{"id":244183,"date":"2024-10-19T16:02:16","date_gmt":"2024-10-19T16:02:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-pas-627342012\/"},"modified":"2024-10-25T11:01:00","modified_gmt":"2024-10-25T11:01:00","slug":"bsi-pd-iec-pas-627342012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-pas-627342012\/","title":{"rendered":"BSI PD IEC\/PAS 62734:2012"},"content":{"rendered":"

IEC\/PAS 62734:2012(E) defines the OSI layer specifications (e.g., PhL, DL, etc.), security specifications, and management (including network and device configuration) specifications for wireless devices serving application classes 1 through 5 and optionally class 0 for fixed, portable, and moving devices. It addresses the performance needs for periodic monitoring and process control where latencies on the order of 100 ms can be tolerated, with optional behavior for shorter latency.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
26<\/td>\nFOREWORD <\/td>\n<\/tr>\n
28<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
30<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
31<\/td>\n3 Terms, definitions, abbreviated terms, acronyms and conventions
3.1 (N)-layer and other terms and definitions from the open systems interconnection basic reference model <\/td>\n<\/tr>\n
36<\/td>\n3.2 Other terms and definitions <\/td>\n<\/tr>\n
51<\/td>\n3.3 Symbols <\/td>\n<\/tr>\n
52<\/td>\n3.4 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
60<\/td>\n3.5 IEC service table conventions <\/td>\n<\/tr>\n
61<\/td>\n4 Overview
4.1 General
4.2 Interoperability
4.3 Quality of service
4.4 Worldwide applicability <\/td>\n<\/tr>\n
62<\/td>\n4.5 Network architecture <\/td>\n<\/tr>\n
63<\/td>\nFigures
Figure 1 \u2013 Standard-compliant network <\/td>\n<\/tr>\n
64<\/td>\n4.6 Network characteristics
Figure 2 \u2013 Single protocol data unit
Figure 3 \u2013 Full protocol data unit <\/td>\n<\/tr>\n
69<\/td>\n5 Systems
5.1 General
5.2 Devices <\/td>\n<\/tr>\n
71<\/td>\nFigure 4 \u2013 Physical devices versus roles <\/td>\n<\/tr>\n
75<\/td>\nFigure 5 \u2013 Notional representation of device phases <\/td>\n<\/tr>\n
76<\/td>\n5.3 Networks <\/td>\n<\/tr>\n
77<\/td>\nFigure 6 \u2013 Simple star topology <\/td>\n<\/tr>\n
78<\/td>\nFigure 7 \u2013 Simple hub-and-spoke topology <\/td>\n<\/tr>\n
79<\/td>\nFigure 8 \u2013 Mesh topology <\/td>\n<\/tr>\n
80<\/td>\nFigure 9 \u2013 Simple star-mesh topology <\/td>\n<\/tr>\n
81<\/td>\nFigure 10 \u2013 Network and DL subnet overlap <\/td>\n<\/tr>\n
82<\/td>\nFigure 11 \u2013 Network and DL subnet differ <\/td>\n<\/tr>\n
83<\/td>\nFigure 12 \u2013 Network with multiple gateways <\/td>\n<\/tr>\n
84<\/td>\nFigure 13 \u2013 Basic network with backup gateway <\/td>\n<\/tr>\n
85<\/td>\nFigure 14 \u2013 Network with backbone <\/td>\n<\/tr>\n
86<\/td>\n5.4 Protocol suite structure
Figure\u00a015 \u2013 Network with backbone \u2013 device roles <\/td>\n<\/tr>\n
87<\/td>\n5.5 Data flow
Figure 16 \u2013 Reference model <\/td>\n<\/tr>\n
88<\/td>\nFigure 17 \u2013 Basic data flow <\/td>\n<\/tr>\n
89<\/td>\nFigure 18 \u2013 Data flow between I\/O devices <\/td>\n<\/tr>\n
90<\/td>\nFigure 19 \u2013 Data flow with legacy I\/O device
Figure 20 \u2013 Data flow with backbone <\/td>\n<\/tr>\n
91<\/td>\nFigure 21 \u2013 Data flow between I\/O devices via backbone <\/td>\n<\/tr>\n
92<\/td>\n5.6 Time reference
Figure 22 \u2013 Data flow to standard-aware control system <\/td>\n<\/tr>\n
93<\/td>\n5.7 Firmware upgrades
5.8 Wireless backbones and other infrastructures <\/td>\n<\/tr>\n
94<\/td>\n6 System management
6.1 General <\/td>\n<\/tr>\n
95<\/td>\nFigure 23 \u2013 Management architecture <\/td>\n<\/tr>\n
96<\/td>\n6.2 Device management application process <\/td>\n<\/tr>\n
98<\/td>\nFigure 24 \u2013 DMAP <\/td>\n<\/tr>\n
99<\/td>\nTables
Table 1 \u2013 Standard management object types in DMAP <\/td>\n<\/tr>\n
100<\/td>\nFigure 25 \u2013 Example of management SAP flow through standard protocol suite <\/td>\n<\/tr>\n
101<\/td>\nTable 2 \u2013 Meta_Data_Attribute data structure <\/td>\n<\/tr>\n
102<\/td>\nTable 3 \u2013 Alert types for communication diagnostic category <\/td>\n<\/tr>\n
103<\/td>\nTable 4 \u2013 Alert types for security alert category
Table 5 \u2013 Alert types for device diagnostic alert category
Table 6 \u2013 Alert types for process alert category <\/td>\n<\/tr>\n
105<\/td>\nTable 7 \u2013 ARMO attributes <\/td>\n<\/tr>\n
108<\/td>\nTable 8 \u2013 ARMO alerts <\/td>\n<\/tr>\n
109<\/td>\nTable 9 \u2013 Alarm_Recovery method <\/td>\n<\/tr>\n
112<\/td>\nTable\u00a010 \u2013 DMO attributes <\/td>\n<\/tr>\n
118<\/td>\nTable 11 \u2013 DMO alerts <\/td>\n<\/tr>\n
119<\/td>\n6.3 System manager <\/td>\n<\/tr>\n
120<\/td>\nFigure 26 \u2013 System manager architecture concept <\/td>\n<\/tr>\n
121<\/td>\nTable 12 \u2013 System management object types <\/td>\n<\/tr>\n
123<\/td>\nTable 13 \u2013 DSO attributes
Table 14 \u2013 Address_Translation_Row data structure <\/td>\n<\/tr>\n
124<\/td>\nTable 15 \u2013 Read_Address_Row method <\/td>\n<\/tr>\n
125<\/td>\nTable 16 \u2013 Input argument usage
Table 17 \u2013 Output argument usage <\/td>\n<\/tr>\n
127<\/td>\nTable 18 \u2013 Attributes of SMO in system manager <\/td>\n<\/tr>\n
129<\/td>\nTable 19 \u2013 Proxy_System_Manager_Join method <\/td>\n<\/tr>\n
130<\/td>\nTable 20 \u2013 Proxy_System_Manager_Contract method <\/td>\n<\/tr>\n
131<\/td>\nTable 21 \u2013 Effect of Different Join Commands on Attribute Sets <\/td>\n<\/tr>\n
132<\/td>\nTable 22 \u2013 Attributes of DMSO in system manager <\/td>\n<\/tr>\n
133<\/td>\nTable 23 \u2013 System_Manager_Join method <\/td>\n<\/tr>\n
134<\/td>\nTable 24 \u2013 System_Manager_Contract method <\/td>\n<\/tr>\n
138<\/td>\nTable 25 \u2013 Attributes of STSO in system manager <\/td>\n<\/tr>\n
139<\/td>\nFigure 27 \u2013 UAP-system manager interaction during contract establishment <\/td>\n<\/tr>\n
141<\/td>\nFigure 28 \u2013 Contract-related interaction between DMO and SCO
Table 26 \u2013 Attributes of SCO in system manager <\/td>\n<\/tr>\n
144<\/td>\nTable 27 \u2013 SCO method for contract establishment, modification, or renewal <\/td>\n<\/tr>\n
149<\/td>\nTable 28 \u2013 Input argument usage <\/td>\n<\/tr>\n
150<\/td>\nTable 29 \u2013 Output argument usage <\/td>\n<\/tr>\n
151<\/td>\nFigure 29 \u2013 Contract source, destination, and intermediate devices <\/td>\n<\/tr>\n
153<\/td>\nTable 30 \u2013 Contract_Data data structure <\/td>\n<\/tr>\n
156<\/td>\nTable 31 \u2013 New_Device_Contract_Response data structure <\/td>\n<\/tr>\n
159<\/td>\nFigure 30 \u2013 Contract establishment example <\/td>\n<\/tr>\n
160<\/td>\nFigure 31 \u2013 Contract ID usage in source <\/td>\n<\/tr>\n
162<\/td>\nTable 32 \u2013 SCO method for contract termination, deactivation and reactivation
Table 33 \u2013 DMO method to terminate contract <\/td>\n<\/tr>\n
163<\/td>\nFigure 32 \u2013 Contract termination <\/td>\n<\/tr>\n
164<\/td>\nTable 34 \u2013 DMO method to modify contract <\/td>\n<\/tr>\n
165<\/td>\nFigure 33 \u2013 Contract modification with immediate effect <\/td>\n<\/tr>\n
166<\/td>\n7 Security
7.1 General <\/td>\n<\/tr>\n
167<\/td>\n7.2 Security services
Figure 34 \u2013 Examples of DPDU and TPDU scope <\/td>\n<\/tr>\n
171<\/td>\n7.3 Frame security
Table 35 \u2013 Security levels <\/td>\n<\/tr>\n
172<\/td>\nTable 36 \u2013 Structure of the security control field <\/td>\n<\/tr>\n
173<\/td>\nFigure 37 \u2013 DPDU structure <\/td>\n<\/tr>\n
174<\/td>\nFigure 38 \u2013 Outgoing messages \u2013 DL and security <\/td>\n<\/tr>\n
176<\/td>\nFigure 39 \u2013 Incoming messages- DL and security <\/td>\n<\/tr>\n
177<\/td>\nTable 37 \u2013 Sec.DpduPrep.Request elements <\/td>\n<\/tr>\n
178<\/td>\nTable 38 \u2013 Sec.DpduPrep.Response elements
Table 39 \u2013 Sec.DLAckCheck.Request elements <\/td>\n<\/tr>\n
