{"id":244206,"date":"2024-10-19T16:02:24","date_gmt":"2024-10-19T16:02:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-627342015\/"},"modified":"2024-10-25T11:01:09","modified_gmt":"2024-10-25T11:01:09","slug":"bs-en-627342015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-627342015\/","title":{"rendered":"BS EN 62734:2015"},"content":{"rendered":"

IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO\/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
36<\/td>\n0 Introduction
0.1 General
0.2 Document structure
0.3 Potentially relevant patents <\/td>\n<\/tr>\n
38<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
39<\/td>\n3 Terms, definitions, abbreviated terms, acronyms, and conventions
3.1 Terms and definitions
3.1.1 (N)layer and other terms and definitions from the open systems interconnection Basic Reference Model <\/td>\n<\/tr>\n
48<\/td>\n3.1.2 Other terms and definitions <\/td>\n<\/tr>\n
66<\/td>\n3.1.3 Symbols for symmetric keys, and for asymmetric keys and certificates <\/td>\n<\/tr>\n
67<\/td>\n3.1.4 Terms used to describe device behavior <\/td>\n<\/tr>\n
68<\/td>\n3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
74<\/td>\n3.3 Conventions
3.3.1 Service interfaces <\/td>\n<\/tr>\n
75<\/td>\n3.3.2 Table cells
3.3.3 Italics <\/td>\n<\/tr>\n
76<\/td>\n3.3.4 Bold face
3.3.5 Informal declarations of named constants
4 Overview
4.1 General
4.2 Interoperability and related issues <\/td>\n<\/tr>\n
77<\/td>\n4.3 Quality of service
4.4 Worldwide applicability
4.5 Network architecture
4.5.1 Interfaces <\/td>\n<\/tr>\n
78<\/td>\n4.5.2 Data structures <\/td>\n<\/tr>\n
79<\/td>\n4.5.3 Network description
Figures
Figure 1 \u2013 Standard-compliant network <\/td>\n<\/tr>\n
80<\/td>\n4.5.4 Generic protocol data unit construction
Figure 2 \u2013 Typical single-layer PDU without fragmenting or blocking
Figure 3 \u2013 Full multi-layer PDU structure used by this standard <\/td>\n<\/tr>\n
81<\/td>\n4.5.5 Abstract data and concrete representations <\/td>\n<\/tr>\n
83<\/td>\n4.6 Network characteristics
4.6.1 General
4.6.2 Scalability <\/td>\n<\/tr>\n
84<\/td>\n4.6.3 Extensibility
4.6.4 Simple operation
4.6.5 Site-license-exempt operation
4.6.6 Robustness in the presence of interference, including from other wireless systems
4.6.7 Determinism and contention-free media access <\/td>\n<\/tr>\n
85<\/td>\n4.6.8 Self-organizing networking with support for redundancy
4.6.9 Internet-protocol-compatible NL
4.6.10 Coexistence with other radio frequency systems <\/td>\n<\/tr>\n
87<\/td>\n4.6.11 Time-slotted assigned-channel Dtransactions as the basis for communication <\/td>\n<\/tr>\n
89<\/td>\n4.6.12 Robust and flexible security <\/td>\n<\/tr>\n
90<\/td>\n4.6.13 System management
4.6.14 Application process using standard objects
4.6.15 Tunneling
5 System
5.1 General <\/td>\n<\/tr>\n
91<\/td>\n5.2 Devices
5.2.1 General
5.2.2 Device interworkability
5.2.3 Profiles
5.2.4 Quality of service
5.2.5 Device worldwide applicability <\/td>\n<\/tr>\n
92<\/td>\n5.2.6 Device description <\/td>\n<\/tr>\n
93<\/td>\nFigure 4 \u2013 Physical devices versus roles <\/td>\n<\/tr>\n
96<\/td>\n5.2.7 Device addressing
5.2.8 Device phases <\/td>\n<\/tr>\n
97<\/td>\nFigure 5 \u2013 Notional representation of device phases <\/td>\n<\/tr>\n
98<\/td>\n5.2.9 Device energy sources
5.3 Networks
5.3.1 General
5.3.2 Minimal network <\/td>\n<\/tr>\n
99<\/td>\n5.3.3 Basic network topologies supported
Figure 6 \u2013 Simple star topology <\/td>\n<\/tr>\n
100<\/td>\nFigure 7 \u2013 Simple hub-and-spoke topology <\/td>\n<\/tr>\n
101<\/td>\nFigure 8 \u2013 Mesh topology <\/td>\n<\/tr>\n
102<\/td>\n5.3.4 Network configurations
Figure 9 \u2013 Simple star-mesh topology <\/td>\n<\/tr>\n
103<\/td>\nFigure 10 \u2013 Example where network and D-subnet overlap <\/td>\n<\/tr>\n
104<\/td>\nFigure 11 \u2013 Example where network and Dsubnet differ <\/td>\n<\/tr>\n
105<\/td>\nFigure 12 \u2013 Network with multiple gateways <\/td>\n<\/tr>\n
106<\/td>\nFigure 13 \u2013 Basic network with backup gateway <\/td>\n<\/tr>\n
107<\/td>\n5.3.5 Gateway, system manager, and security manager
Figure 14 \u2013 Network with backbone <\/td>\n<\/tr>\n
108<\/td>\n5.4 Protocol suite structure
Figure 15 \u2013 Network with backbone \u2013 Device roles <\/td>\n<\/tr>\n
109<\/td>\n5.5 Data flow
5.5.1 General
Figure 16 \u2013 Reference model used by this standard <\/td>\n<\/tr>\n
110<\/td>\n5.5.2 Native communications
5.5.3 Basic data flow
Figure 17 \u2013 Basic data flow <\/td>\n<\/tr>\n
111<\/td>\n5.5.4 Data flow between I\/O devices
5.5.5 Data flow with legacy I\/O device
Figure 18 \u2013 Data flow between I\/O devices <\/td>\n<\/tr>\n
112<\/td>\nFigure 19 \u2013 Data flow with legacy I\/O device <\/td>\n<\/tr>\n
113<\/td>\nFigure 20 \u2013 Data flow with backbone-resident device <\/td>\n<\/tr>\n
114<\/td>\nFigure 21 \u2013 Data flow between I\/O devices via backbone subnet <\/td>\n<\/tr>\n
115<\/td>\n5.5.6 Data flow with backbone
5.5.7 Data flow between I\/O devices via backbone
5.5.8 Data flow to a standard-aware control system or device
Figure 22 \u2013 Data flow to standard-aware control system <\/td>\n<\/tr>\n
116<\/td>\n5.6 Time reference
5.6.1 General <\/td>\n<\/tr>\n
117<\/td>\n5.6.2 Time synchronization
5.7 Firmware upgrades
5.8 Wireless backbones and other infrastructures
6 System management role
6.1 General
6.1.1 Overview <\/td>\n<\/tr>\n
118<\/td>\n6.1.2 Components and architecture
Figure 23 \u2013 Management architecture <\/td>\n<\/tr>\n
119<\/td>\n6.1.3 Management functions
6.2 DMAP
6.2.1 General <\/td>\n<\/tr>\n
120<\/td>\n6.2.2 Architecture of device management
6.2.3 Definition of management objects
6.2.4 Management objects in DMAP <\/td>\n<\/tr>\n
121<\/td>\nFigure 24 \u2013 DMAP
Tables
Table 1 \u2013 Standard management object types in DMAP <\/td>\n<\/tr>\n
122<\/td>\n6.2.5 Communications services provided to device management objects <\/td>\n<\/tr>\n
123<\/td>\n6.2.6 Attributes of management objects
Figure 25 \u2013 Example of management SAP flow through standard protocol suite <\/td>\n<\/tr>\n
124<\/td>\n6.2.7 Definitions of management objects in DMAP
Table 2 \u2013 Metadata_attribute data structure <\/td>\n<\/tr>\n
126<\/td>\nTable 3 \u2013 Alert types for communication diagnostic category
Table 4 \u2013 Alert types for security alert category
Table 5 \u2013 Alert types for device diagnostic alert category
Table 6 \u2013 Alert types for process alert category <\/td>\n<\/tr>\n
128<\/td>\nTable 7 \u2013 ARMO attributes (1 of 3) <\/td>\n<\/tr>\n
131<\/td>\nTable 8 \u2013 ARMO alerts <\/td>\n<\/tr>\n
132<\/td>\nTable 9 \u2013 Alarm_Recovery method <\/td>\n<\/tr>\n
133<\/td>\n6.2.8 Functions of device management and layer management <\/td>\n<\/tr>\n
134<\/td>\nTable 10 \u2013 DMO attributes (1 of 8) <\/td>\n<\/tr>\n
142<\/td>\nTable 11 \u2013 DMO alerts <\/td>\n<\/tr>\n
143<\/td>\n6.3 System manager
6.3.1 General
6.3.2 System management architecture <\/td>\n<\/tr>\n
144<\/td>\n6.3.3 Standard system management object types
Figure 26 \u2013 System manager architecture concept <\/td>\n<\/tr>\n
145<\/td>\n6.3.4 Security management
Table 12 \u2013 System management object types <\/td>\n<\/tr>\n
146<\/td>\n6.3.5 Addresses and address allocation <\/td>\n<\/tr>\n
147<\/td>\nTable 13 \u2013 DSO attributes <\/td>\n<\/tr>\n
148<\/td>\nTable 14 \u2013 Address_Translation_Row data structure
Table 15 \u2013 Read_Address_Row method <\/td>\n<\/tr>\n
150<\/td>\n6.3.6 Firmware upgrade
Table 16 \u2013 Input argument usage for Read_Address_Row method
Table 17 \u2013 Output argument usage for Read_Address_Row method <\/td>\n<\/tr>\n
151<\/td>\n6.3.7 System performance monitoring <\/td>\n<\/tr>\n
152<\/td>\n6.3.8 Device provisioning service
6.3.9 Device management services
Table 18 \u2013 Attributes of SMO in system manager <\/td>\n<\/tr>\n
154<\/td>\nTable 19 \u2013 Proxy_System_Manager_Join method <\/td>\n<\/tr>\n
156<\/td>\nTable 20 \u2013 Proxy_System_Manager_Contract method <\/td>\n<\/tr>\n
158<\/td>\nTable 21 \u2013 Effect of different join commands on attribute sets
Table 22 \u2013 Attributes of DMSO in the system manager <\/td>\n<\/tr>\n
159<\/td>\nTable 23 \u2013 System_Manager_Join method <\/td>\n<\/tr>\n
161<\/td>\n6.3.10 System time services
Table 24 \u2013 System_Manager_Contract method <\/td>\n<\/tr>\n
165<\/td>\n6.3.11 System communication configuration
Table 25 \u2013 Attributes of STSO in the system manager <\/td>\n<\/tr>\n
166<\/td>\nFigure 27 \u2013 UAP-system manager interaction during contract establishment <\/td>\n<\/tr>\n
168<\/td>\nTable 26 \u2013 Attributes of SCO in the system manager <\/td>\n<\/tr>\n
169<\/td>\nFigure 28 \u2013 Contract-related interaction between DMO and SCO <\/td>\n<\/tr>\n
172<\/td>\nTable 27 \u2013 SCO method for contract establishment, modification, or renewal (1 of 8) <\/td>\n<\/tr>\n
180<\/td>\nTable 28 \u2013 Input argument usage for SCO methodfor contract establishment, modification, or renewal <\/td>\n<\/tr>\n
181<\/td>\nTable 29 \u2013 Output argument usage for SCO methodfor contract establishment, modification, or renewal <\/td>\n<\/tr>\n
182<\/td>\nFigure 29 \u2013 Contract source, destination, and intermediate devices <\/td>\n<\/tr>\n
