{"id":244761,"date":"2024-10-19T16:05:14","date_gmt":"2024-10-19T16:05:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-629482017\/"},"modified":"2024-10-25T11:04:41","modified_gmt":"2024-10-25T11:04:41","slug":"bs-en-629482017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-629482017\/","title":{"rendered":"BS EN 62948:2017"},"content":{"rendered":"
This International Standard specifies the system architecture and communication protocol of WIA-FA (Wireless Networks for Industrial Automation \u2212 Factory Automation) based on IEEE STD 802.11-2012 physical layer (PHY).<\/p>\n
This document applies to wireless network systems for factory automation measuring, monitoring and control.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, abbreviated terms, and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 3.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 3.3 Conventions Figures Figure 1 \u2013 Conventions used for state machines <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4 Data coding 4.1 Overview Tables Table 1 \u2013 Conventions used for state transitions <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.2 Basic data type coding 4.2.1 Integer coding 4.2.2 Unsigned coding Figure 2 \u2013 Integer coding Figure 3 \u2013 Unsigned coding Table 2 \u2013 Integer16 coding <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.2.3 Float coding Figure 4 \u2013 Single float coding Table 3 \u2013 Unsigned16 coding <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.2.4 Octetstring coding 4.2.5 BitField coding Figure 5 \u2013 Double float coding Table 4 \u2013 Octetstring coding <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.2.6 Bitstring coding 4.2.7 TimeData coding Table 5 \u2013 Coding of BitField8 data with one octet Table 6 \u2013 Coding of BitField16 data with two octets Table 7 \u2013 Coding of BitField24 data with three octets Table 8 \u2013 Bitstring coding <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.2.8 KeyData coding 4.3 Structured data type coding 4.3.1 Structure type coding 4.3.2 List type coding 5 WIA-FA overview 5.1 Device types 5.1.1 General 5.1.2 Host computer 5.1.3 Gateway device <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.1.4 Access device 5.1.5 Field device 5.1.6 Handheld device 5.2 Network topology <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.3 Protocol architecture Figure 6 \u2013 WIA-FA redundant star topology Figure 7 \u2013 OSI basic reference model mapped to WIA-FA <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Figure 8 \u2013 Protocol architecture of WIA-FA <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6 System management 6.1 Overview Figure 9 \u2013 Data flow over WIA-FA network Figure 10 \u2013 System management scheme <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.2 Device Management Application Process 6.2.1 General Figure 11 \u2013 DMAP of management system <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Table 9 \u2013 Network management functions Table 10 \u2013 Security management functions <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.2.2 Network manager 6.2.3 Security manager 6.2.4 Network management module 6.2.5 Security management module 6.2.6 DMAP state machines <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Figure 12 \u2013 DMAP state machine of gateway device Figure 13 \u2013 DMAP sub-state machine of gateway device for each field device Table 11 \u2013 DMAP state transition of gateway device <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Table 12 \u2013 DMAP sub-state transition of gateway device for each field device <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Figure 14 \u2013 DMAP state machine of a field device Table 13 \u2013 DMAP state transition of a field device <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Figure 15 \u2013 DMAP state machine of an access device Table 14 \u2013 DMAP state transition of an access device <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Table 15 \u2013 Functions used in DMAP state machines <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 6.3 Addressing and address assignment <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.4 Communication resource allocation 6.4.1 General 6.4.2 Communication resource allocation Figure 16 \u2013 Long address structure of device <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6.5 Joining and leave process of field device 6.5.1 Join process of a field device <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.5.2 Communication resource allocation to field device Figure 17 \u2013 Join process of field device <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.5.3 Leaving process of a field device Figure 18 \u2013 Communication resource allocation process for a field device <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.6 Network performance monitoring 6.6.1 Device status report Figure 19 \u2013 Passive leave process of a field device Figure 20 \u2013 Device status report process of field device <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.6.2 Channel condition report 6.7 Management information base and services 6.7.1 Management information base Figure 21 \u2013 Channel condition report process of field device <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Table 16 \u2013 Unstructured attributes <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Table 17 \u2013 Structured attributes Table 18 \u2013 Superframe_StructStructure <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Table 19 \u2013 Link_Struct Structure <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Table 20 \u2013 ChanCon_Struct Structure Table 21 \u2013 Device_Struct Structure <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Table 22 \u2013 Key_Struct Structure <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Table 23 \u2013 VcrEP_StructStructure <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table 24 \u2013 UAOClassDesc_Struct Structure <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Table 25 \u2013 ProDataDesc_Struct Structure <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 6.7.2 MIB services Table 26 \u2013 UAOInstDesc_Struct Structure <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Table 27 \u2013 DMAP-MIB-GET.request parameters Table 28 \u2013 DMAP-MIB-GET.confirm parameters <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Table 29 \u2013 DMAP-MIB-SET.request parameters <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 7 Physical layer 7.1 General 7.2 General requirements based on IEEE STD 802.11-2012 Table 30 \u2013 DMAP-MIB-SET.confirm parameters Table 31 \u2013 PHY protocol selection <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 7.3 Additional requirements 7.3.1 General 7.3.2 Frequency band 7.3.3 Channel bitmap <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Figure 22 \u2013 BitMap format Table 32 \u2013 Coding of Modulation modes Table 33 \u2013 Channel indices <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 7.3.4 Transmit power 7.3.5 Data rate 8 Data Link Layer 8.1 General 8.1.1 DLL functions 8.1.2 Protocol architecture Table 34 \u2013 Data rate <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 8.1.3 WIA-FA superframe Figure 23 \u2013 WIA-FA DLL protocol architecture Figure 24 \u2013 The template of timeslot <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Figure 25 \u2013 WIA-FA default superframe Table 35 \u2013 Parameters of timeslot template <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 8.1.4 Communication based on multiple access devices Figure 26 \u2013 WIA-FA superframe Figure 27 \u2013 The example of WIA-FA devices multi-channel communication <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Figure 28 \u2013 An example of beacon communication based on multiple ADs <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 8.1.5 Time synchronization Figure 29 \u2013 Process of one-way time synchronization <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 8.1.6 Frame aggregation\/disaggregation Figure 30 \u2013 Process of two-way time synchronization <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 8.1.7 Fragmentation and reassembly 8.1.8 Retransmission Figure 31 \u2013 Aggregation frame payload format <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Figure 32 \u2013 Example of NACK-based retransmission mode <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Figure 33 \u2013 Example of multi-unicast retransmission mode Figure 34 \u2013 Example of multi-broadcast retransmission mode <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 8.2 Data link sub-layer data services 8.2.1 General 8.2.2 DLDE-DATA.request primitive Figure 35 \u2013 Example of GACK-based timeslot backoff mode <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 8.2.3 DLDE-DATA.indication primitive Table 36 \u2013 DLDE-DATA.request primitive parameters <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 8.2.4 Time sequence of DLL data service Figure 36 \u2013 Time sequence of period data service from FD to GW Table 37 \u2013 DLDE-DATA.indication primitive parameters <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 8.3 Data link sub-layer management services 8.3.1 General Figure 37 \u2013 Time sequence of other data service from FD to GW Figure 38 \u2013 Time sequence of data service from GW to FD <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 8.3.2 Network discovery services Table 38 \u2013 Management services Table 39 \u2013 DLME-DISCOVERY.request parameters <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Figure 39 \u2013 Network discovery process Table 40 \u2013 DLME-DISCOVERY.confirm parameters Table 41 \u2013 BeaconDescription_Struct parameters <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 8.3.3 Time synchronization services Table 42 \u2013 DLME-TIME-SYN.indication parameters <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Table 43 \u2013 DLME-TIME-SYN.response parameters Table 44 \u2013 DLME-TIME-SYN.confirm parameters <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 8.3.4 Device joining services Figure 40 \u2013 Time synchronization process <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Table 45 \u2013 DLME-JOIN.request parameters Table 46 \u2013 DLME-JOIN.indication parameters <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Table 47 \u2013 DLME-JOIN.response parameters Table 48 \u2013 DLME-JOIN.confirm parameters <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 8.3.5 Device status report services Figure 41 \u2013 Device join process <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Table 49 \u2013 DLME-DEVICE-STATUS.request parameters Table 50 \u2013 DLME-DEVICE -STATUS.indication parameters Table 51 \u2013 DLME-DEVICE -STATUS.confirm parameters <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 8.3.6 Channel condition report services Figure 42 \u2013 Device status report process Table 52 \u2013 DLME-CHANNEL-CONDITION.request