Pas 62405
Pas 62405
IEC
AVAILABLE
PAS 62405
SPECIFICATION
Reference number
IEC/PAS 62405:2005(E)
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Consolidated editions
The IEC is now publishing consolidated versions of its publications. For example,
edition numbers 1.0, 1.1 and 1.2 refer, respectively, to the base publication, the
base publication incorporating amendment 1 and the base publication incorporating
amendments 1 and 2.
Email: [email protected]
Tel: +41 22 919 02 11
Fax: +41 22 919 03 00
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
International Electrotechnical Commission, 3, rue de Varembé, PO Box 131, CH-1211 Geneva 20, Switzerland
Telephone: +41 22 919 02 11 Telefax: +41 22 919 03 00 E-mail: [email protected] Web: www.iec.ch
CONTENTS
FOREWORD.........................................................................................................................9
Section 1: Overview
1 Introduction ..................................................................................................................11
2 Scope and objective .....................................................................................................11
3 Structure of this document ............................................................................................11
4 Normative reference .....................................................................................................12
5 Definitions ....................................................................................................................13
5.1 Terms and definitions ..........................................................................................13
5.2 Abbreviations and symbols ..................................................................................18
5.3 Conventions ........................................................................................................20
6 Communication Profile of Vnet/IP..................................................................................21
6.1 General overview.................................................................................................21
6.2 Physical Layer .....................................................................................................22
6.3 Data Link Layer ...................................................................................................22
6.4 Network Layer .....................................................................................................23
6.5 Transport Layer ...................................................................................................23
6.6 Application Layer .................................................................................................24
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 40 – EVTM state table – Sender transitions ...............................................................84
Table 41 – EVTM state table – Receiver transitions .............................................................84
Table 42 – Functions used by the EVTM .............................................................................84
Table 43 – Primitives exchanged between FAL user and LDRM ...........................................85
Table 44 – Parameters used with primitives exchanged FAL user and LDRM .......................85
Table 45 – LDRM state table – Sender transitions ...............................................................86
Table 46 – LDRM state table – Receiver transitions .............................................................87
Table 47 – Functions used by the LDRM .............................................................................87
Table 48 – Primitives exchanged between FAL user and FNIM ............................................88
Table 49 – Parameters used with primitives exchanged FAL user and FNIM.........................88
Table 50 – FNIM state table – Sender transitions.................................................................89
Table 51 – FNIM state table – Receiver transitions ..............................................................89
Table 52 – Functions used by the FNIM ..............................................................................91
Table 53 – Primitives exchanged between FAL user and TIMM ............................................91
Table 54 – Parameters used with primitives exchanged FAL user and TIMM ........................91
Table 55 – TIMM states ......................................................................................................92
Table 56 – TIMM state table – Sender transitions ................................................................92
Table 57 – TIMM state table – Receiver transitions..............................................................93
Table 58 – Functions used by the TIMM ..............................................................................94
Table 59 – Primitives exchanged between FAL user and NWMM..........................................94
Table 60 – Parameters used with primitives exchanged FAL user and NWMM ......................95
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC provides no marking procedure to indicate its approval and cannot be rendered responsible for any
equipment declared to be in conformity with an IEC Publication.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
The International Electrotechnical Commission (IEC) draws attention to the fact that it is claimed that compliance
with this document may involve the use of a patent concerning Vnet/IP 1.
The holder of this patent right has assured the IEC that he is willing to negotiate licences under reasonable and
non-discriminatory terms and conditions with applicants throughout the world. In this respect, the statement of the
holder of this patent right is registered with IEC. Information may be obtained from:
———————
1 Vnet/IP is the trade name of Yokogawa Electric Corporation. This information is given for the convenience of
users of this PAS and does not constitute an endorsement by IEC of the trademark holder or any of its products.
Compliance to this profile does not require use of the trade name Vnet/IP. Use of the trade name Vnet/IP
requires permission of the Yokogawa Electric Corporation.
A PAS is a technical specification not fulfilling the requirements for a standard but made
available to the public .
IEC-PAS 62405 has been processed by subcommittee 65C: Digital communications, of IEC
technical committee 65: Industrial-process measurement and control.
The text of this PAS is based on the This PAS was approved for
following document: publication by the P-members of the
committee concerned as indicated in
the following document
Draft PAS Report on voting
65C/352/NP 65C/369/RVN
Following publication of this PAS, the technical committee or subcommittee concerned will
transform it into an International Standard.
It is intended that the content of this PAS will be incorporated in the future new edition of the
various parts of IEC 61158 series according to the structure of this series.
This PAS shall remain valid for an initial maximum period of three years starting from
2005-06. The validity may be extended for a single three-year period, following which it shall
be revised to become another type of normative document or shall be withdrawn.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Section 1: Overview
Section 1: Overview
Section 2: Application Layer Service definition
Section 3: Application Layer protocol specification
Section 4: Data Link Layer Service definition
Section 5: Data Link Layer protocol specification
1 Introduction
The Vnet/IP is designed for highly reliable real-time communication, and applies to the
operation of process control systems. The process control system consists of many
controllers, human-machine interfaces, process monitors, and gateways to external networks
which are connected to Ethernet-based IP networks. The data transfer between these devices
is performed by peer-to-peer or multicast communication.
It is required that the process control system responds within a deterministic time. At the
same time, it is also required that multi-vendor's multi-devices can be connected to the same
IP network. For example, the process control system shall handle operational signals for the
actuator within a determined time and needs to communicate with other devices connected to
Ethernet-based IP networks to exchange non-realtime information such as files and images.
The Vnet/IP realizes these two conflicting requirements on the same network using a unique
technology as described in this PAS.
This PAS describes the communication profile of the whole Vnet/IP, services of each layer
and the specifications of the protocols for each layer.
Section 1 of this PAS presents an overview of and guidance for the Vnet/IP Specification. It
also explains the structure and content of the Vnet/IP Specification and shows how to use
each section of the document. In addition, it specifies the communication profile of the Vnet/IP.
Sections 2 and 3 present the Vnet/IP Specification for the Application Layer, and Sections 4
and 5 for the Data Link Layer. This PAS refers the appropriate international standards for the
specifications of other layers.
The Data Link and Application Layers are described in complementary ways, in terms of the
services offered and the protocol which provides those services.
Table 1 shows the differences between service and protocol viewpoints of the Data Link and
Application Layers. The protocol parts show the layer implementer’s view and the service
parts show the layer user’s view.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
4 Normative reference
The following referenced documents are indispensable for the application of this document.
For dated references, only the edition cited applies. For all other undated references, the
latest edition of the referenced document (including any amendments) applies.
IEC 61158-1:2003, Digital data communications for measurement and control – Fieldbus for
use in industrial control systems – Part 1: Overview and guidance for the IEC 61158 series
IEC 61158-3:2003, Digital data communications for measurement and control – Fieldbus for
use in industrial control systems – Part 3: Data link service definition
IEC 61158-4:2003, Digital data communications for measurement and control – Fieldbus for
use in industrial control systems – Part 4: Data link protocol specification
IEC 61158-5:2003, Digital data communications for measurement and control – Fieldbus for
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
IEC 61158-6:2003, Digital data communications for measurement and control – Fieldbus for
use in industrial control systems – Part 6: Application layer protocol specification
ISO/IEC 7498 (all parts), Information technology – Open Systems Interconnection – Basic
Reference Model
exchange between systems – Local and metropolitan area networks - Specific requirements –
Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and
physical layer specifications
5 Definitions
For the purposes of this document, the following terms and definitions apply.
For the purposes of this document, the following terms as defined in ISO/IEC 7498-1 apply:
1) application entity
2) application protocol data unit
3) application service element
For the purposes of this document, the following terms as defined in ISO/IEC 8824 apply:
1) any type
2) bitstring type
3) Boolean type
4) choice type
5) false
6) integer type
7) null type
8) octetstring type
9) sequence of type
10) sequence type
11) simple type
12) structured type
13) tagged type
14) true
15) type
16) value
For the purposes of this document, the following terms as defined in IEC 61158-3 and IEC
61158-4 apply.
1) DL-Time
2) DL-Scheduling-policy
3) DL-connection-oriented mode
4) fixed tag
5) generic tag
6) link
7) MAC ID
8) network address
9) node address
10) node
11) tag
12) scheduled
13) unscheduled
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
For the purposes of this document, the following terms as defined in IEC 61158-5 apply.
41) server
42) service
43) slot
44) subscriber
45) sync
For the purposes of this document, the following terms as defined in IEC 61158-6 apply.
1) called
2) calling
3) receiving
4) sending
a network that is compliant with the Vnet/IP specification, which consists of one or more
domains. The domains are connected to each other by routers. In a redundant Vnet/IP
network structure, the Vnet/IP network consists of two networks; a primary network and a
secondary network
NOTE The primary network and the secondary network are independent and are not connected to each other.
5.1.7.2 domain
5.1.7.3 subnetwork
a part of a network that does not contain any routers. A subnetwork consists of end nodes,
bridges and segments
NOTE Every end node included in a subnetwork has the same IP network address.
5.1.7.4 router
intermediate equipment that connects two or more subnetworks using a network layer relay
function
5.1.7.5 route
5.1.7.6 segment
a communication channel that connects two nodes directly without intervening bridges
5.1.7.7 bridge
intermediate equipment that connects two or more segments using a Data Link layer relay
function
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
a bridge to which no routers, external bridges or nodes non-compliant with this specification
are connected directly
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
a bridge to which at least one router, external bridge or node non-compliant with this
specification, and to which at least one internal bridge or Vnet/IP station is connected
a bridge to which neither internal bridges nor Vnet/IP stations are connected directly
5.1.7.11 station
an end node or a pair of end nodes that perform a specific application function
5.1.7.15 link
5.1.7.16 path
a logical communication channel between two nodes, which consists of one or two link(s)
a node with two interface ports one of which is connected to a primary network, while the
other is connected to a secondary network
a station which performs diagnosis of routes to all other domains, distribution of network time
to nodes inside the domain, acquisition of absolute time from the network time master and
notification of status of the domain
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
5.1.7.23 station number
5.3 Conventions
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
5.3.1 General conventions
This PAS uses the descriptive conventions given in IEC 61784 for communication profile
definitions.
This PAS uses the descriptive conventions given in IEC 61158-5 for class definitions.
This PAS uses the descriptive conventions given in IEC 61158-5 for FAL service definitions.
This PAS uses the descriptive conventions given in ISO/IEC 8824-2 for APDU definitions.
This PAS uses the descriptive conventions given in ISO/IEC 8825-1 for transfer syntax definitions.
The conventions used for AE state machine definitions are described in Table 2.
The conventions used in the descriptions for the events, conditions and actions are as follows:
:= The value of an item on the left is replaced by the value of an item on the right. If an item
on the right is a parameter, it comes from the primitive shown as an input event.
xxx Parameter name.
Example:
Identifier := reason
means value of the ‘reason’ parameter is assigned to the parameter called
‘Identifier.’
“xxx” Indicates fixed value.
Example:
Identifier := “abc”
means value “abc” is assigned to a parameter named ‘Identifier.’
= A logical condition to indicate an item on the left is equal to an item on the right.
< A logical condition to indicate an item on the left is less than the item on the right.
> A logical condition to indicate an item on the left is greater than the item on the right.
<> A logical condition to indicate an item on the left is not equal to an item on the right.
&& Logical “AND”
|| Logical “OR”
The sequence of actions and the alternative actions can be executed using the following
reserved words.
for
endfor
if
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
else
elseif
The following shows examples of description using the reserved words.
Example 1:
for (Identifier := start_value to end_value)
actions
endfor
Example 2:
If (condition)
actions
else
actions
endif
This standard uses the descriptive conventions given in IEC 61158-3 for DLL service
definitions.
The conventions used for DLE state machine definitions are described in Table 3.
The Vnet/IP protocol is described using the principles, methodology and model of ISO/IEC
7498. In addition, it also follows the three-layer basic fieldbus reference model described in
the IEC 61158-1.
The OSI model provides a layered approach to communication standards, whereby the layers
can be developed and modified independently. The Vnet/IP communication profile is based on
the three-layer structure, and each layer of OSI seven layers is mapped onto these three
layers as follows.
Functions of the intermediate OSI layers, layers 5 – 6, are consolidated into the Application
Layer.
Functions of the intermediate OSI layers, layers 3 – 4, are consolidated into the Data Link
Layer.
Likewise, some features common to users of the Fieldbus Application Layer are provided to
simplify user operation.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 4 shows the OSI layers, their functions and the equivalent layers in the Vnet/IP layer
model.
Layer Protocol
Application The specification of this PAS
Transport RFC 768 and the specifications in this PAS
Network RFC 791
Data Link ISO/IEC 8802-3, -2, -10
Physical any of ISO/IEC 8802-3
Internet standard RFC 791 (IP, Internet Protocol) and its amendments and successors shall
be used.
6.4.1 IP Address
Unicast address
IPv4 class C private address scope shall be used. Each subnetwork of a domain has
the respective IP network address as follows.
To assign these group addresses to the stations, AD-HOC Block group address
224.0.23.33 may be used.
NOTE This group address is registered with the Internet Assigned Numbers Authority (IANA).
6.4.2 IGMP
6.4.3 TOS
The following five TOS parameter values shall be used for the Data Link service:
a) time synchronization
b) high priority
c) medium priority
d) low priority
e) general purpose
Internet standard RFC 768 (UDP, User Datagram Protocol) and its amendments and
successors, and the Data Link Layer specified in Sections 4 and 5 of this PAS shall be used.
6.5.1 Port No
7 Concepts
7.1 General
This Fieldbus Application Layer (FAL) provides communication services to time-critical and
nontime-critical applications in fieldbus devices.
A modular approach was taken in the definition of FAL ASEs. The ASEs defined for the FAL
are also object-oriented. In general, ASEs provide a set of services designed for one specific
object class or for a related set of classes.
To support remote access to the AP, the Application Relationship ASE is defined. This
application relationship ASE provides services to the AP for defining and establishing
communication relationships with other APs, and provides services to other ASEs for
conveying their service requests and responses.
Each FAL ASE defines a set of services, APDUs and procedures that operate on the classes
that it represents. Only a subset of the ASE services may be provided to meet the needs of an
application. Profiles may be used to define such subsets.
APDUs are sent and received between FAL ASEs that support the same services. Figure 1 shows
the FAL ASEs from the perspective of communication.