184<\/td>\nTable 30 \u2013 Contract_Data data structure (1 of 3) <\/td>\n<\/tr>\n
188<\/td>\nTable 31 \u2013 New_Device_Contract_Response data structure (1 of 2) <\/td>\n<\/tr>\n
191<\/td>\nFigure 30 \u2013 Contract establishment example <\/td>\n<\/tr>\n
192<\/td>\nFigure 31 \u2013 Contract ID usage in source <\/td>\n<\/tr>\n
194<\/td>\nTable 32 \u2013 SCO method for contract termination, deactivation and reactivation <\/td>\n<\/tr>\n
195<\/td>\nTable 33 \u2013 DMO method to notify of contract termination <\/td>\n<\/tr>\n
196<\/td>\nFigure 32 \u2013 Contract termination <\/td>\n<\/tr>\n
197<\/td>\nTable 34 \u2013 DMO method to notify of contract modification <\/td>\n<\/tr>\n
198<\/td>\n6.3.12 Redundancy management
Figure 33 \u2013 Contract modification with immediate effect <\/td>\n<\/tr>\n
199<\/td>\n6.3.13 System management protocols
6.3.14 Management policies and policy administration
6.3.15 Operational interaction with plant operations or maintenance personnel
7 Security
7.1 General <\/td>\n<\/tr>\n
200<\/td>\n7.2 Security services
7.2.1 Overview
Figure 34 \u2013 Examples of DPDU and TPDU scope <\/td>\n<\/tr>\n
201<\/td>\n7.2.2 Keys <\/td>\n<\/tr>\n
202<\/td>\nFigure 35 \u2013 Keys and associated lifetimes <\/td>\n<\/tr>\n
204<\/td>\nFigure 36 \u2013 Key lifetimes <\/td>\n<\/tr>\n
205<\/td>\n7.3 PDU security
7.3.1 General
Table 35 \u2013 Security levels
Table 36 \u2013 Structure of the security control field <\/td>\n<\/tr>\n
206<\/td>\n7.3.2 DPDU security <\/td>\n<\/tr>\n
207<\/td>\nFigure 37 \u2013 DPDU structure <\/td>\n<\/tr>\n
208<\/td>\nFigure 38 \u2013 DLE and DLS processing for a Dtransaction initiator <\/td>\n<\/tr>\n
210<\/td>\nFigure 39 \u2013 Received DPDUs \u2013 DLE and DSC <\/td>\n<\/tr>\n
211<\/td>\nTable 37 \u2013 Sec.DpduPrep.Request elements <\/td>\n<\/tr>\n
212<\/td>\nTable 38 \u2013 Sec.DpduPrep.Response elements
Table 39 \u2013 Sec.DAckCheck.Request elements <\/td>\n<\/tr>\n
213<\/td>\nTable 40 \u2013 Sec.DAckCheck.Response elements <\/td>\n<\/tr>\n
214<\/td>\nTable 41 \u2013 Sec.DInitialCheck.Request elements <\/td>\n<\/tr>\n
215<\/td>\nTable 42 \u2013 Sec.DInitialCheck.Response elements <\/td>\n<\/tr>\n
216<\/td>\nTable 43 \u2013 Sec.DAckPrep.Request elements <\/td>\n<\/tr>\n
217<\/td>\nTable 44 \u2013 Sec.DAckPrep.Response elements <\/td>\n<\/tr>\n
218<\/td>\nTable 45 \u2013 Structure of the WISN DPDU nonce
Table 46 \u2013 Structure of the 32bit truncated TAI time used in the Dnonce <\/td>\n<\/tr>\n
221<\/td>\n7.3.3 TL security functionality <\/td>\n<\/tr>\n
222<\/td>\nFigure 40 \u2013 TPDU structure and protected coverage <\/td>\n<\/tr>\n
223<\/td>\nFigure 41 \u2013 TMIC parameters
Table 47 \u2013 TSC pseudo-header structure <\/td>\n<\/tr>\n
224<\/td>\nFigure 42 \u2013 TL and TSC interaction, outgoing TPDU <\/td>\n<\/tr>\n
225<\/td>\nFigure 43 \u2013 TL and TSC interaction, incoming TPDU <\/td>\n<\/tr>\n
226<\/td>\nTable 48 \u2013 Sec.TpduOutCheck.Request elements
Table 49 \u2013 Sec.TpduOutCheck.Response elements <\/td>\n<\/tr>\n
227<\/td>\nTable 50 \u2013 Sec.TpduSecure.Request elements <\/td>\n<\/tr>\n
228<\/td>\nTable 51 \u2013 Sec. TpduSecure.Response elements <\/td>\n<\/tr>\n
229<\/td>\nTable 52 \u2013 Sec.TpduInCheck.Request elements <\/td>\n<\/tr>\n
230<\/td>\nTable 53 \u2013 Sec.TpduInCheck.Response elements <\/td>\n<\/tr>\n
231<\/td>\nTable 54 \u2013 Sec.TpduVerify.Request elements <\/td>\n<\/tr>\n
232<\/td>\nTable 55 \u2013 Sec.TpduVerify.Response elements
Table 56 \u2013 Structure of TL security header <\/td>\n<\/tr>\n
233<\/td>\nTable 57 \u2013 Structure of the TPDU nonce
Table 58 \u2013 Structure of 32bit truncated nominal TAI time used in the Tnonce <\/td>\n<\/tr>\n
237<\/td>\n7.4 Joining process
7.4.1 General
7.4.2 Prerequisites <\/td>\n<\/tr>\n
238<\/td>\n7.4.3 Desired device end state and properties
7.4.4 Joining process steps common for symmetric-key and asymmetric-key approaches <\/td>\n<\/tr>\n
241<\/td>\n7.4.5 Symmetric-key joining process <\/td>\n<\/tr>\n
242<\/td>\nFigure 44 \u2013 Example: Overview of the symmetric-key joining process <\/td>\n<\/tr>\n
243<\/td>\nFigure 45 \u2013 Example: Overview of the symmetric-key joining process of a backbone device <\/td>\n<\/tr>\n
245<\/td>\nTable 59 \u2013 Proxy_Security_Sym_Join method <\/td>\n<\/tr>\n
246<\/td>\nTable 60 \u2013 Security_Sym_Join method
Table 61 \u2013 Security_Confirm method <\/td>\n<\/tr>\n
247<\/td>\nTable 62 \u2013 Security_Sym_Join_Request data structure <\/td>\n<\/tr>\n
248<\/td>\nTable 63 \u2013 Security_Sym_Join_Response data structure <\/td>\n<\/tr>\n
249<\/td>\nTable 64 \u2013 Structure of compressed security level field <\/td>\n<\/tr>\n
250<\/td>\nTable 65 \u2013 Master key security level
Table 66 \u2013 Security_Sym_Confirm data structure <\/td>\n<\/tr>\n
251<\/td>\n7.4.6 Asymmetric-key joining process <\/td>\n<\/tr>\n
252<\/td>\nTable 67 \u2013 Implicit certificate format
Table 68 \u2013 Usage_serial_number structure <\/td>\n<\/tr>\n
253<\/td>\nFigure 46 \u2013 Asymmetric-key-authenticated key agreement scheme <\/td>\n<\/tr>\n
256<\/td>\nFigure 47 \u2013 Example: Overview of the asymmetric-key joining process for a device with a DL <\/td>\n<\/tr>\n
257<\/td>\nFigure 48 \u2013 Example: Overview of the asymmetric-key joining process of a backbone device <\/td>\n<\/tr>\n
259<\/td>\nTable 69 \u2013 Proxy_Security_Pub_Join method <\/td>\n<\/tr>\n
260<\/td>\nTable 70 \u2013 Security_Pub_Join method <\/td>\n<\/tr>\n
261<\/td>\nTable 71 \u2013 Proxy_Security_Pub_Confirm method
Table 72 \u2013 Security_Pub_Confirm method <\/td>\n<\/tr>\n
262<\/td>\nTable 73 \u2013 Network_Information_Confirmation method <\/td>\n<\/tr>\n
263<\/td>\nTable 74 \u2013 Format of asymmetric join request internal structure
Table 75 \u2013 Format of the protocol control field <\/td>\n<\/tr>\n
264<\/td>\nTable 76 \u2013 Format of asymmetric join response internal structure <\/td>\n<\/tr>\n
265<\/td>\nTable 77 \u2013 Format of first join confirmation internal structure <\/td>\n<\/tr>\n
266<\/td>\nTable 78 \u2013 Format of join confirmation response internal structure <\/td>\n<\/tr>\n
267<\/td>\n7.4.7 Joining process and device lifetime failure recovery <\/td>\n<\/tr>\n
268<\/td>\nTable 79 \u2013 Joining process and device lifetime state machine <\/td>\n<\/tr>\n
269<\/td>\n7.5 Session establishment
7.5.1 General
7.5.2 Description
Figure 49 \u2013 Device state transitions for joining process and device lifetime <\/td>\n<\/tr>\n
270<\/td>\nFigure 50 \u2013 High-level example of session establishment <\/td>\n<\/tr>\n
271<\/td>\n7.5.3 Application protocol data unit protection using the master key
7.5.4 Proxy security management object methods related to the session establishment
Table 80 \u2013 Security_New_Session method <\/td>\n<\/tr>\n
272<\/td>\nTable 81 \u2013 Security_New_Session_Request data structure <\/td>\n<\/tr>\n
273<\/td>\nTable 82 \u2013 Security_New_Session_Response data structure <\/td>\n<\/tr>\n
274<\/td>\n7.6 Key update
7.6.1 General
7.6.2 Description <\/td>\n<\/tr>\n
275<\/td>\n7.6.3 Device security management object methods related to Tkey update
Figure 51 \u2013 Key update protocol overview <\/td>\n<\/tr>\n
276<\/td>\nTable 83 \u2013 New_Key method <\/td>\n<\/tr>\n
277<\/td>\nTable 84 \u2013 Security_Key_and_Policies data structure <\/td>\n<\/tr>\n
279<\/td>\n7.6.4 Failure recovery
Table 85 \u2013 Security_Key_Update_Status data structure <\/td>\n<\/tr>\n
280<\/td>\nTable 86 \u2013 Tkey and Dkey state transition <\/td>\n<\/tr>\n
281<\/td>\n7.7 Functionality of the security manager role
7.7.1 Proxy security management object
Figure 52 \u2013 Device key establishment and key update state transition
Table 87 \u2013 Attributes of PSMO in the system manager <\/td>\n<\/tr>\n
282<\/td>\n7.7.2 Authorization of network devices and generation or derivation of initial master keys
7.7.3 Interaction with device security management objects
7.7.4 Management of operational keys <\/td>\n<\/tr>\n
283<\/td>\n7.8 Security policies
7.8.1 Definition of security policy
7.8.2 Policy extent <\/td>\n<\/tr>\n
284<\/td>\n7.8.3 Unconstrained security policy choices
7.8.4 Policy structures
Table 88 \u2013 Structure of policy field
Table 89 \u2013 Key_Type <\/td>\n<\/tr>\n
285<\/td>\nTable 90 \u2013 Key_Usage
Table 91 \u2013 Granularity <\/td>\n<\/tr>\n
286<\/td>\n7.9 Security functions available to the AL
7.9.1 Parameters on transport service requests that relate to security <\/td>\n<\/tr>\n
287<\/td>\n7.9.2 Direct access to cryptographic primitives <\/td>\n<\/tr>\n
288<\/td>\n7.9.3 Symmetric-key cryptography <\/td>\n<\/tr>\n
289<\/td>\n7.10 Security statistics collection, threat detection, and reporting <\/td>\n<\/tr>\n
290<\/td>\n7.11 DSMO functionality
7.11.1 General
7.11.2 DSMO attributes
Table 92 \u2013 DSMO attributes <\/td>\n<\/tr>\n
291<\/td>\n7.11.3 KeyDescriptor <\/td>\n<\/tr>\n
292<\/td>\nTable 93 \u2013 KeyDescriptor <\/td>\n<\/tr>\n
293<\/td>\nTable 94 \u2013 TkeyLookupData OctetString fields <\/td>\n<\/tr>\n
294<\/td>\nTable 95 \u2013 Delete key method <\/td>\n<\/tr>\n
295<\/td>\nTable 96 \u2013 Key_Policy_Update method <\/td>\n<\/tr>\n
296<\/td>\n7.11.4 DSMO alerts <\/td>\n<\/tr>\n
297<\/td>\n8 Physical layer
8.1 General
Table 97 \u2013 DSMO alerts <\/td>\n<\/tr>\n