179<\/td>\nTable 40 \u2013 Sec. DLAckCheck.Response elements <\/td>\n<\/tr>\n
180<\/td>\nTable 41 \u2013 Sec.DpduCheck.Request elements <\/td>\n<\/tr>\n
181<\/td>\nTable 42 \u2013 Sec.DpduCheck.Response elements
Table 43 \u2013 Sec.DLAckPrep.Request elements <\/td>\n<\/tr>\n
182<\/td>\nTable 44 \u2013 Sec.DLAckPrep.Response elements <\/td>\n<\/tr>\n
183<\/td>\nTable 45 \u2013 Structure of the WISN DPDU nonce
Table 46 \u2013 Structure of the 32-bit truncated TAI time <\/td>\n<\/tr>\n
187<\/td>\nFigure 40 \u2013 TPDU structure and protected coverage <\/td>\n<\/tr>\n
188<\/td>\nFigure 41 \u2013 TMIC parameters
Table 47 \u2013 TSS \u201cpseudo-header\u201d structure <\/td>\n<\/tr>\n
189<\/td>\nFigure 42 \u2013 Transport layer and security sub-layer interaction, outgoing TPDU <\/td>\n<\/tr>\n
190<\/td>\nFigure 43 \u2013 Transport layer and security sub-layer interaction, incoming TPDU <\/td>\n<\/tr>\n
191<\/td>\nTable 48 \u2013 Sec.TpduOutCheck.Request elements
Table 49 \u2013 Sec.TpduOutCheck.Response elements <\/td>\n<\/tr>\n
192<\/td>\nTable 50 \u2013 Sec.TpduSecure.Request elements <\/td>\n<\/tr>\n
193<\/td>\nTable 51 \u2013 Sec. TpduSecure.Response elements <\/td>\n<\/tr>\n
194<\/td>\nTable 52 \u2013 Sec.TpduInCheck.Request elements <\/td>\n<\/tr>\n
195<\/td>\nTable 53 \u2013 Sec.TpduInCheck.Response elements
Table 54 \u2013 Sec.TpduVerify.Request elements <\/td>\n<\/tr>\n
196<\/td>\nTable 55 \u2013 Sec.TpduVerify.Response elements <\/td>\n<\/tr>\n
197<\/td>\nTable 56 \u2013 Structure of TL security header <\/td>\n<\/tr>\n
198<\/td>\nTable 57 \u2013 Structure of the TPDU nonce
Table 58 \u2013 Structure of 32-bit nominal TAI time <\/td>\n<\/tr>\n
202<\/td>\n7.4 The join process <\/td>\n<\/tr>\n
207<\/td>\nFigure 44 \u2013 Example: Overview of the symmetric key join process
Figure 45 \u2013 Example: Overview of the symmetric key join process of backbone device <\/td>\n<\/tr>\n
209<\/td>\nTable 59 \u2013 Proxy_Security_Sym_Join method <\/td>\n<\/tr>\n
210<\/td>\nTable 60 \u2013 Security_Sym_Join method
Table 61 \u2013 Security_Confirm method <\/td>\n<\/tr>\n
211<\/td>\nTable 62 \u2013 Security_Sym_Join_Request data structure <\/td>\n<\/tr>\n
212<\/td>\nTable 63 \u2013 Security_Sym_Join_Response data structure <\/td>\n<\/tr>\n
213<\/td>\nTable 64 \u2013 Structure of compressed Security level field <\/td>\n<\/tr>\n
214<\/td>\nTable 65 \u2013 Master key security level
Table 66 \u2013 Structure of KeyHardLifeSpan field <\/td>\n<\/tr>\n
215<\/td>\nTable 67 \u2013 Security_Sym_Confirm data structure <\/td>\n<\/tr>\n
216<\/td>\nTable 68 \u2013 Implicit certificate format <\/td>\n<\/tr>\n
217<\/td>\nFigure 46 \u2013 Asymmetric key-authenticated key agreement scheme
Table 69 \u2013 Usage_Serial structure <\/td>\n<\/tr>\n
220<\/td>\nFigure 47 \u2013 Example: Overview of the asymmetric key join processfor a device with a data link layer <\/td>\n<\/tr>\n
221<\/td>\nFigure 48 \u2013 Example: Overview of the asymmetric key join processof a backbone device <\/td>\n<\/tr>\n
222<\/td>\nTable 70 \u2013 Proxy_Security_Pub_Join method
Table 71 \u2013 Security_Pub_Join method <\/td>\n<\/tr>\n
223<\/td>\nTable 72 \u2013 Proxy_Security_Pub_Confirm method <\/td>\n<\/tr>\n
224<\/td>\nTable 73 \u2013 Security_Pub_Confirm method
Table 74 \u2013 Network_Information_Confirmation method <\/td>\n<\/tr>\n
225<\/td>\nTable 75 \u2013 Format of asymmetric join request internal structure
Table 76 \u2013 Format of the protocol control field <\/td>\n<\/tr>\n
226<\/td>\nTable 77 \u2013 Format of asymmetric join response internal structure <\/td>\n<\/tr>\n
227<\/td>\nTable 78 \u2013 Format of first join confirmation internal structure <\/td>\n<\/tr>\n
228<\/td>\nTable 79 \u2013 Format of join confirmation response internal structure <\/td>\n<\/tr>\n
230<\/td>\nFigure 49 \u2013 Device state transitions for join process and device lifetime
Table 80 \u2013 Join process and device lifetime state machine <\/td>\n<\/tr>\n
231<\/td>\n7.5 Session establishment
Figure 50 \u2013 High-level example of session establishment <\/td>\n<\/tr>\n
233<\/td>\nTable 81 \u2013 Security_New_Session method <\/td>\n<\/tr>\n
234<\/td>\nTable 82 \u2013 Security_New_Session_Request data structure <\/td>\n<\/tr>\n
236<\/td>\nTable 83 \u2013 Security_New_Session_Response data structure <\/td>\n<\/tr>\n
237<\/td>\n7.6 Key update
Figure 51 \u2013 Key update protocol overview <\/td>\n<\/tr>\n
238<\/td>\nTable 84 \u2013 New_Key method <\/td>\n<\/tr>\n
239<\/td>\nTable 85 \u2013 Security_Key_and_Policies data structure <\/td>\n<\/tr>\n
241<\/td>\nTable 86 \u2013 Security_Key_Update_Status data structure <\/td>\n<\/tr>\n
243<\/td>\nTable 87 \u2013 Session and DL key state transition <\/td>\n<\/tr>\n
244<\/td>\n7.7 Security manager functionality
Figure 52 \u2013 Device session establishment and key update state transition
Table 88 \u2013 Attributes of PSMO in the system manager <\/td>\n<\/tr>\n
246<\/td>\n7.8 Security policies <\/td>\n<\/tr>\n
247<\/td>\nTable 89 \u2013 Structure of Policy field
Table 90 \u2013 Key types
Table 91 \u2013 Key usage <\/td>\n<\/tr>\n
248<\/td>\nTable 92 \u2013 Granularity <\/td>\n<\/tr>\n
249<\/td>\n7.9 Security functions available to the application layer <\/td>\n<\/tr>\n
252<\/td>\n7.10 Security statistics collection, threat detection, and reporting
7.11 Device security management object functionality <\/td>\n<\/tr>\n
253<\/td>\nTable 93 \u2013 Device security management object attributes <\/td>\n<\/tr>\n
255<\/td>\nTable 94 \u2013 KeyDescriptor (INFORMATIVE) <\/td>\n<\/tr>\n
256<\/td>\nTable 95 \u2013 TL KeyLookupData OctetString fields <\/td>\n<\/tr>\n
257<\/td>\nTable 96 \u2013 Delete key method <\/td>\n<\/tr>\n
259<\/td>\nTable 97 \u2013 Key_Policy_Update method <\/td>\n<\/tr>\n
260<\/td>\n8 Physical layer
8.1 General
Table 98 \u2013 DSMO Alerts <\/td>\n<\/tr>\n
261<\/td>\n8.2 Default physical layer
Table 99 \u2013 Timing requirements <\/td>\n<\/tr>\n
262<\/td>\n9 Data link layer
9.1 General <\/td>\n<\/tr>\n
264<\/td>\nFigure 53 \u2013 DL protocol suite and PPDU\/DPDU structure <\/td>\n<\/tr>\n
266<\/td>\nFigure 54 \u2013 Graph routing example <\/td>\n<\/tr>\n
267<\/td>\nTable 100 \u2013 Graph table on ND20
Table 101 \u2013 Graph table on ND21 <\/td>\n<\/tr>\n
268<\/td>\nFigure\u00a055 \u2013 Inbound and outbound graphs <\/td>\n<\/tr>\n
272<\/td>\nFigure 56 \u2013 Slotted hopping
Figure 57 \u2013 Slow hopping <\/td>\n<\/tr>\n
273<\/td>\nFigure 58 \u2013 Hybrid operation <\/td>\n<\/tr>\n
274<\/td>\nFigure 59 \u2013 Radio spectrum usage <\/td>\n<\/tr>\n
276<\/td>\nFigure 60 \u2013 Default hopping pattern 1
Figure 61 \u2013 Two groups of devices with different hopping pattern offsets <\/td>\n<\/tr>\n
277<\/td>\nFigure 62 \u2013 Interleaved hopping pattern 1 with 16 different hopping pattern offsets <\/td>\n<\/tr>\n
278<\/td>\nFigure 63 \u2013 Slotted hopping <\/td>\n<\/tr>\n
279<\/td>\nFigure 64 \u2013 Slow hopping <\/td>\n<\/tr>\n
280<\/td>\nFigure 65 \u2013 Hybrid mode with slotted and slow hopping
Figure 66 \u2013 Combining slotted hopping and slow hopping <\/td>\n<\/tr>\n
281<\/td>\nFigure 67 \u2013 Example of a three-timeslot superframe
Figure 68 \u2013 Superframes and links <\/td>\n<\/tr>\n
282<\/td>\nFigure 69 \u2013 Multiple superframes, with timeslots aligned <\/td>\n<\/tr>\n
286<\/td>\nFigure 70 \u2013 Slotted hopping <\/td>\n<\/tr>\n
287<\/td>\nFigure 71 \u2013 Slow hopping
Figure 72 \u2013 Components of a slow hop <\/td>\n<\/tr>\n
288<\/td>\nFigure 73 \u2013 Avoiding collisions among routers <\/td>\n<\/tr>\n
289<\/td>\nFigure 74 \u2013 Hybrid configuration <\/td>\n<\/tr>\n
291<\/td>\nFigure 75 \u2013 Timeslot allocation and the message queue <\/td>\n<\/tr>\n
294<\/td>\nFigure 76 \u2013 250\u00a0ms alignment intervals <\/td>\n<\/tr>\n
295<\/td>\nFigure 77 \u2013 Timeslot durations and timing <\/td>\n<\/tr>\n