FAL AP
APO ASE Service Primitives
Variable Event Fnc Inv Load Reg Time NW MNG APO ASEs
ASE ASE ASE ASE ASE ASE
AR ASE
Service
Primitives
AR
ASE
Example FAL AE
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Many services have the following parameters. Instead of defining them for each service, the
following common definitions are provided:
Argument
This parameter carries the parameters of the service invocation.
AREP
This parameter contains information sufficient for local identification of the AREP to be used
to convey the service. This parameter may use a key attribute of the AREP to identify the
application relationship. When an AREP supports multiple contexts simultaneously, the AREP
parameter is extended to identify the context as well as the AREP.
InvokeID
This parameter identifies this invocation of the service. InvokeID is used to associate service
requests with responses. Therefore, no two outstanding service invocations can be identified
by the same InvokeID value.
Result(+)
This selection type parameter indicates that the service request was successful.
Result(-)
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This selection type parameter indicates that the request failed.
Error Info
This parameter provides error information for service errors. It is returned in confirmed service
response(-) primitives.
8 ASEs
8.1.1 Overview
In the fieldbus environment, application processes contain data that can be both read and
written by remote applications. The variable ASE defines the network-visible attributes of
application data and provides a set of services used to read, write and report their values.
When the appropriate types of application relationship are supported, the variable ASE may
be used to support two different access models i.e., the client/server model and the
publisher/subscriber model. The client/server model is characterized by a client application
sending a read or write request to a server application that responds accordingly. The server's
activity is stimulated by clients on the network; if there are no requests, the server generates
no responses.
In the “pull” model, one of the subscribers requests that the publisher publishes a sequence of
variable data by issuing a publish request to it. The publisher distributes the variable data
periodically according to the remote request by multicasting. The publishing schedule is
controlled by the publisher itself.
In the “push” model, the publisher is requested to distribute a sequence of variable data by
the local FAL user. The publisher distributes a sequence of variable data by multicasting
according to the local request. The publishing schedule is also controlled by the publisher
itself.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8.1.2.2 Attributes
Numeric Identifier
This key attribute identifies an instance of this object class.
Data Type
This attribute is the numeric identifier of the data type.
Length
This optional attribute is the length of the data in octets.
Read enable
The value of this optional attribute indicates whether the data value of the Variable Object can
be read via the fieldbus.
Write enable
The value of this optional attribute indicates whether the data value of the Variable Object can
be updated via the fieldbus.
8.1.3.2 Attributes
Numeric Identifier
This key attribute identifies an instance of this object class.
Number of Entries
This attribute contains the number of variables in the list.
List of Variables
This attribute identifies the variables by key attribute that are contained in the list.
This subclause contains the definition of services that are unique to this ASE. The services
defined for this ASE are:
• Read
• Write
• Information Report
This confirmed service may be used to read the value of a variable object or a variable list
object. It is not used with the publisher/subscriber model.
Argument M M(=)
AREP M M(=)
InvokeID M M(=)
Variable Specifier M M(=)
Result(+) S S(=)
AREP M M(=)
InvokeID M M(=)
Value M M(=)
Result(-) S S(=)
AREP M M(=)
InvokeID M M(=)
Error Info M M(=)
Variable Specifier
This parameter specifies a variable object or a variable list object to be read by the key
attribute.
Value
This parameter contains the value read. For each of the variables, this parameter contains the value of the variable.
For variable lists, this parameter contains the values of each of the variables in the list concatenated together in
the order in which they appear in the list.
NOTE If any of the variables in a variable list could not be read, the service fails.
This confirmed service is used to write the value of a variable object or a variable list object. It
is not used with the publisher/subscriber model.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Argument M M(=)
AREP M M(=)
InvokeID M M(=)
Variable Specifier M M(=)
Value M M(=)
Result(+) S S(=)
AREP M M(=)
InvokeID M M(=)
Result(-) S S(=)
AREP M M(=)
InvokeID M M(=)
Error Info M M(=)
Variable Specifier
This parameter specifies a variable object or a variable list object to be written by the key
attribute.
Value
This parameter contains the value to write. For variables, this parameter contains the value of
the variable. For variable lists, this parameter contains the values of each of the variables in
the list concatenated together in the order that they appear in the list.
NOTE If any variable in a variable list object cannot be updated, none of the variables in the variable list object
will be updated and the write will fail.
This optional service is an unconfirmed service that may be used to report the value of a
variable object or a variable list object. This service may be used in the publisher/subscriber
push model.
Argument M M(=)
AREP M M(=)
Variable Specifier M M(=)
Value M M(=)
Variable Specifier
This parameter specifies a variable object or a variable list object to be reported by the key
attribute.
Value
This parameter contains the value to be reported. For variables, this parameter contains the
value of the variable. For variable lists, this parameter contains the value of each variable in
the list concatenated together in the order that they appear in the list.
NOTE If any of the variables in a variable list could not be read, the service fails.
8.2.1 Overview
Event objects are used to define messages reporting event occurrences. Event messages
contain information that identifies and describes event occurrences.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Notifiers are responsible for collecting event messages from event objects, and distributing
one or more event message(s) in a single invocation of the FAL event notification service. The
number of event messages that may be submitted in a single service invocation is limited by
the maximum APDU size that can be transferred by the AR.
In this model, application processes are responsible for providing the functions for event
objects and event list objects, and the FAL is responsible for providing communication
services designed specifically for them. The application process detects events, builds event
messages and aggregates them together. The application process distributes the aggregated
event messages using the FAL event notification service.
8.2.2.2 Attributes
8.2.2.2.2 AREP
This attribute identifies the AREP configured to convey event notifications. This AREP is also
used for reporting the event notifications generated by an event recovery request.
The conditional attribute contains the last sequence number used. It is incremented for each
event notification service invocation.
This subclause contains the definition of services that are unique to this ASE. The services
defined for this ASE are:
• Event Notification
• Notification Recovery
This unconfirmed service is used by the notifier of an FAL AP to notify other APs that one or
more events have occurred.
The service parameters for each primitive are shown in Table 10.
Argument M M(=)
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
AREP M M(=)
NotifierID M M(=)
Sequence Number U U(=)
Notification Time U U(=)
List of Event Messages M M(=)
Event Key Attribute M M(=)
Event Data Type C C(=)
Event Detection Time U U(=)
Event Data U U(=)
NotifierID
This parameter identifies the notifier issuing the event notification.
Sequence Number
This optional parameter is the sequence number for the event notification. It may be used for
notification recovery purposes.
Notification Time
This optional parameter is the time tag for event notification.
Event Data
This optional parameter contains user data to be included in an event message in
addition to that used to identify the event occurrence. This parameter is present only if
it is defined for the specified event object and is supported by the specified notifier.
This unconfirmed service is used to request that a specified number of retained event
notifications be returned. Notifications are returned using the event notification service.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8.2.3.3.2 Service primitives
The service parameters for each primitive are shown in Table 11.
Argument M M(=)
AREP M M(=)
NotifierID M M(=)
Sequence Number U U(=)
NotifierID
This parameter identifies the notifier to which this service is directed.
Sequence Number
This optional parameter specifies the sequence number of the event notification to be re-sent.
If not present, the last notification sent is being requested.
8.3.1 Overview
A load region may represent an unnamed volatile memory area, such as that implemented by
dynamic computer memory, or a named non-volatile memory object, such as a file. The
contents of a load region are referred to as a load image and can contain programs or data.
The transfer of a load image to or from a load region is performed using the load process.
This load region model provides services that permit an application process to initiate the
downloading or uploading of specified load regions.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
2 (m) Attribute: Local Address
3 (o) Attribute: Load Image Name
SERVICES:
1 (m) OpsService: Download Services
2 (m) OpsService: Upload Services
8.3.2.2 Attributes
Load Region Size
This attribute specifies the maximum size of the load region in octets.
Local Address
This attribute is a locally significant address of the load region.
This subclause contains the definitions of services that are unique to this ASE. The services
defined for this ASE are:
• Download
• Upload
This confirmed service is used to download a load image in its request and indication
primitives. The response and confirmation primitives are used to convey the success or failure
of the download.
The service parameters for each primitive are shown in Table 12.
Argument M M(=)
AREP M M(=)
InvokeID M M(=)
Load Region M M(=)
Load Data M M(=)
Result(+) S S(=)
AREP M M(=)
InvokeID M M(=)
Result(-) S S(=)
AREP M M(=)
InvokeID M M(=)
Error Info M M(=)
Load Region
This parameter specifies the load region into which the image is to be downloaded.
Load Data
This parameter contains the data to be downloaded.
This confirmed service is used to upload a load image. Its request and indication primitives
convey an upload request. The response and confirmation primitives are used to convey the
load image of the load region and the result of loading.
The service parameters for each primitive are shown in Table 13.
Argument M M(=)
AREP M M(=)
InvokeID M M(=)
Load Region M M(=)
Result(+) S S(=)
AREP M M(=)
InvokeID M M(=)
Load Data M M(=)
Result(-) S S(=)
AREP M M(=)
InvokeID M M(=)
Error Info M M(=)
Load Region
This parameter specifies the load region from which the image is to be uploaded.
Load Data
This parameter contains the data uploaded.
8.4.1 Overview
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
The function invocation class models the state-oriented function invocation. It may be used to
model software processes or user functions the operation of which may be controlled.
8.4.2.2 Attributes
8.4.2.2.1 Identifier
This attribute indicates the current state of the function invocation. An enumerated set of
values has been defined.
UNRUNNABLE This state indicates that the function invocation is not executing
and can not be executed.
IDLE This state indicates that the function invocation is not
executing, but is capable of being executed.
RUNNING This state indicates that the function invocation is executing.
STOPPED This state indicates that the execution of a function invocation
has been suspended.
This subclause contains the definition of services that are unique to this ASE. The services
defined for this ASE are:
• Start
• Stop
• Resume
This confirmed service is used to start a function invocation from the initial condition.
The service parameters for each primitive are shown in Table 14.
Argument M =(M)
AREP M =(M)
InvokeID M =(M)
FunctionID M =(M)
Result M =(M)
AREP M =(M)
InvokeID M =(M)
Error Info M =(M)
FunctionID
This parameter specifies one of the key attributes of the function invocation object.
This confirmed service is used to stop a function invocation retaining its context so that it may
be resumed.
The service parameters for each primitive are shown in Table 15.
Argument M =(M)
AREP M =(M)
InvokeID M =(M)
FunctionID M =(M)
Result M =(M)
AREP M =(M)
InvokeID M =(M)
Error Info M =(M)
FunctionID
This parameter specifies one of the key attributes of the function invocation object.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This confirmed service is used to request to start a function invocation from the suspended
condition.
The service parameters for this service are shown in Table 16.
FunctionID
This parameter specifies one of the key attributes of the function invocation object.
8.5.1 Overview
The Time ASE specifies the clock synchronization mechanism to synchronize the time among
network stations. This time can be used to add a time value to alert information and to
sequence messages in a time-wise order.
A system consists of one or more time master(s) and several time slaves. Clock
synchronization is performed by the communication system. Adjustment and management of
the clock are tasks of the application.
The network shall have at least one network time master which may be one of the domain
time masters selected automatically or may be a fixed station.
The network time master has the master clock of the network. The master clock may be the
local clock of the network time master itself or it may be synchronized with a clock source
outside the network.
The domain time master of each domain obtains network time from the network time master
and it distributes the network time value to stations in the domain.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8.5.2.2 Attributes
8.5.2.2.1 Role
This attribute specifies the role of the Time ASE with values defined as follows:
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
NETWORK TIME MASTER A network unique end node which responds to time
requests from domain masters.
DOMAIN TIME MASTER A domain unique end node which distributes time
information within the domain.
TIME SLAVE An end node subscribes time information distributed by the
domain master.
8.5.2.2.2 Stratum
This attribute indicates the maximum interval between successive time messages.
8.5.2.2.4 Precision
This subclause contains the definitions of services that are unique to this ASE. The services
defined for this ASE are:
This local service shall be used to obtain the network time value that is distributed from the
network. If Time ASE is the network time master, the local time value of the master clock is
returned.
The service parameters for each primitive are shown in Table 17.
Argument M
InvokeID M
Result M
InvokeID M
Network Time M
Status M
Error info C
Network Time
This parameter is the value of the network time.
Status
This parameter indicates the states of time synchronization. The possible states are;
• Not synchronized
• Synchronized to the domain time master
• Synchronized to the network time master as the domain time master
• Synchronized to an external time source as a network time master
This confirmed service shall be used to set the value of network time to the time master.
This service is available under conditions where the network time master is not synchronized
to an external time source.
The service parameters for each primitive are shown in Table 18.
Argument M M(=)
InvokeID M M(=)
Network Time M M(=)
Result M M(=)
InvokeID M M(=)
Error Info C C(=)
Network Time
This parameter is the value of the network time to be set.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This local service shall be used to recognize tick timing synchronized to the network time. The
tick interval is configurable.
The service parameters for each primitive are shown in Table 19.
Result M
Tick M
Tick
This parameter indicates tick timing.
NOTE This service may be implemented by means of a hard-wired interruption.
8.6.1 Overview
End nodes may have two network interfaces that provide network redundancy. These
interfaces are referred to as network interface A and network interface B. The former shall be
connected to the primary network, while the latter shall be connected to the secondary
network.
Each Network Management ASE constructs two diagnostic message APDUs and sends them
concurrently to network interfaces A and B. Each Network Management ASE receives pairs of
APDUs from other end nodes on the network that participate in network redundancy. This
information is used to determine which network interface (A or B) is to be selected to send
other APDUs. This information is also used to determine whether the destination node is
reachable in advance of sending an APDU.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8.6.2.2 Attributes
This attribute specifies the number of network interfaces on this end node. An end node may
have one or two network interfaces.
This attribute specifies the time interval between successive invocations of the diagnostic
messages in milliseconds.
This attribute specifies the time interval used to remove silent end nodes from the List of
Network Interface Status.
This attribute is a list of the path status representing the condition of the path to a remote
station from which the Network Management ASE may be receiving successive Diagnostic
Messages. The status is bi-directional for a path and indicates whether Diagnostic Messages
are being received successfully at each end of the path or whether either end of the path is in
a fault state.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8.6.3 Network Management ASE service specification
This subclause contains the definition of the services that is unique to this ASE.
The service parameters for each primitive are shown in Table 20.
