104 โ€“ Routing over an Ethernet backbone network
421 10.3 Network layer data services
Figure 105 โ€“ Routing over a fieldbus backbone network
422 Table 203 โ€“ NData.request elements
Table 204 โ€“ NData.confirm elements
423 Table 205 โ€“ NData.indication elements
424 10.4 Network layer management object
425 Table 206 โ€“ NLMO attributes
428 Table 207 โ€“ Contract table structure
429 Table 208 โ€“ Route table elements
Table 209 โ€“ Address translation table structure
431 Table 210 โ€“ NLMO structured MIB manipulation methods
432 10.5 Network layer protocol data unit formats
Table 211 โ€“ Alert to indicate dropped PDU/PDU error
433 Figure 106 โ€“ Distinguishing between NPDU header formats
Table 212 โ€“ Common header patterns
434 Table 213 โ€“ Basic network layer header format
435 Table 214 โ€“ Contract-enabled network layer header format
436 Table 215 โ€“ 6LoWPAN_IPHC encoding format
437 Table 216 โ€“ IPv6 network layer header format
438 Table 217 โ€“ Full network layer header in the DL
Table 218 โ€“ Network layer header format for fragmented NPDUs
439 11 Transport layer
11.1 General
Table 219 โ€“ First fragment header format
Table 220 โ€“ Second and subsequent fragment header format
440 11.2 Transport layer reference model
Figure 107 โ€“ Transport layer reference model
441 11.3 Transport security sub-layer
11.4 Transport data entity
442 Figure 108 โ€“ UDP โ€œpseudo-headerโ€ for IPv6
Table 221 โ€“ UDP header encoding
445 11.5 Transport layer protocol data unit encoding
Figure 109 โ€“ Transport layer protocol data unit
446 Table 222 โ€“ UDP LowPAN_NHC encoding
Table 223 โ€“ Optimal UDP header encoding
447 11.6 Transport layer model
Table 224 โ€“ UDP header encoding with checksum
448 Table 225 โ€“ TData.request elements
449 Table 226 โ€“ TData.confirm elements
Table 227 โ€“ TData.confirm status codes
450 Table 228 โ€“ TData.indication elements
452 Table 229 โ€“ TLMO attributes
454 Table 230 โ€“ Transport layer management object methods โ€“ Reset
Table 231 โ€“ Transport layer management object methods โ€“ Halt
455 Table 232 โ€“ Transport layer management object methods โ€“ PortRangeInfo
Table 233 โ€“ Transport layer management object methods โ€“ GetPortInfo
456 Table 234 โ€“ Transport layer management object methods โ€“ GetNextPortInfo
Table 235 โ€“ Transport layer management object alert types โ€“ Illegal use of port
457 12 Application layer
12.1 General
Table 236 โ€“ Transport layer management object alert types โ€“TPDU received on unregistered port
Table 237 โ€“ Transport layer management object alert types โ€“TPDU does not match security policies
458 12.2 Energy considerations
12.3 Legacy control system considerations
459 12.4 Introduction to object-oriented modeling
460 Figure 110 โ€“ User application objects in a user application process
461 12.5 Object model
462 12.6 Object attribute model
464 12.7 Method model
465 12.8 Alert model
12.9 Alarm state model
Table 238 โ€“ State table for alarm transitions
466 12.10 Event state model
Figure 111 โ€“ Alarm state model
Table 239 โ€“ State table for event transitions
467 12.11 Alert reporting
Figure 112 โ€“ Event model
469 12.12 Communication interaction model
472 Figure 113 โ€“ A successful example of multiple outstanding requests,with response concatenation
473 Figure 114 โ€“ An example of multiple outstanding unordered requests,with second write request initially unsuccessful
474 Figure 115 โ€“ An example of multiple outstanding ordered requests,with second write request initially unsuccessful
476 Figure 116 โ€“ Send window example 1, with current send window smallerthan maximum send window
