logo资料库

IEEE Std 1815-2012 for Electric Power Systems Communications - D....pdf

第1页 / 共821页
第2页 / 共821页
第3页 / 共821页
第4页 / 共821页
第5页 / 共821页
第6页 / 共821页
第7页 / 共821页
第8页 / 共821页
资料共821页,剩余部分请下载后查看
IEEE Std 1815-2012 Front Cover
Title Page
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Patents
Participants
0 Introduction
0.1 DNP3 purpose and history
0.1.1 Addressing an impediment to automation
0.1.2 Rationale for a new protocol based on standards
0.1.3 Need for scalability
0.1.4 Emphasis on reliability
0.1.5 Feature selection
0.1.6 Rationale for DNP3 subset definitions
0.1.7 Features to support distributed capabilities
0.1.8 Additional communications features
0.1.9 Compatibility with IEC protocols
0.1.9.1 Hamming Distance
0.1.9.2 Addressing of binary outputs
0.1.9.3 Reality today
0.1.10 Transport Function
0.1.11 DNP Users Group
0.1.12 Summary
0.1.13 Background: Origins of the name “DNP3”
0.2 DNP3 overview
0.2.1 Basic messages and data flow
0.2.2 Layering
0.2.2.1 General
0.2.2.2 Fragments, segments, and frames
0.2.3 Message sequences
0.2.4 Data loss and efficiency
0.2.5 Unsolicited responses
0.2.6 IP networking
0.3 Organization of DNP3 Specification
0.4 Conventions used in this standard
0.4.1 Notes
0.4.2 Examples
0.4.3 Single master, single outstation perspective
Contents
Figures
Tables
Examples
Important Notice
1 Overview
1.1 Scope
1.2 Purpose
1.3 Octet order
2 Normative references
3 Definitions, acronyms, and abbreviations
3.1 Definitions
3.2 Acronyms and abbreviations
3.3 Special terms
4 Application Layer—part 1
4.1 Application Layer preface
4.1.1 Layering
4.1.2 Introduction to points and point types
4.1.3 Introduction to indexes, groups, and variations
4.1.3.1 Indexes
4.1.3.2 Groups
4.1.3.3 Variations
4.1.4 DNP3 objects
4.1.5 Static, event, and class data
4.1.5.1 Static
4.1.5.2 Events
4.1.5.3 Classes
4.1.6 Outstation event buffering
4.2 Message structure
4.2.1 Application Layer fragments
4.2.2 Application Layer fragment structure
4.2.2.1 General fragment structure
4.2.2.2 Application request header
4.2.2.3 Application response header
4.2.2.4 Application control octet
4.2.2.4.1 FIR field
4.2.2.4.2 FIN field
4.2.2.4.3 CON field
4.2.2.4.4 UNS field
4.2.2.4.5 SEQ field
4.2.2.5 Function code octet
4.2.2.6 Internal indications
4.2.2.7 Object headers
4.2.2.7.1 Object group
4.2.2.7.1.1 Object group 60
4.2.2.7.2 Object variation
4.2.2.7.2.1 Variation 0
4.2.2.7.2.2 Variations other than Variation 0
4.2.2.7.3 Qualifier and range fields
4.2.2.7.3.1 Res field
4.2.2.7.3.2 Object prefix code
4.2.2.7.3.3 Range specifier codes
4.2.2.7.3.4 Valid qualifier codes
4.2.2.7.3.5 Preferred qualifier codes
4.2.2.7.4 Qualifier examples
4.3 Fragment rules
4.4 Detailed function code procedures
4.4.1 Function code 0
4.4.2 Function code 1 (0x01)
4.4.2.1 Read Rules
4.4.2.2 Examples
4.4.3 Function code 2 (0x02)
4.4.3.1 Rules
4.4.3.2 Examples
4.4.4 Function codes 3 (0x03) and 4 (0x04)
4.4.4.1 Select–operate philosophy
4.4.4.2 Multiple control objects
4.4.4.2.1 CROBs and AOBs
4.4.4.2.2 Pattern Control Blocks and Masks
4.4.4.3 Control-related rules
4.4.4.4 Examples
4.4.5 Function codes 5 (0x05) and 6 (0x06)
4.4.6 Function codes 7 (0x07) and 8 (0x08)
4.4.6.1 Objects in freeze requests
4.4.6.2 Examples
4.4.7 Function codes 9 (0x09) and 10 (0x0A)
4.4.8 Function codes 11 (0x0B) and 12 (0x0C)
4.4.9 Function codes 13 (0x0D) and 14 (0x0E)
4.4.10 Function code 15 (0x0F)
4.4.11 Function codes 16 (0x10) and 17 (0x11) and 18 (0x12)
4.4.12 Function code 19 (0x13)
4.4.13 Function code 20 (0x14) and 21 (0x15)
4.4.14 Function code 22 (0x16)
4.4.15 Function code 23 (0x17)
4.4.15.1 Rules
4.4.15.2 Examples
4.4.16 Function code 24 (0x18)
4.4.16.1 Rules
4.4.16.2 Examples
4.4.17 Function codes 25 (0x19), 26 (0x1A), 27 (0x1B), and 30 (0x1E)
4.4.17.1 Preliminary notes
4.4.17.1.1 File handles
4.4.17.1.2 File Command Status Objects
4.4.17.1.3 File Transport Status objects
4.4.17.1.4 Additional information
4.4.17.2 Opening a file
4.4.17.2.1 Request messages
4.4.17.2.2 Response messages
4.4.17.3 Closing a file
4.4.17.4 Deleting a file
4.4.17.5 Aborting a file transfer
4.4.18 Function code 28 (0x1C)
4.4.19 Function code 29 (0x1D)
4.4.20 Function code 31 (0x1F)
4.4.21 Function code 32 (0x20)
4.4.22 Function code 33 (0x21)
4.4.23 Function code 129 (0x81)
4.4.24 Function code 130 (0x82)
4.4.25 Function code 131 (0x83)
4.5 Detailed IIN bit descriptions
4.5.1 IIN1.0—Broadcast Message Received [BROADCAST]
4.5.2 IIN1.1—Additional Class 1 Event Data Is Available [CLASS_1_EVENTS]
4.5.3 IIN1.2—Additional Class 2 Event Data Is Available [CLASS_2_EVENTS]
4.5.4 IIN1.3—Additional Class 3 Event Data Is Available [CLASS_3_EVENTS]
4.5.5 IIN1.4—Time Synchronization Required [NEED_TIME]
4.5.6 IIN1.5—Some Output Points Are In Local Mode [LOCAL_CONTROL]
4.5.7 IIN1.6—Device Trouble [DEVICE_TROUBLE]
4.5.8 IIN1.7—Device Restart [DEVICE_RESTART]
4.5.9 IIN2.0—Function Code Not Implemented [NO_FUNC_CODE_SUPPORT]
4.5.10 IIN2.1—Object Unknown [OBJECT_UNKNOWN]
4.5.11 IIN2.2—Parameter Error [PARAMETER_ERROR]
4.5.12 IIN2.3—Event Buffer Overflow [EVENT_BUFFER_OVERFLOW]
4.5.13 IIN2.4—Operation Is Already Executing [ALREADY_EXECUTING]
4.5.14 IIN2.5—Configuration Corrupt [CONFIG_CORRUPT]
4.5.15 IIN2.6—Reserved Bit [RESERVED_2]
4.5.16 IIN2.7—Reserved Bit [RESERVED_1]
4.6 Unsolicited responses
4.6.1 Unsolicited response timing
4.6.2 Outstation configuration
4.6.2.1 Compulsory configuration
4.6.2.2 Non-compulsory configuration
4.6.3 Support unsolicited enabling and disabling
4.6.4 Confirmation and application control octet
4.6.5 Device restart
4.6.6 Normal runtime behavior
4.6.7 Unsolicited response timing examples
4.7 Support for functions sent to a broadcast address
5 Application Layer—part 2
5.1 Additional details
5.1.1 Device startup
5.1.1.1 Outstation startup
5.1.1.1.1 Outstation requirements
5.1.1.1.2 Master requirements
5.1.1.2 Master startup
5.1.2 Point index range recommendations
5.1.3 Event reporting
5.1.4 Data types in class data responses
5.1.4.1 Static data, group 60, variation 1
5.1.4.2 Event data, group 60, variations 2, 3, and 4
5.1.5 Data processing order
5.1.5.1 Event and static data
5.1.5.1.1 Reporting binary input and double-bit binary input events
5.1.5.1.2 Reporting non-binary input and non-double-bit binary input events
5.1.5.1.3 Mixed event and static data
5.1.5.2 Integrity poll
5.1.5.3 Outstation event buffer overflow processing
5.1.6 Services provided
5.1.6.1 Masters
5.1.6.2 Outstations
5.1.7 Services required
5.2 Using virtual terminal objects
5.2.1 General
5.2.2 Group 112 and 113 objects
5.2.3 Virtual terminal example
5.2.4 Discontinuous octet streams
5.2.5 Rules
5.2.6 Virtual terminal bandwidth considerations
5.3 Sequential file transfer
5.3.1 Authentication
5.3.2 File permissions
5.3.3 Reading a file
5.3.4 Writing a file
5.3.5 Retrieving individual file information
5.3.6 Retrieving file directory information
5.3.7 Deleting a file
5.3.8 Rules relating to files
5.4 Data sets
5.4.1 Preliminary background
5.4.2 Data set, data set descriptor, and data set prototype overview
5.4.2.1 Data set
5.4.2.2 Data set descriptor
5.4.2.3 Data set prototype
5.4.2.4 Relationship of data sets, data set descriptors, and data set prototypes
5.4.2.5 Read, write, and control
5.4.2.6 Data set and data set prototype definition
5.4.2.6.1 Outstation defined
5.4.2.6.2 Master defined
5.4.2.7 Transmission sequence
5.4.2.8 Identifiers
5.4.2.8.1 Data set and data set descriptor identifiers
5.4.2.8.2 Data set prototype identifiers
5.4.3 Data sets are application specific
5.4.4 Data set details
5.4.4.1 List of elements
5.4.4.2 Event and static data sets
5.4.4.3 Data set names
5.4.4.4 Data set identifiers
5.4.4.5 Data type codes specific to data sets
5.4.5 Descriptor elements
5.4.5.1 Definitions
5.4.5.1.1 Namespaces
5.4.5.1.2 UUID
5.4.5.2 Descriptor element overview
5.4.5.2.1 Descriptor element length
5.4.5.2.2 Descriptor element type
5.4.5.2.3 Data type code
5.4.5.2.4 Maximum data length
5.4.5.2.5 Ancillary value
5.4.6 Data set descriptor details
5.4.6.1 General
5.4.6.2 Data set descriptor construction
5.4.6.2.1 First descriptor element
5.4.6.2.2 Name descriptor element
5.4.6.2.3 Data descriptor elements
5.4.6.2.4 Control-related descriptor elements
5.4.6.2.5 Prototype reference descriptor elements
5.4.6.2.6 Prohibited descriptor elements
5.4.6.2.7 Data value ordering
5.4.7 Data set prototypes
