IEEE 1703-2012
$130.54
IEEE Standard for Local Area Network/Wide Area Network (LAN/WAN) Node Communication Protocol to Complement the Utility Industry End Device Data Tables
Published By | Publication Date | Number of Pages |
IEEE | 2012 |
New IEEE Standard – Active. A set of application layer messaging services are provided in this standard that are applicable for the enterprise and End Device ends of an Advanced Metering Infrastructure (AMI). The application services include those useful for managing the AMI network assets defined by this standard. These messages may be transported over a wide range of underlying network transports such as TCP/IP, UDP, IEEE 802.11, IEEE 802.15.4 IEEE 802.16, PLC, and SMS over GSM, over a wide range of physical media. Additionally, interfaces are defined for a Communication Module and a Local Port (e.g., an IEEE 1701 optical port).The described protocol is tailored for, but not limited to, the transport of IEEE 1377 Table data.Also, a means by which information can be sent in a secure manner using AES-128 and the EAX’ mode is provided in this standard. This standard was developed jointly with ANSI (published as ANSI C12.22) and Measurement Canada (published as MC12.22).
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1703-2012 Front Cover |
3 | Title Page |
6 | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata |
7 | Patents |
8 | Participants |
10 | Introduction |
11 | Contents |
13 | Important Notice 1 Overview 1.1 Introduction 1.2 Scope |
15 | 1.3 Purpose |
16 | 2 Normative references |
18 | 3 Definitions and syntax 3.1 Definitions |
22 | 3.2 Document syntax 3.3 Table syntax |
23 | 4 Reference topology |
25 | 5 C12.22 Node to C12.22 Network Segment details 5.1 C12.22 Node to C12.22 Network Segment reference |
26 | 5.2 Data encoding rules 5.2.1 Data order 5.2.2 Length fields encoding 5.2.3 Universal identifiers encoding |
28 | 5.2.4 Universal identifiers canonical encoding 5.3 Layer 7—application layer |
29 | 5.3.1 Data structure—utility industry data tables 5.3.2 EPSEM 5.3.2.1 Request codes |
30 | 5.3.2.2 Response codes |
33 | 5.3.2.3 Time-out 5.3.2.3.1 Session time-out 5.3.2.3.2 Application layer response time-out |
34 | 5.3.2.4 Services 5.3.2.4.1 Identification service |
37 | 5.3.2.4.2 Read service |
38 | 5.3.2.4.3 Write service |
40 | 5.3.2.4.4 Logon service |
41 | 5.3.2.4.5 Security service |
42 | 5.3.2.4.6 Logoff service 5.3.2.4.7 Terminate service |
43 | 5.3.2.4.8 Disconnect service |
44 | 5.3.2.4.9 Wait service 5.3.2.4.10 Registration service |
52 | 5.3.2.4.11 Deregistration service |
53 | 5.3.2.4.12 Resolve service |
54 | 5.3.2.4.13 Trace service 5.3.2.5 Service sequence state control |
56 | 5.3.2.6 Partial table access using index/element-count method |
58 | 5.3.2.7 Partial table access using offset/octet-count method |
59 | 5.3.3 EPSEM envelope structure |
60 | 5.3.4 Association control—Association Control Service Element (ACSE) |
61 | 5.3.4.1 Application Context Element (A1H) |
62 | 5.3.4.2 Called AP Title Element (A2H) 5.3.4.3 Calling AP Title Element (A6H) 5.3.4.4 Universal Identifier of Called and Calling AP Title Element (06H) 5.3.4.5 Relative Universal Identifier of Called and Calling AP Title Element (80H) |
63 | 5.3.4.6 Calling Application Entity Qualifier Element (A7H) |