298<\/td>\n8.2 Default physical layer
8.2.1 General requirements
8.2.2 Additional requirements of IEEE\u00a0802.15.4
Table 98 \u2013 Timing requirements <\/td>\n<\/tr>\n
299<\/td>\n8.2.3 Exceptions to the IEEE\u00a0802.15.4 physical layer
9 Data-link layer
9.1 General
9.1.1 Overview <\/td>\n<\/tr>\n
300<\/td>\n9.1.2 Coexistence strategies in the DL
9.1.3 Allocation of digital bandwidth <\/td>\n<\/tr>\n
301<\/td>\n9.1.4 Structure of the DPDU
9.1.5 The DL and the IEEE\u00a0802.15.4 MAC
Figure 53 \u2013 DL protocol suite and PhPDU\/DPDU structure <\/td>\n<\/tr>\n
302<\/td>\n9.1.6 Routes and graphs <\/td>\n<\/tr>\n
304<\/td>\nFigure 54 \u2013 Graph routing example
Table 99 \u2013 Graph table on ND20
Table 100 \u2013 Graph table on ND21 <\/td>\n<\/tr>\n
306<\/td>\nFigure 55 \u2013 Inbound and outbound graphs <\/td>\n<\/tr>\n
309<\/td>\n9.1.7 Slotted-channel-hopping, slow-channel-hopping, and timeslots <\/td>\n<\/tr>\n
310<\/td>\nFigure 56 \u2013 Slotted-channel-hopping <\/td>\n<\/tr>\n
311<\/td>\nFigure 57 \u2013 Slow-channel-hopping
Figure 58 \u2013 Hybrid operation <\/td>\n<\/tr>\n
312<\/td>\nFigure 59 \u2013 Radio spectrum usage <\/td>\n<\/tr>\n
314<\/td>\nFigure 60 \u2013 Predefined channel-hopping-pattern1 <\/td>\n<\/tr>\n
315<\/td>\nFigure 61 \u2013 Two groups of DLEs with different channel-hopping-pattern-offsets <\/td>\n<\/tr>\n
316<\/td>\nFigure 62 \u2013 Interleaved channel-hopping-pattern1 with sixteen different channel-hopping-pattern-offsets <\/td>\n<\/tr>\n
317<\/td>\nFigure 63 \u2013 Example timeslot allocation for slotted-channel-hopping <\/td>\n<\/tr>\n
318<\/td>\nFigure 64 \u2013 Example timeslot allocation for slow-channel-hopping <\/td>\n<\/tr>\n
319<\/td>\nFigure 65 \u2013 Hybrid mode with slotted-channel-hopping and slow-channel-hopping
Figure 66 \u2013 Combining slow-channel-hopping and slotted-channel-hopping <\/td>\n<\/tr>\n
320<\/td>\n9.1.8 Superframes
Figure 67 \u2013 Example of a three-timeslot superframe and how it repeats
Figure 68 \u2013 Superframes and links <\/td>\n<\/tr>\n
321<\/td>\nFigure 69 \u2013 Multiple superframes with aligned timeslots <\/td>\n<\/tr>\n
325<\/td>\nFigure 70 \u2013 Example superframe for slotted-channel-hopping <\/td>\n<\/tr>\n
326<\/td>\nFigure 71 \u2013 Example superframe for slow-channel-hopping
Figure 72 \u2013 Components of a slow-channel-hopping superframe <\/td>\n<\/tr>\n
327<\/td>\nFigure 73 \u2013 Example configuration for avoiding collisions among routers <\/td>\n<\/tr>\n
328<\/td>\nFigure 74 \u2013 Hybrid configuration <\/td>\n<\/tr>\n
330<\/td>\nFigure 75 \u2013 Timeslot allocation and message queue <\/td>\n<\/tr>\n
332<\/td>\n9.1.9 DL time keeping <\/td>\n<\/tr>\n
333<\/td>\nFigure 76 \u2013 250\u00a0ms alignment intervals <\/td>\n<\/tr>\n
334<\/td>\nFigure 77 \u2013 Timeslot durations and timing <\/td>\n<\/tr>\n
335<\/td>\nTable 101 \u2013 Approximating nominal timing with 32\u00a0KiHz clock <\/td>\n<\/tr>\n
339<\/td>\nFigure 78 \u2013 Clock source acknowledges receipt of a Data DPDU <\/td>\n<\/tr>\n
341<\/td>\nFigure 79 \u2013 Transaction timing attributes <\/td>\n<\/tr>\n
342<\/td>\nFigure 80 \u2013 Dedicated and shared transaction timeslots <\/td>\n<\/tr>\n
343<\/td>\nFigure 81 \u2013 Unicast transaction <\/td>\n<\/tr>\n
346<\/td>\nFigure 82 \u2013 PDU wait time (PWT) <\/td>\n<\/tr>\n
347<\/td>\nFigure 83 \u2013 Duocast support in the standard <\/td>\n<\/tr>\n
348<\/td>\nFigure 84 \u2013 Duocast transaction <\/td>\n<\/tr>\n
349<\/td>\nFigure 85 \u2013 Shared timeslots with active CSMA\/CA <\/td>\n<\/tr>\n
350<\/td>\nFigure 86 \u2013 Transaction during slow-channel-hopping periods <\/td>\n<\/tr>\n
351<\/td>\n9.1.10 Dsubnet addressing <\/td>\n<\/tr>\n
352<\/td>\n9.1.11 DL management service <\/td>\n<\/tr>\n
353<\/td>\nFigure 87 \u2013 DL management SAP flow through standard protocol suite <\/td>\n<\/tr>\n
354<\/td>\n9.1.12 Relationship between DLE and DSC <\/td>\n<\/tr>\n
355<\/td>\n9.1.13 DLE neighbor discovery <\/td>\n<\/tr>\n
358<\/td>\n9.1.14 Neighbor discovery and joining \u2013 DL considerations <\/td>\n<\/tr>\n
361<\/td>\nTable 102 \u2013 DL_Config_Info structure <\/td>\n<\/tr>\n
363<\/td>\n9.1.15 Radio link control and quality measurement <\/td>\n<\/tr>\n
367<\/td>\nTable 103 \u2013 CountryCode <\/td>\n<\/tr>\n
368<\/td>\n9.1.16 DLE roles and options
9.1.17 DLE energy considerations <\/td>\n<\/tr>\n
369<\/td>\n9.2 DDSAP
9.2.1 General
9.2.2 DDData.request <\/td>\n<\/tr>\n
370<\/td>\nTable 104 \u2013 DDData.request parameters <\/td>\n<\/tr>\n
371<\/td>\n9.2.3 DDData.confirm
9.2.4 DDData.indication
Table 105 \u2013 DDData.confirm parameters
Table 106 \u2013 Value set for status parameter
Table 107 \u2013 DDData.indication parameters <\/td>\n<\/tr>\n
372<\/td>\n9.3 Data DPDUs and ACK\/NAK DPDUs
9.3.1 General
Figure 88 \u2013 PhPDU and DPDU structure <\/td>\n<\/tr>\n
373<\/td>\n9.3.2 Octet and bit ordering <\/td>\n<\/tr>\n
374<\/td>\n9.3.3 Media access control headers
Table 108 \u2013 ExtDLUint, one-octet variant
Table 109 \u2013 ExtDLUint, two-octet variant <\/td>\n<\/tr>\n
375<\/td>\nTable 110 \u2013 Data DPDU MHR <\/td>\n<\/tr>\n
377<\/td>\nTable 111 \u2013 Data DPDU DHDR
Table 112 \u2013 Data DPDU DMXHR <\/td>\n<\/tr>\n
378<\/td>\nTable 113 \u2013 DROUT structure, compressed variant <\/td>\n<\/tr>\n
379<\/td>\nTable 114 \u2013 DROUT structure, uncompressed variant <\/td>\n<\/tr>\n
380<\/td>\nTable 115 \u2013 DADDR structure <\/td>\n<\/tr>\n
381<\/td>\n9.3.4 MAC acknowledgment DPDUs
Figure 89 \u2013 Typical ACK\/NAK DPDU layout
Table 116 \u2013 ACK\/NAK DPDU MHR <\/td>\n<\/tr>\n
382<\/td>\nTable 117 \u2013 ACK\/NAK DPDU DHR <\/td>\n<\/tr>\n
383<\/td>\nTable 118 \u2013 ACK\/NAK DPDU DHDR <\/td>\n<\/tr>\n
384<\/td>\n9.3.5 DL auxiliary subheader
Table 119 \u2013 Advertisement DAUX structure <\/td>\n<\/tr>\n
385<\/td>\nTable 120 \u2013 Advertisement selections elements <\/td>\n<\/tr>\n
386<\/td>\nTable 121 \u2013 Advertisement selections
Table 122 \u2013 Advertisement time synchronization elements
Table 123 \u2013 Advertisement time synchronization structure <\/td>\n<\/tr>\n
388<\/td>\nTable 124 \u2013 Join superframe information subfields
Table 125 \u2013 Join superframe information structure <\/td>\n<\/tr>\n
389<\/td>\nTable 126 \u2013 Superframe derived from advertisement <\/td>\n<\/tr>\n
390<\/td>\nTable 127 \u2013 Join information elements
Table 128 \u2013 Join information structure <\/td>\n<\/tr>\n
391<\/td>\nTable 129 \u2013 Defaults for links created from advertisements <\/td>\n<\/tr>\n
392<\/td>\nTable 130 \u2013 dlmo.Neighbor entry created from advertisements
Table 131 \u2013 dlmo.Graph entry created from advertisements <\/td>\n<\/tr>\n
393<\/td>\nTable 132 \u2013 dlmo.Route entry created from advertisements <\/td>\n<\/tr>\n
395<\/td>\nTable 133 \u2013 Solicitation header subfields <\/td>\n<\/tr>\n
396<\/td>\nTable 134 \u2013 Solicitation header structure
Table 135 \u2013 Solicitation DAUX fields
Table 136 \u2013 Solicitation DAUX structure <\/td>\n<\/tr>\n
398<\/td>\nTable 137 \u2013 Activate link DAUX fields
Table 138 \u2013 Activate link DAUX structure
Table 139 \u2013 Report received signal quality DAUX fields <\/td>\n<\/tr>\n
399<\/td>\n9.4 DL management information base
9.4.1 General
9.4.2 DL management object attributes
Table 140 \u2013 Report received signal quality DAUX structure
Table 141 \u2013 DLMO attributes (1 of 7) <\/td>\n<\/tr>\n
409<\/td>\nTable 142 \u2013 Dsubnet filter octets
Table 143 \u2013 dlmo.TaiAdjust OctetString fields <\/td>\n<\/tr>\n
410<\/td>\nTable 144 \u2013 dlmo.TaiAdjust OctetString structure
Table 145 \u2013 dlmo.EnergyDesign OctetString fields
Table 146 \u2013 dlmo.EnergyDesign OctetString structure <\/td>\n<\/tr>\n
411<\/td>\nTable 147 \u2013 dlmo.DeviceCapability OctetString fields
Table 148 \u2013 dlmo.DeviceCapability OctetString structure <\/td>\n<\/tr>\n
413<\/td>\nTable 149 \u2013 dlmo.DiscoveryAlert fields
Table 150 \u2013 dlmo.DiscoveryAlert structure <\/td>\n<\/tr>\n
414<\/td>\nTable 151 \u2013 dlmo.Candidates OctetString fields <\/td>\n<\/tr>\n
415<\/td>\nTable 152 \u2013 dlmo.Candidates structure <\/td>\n<\/tr>\n
416<\/td>\nTable 153 \u2013 dlmo.SmoothFactors OctetString fields
Table 154 \u2013 dlmo.SmoothFactors structure <\/td>\n<\/tr>\n
417<\/td>\nTable 155 \u2013 dlmo.QueuePriority fields
Table 156 \u2013 dlmo.QueuePriority structure <\/td>\n<\/tr>\n
418<\/td>\nTable 157 \u2013 dlmo.ChannelDiag fields <\/td>\n<\/tr>\n
419<\/td>\n9.4.3 DLMO attributes (indexed OctetStrings)
Figure 90 \u2013 Relationship among DLMO indexed attributes
Table 158 \u2013 dlmo.ChannelDiag structure <\/td>\n<\/tr>\n
421<\/td>\nTable 159 \u2013 dlmo.Ch fields
Table 160 \u2013 dlmo.Ch structure <\/td>\n<\/tr>\n
424<\/td>\nTable 161 \u2013 Transaction receiver template fields
Table 162 \u2013 Transaction receiver template structure <\/td>\n<\/tr>\n
425<\/td>\nTable 163 \u2013 Transaction initiator template fields
Table 164 \u2013 Transaction initiator template structure <\/td>\n<\/tr>\n
426<\/td>\nTable 165 \u2013 Default transaction responder template, used during joining process
Table 166 \u2013 Default transaction initiator template, used during joining process <\/td>\n<\/tr>\n
427<\/td>\nTable 167 \u2013 Default transaction responder template, used during joining process <\/td>\n<\/tr>\n
429<\/td>\nTable 168 \u2013 dlmo.Neighbor fields <\/td>\n<\/tr>\n
430<\/td>\nTable 169 \u2013 dlmo.Neighbor structure <\/td>\n<\/tr>\n
431<\/td>\nTable 170 \u2013 ExtendGraph fields
Table 171 \u2013 ExtGraph structure <\/td>\n<\/tr>\n
432<\/td>\nTable 172 \u2013 dlmo.NeighborDiagReset fields
Table 173 \u2013 dlmo.NeighborDiagReset structure <\/td>\n<\/tr>\n
433<\/td>\nTable 174 \u2013 dlmo.Superframe fields <\/td>\n<\/tr>\n
434<\/td>\nTable 175 \u2013 dlmo.Superframe structure <\/td>\n<\/tr>\n
438<\/td>\nTable 176 \u2013 dlmo.SuperframeIdle fields
Table 177 \u2013 dlmo.SuperframeIdle structure <\/td>\n<\/tr>\n
439<\/td>\nTable 178 \u2013 dlmo.Graph
Table 179 \u2013 dlmo.Graph structure <\/td>\n<\/tr>\n
440<\/td>\nTable 180 \u2013 dlmo.Link fields <\/td>\n<\/tr>\n
441<\/td>\nTable 181 \u2013 dlmo.Link structure <\/td>\n<\/tr>\n
442<\/td>\nTable 182 \u2013 dlmo.Link[\u00a0].Type structure <\/td>\n<\/tr>\n
443<\/td>\nTable 183 \u2013 Allowed dlmo.Link[\u00a0].Type combinations <\/td>\n<\/tr>\n
444<\/td>\nTable 184 \u2013 Values for dlmo.Link[\u00a0].Schedule
Table 185 \u2013 dlmo.Route fields <\/td>\n<\/tr>\n
445<\/td>\nTable 186 \u2013 dlmo.Route structure <\/td>\n<\/tr>\n
446<\/td>\nTable 187 \u2013 dlmo.NeighborDiag fields
Table 188 \u2013 Diagnostic summary OctetString fields <\/td>\n<\/tr>\n
447<\/td>\nTable 189 \u2013 Diagnostic summary OctetString structure
Table 190 \u2013 Diagnostic ClockDetail OctetString fields <\/td>\n<\/tr>\n
448<\/td>\n9.5 DLE methods
9.5.1 Method for synchronized cutover of DLE attributes
9.5.2 Methods to access indexed OctetString attributes
Table 191 \u2013 Diagnostic ClockDetail OctetString structure <\/td>\n<\/tr>\n
449<\/td>\nTable 192 \u2013 Read_Row method
Table 193 \u2013 Write_Row method <\/td>\n<\/tr>\n
450<\/td>\n9.6 DL alerts
9.6.1 DL_Connectivity alert
Table 194 \u2013 Write_Row_Now method <\/td>\n<\/tr>\n
451<\/td>\nTable 195 \u2013 dlmo.AlertPolicy fields
Table 196 \u2013 dlmo.AlertPolicy OctetString structure <\/td>\n<\/tr>\n
452<\/td>\n9.6.2 NeighborDiscovery alert
Table 197 \u2013 DL_Connectivity alert
Table 198 \u2013 DL_Connectivity alert OctetString <\/td>\n<\/tr>\n
453<\/td>\n10 Network layer
10.1 General
10.2 NL functionality overview
10.2.1 General
Table 199 \u2013 NeighborDiscovery alert <\/td>\n<\/tr>\n
454<\/td>\n10.2.2 Addressing
10.2.3 Address translation
Table 200 \u2013 Link-local address structure <\/td>\n<\/tr>\n
455<\/td>\nTable 201 \u2013 Address translation table (ATT) <\/td>\n<\/tr>\n
456<\/td>\n10.2.4 Network protocol data unit headers
10.2.5 Fragmentation and reassembly
Figure 91 \u2013 Address translation process <\/td>\n<\/tr>\n
458<\/td>\nFigure 92 \u2013 Fragmentation process <\/td>\n<\/tr>\n
459<\/td>\n10.2.6 Routing
Figure 93 \u2013 Reassembly process <\/td>\n<\/tr>\n
460<\/td>\nTable 202 \u2013 Example of a routing table <\/td>\n<\/tr>\n
461<\/td>\nFigure 94 \u2013 Processing of an NSDU received from a TLE <\/td>\n<\/tr>\n
462<\/td>\nFigure 95 \u2013 Processing of a received NPDU <\/td>\n<\/tr>\n
464<\/td>\nFigure 96 \u2013 Processing of a NPDU received by a NLE from the backbone <\/td>\n<\/tr>\n
465<\/td>\n10.2.7 Routing examples
Figure 97 \u2013 Delivery of a received NPDU at its final destination NLE <\/td>\n<\/tr>\n
466<\/td>\nFigure 98 \u2013 Routing from a field device direct to a field-connected gatewaywithout backbone routing <\/td>\n<\/tr>\n
467<\/td>\nFigure 99 \u2013 Protocol suite diagram for routing from a field device direct to a field-connected gateway without backbone routing <\/td>\n<\/tr>\n
468<\/td>\nFigure 100 \u2013 Routing an NPDU from a field device to a gateway via a backbone router <\/td>\n<\/tr>\n
469<\/td>\nFigure 101 \u2013 Protocol suite diagram for routing an APDU from a field device to a gateway via a backbone router <\/td>\n<\/tr>\n
470<\/td>\nFigure 102 \u2013 Routing from a field device on one Dsubnet to another field device on a different Dsubnet <\/td>\n<\/tr>\n
471<\/td>\nFigure 103 \u2013 Protocol suite diagram for routing from an I\/O device on one Dsubnet to another I\/O device on a different Dsubnet <\/td>\n<\/tr>\n
472<\/td>\nFigure 104 \u2013 Example of routing over an Ethernet backbone network <\/td>\n<\/tr>\n
473<\/td>\n10.3 NLE data services
10.3.1 General
Figure 105 \u2013 Example of routing over a fieldbus backbone network <\/td>\n<\/tr>\n
474<\/td>\n10.3.2 NData.request
Table 203 \u2013 NData.request elements <\/td>\n<\/tr>\n
475<\/td>\n10.3.3 NData.confirm
10.3.4 NData.indication
Table 204 \u2013 NData.confirm elements <\/td>\n<\/tr>\n
476<\/td>\n10.4 NL management object
10.4.1 NL management information base
Table 205 \u2013 NData.indication elements <\/td>\n<\/tr>\n
477<\/td>\nTable 206 \u2013 NLMO attributes (1 of 3) <\/td>\n<\/tr>\n
480<\/td>\n10.4.2 Structured management information bases
Table 207 \u2013 Contract table structure <\/td>\n<\/tr>\n
481<\/td>\n10.4.3 NL management object methods
Table 208 \u2013 Route table elements
Table 209 \u2013 Address translation table structure <\/td>\n<\/tr>\n
483<\/td>\nTable 210 \u2013 NLMO structured MIB manipulation methods <\/td>\n<\/tr>\n
484<\/td>\n10.5 NPDU formats
10.5.1 General
Table 211 \u2013 Alert to indicate dropped PDU\/PDU error <\/td>\n<\/tr>\n
485<\/td>\nFigure 106 \u2013 Distinguishing between NPDU header formats <\/td>\n<\/tr>\n
486<\/td>\n10.5.2 Basic header format for NL
Table 212 \u2013 Common header patterns
Table 213 \u2013 Basic NL header format <\/td>\n<\/tr>\n
487<\/td>\n10.5.3 Contract-enabled network header format <\/td>\n<\/tr>\n
488<\/td>\nTable 214 \u2013 Contract-enabled NL header format
Table 215 \u2013 6LoWPAN_IPHC encoding format <\/td>\n<\/tr>\n
489<\/td>\n10.5.4 Full header (IPv6) format
Table 216 \u2013 IPv6 NL header format <\/td>\n<\/tr>\n
490<\/td>\nTable 217 \u2013 Full NL header in the DL <\/td>\n<\/tr>\n
491<\/td>\n10.5.5 Fragmentation header format
Table 218 \u2013 NL header format for fragmented NPDUs
Table 219 \u2013 Format of first fragment header <\/td>\n<\/tr>\n
492<\/td>\n11 Transport layer
11.1 General
Table 220 \u2013 Format of second and subsequent fragment headers <\/td>\n<\/tr>\n
493<\/td>\n11.2 TLE reference model
11.3 Transport security entity
11.3.1 General
11.3.2 Securing the TL
Figure 107 \u2013 TLE reference model <\/td>\n<\/tr>\n
494<\/td>\n11.4 Transport data entity
11.4.1 General <\/td>\n<\/tr>\n
495<\/td>\n11.4.2 UDP over IPv6
11.4.3 UDP header transmission and compression
Figure 108 \u2013 UDP pseudo-header for IPv6 <\/td>\n<\/tr>\n
496<\/td>\nTable 221 \u2013 UDP header encoding <\/td>\n<\/tr>\n
498<\/td>\n11.4.4 TSAPs and UDP ports <\/td>\n<\/tr>\n
499<\/td>\n11.4.5 Good network citizenship
11.5 TPDU encoding
11.5.1 General
11.5.2 Header compression \u2013 User datagram protocol encoding
Figure 109 \u2013 TPDU structure <\/td>\n<\/tr>\n
500<\/td>\nTable 222 \u2013 UDP 6LoWPAN_NHC-for-UDP encoding octet
Table 223 \u2013 Optimal UDP header encoding <\/td>\n<\/tr>\n
501<\/td>\n11.5.3 TPDU security header
11.6 TL model
11.6.1 General
11.6.2 Data services
Table 224 \u2013 UDP header encoding with checksum and compressed port numbers <\/td>\n<\/tr>\n
502<\/td>\nTable 225 \u2013 TData.request elements <\/td>\n<\/tr>\n
503<\/td>\nTable 226 \u2013 TData.confirm elements
Table 227 \u2013 TData.confirm status codes <\/td>\n<\/tr>\n
504<\/td>\nTable 228 \u2013 TData.indication elements <\/td>\n<\/tr>\n
505<\/td>\nTable 229 \u2013 TLMO attributes (1 of 2) <\/td>\n<\/tr>\n
507<\/td>\nTable 230 \u2013 TL management object methods \u2013 Reset
Table 231 \u2013 TL management object methods \u2013 Halt <\/td>\n<\/tr>\n
508<\/td>\nTable 232 \u2013 TL management object methods \u2013 PortRangeInfo
Table 233 \u2013 TL management object methods \u2013 GetPortInfo <\/td>\n<\/tr>\n
509<\/td>\nTable 234 \u2013 TL management object methods \u2013 GetNextPortInfo
Table 235 \u2013 TL management object alert types \u2013 Illegal use of port <\/td>\n<\/tr>\n
510<\/td>\n12 Application layer
12.1 General
Table 236 \u2013 TL management object alert types \u2013 TPDU received on unregistered port
Table 237 \u2013 TL management object alert types \u2013 TPDU does not match security policies <\/td>\n<\/tr>\n
511<\/td>\n12.2 Energy considerations
12.3 Legacy control system considerations <\/td>\n<\/tr>\n
512<\/td>\n12.4 Overview of object-oriented modeling
12.4.1 General
12.4.2 Object-to-object communication concept <\/td>\n<\/tr>\n
513<\/td>\n12.4.3 AL structure
12.4.4 UAP structure
Figure 110 \u2013 User application objects in a UAP <\/td>\n<\/tr>\n
514<\/td>\n12.5 Object model <\/td>\n<\/tr>\n
515<\/td>\n12.6 Object attribute model
12.6.1 General <\/td>\n<\/tr>\n
516<\/td>\n12.6.2 Attributes of standard objects
12.6.3 Attribute classification <\/td>\n<\/tr>\n
517<\/td>\n12.6.4 Attribute accessibility
12.7 Method model <\/td>\n<\/tr>\n
518<\/td>\n12.8 Alert model
12.9 Alarm state model
Table 238 \u2013 State table for alarm transitions <\/td>\n<\/tr>\n
519<\/td>\n12.10 Event state model
12.10.1 General
12.10.2 State table and transitions
Figure 111 \u2013 Alarm state model
Table 239 \u2013 State table for event transitions <\/td>\n<\/tr>\n
