• EN 62734:2015

    Current The latest, up-to-date edition.

    Industrial networks - Wireless communication network and communication profiles - ISA 100.11a

    Available format(s): 

    Language(s): 

    Published date:  23-01-2015

    Publisher:  European Committee for Standards - Electrical

    Pure ENs are not available for sale, please purchase a suitable national adoption

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    0 Introduction
    1 Scope
    2 Normative references
    3 Terms, definitions, abbreviated terms, acronyms,
       and conventions
    4 Overview
    5 System
    6 System management role
    7 Security
    8 Physical layer
    9 Data-link layer
    10 Network layer
    11 Transport layer
    12 Application layer
    13 Provisioning
    Annex A (informative) - User layer/application profiles
    Annex B (normative) - Communication role profiles
    Annex C (informative) - Background information
    Annex D (normative) - Configuration defaults
    Annex E (informative) - Use of backbone networks
    Annex F (normative) - Basic security concepts - Notation
            and representation
    Annex G (informative) - Using certificate chains for
            over-the-air provisioning
    Annex H (normative) - Security building blocks
    Annex I (informative) - Definition templates
    Annex J (informative) - Operations on attributes
    Annex K (normative) - Standard object types
    Annex L (informative) - Standard data types
    Annex M (normative) - Identification of tunneled legacy
            fieldbus protocols
    Annex N (informative) - Tunneling and native object mapping
    Annex O (informative) - Generic protocol translation
    Annex P (informative) - Exemplary GIAP adaptations for this standard
    Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
    Annex R (informative) - Host system interface to standard-compliant
            devices via a gateway
    Annex S (informative) - Symmetric-key operation test vectors
    Annex T (informative) - Data-link and network headers for
            join requests
    Annex U (informative) - Gateway role
    Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
    Bibliography
    Annex ZA (normative) - Normative references to international
             publications with their corresponding
             European publications

    Abstract - (Show below) - (Hide below)

    IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.

    General Product Information - (Show below) - (Hide below)

    Development Note New AMD 1 Child is Added
    Document Type Standard
    Product Note New AMD 1 Child is Added
    Publisher European Committee for Standards - Electrical
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    TS 103 329 : 1.1.1 WIRELESS INDUSTRIAL APPLICATIONS (WIA); RADIO EQUIPMENT TO BE USED IN THE 5,725 GHZ TO 5,875 GHZ FREQUENCY RANGE WITH POWER LEVEL UP TO 400 MW; METHODS AND CONCEPTS FOR A WIA SYSTEM APPROACH TO SHARING IN THE 5,725 GHZ TO 5,875 GHZ BAND

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
    ISO 18435-2:2012 Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 7498-3:1997 Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing
    ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
    ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
    IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
    ISA 100.11A : 2011 WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
    ISO 2382-12:1988 Information processing systems Vocabulary Part 12: Peripheral equipment
    ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
    NAMUR NE 107 : 2017 SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    IEC 62591:2016 Industrial networks - Wireless communication network and communication profiles - WirelessHARTTM
    IEC TR 62390:2005 Common automation device - Profile guideline
    IEEE 802.3-2012 IEEE Standard for Ethernet
    IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
    EN 300 440-1 : 1.6.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
    IEEE 802.1Q-2014 IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
    EN 300 328-1 : 1.3.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
    IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
    ISO/IEC/IEEE 60559:2011 Information technology Microprocessor Systems Floating-Point arithmetic
    IEC 62657-2:2017 Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
    NAMUR NE 105 : 2016 SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
    IEC 61512-1:1997 Batch control - Part 1: Models and terminology
    IEC 62264-1:2013 Enterprise-control system integration - Part 1: Models and terminology
    IEC 61804-3:2015 Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
    ISO/IEC 2375:2003 Information technology — Procedure for registration of escape sequences and coded character sets
    IEEE 802.16-2012 IEEE Standard for Air Interface for Broadband Wireless Access Systems
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
    ISA TR100.00.01 : 2006 THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
    ISO 21188:2006 Public key infrastructure for financial services Practices and policy framework
    ISO/IEC 2382-14:1997 Information technology Vocabulary Part 14: Reliability, maintainability and availability
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    ISO/IEC 7498-4:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    IEC 61499-4:2013 Function blocks - Part 4: Rules for compliance profiles
    ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
    ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective