{"id":409435,"date":"2024-10-20T05:35:30","date_gmt":"2024-10-20T05:35:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62264-62022\/"},"modified":"2024-10-26T10:15:24","modified_gmt":"2024-10-26T10:15:24","slug":"bs-en-iec-62264-62022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62264-62022\/","title":{"rendered":"BS EN IEC 62264-6:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Figures Figure 1 \u2013 Steps in application-to-application communication Figure 2 \u2013 Defined standards at each level <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions, abbreviation, and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.2 Abbreviations <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3.3 Conventions 4 Overview of the MSM 4.1 Positioning of the MSM <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.2 Abstract service model 4.3 Transaction models supported Figure 3 \u2013 Positioning and role of MSM <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4.4 Application roles 4.5 MSM channels Figure 4 \u2013 Messaging service model terminology <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.6 MSM channel services 4.6.1 Types of channel services 4.6.2 Channel management services 4.6.3 Publication channel services Figure 5 \u2013 Channel management services Tables Table 1 \u2013 Application roles, channels, and services <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.6.4 Request channel services 4.7 Notify listener service Figure 6 \u2013 Publication channel services Figure 7 \u2013 Request channel services <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5 Methods of operation of channels 5.1 Channel and topic identification 5.2 Channel names and hierarchy 5.2.1 Channel names 5.2.2 Channel name hierarchy 5.2.3 MSM root Figure 8 \u2013 Notify listener service <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.2.4 Channel scope 5.2.5 Information scope 5.2.6 Channel use Table 2 \u2013 Channel use for transaction verbs <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.3 Publication expiration Figure 9 \u2013 Changes and checkpoint channel example <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.4 Topics 5.4.1 Topic definition 5.4.2 Topic names <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.5 Sessions 5.6 Security 5.6.1 Secure message exchanges 5.6.2 Security tokens on channels <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.6.3 Security token format 5.6.4 MSM service provider implementations 6 Service definitions 6.1 Type definitions Figure 10 \u2013 Security of channels <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.2 Defined return value of services Table 3 \u2013 Type definitions Table 4 \u2013 Service fault definitions <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.3 Channel management services 6.3.1 Create channel 6.3.2 Add security tokens Table 5 \u2013 Service parameter definitions Table 6 \u2013 Create channel Table 7 \u2013 Add security tokens <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.3.3 Remove security tokens 6.3.4 Delete channel 6.3.5 Get channel Table 8 \u2013 Remove security tokens Table 9 \u2013 Delete channel <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.3.6 Get channels 6.4 Notify listener service Table 10 \u2013 Get channel Table 11 \u2013 Get channels Table 12 \u2013 Notify listener <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.5 Provider publication services 6.5.1 Open publication session 6.5.2 Post publication 6.5.3 Expire publication Table 13 \u2013 Open publication session Table 14 \u2013 Post publication <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.5.4 Close publication session 6.6 Consumer publication services 6.6.1 Open subscription session Table 15 \u2013 Expire publication Table 16 \u2013 Close publication session <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.6.2 Read publication 6.6.3 Remove publication Table 17 \u2013 Open subscription session Table 18 \u2013 Read publication <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.6.4 Close subscription session 6.7 Provider request services 6.7.1 Open provider request session Table 19 \u2013 Remove publication Table 20 \u2013 Close subscription session <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.7.2 Read request 6.7.3 Remove request Table 21 \u2013 Open provider request session Table 22 \u2013 Read request <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.7.4 Post response 6.7.5 Close provider request session 6.8 Consumer request services 6.8.1 Open consumer request session Table 23 \u2013 Remove request Table 24 \u2013 Post response Table 25 \u2013 Close provider request session <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.8.2 Post request 6.8.3 Read response Table 26 \u2013 Open consumer request session Table 27 \u2013 Post request <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.8.4 Remove response 6.8.5 Close consumer request session Table 28 \u2013 Read response Table 29 \u2013 Remove response Table 30 \u2013 Close consumer request session <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7 Scenarios 7.1 Publish-subscribe scenarios 7.1.1 Simple publish-subscribe scenario 7.1.2 Publish-subscribe scenario with multiple messages Figure 11 \u2013 Publication scenario with notification <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 7.1.3 Publish-subscribe scenario without notification Figure 12 \u2013 Publication scenario with multiple messages <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.1.4 Multiple publisher scenario Figure 13 \u2013 Publication without notification <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 7.1.5 Publish-subscribe scenario with publication expiration Figure 14 \u2013 Publication with multiple provider applications <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 7.2 Request channel scenarios 7.2.1 Request-response scenario with notification Figure 15 \u2013 Publication with expired publications <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.2.2 Request-response scenario without notification Figure 16 \u2013 GET\/SHOW request service scenario <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7.2.3 Multiple providers Figure 17 \u2013 CHANGE \/ RESPONSE request service scenario <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8 Conformance Figure 18 \u2013 Multiple providers CHANGE\/RESPONSE scenario <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex A (informative)MSM service provider considerations A.1 Service provider considerations A.2 Notification A.3 Security considerations A.4 MSM application implementation considerations <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | A.5 MSM channel security considerations A.6 MSM session ID considerations A.7 Data format validation A.8 Allowed application checking A.9 Data exchange logging A.10 Common error handling <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | A.11 Data transformation services A.12 Cross company bridges Figure A.1 \u2013 Transformation services with the MSM service provider <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | A.13 Message maintenance Figure A.2 \u2013 Cross company bridge between multiple MSMs <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Annex B (informative)Enterprise Service Buses <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Figure B.1 \u2013 Standard interface to ESBs and other message exchange systems <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Enterprise-control system integration – Messaging service model<\/b><\/p>\n |