Shopping Cart

No products in the cart.

BSI 23/30471808 DC:2023 Edition

$24.66

BS EN IEC/IEEE 60802. Time-sensitive networking profile for industrial automation

Published By Publication Date Number of Pages
BSI 2023 134
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
9 FOREWORD
11 INTRODUCTION
12 1 Scope
2 Normative References
15 3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 General
3.2 List of terms, abbreviated terms and definitions given in various standards
17 3.3 Terms defined in this document
19 3.4 Abbreviated terms and acronyms
22 3.5 Conventions
3.5.1 Principles for (sub) clause selections of referenced documents
3.5.2 Convention for capitalizations
3.5.3 Unit conventions
3.5.4 Conventions for YANG contents
23 4 Overview of TSN in industrial automation
4.1 Industrial application operation
24 4.2 Industrial applications
4.2.1 General
26 4.2.2 Control loop tasks
27 4.2.3 Start of control loop tasks
4.3 IA-stations
4.4 Ethernet interface
28 4.5 Mechanisms that can be used to meet control loop latency requirements
29 4.6 Translation between middleware and network provisioning
4.6.1 Interfaces of type l2vlan
30 4.6.2 PTP Instances
32 4.7 Industrial traffic types
4.7.1 General
4.7.2 Traffic type characteristics
4.7.3 Traffic type categories
4.7.3.1 General
4.7.3.2 IA time-aware stream
33 4.7.3.3 IA stream
4.7.3.4 IA traffic engineered non-stream
4.7.3.5 IA non-stream
4.7.4 Traffic types
4.7.4.1 General
34 4.7.4.2 Isochronous
4.7.4.3 Cyclic-synchronous
4.7.4.4 Cyclic-asynchronous
4.7.4.5 Alarms and events
4.7.4.6 Configuration and diagnostics
35 4.7.4.7 Network control
4.7.4.8 Best effort
4.7.4.9 Traffic class to traffic type mapping
4.8 Security for TSN-IA
4.8.1 General
4.8.2 Security configuration model
36 4.8.3 NETCONF/YANG processing
37 4.8.4 NETCONF/YANG access control
38 4.8.5 Identity checking
39 4.8.6 Secure device identity
4.8.6.1 Device Identity
4.8.6.2 Verifiable Device Identity
4.8.6.3 Verification Support Mechanisms
4.8.6.3.1 General
4.8.6.3.2 Secure Transports
4.8.6.3.3 Secure Information
40 4.8.6.3.4 IDevID and LDevID Credentials
4.8.6.3.5 IDevID Items beyond IEEE Std 802.1AR
41 4.8.6.3.6 Device Identity Representation in IDevID and LDevID Credentials
5 Conformance
5.1 General
5.2 Requirements terminology
42 5.3 Profile conformance statement (PCS)
5.4 Conformance classes
5.5 IA-station requirements
5.5.1 IA-station PHY and MAC requirements for external ports
43 5.5.2 IA-station topology discovery requirements
5.5.3 IA-station requirements for time synchronization
44 5.5.4 IA-station requirements for security
5.5.5 IA-station requirements for management
5.5.5.1 General
5.5.5.2 Network Configuration Protocol (NETCONF)
45 5.5.5.3 IA-station management YANG modules
5.5.6 IA-station requirements for digital data sheet
5.6 IA-station options
5.6.1 IA-station PHY and MAC options for external ports
46 5.6.2 IA-station options for time synchronization
5.6.3 IA-station options for security
5.6.4 IA-station options for management
47 5.7 Bridge component requirements
5.7.1 Common Bridge component requirements
5.7.2 ccA Bridge component requirements
48 5.7.3 ccB Bridge component requirements
5.8 Bridge component options
5.8.1 Common Bridge component options
5.8.2 ccA Bridge component options
49 5.8.3 ccB Bridge component options
5.9 End station component requirements
5.9.1 Common End Station Component Requirements
50 5.9.2 ccA end station component requirements
5.9.3 ccB end station component requirements
5.10 End station component options
5.10.1 Common end station component options
51 5.10.2 ccA end station component options
5.10.3 ccB end station component options
5.11 CNC requirements
52 5.12 CNC options
5.13 CUC requirements
6 Required functions for an industrial network
6.1 General
6.2 Synchronization
6.2.1 General
6.2.2 PTP Instance requirements
53 6.2.3 PTP protocol requirements
56 6.2.4 Clock states
57 6.2.5 Grandmaster PTP Instance requirements
6.2.6 Application framework
58 6.2.7 Working Clock domain framework
59 6.2.8 Global Time domain framework
6.2.9 IA-station model for clocks
61 6.2.10 Clock usage for the Ethernet interface
6.2.10.1 Time-aware offset control
6.2.10.2 Gating cycle
62 6.2.11 Error model
63 6.2.12 gPTP domains and PTP Instances
6.2.13 Split and combine cases for a PTP domain
65 6.3 Security model
6.3.1 General
66 6.3.2 Security functionality
6.3.2.1 Message exchange protection
6.3.2.1.1 General
6.3.2.1.2 TLS profile
6.3.2.1.3 Certificate-to-name mapping
67 6.3.2.1.4 Role extension
6.3.2.2 Resource access authorization
68 6.3.3 IDevID Profile
6.3.3.1 General
6.3.3.2 Object Contents
6.3.3.2.1 General
6.3.3.2.2 IA-Station Identity
69 6.3.3.2.3 Signature Suites
6.3.3.3 Information Model
6.3.3.3.1 General
6.3.3.3.2 Entries
6.3.3.3.3 Entry Manifoldness
70 6.3.3.3.4 Entry Naming
6.3.3.4 Processing Model
6.3.3.4.1 General
6.3.3.4.2 Credentials
6.3.3.4.2.1 General
6.3.3.4.2.2 Creation
6.3.3.4.2.3 Distribution
6.3.3.4.2.4 Use
71 6.3.3.4.2.5 Storage
6.3.3.4.2.6 Revocation
6.3.3.4.3 Trust Anchors
6.3.3.4.3.1 General
72 6.3.3.4.3.2 Creation
6.3.3.4.3.3 Distribution
6.3.3.4.3.4 Use
6.3.3.4.3.5 Storage
6.3.3.4.3.6 Revocation
6.3.4 Security setup based on IDevID
6.3.4.1 General
6.3.4.2 imprintTrustAnchor
74 6.3.4.3 imprintCredential
6.3.4.3.1 General
6.3.4.3.2 Internal key generation
75 6.3.4.3.3 External key generation
6.3.4.4 imprintCertToNameMapping
76 6.3.5 Secure configuration based on LDevID-NETCONF
6.4 Bridge delay Requirements
6.5 Bridge FDB requirements
77 6.6 Bridge reporting requirements
6.7 Management
6.7.1 General
6.7.2 IA-station management model
6.7.2.1 General
6.7.2.2 IEEE 802.1Q management model
78 6.7.2.3 Internal LAN connection model
79 6.7.2.4 Spanning Tree, VLAN and TE-MSTID configuration
81 6.7.2.5 l2vlan type interfaces
82 6.7.3 Discovery of IA-station internal structure
6.7.4 Network engineering model
86 6.7.5 Operation
6.7.5.1 General
88 6.7.5.2 Domain port states
90 6.7.5.3 Engineered network
91 6.7.5.4 Dynamic topology
6.7.5.4.1 General
6.7.5.4.2 Adding an IA-station
6.7.5.4.3 Removing an IA-station
92 6.7.5.4.4 Replacing an IA-station
6.7.5.5 Engineered network extended by dynamic topology
6.7.6 Engineered time-synchronization spanning tree
6.7.6.1 General
6.7.6.2 Sync tree requirements
6.7.6.3 STE phases
6.7.6.3.1 General
6.7.6.3.2 Discovery phase
93 6.7.6.3.3 Provisioning phase
6.7.6.3.4 Monitoring phase
6.7.6.3.4.1 General
6.7.6.3.4.2 Status monitoring
6.7.6.3.4.3 Performance monitoring
94 6.7.6.4 Adding an IA-station
6.7.6.5 Removing an IA-station
6.7.6.6 Replacing an IA-station
6.7.7 Diagnostics
6.7.7.1 General
95 6.7.7.2 Observer model
6.7.7.3 Usage of YANG Push