Argument M
InvokeID M
Result M
InvokeID M
Network Status M
Network Status
This parameter indicates consistency of the primary and secondary networks. Possible values
are:
• HEALTHY
• FAILED
This local service is used to obtain the status of the specified station.
The service parameters for each primitive are shown in Table 21.
Argument M
Station Identifier M
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
InvokeID M
Result M
InvokeID M
Station Status M
Route Status M
Station Identifier
This parameter indicates the station for which the status is requested, and consists of a
domain number and a station number.
Station Status
This parameter indicates the status of the station specified by the station identifier, and
includes the following information.
a) existence
TRUE the station exists
FALSE the station does not exist
b) redundancy
SINGLE the station is not redundant
DUAL-REDUNDANT the station is redundant
c) AREP of the end node which is on service
Route Status
This parameter indicates the status of route for the station, and includes the following
information.
The service parameters for each primitive are shown in Table 22.
Result M
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Network Status M
Network Status
This parameter indicates consistency of the primary and secondary networks, and has the
following possible values:
• HEALTHY
• FAILED
The service parameters for each primitive are shown in Table 23.
Result M
Station Identifier M
Station Status M
Route Status M
Station Identifier
This parameter indicates the station of which the status has changed.
Station Status
This parameter indicates the status of the end node specified in/by the request primitive and
includes the following information:
a) existence
TRUE the station exists
FALSE the station does not exist
b) redundancy
SINGLE the station is not redundant
DUAL-REDUNDANT the station is redundant
c) AREP of the end node which is on service
Route Status
This parameter indicates the status of the route for the station, and includes the following
information:
8.7.1 Overview
8.7.1.1 General
These communication channels are modeled in the Fieldbus Application Layer as application
relationships (ARs).
ARs are responsible for conveying messages between applications according to specific
communication characteristics required by time-critical systems. Different combinations of
these characteristics lead to the definitions of different types of ARs. The characteristics of
ARs are defined formally as attributes of AR endpoint classes.
The messages that are conveyed by ARs are FAL service requests and responses. Each is
submitted to the AR ASE for transfer by an FAL Application Service Element (ASE) that
represents the class of the APO being accessed. Figure 2 illustrates this concept.
Depending on the type of AR, APDUs may be sent to one or more destination application
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
processes connected by the AR. Other characteristics of the AR determine how APDUs are to
be transferred. These characteristics are described below.
FAL AP
FAL AE
AR Confirmed AR Unconfirmed
Send Service Send Service
Primitives Primitives
AR ASE
Conveyance of APDUs
By the AR ASE
These characteristics need to be configured appropriately for each endpoint for the AR to
operate properly.
Endpoint definitions also contain a set of characteristics that describe the operation of the AR.
These characteristics, when combined with those used to specify compatibility, define the
context of the endpoint. The endpoint context is used by the AR ASE to manage the operation
of the endpoint and the conveyance of APDUs. The characteristics that comprise the endpoint
context are described in the next section.
The role of an AREP determines the permissible behaviour of an AP at the AREP. An AREP
role may be that of a client, server, peer (client and/or server), publisher or subscriber.
Table 24 and Table 25 summarize the characteristics and combinations of each of the AREP
roles.
Client X X
Server X X
Peer X X X
Publisher X
Subscriber X
Dedicated AR endpoints provide their services directly to the FAL User. Although their
behaviour is the same as that of non-dedicated endpoints, the APDUs they convey contain no
service specific protocol control information other than the AR control field.
FAL Users configured for dedicated ARs construct and transfer their data without using the
services of the other FAL ASEs. The format and contents of the user data conveyed over
dedicated ARs are known only through configuration.
8.7.1.2.3 Cardinality
The cardinality of an AR specifies, from the point of view of a client or publisher endpoint, how
many remote application processes are involved in an AR. Cardinality is never expressed
from the viewpoint of a server or a subscriber.
When expressed from the viewpoint of a client or peer endpoint, ARs are always one-to-one.
Clients are never capable of issuing a request to multiple servers and waiting for responses
from them.
When expressed from the viewpoint of a publisher endpoint, the cardinality indicates that
multiple subscribers are supported. These one-to-many ARs provide communications between
one application and a group of (one or more) applications. They are often referred to as multi-
party and multicast.
In one-to-many ARs, the publisher endpoint identifies the remote endpoints using a group
identifier, rather than identifying each one individually as is done with one-to-one ARs. This
permits subscribers to join and leave ARs without disrupting the publisher endpoint context
because their individual identities are not known to the publisher endpoint. However, the
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
publisher application may be aware of their participation, but that information is not part of the
AR endpoint context.
The conveyance model defines how APDUs are sent between endpoints of an AR. Three
characteristics are used to define these transfers:
• conveyance paths,
• trigger policy, and
• conveyance policy.
Conveyance paths
The purpose of AR ASEs is to transfer information between AR endpoints. This information
transfer occurs over the conveyance paths of an AR. A conveyance path represents a one-
way communication path used by an endpoint for input or output.
To support the role of the application process, the endpoint is configured with either one or
two conveyance paths. Endpoints that only send or only receive are configured with either a
send or receive conveyance path, respectively, and those that do both are configured with
both. ARs with a single conveyance path are called unidirectional, and those with two
conveyance paths are called bi-directional.
Unidirectional ARs are capable of conveying service requests only. To convey service
responses, a bi-directional AR is necessary. Therefore, unidirectional ARs support the
transfer of unconfirmed services in one direction only, while bi-directional ARs support the
transfer of unconfirmed and confirmed services initiated by only one endpoint, or by both
endpoints.
Trigger policy
Trigger policy indicates when APDUs are transmitted over the network by the Data Link Layer.
The first type is referred to as user-triggered. User-triggered AREPs submit FAL APDUs to the
Data Link Layer for transmission at the earliest opportunity.
The second type is referred to as network-scheduled. Network scheduled AREPs submit FAL
APDUs to the Data Link Layer for transmission according to a schedule configured by
management.
Conveyance policy
Conveyance policy indicates whether APDUs are transferred according to a buffer model or a
queue model. These models describe the method of conveying APDUs from the sender to the
receiver.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Buffered ARs contain conveyance paths that have a single buffer at each endpoint. Updates
to the source buffer are conveyed to the destination buffer according to the trigger policy of
the AR. Updates to either buffer replace its contents with new data. In buffered ARs,
unconveyed or undelivered data that have been replaced are lost. In additional data contained
in a buffer may be read multiple times without destroying its contents.
Queued ARs contain conveyance paths that are represented as a queue between endpoints.
Queued ARs convey data using a FIFO queue. Queued ARs are not overwritten, meaning that
new entries are queued until they can be conveyed and delivered.
If a queue is full, a new message will not be placed into the queue.
8.7.1.3 AR establishment
First, ARs can be pre-established, meaning that the AE that maintains the endpoint context is
created when the AP is connected to the network. In this case, communications among the
applications involved in the AR may take place without first having to explicitly establish the
AR. Any AR may be defined as being pre-established.
Second, ARs can be pre-defined, but not pre-established. Pre-defined means that the
characteristics of the AR are known to each endpoint, but that their contexts have not been
synchronized for operation. In this case, the use of the FAL Establish service is required to
synchronize them and open them for data transfer.
Third, ARs can require dynamic definition and establishment. In this case, definitions shall be
created for each of the AREPs using the Create service. After creation, they are established
using the Establish service if they were not created as “established”.
The AR endpoint formal model defines the characteristics common to all AR endpoints. This
class is not capable of being instantiated. It is present only for the inheritance of its attributes
and services by its subclasses, each specified in a separate subclause of this PAS.
8.7.2.2 Attributes
FAL Revision
This specifies the revision level of the FAL protocol used by this endpoint. The revision level
is in the AR header of all FAL-PDUs transmitted.
Dedicated
This attribute specifies whether the endpoint is dedicated or not. When TRUE, the services of
the AR ASE are accessed directly by the FAL User.
Cardinality
This attribute specifies cardinality of the AR described in subclause 2.7.1.
Conveyance policy
This attribute specifies conveyance policy of the AR described in subclause 2.7.1.
Conveyance path
This attribute specifies conveyance path of the AR described in subclause 2.7.1.
Trigger policy
This attribute specifies trigger policy of the AR described in subclause 2.7.1.
Transfer Syntax
This optional attribute identifies the encoding rules to be used on the AR. When not present,
the default FAL Transfer Syntax of this standard is used.
8.7.2.3 Services
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
All services defined for this class are optional. When an instance of the class is defined, at
least one shall be selected.
AR-Unconfirmed Send
This optional service is used to send an unconfirmed service.
AR-Confirmed Send
This optional service is used to send a confirmed service.
AR-Establish
This optional service is used to establish (open) an AR.
AR-Abort
This optional service is used to abort (abruptly terminate) an AR.
This subclause contains the definitions of services that are unique to this ASE. The services
defined for this ASE are:
• AR-Unconfirmed Send
• AR-Confirmed Send
• AR-Establish
• AR-Abort
The services AR-Confirmed Send contain the FAL PDU body as part of the Result parameter
in the response and confirmation primitives. The FAL PDU body may contain either the
positive response or negative response returned by the FAL User transparently to the AR ASE.
Therefore, these services have a single Result parameter instead of the separate Result(+)
and Result(-) parameters that are commonly used to convey the positive and negative
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This service is used to send AR-Unconfirmed Send request APDUs for FAL APO ASEs. The
AR-Unconfirmed Send service may be requested at either endpoint of a one-to-one bi-
directional AR, at the server endpoint of a one-to-one unidirectional AR, or at the publisher
endpoint of a one-to-many AR.
The service parameters for each primitive are shown in Table 26.
Argument M M(=)
AREP M M(=)
Remote DL Address M M(=)
FAL Service Type M M(=)
FAL APDU Body M M(=)
Remote DL Address
This parameter contains the destination DLSAP address in the request and the source DLSAP
address in the indication.
The requesting FAL ASE submits an AR-Unconfirmed Send request primitive to its AR ASE.
The AR ASE builds an AR-Unconfirmed Send request APDU.
The AR ASE queues the APDU for submission to the lower layer.
If the AREP is user-triggered, the AR ASE immediately requests the lower layer to transfer the
APDU. If the AR is network-scheduled, the AR ASE requests the DL to transfer the data at the
scheduled time. The Data Link mapping indicates how the AR ASE coordinates its requests to
transmit the data with the Data Link Layer.
Upon receipt of the AR-Unconfirmed Send request APDU, the receiving AR ASE delivers an
AR-Unconfirmed Send indication primitive to the appropriate FAL ASE as indicated by the
FAL Service Type Parameter.
This service is used to send confirmed request and response APDUs for FAL APO ASEs. The
AR-Confirmed Send service may be requested at Client and Peer endpoints of one-to-one bi-
directional ARs.
The service parameters for each primitive are shown in Table 27.
Argument M M(=)
AREP M M(=)
InvokeID M M(=)
Server DL-Address M M(=)
FAL Service Type M M(=)
FAL APDU Body M M(=)
Result M M(=)
AREP M M(=)
InvokeID M M(=)
Client DL-Address M M(=)
FAL Service Type M M(=)
FAL APDU Body M M(=)
Server DL-Address
This parameter contains the DL-address of the server.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Result
This parameter indicates that the service request succeeded or failed.
Client DL-Address
This parameter contains the DL-address of the client.
The requesting FAL ASE submits an AR-Confirmed Send request primitive to its AR ASE. The
AR ASE creates a transaction state machine to control the invocation of the service.
The AR ASE builds an AR-Confirmed Send request APDU and queues the APDU for
submission to the lower layer, then the AR ASE immediately requests the lower layer to
transfer the APDU.
Upon receipt of the AR-Confirmed Send request APDU, the receiving AR ASE delivers an AR-
Confirmed Send indication primitive to the appropriate FAL ASE as indicated by the FAL
Service Type Parameter.
The responding FAL ASE submits a confirmed send response primitive to its AR ASE. The AR
ASE builds a confirmed send response APDU.
The AR ASE queues the APDU for submission to the lower layer. In addition, the AR ASE
immediately requests the lower layer to transfer the APDU.
Upon receipt of the confirmed send response APDU, the receiving AR ASE uses the InvokeID
contained in the response APDU to associate the response with the appropriate request and
cancel the associated transaction state machine. The AR ASE delivers an AR-Confirmed
Send confirmation primitive to the requesting FAL ASE.
If the timer expires before the sending AR ASE receives the response APDU, the AR ASE
cancels the associated transaction state machine and delivers an AR-Confirmed Send
confirmation(-) primitive to the requesting FAL ASE.
The endpoint context may be created during or prior to establishment through System
Management. Once defined, the Set Attributes and Get Attributes services can be used to
update and further coordinate endpoint contexts.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Argument M
AREP M
Remote DL-Address M
Result M(=)
AREP M(=)
Error Info C
AREP
This parameter contains sufficient information to locally identify the AREP to be established.
Remote DL-address
This parameter identifies the remote DL-address.
Result
This parameter indicates whether the service request succeeded or failed.
8.7.3.4.3.1 AR establishment
Upon receipt of an AR-Establish request service primitive, the calling FAL issues an AR-
Establish confirmation service primitive to the calling AP indicating whether or not it was able
to establish the AREP. If one of the following cases is found, it was not able to establish the
AREP:
The service is used by the FAL User to terminate an AR abruptly. It is always successful; the
receiver of an Abort request always aborts the AR. This service may be used on any open
AREP, regardless of whether the AR was pre-established or established dynamically using
the establish service.
The AR-Abort service is used to instruct the AR ASE to abruptly terminate all activity on an
AREP and place it in the closed state. Receipt of an AR-Abort request primitive causes the
AR ASE to close the AREP context immediately. The immediate close of each endpoint
context causes all outstanding service requests to be cleared. All subsequent service
primitives and APDUs received by the AR ASE for the aborted AR are discarded except those
of the AR-Establish service.
The AR ASE may also initiate the Abort service if it detects unrecoverable communication
failures. In this case, the AR ASE delivers an AR-Abort indication primitive informing the user
of the failure and closes the endpoint context.
The service parameters for each primitive are shown in Table 29.
Table 29 – AR-Abort
Argument M M(=)
AREP M M(=)
Originator M M(=)
Reason Code M M(=)
Additional Detail U U(=)
Originator
This parameter identifies the originator of the AR-Abort. Possible values are “DLL”, “FAL”, or
“FAL-USER”. The value DLL cannot be used in the request primitive.