520<\/td>\n12.11 Alert reporting
12.11.1 General
12.11.2 Alert types
Figure 112 \u2013 Event model <\/td>\n<\/tr>\n
521<\/td>\n12.11.3 Alert report information <\/td>\n<\/tr>\n
522<\/td>\n12.11.4 Alarm state recovery
12.12 Communication interaction model
12.12.1 General
12.12.2 Buffered unidirectional publication communication <\/td>\n<\/tr>\n
523<\/td>\n12.12.3 Queued unidirectional communication
12.12.4 Queued bidirectional communication <\/td>\n<\/tr>\n
524<\/td>\nFigure 113 \u2013 A successful example of multiple outstanding requests, with response concatenation <\/td>\n<\/tr>\n
526<\/td>\nFigure 114 \u2013 An example of multiple outstanding unordered requests, with second write request initially unsuccessful <\/td>\n<\/tr>\n
527<\/td>\nFigure 115 \u2013 An example of multiple outstanding ordered requests, with second write request initially unsuccessful <\/td>\n<\/tr>\n
529<\/td>\nFigure 116 \u2013 Send window example 1, with current send window smaller than maximum send window
Figure 117 \u2013 Send window example 2, with current send window the same size as maximum send window, and non-zero usable send window width <\/td>\n<\/tr>\n
530<\/td>\nFigure 118 \u2013 Send window example 3, with current send window the same size as maximum send window, and usable send window width of zero <\/td>\n<\/tr>\n
531<\/td>\n12.12.5 Communication service contract <\/td>\n<\/tr>\n
532<\/td>\n12.13 AL addressing
12.13.1 General
12.13.2 Object addressing
Figure 119 \u2013 General addressing model <\/td>\n<\/tr>\n
533<\/td>\n12.13.3 Object attribute addressing
12.13.4 Object attribute addressing <\/td>\n<\/tr>\n
535<\/td>\n12.13.5 Object method addressing
12.14 Management objects <\/td>\n<\/tr>\n
536<\/td>\n12.15 User objects
12.15.1 General
12.15.2 Industry-independent objects <\/td>\n<\/tr>\n
537<\/td>\nTable 240 \u2013 UAP management object attributes (1 of 2) <\/td>\n<\/tr>\n
539<\/td>\nFigure 120 \u2013 UAP management object state diagram
Table 241 \u2013 State table for UAP management object
Table 242 \u2013 UAP management object methods <\/td>\n<\/tr>\n
540<\/td>\nTable 243 \u2013 Alert-receiving object attributes <\/td>\n<\/tr>\n
541<\/td>\nFigure 121 \u2013 Alert report reception state diagram
Figure 122 \u2013 Alert-reporting example
Table 244 \u2013 State table for handling an AlertReport reception <\/td>\n<\/tr>\n
542<\/td>\nTable 245 \u2013 AlertReceiving object methods <\/td>\n<\/tr>\n
543<\/td>\nTable 246 \u2013 UploadDownload object attributes (1 of 4) <\/td>\n<\/tr>\n
548<\/td>\nTable 247 \u2013 UploadDownload object methods <\/td>\n<\/tr>\n
549<\/td>\nTable 248 \u2013 UploadDownload object StartDownload method <\/td>\n<\/tr>\n
550<\/td>\nTable 249 \u2013 UploadDownload object DownloadData method <\/td>\n<\/tr>\n
552<\/td>\nTable 250 \u2013 UploadDownload object EndDownload method <\/td>\n<\/tr>\n
553<\/td>\nTable 251 \u2013 UploadDownload object StartUpload method <\/td>\n<\/tr>\n
554<\/td>\nTable 252 \u2013 UploadDownload object UploadData method <\/td>\n<\/tr>\n
555<\/td>\nTable 253 \u2013 UploadDownload object EndUpload method <\/td>\n<\/tr>\n
556<\/td>\nTable 254 \u2013 Download state table for unicast operation mode (1 of 2) <\/td>\n<\/tr>\n
558<\/td>\nFigure 123 \u2013 UploadDownload object download state diagram
Figure 124 \u2013 UploadDownload object upload state diagram <\/td>\n<\/tr>\n
559<\/td>\nTable 255 \u2013 Upload state table for unicast operation mode (1 of 2) <\/td>\n<\/tr>\n
561<\/td>\nTable 256 \u2013 Concentrator object attributes (1 of 2) <\/td>\n<\/tr>\n
562<\/td>\nTable 257 \u2013 Concentrator object methods <\/td>\n<\/tr>\n
563<\/td>\nTable 258 \u2013 Dispersion object attributes (1 of 2) <\/td>\n<\/tr>\n
564<\/td>\nTable 259 \u2013 Dispersion object methods <\/td>\n<\/tr>\n
565<\/td>\nTable 260 \u2013 Tunnel object attributes (1 of 3) <\/td>\n<\/tr>\n
567<\/td>\nTable 261 \u2013 Tunnel object methods <\/td>\n<\/tr>\n
568<\/td>\nTable 262 \u2013 Interface object attributes
Table 263 \u2013 Interface object methods <\/td>\n<\/tr>\n
569<\/td>\n12.16 Data types
12.16.1 Basic data types
12.16.2 Derived atomic data types
12.16.3 Industry-independent standard data structures <\/td>\n<\/tr>\n
570<\/td>\nTable 264 \u2013 Data type: ObjectAttributeIndexAndSize <\/td>\n<\/tr>\n
571<\/td>\nTable 265 \u2013 Data type: Communication association endpoint (1 of 2) <\/td>\n<\/tr>\n
573<\/td>\nTable 266 \u2013 Data type: Communication contract data <\/td>\n<\/tr>\n
574<\/td>\nTable 267 \u2013 Data type: Alert communication endpoint
Table 268 \u2013 Data type: Tunnel endpoint <\/td>\n<\/tr>\n
575<\/td>\nTable 269 \u2013 Data type: Alert report descriptor
Table 270 \u2013 Data type: Process control alarm report descriptorfor analog with single reference condition <\/td>\n<\/tr>\n
576<\/td>\n12.17 Application services provided by application sublayer
12.17.1 General
Table 271 \u2013 Data type: ObjectIDandType
Table 272 \u2013 Data type: UnscheduledCorrespondent <\/td>\n<\/tr>\n
577<\/td>\n12.17.2 Publish\/subscribe application communication model
Table 273 \u2013 AL services <\/td>\n<\/tr>\n
578<\/td>\n12.17.3 Scheduled periodic buffered communication <\/td>\n<\/tr>\n
579<\/td>\nFigure 125 \u2013 Publish sequence of service primitives <\/td>\n<\/tr>\n
581<\/td>\nTable 274 \u2013 Publish service <\/td>\n<\/tr>\n
583<\/td>\n12.17.4 Client\/server interactions <\/td>\n<\/tr>\n
584<\/td>\nFigure 126 \u2013 Client\/server model two-part interactions
Figure 127 \u2013 Client\/server model four-part interactions: Successful delivery <\/td>\n<\/tr>\n
585<\/td>\nFigure 128 \u2013 Client\/server model four-part interactions: Request delivery failure
Figure 129 \u2013 Client\/server model four-part interactions: Response delivery failure <\/td>\n<\/tr>\n
587<\/td>\nTable 275 \u2013 Read service <\/td>\n<\/tr>\n
592<\/td>\nTable 276 \u2013 Write service <\/td>\n<\/tr>\n
596<\/td>\nTable 277 \u2013 Execute service <\/td>\n<\/tr>\n
599<\/td>\n12.17.5 Unscheduled acyclic queued unidirectional messages (source\/sink) <\/td>\n<\/tr>\n
600<\/td>\nFigure 130 \u2013 AlertReport and AlertAcknowledge, delivery success
Figure 131 \u2013 AlertReport, delivery failure <\/td>\n<\/tr>\n
601<\/td>\nFigure 132 \u2013 AlertReport, acknowledgment failure <\/td>\n<\/tr>\n
602<\/td>\nTable 278 \u2013 AlertReport service <\/td>\n<\/tr>\n
605<\/td>\nTable 279 \u2013 AlertAcknowledge service <\/td>\n<\/tr>\n
606<\/td>\n12.17.6 Client\/server and source\/sink commonalities <\/td>\n<\/tr>\n
608<\/td>\nFigure 133 \u2013 Concatenated response for multiple outstanding write requests(no message loss) <\/td>\n<\/tr>\n
609<\/td>\nTable 280 \u2013 Tunnel service <\/td>\n<\/tr>\n
612<\/td>\n12.18 AL flow use of lower layer services
12.18.1 General
12.18.2 AL use of TDSAPs
12.18.3 Mapping AL service primitives to TL service primitives
Table 281 \u2013 Application flow characteristics <\/td>\n<\/tr>\n
613<\/td>\n12.19 AL management
12.19.1 General
12.19.2 Application sublayer handling of malformed application protocol data units
Table 282 \u2013 AL service primitive to TL service primitive mapping <\/td>\n<\/tr>\n
614<\/td>\n12.19.3 Application sublayer management object attributes
Figure 134 \u2013 Management and handling of malformed APDUs received from device X <\/td>\n<\/tr>\n
615<\/td>\nTable 283 \u2013 ASLMO attributes (1 of 2) <\/td>\n<\/tr>\n
616<\/td>\n12.19.4 Application sublayer management object methods
Table 284 \u2013 Application sublayer management object methods <\/td>\n<\/tr>\n
617<\/td>\n12.19.5 Application sublayer management object alerts
Table 285 \u2013 Reset method <\/td>\n<\/tr>\n
618<\/td>\n12.19.6 DMAP services invoked by application sublayer
Table 286 \u2013 ASLMO alerts <\/td>\n<\/tr>\n
619<\/td>\n12.19.7 Process industries standard objects <\/td>\n<\/tr>\n
621<\/td>\nTable 287 \u2013 Analog input object attributes <\/td>\n<\/tr>\n
622<\/td>\nTable 288 \u2013 Analog input object methods <\/td>\n<\/tr>\n
623<\/td>\nTable 289 \u2013 Analog input alerts <\/td>\n<\/tr>\n
624<\/td>\nTable 290 \u2013 Analog output attributes (1 of 2) <\/td>\n<\/tr>\n
625<\/td>\nTable 291 \u2013 Analog output object methods <\/td>\n<\/tr>\n
626<\/td>\nTable 292 \u2013 Analog output alerts <\/td>\n<\/tr>\n
627<\/td>\nTable 293 \u2013 Binary input object attributes <\/td>\n<\/tr>\n
628<\/td>\nTable 294 \u2013 Binary input object methods
Table 295 \u2013 Binary input alerts <\/td>\n<\/tr>\n
629<\/td>\nTable 296 \u2013 Binary output attributes <\/td>\n<\/tr>\n
630<\/td>\n12.19.8 Factory automation industries profile
Table 297 \u2013 Binary output object methods
Table 298 \u2013 Binary output alerts <\/td>\n<\/tr>\n
631<\/td>\n12.20 Process control industry standard data structures
12.20.1 General
12.20.2 Status for analog information <\/td>\n<\/tr>\n
632<\/td>\n12.20.3 Value and status for analog information
12.20.4 Value and status for binary information
Table 299 \u2013 Status octet
Table 300 \u2013 Data type: Process control value and status for analog value <\/td>\n<\/tr>\n
633<\/td>\n12.20.5 Process control mode
Table 301 \u2013 Data type: Process control value and status for binary value
Table 302 \u2013 Data type: Process control mode