96 6.7.7.4 Mandatory RPCs
6.7.7.5 Mandatory notifications
6.7.7.6 Mandatory diagnostics data nodes
6.7.7.7 Usage of NETCONF notifications
6.7.8 Data sheet
6.7.8.1 General
97 6.7.8.2 Digital data sheet of an IA-station
98 6.7.8.3 Traffic requirements description
6.7.9 YANG representation of managed objects
6.7.9.1 General
6.7.9.2 Common YANG modules, features and leaves
6.7.9.2.1 General
6.7.9.2.2 IEEE standard for Ethernet
99 6.7.9.2.3 Station and media access control connectivity discovery
100 6.7.9.2.4 Synchronization
6.7.9.2.4.1 Timesync
101 6.7.9.2.4.2 Timesync (draft ieee802-dot1as-ptp)
102 6.7.9.2.4.3 Timesync (iecieee60802)
6.7.9.2.5 Security configuration modules
6.7.9.2.5.1 YANG module for a keystore
103 6.7.9.2.5.2 Network configuration access control
6.7.9.2.5.3 A YANG data module for a truststore
6.7.9.2.6 IA-station management
6.7.9.2.6.1 System capabilities
104 6.7.9.2.6.2 YANG library
6.7.9.2.6.3 NETCONF extensions to support the network management datastore architecture
6.7.9.2.6.4 YANG push
6.7.9.2.6.5 YANG notification capabilities
6.7.9.2.6.6 YANG notifications
105 6.7.9.2.6.7 NETCONF monitoring
6.7.9.2.6.8 System management
6.7.9.2.6.9 Hardware management
106 6.7.9.2.6.10 Interface management
6.7.9.2.6.11 Bridge component
108 6.7.9.2.6.12 IEC/IEEE 60802 YANG module
109 6.7.9.2.6.13 NETCONF Client
6.7.9.2.6.14 NETCONF Server
6.7.9.2.7 YANG Module for TSN UNI
110 6.7.9.3 Optional YANG models, features and leaves
6.7.9.3.1 General
6.7.9.3.2 Scheduled traffic
111 6.7.9.3.3 Frame preemption
6.7.9.3.4 Credit-based shaper
6.8 Topology discovery and verification
6.8.1 Topology discovery and verification requirements
112 6.8.2 Topology discovery overview
6.8.2.1 General
6.8.2.2 LLDP operational control parameters
113 6.8.2.3 LLDPDU transmission, reception, and addressing
6.8.2.4 LLDP TLV selection
6.8.2.4.1 General
6.8.2.4.2 Chassis ID TLV
6.8.2.4.3 Port ID TLV
6.8.2.4.4 Time To Live TLV
114 6.8.2.4.5 System capabilities TLV
6.8.2.4.6 Management address TLV
6.8.2.5 LLDP remote systems data
6.8.3 Topology verification overview
6.9 CNC
6.9.1 General
6.9.2 Stream destination MAC address range
116 Annex A (normative) PCS proforma – Time-sensitive networking profile for industrial automation
A.1 General
A.2 Abbreviations and special symbols
A.2.1 Status symbols
A.2.2 General abbreviations
117 A.3 Instructions for completing the PCS proforma
A.3.1 General structure of the PCS proforma
A.3.2 Additional information
A.3.3 Exception information
118 A.3.4 Conditional status
A.3.4.1 Conditional items
A.3.4.2 Predicates
A.3.4.3 References to other standards
A.3.5 Electronic datasheet
119 A.4 Common requirements
A.4.1 Implementation identification
A.4.2 Profile summary, IEC/IEEE 60802
A.4.3 Implementation type
120 Annex B (informative) Representative Configuration Domain
121 Annex C (informative) Error model
C.1 General
C.2 Time error components due to relaying of time
122 C.3 Time error components due to providing time to the Grandmaster or to an end application
123 Annex D (informative) Description of Clock Control System
D.1 Introduction
124 D.2 Transfer function for control system
125 D.3 Frequency response for control system
130 D.4 Example
132 Annex Z (informative) Gaps
Z.1 Gaps for Release 1:
133 Z.2 Topics for Edition 2:
134 Bibliography
BSI 23/30471808 DC
$24.66