64 | 5.3.4.7 Mechanism Name Element (8BH) 5.3.4.8 Calling Authentication Value Element (ACH) |
66 | 5.3.4.8.1 C12.22 Security Mechanism (.2.1) |
69 | 5.3.4.8.2 C12.21 Security Mechanism (.2.0) |
71 | 5.3.4.8.3 C12.22 Other security mechanisms 5.3.4.9 Called AP invocation ID element (A4H) |
72 | 5.3.4.10 Calling AP invocation ID element (A8H) |
74 | 5.3.4.11 User information element (BEH) |
75 | 5.3.4.12 Use of subbranches of a registered ApTitle |
78 | 5.3.4.13 C12.22 Security Mechanism 5.3.4.13.1 C12.22 Security Mechanism (.2.1) 5.3.4.13.1.1 Security modes |
79 | 5.3.4.13.1.2 Rules for responses 5.3.4.13.1.3 Key ID 5.3.4.13.1.4 Access privileges 5.3.4.13.1.5 Initialization Vector |
80 | 5.3.4.13.1.6 Calling AP Invocation ID 5.3.4.13.1.7 Syntax mapping 5.3.4.13.1.8 Cleartext with Authentication |
83 | 5.3.4.13.1.9 Ciphertext with Authentication |
85 | 5.3.4.13.1.10 Validating messages 5.3.5 Application Segmentation Sub-layer |
86 | 5.3.5.1 APDU segmentation 5.3.5.2 APDU Segment 5.3.5.2.1 Called AE Qualifier Element (A3H) |
87 | 5.3.5.2.2 Segment User Information Element (BEH) 5.3.5.2.2.1 Segment Association Information Element |
88 | 5.3.5.2.2.2 Segment Data Elements 5.3.5.3 Segmentation and Reassembly 5.3.5.3.1 Segmentation Algorithm |
90 | 5.3.5.3.2 Reassembly Algorithm |
91 | 5.4 Layer 6—presentation layer 5.5 Layer 5—session layer 5.6 Layer 4—transport layer 5.7 Layer 3—network layer 5.8 Layer 2—data link layer 5.9 Layer 1—physical layer |
92 | 6 Protocol Details: C12.22 Device to C12.22 Communication Module interface 6.1 Interface architecture 6.2 Interface diagram |
93 | 6.3 Implementation guidelines 6.3.1 C12.22 Communication Module |
94 | 6.3.2 C12.22 Device |
95 | 6.4 Layer 7—application layer 6.5 Layer 6—presentation layer 6.6 Layer 5—session layer 6.7 Layer 4—transport layer 6.7.1 Negotiate Service |
97 | 6.7.2 Get Configuration Service |
100 | 6.7.3 Link Control Service |
102 | 6.7.4 Send Message Service |
104 | 6.7.5 Get Status Service |
105 | 6.7.6 Get Registration Status Service |
107 | 6.7.7 Service Time Sequence Diagrams |
110 | 6.7.8 Service Sequence States |
112 | 6.8 Layer 3—network layer 6.9 Layer 2—data link layer |
113 | 6.9.1 Basic data information 6.9.1.1 Fixed settings 6.9.1.2 Variable settings 6.9.2 Packet definition |
115 | 6.9.3 CRC selection |
116 | 6.9.4 Acknowledgment 6.9.5 Retry attempts 6.9.6 Timeouts 6.9.6.1 Traffic Time-out 6.9.6.2 Inter-character Time-out 6.9.6.3 Response Time-out |
117 | 6.9.7 Turn Around Delay 6.9.8 Collision 6.9.9 Duplicate packets 6.9.10 Transparency 6.9.11 Supervision of the communications link |
118 | 6.9.12 Local routing |
119 | 6.9.13 Service sequence states |
120 | 6.10 Layer 1—physical layer 6.10.1 Signal definition 6.10.2 Electrical properties of the connection |
121 | 6.10.3 Mechanical and environmental properties |
122 | 6.10.4 Supervision of the communications link |
123 | 7 Local Port communication protocol details 7.1 Protocol definition 7.1.1 Layer 7—Application layer 7.1.2 Layer 6—Presentation layer 7.1.3 Layer 5—Session layer 7.1.4 Layer 4—Transport layer |
124 | 7.1.5 Layer 3—Network layer 7.1.6 Layer 2—Data link layer 7.1.7 Layer 1—Physical layer 7.2 C12.22 Local Port communication using a C12.18 Optical Port |