296<\/td>\nTable 102 \u2013 Approximating nominal timing with 32\u00a0kHz clock (INFORMATIVE) <\/td>\n<\/tr>\n
300<\/td>\nFigure 78 \u2013 Clock source acknowledges receipt of DPDU <\/td>\n<\/tr>\n
302<\/td>\nFigure 79 \u2013 Transaction timing attributes <\/td>\n<\/tr>\n
303<\/td>\nFigure 80 \u2013 Dedicated and shared transaction timeslots <\/td>\n<\/tr>\n
304<\/td>\nFigure 81 \u2013 Unicast transaction <\/td>\n<\/tr>\n
306<\/td>\nFigure 82 \u2013 PDU wait time (PWT) <\/td>\n<\/tr>\n
307<\/td>\nFigure 83 \u2013 Duocast support in the standard <\/td>\n<\/tr>\n
308<\/td>\nFigure 84 \u2013 Duocast transaction <\/td>\n<\/tr>\n
309<\/td>\nFigure 85 \u2013 Shared timeslots with CSMA-CA <\/td>\n<\/tr>\n
310<\/td>\nFigure 86 \u2013 Transaction during slow-hopping periods <\/td>\n<\/tr>\n
313<\/td>\nFigure 87 \u2013 DL management SAP flow through standard protocol suite <\/td>\n<\/tr>\n
322<\/td>\nTable 103 \u2013 DL_Config_Info structure <\/td>\n<\/tr>\n
328<\/td>\n9.2 Data link layer data service access point <\/td>\n<\/tr>\n
329<\/td>\nTable 104 \u2013 DDData.request parameters <\/td>\n<\/tr>\n
330<\/td>\nTable 105 \u2013 DDData.confirm parameters
Table 106 \u2013 Value set for status parameter <\/td>\n<\/tr>\n
331<\/td>\n9.3 Data frames and acknowledgements
Figure 88 \u2013 PPDU and DPDU structure
Table 107 \u2013 DDData.indication parameters <\/td>\n<\/tr>\n
333<\/td>\nTable 108 \u2013 ExtDLUint, one-octet variant
Table 109 \u2013 ExtDLUint, two-octet variant <\/td>\n<\/tr>\n
334<\/td>\nTable 110 \u2013 Data frame MHR <\/td>\n<\/tr>\n
335<\/td>\nTable 111 \u2013 DHDR frame control octet
Table 112 \u2013 Data frame DMXHR <\/td>\n<\/tr>\n
336<\/td>\nTable 113 \u2013 DROUT structure, compressed variant <\/td>\n<\/tr>\n
337<\/td>\nTable 114 \u2013 DROUT structure, uncompressed variant <\/td>\n<\/tr>\n
338<\/td>\nTable 115 \u2013 DADDR structure <\/td>\n<\/tr>\n
339<\/td>\nFigure 89 \u2013 Typical acknowledgement frame layout
Table 116 \u2013 Acknowledgement frame MHR <\/td>\n<\/tr>\n
340<\/td>\nTable 117 \u2013 Acknowledgement frame DHR <\/td>\n<\/tr>\n
341<\/td>\nTable 118 \u2013 DHR ACK\/NACK frame control <\/td>\n<\/tr>\n
342<\/td>\nTable 119 \u2013 Advertisement DAUX structure <\/td>\n<\/tr>\n
343<\/td>\nTable 120 \u2013 Advertisement selections elements
Table 121 \u2013 Advertisement selections
Table 122 \u2013 Advertisement time synchronization elements <\/td>\n<\/tr>\n
344<\/td>\nTable 123 \u2013 Advertisement time synchronization structure <\/td>\n<\/tr>\n
345<\/td>\nTable 124 \u2013 Join superframe information subfields
Table 125 \u2013 Join superframe information structure <\/td>\n<\/tr>\n
346<\/td>\nTable 126 \u2013 Superframe derived from advertisement
Table 127 \u2013 Join information elements <\/td>\n<\/tr>\n
347<\/td>\nTable 128 \u2013 Join information structure <\/td>\n<\/tr>\n
348<\/td>\nTable 129 \u2013 Defaults for links created from advertisements <\/td>\n<\/tr>\n
349<\/td>\nTable 130 \u2013 dlmo.Neighbor entry created from advertisements
Table 131 \u2013 dlmo.Graph entry created from advertisements
Table 132 \u2013 dlmo.Route entry created from advertisements <\/td>\n<\/tr>\n
351<\/td>\nTable 133 \u2013 Solicitation header subfields
Table 134 \u2013 Solicitation header structure
Table 135 \u2013 Solicitation DAUX fields <\/td>\n<\/tr>\n
352<\/td>\nTable 136 \u2013 Solicitation DAUX structure <\/td>\n<\/tr>\n
353<\/td>\nTable 137 \u2013 Activate link DAUX fields
Table 138 \u2013 Activate link DAUX structure <\/td>\n<\/tr>\n
354<\/td>\n9.4 Data link layer management information base
Table 139 \u2013 Reporting received signal quality DAUX fields
Table 140 \u2013 Report received signal quality DAUX structure <\/td>\n<\/tr>\n
355<\/td>\nTable 141 \u2013 DLMO attributes <\/td>\n<\/tr>\n
363<\/td>\nTable 142 \u2013 Subnet filter octets
Table 143 \u2013 dlmo.TaiAdjust OctetString fields
Table 144 \u2013 dlmo.TaiAdjust OctetString structure <\/td>\n<\/tr>\n
364<\/td>\nTable 145 \u2013 dlmo.EnergyDesign OctetString fields
Table 146 \u2013 dlmo.EnergyDesign OctetString structure
Table 147 \u2013 dlmo.DeviceCapability OctetString fields <\/td>\n<\/tr>\n
365<\/td>\nTable 148 \u2013 dlmo.DeviceCapability OctetString structure <\/td>\n<\/tr>\n
366<\/td>\nTable 149 \u2013 dlmo.DiscoveryAlert fields
Table 150 \u2013 dlmo.DiscoveryAlert structure <\/td>\n<\/tr>\n
367<\/td>\nTable 151 \u2013 dlmo.Candidates OctetString fields <\/td>\n<\/tr>\n
368<\/td>\nTable 152 \u2013 dlmo.Candidates structure <\/td>\n<\/tr>\n
369<\/td>\nTable 153 \u2013 dlmo.SmoothFactors OctetString fields
Table 154 \u2013 dlmo.SmoothFactors structure
Table 155 \u2013 dlmo.QueuePriority fields <\/td>\n<\/tr>\n
370<\/td>\nTable 156 \u2013 dlmo.QueuePriority structure <\/td>\n<\/tr>\n
371<\/td>\nTable 157 \u2013 dlmo.ChannelDiag fields
Table 158 \u2013 dlmo.ChannelDiag structure <\/td>\n<\/tr>\n
372<\/td>\nFigure 90 \u2013 Relationship among DLMO indexed attributes <\/td>\n<\/tr>\n
373<\/td>\nTable 159 \u2013 dlmo.Ch fields
Table 160 \u2013 dlmo.Ch structure <\/td>\n<\/tr>\n
376<\/td>\nTable 161 \u2013 Receive template fields
Table 162 \u2013 Receive template structure <\/td>\n<\/tr>\n
377<\/td>\nTable 163 \u2013 Transmit template fields
Table 164 \u2013 Transmit template structure <\/td>\n<\/tr>\n
378<\/td>\nTable 165 \u2013 Default receive template
Table 166 \u2013 Default transmit template
Table 167 \u2013 Default receive template for scanning <\/td>\n<\/tr>\n
380<\/td>\nTable 168 \u2013 dlmo.Neighbor fields
Table 169 \u2013 dlmo.Neighbor structure <\/td>\n<\/tr>\n
382<\/td>\nTable 170 \u2013 ExtendGraph fields
Table 171 \u2013 ExtGraph structure
Table 172 \u2013 dlmo.NeighborDiagReset fields <\/td>\n<\/tr>\n
383<\/td>\nTable 173 \u2013 dlmo.NeighborDiagReset structure <\/td>\n<\/tr>\n
384<\/td>\nTable 174 \u2013 dlmo.Superframe fields
Table 175 \u2013 dlmo.Superframe structure <\/td>\n<\/tr>\n
388<\/td>\nTable 176 \u2013dlmo.SuperframeIdle fields
Table 177 \u2013 dlmo.SuperframeIdle structure <\/td>\n<\/tr>\n
389<\/td>\nTable 178 \u2013 dlmo.Graph
Table 179 \u2013 dlmo.Graph structure <\/td>\n<\/tr>\n
390<\/td>\nTable 180 \u2013 dlmo.Link fields <\/td>\n<\/tr>\n
391<\/td>\nTable 181 \u2013 dlmo.Link structure <\/td>\n<\/tr>\n
392<\/td>\nTable 182 \u2013 dlmo.Link[].Type structure <\/td>\n<\/tr>\n
393<\/td>\nTable 183 \u2013 Allowed dlmo.Link[].Type combinations <\/td>\n<\/tr>\n
394<\/td>\nTable 184 \u2013 Values for dlmo.Link[].Schedule
Table 185 \u2013 dlmo.Route fields <\/td>\n<\/tr>\n
395<\/td>\nTable 186 \u2013 dlmo.Route structure <\/td>\n<\/tr>\n
396<\/td>\nTable 187 \u2013 dlmo.NeighborDiag fields
Table 188 \u2013 Diagnostic Summary OctetString fields <\/td>\n<\/tr>\n
397<\/td>\nTable 189 \u2013 Diagnostic Summary OctetString structure
Table 190 \u2013 Diagnostic ClockDetail OctetString fields <\/td>\n<\/tr>\n
398<\/td>\n9.5 Data link layer methods
Table 191 \u2013 Diagnostic ClockDetail OctetString structure <\/td>\n<\/tr>\n
399<\/td>\nTable 192 \u2013 Read_Row method
Table 193 \u2013 Write_Row method <\/td>\n<\/tr>\n
400<\/td>\n9.6 Data link layer alerts
Table 194 \u2013 Write_Row_Now method <\/td>\n<\/tr>\n
401<\/td>\nTable 195 \u2013 dlmo.AlertPolicy fields
Table 196 \u2013 dlmo.AlertPolicy OctetString structure <\/td>\n<\/tr>\n
402<\/td>\nTable 197 \u2013 DL_Connectivity alert
Table 198 \u2013 DL_Connectivity alert OctetString <\/td>\n<\/tr>\n
403<\/td>\n10 Network layer
10.1 General
10.2 Network layer functionality overview
Table 199 \u2013 NeighborDiscovery alert <\/td>\n<\/tr>\n
404<\/td>\nTable 200 \u2013 Link local address structure <\/td>\n<\/tr>\n
405<\/td>\nTable 201 \u2013 Address translation table (ATT) <\/td>\n<\/tr>\n
406<\/td>\nFigure 91 \u2013 Address translation process <\/td>\n<\/tr>\n
408<\/td>\nFigure 92 \u2013 Fragmentation process <\/td>\n<\/tr>\n
409<\/td>\nFigure 93 \u2013 Reassembly process <\/td>\n<\/tr>\n