5.4.7.1 General
5.4.7.2 Data set prototype construction
5.4.7.2.1 First element
5.4.7.2.2 Second element
5.4.7.2.3 Third and fourth elements
5.4.7.2.4 Data descriptor elements
5.4.7.2.5 Control-related descriptor elements
5.4.7.2.6 Prohibited descriptor elements
5.4.7.2.7 Data value ordering
5.4.8 Naming guidelines
5.4.9 DNP3 object groups, classes, and indexes
5.4.9.1 Group numbers and class responses
5.4.9.2 Point indexes
5.4.9.3 Event generation and class assignment
5.4.10 Point index attributes
5.4.11 Control commands and responses
5.4.11.1 CTLV, CTLS, and DAEL elements in control requests and responses
5.4.11.2 Control status element (CTLS)
5.4.11.3 Control rules
5.4.11.4 Message exchange illustration
5.4.12 Example data descriptors, prototypes, and data sets
5.4.13 Example Messages
5.5 Device attributes
5.5.1 Group 0 and attribute sets
5.5.2 Object variations
5.5.3 Function codes
5.5.4 General attribute object formats
5.5.4.1 Pictorial
5.5.4.2 Formal structure
5.5.4.3 Attribute data type codes
5.5.5 Reading attributes
5.5.6 Reading a list of attribute variations
5.5.6.1 Variation 255
5.5.6.2 Retrieving a list of standard attribute variations
5.5.6.3 Retrieving a list of private attribute variations
5.5.7 Reading all attributes single request
5.5.7.1 Specific variations request
5.5.7.2 Non-specific variations request
5.5.8 Writing attributes
6 Application Layer—part 3: State tables and diagrams
6.1 Outstation fragment state table
6.2 Outstation fragment state diagram
6.3 Master solicited response reception state table
6.4 Master solicited response reception state diagram
6.5 Master unsolicited response reception state table
6.6 Master unsolicited response reception state diagram
7 Secure authentication
7.1 Purpose
7.2 Threats addressed
7.3 General principles
7.3.1 Authentication only
7.3.2 Application Layer only
7.3.3 Bi-directional
7.3.4 Challenge-response
7.3.5 Pre-shared keys
7.3.6 Backwards tolerance
7.3.7 Upgradeable
7.3.8 Perfect forward secrecy
7.3.9 Multiple users and auditing
7.4 Theory of operation
7.4.1 Narrative description
7.4.1.1 Basic concepts
7.4.1.2 Initiating the challenge
7.4.1.3 Replying to the challenge
7.4.1.4 Authenticating
7.4.1.5 Authentication failure
7.4.1.6 Aggressive Mode
7.4.1.7 Changing keys
7.4.1.7.1 Managing session keys
7.4.1.7.2 Managing update keys
7.4.1.8 Security statistics
7.4.2 Example message sequences
7.4.2.1 Overview
7.4.2.2 Challenge of a critical ASDU
7.4.3 Aggressive Mode
7.4.4 Initializing and changing keys
7.4.5 State machine overview
7.5 Formal specification
7.5.1 Message definitions
7.5.1.1 Master authentication implementation
7.5.1.2 Outstation authentication implementation
7.5.1.3 DNP3 sequence numbering
7.5.1.4 More DNP3 message examples
7.5.1.5 DNP3 state machine overviews
7.5.1.5.1 Authentication and session key change state machines
7.5.1.5.2 Update key change state machines
7.5.2 Formal procedures
7.5.2.1 States
7.5.2.2 Security statistics
7.5.2.3 Challenger procedures
7.5.2.3.1 Challenger role
7.5.2.3.2 Critical functions
7.5.2.3.3 Use of Challenge Sequence Numbers
7.5.2.3.4 Authentication procedures
7.5.2.3.5 Challenger state machine
7.5.2.4 Error messages
7.5.3 Responder procedures
7.5.3.1 Responder role
7.5.3.2 Responding to challenges
7.5.3.3 Aggressive Mode
7.5.3.4 Authentication errors
7.5.4 Master procedures
7.5.4.1 Master role
7.5.4.2 Changing session keys
7.5.4.3 Deriving keys
7.5.4.4 Assigning user numbers
7.5.4.5 Changing user status
7.5.4.6 Changing update keys
7.5.4.7 Master state machine
7.5.5 Outstation procedures
7.5.5.1 Outstation role
7.5.5.2 Key status
7.5.5.3 Authenticating session key changes
7.5.5.4 Changing session keys
7.5.5.5 Changing user status
7.5.5.6 Changing update keys
7.5.5.7 Enforcing user roles
7.6 Interoperability requirements
7.6.1 Minimum requirements
7.6.1.1 MAC algorithms
7.6.1.1.1 HMAC-SHA-1
7.6.1.1.2 HMAC-SHA-256
7.6.1.2 Key wrap / transport algorithms
7.6.1.2.1 AES-128 key wrap
7.6.1.3 Fixed values
7.6.1.3.1 Minimum session key size
7.6.1.3.2 Minimum update key size
7.6.1.4 Configurable values
7.6.1.4.1 Reply timeout
7.6.1.4.2 Security statistic event thresholds
7.6.1.4.3 Session Key change interval
7.6.1.4.4 Session Key change count
7.6.1.4.5 Expected Session Key change interval and message count
7.6.1.4.6 Maximum Session Key status count
7.6.1.4.7 Use of Aggressive Mode
7.6.1.4.8 Disabling authentication
7.6.1.4.9 Update Key Change Method
7.6.1.4.10 Cryptographic information
7.6.1.5 Protocol versions
7.6.2 Options
7.6.2.1 MAC algorithms
7.6.2.1.1 AES-GMAC
7.6.2.1.2 Other MAC algorithms
7.6.2.2 Key wrap / transport algorithms
7.6.2.2.1 AES-256 key wrap
7.6.2.2.2 RSAES-OAEP
7.6.2.2.3 Other key wrap algorithms
7.7 Special applications
7.7.1 Use with the internet protocol suite
7.7.2 Use with redundant channels
7.7.3 Use with external link encryptors
7.7.4 Use with data concentrators
7.7.4.1 Definition of a data concentrator
7.7.4.2 Authentication procedures for data concentrators
7.8 Compliance with IEC/TS 62351-3
7.8.1 Deprecation of non-encrypting cipher suites
7.8.2 Mandatory cipher suite
7.8.3 Recommended cipher suites
7.8.4 Negotiation of versions
7.8.5 Cipher renegotiation
7.8.6 Message authentication code
7.8.7 Certificate support
7.8.7.1 Multiple certificate authorities (CAs)
7.8.7.2 Certificate size
7.8.7.3 Certificate exchange
7.8.7.4 Certificate comparison
7.8.7.4.1 Verification based upon CA
7.8.7.4.2 Verification based upon individual certificates
7.8.7.4.3 Certificate revocation
7.8.7.4.4 Expired certificates
7.8.7.4.5 Signing
7.8.7.4.6 Key exchange
7.8.8 Co-existence with non-secure protocol traffic
7.9 Compliance with IEC/TS 62351-5
7.9.1 Selected options
7.9.2 Operations considered critical
7.9.3 Addressing information
7.9.4 Message format mapping
7.9.5 Reference to procedures
7.10 Compliance with ISO/IEC 11770
7.10.1 Requirements
7.10.1.1 Functional requirements
7.10.1.1.1 Change update keys remotely
7.10.1.1.2 Enable centralized key management
7.10.1.1.3 Permit global names
7.10.1.1.4 Permit assignment of role-based access
7.10.1.1.5 Permit revocation of update keys
7.10.1.1.6 Permit expiry of update keys
7.10.1.1.7 Permit assignment of user number (USR)
7.10.1.1.8 Follow standards
7.10.1.2 Qualitative requirements
7.10.1.2.1 Minimize key vulnerability
7.10.1.2.2 Minimize messages and octets required
7.10.1.2.3 Minimize configuration required
7.10.1.2.4 Minimize processing power required
7.10.2 Notation
7.10.3 Sequence
8 Transport Function
8.1 Overview
8.1.1 Layering
8.1.2 Purpose
8.2 Transport Function description
8.2.1 Transport header
8.2.1.1 FIN field
8.2.1.2 FIR field
8.2.1.3 SEQUENCE number field
8.2.1.4 Rules
8.2.2 Application Layer data
8.2.3 Segmenting example
8.2.4 Reception state table
8.2.5 Reception state diagram
9 Data Link Layer
9.1 Layering overview
9.2 DNP3 Data Link Layer description
9.2.1 Introduction
9.2.2 Services
9.2.3 Transaction model
9.2.4 Frame format
9.2.4.1 Data Link Layer header frame fields
9.2.4.1.1 START field
9.2.4.1.2 LENGTH field
9.2.4.1.3 CONTROL field
9.2.4.1.3.1 DIR bit field
9.2.4.1.3.2 PRM bit field
9.2.4.1.3.3 FCB bit field
9.2.4.1.3.4 FCV bit field
9.2.4.1.3.5 DFC bit field
9.2.4.1.3.6 FUNCTION CODE field
9.2.4.1.4 DESTINATION field
9.2.4.1.5 SOURCE field
9.2.4.2 User data
9.2.4.3 CRC fields
9.2.4.4 Inter-octet and inter-frame gaps
9.2.5 Addressing notes
9.2.5.1 Choosing addresses
9.2.5.2 Reserved and special use addresses
9.2.5.2.1 Broadcast addresses
9.2.5.2.2 Self-address
9.2.5.2.3 DNP3 reserved addresses
9.2.6 Primary-to-secondary function codes
9.2.6.1 Function code 0 RESET_LINK_STATES
9.2.6.2 Function code 2 TEST_LINK_STATES
9.2.6.3 Function code 3 CONFIRMED_USER_DATA
9.2.6.4 Function code 4 UNCONFIRMED_USER_DATA
9.2.6.5 Function code 9 REQUEST_LINK_STATUS
9.2.7 Secondary-to-primary function codes
9.2.7.1 Function code 0 ACK
9.2.7.2 Function code 1 NACK
9.2.7.3 Function code 11 LINK_STATUS
9.2.7.4 Function code 15 NOT_SUPPORTED
9.2.8 Link control variables
9.2.9 Frame error detection
9.2.10 Collision avoidance
9.3 State tables and diagrams
9.3.1 Primary Station state requirements
9.3.1.1 Explanatory statements
9.3.1.2 Primary Station state table
9.3.1.3 Primary Station state diagram
9.3.2 Secondary Station state requirements
9.3.2.1 Explanatory statements
9.3.2.2 Secondary Station state table