Reason Code
This parameter indicates the reason for the Abort. It may be supplied by either the provider or
the user. One reason is defined: AR ASE error. Other reason code values may be supplied by
the Data Link Layer or by the user.
Additional Detail
This optional parameter contains user data that accompanies the indication. When used, the
value submitted in the request primitive is delivered unchanged in the indication primitive.
If the user wishes to abort an AR, it submits an Abort request primitive to its FAL AR ASE. If
an AR ASE detects an unrecoverable local failure or a communication failure, it delivers an
abort indication primitive to the endpoint user.
9 ARs
9.1 General
9.2.1 Overview
This class is defined to support the on-demand exchange of confirmed services between two
application processes. Unconfirmed services are not supported by this type of AR. It uses
connectionless-mode Data Link Services for the exchanges. The Data Link Layer transfers
may be either acknowledged or unacknowledged. The behaviour of this class is described as
follows. An AR ASE user wishing to convey a request APDU submits it as an AR ASE Service
Data Unit to its AREP and the AREP sending the request APDU queues it to its underlying
layer for transfer at the next available opportunity.
The AREP receiving the request APDU from its underlying layer queues it for delivery to its
AR ASE user in the order in which it was received.
The AREP receiving the request APDU accepts the corresponding response APDU from its
AR ASE user and queues it to the underlying layer for transfer.
The AREP that issued the request APDU receives the response APDU from its underlying
layer and queues it for delivery to its AR ASE user in the order in which it was received. It
also stops its associated service response timer.
Roles Client
Server
Peer
Cardinality one-to-one
Conveyance paths Bi-directional
Trigger policy User-triggered
Conveyance policy Queued
9.2.3 Attributes
Role
This attribute specifies the role of the AREP. Possible values are:
AREP State
This attribute specifies the state of the AREP. The values for this attribute are specified in
part 3 of this document.
9.2.4 Services
Confirmed Send
This optional service is used to send a confirmed service on an AR.
9.3.1 Overview
This class is defined to support the on-demand exchange of unconfirmed services between
two application processes. It uses connectionless-mode Data Link Services for the exchanges.
The Data Link Layer transfers may be either acknowledged or unacknowledged. The
behaviour of this class is described as follows.
An AR ASE user wishing to convey a request APDU submits it as an AR ASE Service Data
Unit to its AREP. The AREP sending the request APDU queues it to its underlying layer for
transfer at the next available opportunity.
The AREP receiving the request APDU from its underlying layer queues it for delivery to its
AR ASE user in the order in which it was received.
Roles Client
Server
Peer
Cardinality one-to-one
Conveyance paths Unidirectional
Trigger policy User-triggered
Conveyance policy Queued
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
9.3.3 Attributes
Role
This attribute specifies the role of the AREP. Possible values are:
conveyance path for this AREP. DL mappings for the Data Link Layer are specified in
Section 3 of this PAS.
9.3.4 Services
Unconfirmed Send
This optional service is used to send an unconfirmed service on an AR.
9.4.1 Overview
This class is defined to support the “push” model for scheduled and buffered distribution of
unconfirmed services to one application process.
An AR ASE user wishing to convey a request APDU submits it as an AR ASE Service Data
Unit to its AREP for distribution. Sending AREP writes the APDU into the internal buffer,
completely replacing the existing contents of the buffer. The AR ASE transfers the buffer
contents at the next scheduled transfer opportunity.
If the AREP receives another APDU before the buffer contents are transmitted, the buffer
contents will be replaced with the new APDU, and the previous APDU will be lost. When the
buffer contents are transmitted, the AR ASE notifies the user of transmission.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
At the receiving endpoint, the APDU is received from the network and is written immediately
into the buffer, completely overwriting the existing contents of the buffer. The endpoint notifies
the user that the APDU has arrived and delivers it to the user according to the local user
interface. If the APDU has not been delivered before the next APDU arrives, it will be
overwritten by the next APDU and lost.
An FAL user receiving the buffered transmission may request to receive the currently buffered
APDU later.
Roles Publisher
Subscriber
Cardinality one-to-one
Conveyance paths Unidirectional
Trigger policy Network-scheduled
Conveyance policy Buffered
9.4.3 Attributes
Role
This attribute specifies the role of the AREP. Possible values are:
9.4.4 Services
Unconfirmed Send
This optional service is used to send an unconfirmed service on an AR.
9.5.1 Overview
This class is defined to support the on-demand exchange of unconfirmed services between
two or more application processes. This class uses connectionless Data Link Services for the
exchanges. The behaviour of this class is as follows.
An AR ASE user wishing to convey a request APDU submits it as an AR ASE Service Data
Unit to its AREP. The AREP sending the request APDU queues it to its underlying layer for
transfer at the next available opportunity.
The AREP receiving the request APDU from its underlying layer queues it for delivery to its
AR ASE user in the order in which it was received.
Roles Publisher
Subscriber
Cardinality one-to-many
Conveyance paths Unidirectional
Trigger policy User-triggered
Conveyance policy Queued
9.5.3 Attributes
Role
This attribute specifies the role of the AREP. Possible values are:
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
AREP State
This attribute specifies the state of the AREP. The values for this attribute are specified in
Section 3 of this PAS.
9.5.4 Services
Unconfirmed Send
This optional service is used to send an unconfirmed service on an AR.
9.6.1 Overview
This class is defined to support the “push” model for scheduled and buffered distribution of
unconfirmed services to one or more application processes.
An AR ASE user wishing to convey a request APDU submits it as an AR ASE Service Data
Unit to its AREP for distribution. The sending AREP writes the APDU into the internal buffer,
completely replacing the existing contents of the buffer.
The AREP transfers the buffer contents at the next scheduled transfer opportunity.
If the AREP receives another APDU before the buffer contents are transmitted, the buffer
contents will be replaced with the new APDU, and the previous APDU will be lost. When the
buffer contents are transmitted, the AR ASE notifies the user of transmission.
At the receiving endpoint, the APDU is received from the network and is written immediately
into the buffer, completely overwriting the existing contents of the buffer. The endpoint notifies
the user that the APDU has arrived and delivers it to the user according to the local user
interface. If the APDU has not been delivered before the next APDU arrives, it will be
overwritten by the next APDU and lost.
An FAL user receiving the buffered transmission may request to receive the currently
buffered APDU later.
Roles Publisher
Subscriber
Cardinality one-to-many
Conveyance paths Unidirectional
Trigger policy Network-scheduled
Conveyance policy Buffered
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
9.6.3 Attributes
Role
This attribute specifies the role of the AREP. Possible values are:
PUBLISHER Endpoints of this type publish their data issuing unconfirmed service
Request-APDUs.
SUBSCRIBER Endpoints of this type receive unconfirmed service Request-APDUs
issued by publishers.
AREP State
This attribute specifies the state of the AREP. The values for this attribute are specified in
Section 3 of this PAS.
9.6.4 Services
Unconfirmed Send
This optional service is used to send an unconfirmed service on an AR.
This subclause contains a summary of the defined FAL Classes. The Class ID values have
been assigned to be compatible with existing standards.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 31 below defines the valid combinations of services and AR types (which service APDUs
can be sent or received by AR with the specified type). “Unc” and “Cnf” columns indicate whether
the service listed in the left-hand column is unconfirmed or confirmed respectively.
Stop X X X
Resume X X X
Time ASE
Get Network Time X
Set Network Time X X X
Tick Notification service X X X
NW Management ASE
Get Network Status X
Get Station Status X
NW Status Report X X X
Station Status Report X X X
AR ASE
PTC-AR X X X
PTU-AR X X X
PSU-AR X X X
MTU-AR X X X
MSU-AR X X X
12 Abstract syntax
12.1.2 FalArHeader
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
FalArHeader ::= Unsigned8{
-- bit 8-7 ProtocolVersion
-- bit 6-4 ProtocolIdentifier
-- bit 3-1 PDUIdentifier
}
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
12.3.3.2 Upload service
UpLoad-RequestPDU ::= SEQUENCE {
loadRegionKeyAttribute Gn_KeyAttribute,
segmentIdentifier [1] IMPLICIT ANY,
}
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Tm_TimeValue1 ::= Unsigned32 -- eight-bit signed integer, in seconds to the nearest power of two
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
12.4.7.1 Gn_KeyAttribute
Gn_KeyAttribute ::= CHOICE {
-- When this type is specified, only the key attributes of the class referenced are valid.
numericID [0] IMPLICIT Gn_NumericID,
name [1] IMPLICIT Gn_Name,
listName [2] IMPLICIT Gn_Name,
numericAddress [4] IMPLICIT Gn_NumericAddress,
symbolicAddress [5] IMPLICIT Gn_SymbolicAddress
}
12.4.7.2 Gn_Name
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
12.4.7.3 Gn_NumericAddress
Gn_NumericAddress ::= SEQUENCE {
startAddress [0] IMPLICIT Unsigned32, -- physical address of the starting location
length [1] IMPLICIT Unsigned16 -- octet length of a memory block
}
12.4.7.4 Gn_NumericID
Gn_NumericID ::= Unsigned16 -- The values of this parameter are unique within an AP.
12.4.7.5 Gn_SymbolicAddress
Gn_SymbolicAddress ::= VisibleString
12.4.7.6 Gn_FullyNestedTypeDescription
Gn_FullyNestedTypeDescription ::= CHOICE {
boolean [1] Unsigned8,
integer8 [2] Unsigned8,
integer16 [3] Unsigned8,
integer32 [4] Unsigned8,
unsigned8 [5] Unsigned8,
unsigned16 [6] Unsigned8,
unsigned32 [7] Unsigned8,
float32 [8] Unsigned8,
float64 [9] Unsigned8,
binaryDate [10] Unsigned8,
timeOfDay [11] Unsigned8,
timeDifference [12] Unsigned8,
universalTime [13] Unsigned8,
fieldbusTime [14] Unsigned8,
time [15] Unsigned8,
bitstring8 [16] Unsigned8,
bitstring16 [17] Unsigned8,
bitstring32 [18] Unsigned8,
visiblestring1 [19] Unsigned8,
visiblestring2 [20] Unsigned8,
visiblestring4 [21] Unsigned8,
visiblestring8 [22] Unsigned8,
visiblestring16 [23] Unsigned8,
octetstring1 [24] Unsigned8,
octetstring2 [25] Unsigned8,
octetstring4 [26] Unsigned8,
octetstring8 [27] Unsigned8,
octetstring16 [28] Unsigned8,
bcd [29] Unsigned8,
iso10646char [30] Unsigned8,
binarytime0 [31] Unsigned8,
binarytime1 [32] Unsigned8,
binarytime2 [33] Unsigned8,
binarytime3 [34] Unsigned8,
binarytime4 [35] Unsigned8,
binarytime5 [36] Unsigned8,
binarytime6 [37] Unsigned8,
binarytime7 [38] Unsigned8,
binarytime8 [39] Unsigned8,
binarytime9 [40] Unsigned8,
visiblestring [41] Unsigned8,
octetstring [42] Unsigned8,
bitstring [43] Unsigned8,
compactBooleanArray [44] Unsigned8,
compactBCDArray [45] Unsigned8,
iso646string [46] Unsigned8,
structure [47] IMPLICIT SEQUENCE OF Gn_FullyNestedTypeDescription
}
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
UNICODEString ::= UNICODEString -- 16-bit character code set defined in ISO 10646.
13 Transfer syntax
The FAL-PDUs encoded shall have a uniform format. The FAL-PDUs shall consist of two
major parts, the “APDU Header” part and the “APDU Body” part as shown in Figure 3.
NOTE The presence of the InvokeID Field depends on the APDU type.
To realize an efficient APDU while maintaining flexible encoding, different encoding rules are
used for the APDU Header part and the APDU Body part.
NOTE The Data Link Layer service provides a DLSDU parameter that implies the length of the APDU. Thus, the
APDU length information is not included in the APDU.
The APDU Header part is always present in all APDUs that conform to this standard. It
consists of three fields: the FalArHeader Field, the Type Field, and the optional InvokeID Field.
All the FAL PDUs shall have the common PDU-header called FalArHeader. The FalArHeader
identifies abstract syntax, transfer syntax, and each of the PDUs. Table 32 defines how this
header shall be used.
8 7 6 5 4 3 2 1
Service Type
The InvokeID Field shall be present if it is indicated in the abstract syntax. Otherwise, this
field shall not be present. If present, the InvokeID parameter supplied by a service primitive
shall be placed in this field.
13.3.1 General
The FAL encoding rules are based on the terms and conventions defined in ISO/IEC 8825-1.
The encoding consists of three components in the following order:
Identifier Octet
Length Octet(s)
Contents Octet(s)
13.3.2 Identifier Octet
The Identifier Octet shall encode the tag defined in the FAL Abstract Syntax and shall consist
of one octet.
It consists of the P/C flag and the Tag field as shown in Figure 5.
8 7 6 5 4 3 2 1
P/C Tag field
The P/C flag indicates that the Contents Octet(s) is either a simple component (primitive types,
such as Integer8), or a structured component (constructed, such as SEQUENCE, SEQUENCE
OF types).
P/C Flag =0 means the Contents Octet(s) is a simple component.
P/C Flag =1 means the Contents Octet(s) is a structured component.
a) If the value of the first Length Octet is other than 255, there shall be no subsequent
Length Octet(s) and the first octet shall contain the value for the Length Octet defined
later.
b) If the value of the first Length Octet is 255, there shall be two subsequent Length Octet(s)
that shall contain the values for the Length Octets defined later. In this case, the length
information of the Contents Octet(s) shall be represented by the last two octets of the
Length Octets, where the most significant bit of the second of three Length Octets shall be
the most significant bit of the length value and the least significant bit of the third of the
three Length Octets shall be the least significant bit of the length value.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
The sender shall have the option of using either the one-octet format or three-octet format.
For example, the three-octet format may be used to convey a length value of one.
The meaning of the Length Octet(s) depends on the type of value being encoded. If the
encoding of the Contents Octet(s) is primitive, the Length Octet(s) shall contain the number of
octets in the Contents Octets. If the encoding of the Contents Octets is constructed, the
Length Octet(s) shall contain the number of the first level components of the Contents Octets.
8 7 6 5 4 3 2 1
(msb) value of the Length Octet as defined above (lsb)
The Contents Octet(s) shall encode the data value according to the encoding rule defined for
its type.