parameters <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Figure 43 \u2013 Channel condition report process Table 53 \u2013 DLME-CHANNEL-CONDITION.indication parameters Table 54 \u2013 DLME-CHANNEL-CONDITION.confirm parameters <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 8.3.7 Remote attribute get services Table 55 \u2013 DLME-INFO-GET.request parameters <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Table 56 \u2013 DLME-INFO-GET.indication parameters <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Table 57 \u2013 DLME-INFO-GET.response parameters <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | Table 58 \u2013 DLME-INFO-GET.confirm parameters <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 8.3.8 Remote attribute set services Figure 44 \u2013 Remote attribute get process <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Table 59 \u2013 DLME-INFO-SET.request parameters <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Table 60 \u2013 DLME-INFO-SET.indication parameters Table 61 \u2013 DLME-INFO-SET.response parameters <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Table 62 \u2013 DLME-INFO-SET.confirm parameters <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 8.3.9 Device leaving services Figure 45 \u2013 Remote attribute set process Table 63 \u2013 DLME-LEAVE.request parameters <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Figure 46 \u2013 Device leave process Table 64 \u2013 DLME-LEAVE.confirm parameters <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 8.4 DLL frame formats 8.4.1 General frame format Figure 47 \u2013 General frame format Figure 48 \u2013 DLL frame header Figure 49 \u2013 DLL frame control format <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 8.4.2 Date frame format Figure 50 \u2013 DLL Date frame format Table 65 \u2013 Frame type coding Table 66 \u2013 Addressing mode subfields <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 8.4.3 Aggregation frame format 8.4.4 NACK frame format 8.4.5 GACK frame format Figure 51 \u2013 DLL Aggregation frame format Figure 52 \u2013 NACK frame format Figure 53 \u2013 NACK information Figure 54 \u2013 GACK frame format Figure 55 \u2013 GACK_Struct Structure <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 8.4.6 Beacon frame format Figure 56 \u2013 DLL Beacon frame format Figure 57 \u2013 Shared timeslot count <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 8.4.7 Join request frame format 8.4.8 Join response frame format 8.4.9 Leave request frame format 8.4.10 Leave response frame format 8.4.11 Device status report frame format Figure 58 \u2013 DLL join request frame format Figure 59 \u2013 DLL join request frame format Figure 60 \u2013 DLL leave request frame format Figure 61 \u2013 DLL leave response frame format Figure 62 \u2013 DLL Device status report frame format <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 8.4.12 Channel condition report frame format 8.4.13 Time synchronization request frame format 8.4.14 Time synchronization response frame format 8.4.15 Remote attribute get request frame format Figure 63 \u2013 DLL Channel condition report frame format Figure 64 \u2013 DLL time synchronization request frame format Figure 65 \u2013 DLL time synchronization response frame format <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 8.4.16 Remote attribute get response frame format 8.4.17 Remote attribute set request frame format Figure 66 \u2013 DLL Remote attribute get request frame format Figure 67 \u2013 DLL remote attribute get response frame format <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 8.4.18 Remote attribute set response frame format 8.5 Data link layer state machines 8.5.1 DLL state machine of access device Figure 68 \u2013 DLL Remote attribute set request frame format Figure 69 \u2013 DLL remote attribute set response frame format <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Figure 70 \u2013 DLL state machine of access device Table 67 \u2013 DLL state transition of access device <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 8.5.2 DLL state machine of field device <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Figure 71 \u2013 DLL state machine of field device Table 68 \u2013 DLL state transition of field device <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 8.5.3 Functions used in DLL state machines <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 9 Wired specifications between GW and AD 9.1 Overview 9.2 Join process of access device 9.3 Frame formats between GW and AD Figure 72 \u2013 General frame format between GW and AD Table 69 \u2013 Functions used in DLL state machines <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | Table 70 \u2013 Frames between GW and AD <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Table 71 \u2013 Payload of AD join request frame Table 72 \u2013 Payload of AD join response frame <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 9.4 Communication based on multiple access device 10 Application Layer 10.1 Overview 10.2 AL protocol stack Table 73 \u2013 Payload of GW requesting AD to send GACK Table 74 \u2013 Definition of GACKInfo_Struct Table 75 \u2013 Payload of GW requesting AD to send NACK <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 10.3 AL functions 10.3.1 Data functions 10.3.2 Management functions Figure 73 \u2013 AL within the protocol architecture of WIA-FA <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 10.3.3 