9.3.2.3 Secondary Station state diagram
10 Layer-independent topics
10.1 Purpose of layer-independent topics
10.2 Confirmation and retry guidelines
10.2.1 Recommendations
10.2.2 Background
10.2.2.1 Data Link Layer confirms and Application Layer confirms
10.2.2.2 Why confirmations are necessary
10.2.2.3 Retransmissions
10.2.3 Discussion
10.2.3.1 Why Application Layer confirms are preferred
10.2.3.1.1 Data Link Layer confirms are redundant
10.2.3.1.2 Bandwidth
10.2.3.1.3 Assures understanding not just reception
10.2.3.1.4 Noisy environments
10.2.3.2 Retries and polling
10.2.3.2.1 Media access control
10.2.3.2.2 Unsolicited responses
10.2.3.3 Exceptions
10.3 Time synchronization
10.3.1 General
10.3.2 Time base
10.3.3 Messages for time synchronization
10.3.3.1 Non-LAN procedure
10.3.3.2 LAN procedure
10.3.4 Time synchronization retries
10.3.4.1 Requirements
10.3.4.2 Justification for non-LAN applications
10.3.4.3 Justification for LAN applications
10.4 Handling multiple messages
10.4.1 Requirements
10.4.2 Back-to-back confirmation and request/response
10.4.3 Back-to-back without confirmation
10.4.4 Multi-drop communications
10.4.5 Unsolicited responses
11 Data object library—basics
11.1 Overview
11.2 Library documentation organization
11.3 Primitive data types
11.3.1 Summary of types
11.3.2 Numeric notation conventions
11.3.2.1 Decimal values
11.3.2.2 Binary-code decimal values
11.3.2.3 Hexadecimal values
11.3.2.4 Binary values
11.3.2.5 Floating-point values
11.3.3 Bit strings
11.3.4 Unsigned and signed integers
11.3.5 Floating-point values
11.3.6 Binary-coded decimal
11.3.6.1 Coding practice
11.3.6.2 Characteristics
11.3.7 Printable ASCII strings
11.3.7.1 Printable characters
11.3.7.2 Characteristics
11.3.8 Octet string
11.3.9 SET of n
11.3.10 Variant
11.3.11 Unicode string
11.4 Object data type codes
11.5 DNP3 object types
11.5.1 Static type
11.5.2 Event type
11.5.3 Command (Cmnd) type
11.5.4 Information (Info) type
11.5.5 Attribute (Attrib) type
11.6 Object flags
11.6.1 Flag definitions
11.6.1.1 Flag description notes
11.6.2 Interaction or combinations of flags
11.6.3 Implementation rules
11.6.4 Considerations for data concentrators (non-originating devices)
11.6.5 Object groups having variations with flags and without flags
11.7 Status codes
11.7.1 Status codes for control-related objects
11.7.2 Status codes for file-related objects
11.8 Group number categories
11.9 Point types
11.9.1 Analog input point type
11.9.1.1 General description
11.9.1.2 Analog input model
11.9.1.3 Analog deadbands
11.9.1.4 Applicable DNP3 object groups
11.9.1.5 Non-frozen and frozen data in the same message
11.9.2 Analog output point type
11.9.2.1 General description
11.9.2.2 Analog output model
11.9.2.3 Applicable DNP3 objects
11.9.3 BCD point type
11.9.3.1 General description
11.9.3.2 Applicable DNP3 objects
11.9.4 Binary output point type
11.9.4.1 General description
11.9.4.2 Activation model
11.9.4.3 Complementary latch model
11.9.4.4 Complementary, two-output model
11.9.4.5 Common features of models
11.9.4.6 Applicable DNP3 Objects
11.9.5 Counter point type
11.9.5.1 General description
11.9.5.2 Counter model
11.9.5.3 Implementation precedence
11.9.5.4 Positive and negative accumulations
11.9.5.5 Counts and frozen counts in the same message
11.9.5.6 Applicable DNP3 objects
11.9.5.7 Counter processing rules
11.9.6 Double-bit binary input point type
11.9.6.1 General description
11.9.6.2 Double-bit binary input model
11.9.6.3 Point space
11.9.6.4 Applicable DNP3 objects
11.9.7 Octet string point type
11.9.7.1 General description
11.9.7.2 Octet string model
11.9.7.3 Applicable DNP3 objects
11.9.8 Single-bit binary input point type
11.9.8.1 General description
11.9.8.2 Single-bit binary input model
11.9.8.3 Applicable DNP3 objects
11.9.9 Virtual terminal point type
11.9.9.1 General description
11.9.9.2 Applicable DNP3 objects
11.9.10 Security statistics point type
11.9.10.1 General description
11.9.10.2 Security statistics model
11.9.10.3 Applicable DNP3 objects
12 DNP3 object library—parsing codes
12.1 Subset parsing codes
12.1.1 How to interpret the subset parsing tables
12.1.1.1 Request and response column independence
12.1.1.2 Interpreting the subset parsing tables for outstation devices
12.1.1.3 Interpreting the subset parsing tables for master devices
12.1.2 Subset parsing tables
12.2 Parsing guidelines
12.2.1 How to interpret the parsing guideline tables
12.2.1.1 Request and response column independence
12.2.1.2 Interpreting the parsing guideline tables for outstation devices
12.2.1.3 Interpreting the parsing guideline tables for master devices
12.2.2 Parsing guideline tables
13 IP networking
13.1 IP networking overview
13.1.1 IP networking purpose
13.1.2 IP networking scope
13.1.3 IP networking suite and device identification
13.1.4 Protocol stack
13.2 Layer requirements
13.2.1 DNP3 link, transport, and application
13.2.1.1 Confirmations
13.2.1.2 Message transfer
13.2.2 Internet Protocol suite
13.2.2.1 Configuration requirements
13.2.2.2 Registered port number
13.2.2.2.1 Optional port numbers
13.2.2.3 IP address assignment
13.2.3 Connection management
13.2.3.1 TCP usage
13.2.3.1.1 Initiating end point
13.2.3.1.2 Listening end point
13.2.3.1.3 Dual end point
13.2.3.1.4 Basic requirements
13.2.3.1.5 Configuration parameter guidance
13.2.3.2 UDP usage
13.2.3.2.1 UDP ports
13.2.3.2.2 Basic requirements
13.2.3.2.3 Multiple frames
13.2.3.2.4 Broadcast address
13.2.3.3 TCP connection status
13.2.3.3.1 Keep-alive mechanism
13.2.3.3.2 Broken connections
13.2.3.3.3 Closed connections
13.2.3.4 Single master connection
13.2.3.4.1 Requirements
13.2.3.5 Multiple master connections
13.2.3.5.1 Connection establishment—method 1
13.2.3.5.2 Connection establishment—method 2
13.2.3.5.3 Connection establishment—method 3
13.2.3.5.4 Requirements
13.2.3.6 Multiple outstation connections
13.2.3.6.1 Requirements
13.3 Security
13.3.1 Rudimentary
13.3.2 Advanced
13.3.3 External
13.4 Time synchronization
13.5 UML statecharts
13.5.1 Dual end point—master
13.5.2 Dual end point—outstation
14 Interoperability
14.1 About this clause
14.1.1 Purpose of this clause
14.1.2 Who should use this clause
14.1.3 How this clause is organized
14.2 Overview
14.2.1 Terminology
14.2.2 Reading the subset tables
14.2.3 Goals and assumptions
14.3 Level 1 DNP3 implementation (DNP3-L1)
14.3.1 Intended use
14.3.2 General description
14.3.3 Implementation table
14.4 Level 2 DNP3 implementation (DNP3-L2)
14.4.1 Intended use
14.4.2 General description
14.4.3 Implementation table
14.5 Level 3 DNP3 implementation (DNP3-L3)
14.5.1 Intended use
14.5.2 General description
14.5.3 Implementation table
14.6 Level 4 DNP3 implementation (DNP3-L4)
14.6.1 Intended use
14.6.2 General description
14.6.3 Implementation table
14.7 Conformance
14.7.1 Outstation devices
14.7.2 Master devices
14.8 XML representation
14.8.1 Background
14.8.1.1 XML
14.8.1.2 XML schemas
14.8.1.3 XSLT
14.8.1.4 XML schema specifications
14.8.2 Use cases
14.8.2.1 Utility compares implementations
14.8.2.2 Utility publishes proposed device requirements
14.8.2.3 Outstation publishes current configuration
14.8.2.4 Master updates outstation configuration
14.8.3 DNP3 XML Schema overview
14.8.3.1 Checking for required parameters
14.8.3.2 ReferenceDevice and AuxillaryInfo
14.8.3.3 Empty element versus enumeration
14.8.3.4 Per group versus per point parameters
14.8.3.5 Representation of real-time DNP3 data
14.8.3.6 User extensions
14.8.4 Mapping DNP3 data points to IEC 61850 object models
14.9 Instructions for creating a Device Profile document
Annex A (normative) DNP3 data object library—object descriptions
A.1 Object group 0: device attributes
A.1.1 Device attributes—secure authentication version
A.1.1.1 Description
A.1.1.2 Coding
A.1.1.2.1 Pictorial
A.1.1.2.2 Formal structure
A.1.2 Device attributes—number of security statistics per association
A.1.2.1 Description
A.1.2.2 Coding
A.1.2.2.1 Pictorial
A.1.2.2.2 Formal structure
A.1.3 Device attributes—identification of support for user-specific attributes
A.1.3.1 Description
A.1.3.2 Coding
A.1.3.2.1 Pictorial
A.1.3.2.2 Formal structure
A.1.3.3 Examples of the use of this attribute are:
A.1.4 Device attributes—number of master-defined data set prototypes
A.1.4.1 Description
A.1.4.2 Coding
A.1.4.2.1 Pictorial
A.1.4.2.2 Formal structure
A.1.4.2.3 Notes