The Contents Octet(s) shall have either of the following two forms: primitive encoding or
constructed encoding.
a) If the Contents Octet(s) contain a primitive encoding, they represent an encoding of one
value.
b) If the Contents Octet(s) contain a constructed encoding, they represent an enumerated
encoding of more than one value.
13.4.1 General
13.4.1.1 Boolean
a) The Identifier Octet and the Length Octet(s) shall not be present.
b) The Contents Octet(s) component always consists of one octet. If the Boolean value
equals FALSE, all bits of the octet are 0. If the Boolean value equals TRUE, the octet can
contain any combination of bits other than the encoding for FALSE.
13.4.1.2 Integer
first octet gives the sign of the value if the values are restricted to non-negative numbers
only, no sign bit is needed.
only one value on the Visible String type. The Length Octet(s) shall be present if the size
of the Visible String value is variable.
c) The Contents Octet(s) shall be equal in value to the octets in the data value.
c) The Contents Octet(s) shall consist of the encodings of all the element types in the same
order as they are specified in the ASN.1 description of the SEQUENCE type.
13.4.1.16 Null
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
a) The Identifier Octet shall not be present.
b) The Length Octet(s) shall not be present.
c) The Contents Octet(s) shall not be present.
a) The Identifier Octet shall only be present if the tagged type is a part of an alternative type
list in a CHOICE construct.
b) The Length Octet(s) shall not be present.
c) The Contents Octet(s) shall consist of the encoding of the type that was tagged.
An ANY type is used for the definition of complex types, whose structure is described
informally rather than in ASN.1.
This subclause specifies protocol machines of the FAL and the Interface between them.
NOTE The state machines specified in this subclause and ARPMs defined in the following sections only define the
protocol-related events for each. It is a local matter to handle other events.
The behaviour of the FAL is described by three integrated protocol machines. The three kinds
of protocol machines are: FAL Service Protocol Machines (FSPMs), the Application
Relationship Protocol Machines (ARPMs), and the Data Link Layer Mapping Protocol
Machines (DMPMs). Specific protocol machines are defined for different AREP types. The
relationships among these protocol machines as well as primitives exchanged among them
are depicted in Figure 8.
AP Cortext
FSPM
#n ARPM
#1 ARPM
DMPM
a) to accept service primitives from the FAL service user and convert them into FAL internal
primitives;
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
b) to select an appropriate ARPM state machine based on the AREP Identifier parameter
supplied by the AP-Context and send FAL internal primitives to the selected ARPM;
c) to accept FAL internal primitives from the ARPM and convert them into service primitives
for the AP-Context;
d) to deliver the FAL service primitives to the AP-Context based on the AREP Identifier
parameter associated with the primitives.
a) to accept FAL internal primitives from the FSPM and create and send other FAL internal
primitives to either the FSPM or the DMPM, based on the AREP and primitive types;
b) to accept FAL internal primitives from the DMPM and send them to the FSPM in a
converted form for the FSPM;
c) if the primitives are for the Establish or Abort service, it shall try to establish or release the
specified AR.
The DMPM describes the mapping between the FAL and the DLL. It is common to all the
AREP types and does not have any state changes. The DMPM is responsible for the following
activities:
a) to accept FAL internal primitives from the ARPM, prepare DLL service primitives, and
send them to the DLL;
b) to receive DLL indication or confirmation primitives from the DLL and send them to the
ARPM in a converted form for the ARPM.
16.1 General
Many services have the following parameters. Instead of defining them with each service, the
following common definitions are provided.
AREP
This parameter contains sufficient information to identify the AREP to be used to convey the
service. This parameter may use a key attribute of the AREP to identify the application
relationship. When an AREP supports multiple contexts (established using the Initiate service)
at the same time, the AREP parameter is extended to identify the context as well as the AREP.
InvokeID
This parameter identifies this invocation of the service. It is used to associate a service
request with its response. Therefore, no two outstanding service invocations can be identified
by the same InvokeID value.
Error Info
This parameter provides error information for service errors. It is returned in confirmed service
primitives and response primitives.
Table 33 shows the service primitives, including their associated parameters exchanged
between the FAL user and the VARM.
The parameters used with the primitives exchanged between the FAL user and the VARM are
listed in Table 34.
Table 34 – Parameters used with primitives exchanged FAL user and VARM
16.3.2.1 General
The VARM State Machine has only one possible state: ACTIVE.
The VARM state machine is described in Figure 9, and in Table 35 and Table 36.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
user_data := Read-RequestPDU
}
S2 ACTIVE Write.req ACTIVE
=>
ArepID := GetArep(VariableSpecifier)
SelectArep(ArepID, “PTC-AR”),
CS_req{
user_data := Write-RequestPDU
}
S3 ACTIVE InfReport.req ACTIVE
=>
SelectArep(RemoteArep, “MSU-AR”),
UCS_req{
user_data := InformationReport-RequestPDU
}
S4 ACTIVE Read.rsp ACTIVE
=>
SelectArep(ArepID, “PTC-AR”),
CS_rsp{
user_data := Read-ResponsePDU
}
S5 ACTIVE Write.rsp ACTIVE
=>
SelectArep(ArepID, “PTC-AR”),
CS_rsp{
user_data := Write-ResponsePDU
}
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
&& PDU_Type = Read_ResponsePDU
&& GetErrorInfo() <> “success”
=>
Read.cnf(-){
ErrorInfo := GetErrorInfo()
}
R5 ACTIVE CS_ind ACTIVE
&& PDU_Type =Write_ResponsePDU
&& GetErrorInfo() = “success”
=>
Write.cnf(+){
Data := user_data
}
R6 ACTIVE CS_ind ACTIVE
&& PDU_Type = Write_ResponsePDU
&& GetErrorInfo() <> “success”
=>
Write.cnf(-){
ErrorInfo := GetErrorInfo()
}
R7 ACTIVE UCS_ind ACTIVE
&& PDU_Type = InformationReport-RequestPDU
=>
InfReport.ind{
Data := user_data
}
R8 ACTIVE CS_cnf ACTIVE
&& Status = “success”
=>
(no actions taken)
R9 ACTIVE CS_cnf ACTIVE
&& Status <> “success”
&& GetService(InvokeID) = “Read”
=>
Read.cnf(-){
ErrorInfo := Status
}
R10 ACTIVE CS_cnf ACTIVE
&& Status <> “success”
&& GetService(InvokeID) = “Write”
=>
Write.cnf(-){
ErrorInfo := Status
}
16.3.2.3 Functions
Table 37 lists the functions used by the VARM, their arguments and their descriptions.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
16.4.1.1 Primitives exchanged
Table 38 shows the service primitives, including their associated parameters exchanged
between the FAL user and the EVTM.
16.4.2.1 General
The EVTM State Machine has only one possible state: ACTIVE.
The EVTM state machine is described in Figure 10, and in Table 40 and Table 41.
16.4.2.3 Functions
Table 42 lists the function used by the EVTM, their arguments, and their description.
SelectArep ArepID, Looks for the AREP entry that is specified by the ArepID and
ARtype AR type.
Table 43 shows the service primitives, including their associated parameters exchanged
between the FAL user and the LDRM.
The parameters used with the primitives exchanged between the FAL user and the LDRM are
listed in Table 44.
Table 44 – Parameters used with primitives exchanged FAL user and LDRM
16.5.2.1 General
The LDRM State Machine has only one possible state: ACTIVE.
The LDRM state machine is described in Figure 11, and in Table 45 and Table 46.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
16.5.2.3 Functions
Table 47 lists the functions used by the LDRM, their arguments, and their descriptions.
Table 48 shows the service primitives, including their associated parameters exchanged
between the FAL user and the FNIM.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Start.ind FNIM AREP This primitive is used to convey a start request.
InvokeID
FunctionID
Stop.ind FNIM AREP This primitive is used to convey a stop request.
InvokeID
FunctionID
Resume.ind FNIM AREP This primitive is used to convey a resume request.
InvokeID
FunctionID
Start.cnf FNIM AREP This primitive is used to convey a result of start.
InvokeID
Error Info
Stop.cnf FNIM AREP This primitive is used to convey a result of stop.
InvokeID
Error Info
Resume.cnf FNIM AREP This primitive is used to convey a result of resume.
InvokeID
Error Info
The parameter used with the primitives exchanged between the FAL user and the FNIM is
listed in Table 49.
Table 49 – Parameters used with primitives exchanged FAL user and FNIM
16.6.2.1 General
The FNIM State Machine has only one possible state: ACTIVE.
The FNIM state machine is described in Figure 12, and in Table 50 and Table 51.
CS_req{
user_data := Start-RequestPDU
}
S2 ACTIVE Stop.req.req ACTIVE
=>
SelectArep(RemoteArep, “PTC-AR”),
CS_req{
user_data := Stop-RequestPDU
}
S3 ACTIVE Resume.req ACTIVE
=>
SelectArep(RemoteArep, “PTC-AR”),
CS_req{
user_data := Resume-ResponsePDU
}
S4 ACTIVE Start.rsp ACTIVE
=>
SelectArep(ArepID, “PTC-AR”),
CS_rsp{
user_data := Start-ResponsePDU
}
S5 ACTIVE Stop.rsp ACTIVE
=>
SelectArep(ArepID, “PTC-AR”),
CS_rsp{
user_data := Stop-ResponsePDU
}
S6 ACTIVE Resume.rsp ACTIVE
=>
SelectArep(ArepID, “PTC-AR”),
CS_rsp{
user_data := Resume-ResponsePDU
}
ErrorInfo := Status
}
R13 ACTIVE CS_cnf ACTIVE
&& Status <> “success”
&& GetService(InvokeID) = “Resume”
=>
Resume.cnf(-) {
ErrorInfo := Status
}
16.6.2.3 Functions
Table 52 lists the functions used by the FNIM, their arguments, and their descriptions.
Table 53 shows the service primitives, including their associated parameters exchanged
between the FAL user and the TIMM.
The parameters used with the primitives exchanged between the FAL user and the TIMM are
listed in Table 54.
Table 54 – Parameters used with primitives exchanged FAL user and TIMM
16.7.2.1 General
The TIMM State Machine has four possible states. The defined states and their descriptions
are shown in Table 55 and Figure 13.
State Description
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
DOM_MST TIMM is acting as domain time master.
SLAVE TIMM is synchronized with domain time master.
IDLE TIMM is not synchronized with network time.
IDLE
S1, S3
R1
SLAVE
S2, S3, S4
R2, R3, R4
R5
R12
R8
DOM- TIM-
S2, S3 R9
MST MST S2, S3
S5, S6
R2, R6, R7 R2, R10
R11
The TIMM state machine is described in Figure 13, and in Table 56 and Table 57.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
16.7.2.3 Functions
Table 58 lists the functions used by the TIMM, their arguments, and their descriptions.
UpdateLocalTime DelayFactor Updates local clock with the received time and the delay
factor.
CalcurateDelay Calculate the delay factor from received APDU.
CheckTimer TimerID Checks status of the specified timer. If the timer has been
expired, the value “Expired” is returned.
StartTimer TimerID Starts the timer specified.
Table 59 shows the service primitives, including their associated parameters exchanged
between the FAL user and the NWMM.
The parameters used with the primitives exchanged between the FAL user and the NWMM
are listed in Table 60.
Table 60 – Parameters used with primitives exchanged FAL user and NWMM
16.8.2.1 General
The NWMM State Machine has three possible states. The defined states and their
descriptions are shown in Table 61 and Figure 14.
State Description
R3
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
SLAVE MST
S1, S2, S3 S1, S2, S4
R1, R2 R1, R2
R4
The NWMM state machine is described in Figure 14, and in Table 62 and Table 63.
=>
UpdateNWstatus()
CheckNWstatus(NWstatus-table) = “True”
=>
NWStatus.ind{
NetworkStatus := GetNWstatus()
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
16.8.2.3 Functions
Table 64 lists the functions used by the NWMM, their arguments, and their descriptions.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 64 – Functions used by the NWMM
17.1 General
Table 65 lists the primitives, including their associated parameters exchanged between the FSPM
and the ARPM.
The parameters used with the primitives exchanged between the FSPM and the ARPM are
listed in Table 66.
Table 66 – Parameters used with primitives exchanged FSPM user and ARPM
Remote_dlsap_address This parameter contains the destination DLSAP-address in the request and the source
DLSAP-address in the indication.
Destination_dlsap_address This parameter contains the Destination DLSAP-address.
Source_dlsap_address This parameter contains the Source DLSAP-address.
User_data This parameter contains the service dependent body for the APDU.
Result This parameter indicates that the service request succeeded or failed.
Reason_Code This parameter indicates the reason for the Abort.
17.3.1.1 General
The PTC-ARPM State Machine has two possible states. The defined states and their
descriptions are shown in Table 67 and Figure 15.
State Description
CLOSED The AREP is defined, but not capable of sending or receiving FAL-PDUs.
OPEN The AREP is defined and capable of sending or receiving FAL-PDUs.
R1
S3, S4, R2
S1 CLOSED OPEN R3, R4, R5
R6, R7, R8
S2, R11 R9, R10
17.3.1.2 States
The PTC-ARPM state machine is described in Figure 15, and in Table 68 and Table 69.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
17.3.2.1 General
The PTU-ARPM State Machine has two possible states. The defined states and their
descriptions are shown in Table 70 and Figure 16.
State Description
CLOSED The AREP is defined, but not capable of sending or receiving FAL-PDUs.
OPEN The AREP is defined and capable of sending or receiving FAL-PDUs.
R1
The PTU-ARPM state machine is described in Figure 16, and in Table 71 and Table 72.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 71 – PTU-ARPM state table – Sender transitions
17.3.3.1 General
The PSU-ARPM State Machine has two possible states. The defined states and their
descriptions are shown in Table 73 and Figure 17.
State Description
CLOSED The AREP is defined, but not capable of sending or receiving FAL-PDUs.
OPEN The AREP is defined and capable of sending or receiving FAL-PDUs.