Communication models 10.4 Application data 10.4.1 General 10.4.2 Attribute data 10.4.3 Process data Table 76 \u2013 Communication models between gateway device and field devices <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 10.4.4 Event data Table 77 \u2013 EventData definition <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 10.5 User application process 10.5.1 General Table 78 \u2013 UAO events definitions <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 10.5.2 User application object 10.5.3 IO data image on gateway device Figure 74 \u2013 The relationships between UAPs and DAPs Figure 75 \u2013 User application objects in a field device <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 10.5.4 Alarm mechanism Figure 76 \u2013 Example of IO data images on the gateway device <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 10.5.5 Application configuration <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Table 79 \u2013 VCR attribute configuration for a field device <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | Figure 77 \u2013 C\/S VCR relationships between GW and FDs <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | Figure 78 \u2013 P\/S VCR relationships between GW and FDs <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | Figure 79 \u2013 R\/S VCR relationships between GW and FDs <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | Figure 80 \u2013 Application configuration procedure for a field device <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 10.6 Application services 10.6.1 Confirmed services and unconfirmed services Figure 81 \u2013 Example of UAO data aggregation and disaggregation process <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 10.6.2 Read service Figure 82 \u2013 Read request message format Table 80 \u2013 Application services used by UAPs <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | Figure 83 \u2013 Read positive response message format Figure 84 \u2013 Read negative response message format Table 81 \u2013 Error code definition for Read negative response message <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 10.6.3 Write service Figure 85 \u2013 Read service process Figure 86 \u2013 Write request message format Figure 87 \u2013 Write negative response message format <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 10.6.4 Publish service Figure 88 \u2013 Write service process Table 82 \u2013 Error code definition for Write negative response message <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 10.6.5 Report service Figure 89 \u2013 Publish request message format Figure 90 \u2013 Publish process from FD to GW Figure 91 \u2013 Publish process from GW to FD Figure 92 \u2013 Report request message format <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 10.6.6 Report ACK service Figure 93 \u2013 Report service process Figure 94 \u2013 Report ACK request message format Figure 95 \u2013 Report ACK positive response message format <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | 10.6.7 Start service Figure 96 \u2013 Report ACK negative response message format Figure 97 \u2013 Report ACK service process Table 83 \u2013 Error code definition for Report ACK negative response <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 10.6.8 Stop service Figure 98 \u2013 Start service process <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 10.7 Application sub-layer 10.7.1 Overview 10.7.2 ASL data service Figure 99 \u2013 Stop service process <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | Table 84 \u2013 ASLDE-DATA.request primitive parameter definitions Table 85 \u2013 ASLDE-DATA.indication primitive parameter definitions <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | Table 86 \u2013 ASLDE-DATA.response primitive parameter definitions Table 87 \u2013 ASLDE-DATA.confirm primitive parameter definitions <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 10.7.3 ASL management service Table 88 \u2013 ASLME-VcrActive.request primitive parameter definitions Table 89 \u2013 ASLME-VcrDeactive.request primitive parameter definitions <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 10.7.4 ASL message format Figure 100 \u2013 ASL general message format Figure 101 \u2013 Format of Message control field Table 90 \u2013 ASLME-SignalEvent.request primitive parameter definitions <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | Table 91 \u2013 Service Identifier subfield definition Table 92 \u2013 Message Type subfield definition <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | Figure 102 \u2013 Confirmed application service primitives among layers Table 93 \u2013 Confirmed service primitives exchanged between ASL and other layers <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | Figure 103 \u2013 Unconfirmed application service primitives among layers Figure 104 \u2013 ASL management service primitives between ASL and UAP Table 94 \u2013 Unconfirmed service primitives exchanged between ASL and other layers <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | Figure 105 \u2013 State transition diagram of AMCL Table 95 \u2013 ASL management service primitives between ASL and UAP <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | Table 96 \u2013 State transition table of AMCL <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | Figure 106 \u2013 State transition diagram of AMSV <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | Table 97 \u2013 State transition