A.1.5 Device attributes—number of outstation-defined data set prototypes
A.1.5.1 Description
A.1.5.2 Coding
A.1.5.2.1 Pictorial
A.1.5.2.2 Formal structure
A.1.5.2.3 Notes
A.1.6 Device attributes—number of master-defined data sets
A.1.6.1 Description
A.1.6.2 Coding
A.1.6.2.1 Pictorial
A.1.6.2.2 Formal structure
A.1.6.2.3 Notes
A.1.7 Device attributes—number of outstation-defined data sets
A.1.7.1 Description
A.1.7.2 Coding
A.1.7.2.1 Pictorial
A.1.7.2.2 Formal structure
A.1.7.2.3 Notes
A.1.8 Device attributes—maximum number of binary output objects per request
A.1.8.1 Description
A.1.8.2 Coding
A.1.8.2.1 Pictorial
A.1.8.2.2 Formal structure
A.1.9 Device attributes—local timing accuracy
A.1.9.1 Description
A.1.9.2 Coding
A.1.9.2.1 Pictorial
A.1.9.2.2 Formal structure
A.1.9.2.3 Notes
A.1.10 Device attributes—duration of time accuracy
A.1.10.1 Description
A.1.10.2 Coding
A.1.10.2.1 Pictorial
A.1.10.2.2 Formal structure
A.1.10.2.3 Notes
A.1.11 Device attributes—support for analog output events
A.1.11.1 Description
A.1.11.2 Coding
A.1.11.2.1 Pictorial
A.1.11.2.2 Formal structure
A.1.12 Device attributes—maximum analog output index
A.1.12.1 Description
A.1.12.2 Coding
A.1.12.2.1 Pictorial
A.1.12.2.2 Formal structure
A.1.12.2.3 Notes
A.1.13 Device attributes—number of analog outputs
A.1.13.1 Description
A.1.13.2 Coding
A.1.13.2.1 Pictorial
A.1.13.2.2 Formal structure
A.1.13.2.3 Notes
A.1.14 Device attributes—support for binary output events
A.1.14.1 Description
A.1.14.2 Coding
A.1.14.2.1 Pictorial
A.1.14.2.2 Formal structure
A.1.15 Device attributes—maximum binary output index
A.1.15.1 Description
A.1.15.2 Coding
A.1.15.2.1 Pictorial
A.1.15.2.2 Formal structure
A.1.15.2.3 Notes
A.1.16 Device attributes—number of binary outputs
A.1.16.1 Description
A.1.16.2 Coding
A.1.16.2.1 Pictorial
A.1.16.2.2 Formal structure
A.1.16.2.3 Notes
A.1.17 Device attributes—support for frozen counter events
A.1.17.1 Description
A.1.17.2 Coding
A.1.17.2.1 Pictorial
A.1.17.2.2 Formal structure
A.1.18 Device attributes—support for frozen counters
A.1.18.1 Description
A.1.18.2 Coding
A.1.18.2.1 Pictorial
A.1.18.2.2 Formal structure
A.1.19 Device attributes—support for counter events
A.1.19.1 Description
A.1.19.2 Coding
A.1.19.2.1 Pictorial
A.1.19.2.2 Formal structure
A.1.20 Device attributes—maximum counter index
A.1.20.1 Description
A.1.20.2 Coding
A.1.20.2.1 Pictorial
A.1.20.2.2 Formal structure
A.1.20.2.3 Notes
A.1.21 Device attributes—number of counter points
A.1.21.1 Description
A.1.21.2 Coding
A.1.21.2.1 Pictorial
A.1.21.2.2 Formal structure
A.1.21.2.3 Notes
A.1.22 Device attributes—support for frozen analog inputs
A.1.22.1 Description
A.1.22.2 Coding
A.1.22.2.1 Pictorial
A.1.22.2.2 Formal structure
A.1.23 Device attributes—support for analog input events
A.1.23.1 Description
A.1.23.2 Coding
A.1.23.2.1 Pictorial
A.1.23.2.2 Formal structure
A.1.24 Device attributes—maximum analog input index
A.1.24.1 Description
A.1.24.2 Coding
A.1.24.2.1 Pictorial
A.1.24.2.2 Formal structure
A.1.24.2.3 Notes
A.1.25 Device attributes—number of analog input points
A.1.25.1 Description
A.1.25.2 Coding
A.1.25.2.1 Pictorial
A.1.25.2.2 Formal structure
A.1.25.2.3 Notes
A.1.26 Device attributes—support for double-bit binary input events
A.1.26.1 Description
A.1.26.2 Coding
A.1.26.2.1 Pictorial
A.1.26.2.2 Formal structure
A.1.27 Device attributes—maximum double-bit binary index
A.1.27.1 Description
A.1.27.2 Coding
A.1.27.2.1 Pictorial
A.1.27.2.2 Formal structure
A.1.27.2.3 Notes
A.1.28 Device attributes—number of double-bit binary input points
A.1.28.1 Description
A.1.28.2 Coding
A.1.28.2.1 Pictorial
A.1.28.2.2 Formal structure
A.1.28.2.3 Notes
A.1.29 Device attributes—support for binary input events
A.1.29.1 Description
A.1.29.2 Coding
A.1.29.2.1 Pictorial
A.1.29.2.2 Formal structure
A.1.30 Device attributes—maximum binary input index
A.1.30.1 Description
A.1.30.2 Coding
A.1.30.2.1 Pictorial
A.1.30.2.2 Formal structure
A.1.30.2.3 Notes
A.1.31 Device attributes—number of binary input points
A.1.31.1 Description
A.1.31.2 Coding
A.1.31.2.1 Pictorial
A.1.31.2.2 Formal structure
A.1.31.2.3 Notes
A.1.32 Device attributes—maximum transmit fragment size
A.1.32.1 Description
A.1.32.2 Coding
A.1.32.2.1 Pictorial
A.1.32.2.2 Formal structure
A.1.33 Device attributes—maximum receive fragment size
A.1.33.1 Description
A.1.33.2 Coding
A.1.33.2.1 Pictorial
A.1.33.2.2 Formal structure
A.1.34 Device attributes—device manufacturer’s software version
A.1.34.1 Description
A.1.34.2 Coding
A.1.34.2.1 Pictorial
A.1.34.2.2 Formal structure
A.1.35 Device attributes—device manufacturer’s hardware version
A.1.35.1 Description
A.1.35.2 Coding
A.1.35.2.1 Pictorial
A.1.35.2.2 Formal structure
A.1.36 Device attributes—user-assigned location name
A.1.36.1 Description
A.1.36.2 Coding
A.1.36.2.1 Pictorial
A.1.36.2.2 Formal structure
A.1.36.2.3 Notes
A.1.37 Device attributes—user-assigned ID code/number
A.1.37.1 Description
A.1.37.2 Coding
A.1.37.2.1 Pictorial
A.1.37.2.2 Formal structure
A.1.37.2.3 Notes
A.1.38 Device attributes—user-assigned device name
A.1.38.1 Description
A.1.38.2 Coding
A.1.38.2.1 Pictorial
A.1.38.2.2 Formal structure
A.1.38.2.3 Notes
A.1.39 Device attributes—device serial number
A.1.39.1 Description
A.1.39.2 Coding
A.1.39.2.1 Pictorial
A.1.39.2.2 Formal structure
A.1.40 Device attributes—DNP3 subset and conformance
A.1.40.1 Description
A.1.40.2 Coding
A.1.40.2.1 Pictorial
A.1.40.2.2 Formal structure
A.1.40.2.3 Notes
A.1.41 Device attributes—device manufacturer’s product name and model
A.1.41.1 Description
A.1.41.2 Coding
A.1.41.2.1 Pictorial
A.1.41.2.2 Formal structure
A.1.42 Device attributes—device manufacturer’s name
A.1.42.1 Description
A.1.42.2 Coding
A.1.42.2.1 Pictorial
A.1.42.2.2 Formal structure
A.1.43 Device attributes—non-specific all attributes request
A.1.43.1 Description
A.1.43.2 Coding
A.1.43.2.1 Notes
A.1.44 Device attributes—list of attribute variations
A.1.44.1 Description
A.1.44.2 Coding
A.1.44.2.1 Pictorial
A.1.44.2.2 Formal structure
A.1.44.2.3 Notes
A.2 Object group 1: binary inputs
A.2.1 Binary input—packed format
A.2.1.1 Description
A.2.1.2 Coding
A.2.1.2.1 Pictorial
A.2.1.2.2 Formal structure
A.2.1.2.3 Notes
A.2.2 Binary input—with flags
A.2.2.1 Description
A.2.2.2 Coding
A.2.2.2.1 Pictorial
A.2.2.2.2 Formal structure
A.2.2.2.3 Notes
A.3 Object group 2: binary input events
A.3.1 Binary input event—without time
A.3.1.1 Description
A.3.1.2 Coding
A.3.1.2.1 Pictorial
A.3.1.2.2 Formal structure
A.3.1.2.3 Notes
A.3.2 Binary input event—with absolute time
A.3.2.1 Description
A.3.2.2 Coding
A.3.2.2.1 Pictorial
A.3.2.2.2 Formal structure
A.3.2.2.3 Notes
A.3.3 Binary input event—with relative time
A.3.3.1 Description
A.3.3.2 Coding
A.3.3.2.1 Pictorial
A.3.3.2.2 Formal structure
A.3.3.2.3 Notes
A.4 Object group 3: double-bit binary inputs
A.4.1 Double-bit binary input—packed format
A.4.1.1 Description
A.4.1.2 Coding
A.4.1.2.1 Pictorial
A.4.1.2.2 Formal structure
A.4.1.2.3 Notes
A.4.2 Double-bit binary input—with flags
A.4.2.1 Description
A.4.2.2 Coding
A.4.2.2.1 Pictorial
A.4.2.2.2 Formal structure
A.4.2.2.3 Notes
A.5 Object group 4: double-bit binary input events
A.5.1 Double-bit binary input event—without time
A.5.1.1 Description
A.5.1.2 Coding
A.5.1.2.1 Pictorial
A.5.1.2.2 Formal structure
A.5.1.2.3 Notes
A.5.2 Double-bit binary input event—with absolute time
A.5.2.1 Description
A.5.2.2 Coding
A.5.2.2.1 Pictorial
A.5.2.2.2 Formal structure
A.5.2.2.3 Notes
A.5.3 Double-bit binary input event—with relative time
A.5.3.1 Description
A.5.3.2 Coding
A.5.3.2.1 Pictorial
A.5.3.2.2 Formal structure
A.5.3.2.3 Notes
A.6 Object group 10: binary outputs
A.6.1 Binary output—packed format
A.6.1.1 Description
A.6.1.2 Coding
A.6.1.2.1 Pictorial
A.6.1.2.2 Formal structure
A.6.1.2.3 Notes
A.6.2 Binary output—output status with flags
A.6.2.1 Description
A.6.2.2 Coding
A.6.2.2.1 Pictorial
A.6.2.2.2 Formal structure
A.6.2.2.3 Notes
A.7 Object group 11: binary output events
A.7.1 Binary output event—status without time
A.7.1.1 Description
A.7.1.2 Coding
A.7.1.2.1 Pictorial
A.7.1.2.2 Formal structure
A.7.1.2.3 Notes
A.7.2 Binary output event—status with time
A.7.2.1 Description
A.7.2.2 Coding
A.7.2.2.1 Pictorial
A.7.2.2.2 Formal structure
A.7.2.2.3 Notes
A.8 Object group 12: binary output commands
A.8.1 Binary output command—control relay output block—also known as CROB