R1
The PSU-ARPM state machine is described in Figure 17, and in Table 74 and Table 75.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
=>
DLSAP_ID := dlsap_id
EST_cnf {}
StartTransmitCycleTimer(arep_id)
R2 OPEN FAL-PDU_ind OPEN
&& Role = “Subscriber”
&& FAL_Pdu_Type (fal_pdu) = “UCS_PDU”
=>
UCS_ind {
remote_dlsap_address := calling_address,
user_data := fal_pdu,
}
R3 OPEN FAL-PDU_ind OPEN
&& FAL_Pdu_Type (fal_pdu) <> “UCS_PDU”
=>
(no actions taken)
R4 OPEN FAL-PDU_ind OPEN
&& Role = “Publisher”
=>
(no actions taken)
R5 OPEN Abort_ind CLOSED
=>
ABT_ind{}
17.3.4.1 General
The MTU-ARPM State Machine has two possible states. The defined states and their
descriptions are shown in Table 76 and Figure 18.
State Description
CLOSED The AREP is defined, but not capable of sending or receiving FAL-PDUs.
OPEN The AREP is defined and capable of sending or receiving FAL-PDUs.
R1
The MTU-ARPM state machine is described in Figure 18, and in Table 77 and Table 78.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
17.3.5.1 General
The MSU-ARPM State Machine has two possible states. The defined states and their
descriptions are shown in Table 79 and Figure 19.
State Description
CLOSED The AREP is defined, but not capable of sending or receiving FAL-PDUs.
OPEN The AREP is defined and capable of sending or receiving FAL-PDUs.
R1
The MSU-ARPM state machine is described in Figure 19, and in Table 80 and Table 81.
state
=> action
R1 CLOSED Establish_cnf OPEN
&& status = “Success”
=>
DLSAP_ID := dlsap_id
EST_cnf {}
StartTransmitCycleTimer(arep_id)
R2 OPEN FAL-PDU_ind OPEN
&& Role = “Subscriber”
&& FAL_Pdu_Type (fal_pdu) = “UCS_PDU”
=>
UCS_ind {
remote_dlsap_address := calling_address,
user_data := fal_pdu,
}
R3 OPEN FAL-PDU_ind OPEN
&& || FAL_Pdu_Type (fal_pdu) <> “UCS_PDU”
=>
(no actions taken)
R4 OPEN FAL-PDU_ind OPEN
&& Role = “Publisher”
=>
(no actions taken)
R5 OPEN Abort_ind CLOSED
=>
ABT_ind{}
17.4 Functions
Table 82 lists the functions used by the ARPMs, their arguments, and their descriptions.
18.1 General
The DLL Mapping Protocol Machine is common to all the AREP types.
The primitives issued by ARPM to DMPM are passed to the Data Link Layer as the DLS
primitives. The primitives issued to DMPM from the Data Link Layer are notified to an
appropriate ARPM out of the ARPMs.
DMPM adds and deletes parameters to/from the primitives exchanged between ARPM and the
Data Link Layer if necessary.
The “DL-identifiers” and “DLS-user-identifiers” are mandatory in the DL-services. The FAL
assumes that the values of these parameters are provided by a local means.
Link Layer and the DLS-user. Although they are useful to clarify the operations of the Data
Link Layer, none of them affects protocol behaviour of the FAL and DL. In a real
implementation, these parameters are implementation-dependent. Therefore, parameters that
correspond directly to these buffer or queue identifiers are not described. A means for
identifying the buffers and queues between the FAL and the DL is a local matter.
Table 83 lists the primitives exchanged between the DMPM and the ARPM.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 84 lists the primitives exchanged between the Data Link Layer and the ARPM.
The parameters used with the primitives exchanged between the DMPM and the Data Link
Layer are identical to those defined in Section 4 of this PAS. They are prefixed by “dl_” to
indicate that they are used by the FAL.
The DMPM State Machine has only one possible state. The defined state and their
descriptions are shown in Table 85 and Figure 20.
State Description
ACTIVE The DMPM in the ACTIVE state is ready to transmit or receive primitives to or from
the Data Link Layer and the ARPM.
originator := “local_dls”,
reason := dl_status
}
FAL-PDU_cnf {
status := dl_status
}
R4 ACTIVE DL_Unitdata.cnf ACTIVE
&& dl_status = “success”
=>
(no actions taken)
FAL-PDU_cnf {
status := dl_status
}
Table 88 contains the functions used by the DMPM, their arguments and their descriptions.
19 Overview
19.1 General
The Data Link Service (DLS) provides transparent and reliable data transfer between DLS-
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
users. It makes the way that supporting communication resources are utilized invisible to
DLS-users.
a) Independence from the underlying Physical Layer. The DLS relieves DLS-users from all
direct concerns regarding which configuration is available (for example, direct connection,
or indirect connection through one or more bridges) and which physical facilities are used
(for example, which of a set of diverse physical paths).
b) Transparency of transferred information. The DLS provides the transparent transfer of
DLS-user-data. It does not restrict the content, format or coding of the information, nor
does it ever need to interpret the structure or meaning of that information. It may, however,
restrict the amount of information that can be transferred as an indivisible unit.
c) Reliable data transfer. The DLS relieves the DLS-user from concerns regarding insertion
or corruption of data, or, if requested, loss, duplication or misordering of data, which can
occur. In some cases of unrecovered errors in the Data Link Layer, duplication or loss of
DLSDUs can occur. In cases where protection against misordering of data is not
employed, misordering can occur.
d) Quality of Service (QoS) selection. The DLS provides DLS-users with a means to request
and to agree upon a quality of service for the data transfer. QoS is specified by means of
QoS parameters representing aspects such as mode of operation, transit delay, accuracy,
reliability, security and functional safety.
e) Addressing. The DLS allows the DLS-user to identify itself and to specify the DLSAPs
to/from which data are to be transferred.
f) Scheduling. The DLS allows the set of DLS-users to provide some guidance on internal
scheduling of the distributed DLS-provider. This guidance supports the time-critical
aspects of the DLS, by permitting the DLS-user some degree of management over when
opportunities for communication will be granted to various DLEs for various DLSAP-
addresses.
g) Common time sense. The DLS can provide the DLS-user with a sense of time that is
common to all DLS-users on the network.
h) Queues. The DLS can provide the sending or receiving DLS-user with a FIFO queue,
where each queue item can hold a single DLSDU.
Although the DLS conforms formally to the “three-layer” Fieldbus Reference Model, it actually
utilizes the Transport Layer Service and Network Layer Service in addition to the Data Link
Layer Service of the OSI Basic Reference Model. The DLS of this specification is actually a
Transport Layer Service in terms of the OSI Basic Reference Model. Thus the network may
consist of one or more subnetworks interconnected to each other by the Network Layer Relay
entities, known as routers.
A segment consists of one or more DLEs, all of which are connected directly (i.e., without
intervening DL-relay entities) to a single shared logical communication channel, which is
called a link.
A path (logical communication channel) consists of one or two physically independent and
logically parallel real communication channels, which are called links.
station number
a numeric identifier that indicates a Vnet/IP station. Two end nodes comprising a dual-
redundant station have an identical station number.
TSAP address
the DL-entity actually provides Transport Layer Services, so DLS is provided at TSAPs. TSAP
is identified by a set of TSAP-address (IP-Address) and TSAP-identifier (UDP Port Number).
IP address
a unique address for each end node. An IP address consists of a network address portion and
a host address portion. The network address is assigned according to the domain number,
while the host address is assigned based on the station number. Each end node of a dual-
redundant station has a different host address.
MAC address
MAC address is a unique address for an end node defined in ISO/IEC 8802-3. The destination
MAC address is resolved by the mechanism defined in RFC 826 from the destination IP
address.
20.1 Overview
This clause provides a conceptual definition of the services provided by the DLS-provider to
the DLS-user(s). Nothing in this section shall be construed to constrain the actual
implementations of the interactions at the DLS-provider to DLS-user interface.
c) a means for binding previously created FIFO queues to an each potential direction of
connectionless data transfer at the specified DLSAP.
d) a means for specifying QoS parameters of the specified DLSAP.
e) a means for releasing resources used previously for the DLSAP.
This part of the PAS uses the abstract model for a layer service defined in ISO/IEC 10731,
Clause 5. The model defines interactions between the DLS-user and the DLS-provider that
take place at a DLSAP. Information is passed between the DLS-user and the DLS-provider by
DLS primitives that convey parameters.
The DLSAP management primitives are used to provide a local service between a DLS-user
and the local DLE. Remote DLEs and remote DLS-users are not involved directly, so there is
no need for the other primitives of ISO/IEC 10731. Therefore the DLSAP management
services are provided by request primitives with input and output parameters.
Table 89 is a summary of the DLSAP management primitives and parameters. The major
sequence of primitives at a single DLE is shown in Figure 21.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
20.5 Create
20.5.1 Function
The create queue DLS primitive may be used to create a limited-depth FIFO queue for later
constrained association with a DLSAP. The resulting FIFO queue initially will be empty.
Table 90 lists the primitive and parameters of the create queue DLS.
This parameter specifies a means of referring to the queue in output parameters of other local
DLS primitives that convey the name of the queue from the local DLE to the local DLS-user.
This parameter specifies an upper bound on the size (in octets) of DLSDUs that can be put
into the queue.
This parameter specifies the maximum number of items in the associated queue.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
20.5.2.4 Status
This parameter allows the DLS-user to determine whether the requested DLS was provided
successfully, or failed for the reason specified. The possible value conveyed in this parameter
is as follows:
a) “success”;
b) “failure — insufficient resources”;
c) “failure — parameter violates management constraint”;
d) “failure — number of requests violates management constraint”; or
e) “failure — reason unspecified”.
NOTE Addition to, or refinement of, this list of values, to convey more specific diagnostic and management
information is permitted.
This parameter is present when the Status parameter indicates that the DL-C REATE request
primitive was successful. The queue DL-identifier parameter gives the local DLS-user a
means of referring to the queue in input parameters of other local DLS primitives that convey
the name of the queue from the local DLS-user to the local DLE.
20.6 Delete
20.6.1 Function
The delete queue DLS primitive may be used to delete a queue created by an earlier create
queue DLS primitive.
Table 91 lists the primitive and parameters of the delete queue DLS.
This parameter specifies the local queue to be deleted. Its value shall be the queue DL-
identifier returned by a successful prior DL-C REATE request primitive. The DLS-provider will
release the local DL-identifier and associated DLS-provider resources.
The DLS-user shall not delete a queue that is still associated with a DLSAP.
20.6.2.2 Status
This parameter allows the DLS-user to determine whether the requested DLS was provided
successfully, or failed for the reason specified. The value conveyed in this parameter is as
follows:
a) “success”;
b) “failure — resource in use”; or
c) “failure — reason unspecified”.
NOTE Addition to, or refinement of, this list of values, to convey more specific diagnostic and management
information is permitted. --``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
20.7 Bind
20.7.1 Function
Table 92 lists the primitive and parameters of the Bind DLSAP-address DLS.
This parameter specifies the local DL-identifier for sending, which has been returned by a successful
prior DL-CREATE request primitive that created a queue, which has not yet been deleted.
This parameter specifies the local DL-identifier for receiving, which has been returned by a
successful prior DL-C REATE request primitive that created a queue, which has not yet been
deleted.
The DLS-user may specify values for some of the QoS parameters that apply to
connectionless data transmission. If a value is not specified, the default value set by DL-
management is applied for the DLSAP
This parameter specifies service subtype of the DLSAP, and the value conveyed in this
parameter is as follows:
This parameter specifies the timing window within the macro cycle. It consists of the starting
time in the macro cycle and the time duration when DLE is permitted to transmit DL-U NITDATA
DLPDUs.
20.7.2.11 Status
This parameter allows the DLS-user to determine whether the requested DLS was provided
successfully, or failed for the reason specified. The possible value conveyed in this parameter
is as follows:
a) “success”;
b) “failure — insufficient resources”;
c) “failure — DLSAP-address invalid or unavailable”;
d) “failure — invalid queue binding”;
e) “failure — requested QoS attribute is not available”; or
f) “failure — reason unspecified”.
NOTE Addition to, or refinement of, this list of values, to convey more specific diagnostic and management
information is permitted.
The DLSAP-address DL-identifier parameter is present when the status parameter indicates
that the DL-B IND request primitive was successful. The DLSAP-address DL-identifier
parameter gives the local DLS-user a means of referring to the DLSAP-address in input
parameters of other local DLS primitives that convey the name of the DLSAP-address from
the local DLS-user to the local DLE.
20.8 Unbind
20.8.1 Function
The unbind DLSAP-address DLS primitive is used to unbind a DLSAP-address from the
invoking DLSAP. Any queues that were bound explicitly to the DLSAP-address are also
unbound from that DLSAP-address at the same time.
Table 93 lists the primitive and parameter of the unbind DLSAP-address DLS.
This parameter specifies the local DL-identifier returned by a successful prior DL-B IND request
primitive. The DLS-provider shall unbind the local DL-identifier, its associated DLSAP-address,
and any associated queues from the invoking DLSAP, and terminate all outstanding DL-
U NITDATA requests associated with that DLSAP-address.
20.8.2.2 Status
This parameter allows the DLS-user to determine whether the requested DLS was provided
successfully, or failed for the reason specified. The possible value conveyed in this parameter
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
is as follows:
a) “success”;
b) “failure – reason unspecified”.
NOTE Addition to, or refinement of, this list of values, to convey more specific diagnostic and management
information is permitted.
21.1 Overview
This clause provides a conceptual definition of the services provided by the DLS-provider to
the DLS-user(s). Nothing in this section shall be construed to constrain the actual
implementations of the interactions at the DLS-provider to DLS-user interface.
a) a means of transferring DLSDUs with limited length from one source DLSAP to a
destination DLSAP or a group of DLSAPs, without establishing or later releasing a Data
Link connection. The transfer of DLSDUs is transparent, which means that the boundaries
of DLSDUs and the contents of DLSDUs are preserved unchanged by the DLS, and there
are no constraints on the DLSDU content (other than limited length) imposed by the DLS
provider. QoS for this transmission may be selected by the sending DLS-user.
b) a means by which the status of delivery to that destination DLSAP can be returned to the
source DLSAP.
21.3.1 General
This clause uses the abstract model for a layer service defined in ISO/IEC 10731, Clause 5.
The model defines local interactions between the DLS-user and the DLS-provider that take
place at a DLSAP. Information is passed between the DLS-user and the DLS-provider by DLS
primitives that convey parameters.
A local identification mechanism is provided for each use of the DLS which needs to correlate
a confirmation or subsequent cancellation request with its associated request.