477 Figure 117 โ€“ Send window example 2, with current send window the same sizeas maximum send window, and non-zero usable send window width
Figure 118 โ€“ Send window example 3, with current send window the same sizeas maximum send window, and usable send window width of zero (0)
479 12.13 Application layer addressing
Figure 119 โ€“ General addressing model
482 12.14 Management objects
12.15 User objects
484 Table 240 โ€“ UAP management object attributes
485 Table 241 โ€“ State table for UAP management object
486 Figure 120 โ€“ UAP management object state diagram
Table 242 โ€“ UAP management object methods
487 Table 243 โ€“ Alert receiving object attributes
Table 244 โ€“ State table for handling an AlertReport reception
488 Figure 121 โ€“ Alert report reception state diagram
Figure 122 โ€“ Alert reporting example
Table 245 โ€“ AlertReceiving object methods
490 Table 246 โ€“ UploadDownload object attributes
494 Table 247 โ€“ UploadDownload object methods
495 Table 248 โ€“ UploadDownload object StartDownload method
496 Table 249 โ€“ UploadDownload object DownloadData method
498 Table 250 โ€“ UploadDownload object EndDownload method
499 Table 251 โ€“ UploadDownload object StartUpload method
500 Table 252 โ€“ UploadDownload object UploadData method
501 Table 253 โ€“ UploadDownload object EndUpload method
503 Table 254 โ€“ Download state table for unicast operation mode
504 Figure 123 โ€“ Upload/Download object download state diagram
505 Table 255 โ€“ Upload state table for unicast operation mode
506 Figure 124 โ€“ Upload/Download object upload state diagram
508 Table 256 โ€“ Concentrator object attributes
509 Table 257 โ€“ Concentrator object methods
510 Table 258 โ€“ Dispersion object attributes
511 Table 259 โ€“ Dispersion object methods
512 Table 260 โ€“ Tunnel object attributes
514 Table 261 โ€“ Tunnel object methods
515 12.16 Data types
Table 262 โ€“ Interface object attributes
Table 263 โ€“ Interface object methods
516 Table 264 โ€“ Data type: ObjectAttributeIndexAndSize
517 Table 265 โ€“ Data type: Communication association endpoint
518 Table 266 โ€“ Data type: Communication contract data
519 Table 267 โ€“ Data type: Alert communication endpoint
Table 268 โ€“ Data type: Tunnel endpoint
520 Table 269 โ€“ Data type: Alert report descriptor
Table 270 โ€“ Data type: Process control alarm report descriptor for analogwith single reference condition
521 12.17 Application services provided by application sub-layer
Table 271 โ€“ Data type: ObjectIDandType
Table 272 โ€“ Data type: Unscheduled correspondent
522 Table 273 โ€“ AL services
524 Figure 125 โ€“ Publish sequence of service primitives
526 Table 274 โ€“ Publish service
529 Figure 126 โ€“ Client/server model two-part interactions
530 Figure 127 โ€“ Client/server model four-part interactions: Successful delivery
Figure 128 โ€“ Client/server model four-part interactions: Request delivery failure
531 Figure 129 โ€“ Client/server model four-part interactions: Response delivery failure
533 Table 275 โ€“ Read service
537 Table 276 โ€“ Write service
541 Table 277 โ€“ Execute service
545 Figure 130 โ€“ AlertReport and AlertAcknowledge, delivery success
546 Figure 131 โ€“ AlertReport, delivery failure
Figure 132 โ€“ Alert Report, acknowledgment failure
547 Table 278 โ€“ AlertReport service
550 Table 279 โ€“ AlertAcknowledge service
553 Figure 133 โ€“ Concatenated response for multiple outstandingwrite requests (no message loss)
554 Table 280 โ€“ Tunnel service
557 12.18 Application layer flow use to lower layer services
Table 281 โ€“ Application flow characteristics