A.8.1.1 Description
A.8.1.2 Coding
A.8.1.2.1 Pictorial
A.8.1.2.2 Formal structure
A.8.1.3 Notes
A.8.1.3.1 Timing illustrations
A.8.1.3.2 Operational functions
A.8.1.3.2.1 Interoperable commands
A.8.1.3.2.2 Additional requirements
A.8.1.3.2.3 Interpreting the time fields
A.8.1.3.2.4 Master configuration
A.8.1.3.2.5 Minimal outstation implementation
A.8.1.3.2.6 Point index correlation
A.8.2 Binary output command—pattern control block—also known as PCB
A.8.2.1 Description
A.8.2.2 Coding
A.8.2.2.1 Pictorial
A.8.2.2.2 Formal structure
A.8.2.2.3 Notes
A.8.3 Binary output command—pattern mask
A.8.3.1 Description
A.8.3.2 Coding
A.8.3.2.1 Pictorial
A.8.3.2.2 Formal structure
A.8.3.2.3 Notes
A.9 Object group 13: binary output command events
A.9.1 Binary output command event—command status without time
A.9.1.1 Description
A.9.1.2 Coding
A.9.1.2.1 Pictorial
A.9.1.2.2 Formal structure
A.9.1.2.3 Notes
A.9.2 Binary output command event—command status with time
A.9.2.1 Description
A.9.2.2 Coding
A.9.2.2.1 Pictorial
A.9.2.2.2 Formal structure
A.9.2.2.3 Notes
A.10 Object group 20: counters
A.10.1 Counter—32-bit with flag
A.10.1.1 Description
A.10.1.2 Coding
A.10.1.2.1 Pictorial
A.10.1.2.2 Formal structure
A.10.1.2.3 Notes
A.10.2 Counter—16-bit with flag
A.10.2.1 Description
A.10.2.2 Coding
A.10.2.2.1 Pictorial
A.10.2.2.2 Formal structure
A.10.2.2.3 Notes
A.10.3 Counter—32-bit with flag, delta
A.10.3.1 Description
A.10.3.2 Coding
A.10.3.2.1 Pictorial
A.10.3.2.2 Formal structure
A.10.3.2.3 Notes
A.10.4 Counter—16-bit with flag, delta
A.10.4.1 Description
A.10.4.2 Coding
A.10.4.2.1 Pictorial
A.10.4.2.2 Formal structure
A.10.4.2.3 Notes
A.10.5 Counter—32-bit without flag
A.10.5.1 Description
A.10.5.2 Coding
A.10.5.2.1 Pictorial
A.10.5.2.2 Formal structure
A.10.5.2.3 Notes
A.10.6 Counter—16-bit without flag
A.10.6.1 Description
A.10.6.2 Coding
A.10.6.2.1 Pictorial
A.10.6.2.2 Formal structure
A.10.6.2.3 Notes
A.10.7 Counter—32-bit without flag, delta
A.10.7.1 Description
A.10.7.2 Coding
A.10.7.2.1 Pictorial
A.10.7.2.2 Formal structure
A.10.7.2.3 Notes
A.10.8 Counter—16-bit without flag, delta
A.10.8.1 Description
A.10.8.2 Coding
A.10.8.2.1 Pictorial
A.10.8.2.2 Formal structure
A.10.8.2.3 Notes
A.11 Object group 21: frozen counters
A.11.1 Frozen counter—32-bit with flag
A.11.1.1 Description
A.11.1.2 Coding
A.11.1.2.1 Pictorial
A.11.1.2.2 Formal structure
A.11.1.2.3 Notes
A.11.2 Frozen counter—16-bit with flag
A.11.2.1 Description
A.11.2.2 Coding
A.11.2.2.1 Pictorial
A.11.2.2.2 Formal structure
A.11.2.2.3 Notes
A.11.3 Frozen counter—32-bit with flag, delta
A.11.3.1 Description
A.11.3.2 Coding
A.11.3.2.1 Pictorial
A.11.3.2.2 Formal structure
A.11.3.2.3 Notes
A.11.4 Frozen counter—16-bit with flag, delta
A.11.4.1 Description
A.11.4.2 Coding
A.11.4.2.1 Pictorial
A.11.4.2.2 Formal structure
A.11.4.2.3 Notes
A.11.5 Frozen counter—32-bit with flag and time
A.11.5.1 Description
A.11.5.2 Coding
A.11.5.2.1 Pictorial
A.11.5.2.2 Formal structure
A.11.5.2.3 Notes
A.11.6 Frozen counter—16-bit with flag and time
A.11.6.1 Description
A.11.6.2 Coding
A.11.6.2.1 Pictorial
A.11.6.2.2 Formal structure
A.11.6.2.3 Notes
A.11.7 Frozen counter—32-bit with flag and time, delta
A.11.7.1 Description
A.11.7.2 Coding
A.11.7.2.1 Pictorial
A.11.7.2.2 Formal structure
A.11.7.2.3 Notes
A.11.8 Frozen counter—16-bit with flag and time, delta
A.11.8.1 Description
A.11.8.2 Coding
A.11.8.2.1 Pictorial
A.11.8.2.2 Formal structure
A.11.8.2.3 Notes
A.11.9 Frozen counter—32-bit without flag
A.11.9.1 Description
A.11.9.2 Coding
A.11.9.2.1 Pictorial
A.11.9.2.2 Formal structure
A.11.9.2.3 Notes
A.11.10 Frozen counter—16-bit without flag
A.11.10.1 Description
A.11.10.2 Coding
A.11.10.2.1 Pictorial
A.11.10.2.2 Formal structure
A.11.10.2.3 Notes
A.11.11 Frozen counter—32-bit without flag, delta
A.11.11.1 Description
A.11.11.2 Coding
A.11.11.2.1 Pictorial
A.11.11.2.2 Formal structure
A.11.11.2.3 Notes
A.11.12 Frozen counter—16-bit without flag, delta
A.11.12.1 Description
A.11.12.2 Coding
A.11.12.2.1 Pictorial
A.11.12.2.2 Formal structure
A.11.12.2.3 Notes
A.12 Object group 22: counter events
A.12.1 Counter event—32-bit with flag
A.12.1.1 Description
A.12.1.2 Coding
A.12.1.2.1 Pictorial
A.12.1.2.2 Formal structure
A.12.1.2.3 Notes
A.12.2 Counter event—16-bit with flag
A.12.2.1 Description
A.12.2.2 Coding
A.12.2.2.1 Pictorial
A.12.2.2.2 Formal structure
A.12.2.2.3 Notes
A.12.3 Counter event—32-bit with flag, delta
A.12.3.1 Description
A.12.3.2 Coding
A.12.3.2.1 Pictorial
A.12.3.2.2 Formal structure
A.12.3.2.3 Notes
A.12.4 Counter event—16-bit with flag, delta
A.12.4.1 Description
A.12.4.2 Coding
A.12.4.2.1 Pictorial
A.12.4.2.2 Formal structure
A.12.4.2.3 Notes
A.12.5 Counter event—32-bit with flag and time
A.12.5.1 Description
A.12.5.2 Coding
A.12.5.2.1 Pictorial
A.12.5.2.2 Formal structure
A.12.5.2.3 Notes
A.12.6 Counter event—16-bit with flag and time
A.12.6.1 Description
A.12.6.2 Coding
A.12.6.2.1 Pictorial
A.12.6.2.2 Formal structure
A.12.6.2.3 Notes
A.12.7 Counter event—32-bit with flag and time, delta
A.12.7.1 Description
A.12.7.2 Coding
A.12.7.2.1 Pictorial
A.12.7.2.2 Formal structure
A.12.7.2.3 Notes
A.12.8 Counter event—16-bit with flag and time, delta
A.12.8.1 Description
A.12.8.2 Coding
A.12.8.2.1 Pictorial
A.12.8.2.2 Formal structure
A.12.8.2.3 Notes
A.13 Object group 23: frozen counter events
A.13.1 Frozen counter event—32-bit with flag
A.13.1.1 Description
A.13.1.2 Coding
A.13.1.2.1 Pictorial
A.13.1.2.2 Formal structure
A.13.1.2.3 Notes
A.13.2 Frozen counter event—16-bit with flag
A.13.2.1 Description
A.13.2.2 Coding
A.13.2.2.1 Pictorial
A.13.2.2.2 Formal structure
A.13.2.2.3 Notes
A.13.3 Frozen counter event—32-bit with flag, delta
A.13.3.1 Description
A.13.3.2 Coding
A.13.3.2.1 Pictorial
A.13.3.2.2 Formal structure
A.13.3.2.3 Notes
A.13.4 Frozen counter event—16-bit with flag, delta
A.13.4.1 Description
A.13.4.2 Coding
A.13.4.2.1 Pictorial
A.13.4.2.2 Formal structure
A.13.4.2.3 Notes
A.13.5 Frozen counter event—32-bit with flag and time
A.13.5.1 Description
A.13.5.2 Coding
A.13.5.2.1 Pictorial
A.13.5.2.2 Formal structure
A.13.5.2.3 Notes
A.13.6 Frozen counter event—16-bit with flag and time
A.13.6.1 Description
A.13.6.2 Coding
A.13.6.2.1 Pictorial
A.13.6.2.2 Formal structure
A.13.6.2.3 Notes
A.13.7 Frozen counter event—32-bit with flag and time, delta
A.13.7.1 Description
A.13.7.2 Coding
A.13.7.2.1 Pictorial
A.13.7.2.2 Formal structure
A.13.7.2.3 Notes
A.13.8 Frozen counter event—16-bit with flag and time, delta
A.13.8.1 Description
A.13.8.2 Coding
A.13.8.2.1 Pictorial
A.13.8.2.2 Formal structure
A.13.8.2.3 Notes
A.14 Object group 30: analog inputs
A.14.1 Analog input—32-bit with flag
A.14.1.1 Description
A.14.1.2 Coding
A.14.1.2.1 Pictorial
A.14.1.2.2 Formal structure
A.14.1.2.3 Notes
A.14.2 Analog input—16-bit with flag
A.14.2.1 Description
A.14.2.2 Coding
A.14.2.2.1 Pictorial
A.14.2.2.2 Formal structure
A.14.2.2.3 Notes
A.14.3 Analog input—32-bit without flag
A.14.3.1 Description
A.14.3.2 Coding
A.14.3.2.1 Pictorial
A.14.3.2.2 Formal structure
A.14.3.2.3 Notes
A.14.4 Analog input—16-bit without flag
A.14.4.1 Description
A.14.4.2 Coding
A.14.4.2.1 Pictorial
A.14.4.2.2 Formal structure
A.14.4.2.3 Notes
A.14.5 Analog input—single-precision, floating-point with flag
A.14.5.1 Description
A.14.5.2 Coding
A.14.5.2.1 Pictorial
A.14.5.2.2 Formal structure
A.14.5.2.3 Notes
A.14.6 Analog input—double-precision, floating-point with flag
A.14.6.1 Description
A.14.6.2 Coding
A.14.6.2.1 Pictorial
A.14.6.2.2 Formal structure
A.14.6.2.3 Notes
A.15 Object group 31: frozen analog inputs
A.15.1 Frozen analog input—32-bit with flag
A.15.1.1 Description
A.15.1.2 Coding
A.15.1.2.1 Pictorial
A.15.1.2.2 Formal structure
A.15.1.2.3 Notes
A.15.2 Frozen analog input—16-bit with flag
A.15.2.1 Description
A.15.2.2 Coding
A.15.2.2.1 Pictorial
A.15.2.2.2 Formal structure
A.15.2.2.3 Notes
A.15.3 Frozen analog input—32-bit with time-of-freeze
A.15.3.1 Description
A.15.3.2 Coding
A.15.3.2.1 Pictorial
A.15.3.2.2 Formal structure
A.15.3.2.3 Notes
A.15.4 Frozen analog input—16-bit with time-of-freeze
A.15.4.1 Description
A.15.4.2 Coding
A.15.4.2.1 Pictorial
A.15.4.2.2 Formal structure
A.15.4.2.3 Notes
A.15.5 Frozen analog input—32-bit without flag
A.15.5.1 Description
A.15.5.2 Coding
A.15.5.2.1 Pictorial
A.15.5.2.2 Formal structure
A.15.5.2.3 Notes
A.15.6 Frozen analog input—16-bit without flag