125 | 7.2.1 Establishment of ANSI C12.18 protocol compatibility mode 7.2.2 Establishment of ANSI C12.22 protocol compatibility mode |
126 | 8 Backward compatibility |
127 | 9 Compliance |
128 | Annex A (normative) Relays A.1 Description A.2 Hierarchical topology A.3 C12.22 Master Relays |
129 | A.4 Registration notification A.5 Registration algorithm details A.6 C12.22 Node ApTitle auto-assignment |
130 | A.7 C12.22 Master Relay ApTitle auto-assignment A.8 Obsolete routes A.9 Multiple routes |
131 | A.10 Application layer supervision A.11 Routing |
132 | Annex B (informative) Routing examples B.1 C12.22 Relays with a single Service Provider |
133 | B.2 C12.22 Relays shared by multiple Service Providers |
134 | Annex C (normative) Modifications and extensions to ANSI C12.19 C.1 Overview |
135 | C.2 Decade 12: Node Network Control Tables C.2.1 Table 120 Node Network Control Dimension Limits Table |
139 | C.2.2 Table 121 Actual Node Network Control Limiting Table |
142 | C.2.3 Table 122 Interface Control Table |
145 | C.2.4 Table 123 Exception Report Configuration Table |
147 | C.2.5 Table 124 Filtering Rules Table |
149 | C.2.6 Table 125 Interface Status Table |
154 | C.2.7 Table 126 Registration Status Table |
156 | C.2.8 Table 127 Network Statistics Selections Table |
157 | C.2.9 Table 128 Network Statistics Table |
158 | C.3 Decade 13: Network Relay Control Tables C.3.1 Table 130 Relay Network Control Dimension Limits Table |
161 | C.3.2 Table 131 Actual Network Relay Limiting Table |
163 | C.3.3 Table 132 Registration List Table |
166 | C.3.4 Table 133 Static Routing Table |
168 | C.3.5 Table 134 Host Notification Table |
170 | C.3.6 Table 135 Master Relay Assignment Table |
171 | C.3.7 Table 136 Dynamic Routing Report Table C.4 Universal ID pattern description of ApTitles |
173 | C.5 Additions to TABLE 07—Procedure Initiate Table C.5.1 Procedure 23 Register C.5.2 Procedure 24 Deregister C.5.3 Procedure 25 Network Interface Control |
175 | C.5.4 Procedure 26 Exception Report |
176 | C.6 Table 46: Extended Key Table |
178 | C.7 Table 47: Host Access Security Table |
182 | Annex D (normative) Universal Identifier |
184 | Annex E (normative) One-way devices |
186 | Annex F (informative) APDU Response Timeout algorithm |
188 | Annex G (informative) Communication examples G.1 Example #1: Unsecured session |
189 | G.2 Example #2: Unsecured sessionless |
190 | G.3 Example #3: Unsecured notification G.4 Example #4: Authenticated session |
193 | G.5 Example #5: Authenticated sessionless |
194 | G.6 Example #6: Authenticated notification |
195 | G.7 Example #7: Encrypted session |
198 | G.8 Example #8: Encrypted sessionless |
200 | G.9 Example #9: Encrypted notification |
201 | Annex H (informative) CRC examples H.1 Trace |
202 | H.2 CRC code example |
203 | Annex I (normative) The EAX’ Cryptographic Mode I.1 EAX′ description |
208 | I.2 Justifications for selection of EAX rather than CCM |
209 | I.3 Justifications for the EAX’ optimizations |
211 | I.4 EAX′ C code example (informative) |
215 | I.5 AES C code example (informative) |
220 | Annex J (informative) Connectionless-ACSE-1 equivalent reduced syntax for C12.22 Message transmission |
222 | Annex K (informative) Bibliography |
223 | Annex L (informative) Listing of editorial errors and errors of omission in ANSI C12.22-2008 |