558 12.19 Application layer management
Table 282 โ€“ Application service primitive to transport service primitive mapping
559 Figure 134 โ€“ Management and handling of malformed APDUs received from device X
560 Table 283 โ€“ ASLMO attributes
561 Table 284 โ€“ Application sub-layer management object methods
562 Table 285 โ€“Reset method
563 Table 286 โ€“ ASLMO alerts
566 Table 287 โ€“ Analog input object attributes
567 Table 288 โ€“ Analog input object methods
568 Table 289 โ€“ Analog input alerts
569 Table 290 โ€“ Analog output attributes
570 Table 291 โ€“ Analog output object methods
571 Table 292 โ€“ Analog output alerts
573 Table 293 โ€“ Binary input object attributes
574 Table 294 โ€“ Binary input object methods
Table 295 โ€“ Binary input alerts
575 Table 296 โ€“ Binary output attributes
576 Table 297 โ€“ Binary output object methods
Table 298 โ€“ Binary output alerts
577 12.20 Process control industry standard data structures
578 Table 299 โ€“ Status octet
Table 300 โ€“ Data type: Process value and status for analog value
579 Table 301 โ€“ Data type: Process value and status for binary value
Table 302 โ€“ Data type: Process control mode
580 12.21 Additional tables
Table 303 โ€“ Data type: Process control mode bitstring
Table 304 โ€“ Data type: Process control scaling
581 12.22 Coding
Table 305 โ€“ Process control standard objects
Table 306 โ€“ Services
582 Table 307 โ€“ Application messaging format
Table 308 โ€“ Concatenated APDUs in a single TSDU
Table 309 โ€“ Object addressing
583 Table 310 โ€“ Four-bit addressing mode APDU header construction
Table 311 โ€“ Eight-bit addressing mode APDU header construction
Table 312 โ€“ Sixteen-bit addressing mode APDU header construction
584 Table 313 โ€“ Inferred addressing use case example
Table 314 โ€“ Inferred addressing mode APDU header construction
585 Table 315 โ€“ Six-bit attribute identifier, not indexed
Table 316 โ€“ Six-bit attribute identifier, singly indexed, with seven-bit index
Table 317 โ€“ Six-bit attribute identifier, singly indexed, with fifteen-bit index
Table 318 โ€“ Six-bit attribute identifier, doubly indexed, with two seven-bit indices
586 Table 319 โ€“ Six-bit attribute identifier, doubly indexed, with two fifteen-bit indices
Table 320 โ€“ Six-bit attribute identifier, doubly indexed,with first index seven-bits long and second index fifteen bits long
Table 321 โ€“ Six-bit attribute bit attribute identifier, doubly indexed,with first index fifteen bits long and second index seven bits long
Table 322 โ€“ Twelve-bit attribute identifier, not indexed
587 Table 323 โ€“ Twelve-bit attribute identifier, singly indexed with seven-bit index
Table 324 โ€“ Twelve-bit attribute identifier, singly indexed with fifteen bit identifier
Table 325 โ€“ Twelve-bit attribute identifier, doubly indexed with two seven bit indices
Table 326 โ€“ Twelve-bit attribute identifier, doubly indexed with two fifteen bit indices
Table 327 โ€“ Twelve-bit attribute identifier, doubly indexed with first index seven-bits long and second index fifteen-bits long
588 Table 328 โ€“ Twelve-bit attribute identifier, doubly indexed with the first index fifteen bits long and the second index seven bits long
Table 329 โ€“ Twelve-bit attribute identifier, reserved form
Table 330 โ€“ Coding rules for read service request
Table 331 โ€“ Coding rules for read service response with seven bit length field
589 Table 332 โ€“ Coding rules for read service response with fifteen-bit length field
Table 333 โ€“ Coding rules for write service request with seven bit length field