A.15.6.1 Description
A.15.6.2 Coding
A.15.6.2.1 Pictorial
A.15.6.2.2 Formal structure
A.15.6.2.3 Notes
A.15.7 Frozen analog input—single-precision, floating-point with flag
A.15.7.1 Description
A.15.7.2 Coding
A.15.7.2.1 Pictorial
A.15.7.2.2 Formal structure
A.15.7.2.3 Notes
A.15.8 Frozen analog input—double-precision, floating-point with flag
A.15.8.1 Description
A.15.8.2 Coding
A.15.8.2.1 Pictorial
A.15.8.2.2 Formal structure
A.15.8.2.3 Notes
A.16 Object group 32: analog input events
A.16.1 Analog input event—32-bit without time
A.16.1.1 Description
A.16.1.2 Coding
A.16.1.2.1 Pictorial
A.16.1.2.2 Formal structure
A.16.1.2.3 Notes
A.16.2 Analog input event—16-bit without time
A.16.2.1 Description
A.16.2.2 Coding
A.16.2.2.1 Pictorial
A.16.2.2.2 Formal structure
A.16.2.2.3 Notes
A.16.3 Analog input event—32-bit with time
A.16.3.1 Description
A.16.3.2 Coding
A.16.3.2.1 Pictorial
A.16.3.2.2 Formal structure
A.16.3.2.3 Notes
A.16.4 Analog input event—16-bit with time
A.16.4.1 Description
A.16.4.2 Coding
A.16.4.2.1 Pictorial
A.16.4.2.2 Formal structure
A.16.4.2.3 Notes
A.16.5 Analog input event—single-precision, floating-point without time
A.16.5.1 Description
A.16.5.2 Coding
A.16.5.2.1 Pictorial
A.16.5.2.2 Formal structure
A.16.5.2.3 Notes
A.16.6 Analog input event—double-precision, floating-point without time
A.16.6.1 Description
A.16.6.2 Coding
A.16.6.2.1 Pictorial
A.16.6.2.2 Formal structure
A.16.6.2.3 Notes
A.16.7 Analog input event—single-precision, floating-point with time
A.16.7.1 Description
A.16.7.2 Coding
A.16.7.2.1 Pictorial
A.16.7.2.2 Formal structure
A.16.7.2.3 Notes
A.16.8 Analog input event—double-precision, floating-point with time
A.16.8.1 Description
A.16.8.2 Coding
A.16.8.2.1 Pictorial
A.16.8.2.2 Formal structure
A.16.8.2.3 Notes
A.17 Object group 33: frozen analog input events
A.17.1 Frozen analog input event—32-bit without time
A.17.1.1 Description
A.17.1.2 Coding
A.17.1.2.1 Pictorial
A.17.1.2.2 Formal structure
A.17.1.2.3 Notes
A.17.2 Frozen analog input event—16-bit without time
A.17.2.1 Description
A.17.2.2 Coding
A.17.2.2.1 Pictorial
A.17.2.2.2 Formal structure
A.17.2.2.3 Notes
A.17.3 Frozen analog input event—32-bit with time
A.17.3.1 Description
A.17.3.2 Coding
A.17.3.2.1 Pictorial
A.17.3.2.2 Formal structure
A.17.3.2.3 Notes
A.17.4 Frozen analog input event—16-bit with time
A.17.4.1 Description
A.17.4.2 Coding
A.17.4.2.1 Pictorial
A.17.4.2.2 Formal structure
A.17.4.2.3 Notes
A.17.5 Frozen analog input event—single-precision, floating-point without time
A.17.5.1 Description
A.17.5.2 Coding
A.17.5.2.1 Pictorial
A.17.5.2.2 Formal structure
A.17.5.2.3 Notes
A.17.6 Frozen analog input event—double-precision, floating-point without time
A.17.6.1 Description
A.17.6.2 Coding
A.17.6.2.1 Pictorial
A.17.6.2.2 Formal structure
A.17.6.2.3 Notes
A.17.7 Frozen analog input event—single-precision, floating-point with time
A.17.7.1 Description
A.17.7.2 Coding
A.17.7.2.1 Pictorial
A.17.7.2.2 Formal structure
A.17.7.2.3 Notes
A.17.8 Frozen analog input event—double-precision, floating-point with time
A.17.8.1 Description
A.17.8.2 Coding
A.17.8.2.1 Pictorial
A.17.8.2.2 Formal structure
A.17.8.2.3 Notes
A.18 Object group 34: analog input reporting deadbands
A.18.1 Analog input reporting deadband—16-bit
A.18.1.1 Description
A.18.1.2 Coding
A.18.1.2.1 Pictorial
A.18.1.2.2 Formal structure
A.18.1.2.3 Notes
A.18.2 Analog input reporting deadband—32-bit
A.18.2.1 Description
A.18.2.2 Coding
A.18.2.2.1 Pictorial
A.18.2.2.2 Formal structure
A.18.2.2.3 Notes
A.18.3 Analog input reporting deadband—single-precision, floating-point
A.18.3.1 Description
A.18.3.2 Coding
A.18.3.2.1 Pictorial
A.18.3.2.2 Formal structure
A.18.3.2.3 Notes
A.19 Object group 40: analog output status
A.19.1 Analog output status—32-bit with flag
A.19.1.1 Description
A.19.1.2 Coding
A.19.1.2.1 Pictorial
A.19.1.2.2 Formal structure
A.19.1.2.3 Notes
A.19.2 Analog output status—16-bit with flag
A.19.2.1 Description
A.19.2.2 Coding
A.19.2.2.1 Pictorial
A.19.2.2.2 Formal structure
A.19.2.2.3 Notes
A.19.3 Analog output status—single-precision, floating-point with flag
A.19.3.1 Description
A.19.3.2 Coding
A.19.3.2.1 Pictorial
A.19.3.2.2 Formal structure
A.19.3.2.3 Notes
A.19.4 Analog output status—double-precision, floating-point with flag
A.19.4.1 Description
A.19.4.2 Coding
A.19.4.2.1 Pictorial
A.19.4.2.2 Formal structure
A.19.4.2.3 Notes
A.20 Object group 41: analog outputs
A.20.1 Analog output—32-bit
A.20.1.1 Description
A.20.1.2 Coding
A.20.1.2.1 Pictorial
A.20.1.2.2 Formal structure
A.20.1.2.3 Notes
A.20.2 Analog output—16-bit
A.20.2.1 Description
A.20.2.2 Coding
A.20.2.2.1 Pictorial
A.20.2.2.2 Formal structure
A.20.2.2.3 Notes
A.20.3 Analog output—single-precision, floating-point
A.20.3.1 Description
A.20.3.2 Coding
A.20.3.2.1 Pictorial
A.20.3.2.2 Formal structure
A.20.3.2.3 Notes
A.20.4 Analog output—double-precision, floating-point
A.20.4.1 Description
A.20.4.2 Coding
A.20.4.2.1 Pictorial
A.20.4.2.2 Formal structure
A.20.4.2.3 Notes
A.21 Object group 42: analog output events
A.21.1 Analog output event—32-bit without time
A.21.1.1 Description
A.21.1.2 Coding
A.21.1.2.1 Pictorial
A.21.1.2.2 Formal structure
A.21.1.2.3 Notes
A.21.2 Analog output event—16-bit without time
A.21.2.1 Description
A.21.2.2 Coding
A.21.2.2.1 Pictorial
A.21.2.2.2 Formal structure
A.21.2.2.3 Notes
A.21.3 Analog output event—32-bit with time
A.21.3.1 Description
A.21.3.2 Coding
A.21.3.2.1 Pictorial
A.21.3.2.2 Formal structure
A.21.3.2.3 Notes
A.21.4 Analog output event—16-bit with time
A.21.4.1 Description
A.21.4.2 Coding
A.21.4.2.1 Pictorial
A.21.4.2.2 Formal structure
A.21.4.2.3 Notes
A.21.5 Analog output event—single-precision, floating-point without time
A.21.5.1 Description
A.21.5.2 Coding
A.21.5.2.1 Pictorial
A.21.5.2.2 Formal structure
A.21.5.2.3 Notes
A.21.6 Analog output event—double-precision, floating-point without time
A.21.6.1 Description
A.21.6.2 Coding
A.21.6.2.1 Pictorial
A.21.6.2.2 Formal structure
A.21.6.2.3 Notes
A.21.7 Analog output event—single-precision, floating-point with time
A.21.7.1 Description
A.21.7.2 Coding
A.21.7.2.1 Pictorial
A.21.7.2.2 Formal structure
A.21.7.2.3 Notes
A.21.8 Analog output event—double-precision, floating-point with time
A.21.8.1 Description
A.21.8.2 Coding
A.21.8.2.1 Pictorial
A.21.8.2.2 Formal structure
A.21.8.2.3 Notes
A.22 Object group 43: analog output command events
A.22.1 Analog output command event—32-bit without time
A.22.1.1 Description
A.22.1.2 Coding
A.22.1.2.1 Pictorial
A.22.1.2.2 Formal structure
A.22.1.2.3 Notes
A.22.2 Analog output command event—16-bit without time
A.22.2.1 Description
A.22.2.2 Coding
A.22.2.2.1 Pictorial
A.22.2.2.2 Formal structure
A.22.2.2.3 Notes
A.22.3 Analog output command event—32-bit with time
A.22.3.1 Description
A.22.3.2 Coding
A.22.3.2.1 Pictorial
A.22.3.2.2 Formal structure
A.22.3.2.3 Notes
A.22.4 Analog output command event—16-bit with time
A.22.4.1 Description
A.22.4.2 Coding
A.22.4.2.1 Pictorial
A.22.4.2.2 Formal structure
A.22.4.2.3 Notes
A.22.5 Analog output command event—single-precision, floating-point without time
A.22.5.1 Description
A.22.5.2 Coding
A.22.5.2.1 Pictorial
A.22.5.2.2 Formal structure
A.22.5.2.3 Notes
A.22.6 Analog output command event—double-precision, floating-point without time
A.22.6.1 Description
A.22.6.2 Coding
A.22.6.2.1 Pictorial
A.22.6.2.2 Formal structure
A.22.6.2.3 Notes
A.22.7 Analog output command event—single-precision, floating-point with time
A.22.7.1 Description
A.22.7.2 Coding
A.22.7.2.1 Pictorial
A.22.7.2.2 Formal structure
A.22.7.2.3 Notes
A.22.8 Analog output command event—double-precision, floating-point with time
A.22.8.1 Description
A.22.8.2 Coding
A.22.8.2.1 Pictorial
A.22.8.2.2 Formal structure
A.22.8.2.3 Notes
A.23 Object group 50: time and date
A.23.1 Time and date—absolute time
A.23.1.1 Description
A.23.1.2 Coding
A.23.1.2.1 Pictorial
A.23.1.2.2 Formal structure
A.23.1.2.3 Notes
A.23.2 Time and date—absolute time and interval
A.23.2.1 Description
A.23.2.2 Coding
A.23.2.2.1 Pictorial
A.23.2.2.2 Formal structure
A.23.3 Time and date—absolute time at last recorded time
A.23.3.1 Description
A.23.3.2 Coding
A.23.3.2.1 Pictorial
A.23.3.2.2 Formal structure
A.23.3.2.3 Notes
A.23.4 Time and date—indexed absolute time and long interval
A.23.4.1 Description
A.23.4.2 Coding:
A.23.4.2.1 Pictorial