410<\/td>\nTable 202 \u2013 Example of a routing table <\/td>\n<\/tr>\n
411<\/td>\nFigure 94 \u2013 Processing of a NSDU received from the transport layer <\/td>\n<\/tr>\n
412<\/td>\nFigure 95 \u2013 Processing of an incoming NPDU <\/td>\n<\/tr>\n
413<\/td>\nFigure 96 \u2013 Processing of a NPDU received from the backbone <\/td>\n<\/tr>\n
414<\/td>\nFigure 97 \u2013 Delivery of an incoming NPDU at its final destination
Figure 98 \u2013 Routing from a field device to a gateway on field \u2013 no backbone routing <\/td>\n<\/tr>\n
415<\/td>\nFigure 99 \u2013 Protocol suite diagram for routing from a field device to a gateway on field \u2013 no backbone routing <\/td>\n<\/tr>\n
416<\/td>\nFigure 100 \u2013 Routing a PDU from a field device to a gateway via a backbone router
Figure 101 \u2013 Protocol suite diagram for routing a PDU from a field deviceto a gateway via a backbone router <\/td>\n<\/tr>\n
418<\/td>\nFigure 102 \u2013 Routing from a field device on one subnet to another field deviceon a different subnet <\/td>\n<\/tr>\n
419<\/td>\nFigure 103 \u2013 Protocol suite diagram for routing from an I\/O deviceon one subnet to another I\/O device on a different subnet <\/td>\n<\/tr>\n
420<\/td>\nFigure 104 \u2013 Routing over an Ethernet backbone network <\/td>\n<\/tr>\n
421<\/td>\n10.3 Network layer data services
Figure 105 \u2013 Routing over a fieldbus backbone network <\/td>\n<\/tr>\n
422<\/td>\nTable 203 \u2013 NData.request elements
Table 204 \u2013 NData.confirm elements <\/td>\n<\/tr>\n
423<\/td>\nTable 205 \u2013 NData.indication elements <\/td>\n<\/tr>\n
424<\/td>\n10.4 Network layer management object <\/td>\n<\/tr>\n
425<\/td>\nTable 206 \u2013 NLMO attributes <\/td>\n<\/tr>\n
428<\/td>\nTable 207 \u2013 Contract table structure <\/td>\n<\/tr>\n
429<\/td>\nTable 208 \u2013 Route table elements
Table 209 \u2013 Address translation table structure <\/td>\n<\/tr>\n
431<\/td>\nTable 210 \u2013 NLMO structured MIB manipulation methods <\/td>\n<\/tr>\n
432<\/td>\n10.5 Network layer protocol data unit formats
Table 211 \u2013 Alert to indicate dropped PDU\/PDU error <\/td>\n<\/tr>\n
433<\/td>\nFigure 106 \u2013 Distinguishing between NPDU header formats
Table 212 \u2013 Common header patterns <\/td>\n<\/tr>\n
434<\/td>\nTable 213 \u2013 Basic network layer header format <\/td>\n<\/tr>\n
435<\/td>\nTable 214 \u2013 Contract-enabled network layer header format <\/td>\n<\/tr>\n
436<\/td>\nTable 215 \u2013 6LoWPAN_IPHC encoding format <\/td>\n<\/tr>\n
437<\/td>\nTable 216 \u2013 IPv6 network layer header format <\/td>\n<\/tr>\n
438<\/td>\nTable 217 \u2013 Full network layer header in the DL
Table 218 \u2013 Network layer header format for fragmented NPDUs <\/td>\n<\/tr>\n
439<\/td>\n11 Transport layer
11.1 General
Table 219 \u2013 First fragment header format
Table 220 \u2013 Second and subsequent fragment header format <\/td>\n<\/tr>\n
440<\/td>\n11.2 Transport layer reference model
Figure 107 \u2013 Transport layer reference model <\/td>\n<\/tr>\n
441<\/td>\n11.3 Transport security sub-layer
11.4 Transport data entity <\/td>\n<\/tr>\n
442<\/td>\nFigure 108 \u2013 UDP \u201cpseudo-header\u201d for IPv6
Table 221 \u2013 UDP header encoding <\/td>\n<\/tr>\n
445<\/td>\n11.5 Transport layer protocol data unit encoding
Figure 109 \u2013 Transport layer protocol data unit <\/td>\n<\/tr>\n
446<\/td>\nTable 222 \u2013 UDP LowPAN_NHC encoding
Table 223 \u2013 Optimal UDP header encoding <\/td>\n<\/tr>\n
447<\/td>\n11.6 Transport layer model
Table 224 \u2013 UDP header encoding with checksum <\/td>\n<\/tr>\n
448<\/td>\nTable 225 \u2013 TData.request elements <\/td>\n<\/tr>\n
449<\/td>\nTable 226 \u2013 TData.confirm elements
Table 227 \u2013 TData.confirm status codes <\/td>\n<\/tr>\n
450<\/td>\nTable 228 \u2013 TData.indication elements <\/td>\n<\/tr>\n
452<\/td>\nTable 229 \u2013 TLMO attributes <\/td>\n<\/tr>\n
454<\/td>\nTable 230 \u2013 Transport layer management object methods \u2013 Reset
Table 231 \u2013 Transport layer management object methods \u2013 Halt <\/td>\n<\/tr>\n
455<\/td>\nTable 232 \u2013 Transport layer management object methods \u2013 PortRangeInfo
Table 233 \u2013 Transport layer management object methods \u2013 GetPortInfo <\/td>\n<\/tr>\n
456<\/td>\nTable 234 \u2013 Transport layer management object methods \u2013 GetNextPortInfo
Table 235 \u2013 Transport layer management object alert types \u2013 Illegal use of port <\/td>\n<\/tr>\n
457<\/td>\n12 Application layer
12.1 General
Table 236 \u2013 Transport layer management object alert types \u2013TPDU received on unregistered port
Table 237 \u2013 Transport layer management object alert types \u2013TPDU does not match security policies <\/td>\n<\/tr>\n
458<\/td>\n12.2 Energy considerations
12.3 Legacy control system considerations <\/td>\n<\/tr>\n
459<\/td>\n12.4 Introduction to object-oriented modeling <\/td>\n<\/tr>\n
460<\/td>\nFigure 110 \u2013 User application objects in a user application process <\/td>\n<\/tr>\n
461<\/td>\n12.5 Object model <\/td>\n<\/tr>\n
462<\/td>\n12.6 Object attribute model <\/td>\n<\/tr>\n
464<\/td>\n12.7 Method model <\/td>\n<\/tr>\n
465<\/td>\n12.8 Alert model
12.9 Alarm state model
Table 238 \u2013 State table for alarm transitions <\/td>\n<\/tr>\n
466<\/td>\n12.10 Event state model
Figure 111 \u2013 Alarm state model
Table 239 \u2013 State table for event transitions <\/td>\n<\/tr>\n
467<\/td>\n12.11 Alert reporting
Figure 112 \u2013 Event model <\/td>\n<\/tr>\n
469<\/td>\n12.12 Communication interaction model <\/td>\n<\/tr>\n
472<\/td>\nFigure 113 \u2013 A successful example of multiple outstanding requests,with response concatenation <\/td>\n<\/tr>\n
473<\/td>\nFigure 114 \u2013 An example of multiple outstanding unordered requests,with second write request initially unsuccessful <\/td>\n<\/tr>\n
474<\/td>\nFigure 115 \u2013 An example of multiple outstanding ordered requests,with second write request initially unsuccessful <\/td>\n<\/tr>\n
476<\/td>\nFigure 116 \u2013 Send window example 1, with current send window smallerthan maximum send window <\/td>\n<\/tr>\n
477<\/td>\nFigure 117 \u2013 Send window example 2, with current send window the same sizeas maximum send window, and non-zero usable send window width
Figure 118 \u2013 Send window example 3, with current send window the same sizeas maximum send window, and usable send window width of zero (0) <\/td>\n<\/tr>\n
479<\/td>\n12.13 Application layer addressing
Figure 119 \u2013 General addressing model <\/td>\n<\/tr>\n
482<\/td>\n12.14 Management objects
12.15 User objects <\/td>\n<\/tr>\n
484<\/td>\nTable 240 \u2013 UAP management object attributes <\/td>\n<\/tr>\n
485<\/td>\nTable 241 \u2013 State table for UAP management object <\/td>\n<\/tr>\n
486<\/td>\nFigure 120 \u2013 UAP management object state diagram
Table 242 \u2013 UAP management object methods <\/td>\n<\/tr>\n
487<\/td>\nTable 243 \u2013 Alert receiving object attributes
Table 244 \u2013 State table for handling an AlertReport reception <\/td>\n<\/tr>\n
488<\/td>\nFigure 121 \u2013 Alert report reception state diagram
Figure 122 \u2013 Alert reporting example
Table 245 \u2013 AlertReceiving object methods <\/td>\n<\/tr>\n
490<\/td>\nTable 246 \u2013 UploadDownload object attributes <\/td>\n<\/tr>\n
494<\/td>\nTable 247 \u2013 UploadDownload object methods <\/td>\n<\/tr>\n
495<\/td>\nTable 248 \u2013 UploadDownload object StartDownload method <\/td>\n<\/tr>\n
496<\/td>\nTable 249 \u2013 UploadDownload object DownloadData method <\/td>\n<\/tr>\n
498<\/td>\nTable 250 \u2013 UploadDownload object EndDownload method <\/td>\n<\/tr>\n
499<\/td>\nTable 251 \u2013 UploadDownload object StartUpload method <\/td>\n<\/tr>\n
500<\/td>\nTable 252 \u2013 UploadDownload object UploadData method <\/td>\n<\/tr>\n
501<\/td>\nTable 253 \u2013 UploadDownload object EndUpload method <\/td>\n<\/tr>\n