Table 334 โ€“ Coding rules for write service request with fifteen-bit length field
Table 335 โ€“ Coding rules for write service response
590 Table 336 โ€“ Coding rules for execute service request with seven-bit length field
Table 337 โ€“ Coding rules for execute service request with fifteen-bit length field
Table 338 โ€“ Coding rules for execute service response with 7-bit length field
Table 339 โ€“ Coding rules for execute service response with 15-bit length field
591 Table 340 โ€“ Coding rules for tunnel service request with seven-bit length field
Table 341 โ€“ Coding rules for tunnel service request with fifteen-bit length field
Table 342 โ€“ Coding rules for tunnel service response with seven-bit length field
Table 343 โ€“ Coding rules for tunnel service response with fifteen-bit length field
592 Table 344 โ€“ Coding rules for AlertReport service with seven bit length field
Table 345 โ€“ Coding rules for AlertReport service with fifteen-bit length field
Table 346 โ€“ Coding rules for AlertAcknowledge service
593 Table 347 โ€“ Coding rules for publish service for a native sequence of values
Table 348 โ€“ Coding rules for publish service โ€“ non-native (for tunnel support)
Table 349 โ€“ Coding rules for concatenate service
Table 350 โ€“ General coding rule for size-invariant application data
594 Table 351 โ€“ Coding rules for application data of varying size
Table 352 โ€“ Coding rules for Boolean data โ€“ true
Table 353 โ€“ Coding rules for Boolean data โ€“ false
595 Table 354 โ€“ Coding rules for Unsigned8
Table 355 โ€“ Coding rules for Unsigned16
596 Table 356 โ€“ Coding rules for Unsigned32
Table 357 โ€“ Coding rules for Unsigned64
597 Table 358 โ€“ Coding rules for Unsigned128
Table 359 โ€“ Coding rules for Float
598 Table 360 โ€“ Coding rules for double-precision float
Table 361 โ€“ Coding rules for VisibleString
Table 362 โ€“ Coding rules for OctetString
599 Table 363 โ€“ Coding rules for Bitstring
Table 364 โ€“ Example of coding for Bitstring of size 8
600 Table 365 โ€“ Coding rules for TAITimeDifference
Table 366 โ€“ Coding rules for TAINetworkTimeValue
Table 367 โ€“ Coding rules for TAITimeRounded
602 12.23 Syntax
615 12.24 Detailed coding examples (INFORMATIVE)
Table 368 โ€“ Coding example: Read request for a non-indexed attribute
616 13 Gateway
13.1 General
Table 369 โ€“ Coding example: Read response (corresponding to request containedin the preceding table)
Table 370 โ€“ Coding example: Tunnel service request
618 Figure 135 โ€“ Gateway scenarios
619 Figure 136 โ€“ Basic gateway model
620 13.2 Service access point
621 Table 371 โ€“ Summary of gateway high side interface services
622 Figure 137 โ€“ Sequence of primitives for session service
Figure 138 โ€“ Sequence of primitives for lease management service
623 Figure 139 โ€“ Sequence of primitives for system report services
Figure 140 โ€“ Sequence of primitives for time service
624 Figure 141 โ€“ Sequence of primitives for client/server service initiated from gateway
Figure 142 โ€“ Sequence of primitives for publish service initiated from gateway
625 Figure 143 โ€“ Sequence of primitives for subscribe service initiated from device
Figure 144 โ€“ Sequence of primitives for publisher timer initiated from gateway
Figure 145 โ€“ Sequence of primitives for subscriber timers initiated from device
626 Figure 146 โ€“ Sequence of primitives for the bulk transfer service
Figure 147 โ€“ Sequence of primitives for the alert subscription service
627 Figure 148 โ€“ Sequence of primitives for the alert notification service
Figure 149 โ€“ Sequence of primitives for gateway management services