A.23.4.2.2 Formal structure
A.23.4.2.3 Notes
A.24 Object group 51: time and date common time-of-occurrences
A.24.1 Time and date common time-of-occurrence—absolute time, synchronized
A.24.1.1 Description
A.24.1.2 Coding
A.24.1.2.1 Pictorial
A.24.1.2.2 Formal structure
A.24.1.2.3 Notes
A.24.2 Time and date common time-of-occurrence—absolute time, unsynchronized
A.24.2.1 Description
A.24.2.2 Coding
A.24.2.2.1 Pictorial
A.24.2.2.2 Formal structure
A.24.2.2.3 Notes
A.25 Object group 52: time delays
A.25.1 Time delay—coarse
A.25.1.1 Description
A.25.1.2 Coding
A.25.1.2.1 Pictorial
A.25.1.2.2 Formal structure
A.25.1.2.3 Notes
A.25.2 Time delay—fine
A.25.2.1 Description
A.25.2.2 Coding
A.25.2.2.1 Pictorial
A.25.2.2.2 Formal structure
A.25.2.2.3 Notes
A.26 Object group 60: class objects
A.26.1 Class objects—Class 0 data
A.26.1.1 Description
A.26.1.2 Coding
A.26.1.2.1 Notes
A.26.2 Class objects—Class 1 data
A.26.2.1 Description
A.26.2.2 Coding
A.26.2.2.1 Notes
A.26.3 Class objects—Class 2 data
A.26.3.1 Description
A.26.3.2 Coding
A.26.3.2.1 Notes
A.26.4 Class objects—Class 3 data
A.26.4.1 Description
A.26.4.2 Coding
A.26.4.2.1 Notes
A.27 Object group 70: file-control
A.27.1 File-control—file identifier—superseded
A.27.1.1 Description
A.27.1.2 Coding
A.27.1.2.1 Pictorial
A.27.1.2.2 Formal structure
A.27.1.2.3 Notes
A.27.2 File-control—authentication
A.27.2.1 Description
A.27.2.2 Coding
A.27.2.2.1 Pictorial
A.27.2.2.2 Formal structure
A.27.2.2.3 Notes
A.27.3 File-control—file command
A.27.3.1 Description
A.27.3.2 Coding
A.27.3.2.1 Pictorial
A.27.3.2.2 Formal structure
A.27.3.2.3 Notes
A.27.4 File-control—file command status
A.27.4.1 Description
A.27.4.1.1 Responses
A.27.4.1.2 Requests
A.27.4.2 Coding
A.27.4.2.1 Pictorial
A.27.4.2.2 Formal structure
A.27.5 File-control—file transport
A.27.5.1 Description
A.27.5.1.1 Requests
A.27.5.1.2 Responses
A.27.5.2 Coding
A.27.5.2.1 Pictorial
A.27.5.2.2 Formal structure
A.27.5.2.3 Notes
A.27.6 File-control—file transport status
A.27.6.1 Description
A.27.6.2 Coding
A.27.6.2.1 Pictorial
A.27.6.2.2 Formal structure
A.27.7 File-control—file descriptor
A.27.7.1 Description
A.27.7.1.1 Requests
A.27.7.1.2 Responses
A.27.7.2 Coding
A.27.7.2.1 Pictorial
A.27.7.2.2 Formal structure
A.27.8 File-control—file specification string
A.27.8.1 Description
A.27.8.2 Coding
A.27.8.2.1 Pictorial
A.27.8.2.2 Formal structure
A.27.8.2.3 Notes
A.28 Object group 80: internal indications
A.28.1 Internal indications—packed format
A.28.1.1 Description
A.28.1.2 Coding
A.28.1.2.1 Pictorial
A.28.1.2.2 Formal structure
A.29 Object group 81: device storage
A.29.1 Device storage—buffer fill status
A.29.1.1 Description
A.29.1.2 Coding
A.29.1.2.1 Pictorial
A.29.1.2.2 Formal structure
A.29.1.2.3 Notes
A.30 Object group 82: Device Profiles
A.30.1 Device Profile—functions and indexes
A.30.1.1 Description
A.30.1.2 Coding
A.30.1.2.1 Pictorial
A.30.1.2.2 Formal structure
A.31 Object group 83: data sets
A.31.1 Data set—private registration object
A.31.1.1 Description
A.31.1.2 Coding
A.31.1.2.1 Pictorial
A.31.1.2.2 Formal structure
A.31.1.2.3 Notes
A.31.2 Data set—private registration object descriptor
A.31.2.1 Description
A.31.2.2 Coding
A.31.2.2.1 Pictorial
A.31.2.2.2 Formal structure
A.31.2.2.3 Format of data object specifier
A.31.2.2.4 Notes
A.32 Object group 85: data set prototypes
A.32.1 Data set prototype—with UUID
A.32.1.1 Description
A.32.1.2 Coding
A.32.1.2.1 Pictorial
A.32.1.2.2 Formal structure
A.32.1.2.3 Notes
A.33 Object group 86: data set descriptors
A.33.1 Data set descriptor—data set contents
A.33.1.1 Description
A.33.1.2 Coding
A.33.1.2.1 Pictorial
A.33.1.2.2 Formal structure
A.33.1.2.3 Notes
A.33.2 Data set descriptor—characteristics
A.33.2.1 Description
A.33.2.2 Coding
A.33.2.2.1 Pictorial
A.33.2.2.2 Formal structure
A.33.2.2.3 Notes
A.33.3 Data set descriptor—point index attributes
A.33.3.1 Description
A.33.3.2 Coding
A.33.3.2.1 Pictorial
A.33.3.2.2 Formal structure
A.33.3.2.3 Notes
A.34 Object group 87: data sets
A.34.1 Data set—present value
A.34.1.1 Description
A.34.1.2 Coding
A.34.1.2.1 Pictorial
A.34.1.2.2 Formal structure
A.34.1.2.3 Notes
A.35 Object group 88: data set events
A.35.1 Data set event—snapshot
A.35.1.1 Description
A.35.1.2 Coding
A.35.1.2.1 Pictorial
A.35.1.2.2 Formal structure
A.35.1.2.3 Notes
A.36 Object group 90: applications
A.36.1 Application—identifier
A.36.1.1 Description
A.36.1.2 Coding
A.36.1.2.1 Pictorial
A.36.1.2.2 Formal structure
A.36.1.2.3 Notes
A.37 Object group 91: status of requested operations
A.37.1 Status of requested operation—active configuration
A.37.1.1 Description
A.37.1.2 Coding
A.37.1.2.1 Pictorial
A.37.1.2.2 Formal structure
A.37.1.2.3 Notes
A.38 Object group 100: floating-point
A.38.1 Floating-point—none—general description common to all variations
A.38.1.1 Description
A.39 Object group 101: binary-coded decimal integers
A.39.1 Binary-coded decimal integer—small
A.39.1.1 Description
A.39.1.2 Coding
A.39.1.2.1 Pictorial
A.39.1.2.2 Formal structure
A.39.2 Binary-coded decimal integer—medium
A.39.2.1 Description
A.39.2.2 Coding
A.39.2.2.1 Pictorial
A.39.2.2.2 Formal structure
A.39.3 Binary-coded decimal integer—large
A.39.3.1 Description
A.39.3.2 Coding
A.39.3.2.1 Pictorial
A.39.3.2.2 Formal structure
A.40 Object group 102: unsigned integers
A.40.1 Unsigned integer—8-bit
A.40.1.1 Description
A.40.1.2 Coding
A.40.1.2.1 Pictorial
A.40.1.2.2 Formal structure
A.41 Object group 110: octet strings
A.41.1 Octet string—none—general description common to all variations
A.41.1.1 Description
A.41.1.2 Coding
A.41.1.2.1 Pictorial
A.41.1.2.2 Formal structure
A.41.1.2.3 Notes
A.42 Object group 111: octet string events
A.42.1 Octet string event—none—general description common to all variations
A.42.1.1 Description
A.42.1.2 Coding
A.42.1.2.1 Pictorial
A.42.1.2.2 Formal structure
A.42.1.2.3 Notes
A.43 Object group 112: virtual terminal output blocks
A.43.1 Virtual terminal output block—none—general description common to all variations
A.43.1.1 Description
A.43.1.2 Coding
A.43.1.2.1 Pictorial
A.43.1.2.2 Formal structure
A.43.1.2.3 Notes
A.44 Object group 113: virtual terminal event data
A.44.1 Virtual terminal event data—none—general description common to all variations
A.44.1.1 Description
A.44.1.2 Coding
A.44.1.2.1 Pictorial
A.44.1.2.2 Formal structure
A.44.1.2.3 Notes
A.45 Object group 120: authentication
A.45.1 Authentication—challenge
A.45.1.1 Description
A.45.1.2 Coding
A.45.1.2.1 Pictorial
A.45.1.2.2 Formal structure
A.45.1.2.3 Notes
A.45.2 Authentication—reply
A.45.2.1 Description
A.45.2.2 Coding
A.45.2.2.1 Pictorial
A.45.2.2.2 Formal structure
A.45.2.2.3 Notes
A.45.3 Authentication—Aggressive Mode request
A.45.3.1 Description
A.45.3.2 Coding
A.45.3.2.1 Pictorial
A.45.3.2.2 Formal structure
A.45.3.2.3 Notes
A.45.4 Authentication—session key status request
A.45.4.1 Description
A.45.4.2 Coding
A.45.4.2.1 Pictorial
A.45.4.2.2 Formal structure
A.45.4.2.3 Notes
A.45.5 Authentication—session key status
A.45.5.1 Description
A.45.5.2 Coding
A.45.5.2.1 Pictorial
A.45.5.2.2 Formal structure
A.45.5.2.3 Notes
A.45.6 Authentication—session key change
A.45.6.1 Description
A.45.6.2 Coding
A.45.6.2.1 Pictorial
A.45.6.2.2 Formal structure
A.45.6.2.3 Notes
A.45.7 Authentication—error
A.45.7.1 Description
A.45.7.2 Coding
A.45.7.2.1 Pictorial
A.45.7.2.2 Formal structure
A.45.7.2.3 Notes
A.45.8 Authentication—user certificate
A.45.8.1 Description
A.45.8.2 Coding
A.45.8.2.1 Pictorial
A.45.8.2.2 Formal structure
A.45.8.3 Notes
A.45.9 Authentication—message authentication code (MAC)
A.45.9.1 Description
A.45.9.2 Coding
A.45.9.2.1 Pictorial
A.45.9.2.2 Formal structure
A.45.9.3 Notes
A.45.10 Authentication—user status change
A.45.10.1 Description
A.45.10.2 Coding
A.45.10.2.1 Pictorial
A.45.10.2.2 Formal structure
A.45.10.3 Notes
A.45.11 Authentication—update key change request
A.45.11.1 Description
A.45.11.2 Coding
A.45.11.2.1 Pictorial
A.45.11.2.2 Formal structure
A.45.11.2.3 Notes
A.45.12 Authentication—update key change reply
A.45.12.1 Description
A.45.12.2 Coding
A.45.12.2.1 Pictorial
A.45.12.2.2 Formal structure
A.45.12.2.3 Notes
A.45.13 Authentication—update key change
A.45.13.1 Description
A.45.13.2 Coding
A.45.13.2.1 Pictorial
A.45.13.2.2 Formal structure
A.45.13.2.3 Notes
A.45.14 Authentication—update key change signature
A.45.14.1 Description
A.45.14.2 Coding
A.45.14.2.1 Pictorial
