• Shopping Cart
    There are no items in your cart

DD IEC PAS 62601 : DRAFT MAR 2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE

Superseded date

30-06-2014

Superseded by

BS IEC 62601:2011

Published date

23-11-2012

Sorry this product is not available in your region.

FOREWORD
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms, and
   conventions
   3.1 Terms and definitions
   3.2 Abbreviated terms and acronyms
4 Definition of data types
   4.1 Representation of Boolean type
   4.2 Representation of integer type
   4.3 Representation of unsigned integer type
   4.4 Representation of floating point number type
   4.5 Representation of visible string type
   4.6 Representation of 8-bit byte type
   4.7 Representation of bit string type
   4.8 Representation of time-of-day type
   4.9 Representation of binary date type
   4.10 Representation of time difference type
5 WIA-PA overview
   5.1 Device Type
   5.2 Network Topology
   5.3 Stack
   5.4 Interconnection
6 System Management
   6.1 Overview
   6.2 Framework of system management
   6.3 Virtual Communication Relationship
   6.4 Network management
   6.5 Network Management Agent
   6.6 Device management
   6.7 Management Information Base (MIB)
   6.8 Interaction with plant operations or maintenance personnel
7 Physical Layer
8 Data link layer
   8.1 General
   8.2 Stack structure
   8.3 Functional description
   8.4 DLL frame formats
   8.5 Data link layer data services
   8.6 Data link layer management services
   8.7 Data link layer management information base (DLL-MIB)
9 Network Layer
   9.1 General
   9.2 Stack structure
   9.3 Function description
   9.4 Network layer packet formats
   9.5 Network layer data services
   9.6 Network layer management services
   9.7 Network layer management information Base (NL-MIB)
10 Application Layer
   10.1 Overview
   10.2 UAP
   10.3 Application Sub-layer
   10.4 Application layer frame formats
   10.5 Application layer management information base
11 Security
   11.1 General
   11.2 Security management
   11.3 Security mechanism
   11.4 Security Services
   11.5 Key management
Bibliography

Describes WIA-PA system architecture and communication protocol for process automation based on IEEE 802.15.4.

Committee
AMT/7
DocumentType
Draft
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

Standards Relationship
IEC PAS 62601:2009 Identical

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 17799:2005 Information technology Security techniques Code of practice for information security management
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
IEC 61499-1:2012 Function blocks - Part 1: Architecture
ISO/IEC 10181-5:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
IEC 61499-2:2012 Function blocks - Part 2: Software tool requirements
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.