503<\/td>\nTable 254 \u2013 Download state table for unicast operation mode <\/td>\n<\/tr>\n
504<\/td>\nFigure 123 \u2013 Upload\/Download object download state diagram <\/td>\n<\/tr>\n
505<\/td>\nTable 255 \u2013 Upload state table for unicast operation mode <\/td>\n<\/tr>\n
506<\/td>\nFigure 124 \u2013 Upload\/Download object upload state diagram <\/td>\n<\/tr>\n
508<\/td>\nTable 256 \u2013 Concentrator object attributes <\/td>\n<\/tr>\n
509<\/td>\nTable 257 \u2013 Concentrator object methods <\/td>\n<\/tr>\n
510<\/td>\nTable 258 \u2013 Dispersion object attributes <\/td>\n<\/tr>\n
511<\/td>\nTable 259 \u2013 Dispersion object methods <\/td>\n<\/tr>\n
512<\/td>\nTable 260 \u2013 Tunnel object attributes <\/td>\n<\/tr>\n
514<\/td>\nTable 261 \u2013 Tunnel object methods <\/td>\n<\/tr>\n
515<\/td>\n12.16 Data types
Table 262 \u2013 Interface object attributes
Table 263 \u2013 Interface object methods <\/td>\n<\/tr>\n
516<\/td>\nTable 264 \u2013 Data type: ObjectAttributeIndexAndSize <\/td>\n<\/tr>\n
517<\/td>\nTable 265 \u2013 Data type: Communication association endpoint <\/td>\n<\/tr>\n
518<\/td>\nTable 266 \u2013 Data type: Communication contract data <\/td>\n<\/tr>\n
519<\/td>\nTable 267 \u2013 Data type: Alert communication endpoint
Table 268 \u2013 Data type: Tunnel endpoint <\/td>\n<\/tr>\n
520<\/td>\nTable 269 \u2013 Data type: Alert report descriptor
Table 270 \u2013 Data type: Process control alarm report descriptor for analogwith single reference condition <\/td>\n<\/tr>\n
521<\/td>\n12.17 Application services provided by application sub-layer
Table 271 \u2013 Data type: ObjectIDandType
Table 272 \u2013 Data type: Unscheduled correspondent <\/td>\n<\/tr>\n
522<\/td>\nTable 273 \u2013 AL services <\/td>\n<\/tr>\n
524<\/td>\nFigure 125 \u2013 Publish sequence of service primitives <\/td>\n<\/tr>\n
526<\/td>\nTable 274 \u2013 Publish service <\/td>\n<\/tr>\n
529<\/td>\nFigure 126 \u2013 Client\/server model two-part interactions <\/td>\n<\/tr>\n
530<\/td>\nFigure 127 \u2013 Client\/server model four-part interactions: Successful delivery
Figure 128 \u2013 Client\/server model four-part interactions: Request delivery failure <\/td>\n<\/tr>\n
531<\/td>\nFigure 129 \u2013 Client\/server model four-part interactions: Response delivery failure <\/td>\n<\/tr>\n
533<\/td>\nTable 275 \u2013 Read service <\/td>\n<\/tr>\n
537<\/td>\nTable 276 \u2013 Write service <\/td>\n<\/tr>\n
541<\/td>\nTable 277 \u2013 Execute service <\/td>\n<\/tr>\n
545<\/td>\nFigure 130 \u2013 AlertReport and AlertAcknowledge, delivery success <\/td>\n<\/tr>\n
546<\/td>\nFigure 131 \u2013 AlertReport, delivery failure
Figure 132 \u2013 Alert Report, acknowledgment failure <\/td>\n<\/tr>\n
547<\/td>\nTable 278 \u2013 AlertReport service <\/td>\n<\/tr>\n
550<\/td>\nTable 279 \u2013 AlertAcknowledge service <\/td>\n<\/tr>\n
553<\/td>\nFigure 133 \u2013 Concatenated response for multiple outstandingwrite requests (no message loss) <\/td>\n<\/tr>\n
554<\/td>\nTable 280 \u2013 Tunnel service <\/td>\n<\/tr>\n
557<\/td>\n12.18 Application layer flow use to lower layer services
Table 281 \u2013 Application flow characteristics <\/td>\n<\/tr>\n
558<\/td>\n12.19 Application layer management
Table 282 \u2013 Application service primitive to transport service primitive mapping <\/td>\n<\/tr>\n
559<\/td>\nFigure 134 \u2013 Management and handling of malformed APDUs received from device X <\/td>\n<\/tr>\n
560<\/td>\nTable 283 \u2013 ASLMO attributes <\/td>\n<\/tr>\n
561<\/td>\nTable 284 \u2013 Application sub-layer management object methods <\/td>\n<\/tr>\n
562<\/td>\nTable 285 \u2013Reset method <\/td>\n<\/tr>\n
563<\/td>\nTable 286 \u2013 ASLMO alerts <\/td>\n<\/tr>\n
566<\/td>\nTable 287 \u2013 Analog input object attributes <\/td>\n<\/tr>\n
567<\/td>\nTable 288 \u2013 Analog input object methods <\/td>\n<\/tr>\n
568<\/td>\nTable 289 \u2013 Analog input alerts <\/td>\n<\/tr>\n
569<\/td>\nTable 290 \u2013 Analog output attributes <\/td>\n<\/tr>\n
570<\/td>\nTable 291 \u2013 Analog output object methods <\/td>\n<\/tr>\n
571<\/td>\nTable 292 \u2013 Analog output alerts <\/td>\n<\/tr>\n
573<\/td>\nTable 293 \u2013 Binary input object attributes <\/td>\n<\/tr>\n
574<\/td>\nTable 294 \u2013 Binary input object methods
Table 295 \u2013 Binary input alerts <\/td>\n<\/tr>\n
575<\/td>\nTable 296 \u2013 Binary output attributes <\/td>\n<\/tr>\n
576<\/td>\nTable 297 \u2013 Binary output object methods
Table 298 \u2013 Binary output alerts <\/td>\n<\/tr>\n
577<\/td>\n12.20 Process control industry standard data structures <\/td>\n<\/tr>\n
578<\/td>\nTable 299 \u2013 Status octet
Table 300 \u2013 Data type: Process value and status for analog value <\/td>\n<\/tr>\n
579<\/td>\nTable 301 \u2013 Data type: Process value and status for binary value
Table 302 \u2013 Data type: Process control mode <\/td>\n<\/tr>\n
580<\/td>\n12.21 Additional tables
Table 303 \u2013 Data type: Process control mode bitstring
Table 304 \u2013 Data type: Process control scaling <\/td>\n<\/tr>\n
581<\/td>\n12.22 Coding
Table 305 \u2013 Process control standard objects
Table 306 \u2013 Services <\/td>\n<\/tr>\n
582<\/td>\nTable 307 \u2013 Application messaging format
Table 308 \u2013 Concatenated APDUs in a single TSDU
Table 309 \u2013 Object addressing <\/td>\n<\/tr>\n
583<\/td>\nTable 310 \u2013 Four-bit addressing mode APDU header construction
Table 311 \u2013 Eight-bit addressing mode APDU header construction
Table 312 \u2013 Sixteen-bit addressing mode APDU header construction <\/td>\n<\/tr>\n
584<\/td>\nTable 313 \u2013 Inferred addressing use case example
Table 314 \u2013 Inferred addressing mode APDU header construction <\/td>\n<\/tr>\n
585<\/td>\nTable 315 \u2013 Six-bit attribute identifier, not indexed
Table 316 \u2013 Six-bit attribute identifier, singly indexed, with seven-bit index
Table 317 \u2013 Six-bit attribute identifier, singly indexed, with fifteen-bit index
Table 318 \u2013 Six-bit attribute identifier, doubly indexed, with two seven-bit indices <\/td>\n<\/tr>\n
586<\/td>\nTable 319 \u2013 Six-bit attribute identifier, doubly indexed, with two fifteen-bit indices
Table 320 \u2013 Six-bit attribute identifier, doubly indexed,with first index seven-bits long and second index fifteen bits long
Table 321 \u2013 Six-bit attribute bit attribute identifier, doubly indexed,with first index fifteen bits long and second index seven bits long
Table 322 \u2013 Twelve-bit attribute identifier, not indexed <\/td>\n<\/tr>\n
587<\/td>\nTable 323 \u2013 Twelve-bit attribute identifier, singly indexed with seven-bit index
Table 324 \u2013 Twelve-bit attribute identifier, singly indexed with fifteen bit identifier
Table 325 \u2013 Twelve-bit attribute identifier, doubly indexed with two seven bit indices
Table 326 \u2013 Twelve-bit attribute identifier, doubly indexed with two fifteen bit indices
Table 327 \u2013 Twelve-bit attribute identifier, doubly indexed with first index seven-bits long and second index fifteen-bits long <\/td>\n<\/tr>\n
588<\/td>\nTable 328 \u2013 Twelve-bit attribute identifier, doubly indexed with the first index fifteen bits long and the second index seven bits long
Table 329 \u2013 Twelve-bit attribute identifier, reserved form
Table 330 \u2013 Coding rules for read service request
Table 331 \u2013 Coding rules for read service response with seven bit length field <\/td>\n<\/tr>\n
589<\/td>\nTable 332 \u2013 Coding rules for read service response with fifteen-bit length field
Table 333 \u2013 Coding rules for write service request with seven bit length field
Table 334 \u2013 Coding rules for write service request with fifteen-bit length field
Table 335 \u2013 Coding rules for write service response <\/td>\n<\/tr>\n
590<\/td>\nTable 336 \u2013 Coding rules for execute service request with seven-bit length field