630 Table 372 โ€“ Primitive G_Session parameter usage
631 Table 373 โ€“ GS_Status for G_Session confirm
632 Table 374 โ€“ Primitive G_Lease parameter usage
633 Table 375 โ€“ GS_Lease_Type for G_Lease request
634 Table 376 โ€“ GS_Status for G_Lease confirm
635 Table 377 โ€“ Primitive G_Device_List_Report parameter usage
636 Table 378 โ€“ GS_Status for G_Device_List_Report confirm
Table 379 โ€“ Primitive G_Topology_Report parameter usage
637 Table 380 โ€“ GS_Status for G_Topology_Report confirm
638 Table 381 โ€“ Primitive G_Schedule_Report parameter usage
639 Table 382 โ€“ GS_Status for G_Schedule_Report confirm
640 Table 383 โ€“ Primitive G_Device_Health_Report parameter usage
Table 384 โ€“ GS_Status for G_Device_Health_Report confirm
641 Table 385 โ€“ Primitive G_Neighbor_Health_Report parameter usage
642 Table 386 โ€“ GS_Status for G_Device_Health_Report confirm
643 Table 387 โ€“ Primitive G_Network_Health_Report parameter usage
644 Table 388 โ€“ GS_Status for G_Network_Health_Report confirm
645 Table 389 โ€“ Primitive G_Time parameter usage
Table 390 โ€“ GS_Status for G_Time confirm
646 Table 391 โ€“ Primitive G_Client_Server parameter usage
647 Table 392 โ€“ GS_Status for G_Client_Server confirm
649 Table 393 โ€“ Primitive G_Publish parameter usage
650 Table 394 โ€“ GS_Status for G_Publish confirm
Table 395 โ€“ Primitive G_Subscribe parameter usage
651 Table 396 โ€“ GS_Status for G_Subscribe confirm
Table 397 โ€“ Primitive G_Publish_Timer parameter usage
Table 398 โ€“ Primitive G_Subscribe_Timer parameter usage
652 Table 399 โ€“ Primitive G_Publish_Watchdog parameter usage
653 Table 400 โ€“ Primitive G_Bulk_Open parameter usage
654 Table 401 โ€“ GS_Status for G_Bulk_Open confirm
Table 402 โ€“ Primitive G_Bulk_Transfer parameter usage
Table 403 โ€“ GS_Status for G_Bulk_Transfer confirm
655 Table 404 โ€“ Primitive G_Bulk_Close parameter usage
Table 405 โ€“ GS_Status for G_Bulk_Close confirm
656 Table 406 โ€“ Primitive G_Alert_Subscription parameter usage
657 Table 407 โ€“ GS_Status for G_Alert_Subscription confirm
Table 408 โ€“ Primitive G_Alert_Notification parameter usage
658 Table 409 โ€“ Primitive G_Read_Gateway_Configuration parameter usage
659 Table 410 โ€“ GS_Attribute_Identifier values
Table 411 โ€“ GS_Status for G_Read_Gateway_Configuration confirm
Table 412 โ€“ Primitive G_Write_Gateway_Configuration parameter usage
660 Table 413 โ€“ GS_Attribute_Identifier values
Table 414 โ€“ GS_Status for G_Write_Gateway_Configuration confirm
661 Table 415 โ€“ Primitive G_Write_Device_Configuration parameter usage
662 Table 416 โ€“ GS_Status for G_Write_Device_Configuration confirm
Table 417 โ€“ Primitive G_Read_Device_Configuration parameter usage
663 13.3 Protocol
Figure 150 โ€“ Tunnel object model
Table 418 โ€“ GS_Status for G_Read_Device_Configuration confirm
664 Figure 151 โ€“ Distributed tunnel endpoints
665 Figure 152 โ€“ Multicast, broadcast, and one-to-many messaging
666 Figure 153 โ€“ Tunnel object buffering
669 Figure 154 โ€“ Publish/subscribe publisher CoSt flowchart
Figure 155 โ€“ Publish/subscribe publisher periodic flowchart
670 Figure 156 โ€“ Publish/subscribe subscriber common periodic and CoSt flowchart
671 Figure 157 โ€“ Network address mappings
672 Figure 158 โ€“ Connection_Info usage in protocol translation
673 Figure 159 โ€“ Transaction_Info usage in protocol translation
674 Figure 160 โ€“ Interoperable tunneling mechanism overview diagram
676 Figure 161 โ€“ Bulk transfer model
677 Figure 162 โ€“ Alert model
678 Figure 163 โ€“ Alert cascading
679 Figure 164 โ€“ Native P/S and C/S access