Table 303 \u2013 Data type: Process control mode bitstring <\/td>\n<\/tr>\n
634<\/td>\n12.20.6 Scaling
12.21 Additional tables
12.21.1 Process control profile standard objects
Table 304 \u2013 Data type: Process control scaling
Table 305 \u2013 Process control standard objects <\/td>\n<\/tr>\n
635<\/td>\n12.21.2 Services
12.22 Coding
12.22.1 General
12.22.2 Coding rules for application protocol data units
Table 306 \u2013 Services
Table 307 \u2013 Application messaging format <\/td>\n<\/tr>\n
636<\/td>\nTable 308 \u2013 Concatenated APDUs in a single TSDU
Table 309 \u2013 Object addressing <\/td>\n<\/tr>\n
637<\/td>\nTable 310 \u2013 Four-bit addressing mode APDU header construction
Table 311 \u2013 Eight-bit addressing mode APDU header construction
Table 312 \u2013 Sixteen-bit addressing mode APDU header construction <\/td>\n<\/tr>\n
638<\/td>\nTable 313 \u2013 Inferred addressing use case example
Table 314 \u2013 Inferred addressing mode APDU header construction <\/td>\n<\/tr>\n
639<\/td>\nTable 315 \u2013 Six-bit attribute identifier, not indexed
Table 316 \u2013 Six-bit attribute identifier, singly indexed, with 7bit index
Table 317 \u2013 Six-bit attribute identifier, singly indexed, with 15bit index <\/td>\n<\/tr>\n
640<\/td>\nTable 318 \u2013 Six-bit attribute identifier, doubly indexed, with two 7bit indices
Table 319 \u2013 Six-bit attribute identifier, doubly indexed, with two 15bit indices
Table 320 \u2013 Six-bit attribute identifier, doubly indexed, withfirst index seven bits long and second index fifteen bits long
Table 321 \u2013 Six-bit attribute bit attribute identifier, doubly indexed, with first index fifteen bits long and second index seven bits long <\/td>\n<\/tr>\n
641<\/td>\nTable 322 \u2013 Twelve-bit attribute identifier, not indexed
Table 323 \u2013 Twelve-bit attribute identifier, singly indexed with 7bit index
Table 324 \u2013 Twelve-bit attribute identifier, singly indexed with 15bit index
Table 325 \u2013 Twelve-bit attribute identifier, doubly indexed with two 7bit indices <\/td>\n<\/tr>\n
642<\/td>\nTable 326 \u2013 Twelve-bit attribute identifier, doubly indexed with two 15bit indices
Table 327 \u2013 Twelve-bit attribute identifier, doubly indexedwith first index 7 bits long and second index 15 bits long
Table 328 \u2013 Twelve-bit attribute identifier, doubly indexedwith the first index 15 bits long and the second index 7 bits long
Table 329 \u2013 Twelve-bit attribute identifier, reserved form <\/td>\n<\/tr>\n
643<\/td>\nTable 330 \u2013 Coding rules for read service request
Table 331 \u2013 Coding rules for read service response with 7-bit size field
Table 332 \u2013 Coding rules for read service response with 15-bit size field <\/td>\n<\/tr>\n
644<\/td>\nTable 333 \u2013 Coding rules for write service request with 7bit size field
Table 334 \u2013 Coding rules for write service request with 15bit size field
Table 335 \u2013 Coding rules for write service response <\/td>\n<\/tr>\n
645<\/td>\nTable 336 \u2013 Coding rules for execute service request with 7bit size field
Table 337 \u2013 Coding rules for execute service request with 15bit size field
Table 338 \u2013 Coding rules for execute service response with 7-bit size field <\/td>\n<\/tr>\n
646<\/td>\nTable 339 \u2013 Coding rules for execute service response with 15-bit size field
Table 340 \u2013 Coding rules for tunnel service request with 7-bit size field
Table 341 \u2013 Coding rules for tunnel service request with 15-bit size field
Table 342 \u2013 Coding rules for tunnel service response with 7-bit size field <\/td>\n<\/tr>\n
647<\/td>\nTable 343 \u2013 Coding rules for tunnel service response with 15-bit size field
Table 344 \u2013 Coding rules for AlertReport service with 7-bit associated-data size field
Table 345 \u2013 Coding rules for AlertReport service with 15-bit associated-data size field <\/td>\n<\/tr>\n
648<\/td>\nTable 346 \u2013 Coding rules for AlertAcknowledge service
Table 347 \u2013 Coding rules for publish service for a native sequence of values
Table 348 \u2013 Coding rules for publish service \u2013 non-native (for tunnel support)
Table 349 \u2013 Coding rules for concatenate service <\/td>\n<\/tr>\n
649<\/td>\n12.22.3 Coding of application data
Table 350 \u2013 General coding rule for size-invariant application data
Table 351 \u2013 General coding rule for size-varying application data of 0..255 octets <\/td>\n<\/tr>\n
651<\/td>\nTable 352 \u2013 Coding rules for Unsigned8
Table 353 \u2013 Coding rules for Unsigned16 <\/td>\n<\/tr>\n
652<\/td>\nTable 354 \u2013 Coding rules for Unsigned32
Table 355 \u2013 Coding rules for Unsigned64 <\/td>\n<\/tr>\n
653<\/td>\nTable 356 \u2013 Coding rules for Unsigned128 <\/td>\n<\/tr>\n
654<\/td>\nTable 357 \u2013 Coding rules for single-precision float
Table 358 \u2013 Coding rules for double-precision float <\/td>\n<\/tr>\n
655<\/td>\nTable 359 \u2013 Coding rules for VisibleString
Table 360 \u2013 Coding rules for OctetString <\/td>\n<\/tr>\n
656<\/td>\n12.22.4 Time-related data types
Table 361 \u2013 Coding rules for BitString <\/td>\n<\/tr>\n
657<\/td>\nTable 362 \u2013 Coding rules for TAINetworkTime,and for TAITimeDifference when interpreted as a modulo difference
Table 363 \u2013 Coding rules for TAITimeRounded <\/td>\n<\/tr>\n
659<\/td>\n12.23 Syntax
12.23.1 Application protocol data unit <\/td>\n<\/tr>\n
666<\/td>\n12.23.2 Alert reports and acknowledgments <\/td>\n<\/tr>\n
668<\/td>\n12.23.3 Service feedback code <\/td>\n<\/tr>\n
670<\/td>\n12.23.4 Read, write, and execute
12.23.5 Tunnel <\/td>\n<\/tr>\n
671<\/td>\n12.23.6 End of contained module
12.24 Detailed coding examples (informative)
12.24.1 Read
12.24.2 Tunnel
Table 364 \u2013 Coding example: Read request for a non-indexed attribute
Table 365 \u2013 Coding example: Read response for a non-indexed attribute
Table 366 \u2013 Coding example: Tunnel service request <\/td>\n<\/tr>\n
672<\/td>\n13 Provisioning
13.1 General
13.2 Terms and definitions for devices with various roles or states <\/td>\n<\/tr>\n
674<\/td>\n13.3 Provisioning procedures
13.4 Pre-installed symmetric keys <\/td>\n<\/tr>\n
675<\/td>\n13.5 Provisioning using out-of-band mechanisms
13.6 Provisioning networks
13.6.1 General <\/td>\n<\/tr>\n
676<\/td>\n13.6.2 Provisioning over-the-air using asymmetric cryptography
Figure 135 \u2013 The provisioning network <\/td>\n<\/tr>\n
677<\/td>\n13.6.3 Provisioning over-the-air using an open symmetric join key <\/td>\n<\/tr>\n
678<\/td>\n13.7 State transition diagrams
Figure 136 \u2013 State transition diagrams outlining provisioning steps during a device lifecycle <\/td>\n<\/tr>\n
679<\/td>\nTable 367 \u2013 Factory default settings <\/td>\n<\/tr>\n
681<\/td>\nFigure 137 \u2013 State transition diagram showing various paths to joining a secured network <\/td>\n<\/tr>\n
682<\/td>\n13.8 Device management application protocol objects used during provisioning <\/td>\n<\/tr>\n
683<\/td>\nFigure 138 \u2013 Provisioning objects and interactions <\/td>\n<\/tr>\n
685<\/td>\n13.9 Management objects
13.9.1 Device provisioning object
Table 368 \u2013 Device provisioning object (1 of 6) <\/td>\n<\/tr>\n
690<\/td>\n13.9.2 Device provisioning object methods and alerts
Table 369 \u2013 Reset_To_Default method <\/td>\n<\/tr>\n
691<\/td>\n13.10 Device provisioning service object
13.10.1 Device provisioning service object attributes
Table 370 \u2013 Write symmetric join key method <\/td>\n<\/tr>\n
692<\/td>\nTable 371 \u2013 Device provisioning service object (1 of 4) <\/td>\n<\/tr>\n
695<\/td>\n13.10.2 Device provisioning service object structured attributes <\/td>\n<\/tr>\n
696<\/td>\nTable 372 \u2013 DPSOWhiteListTbl data structure (1 of 2) <\/td>\n<\/tr>\n
697<\/td>\n13.10.3 Device provisioning service object methods <\/td>\n<\/tr>\n
698<\/td>\n13.10.4 Device provisioning service object alerts
Table 373 \u2013 Array manipulation table
Table 374 \u2013 DPSO alert to indicate join by a device not on the WhiteList <\/td>\n<\/tr>\n
699<\/td>\n13.10.5 Summary of attributes that can be provisioned
13.11 Provisioning functions (informative)
13.11.1 General
Table 375 \u2013 DPSO alert to indicate inadequate device join capability <\/td>\n<\/tr>\n
700<\/td>\n13.11.2 Examples of provisioning methods <\/td>\n<\/tr>\n
703<\/td>\nAnnexes
Annex A (informative) User layer\/application profiles
A.1 Overview
A.2 User layer
A.3 Application profile <\/td>\n<\/tr>\n
705<\/td>\nAnnex B (normative) Communication role profiles
B.1 Overview
B.1.1 General
B.1.2 Purpose
B.1.3 System size
B.1.4 Abbreviations and special symbols
B.1.5 Role profiles <\/td>\n<\/tr>\n
706<\/td>\nB.2 System
B.3 System manager
Table B.1 \u2013 Protocol layer device roles
Table B.2 \u2013 Over-the-air upgrades <\/td>\n<\/tr>\n
707<\/td>\nB.4 Security manager
Table B.3 \u2013 Session support profiles <\/td>\n<\/tr>\n
708<\/td>\nB.5 Physical layer
B.6 Data-link layer
B.6.1 General
Table B.4 \u2013 Baseline profiles
Table B.5 \u2013 PhL roles <\/td>\n<\/tr>\n
709<\/td>\nB.6.2 Role profiles
Table B.6 \u2013 DL required for listed roles <\/td>\n<\/tr>\n
710<\/td>\nTable B.7 \u2013 Role profiles: General DLMO attributes
Table B.8 \u2013 Role profiles: dlmo.Device_Capability <\/td>\n<\/tr>\n