table of AMSV <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | Figure 107 \u2013 State transition diagram of AMPB Table 98 \u2013 State transition table of AMPB <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | Figure 108 \u2013 State transitions diagram of AMSB <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | Table 99 \u2013 State transitions table of AMSB <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | Figure 109 \u2013 State transitions diagram of AMRS <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | Figure 110 \u2013 State transitions diagram of AMRK Table 100 \u2013 State transitions table of AMRS <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | Table 101 \u2013 State transitions table of AMRK <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | Table 102 \u2013 All Functions used in ASLM <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 11 Security 11.1 General 11.1.1 Security management architecture <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | Figure 111 \u2013 Security management architecture <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 11.1.2 Security functions 11.1.3 Keys <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | 11.2 Security services 11.2.1 General 11.2.2 Key establish service Figure 112 \u2013 Life cycle of keys <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | Figure 113 \u2013 Format of NONCE Table 103 \u2013 Parameters for KEY-ESTABLISH.request Table 104 \u2013 KeyMaterial_Struct structure <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | Table 105 \u2013 Parameters for KEY-ESTABLISH.indication Table 106 \u2013 Parameters for KEY-ESTABLISH.response Table 107 \u2013 Parameters for KEY-ESTABLISH.confirm <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | 11.2.3 Key update service Figure 114 \u2013 Time sequence of key establishment Table 108 \u2013 Parameters for KEY-UPDATE.request <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Table 109 \u2013 Parameters for KEY-UPDATE.indication Table 110 \u2013 Parameters for KEY-UPDATE.response Table 111 \u2013 Parameters for KEY-UPDATE.confirm <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | 11.2.4 Security alarm service Figure 115 \u2013 Time sequence of key updating Figure 116 \u2013 SecAlarmt_Struct structure Table 112 \u2013 Parameters for SEC-ALARM.request <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 11.3 Secure join 11.3.1 General Figure 117 \u2013 Time sequence of security alarm Table 113 \u2013 Parameters for SEC-ALARM.indication <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 11.3.2 Secure join process of FD <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 11.4 Key management 11.4.1 General 11.4.2 Key establish process Figure 118 \u2013 Secure join process of field device <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 11.4.3 Key update process Figure 119 \u2013 Key establish process for field device Table 114 \u2013 Key update states <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | Figure 120 \u2013 Key update state machine for FD Table 115 \u2013 Key update state transition <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 11.5 DLL secure communication Table 116 \u2013 Keys used in DLL secure communication <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | 11.6 Security alarm 11.7 Secure frame format 11.7.1 General secure DLL frame format Figure 121 \u2013 General secure DLL frame format <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 11.7.2 Secure aggregation frame format 11.7.3 Key establish request frame format Figure 122 \u2013 Secure aggregation frame format Table 117 \u2013 Available security levels for DLL <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 11.7.4 Key establish response frame format 11.7.5 Key update request frame format 11.7.6 Key update response frame format Figure 123 \u2013 Key establish request frame format Figure 124 \u2013 Key establish response frame format Figure 125 \u2013 Key update request frame format Figure 126 \u2013 Key update response frame format <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 11.7.7 Security alarm request frame format Figure 127 \u2013 Security alarm request frame format <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | Annex A (informative)Security strategy for WIA-FA network A.1 Risk analysis for WIA-FA network A.2 Security principles for WIA-FA network A.3 Security objectives for WIA-FA network A.4 Security grade of WIA-FA network <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | Table A.1 \u2013 Security grades for WIA-FA network <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | Annex B (informative)Regional modification for compliance with ETSI standards B.1 General B.2 Compliance with ETSI EN 300 440-2 V1.4.1 B.3 Compliance with ETSI EN 300 328V1.9.1 Table B.1 \u2013 Applicable EN 300 440-2 requirements list <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | Figure B.1 \u2013 Timeslot timing template Table B.2 \u2013 Applicable EN 300 328 requirements list <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | Table B.3 \u2013 Timeslot timing definitions and calculations Table B.4 \u2013 TxMaxPHYPacket of FHSS Table B.5 \u2013 TxMaxPHYPacket of DSSS\/HR-DSSS <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | Table B.6 \u2013 TxMaxMPDU of OFDM <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Industrial networks. Wireless communication network and communication profiles. WIA-FA<\/b><\/p>\n |