681 Table 419 โ€“ UAP management object extended attributes
682 14 Provisioning
14.1 General
14.2 Terms and definitions
684 14.3 Provisioning procedures
14.4 Pre-installed symmetric keys
685 14.5 Provisioning using out-of-band mechanisms
14.6 Provisioning networks
686 Figure 165 โ€“ The provisioning network
688 14.7 State transition diagrams
Figure 166 โ€“ State transition diagrams outlining provisioning stepsduring a device life cycle
689 Table 420 โ€“ Factory default settings
691 Figure 167 โ€“ State transition diagram showing various pathsto joining a secured network
693 14.8 Device management application protocol objects for provisioning
Figure 168 โ€“ Provisioning objects and interactions
694 14.9 Management objects
695 Table 421 โ€“ Device provisioning object
699 14.10 Device provisioning service object
Table 422 โ€“ Reset_To_Default method
Table 423 โ€“ Write symmetric join key method
700 Table 424 โ€“ Device provisioning service object
703 Table 425 โ€“ DPSOWhiteListTbl data structure
705 Table 426 โ€“ Array manipulation table
Table 427 โ€“ DPSO alert to indicate join by a device not on the WhiteList
706 14.11 Provisioning functions (INFORMATIVE)
Table 428 โ€“ DPSO alert to indicate inadequate device join capability
710 Annex A (informative) Protocol implementation conformance statement proforma
A.1 General
713 A.2 System
Table 429 โ€“ Field media type
Table 430 โ€“ Protocol layer support
714 Table 431 โ€“ Device PICS
Table 432 โ€“ PICS for device implementing I/O role
Table 433 โ€“ PICS for device implementing router role
Table 434 โ€“ PICS for backbone router
715 Table 435 โ€“ PICS for gateway
Table 436 โ€“ PICS for system manager
Table 437 โ€“ PICS for provisioning device
Table 438 โ€“ PICS for security manager
Table 439 โ€“ PICS for device implementing system time source role
716 A.3 System management
Table 440 โ€“ System PICS
717 Table 441 โ€“ Device PICS
Table 442 โ€“ Router and backbone router PICS
718 Table 443 โ€“ PICS for system time source
719 Table 444 โ€“ PICS for system manager
Table 445 โ€“ PICS for provisioning role
720 A.4 Security manager
Table 446 โ€“ Device PICS
721 A.5 Physical layer
Table 447 โ€“ PICS for provisioning role
Table 448 โ€“ PICS for security manager
722 Table 449 โ€“ PhL roles
Table 450 โ€“ PhL frequency of operation
Table 451 โ€“ PhL functions
723 A.6 Data link layer
Table 452 โ€“ PhL packet
Table 453 โ€“ DL roles
Table 454 โ€“ DL PICS for device implementing I/O role
Table 455 โ€“ DL PICS for device implementing router role
724 A.7 Network layer
Table 456 โ€“ DL PICS for device implementing backbone router role
Table 457 โ€“ PICS for devices implementing I/O role
725 Table 458 โ€“ PICS for device implementing router role
Table 459 โ€“ PICS for devices implementing backbone router role
726 A.8 Transport layer
Table 460 โ€“ PICS for device implementing I/O role
Table 461 โ€“ PICS for routing device
Table 462 โ€“ PICS for backbone router
727 A.9 Application layer
Table 463 โ€“ AL implementation option
Table 464 โ€“ PICS part 2: Optional industry-independent objects
728 Table 465 โ€“ PICS part 2: Supported standard services for I/O device role
729 Table 466 โ€“ PICS part 2: Supported standard services for system manager role
730 Table 467 โ€“ PICS part 2: Supported standard services for gateway rolewhen supporting native access
731 Table 468 โ€“ PICS part 2: Supported standard services for gateway rolewhen supporting interoperable tunneling and for adapters
732 Table 469 โ€“ PICS part 2: Supported standard services for routing device role
733 Table 470 โ€“ PICS part 2: Supported standard services for backbone router role