711<\/td>\nTable B.9 \u2013 Role profiles: dlmo.Ch (channel-hopping)
Table B.10 \u2013 Role profiles: dlmo.TsTemplate
Table B.11 \u2013 Role profiles: dlmo.Neighbor <\/td>\n<\/tr>\n
712<\/td>\nTable B.12 \u2013 Role profiles: dlmo.NeighborDiag
Table B.13 \u2013 Role profiles: dlmo.Superframe
Table B.14 \u2013 Role profiles: dlmo.Graph <\/td>\n<\/tr>\n
713<\/td>\nB.7 Network layer
Table B.15 \u2013 Role profiles: dlmo.Link
Table B.16 \u2013 Role profiles: dlmo.Route
Table B.17 \u2013 Role profiles: dlmo.Queue_Priority <\/td>\n<\/tr>\n
714<\/td>\nB.8 Transport layer
B.9 Application layer
Table B.18 \u2013 Routing table size
Table B.19 \u2013 Address table size
Table B.20 \u2013 Port support size
Table B.21 \u2013 APs <\/td>\n<\/tr>\n
715<\/td>\nB.10 Provisioning
B.11 Gateway (informative)
Table B.22 \u2013 Role profiles: I\/O, routers, gateways, and backbone routers
Table B.23 \u2013 Role profile: Gateway
Table B.24 \u2013 Role profile: Gateway native access <\/td>\n<\/tr>\n
716<\/td>\nTable B.25 \u2013 Role profile: Gateway interworkable tunnel mechanism <\/td>\n<\/tr>\n
717<\/td>\nAnnex C (informative) Background information
C.1 Industrial needs
C.2 Usage classes
C.2.1 General <\/td>\n<\/tr>\n
718<\/td>\nC.2.2 Class examples
Table C.1 \u2013 Usage classes <\/td>\n<\/tr>\n
719<\/td>\nC.2.3 Other uploading and downloading alarms (human or automated action)
C.3 The Open Systems Interconnection Basic Reference Model
C.3.1 Overview
Figure C.1 \u2013 OSI Basic Reference Model <\/td>\n<\/tr>\n
720<\/td>\nC.3.2 Application layer <\/td>\n<\/tr>\n
721<\/td>\nC.3.3 Transport layer
C.3.4 Network layer
C.3.5 Data-link layer
C.3.6 Physical layer <\/td>\n<\/tr>\n
723<\/td>\nAnnex D (normative) Configuration defaults
D.1 General
D.2 System management
Table D.1 \u2013 System management configuration defaults <\/td>\n<\/tr>\n
724<\/td>\nD.3 Security
D.4 Data-link layer
Table D.2 \u2013 Security configuration defaults <\/td>\n<\/tr>\n
725<\/td>\nTable D.3 \u2013 DLE configuration defaults <\/td>\n<\/tr>\n
726<\/td>\nD.5 Network layer
D.6 Transport layer
D.7 Application layer
Table D.4 \u2013 NLE configuration defaults
Table D.5 \u2013 TLE configuration defaults <\/td>\n<\/tr>\n
727<\/td>\nTable D.6 \u2013 ALE configuration defaults <\/td>\n<\/tr>\n
728<\/td>\nD.8 Provisioning <\/td>\n<\/tr>\n
729<\/td>\nD.9 Gateway (informative)
Table D.7 \u2013 Provisioning configuration defaults
Table D.8 \u2013 Gateway configuration defaults <\/td>\n<\/tr>\n
730<\/td>\nAnnex E (informative) Use of backbone networks
E.1 General
E.2 Recommended characteristics
E.3 Internet protocol backbones
E.3.1 Methods of IPv6 protocol data unit transmission <\/td>\n<\/tr>\n
731<\/td>\nE.3.2 Backbone router peer device discovery
E.3.3 Security <\/td>\n<\/tr>\n
733<\/td>\nAnnex F (normative) Basic security concepts \u2013 Notation and representation
F.1 Strings and string operations
F.2 Integers, octets, and their representation
F.3 Entities <\/td>\n<\/tr>\n
734<\/td>\nAnnex G (informative) Using certificate chains for over-the-air provisioning <\/td>\n<\/tr>\n
735<\/td>\nAnnex H (normative) Security building blocks
H.1 Symmetric key cryptographic building blocks
H.1.1 Overview
H.1.2 Symmetric key domain parameters
H.1.3 Block cipher
H.1.4 Mode of operation
H.1.5 Cryptographic hash function
H.1.6 Keyed hash function for message authentication <\/td>\n<\/tr>\n
736<\/td>\nH.1.7 Specialized keyed hash function for message authentication
H.1.8 Challenge domain parameters
H.2 Asymmetric-key cryptographic building blocks
H.2.1 General
H.2.2 Elliptic curve domain parameters
H.2.3 Elliptic curve point representation
H.2.4 Elliptic curve public-key pair
H.3 Keying information
H.3.1 General <\/td>\n<\/tr>\n
737<\/td>\nH.3.2 Elliptic curve cryptography implicit certificates
H.3.3 Elliptic curve cryptography manual certificates <\/td>\n<\/tr>\n
738<\/td>\nH.3.4 Additional information
H.4 Key agreement schemes
H.4.1 Symmetric-key key agreement scheme
H.4.2 Asymmetric-key key agreement scheme
H.5 Keying information schemes
H.5.1 Implicit certificate scheme <\/td>\n<\/tr>\n
739<\/td>\nH.5.2 Manual certificate scheme
H.6 Challenge domain parameter generation and validation
H.6.1 Overview
H.6.2 Challenge domain parameter generation
H.6.3 Challenge domain parameter verification <\/td>\n<\/tr>\n
740<\/td>\nH.7 Challenge validation primitive
H.8 Secret key generation (SKG) primitive <\/td>\n<\/tr>\n
741<\/td>\nH.9 Block-cipher-based cryptographic hash function <\/td>\n<\/tr>\n
742<\/td>\nH.10 Elliptic curve cryptography manual certificate scheme
H.10.1 Overview <\/td>\n<\/tr>\n
743<\/td>\nH.10.2 Elliptic curve cryptography manual certificate generation transformation
H.10.3 Elliptic curve cryptography manual certificate processing transformation <\/td>\n<\/tr>\n
745<\/td>\nAnnex I (informative) Definition templates
I.1 Object type template
I.2 Standard object attributes template
Table I.1 \u2013 Table of standard object types <\/td>\n<\/tr>\n
746<\/td>\nI.3 Standard object methods
Table I.2 \u2013 Template for standard object attributes <\/td>\n<\/tr>\n
747<\/td>\nI.4 Standard object alert reporting template
Table I.3 \u2013 Template for standard object methods <\/td>\n<\/tr>\n
748<\/td>\nI.5 Data structure definition
Table I.4 \u2013 Template for standard object alert reporting <\/td>\n<\/tr>\n
749<\/td>\nTable I.5 \u2013 Template for data structures <\/td>\n<\/tr>\n
750<\/td>\nAnnex J (informative) Operations on attributes
J.1 Operations on attributes
J.1.1 General
J.1.2 Attribute classification
J.1.3 Retrieving, setting, and resetting attributes <\/td>\n<\/tr>\n
751<\/td>\nJ.1.4 Retrieving and setting structured attributes
Table J.1 \u2013 Scheduled_Write method template <\/td>\n<\/tr>\n
752<\/td>\nTable J.2 \u2013 Read_Row method template
Table J.3 \u2013 Write_Row method template <\/td>\n<\/tr>\n
753<\/td>\nJ.1.5 Resetting structured attribute values
J.1.6 Deleting structured attribute values
Table J.4 \u2013 Reset_Row method template <\/td>\n<\/tr>\n
754<\/td>\nJ.2 Synchronized cutover
Table J.5 \u2013 Delete_Row method template <\/td>\n<\/tr>\n
755<\/td>\nAnnex K (normative) Standard object types <\/td>\n<\/tr>\n
756<\/td>\nTable K.1 \u2013 Standard object types <\/td>\n<\/tr>\n
758<\/td>\nTable K.2 \u2013 Standard object instances <\/td>\n<\/tr>\n
760<\/td>\nAnnex L (informative) Standard data types
Table L.1 \u2013 Standard data types <\/td>\n<\/tr>\n
762<\/td>\nAnnex M (normative) Identification of tunneled legacy fieldbus protocols
Table M.1 \u2013 Identification of tunneled legacy fieldbus protocols <\/td>\n<\/tr>\n
763<\/td>\nAnnex N (informative) Tunneling and native object mapping
N.1 Overview
N.2 Tunneling
N.3 Foreign protocol application communication <\/td>\n<\/tr>\n
764<\/td>\nN.4 Native object mapping
N.5 Tunneling and native object mapping tradeoffs <\/td>\n<\/tr>\n
765<\/td>\nAnnex O (informative) Generic protocol translation
O.1 Overview
O.2 Publish
Figure O.1 \u2013 Generic protocol translation publish diagram <\/td>\n<\/tr>\n
766<\/td>\nO.3 Subscribe
Figure O.2 \u2013 Generic protocol translation subscribe diagram <\/td>\n<\/tr>\n
767<\/td>\nO.4 Client
Figure O.3 \u2013 Generic protocol translation client\/server transmission diagram <\/td>\n<\/tr>\n
768<\/td>\nO.5 Server
Figure O.4 \u2013 Generic protocol translation client\/server reception diagram <\/td>\n<\/tr>\n
769<\/td>\nAnnex P (informative) Exemplary GIAP adaptations for this standard
P.1 General
P.2 Parameters
P.3 Session
P.4 Lease <\/td>\n<\/tr>\n
770<\/td>\nP.5 Device list report
P.6 Topology report
P.7 Schedule report
P.8 Device health report
P.9 Neighbor health report
P.10 Network health report
P.11 Time
P.12 Client\/server
P.12.1 General
P.12.2 Native access <\/td>\n<\/tr>\n
771<\/td>\nP.12.3 Foreign access
P.13 Publish\/subscribe
P.13.1 General
P.13.2 Native access <\/td>\n<\/tr>\n
772<\/td>\nP.13.3 Foreign access
P.14 Bulk transfer
P.15 Alert <\/td>\n<\/tr>\n
773<\/td>\nP.16 Gateway configuration
P.17 Device configuration <\/td>\n<\/tr>\n
774<\/td>\nAnnex Q (informative) Exemplary GIAP adaptations for IEC 62591
Q.1 General
Q.1.1 Overview
Q.1.2 Reference
Q.1.3 Addressing
Q.1.4 Stack interface <\/td>\n<\/tr>\n
775<\/td>\nQ.1.5 Tunneling
Q.1.6 Entities
Q.1.7 Delayed response
Q.2 Parameters
Q.3 Session <\/td>\n<\/tr>\n
776<\/td>\nQ.4 Lease
Q.5 Device list report
Q.6 Topology report <\/td>\n<\/tr>\n
777<\/td>\nQ.7 Schedule report
Q.8 Device health report <\/td>\n<\/tr>\n
778<\/td>\nQ.9 Neighbor health report
Q.10 Network health report <\/td>\n<\/tr>\n
779<\/td>\nQ.11 Time
Q.12 Client\/server <\/td>\n<\/tr>\n
780<\/td>\nQ.13 Publish\/subscribe
Q.13.1 General
Q.13.2 Lease establishment <\/td>\n<\/tr>\n
781<\/td>\nQ.13.3 Buffering
Q.14 Bulk transfer
Q.15 Alert <\/td>\n<\/tr>\n
782<\/td>\nQ.16 Gateway configuration
Q.17 Device configuration <\/td>\n<\/tr>\n
783<\/td>\nAnnex R (informative) Host system interface to standard-compliant devices via a gateway
R.1 Background
R.1.1 Host system integration reference model
R.1.2 Asset management tools
R.1.3 Configuration tools
Figure R.1 \u2013 Host integration reference model <\/td>\n<\/tr>\n
784<\/td>\nR.1.4 Distributed control system
R.1.5 Gateway
R.2 Device application data integration with host systems