Table 337 \u2013 Coding rules for execute service request with fifteen-bit length field
Table 338 \u2013 Coding rules for execute service response with 7-bit length field
Table 339 \u2013 Coding rules for execute service response with 15-bit length field <\/td>\n<\/tr>\n
591<\/td>\nTable 340 \u2013 Coding rules for tunnel service request with seven-bit length field
Table 341 \u2013 Coding rules for tunnel service request with fifteen-bit length field
Table 342 \u2013 Coding rules for tunnel service response with seven-bit length field
Table 343 \u2013 Coding rules for tunnel service response with fifteen-bit length field <\/td>\n<\/tr>\n
592<\/td>\nTable 344 \u2013 Coding rules for AlertReport service with seven bit length field
Table 345 \u2013 Coding rules for AlertReport service with fifteen-bit length field
Table 346 \u2013 Coding rules for AlertAcknowledge service <\/td>\n<\/tr>\n
593<\/td>\nTable 347 \u2013 Coding rules for publish service for a native sequence of values
Table 348 \u2013 Coding rules for publish service \u2013 non-native (for tunnel support)
Table 349 \u2013 Coding rules for concatenate service
Table 350 \u2013 General coding rule for size-invariant application data <\/td>\n<\/tr>\n
594<\/td>\nTable 351 \u2013 Coding rules for application data of varying size
Table 352 \u2013 Coding rules for Boolean data \u2013 true
Table 353 \u2013 Coding rules for Boolean data \u2013 false <\/td>\n<\/tr>\n
595<\/td>\nTable 354 \u2013 Coding rules for Unsigned8
Table 355 \u2013 Coding rules for Unsigned16 <\/td>\n<\/tr>\n
596<\/td>\nTable 356 \u2013 Coding rules for Unsigned32
Table 357 \u2013 Coding rules for Unsigned64 <\/td>\n<\/tr>\n
597<\/td>\nTable 358 \u2013 Coding rules for Unsigned128
Table 359 \u2013 Coding rules for Float <\/td>\n<\/tr>\n
598<\/td>\nTable 360 \u2013 Coding rules for double-precision float
Table 361 \u2013 Coding rules for VisibleString
Table 362 \u2013 Coding rules for OctetString <\/td>\n<\/tr>\n
599<\/td>\nTable 363 \u2013 Coding rules for Bitstring
Table 364 \u2013 Example of coding for Bitstring of size 8 <\/td>\n<\/tr>\n
600<\/td>\nTable 365 \u2013 Coding rules for TAITimeDifference
Table 366 \u2013 Coding rules for TAINetworkTimeValue
Table 367 \u2013 Coding rules for TAITimeRounded <\/td>\n<\/tr>\n
602<\/td>\n12.23 Syntax <\/td>\n<\/tr>\n
615<\/td>\n12.24 Detailed coding examples (INFORMATIVE)
Table 368 \u2013 Coding example: Read request for a non-indexed attribute <\/td>\n<\/tr>\n
616<\/td>\n13 Gateway
13.1 General
Table 369 \u2013 Coding example: Read response (corresponding to request containedin the preceding table)
Table 370 \u2013 Coding example: Tunnel service request <\/td>\n<\/tr>\n
618<\/td>\nFigure 135 \u2013 Gateway scenarios <\/td>\n<\/tr>\n
619<\/td>\nFigure 136 \u2013 Basic gateway model <\/td>\n<\/tr>\n
620<\/td>\n13.2 Service access point <\/td>\n<\/tr>\n
621<\/td>\nTable 371 \u2013 Summary of gateway high side interface services <\/td>\n<\/tr>\n
622<\/td>\nFigure 137 \u2013 Sequence of primitives for session service
Figure 138 \u2013 Sequence of primitives for lease management service <\/td>\n<\/tr>\n
623<\/td>\nFigure 139 \u2013 Sequence of primitives for system report services
Figure 140 \u2013 Sequence of primitives for time service <\/td>\n<\/tr>\n
624<\/td>\nFigure 141 \u2013 Sequence of primitives for client\/server service initiated from gateway
Figure 142 \u2013 Sequence of primitives for publish service initiated from gateway <\/td>\n<\/tr>\n
625<\/td>\nFigure 143 \u2013 Sequence of primitives for subscribe service initiated from device
Figure 144 \u2013 Sequence of primitives for publisher timer initiated from gateway
Figure 145 \u2013 Sequence of primitives for subscriber timers initiated from device <\/td>\n<\/tr>\n
626<\/td>\nFigure 146 \u2013 Sequence of primitives for the bulk transfer service
Figure 147 \u2013 Sequence of primitives for the alert subscription service <\/td>\n<\/tr>\n
627<\/td>\nFigure 148 \u2013 Sequence of primitives for the alert notification service
Figure 149 \u2013 Sequence of primitives for gateway management services <\/td>\n<\/tr>\n
630<\/td>\nTable 372 \u2013 Primitive G_Session parameter usage <\/td>\n<\/tr>\n
631<\/td>\nTable 373 \u2013 GS_Status for G_Session confirm <\/td>\n<\/tr>\n
632<\/td>\nTable 374 \u2013 Primitive G_Lease parameter usage <\/td>\n<\/tr>\n
633<\/td>\nTable 375 \u2013 GS_Lease_Type for G_Lease request <\/td>\n<\/tr>\n
634<\/td>\nTable 376 \u2013 GS_Status for G_Lease confirm <\/td>\n<\/tr>\n
635<\/td>\nTable 377 \u2013 Primitive G_Device_List_Report parameter usage <\/td>\n<\/tr>\n
636<\/td>\nTable 378 \u2013 GS_Status for G_Device_List_Report confirm
Table 379 \u2013 Primitive G_Topology_Report parameter usage <\/td>\n<\/tr>\n
637<\/td>\nTable 380 \u2013 GS_Status for G_Topology_Report confirm <\/td>\n<\/tr>\n
638<\/td>\nTable 381 \u2013 Primitive G_Schedule_Report parameter usage <\/td>\n<\/tr>\n
639<\/td>\nTable 382 \u2013 GS_Status for G_Schedule_Report confirm <\/td>\n<\/tr>\n
640<\/td>\nTable 383 \u2013 Primitive G_Device_Health_Report parameter usage
Table 384 \u2013 GS_Status for G_Device_Health_Report confirm <\/td>\n<\/tr>\n
641<\/td>\nTable 385 \u2013 Primitive G_Neighbor_Health_Report parameter usage <\/td>\n<\/tr>\n
642<\/td>\nTable 386 \u2013 GS_Status for G_Device_Health_Report confirm <\/td>\n<\/tr>\n
643<\/td>\nTable 387 \u2013 Primitive G_Network_Health_Report parameter usage <\/td>\n<\/tr>\n
644<\/td>\nTable 388 \u2013 GS_Status for G_Network_Health_Report confirm <\/td>\n<\/tr>\n
645<\/td>\nTable 389 \u2013 Primitive G_Time parameter usage
Table 390 \u2013 GS_Status for G_Time confirm <\/td>\n<\/tr>\n
646<\/td>\nTable 391 \u2013 Primitive G_Client_Server parameter usage <\/td>\n<\/tr>\n
647<\/td>\nTable 392 \u2013 GS_Status for G_Client_Server confirm <\/td>\n<\/tr>\n
649<\/td>\nTable 393 \u2013 Primitive G_Publish parameter usage <\/td>\n<\/tr>\n
650<\/td>\nTable 394 \u2013 GS_Status for G_Publish confirm
Table 395 \u2013 Primitive G_Subscribe parameter usage <\/td>\n<\/tr>\n
651<\/td>\nTable 396 \u2013 GS_Status for G_Subscribe confirm
Table 397 \u2013 Primitive G_Publish_Timer parameter usage
Table 398 \u2013 Primitive G_Subscribe_Timer parameter usage <\/td>\n<\/tr>\n
652<\/td>\nTable 399 \u2013 Primitive G_Publish_Watchdog parameter usage <\/td>\n<\/tr>\n
653<\/td>\nTable 400 \u2013 Primitive G_Bulk_Open parameter usage <\/td>\n<\/tr>\n
654<\/td>\nTable 401 \u2013 GS_Status for G_Bulk_Open confirm
Table 402 \u2013 Primitive G_Bulk_Transfer parameter usage
Table 403 \u2013 GS_Status for G_Bulk_Transfer confirm <\/td>\n<\/tr>\n
655<\/td>\nTable 404 \u2013 Primitive G_Bulk_Close parameter usage
Table 405 \u2013 GS_Status for G_Bulk_Close confirm <\/td>\n<\/tr>\n
656<\/td>\nTable 406 \u2013 Primitive G_Alert_Subscription parameter usage <\/td>\n<\/tr>\n
657<\/td>\nTable 407 \u2013 GS_Status for G_Alert_Subscription confirm
Table 408 \u2013 Primitive G_Alert_Notification parameter usage <\/td>\n<\/tr>\n
658<\/td>\nTable 409 \u2013 Primitive G_Read_Gateway_Configuration parameter usage <\/td>\n<\/tr>\n
659<\/td>\nTable 410 \u2013 GS_Attribute_Identifier values
Table 411 \u2013 GS_Status for G_Read_Gateway_Configuration confirm
Table 412 \u2013 Primitive G_Write_Gateway_Configuration parameter usage <\/td>\n<\/tr>\n
660<\/td>\nTable 413 \u2013 GS_Attribute_Identifier values
Table 414 \u2013 GS_Status for G_Write_Gateway_Configuration confirm <\/td>\n<\/tr>\n
661<\/td>\nTable 415 \u2013 Primitive G_Write_Device_Configuration parameter usage <\/td>\n<\/tr>\n
662<\/td>\nTable 416 \u2013 GS_Status for G_Write_Device_Configuration confirm
Table 417 \u2013 Primitive G_Read_Device_Configuration parameter usage <\/td>\n<\/tr>\n
663<\/td>\n13.3 Protocol
Figure 150 \u2013 Tunnel object model
Table 418 \u2013 GS_Status for G_Read_Device_Configuration confirm <\/td>\n<\/tr>\n