734 Table 471 โ€“ PICS part 2: Supported standard services for provisioning role
Table 472 โ€“ PICS part 2: Supported standard services for system time source role
Table 473 โ€“ Process control conformance: Supported objects
735 A.10 Gateway
Table 474 โ€“ Process control conformance: Supported alerts
736 Table 475 โ€“ PICS: Gateway
737 A.11 Provisioning
738 Table 476 โ€“ PICS: I/O devices, routing devices, gateways, and backbone routers
Table 477 โ€“ PICS: Provisioning devices
739 Annex B (normative) Role profiles
B.1 General
740 B.2 System
B.3 System manager
Table 478 โ€“ Protocol layer device roles
Table 479 โ€“ Over-the-air upgrades
741 B.4 Security manager
Table 480 โ€“ Session support profiles
Table 481 โ€“ Baseline profiles
742 B.5 Physical layer
B.6 Data link layer
Table 482 โ€“ PhL roles
Table 483 โ€“ DL required for listed roles
743 Table 484 โ€“ Role profiles: General DLMO attributes
744 Table 485 โ€“ Role profiles: dlmo.Device_Capability
745 Table 486 โ€“ Role profiles: dlmo.Ch (channel hopping)
Table 487 โ€“ Role profiles: dlmo.TsTemplate
Table 488 โ€“ Role profiles: dlmo.Neighbor
746 Table 489 โ€“ Role profiles: dlmo. NeighborDiag
Table 490 โ€“ Role profiles: dlmo.Superframe
Table 491 โ€“ Role profiles: dlmo.Graph
747 B.7 Network layer
Table 492 โ€“ Role profiles: dlmo.Link
Table 493 โ€“ Role profiles: dlmo.Route
Table 494 โ€“ Role profiles: dlmo.Queue_Priority
Table 495 โ€“ Routing table size
748 B.8 Transport layer
B.9 Application layer
B.10 Gateway
Table 496 โ€“ Address table size
Table 497 โ€“ Port support size
Table 498 โ€“ APs
Table 499 โ€“ Role profile: Gateway
749 B.11 Provisioning
Table 500 โ€“ Role profile: Gateway native access
Table 501 โ€“ Role profile: Gateway interoperable tunnel mechanism
Table 502 โ€“ Role profiles: I/O, routers, gateways, and backbone routers
750 Annex C (informative) Background information
C.1 Industrial needs
C.2 Usage classes
751 Table 503 โ€“ Usage classes
752 C.3 Other uploading and downloading- alarms (human or automated action)
C.4 The open systems interconnection basic reference model
753 Figure 169 โ€“ Basic reference model
756 Annex D (normative) Configuration defaults
D.1 General
D.2 System management
Table 504 โ€“ System management configuration defaults
757 D.3 Security
D.4 Data link layer
Table 505 โ€“ Security configuration defaults
758 D.5 Network layer
Table 506 โ€“ DL configuration defaults
759 D.6 Transport layer
D.7 Application layer
Table 507 โ€“ Network configuration defaults
Table 508 โ€“ Transport configuration defaults
760 Table 509 โ€“ Application configuration defaults
761 D.8 Gateway
D.9 Provisioning
Table 510 โ€“ Gateway configuration defaults
762 Table 511 โ€“ Provisioning configuration defaults
763 Annex E (informative) Use of backbone networks
E.1 General
E.2 Recommended characteristics
E.3 Internet protocol backbones
766 Annex F (normative) Basic security concepts โ€“ Notation and representation
F.1 Strings and string operations
F.2 Integers, octets, and their representation
F.3 Entities
767 Annex G (informative) Using certificate chains for over-the-air provisioning
768 Annex H (normative) Security building blocks
H.1 Symmetric key cryptographic building blocks
769 H.2 Asymmetric key cryptographic building blocks
H.3 Keying information
771 H.4 Key agreement schemes
H.5 Keying information schemes
772 H.6 Challenge domain parameter generation and validation
773 H.7 Challenge validation primitive
H.8 Secret key generation (SKG) primitive
774 H.9 Block-cipher-based cryptographic hash function