R.2.1 General
R.2.2 Native protocol integration via mapping
R.2.3 Legacy device protocol integration via tunneling
R.3 Host system configuration tool
R.3.1 General
R.3.2 Host configuration using electronic device description language <\/td>\n<\/tr>\n
785<\/td>\nR.3.3 Host configuration using field device tool\/device type manager
Figure R.2 \u2013 Configuration using an electronic device definition <\/td>\n<\/tr>\n
786<\/td>\nR.4 Field device\/distributed control systems integration
R.4.1 General
R.4.2 Foundation Fieldbus High Speed Ethernet
R.4.3 Modbus
R.4.4 Open connectivity for industrial automation
Figure R.3 \u2013 Configuration using FDT\/DTM approach <\/td>\n<\/tr>\n
787<\/td>\nR.5 Gateway
R.5.1 General
R.5.2 Devices supported
R.5.3 Data subscription
R.5.4 Data publication
R.5.5 Client\/server access
R.5.6 Alerts reception
R.6 Asset management application support
R.6.1 General <\/td>\n<\/tr>\n
788<\/td>\nR.6.2 Field device tool \/ device type manager
R.6.3 HART
R.6.4 OPC <\/td>\n<\/tr>\n
789<\/td>\nAnnex S (informative) Symmetric-key operation test vectors
S.1 DPDU samples
S.1.1 General
S.1.2 DPDU with expected DMIC32
S.1.3 DPDU with expected ENC-DMIC32 <\/td>\n<\/tr>\n
790<\/td>\nS.2 TPDU samples
S.2.1 General
S.2.2 TPDU with expected ENC-TMIC-32:
S.2.3 TPDU with expected TMIC-32: <\/td>\n<\/tr>\n
792<\/td>\nAnnex T (informative) Data-link and network headers for join requests
T.1 Overview
T.2 MAC header (MHR)
T.3 DL header (DHR)
Table T.1 \u2013 Sample MHR for join request <\/td>\n<\/tr>\n
793<\/td>\nT.4 NL header
Table T.2 \u2013 Sample DHR for join request
Table T.3 \u2013 Network header for join messages <\/td>\n<\/tr>\n
794<\/td>\nAnnex U (informative) Gateway role
U.1 General
U.1.1 Overview <\/td>\n<\/tr>\n
795<\/td>\nU.1.2 Notional gateway protocol suite diagrams for native devices and adapters
U.1.3 Gateway scenarios <\/td>\n<\/tr>\n
796<\/td>\nFigure U.1 \u2013 Gateway scenarios <\/td>\n<\/tr>\n
797<\/td>\nU.1.4 Basic gateway model
Figure U.2 \u2013 Basic gateway model <\/td>\n<\/tr>\n
798<\/td>\nU.2 Notional GIAP
U.2.1 Summary of interfaces and primitives <\/td>\n<\/tr>\n
799<\/td>\nTable U.1 \u2013 Summary of notional gateway high-side interface examples <\/td>\n<\/tr>\n
801<\/td>\nU.2.2 Sequence of primitives
Figure U.3 \u2013 Internal sequence of primitives for session interface
Figure U.4 \u2013 Internal sequence of primitives for lease management interface <\/td>\n<\/tr>\n
802<\/td>\nFigure U.5 \u2013 Internal sequence of primitives for system report interfaces
Figure U.6 \u2013 Internal sequence of primitives for time interface <\/td>\n<\/tr>\n
803<\/td>\nFigure U.7 \u2013 Internal sequence of primitives forclient\/server interface initiated from gateway to an adapter device
Figure U.8 \u2013 Internal sequence of primitives forpublish interface initiated from gateway to an adapter device <\/td>\n<\/tr>\n
804<\/td>\nFigure U.9 \u2013 Internal sequence of primitives for subscribe interface initiated from an adapter device
Figure U.10 \u2013 Internal sequence of primitives forpublisher timer initiated from gateway to an adapter device
Figure U.11 \u2013 Internal sequence of primitives forsubscriber timers initiated from an adapter device <\/td>\n<\/tr>\n
805<\/td>\nFigure U.12 \u2013 Internal sequence of primitives for the bulk transfer interface
Figure U.13 \u2013 Internal sequence of primitives for the alert subscription interface <\/td>\n<\/tr>\n
806<\/td>\nU.2.3 Detailed description of parameters
Figure U.14 \u2013 Internal sequence of primitives for the alert notification interface
Figure U.15 \u2013 Internal sequence of primitives for gateway management interfaces <\/td>\n<\/tr>\n
808<\/td>\nU.2.4 Detailed description of interfaces
Table U.2 \u2013 Primitive G_Session parameter usage <\/td>\n<\/tr>\n
810<\/td>\nTable U.3 \u2013 GS_Status for G_Session confirm <\/td>\n<\/tr>\n
811<\/td>\nTable U.4 \u2013 Primitive G_Lease parameter usage <\/td>\n<\/tr>\n
812<\/td>\nTable U.5 \u2013 GS_Lease_Type for G_Lease request <\/td>\n<\/tr>\n
813<\/td>\nTable U.6 \u2013 GS_Status for G_Lease confirm <\/td>\n<\/tr>\n
814<\/td>\nTable U.7 \u2013 Primitive G_Device_List_Report parameter usage <\/td>\n<\/tr>\n
815<\/td>\nTable U.8 \u2013 GS_Status for G_Device_List_Report confirm
Table U.9 \u2013 Primitive G_Topology_Report parameter usage <\/td>\n<\/tr>\n
817<\/td>\nTable U.10 \u2013 Primitive G_Schedule_Report parameter usage <\/td>\n<\/tr>\n
819<\/td>\nTable U.11 \u2013 Primitive G_Device_Health_Report parameter usage <\/td>\n<\/tr>\n
820<\/td>\nTable U.12 \u2013 Primitive G_Neighbor_Health_Report parameter usage <\/td>\n<\/tr>\n
822<\/td>\nTable U.13 \u2013 Primitive G_Network_Health_Report parameter usage <\/td>\n<\/tr>\n
824<\/td>\nTable U.14 \u2013 Primitive G_Time parameter usage
Table U.15 \u2013 GS_Status for G_Time confirm <\/td>\n<\/tr>\n
825<\/td>\nTable U.16 \u2013 Primitive G_Client_Server parameter usage <\/td>\n<\/tr>\n
826<\/td>\nTable U.17 \u2013 GS_Status for G_Client_Server confirm <\/td>\n<\/tr>\n
828<\/td>\nTable U.18 \u2013 Primitive G_Publish parameter usage <\/td>\n<\/tr>\n
829<\/td>\nTable U.19 \u2013 GS_Status for G_Publish confirm
Table U.20 \u2013 Primitive G_Subscribe parameter usage <\/td>\n<\/tr>\n
830<\/td>\nTable U.21 \u2013 GS_Status for G_Subscribe confirm
Table U.22 \u2013 Primitive G_Publish_Timer parameter usage
Table U.23 \u2013 Primitive G_Subscribe_Timer parameter usage <\/td>\n<\/tr>\n
831<\/td>\nTable U.24 \u2013 Primitive G_Publish_Watchdog parameter usage <\/td>\n<\/tr>\n
832<\/td>\nTable U.25 \u2013 Primitive G_Bulk_Open parameter usage <\/td>\n<\/tr>\n
833<\/td>\nTable U.26 \u2013 GS_Status for G_Bulk_Open confirm
Table U.27 \u2013 Primitive G_Bulk_Transfer parameter usage
Table U.28 \u2013 GS_Status for G_Bulk_Transfer confirm <\/td>\n<\/tr>\n
834<\/td>\nTable U.29 \u2013 Primitive G_Bulk_Close parameter usage <\/td>\n<\/tr>\n
835<\/td>\nTable U.30 \u2013 Primitive G_Alert_Subscription parameter usage <\/td>\n<\/tr>\n
836<\/td>\nTable U.31 \u2013 GS_Status for G_Alert_Subscription confirm
Table U.32 \u2013 Primitive G_Alert_Notification parameter usage <\/td>\n<\/tr>\n
837<\/td>\nTable U.33 \u2013 Primitive G_Read_Gateway_Configuration parameter usage <\/td>\n<\/tr>\n
838<\/td>\nTable U.34 \u2013 GS_Attribute_Identifier values for G_Read_Gateway_Configuration request
Table U.35 \u2013 Primitive G_Write_Gateway_Configuration parameter usage <\/td>\n<\/tr>\n
839<\/td>\nTable U.36 \u2013 GS_Attribute_Identifier values for G_Write_Gateway_Configuration request
Table U.37 \u2013 GS_Status for G_Write_Gateway_Configuration confirm <\/td>\n<\/tr>\n
840<\/td>\nTable U.38 \u2013 Primitive G_Write_Device_Configuration parameter usage <\/td>\n<\/tr>\n
841<\/td>\nTable U.39 \u2013 GS_Status for G_Write_Device_Configuration confirm
Table U.40 \u2013 Primitive G_Read_Device_Configuration parameter usage <\/td>\n<\/tr>\n
842<\/td>\nU.3 Example uses of WISN standard services and objects
U.3.1 Tunneling
Figure U.16 \u2013 Tunnel object model <\/td>\n<\/tr>\n
843<\/td>\nFigure U.17 \u2013 Distributed tunnel endpoints <\/td>\n<\/tr>\n
844<\/td>\nFigure U.18 \u2013 Multicast, broadcast, and one-to-many messaging <\/td>\n<\/tr>\n
845<\/td>\nFigure U.19 \u2013 Tunnel object buffering <\/td>\n<\/tr>\n
848<\/td>\nFigure U.20 \u2013 Publish\/subscribe publisher CoSt flowchart
Figure U.21 \u2013 Publish\/subscribe publisher periodic flowchart <\/td>\n<\/tr>\n
849<\/td>\nFigure U.22 \u2013 Publish\/subscribe subscriber common periodic and CoSt flowchart <\/td>\n<\/tr>\n
850<\/td>\nFigure U.23 \u2013 Network address mappings <\/td>\n<\/tr>\n
851<\/td>\nFigure U.24 \u2013 Connection_Info usage in protocol translation <\/td>\n<\/tr>\n
852<\/td>\nFigure U.25 \u2013 Transaction_Info usage in protocol translation <\/td>\n<\/tr>\n
853<\/td>\nFigure U.26 \u2013 Interworkable tunneling mechanism overview diagram <\/td>\n<\/tr>\n
855<\/td>\nU.3.2 Bulk transfer <\/td>\n<\/tr>\n
856<\/td>\nU.3.3 Alerts
Figure U.27 \u2013 Bulk transfer model <\/td>\n<\/tr>\n
857<\/td>\nFigure U.28 \u2013 Alert model <\/td>\n<\/tr>\n
858<\/td>\nU.3.4 Native publish\/subscribe and client\/server access
Figure U.29 \u2013 Alert cascading <\/td>\n<\/tr>\n
859<\/td>\nU.3.5 Time management
Figure U.30 \u2013 Native publish\/subscribe and client\/server access <\/td>\n<\/tr>\n
860<\/td>\nU.3.6 Security
U.3.7 Configuration <\/td>\n<\/tr>\n
861<\/td>\nU.3.8 Provisioning and joining
Table U.41 \u2013 Example of gateway configuration management attributes <\/td>\n<\/tr>\n
862<\/td>\nAnnex V (informative) Compliance with ETSI EN 300 328 v1.8.1 <\/td>\n<\/tr>\n
866<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Industrial networks. Wireless communication network and communication profiles. ISA 100.11a<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n872<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244214,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-244206","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244214"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244206"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244206"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}