664<\/td>\nFigure 151 \u2013 Distributed tunnel endpoints <\/td>\n<\/tr>\n
665<\/td>\nFigure 152 \u2013 Multicast, broadcast, and one-to-many messaging <\/td>\n<\/tr>\n
666<\/td>\nFigure 153 \u2013 Tunnel object buffering <\/td>\n<\/tr>\n
669<\/td>\nFigure 154 \u2013 Publish\/subscribe publisher CoSt flowchart
Figure 155 \u2013 Publish\/subscribe publisher periodic flowchart <\/td>\n<\/tr>\n
670<\/td>\nFigure 156 \u2013 Publish\/subscribe subscriber common periodic and CoSt flowchart <\/td>\n<\/tr>\n
671<\/td>\nFigure 157 \u2013 Network address mappings <\/td>\n<\/tr>\n
672<\/td>\nFigure 158 \u2013 Connection_Info usage in protocol translation <\/td>\n<\/tr>\n
673<\/td>\nFigure 159 \u2013 Transaction_Info usage in protocol translation <\/td>\n<\/tr>\n
674<\/td>\nFigure 160 \u2013 Interoperable tunneling mechanism overview diagram <\/td>\n<\/tr>\n
676<\/td>\nFigure 161 \u2013 Bulk transfer model <\/td>\n<\/tr>\n
677<\/td>\nFigure 162 \u2013 Alert model <\/td>\n<\/tr>\n
678<\/td>\nFigure 163 \u2013 Alert cascading <\/td>\n<\/tr>\n
679<\/td>\nFigure 164 \u2013 Native P\/S and C\/S access <\/td>\n<\/tr>\n
681<\/td>\nTable 419 \u2013 UAP management object extended attributes <\/td>\n<\/tr>\n
682<\/td>\n14 Provisioning
14.1 General
14.2 Terms and definitions <\/td>\n<\/tr>\n
684<\/td>\n14.3 Provisioning procedures
14.4 Pre-installed symmetric keys <\/td>\n<\/tr>\n
685<\/td>\n14.5 Provisioning using out-of-band mechanisms
14.6 Provisioning networks <\/td>\n<\/tr>\n
686<\/td>\nFigure 165 \u2013 The provisioning network <\/td>\n<\/tr>\n
688<\/td>\n14.7 State transition diagrams
Figure 166 \u2013 State transition diagrams outlining provisioning stepsduring a device life cycle <\/td>\n<\/tr>\n
689<\/td>\nTable 420 \u2013 Factory default settings <\/td>\n<\/tr>\n
691<\/td>\nFigure 167 \u2013 State transition diagram showing various pathsto joining a secured network <\/td>\n<\/tr>\n
693<\/td>\n14.8 Device management application protocol objects for provisioning
Figure 168 \u2013 Provisioning objects and interactions <\/td>\n<\/tr>\n
694<\/td>\n14.9 Management objects <\/td>\n<\/tr>\n
695<\/td>\nTable 421 \u2013 Device provisioning object <\/td>\n<\/tr>\n
699<\/td>\n14.10 Device provisioning service object
Table 422 \u2013 Reset_To_Default method
Table 423 \u2013 Write symmetric join key method <\/td>\n<\/tr>\n
700<\/td>\nTable 424 \u2013 Device provisioning service object <\/td>\n<\/tr>\n
703<\/td>\nTable 425 \u2013 DPSOWhiteListTbl data structure <\/td>\n<\/tr>\n
705<\/td>\nTable 426 \u2013 Array manipulation table
Table 427 \u2013 DPSO alert to indicate join by a device not on the WhiteList <\/td>\n<\/tr>\n
706<\/td>\n14.11 Provisioning functions (INFORMATIVE)
Table 428 \u2013 DPSO alert to indicate inadequate device join capability <\/td>\n<\/tr>\n
710<\/td>\nAnnex A (informative) Protocol implementation conformance statement proforma
A.1 General <\/td>\n<\/tr>\n
713<\/td>\nA.2 System
Table 429 \u2013 Field media type
Table 430 \u2013 Protocol layer support <\/td>\n<\/tr>\n
714<\/td>\nTable 431 \u2013 Device PICS
Table 432 \u2013 PICS for device implementing I\/O role
Table 433 \u2013 PICS for device implementing router role
Table 434 \u2013 PICS for backbone router <\/td>\n<\/tr>\n
715<\/td>\nTable 435 \u2013 PICS for gateway
Table 436 \u2013 PICS for system manager
Table 437 \u2013 PICS for provisioning device
Table 438 \u2013 PICS for security manager
Table 439 \u2013 PICS for device implementing system time source role <\/td>\n<\/tr>\n
716<\/td>\nA.3 System management
Table 440 \u2013 System PICS <\/td>\n<\/tr>\n
717<\/td>\nTable 441 \u2013 Device PICS
Table 442 \u2013 Router and backbone router PICS <\/td>\n<\/tr>\n
718<\/td>\nTable 443 \u2013 PICS for system time source <\/td>\n<\/tr>\n
719<\/td>\nTable 444 \u2013 PICS for system manager
Table 445 \u2013 PICS for provisioning role <\/td>\n<\/tr>\n
720<\/td>\nA.4 Security manager
Table 446 \u2013 Device PICS <\/td>\n<\/tr>\n
721<\/td>\nA.5 Physical layer
Table 447 \u2013 PICS for provisioning role
Table 448 \u2013 PICS for security manager <\/td>\n<\/tr>\n
722<\/td>\nTable 449 \u2013 PhL roles
Table 450 \u2013 PhL frequency of operation
Table 451 \u2013 PhL functions <\/td>\n<\/tr>\n
723<\/td>\nA.6 Data link layer
Table 452 \u2013 PhL packet
Table 453 \u2013 DL roles
Table 454 \u2013 DL PICS for device implementing I\/O role
Table 455 \u2013 DL PICS for device implementing router role <\/td>\n<\/tr>\n
724<\/td>\nA.7 Network layer
Table 456 \u2013 DL PICS for device implementing backbone router role
Table 457 \u2013 PICS for devices implementing I\/O role <\/td>\n<\/tr>\n
725<\/td>\nTable 458 \u2013 PICS for device implementing router role
Table 459 \u2013 PICS for devices implementing backbone router role <\/td>\n<\/tr>\n
726<\/td>\nA.8 Transport layer
Table 460 \u2013 PICS for device implementing I\/O role
Table 461 \u2013 PICS for routing device
Table 462 \u2013 PICS for backbone router <\/td>\n<\/tr>\n
727<\/td>\nA.9 Application layer
Table 463 \u2013 AL implementation option
Table 464 \u2013 PICS part 2: Optional industry-independent objects <\/td>\n<\/tr>\n
728<\/td>\nTable 465 \u2013 PICS part 2: Supported standard services for I\/O device role <\/td>\n<\/tr>\n
729<\/td>\nTable 466 \u2013 PICS part 2: Supported standard services for system manager role <\/td>\n<\/tr>\n
730<\/td>\nTable 467 \u2013 PICS part 2: Supported standard services for gateway rolewhen supporting native access <\/td>\n<\/tr>\n
731<\/td>\nTable 468 \u2013 PICS part 2: Supported standard services for gateway rolewhen supporting interoperable tunneling and for adapters <\/td>\n<\/tr>\n
732<\/td>\nTable 469 \u2013 PICS part 2: Supported standard services for routing device role <\/td>\n<\/tr>\n
733<\/td>\nTable 470 \u2013 PICS part 2: Supported standard services for backbone router role <\/td>\n<\/tr>\n
734<\/td>\nTable 471 \u2013 PICS part 2: Supported standard services for provisioning role
Table 472 \u2013 PICS part 2: Supported standard services for system time source role
Table 473 \u2013 Process control conformance: Supported objects <\/td>\n<\/tr>\n
735<\/td>\nA.10 Gateway
Table 474 \u2013 Process control conformance: Supported alerts <\/td>\n<\/tr>\n
736<\/td>\nTable 475 \u2013 PICS: Gateway <\/td>\n<\/tr>\n
737<\/td>\nA.11 Provisioning <\/td>\n<\/tr>\n
738<\/td>\nTable 476 \u2013 PICS: I\/O devices, routing devices, gateways, and backbone routers
Table 477 \u2013 PICS: Provisioning devices <\/td>\n<\/tr>\n
739<\/td>\nAnnex B (normative) Role profiles
B.1 General <\/td>\n<\/tr>\n
740<\/td>\nB.2 System
B.3 System manager
Table 478 \u2013 Protocol layer device roles
Table 479 \u2013 Over-the-air upgrades <\/td>\n<\/tr>\n
741<\/td>\nB.4 Security manager
Table 480 \u2013 Session support profiles
Table 481 \u2013 Baseline profiles <\/td>\n<\/tr>\n
742<\/td>\nB.5 Physical layer
B.6 Data link layer
Table 482 \u2013 PhL roles
Table 483 \u2013 DL required for listed roles <\/td>\n<\/tr>\n
743<\/td>\nTable 484 \u2013 Role profiles: General DLMO attributes <\/td>\n<\/tr>\n
744<\/td>\nTable 485 \u2013 Role profiles: dlmo.Device_Capability <\/td>\n<\/tr>\n
745<\/td>\nTable 486 \u2013 Role profiles: dlmo.Ch (channel hopping)
Table 487 \u2013 Role profiles: dlmo.TsTemplate
Table 488 \u2013 Role profiles: dlmo.Neighbor <\/td>\n<\/tr>\n
746<\/td>\nTable 489 \u2013 Role profiles: dlmo. NeighborDiag
Table 490 \u2013 Role profiles: dlmo.Superframe
Table 491 \u2013 Role profiles: dlmo.Graph <\/td>\n<\/tr>\n
747<\/td>\nB.7 Network layer
Table 492 \u2013 Role profiles: dlmo.Link
Table 493 \u2013 Role profiles: dlmo.Route
Table 494 \u2013 Role profiles: dlmo.Queue_Priority
Table 495 \u2013 Routing table size <\/td>\n<\/tr>\n
748<\/td>\nB.8 Transport layer
B.9 Application layer
B.10 Gateway
Table 496 \u2013 Address table size
Table 497 \u2013 Port support size