775 H.10 Elliptic curve cryptography manual certificate scheme
778 Annex I (informative) Definition templates
I.1 Object type template
I.2 Standard object attributes template
Table 512 โ€“ Table of standard object types
779 I.3 Standard object methods
Table 513 โ€“ Template for standard object attributes
780 I.4 Standard object alert reporting template
Table 514 โ€“ Template for standard object methods
781 I.5 Data structure definition
Table 515 โ€“ Template for standard object alert reporting
782 Table 516 โ€“ Template for data structures
783 Annex J (informative) Operations on attributes
J.1 Operations on attributes
Table 517 โ€“ Scheduled_Write method template
784 Table 518 โ€“ Read_Row method template
785 Table 519 โ€“ Write_Row method template
Table 520 โ€“ Reset_Row method template
786 J.2 Synchronized cutover
Table 521 โ€“ Delete_Row method template
788 Annex K (normative) Standard object types
790 Table 522 โ€“ Standard object types
792 Table 523 โ€“ Standard object instances
794 Annex L (informative) Standard data types
795 Table 524 โ€“ Standard data types
796 Annex M (normative) Protocol identification values
Table 525 โ€“ Protocol identification values
797 Annex N (informative) Tunneling and native object mapping
N.1 Overview
N.2 Tunneling
N.3 Foreign protocol application communication
798 N.4 Native object mapping
N.5 Tunneling and native object mapping tradeoffs
799 Annex O (informative) Generic protocol translation
O.1 Overview
O.2 Publish
Figure 170 โ€“ Generic protocol translation publish diagram
800 O.3 Subscribe
Figure 171 โ€“ Generic protocol translation subscribe diagram
801 O.4 Client
Figure 172 โ€“ Generic protocol translation client/server transmission diagram
802 O.5 Server
Figure 173 โ€“ Generic protocol translation client/server reception diagram
803 Annex P (informative) Gateway service access point adaptations for this specification
P.1 General
P.2 Parameters
P.3 Session
P.4 Lease
804 P.5 Device list report
P.6 Topology report
P.7 Schedule report
P.8 Device health report
P.9 Neighbor health report
P.10 Network health report
P.11 Time
P.12 Client/server
805 P.13 Publish/subscribe
806 P.14 Bulk transfer
807 P.15 Alert
P.16 Gateway configuration
P.17 Device configuration
808 Annex Q (informative) Gateway service access point adaptations for WirelessHARTยฎ
Q.1 General
809 Q.2 Parameters
Q.3 Session
810 Q.4 Lease
Q.5 Device list report
811 Q.6 Topology report
Q.7 Schedule report
Q.8 Device health report
812 Q.9 Neighbor health report
Q.10 Network health report
813 Q.11 Time
Q.12 Client/server
814 Q.13 Publish/subscribe
815 Q.14 Bulk transfer
Q.15 Alert
816 Q.16 Gateway configuration
Q.17 Device configuration
817 Annex R (informative) Host system interface to standard-compliant devices via a gateway
R.1 Background
Figure 174 โ€“ Host integration reference model
818 R.2 Device application data integration with host systems
R.3 Host system configuration tool
819 Figure 175 โ€“ Configuration using an electronic device definition
820 R.4 Field device / distributed control systems integration
Figure 176 โ€“ Configuration using FDT/DTM approach
821 R.5 Gateway
R.6 Asset management application support
823 Annex S (informative) Symmetric Key Operation Test Vectors
S.1 DPDU samples
824 S.2 TPDU samples
826 Annex T (informative) Data link header and network header for join requests
T.1 Overview
T.2 MAC header (MHR)
T.3 DL header (DHR)
Table 526 โ€“ Sample MHR for join request
Table 527 โ€“ Sample DHR for join request
827 T.4 NL header
Table 528 โ€“ Network header for join messages
828 Bibliography
BSI PD IEC/PAS 62734:2012
$215.11