This service permits a local DLS-user to transfer a DLSDU to a single remote end node. The
local DLS-user receives a confirmation acknowledging the completion of the transfer, but not
whether the DLSDU was duly received. At the remote end node this DLSDU is delivered to a
single local DLS-user, if the respective DLPDU is received error-free. There is no confirmation
to the sending DLS-user that such an intended delivery has taken place.
This service permits the local DLS-user to send a DLSDU to a single remote end node. At the
remote end node, the DLSDU is delivered by the remote DLE to its local DLS-user, if the
respective DLPDU is transferred error-free. The originating local DLS-user receives a
confirmation that indicates whether the DLSDU was received by the remote DLS-user. If an
error occurred during the transfer, the originating DLE retransmits the DLSDU appropriately. If
the specified number of retransmissions fail, a confirmation with error status will be issued to
the local DLS-user.
This service permits the local DLS-user to send a sequence of DLSDUs to a single remote
end node. At the remote end node, the DLSDU are delivered in the original order requested
by the remote DLE to its local DLS-user. The originating local DLS-user receives confirmation
of completion of the transmission of each DLSDU, but does not receive confirmation of receipt
of the DLSDU by the remote DLS-user. If an error occurred during transfer, the originating
DLE retransmits the DLSDUs appropriately. A sequence of DLSDUs is formed from the
requested DLSDUs by originating DLE according to a preconfigured rule.
This service permits a local DLS-user to transfer a DLSDU to the preconfigured group of
remote end nodes at the same time. The local DLS-user receives confirmation of completion
of the transmission, but does not receive confirmation of receipt of the DLSDU by the remote
DLS-user. At each addressed remote end node, this DLSDU is delivered to the remote DLS-
user, if the respective DLPDU is received error-free. There is no confirmation to the sending
DLS-user that such an intended delivery has taken place.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This service permits a local DLS-user to transfer a DLSDU to a preconfigured group of remote
end nodes at the same time. The local DLS-user receives confirmation of completion of the
transmission, but does not receive confirmation of receipt of the DLSDU by the remote DLS-
user. At each remote addressed end node, the DLSDU are delivered to the remote DLS-user
in the original requested order.
A DLS-user may select many aspects of the various Data Link Services. The term “Quality of
Service” (QoS) refers to certain characteristics of a connectionless-mode data transmission
as observed between the DLSAPs. QoS describes aspects of data transmission that are
related solely to the DLS-provider. QoS can only be determined properly when DLS-user
behaviour does not constrain or impede performance of the DLS.
The QoS attributes of the DL-data transfer services apply conceptually to the connectionless
operation. The DLS-user may specify values for these attributes when binding a DLSAP-
address to the DLS-user’s DLSAP; any unspecified attributes will assume the default values
set by DL-management.
The data delivery feature depends on the type of service, as specified in Table 94.
All connectionless data transfer requests specify an associated DLL priority used in
scheduling DLL data transfer services.
The choice of sending priority implicitly selects the timing characteristics of the DLS provider
execution of the transmission. The following four alternative priorities are available:
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
a) URGENT,
b) HIGH,
c) NORMAL and
d) TIME-AVAILABLE.
The DLSDU requested to transmit with higher priority will be transmitted earlier than those
with lower priority.
Each connectionless service request specifies an upper bound on the maximum time duration
permitted for the completion of each related instance of DLS primitives:
a) the maximum time for completion of a related sequence of locally confirmed DL-U NITDATA
primitives; and
b) the maximum time for completion of a related sequence of remotely confirmed DL-
U NITDATA primitives;
Each parameter has the value UNLIMITED or specifies an upper bound in units of 1 ms, from 1
ms to 60 s inclusive.
This attribute specifies the level of authentication for data transfer. The following four
alternative levels are available:
a) “no authentication”
b) “use 64-bit key code”
c) “use 128-bit key code”
d) “use 256-bit key code”
This parameter specifies the upper bound on acceptable residual error rate of the underlying
layer service.
The DLL monitors the bit error rate of the underlying layer service continuously. Under
conditions where the residual error rate is higher than the maximum residual error rate, the
requested DL-UNITDATA request is completed with error. The residual error rate is calculated
from the bit error rate and the error detection performance.
This feature allows the DLS-user to switch the sending interface to prevent unexpected loss of
data integrity caused by the underlying service.
This parameter specifies the timing window within the macro cycle. It consists of the starting
time in the macro cycle and the time duration when DLE is permitted to transmit DL-U NITDATA
DLPDUs.
This subclause defines the constraints on the sequence in which the primitives defined may
occur. The constraints determine the order in which primitives occur, but do not fully specify
when they may occur. Other aspects of actual system operation, such as PhL problems
affecting messages in transit, will affect the ability of a DLS-user or a DLS provider to issue a
primitive at any particular time.
The connectionless-mode primitives and their parameters are summarized in Table 95.
A primitive issued at one DLSAP will have consequences at one or more other DLSAPs. The
relations of primitives are summarized in the diagrams of Figure 22.
DL-
U NITDATA
request DL-U NITDATA
indication
DL-
U NITDATA
confirm
DL-
U NITDATA
request DL-U NITDATA
indication
DL-
U NITDATA
confirm
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
The possible overall sequences of primitives at a DLSAP are defined in the state transition
diagram, Figure 23. The state transition diagram describes the allowable sequences of
service primitives, but does not impose any requirements or constraints on the internal
organization of any implementation of the service.
Idle
1 DL-U NITDATA request,
indication, or confirm
For the remote-confirmed service, the DLS provides the means by which the receiving DLS-
user may control the rate at which the sending DLS-user may send DLSDUs.
Table 96 lists the primitive and parameters of the DL-connectionless-mode U NITDATA transfer
DLS .
This parameter conveys an address identifying the remote DLSAP(s) with which the DLS is to
be provided. It is a DLSAP-address in the request primitive, but takes the form of a local
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
This parameter conveys an address of the local DLSAP from which the DLS has been
requested. It is a DLSAP-address in the indication primitive, but takes the form of a local
DLSAP-address and DL-identifier in the request primitive.
This parameter has the same value as a Queue DLS-user-identifier parameter from prior DL-
C REATE primitive.
21.7.4 DLS-user-data
This parameter allows the data transfer between DLS-users without alteration by the DLS-
provider. The initiating DLS-user may transmit any integral number of octets greater than zero
up to the limit number determined by the Maximum DLSDU size parameter from a prior DL-
C REATE primitive.
21.7.5 Status
This parameter allows the DLS-user to determine whether the requested service was provided
successfully, or failed for the reason specified. The possible value conveyed in this parameter
is as follows:
a) “success”;
b) “failure — sending queue full”;
c) “failure — no requesting DLS-user data specified”;
d) “failure — requested QoS unavailable”;
e) “failure — calling DLSAP DL-identifier is invalid”;
f) “failure — terminated by U NBIND of source DLSAP-address”;
g) “failure — resource limitation in responder”;
h) “failure — fault in responder”;
i) “failure — high bit error rate”;
j) “failure — timeout before transmission”;
k) “failure — timeout after transmission, before acknowledgment”;
l) “failure — sequence number incorrect”; or
m) “failure — reason unspecified”.
NOTE Addition to, or refinement of, this list of values, to convey more specific diagnostic and management
information is permitted.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
22 DL-management Service
This clause defines the form of DL-management services for protocols that implement the
DLS. Only the form is specified, as the specifics of permitted parameters are dependent on
the protocol that implements these services.
This noteworthy difference between this and the prior clauses is the intended class of users;
this clause is intended for use by a management client, while the prior clauses provide
services to any client.
This clause uses the abstract model for a layer service defined in ISO/IEC 10731, Clause 5.
The model defines local interactions between the DLMS-user and the DLMS-provider.
Information is passed between the DLMS-user and the DLMS-provider by DLMS primitives
that convey parameters.
This subclause defines the constraints on the sequence in which the primitives defined may
occur. The constraints determine the order in which primitives occur, but do not fully specify
when they may occur.
The DL-management primitives and their parameters are summarized in Table 97. The only
time-sequence of primitives is shown in Figure 24.
DLM-Action
request
DLM-Action
confirm
22.5 Set
This primitive may be used to set (write) the value of a DLE configuration parameter.
DLM-S ET Request
Parameter name input output
DLM-object-identifier M
Desired-value M
Status M
22.5.1.1 DLM-object-identifier
This parameter specifies the primitive or composite object within the DLE the value of which is
to be altered. The naming-domain of the DLM-object-identifier is the DLM-local-view.
22.5.1.2 Desired-value
This parameter specifies the desired value for the DLM-object specified by the associated
DLM-object-identifier. Its type is identical to that of the specified DLM-object.
22.5.1.3 Status
This parameter allows the DLMS-user to determine whether the requested DLMS was
provided successfully, or failed for the reason specified. The possible value conveyed in this
parameter is as follows:
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
a) “success”;
b) “failure — DLM-object-identifier is unknown”;
c) “failure — desired-value is not permitted”; or
d) “failure — reason unspecified”.
22.6 Get
22.6.1 Function
This primitive may be used to get (read) the value of a DLE configuration parameter,
operational parameter or statistic.
DLM-G ET Request
Parameter name input output
DLM-object-identifier M
Status M
Current-value C
22.6.2.1 DLM-object-identifier
This parameter specifies the primitive or composite object within the DLE whose value is
being requested. The naming-domain of the DLM-object-identifier is the DLM-local-view.
22.6.2.2 Status
This parameter allows the DLMS-user to determine whether the requested DLMS was
provided successfully, or failed for the reason specified. The possible value conveyed in this
parameter is as follows:
a) “success”;
b) “failure — DLM-object-identifier is unknown”; or
c) “failure — reason unspecified”.
22.6.2.3 Current-value
This parameter is present when the status parameter indicates that the requested service was
performed successfully. This parameter specifies the current value for the DLM-object
specified by the associated DLM-object-identifier. Its type is identical to that of the specified
DLM-object.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
22.7 Action
22.7.1 Function
Table 100 lists the primitive and parameters of the A CTION DLMS.
22.7.2.1 Desired-action
This parameter specifies the desired action that the DLE is to take.
22.7.2.2 Action-qualifiers
This optional parameter specifies additional action-specific parameters that serve to qualify
the commanded action.
22.7.2.3 Status
This parameter allows the DLMS-user to determine whether the requested DLMS was
provided successfully, or failed for the reason specified. The possible value conveyed in this
parameter is as follows:
a) “success”;
b) “failure — action is unknown”;
c) “failure — action is not permitted in current DLE state”;
d) “failure — action did not complete”; or
e) “failure — reason unspecified”.
22.7.2.4 Additional-information
This optional parameter provides action-specific additional information that augments the
returned status.
22.8 Event
22.8.1 Function
This primitive is used to report the occurrence of a significant DL-event for DL-management.
Table 101 lists the primitive and parameters of the E VENT DLMS.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Additional-information C
22.8.2.1 DLM-event-identifier
This parameter specifies the primitive or composite event within the DLE the occurrence of
which is being announced. The naming-domain of the DLM-event-identifier is the DLM-local-
view.
22.8.2.1.1 Additional-information
23.1 General
The Vnet/IP Data Link Layer provides basic real-time and reliable communications between
devices in automation environments.
a) procedures of the Data Link (DL) protocols for real-time data transfer and control
information from one Data Link Service user entity to a peer user entity, and among the
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Data Link entities forming the distributed Data Link Service provider.
b) the structure of the Data Link Protocol Data Units (DLPDUs) used for data transfer and
control information, and their mapping to the underlying layers.
a) the interactions between peer DL-entities (DLEs) through the exchange of fieldbus Data
Link Protocol Data Units.
b) the interactions between a DL-service (DLS) provider and a DLS-user in the same system
through the exchange of DLS primitives.
c) the interactions between a DLS-provider and a Physical Service provider in the same
system through the exchange of Ph-service primitives.
The requirements of continuous process control, e.g. in the Oil & Gas, Petrochemical &
Chemical, Pharmaceutical and Power industries, result in the following characteristic features
of the Vnet/IP Data Link protocol.
The maximum system size for this protocol is 254 subnetworks of 254 nodes, where each
node has 254 DLSAP-addresses. All Data Link entities can communicate with all others in a
cyclic or acyclic manner with prioritized access, or in a combination of the two.
This protocol provides reliable and flexible communications by remotely confirmed acyclic data
transfer with retransmission. In addition, it provides a dual-redundant network with a switchover
time of less than 100 ms, and also provides the facilities for dual-redundant devices.
23.3.1 General
With the exception of the real-time data transfer function, each function is implemented
according to the following existing protocols specified in Table 102.
Function Compliance
Datagram transfer function RFC 768 (UDP)
Network routing function RFC 791 (IP)
Media access function ISO/IEC 8802-3
The real-time data transfer function is specified in this specification, and it provides the
Connectionless-mode Data Link Service specified in Section 4 of this PAS.
The datagram transfer function is compliant with RFC 768 (UDP definition), and provides
datagram transfer service for the real-time data transfer function.
The network routing function is compliant with RFC 791 (IP definition), and provides datagram
routing service for the datagram transfer function.
This function also performs fragmentation of a datagram to maintain independence from MTU
of the underlying sublayer. The function utilizes two logical link functions to realize a dual-
redundant network.
In a dual-redundant station, two network routing entities are implemented for both end nodes.
The logical link and media access function is compliant with ISO/IEC 8802-3. It provides
fragments transfer service within a subnetwork and a means of accessing the network for the
network routing function.
Two entities that execute media access function are implemented in a node to realize a dual-
redundant network.
The management function is specified in this specification, and it provides the DL-
management Service and DLSAP management Data Link Service. These services are
specified in Section 4 of this PAS.
23.4.1 General
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
The services provided by the DLL are specified in Section 4 of this PAS.
QoS attributes specified by the DLS-user select some aspects of the various Data Link
Services, and can be specified only when a DLSAP-address is bound to the DLS-user’s
DLSAP.
This attribute determines a service subtype of data transfer service of DLSAP specified by
DL-B IND request.
Each service subtype has different data delivery features and different data transfer
relationships i.e., the point-to-point or multipoint model. Some QoS attributes are limited by
the type of service subtype.
This attribute determines the upper bound on the time delay permitted until the DL-U NITDATA
service is confirmed, i.e., the maximum permissible delay between the issuing of a DL-
U NITDATA request primitive and receiving of the corresponding DL-U NITDATA confirm primitive.