Table 498 \u2013 APs
Table 499 \u2013 Role profile: Gateway <\/td>\n<\/tr>\n
749<\/td>\nB.11 Provisioning
Table 500 \u2013 Role profile: Gateway native access
Table 501 \u2013 Role profile: Gateway interoperable tunnel mechanism
Table 502 \u2013 Role profiles: I\/O, routers, gateways, and backbone routers <\/td>\n<\/tr>\n
750<\/td>\nAnnex C (informative) Background information
C.1 Industrial needs
C.2 Usage classes <\/td>\n<\/tr>\n
751<\/td>\nTable 503 \u2013 Usage classes <\/td>\n<\/tr>\n
752<\/td>\nC.3 Other uploading and downloading- alarms (human or automated action)
C.4 The open systems interconnection basic reference model <\/td>\n<\/tr>\n
753<\/td>\nFigure 169 \u2013 Basic reference model <\/td>\n<\/tr>\n
756<\/td>\nAnnex D (normative) Configuration defaults
D.1 General
D.2 System management
Table 504 \u2013 System management configuration defaults <\/td>\n<\/tr>\n
757<\/td>\nD.3 Security
D.4 Data link layer
Table 505 \u2013 Security configuration defaults <\/td>\n<\/tr>\n
758<\/td>\nD.5 Network layer
Table 506 \u2013 DL configuration defaults <\/td>\n<\/tr>\n
759<\/td>\nD.6 Transport layer
D.7 Application layer
Table 507 \u2013 Network configuration defaults
Table 508 \u2013 Transport configuration defaults <\/td>\n<\/tr>\n
760<\/td>\nTable 509 \u2013 Application configuration defaults <\/td>\n<\/tr>\n
761<\/td>\nD.8 Gateway
D.9 Provisioning
Table 510 \u2013 Gateway configuration defaults <\/td>\n<\/tr>\n
762<\/td>\nTable 511 \u2013 Provisioning configuration defaults <\/td>\n<\/tr>\n
763<\/td>\nAnnex E (informative) Use of backbone networks
E.1 General
E.2 Recommended characteristics
E.3 Internet protocol backbones <\/td>\n<\/tr>\n
766<\/td>\nAnnex F (normative) Basic security concepts \u2013 Notation and representation
F.1 Strings and string operations
F.2 Integers, octets, and their representation
F.3 Entities <\/td>\n<\/tr>\n
767<\/td>\nAnnex G (informative) Using certificate chains for over-the-air provisioning <\/td>\n<\/tr>\n
768<\/td>\nAnnex H (normative) Security building blocks
H.1 Symmetric key cryptographic building blocks <\/td>\n<\/tr>\n
769<\/td>\nH.2 Asymmetric key cryptographic building blocks
H.3 Keying information <\/td>\n<\/tr>\n
771<\/td>\nH.4 Key agreement schemes
H.5 Keying information schemes <\/td>\n<\/tr>\n
772<\/td>\nH.6 Challenge domain parameter generation and validation <\/td>\n<\/tr>\n
773<\/td>\nH.7 Challenge validation primitive
H.8 Secret key generation (SKG) primitive <\/td>\n<\/tr>\n
774<\/td>\nH.9 Block-cipher-based cryptographic hash function <\/td>\n<\/tr>\n
775<\/td>\nH.10 Elliptic curve cryptography manual certificate scheme <\/td>\n<\/tr>\n
778<\/td>\nAnnex I (informative) Definition templates
I.1 Object type template
I.2 Standard object attributes template
Table 512 \u2013 Table of standard object types <\/td>\n<\/tr>\n
779<\/td>\nI.3 Standard object methods
Table 513 \u2013 Template for standard object attributes <\/td>\n<\/tr>\n
780<\/td>\nI.4 Standard object alert reporting template
Table 514 \u2013 Template for standard object methods <\/td>\n<\/tr>\n
781<\/td>\nI.5 Data structure definition
Table 515 \u2013 Template for standard object alert reporting <\/td>\n<\/tr>\n
782<\/td>\nTable 516 \u2013 Template for data structures <\/td>\n<\/tr>\n
783<\/td>\nAnnex J (informative) Operations on attributes
J.1 Operations on attributes
Table 517 \u2013 Scheduled_Write method template <\/td>\n<\/tr>\n
784<\/td>\nTable 518 \u2013 Read_Row method template <\/td>\n<\/tr>\n
785<\/td>\nTable 519 \u2013 Write_Row method template
Table 520 \u2013 Reset_Row method template <\/td>\n<\/tr>\n
786<\/td>\nJ.2 Synchronized cutover
Table 521 \u2013 Delete_Row method template <\/td>\n<\/tr>\n
788<\/td>\nAnnex K (normative) Standard object types <\/td>\n<\/tr>\n
790<\/td>\nTable 522 \u2013 Standard object types <\/td>\n<\/tr>\n
792<\/td>\nTable 523 \u2013 Standard object instances <\/td>\n<\/tr>\n
794<\/td>\nAnnex L (informative) Standard data types <\/td>\n<\/tr>\n
795<\/td>\nTable 524 \u2013 Standard data types <\/td>\n<\/tr>\n
796<\/td>\nAnnex M (normative) Protocol identification values
Table 525 \u2013 Protocol identification values <\/td>\n<\/tr>\n
797<\/td>\nAnnex N (informative) Tunneling and native object mapping
N.1 Overview
N.2 Tunneling
N.3 Foreign protocol application communication <\/td>\n<\/tr>\n
798<\/td>\nN.4 Native object mapping
N.5 Tunneling and native object mapping tradeoffs <\/td>\n<\/tr>\n
799<\/td>\nAnnex O (informative) Generic protocol translation
O.1 Overview
O.2 Publish
Figure 170 \u2013 Generic protocol translation publish diagram <\/td>\n<\/tr>\n
800<\/td>\nO.3 Subscribe
Figure 171 \u2013 Generic protocol translation subscribe diagram <\/td>\n<\/tr>\n
801<\/td>\nO.4 Client
Figure 172 \u2013 Generic protocol translation client\/server transmission diagram <\/td>\n<\/tr>\n
802<\/td>\nO.5 Server
Figure 173 \u2013 Generic protocol translation client\/server reception diagram <\/td>\n<\/tr>\n
803<\/td>\nAnnex P (informative) Gateway service access point adaptations for this specification
P.1 General
P.2 Parameters
P.3 Session
P.4 Lease <\/td>\n<\/tr>\n
804<\/td>\nP.5 Device list report
P.6 Topology report
P.7 Schedule report
P.8 Device health report
P.9 Neighbor health report
P.10 Network health report
P.11 Time
P.12 Client\/server <\/td>\n<\/tr>\n
805<\/td>\nP.13 Publish\/subscribe <\/td>\n<\/tr>\n
806<\/td>\nP.14 Bulk transfer <\/td>\n<\/tr>\n
807<\/td>\nP.15 Alert
P.16 Gateway configuration
P.17 Device configuration <\/td>\n<\/tr>\n
808<\/td>\nAnnex Q (informative) Gateway service access point adaptations for WirelessHART\u00ae
Q.1 General <\/td>\n<\/tr>\n
809<\/td>\nQ.2 Parameters
Q.3 Session <\/td>\n<\/tr>\n
810<\/td>\nQ.4 Lease
Q.5 Device list report <\/td>\n<\/tr>\n
811<\/td>\nQ.6 Topology report
Q.7 Schedule report
Q.8 Device health report <\/td>\n<\/tr>\n
812<\/td>\nQ.9 Neighbor health report
Q.10 Network health report <\/td>\n<\/tr>\n
813<\/td>\nQ.11 Time
Q.12 Client\/server <\/td>\n<\/tr>\n
814<\/td>\nQ.13 Publish\/subscribe <\/td>\n<\/tr>\n
815<\/td>\nQ.14 Bulk transfer
Q.15 Alert <\/td>\n<\/tr>\n
816<\/td>\nQ.16 Gateway configuration
Q.17 Device configuration <\/td>\n<\/tr>\n
817<\/td>\nAnnex R (informative) Host system interface to standard-compliant devices via a gateway
R.1 Background
Figure 174 \u2013 Host integration reference model <\/td>\n<\/tr>\n
818<\/td>\nR.2 Device application data integration with host systems
R.3 Host system configuration tool <\/td>\n<\/tr>\n
819<\/td>\nFigure 175 \u2013 Configuration using an electronic device definition <\/td>\n<\/tr>\n
820<\/td>\nR.4 Field device \/ distributed control systems integration
Figure 176 \u2013 Configuration using FDT\/DTM approach <\/td>\n<\/tr>\n
821<\/td>\nR.5 Gateway
R.6 Asset management application support <\/td>\n<\/tr>\n
823<\/td>\nAnnex S (informative) Symmetric Key Operation Test Vectors
S.1 DPDU samples <\/td>\n<\/tr>\n
824<\/td>\nS.2 TPDU samples <\/td>\n<\/tr>\n
826<\/td>\nAnnex T (informative) Data link header and network header for join requests
T.1 Overview
T.2 MAC header (MHR)
T.3 DL header (DHR)
Table 526 \u2013 Sample MHR for join request
Table 527 \u2013 Sample DHR for join request <\/td>\n<\/tr>\n
827<\/td>\nT.4 NL header
Table 528 \u2013 Network header for join messages <\/td>\n<\/tr>\n
828<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2012<\/td>\n832<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244184,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[697,2641],"product_tag":[],"class_list":{"0":"post-244183","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-50","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244184"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244183"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244183"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}