This attribute specifies an associated DLL priority used in scheduling DLL data transfer
services. The DL-protocol should support four DLL priority levels. The four DLL priorities, from
highest to lowest priority, are as follows:
a) URGENT
b) HIGH
c) NORMAL
d) TIME-AVAILABLE
The priority attribute assigned for each DLSDU is recognized by both of the sending DLE and
receiving DLE, and it may be translated to the underlying service QoS parameter which is
used by lower entities to control the priority of PDU transfer.
In the sending DLE, DLSDU with higher priority requested by a DL-U NITDATA request primitive
is transmitted in advance of any other DLSDUs with lower priority.
In the receiving DLE, the received DLPUD with higher priority is delivered to the DLS-user in
advance of any other DLPDUs with lower priority.
The DLS-user data requested by DL-U NITDATA request are conveyed in a single DLPDU. The
Maximum DLSDU size attribute specifies an upper bound on the size (in octets) of DLSDUs
that will be offered for transmission, and an upper bound on the size of DLSDUs that are
acceptable for reception.
NOTE The maximum size of DLSDU supported for DLSAP, which is assigned as Acknowledged Unitdata transfer
Service (AUS) for service subtype, is limited to 2048.
This attribute specifies the level of authentication for data transfer. The following four
alternative levels are available:
a) “no authentication”
b) “use 64-bit key code”
c) “use 128-bit key code”
d) “use 256-bit key code”
This parameter specifies upper bound on acceptable residual error rate of the underlying layer
service.
The DLL monitors the bit error rate of the underlying layer service continuously. Under
conditions where the residual error rate, calculated from the bit error rate and the error
detection performance, is higher than the maximum residual error rate, the requested DL-
U NITDATA request is completed with error.
This feature supports the DLS-user switching the sending interface to prevent unexpected
loss of data integrity caused by the underlying service.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Other TCP-based protocols, such as HTTP and FTP, can work on the same network alongside
communication of the DLE. In this case, total traffic of communication based on other
protocols shall be limited by some means such as switching hubs. The methods for limitation
are outside the scope of this specification.
24.1 Overview
The specification of the transfer syntax combines the specification of the abstract syntax and
their encodings as a set of fixed-format DLPDUs. Each DLPDU contains a DLPDU common
header and a DLPDU body.
The DLPDU body consists of an individual header, which is specified by the service subtype,
and the DLSDU.
The following data types, which are specified in Part 3 of this document, are used in DLPDU
definitions.
a) Unsigned8
b) Unsigned16
c) Unsigned32
d) OctetString
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
8 0x80 128
7 0x40 64
6 0x20 32
5 0x10 16
4 0x08 8
3 0x04 4
2 0x02 2
1 0x01 1
Although the DLS conforms formally to the “three-layer” Fieldbus Reference Model, it actually
utilizes the Network Layer Service of the OSI Basic Reference Model and IP address
specified by RFC 791.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
1= 2 octet authentication data, simplified control
2= 2 octet authentication data, full control
3= 4 octet authentication data, simplified control
4= 4 octet authentication data, full control
All other values are reserved
Bits 4-1: indicate safety option
0= No safety control
All other values are reserved.
Total Length 4 Unsigned32 4 Indicates octet length of the DLPDU
Authentication 8 Unsigned n Authentication data created according to the security
Data type
The length is specified by the security option.
Integrity Data 8+n Unsigned m Authentication data created according to the security
type
The length is specified by the safety option.
Table 106 defines assignment of the Service Subtype and PDU type field of the common
header for each DLPDU.
Service Subtype
This parameter is the same as Service Subtype in the common header.
PDU subtype
This parameter specifies the subtype that represents the role of the DLPDU.
Status
This parameter indicates the status of the transaction.
Sequence number
This parameter identifies the DT_PDU, and is also used to inform the latest received DT_PDU
in the RSP_PDUs.
DLSAP ID
This parameter indicates the DLSAP identifier.
DLSDU length
This parameter indicates the octet length of the DLSDU.
DLSDU
This parameter is the user data requested by the Unitdata request.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 108 and Table 109 indicate body formats of DLPDU for AUS.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
Table 110, Table 111 and Table 112 indicate body formats of DLPDU for ASS.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
25 Local parameters and resources
25.1 General
The Data Link Layer uses the following local parameters and resources:
Unless otherwise specified, at the moment of creation of these resources or of DLE activation:
a) all variables shall be initialized to their default value, or to their minimum permitted value
if no default is specified;
b) all counters shall be initialized to zero;
c) all timers shall be initialized to inactive.
The following data types which are specified in Section 3 of this PAS ment are used in the
definitions of parameters and resources.
a) Boolean
b) Integer
c) BinaryTime2 (1 ms resolution)
d) BinaryTime5 (1 s resolution)
e) IPaddress
Table 115 lists the parameters and resources related to the network structure.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
P(GA 1B ) IP-group-address-1B IP-group-address of the multicast to all nodes in the domain for
interface B
P(GA 2A ) IP-group-address-2A IP-group-address of the multicast to all nodes of the network for
interface A
P(GA 2B ) IP-group-address-2B IP-group-address of the multicast to all nodes of the network for
interface B
P(AB DA ) IP-base-address-domain-A Base subnet-address of domains for interface A
P(AB DB ) IP-base-address-domain-B Base subnet-address of domains for interface B
V(TD) this-domain Domain number of this domain
The possible range of values is 1 to P(ND)
V(TS) this-station Station number of this station
The possible range of values is 1 to P(NS)
V(RID) redundant-node-ID End node Identifier of the redundant station
Possible values are “0” and “1”
V(IP A ) IP-address-A IP-address for interface A
This variable is assigned according to the P(TD), P(AB DA ), P(TS) and
P(RID)
V(IP A ) = P(AB DA ) + P(TD) + P(TS) x2 + P(RID)
V(IP B ) IP-address-B IP-address for interface B
This variable is assigned according to the P(TD), P(AB DB ), P(TS) and
P(RID)
V(IP B ) = P(AB DB ) + P(TD) + P(TS) x2 + P(RID)
Table 117 lists the parameters and resources used to support real-time data transfer.
Table 119 lists the parameters and resources used to support the scheduling function.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
P(TD AUS ) BinaryTime2 1 ms to (P(MC) – 1 ms)
P(TD ASS ) BinaryTime2 1 ms to (P(MC) – 1 ms)
P(TD MUS ) BinaryTime2 1 ms to (P(MC) – 1 ms)
P(TD MSS ) BinaryTime2 1 ms to (P(MC) – 1 ms)
P(TO UUS ) BinaryTime2 0 ms to P(TD UUS )
P(TO AUS ) BinaryTime2 0 ms to P(TD AUS )
P(TO ASS ) BinaryTime2 0 ms to P(TD ASS )
P(TO MUS ) BinaryTime2 0 ms to P(TD MUS )
P(TO MSS ) BinaryTime2 0 ms to P(TD MSS )
P(DV UUS ) Integer 1 to 255
P(DV AUS ) Integer 1 to 255
P(DV ASS ) Integer 1 to 255
P(DV MUS ) Integer 1 to 255
P(DV MSS ) Integer 1 to 255
Table 121 lists the parameters and resources used to support the security function.
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
2) Transmits ENQ_PDU
3) Increments C(RT ASS )
4) Starts T(NR ASS )
seqNo <> V(SQ SND ) 1) Clears wait_flag
&& C(RT ASS ) = P(MRC ASS ) 2) Clears V(SQ SND )
status = “buffer busy” 1) Retransmit DT_PDUs from DT_PDU with seqNo in
&& C(RT ASS ) < P(MRC ASS ) the RSP_PDU
2) Waits P(TWT ASS )
3) Transmits ENQ_PDU
4) Increments C(RT ASS )
5) Starts T(NR ASS )
status = “buffer busy” 1) Clears wait flag
&& C(RT ASS ) < P(MRC ASS ) 2) Clears V(SQ SND )
Receive DT_PDU seqNo = “0” 1) Issues a DL-UNITDATA indication primitive at the
&& buffer is available DLSAP with DLSDU
2) Clears busy_flag
3) Update V(SQ RCV )
seqNo = V(SQ RCV ) + 1 1) Issues a DL-UNITDATA indication primitive at the
&& buffer is available DLSAP with DLSDU
2) Update V(SQ RCV )
seqNo = V(SQ RCV ) + 1 1) Discard the DT_PDU
&& buffer is not available 2) Sets busy_flag
seqNo <> V(SQ RCV ) + 1 1) no action taken
Receive EQ_PDU busy_flag = “false” 1) Transmits RSP_PUD with V(SQ RCV )
busy_flag = “true” 1) Transmits RSP_PUD with V(SQ RCV ) and “buffer
busy” status
27 DL-support protocol
27.1.1 Overview
The transmission timing of each DLPDU is scheduled in one or more time slot(s) within the
macro-cycle. These time slots are specified by the system parameters according to the
service subtype and the transmitting station number.
27.1.2 Macro-cycle
The macro-cycle is a base time period in which transmission is controlled. The duration of the
macro-cycle is specified by the parameter macro-cycle-period P(MC). Every node has
synchronized macro-cycle by means of a time synchronization mechanism.
NOTE This synchronization mechanism is outside the scope of Section 5 of this PAS.
The transmission time slot for each service subtype is specified by the following parameters:
The start timing of each slot in the macro-cycle is specified by the following equation:
The end timing of each slot in the macro-cycle is specified by the following equation.
DT_PDUs are transmitted in the time slot that is selected according to the service subtype of
the DT_PDU, and the other DL_PDUs may be transmitted at any time.
NOTE As the scheduling is controlled over the UDP service, the actual timing of transmission to medium is
affected by the delay caused by the underlying layer service. Therefore, some considerations are required for
implementation.
27.2 Redundancy
27.2.1.1 General
The network always has a dual-redundant structure. Both the primary and secondary channels
are diagnosed periodically by the application entities. The information concerning the
consistency of channels is shared among all end nodes of the network and maintained in the
network status table specified in Section 3 of this PAS.
The interface to which DLPDU is transmitted is selected according to the network status table.
The DLE selects a transmission channel for UUS_DLPDUs and receives them as follows:
a) The DLE transmits UUS_DT_PDUs to the channel selected according to the general rule
specified in subclause 27.2.1.1.
b) The DLE receives every UUS_PDU regardless of the receiving channel.
The DLE selects a transmission channel for AUS_DLPDUs and receives them as follows:
a) The DLE first transmits a DT_PDU to the channel selected according to the general rule
specified in subclause 27.2.1.1. If errors are detected, the DLL retransmits the DT_PDU to
the same channel. After retransmissions the number of which is half the maximum retry
count, the DLE changes the transmission channel to the alternate channel.
b) The DLE always transmits RSP_PDU to the channel from which the DT_PDU was
received.
c) The DLE receives the AUS_DT_PDU the sequence number of which is not the same as
the value of the last received AUS_DT_PDU from the sending end node, regardless of the
receiving channel.
d) The DLE receives every AUS_RSP_PDU regardless receiving channel.
The DLE selects a transmission channel for ASS_DLPDUs and receives them as follows:
a) The DLE transmits a DT_PDU to the channel selected according to the general rule
specified in subclause 27.2.1.1.
b) The DLE transmits an ENQ_PDU to the channel selected according to the general rule
specified in subclause 27.2.1.1.
NOTE The application entity checks the consistency of the channels periodically and updates the network status
table. Consequently, the channel for retransmission is changed to the alternate channel.
The DLE selects the transmission channel for MUS_DLPDUs and receive them as follows:
a) The DLE always transmits DT_PDU for both of the redundant channels. Actually, it is
realized by transmitting to two multicast addresses assigned for the primary and
secondary networks.
b) The DLE receives the MUS_DT_PDU regardless of the receiving channel.
The DLE selects the transmission channel for MUS_DLPDUs and receive them as follows:
a) The DLE always transmits DT_PDU for both of the redundant channels. Actually, it is
realized by transmitting to two multicast addresses assigned for the primary and
secondary networks.
b) The DLE receives the MSS_DT_PDU the sequence number of which is not the same as
the value of the last received MSS_DT_PDU from the sending end node, regardless of the
receiving channel.
27.2.2.1 General
A redundant station consists of two end nodes that have different DLSAPs. One end node is
in the on-service state, and the other end node is in the standby state. Each end node acts
according to its state. The switching over mechanism is outside the scope of this PAS.
The DLE of the station that communicates with a redundant station selects one end node of
the redundant station as the destination according to the information in the network status
table, as follows:
The DLE of the end node in the on-service state acts as follows:
The DLE of the end node in the standby state acts as follows:
a) The DLE does not provide any DLE services to the DLS-user, except in the case where
the “standby end node” is specified explicitly.
b) The DLE does not accept any DT_PDUs, except in the case where the “standby end node”
is specified explicitly.
c) The DLE does not respond to any ENQ_PDUs, except in the case where the “standby end
node” is specified explicitly.
d) The DLE does not accept any RSP_PDUs, except in the case where the “standby end
node” is specified explicitly.
The sending DLE puts authentication data into the DLPDU. The authentication data are
generated from all octets of the DLPDU except the authentication data field, and the common
secret key shared by both end nodes.
The receiving DLE checks the octets of the DLPDU including the authentication data field with
the common secret key.
The method for authentication data generation and checking is outside the scope of this PAS.
The common secret key is shared by means of the public key exchange method.
Both of the local end nodes generate a private number (x) for each. The method of the private
key generation is outside the scope of this PAS. In addition, the public key (y) is generated
from the prime number (p) and the base number (g) assigned for the network as follows.
y = g^x % p
All end nodes are informed of the public key by multicasting. This is realized by the
application entity using the MUS DLE service.
The common secret key (z) is generated from the private number and the public key of the
peer end node, as follows.
z = y^x % p
The private number (x) shall be updated after every period specified by P(UD).
______________
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
The IEC would like to offer you the best quality standards possible. To make sure that we
continue to meet your needs, your feedback is essential. Would you please take a minute
to answer the questions overleaf and fax them to us at +41 22 919 03 00 or mail them to
the address below. Thank you!
Nicht frankieren
Ne pas affranchir
A Prioritaire
Non affrancare
No stamp required
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
RÉPONSE PAYÉE
SUISSE
--``,`,`,,,,``,,,```,`,`,``,,``-`-`,,`,,`,`,,`---
military
other.....................................................
Q8 I read/use the: (tick one)
ISBN 2-8318-8032-7
-:HSMINB=] UXW\:
ICS 25.040.40; 35.240.50; 35.100.05