A.45.14.2.2 Formal structure
A.45.14.2.3 Notes
A.45.15 Authentication—update key change confirmation
A.45.15.1 Description
A.45.15.2 Coding
A.45.15.2.1 Pictorial
A.45.15.2.2 Formal structure
A.45.15.2.3 Notes
A.46 Object group 121: security statistics
A.46.1 Security statistic—32-bit with flag
A.46.1.1 Description
A.46.1.2 Coding
A.46.1.2.1 Pictorial
A.46.1.2.2 Formal structure
A.46.1.2.3 Notes
A.47 Object group 122: security statistic events
A.47.1 Security statistic event—32-bit with flag
A.47.1.1 Description
A.47.1.2 Coding
A.47.1.2.1 Pictorial
A.47.1.2.2 Formal structure
A.47.1.2.3 Notes
A.47.2 Security statistic event—32-bit with flag and time
A.47.2.1 Description
A.47.2.2 Coding
A.47.2.2.1 Pictorial
A.47.2.2.2 Formal structure
A.47.2.2.3 Notes
Annex B (informative) DNP3 quick reference
Annex C (informative) Associations
C.1 Introduction
C.2 Association definition
C.3 Association issues
C.4 UDP associations
C.5 TCP associations
Annex D (normative) UTF-8 related copyright
Annex E (informative) Sample CRC calculations
Annex F (informative) Managing Secure Authentication updates
F.1 Introduction
F.2 Secure Authentication version updates
F.3 Recommendations
F.3.1 For outstations
F.3.2 For master stations
F.3.3 For DNP3 system users
F.3.4 Commercial considerations
Annex G (informative) Bibliography
Distributed Network Protocol (DNP3) IEEE Standard for Electric Power Systems Communications— IEEE Power and Energy Society Sponsored by the Transmission and Distribution Committee and Substations Committee IEEE 3 Park Avenue New York, NY 10016-5997 USA 10 October 2012 IEEE Std 1815™-2012 (Revision of IEEE Std 1815-2010) Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
IEEE Std 1815TM-2012 (Revision of IEEE Std 1815-2010) IEEE Standard for Electric Power Systems Communications— Distributed Network Protocol (DNP3) Sponsor Transmission and Distribution Committee and Substations Committee of the IEEE Power and Energy Society Approved 8 June 2012 IEEE-SA Standards Board Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
The Working Group thanks the International Electrotechnical Commission (IEC) for permission to reproduce information from the International Standards IEC/TS 62351-3 ed. 1.0 (2007), IEC/TS 62351-5 ed. 1.0 (2009), and IEC/TS 62351-8 ed. 1.0 (2011). All such extracts are copyright of IEC, Geneva, Switzerland. All rights reserved. Further information on the IEC is available from www.iec.ch. IEC has no responsibility for the placement and context in which the extracts and contents are reproduced by the author, nor is IEC in any way responsible for the other content or accuracy therein. Abstract: The DNP3 protocol structure, functions, and interoperable application options (subset levels) are specified. The simplest application level is intended for low-cost distribution feeder devices, and the most complex for full-featured systems. The appropriate level is selected to suit the functionality required in each device. The protocol is suitable for operation on a variety of communication media consistent with the makeup of most electric power communication systems. Keywords: Distributed Network Protocol (DNP3), distribution automation, distribution feeder, electric power communication systems, IEEE 1815, master station, substation automation • The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright © 2012 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published 10 October 2012. Printed in the United States of America. IEEE is a registered trademark in the U.S. Patent & Trademark Office, owned by The Institute of Electrical and Electronics Engineers, Incorporated. PDF: ISBN 978-0-7381-7292-7 Print: ISBN 978-0-7381-7344-3 IEEE prohibits discrimination, harassment and bullying. For more information, visit http://www.ieee.org/web/aboutus/whatis/policies/p9-26.html. No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior written permission of the publisher. STD97267 STDPD97267 Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
Notice and Disclaimer of Liability Concerning the Use of IEEE Documents: IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating Committees of the IEEE Standards Association (IEEE-SA) Standards Board. IEEE develops its standards through a consensus development process, approved by the American National Standards Institute, which brings together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers are not necessarily members of the Institute and serve without compensation. While IEEE administers the process and establishes rules to promote fairness in the consensus development process, IEEE does not independently evaluate, test, or verify the accuracy of any of the information or the soundness of any judgments contained in its standards. Use of an IEEE Standard is wholly voluntary. IEEE disclaims liability for any personal injury, property or other damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or indirectly resulting from the publication, use of, or reliance upon any IEEE Standard document. IEEE does not warrant or represent the accuracy or content of the material contained in its standards, and expressly disclaims any express or implied warranty, including any implied warranty of merchantability or fitness for a specific purpose, or that the use of the material contained in its standards is free from patent infringement. IEEE Standards documents are supplied "AS IS." The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure, purchase, market, or provide other goods and services related to the scope of the IEEE standard. Furthermore, the viewpoint expressed at the time a standard is approved and issued is subject to change brought about through developments in the state of the art and comments received from users of the standard. Every IEEE standard is subjected to review at least every ten years. When a document is more than ten years old and has not undergone a revision process, it is reasonable to conclude that its contents, although still of some value, do not wholly reflect the present state of the art. Users are cautioned to check to determine that they have the latest edition of any IEEE standard. In publishing and making its standards available, IEEE is not suggesting or rendering professional or other services for, or on behalf of, any person or entity. Nor is IEEE undertaking to perform any duty owed by any other person or entity to another. Any person utilizing any IEEE Standards document, should rely upon his or her own independent judgment in the exercise of reasonable care in any given circumstances or, as appropriate, seek the advice of a competent professional in determining the appropriateness of a given IEEE standard. Translations: The IEEE consensus development process involves the review of documents in English only. In the event that an IEEE standard is translated, only the English version published by IEEE should be considered the approved IEEE standard. Official Statements: A statement, written or oral, that is not processed in accordance with the IEEE-SA Standards Board Operations Manual shall not be considered the official position of IEEE or any of its committees and shall not be considered to be, nor be relied upon as, a formal position of IEEE. At lectures, symposia, seminars, or educational courses, an individual presenting information on IEEE standards shall make it clear that his or her views should be considered the personal views of that individual rather than the formal position of IEEE. Comments on Standards: Comments for revision of IEEE Standards documents are welcome from any interested party, regardless of membership affiliation with IEEE. However, IEEE does not provide consulting information or advice pertaining to IEEE Standards documents. Suggestions for changes in documents should be in the form of a proposed change of text, together with appropriate supporting comments. Since IEEE standards represent a consensus of concerned interests, it is important to ensure that any responses to comments and questions also receive the concurrence of a balance of interests. For this reason, IEEE and the members of its societies and Standards Coordinating Committees are not able to provide an instant response to comments or questions except in those cases where the matter has previously been addressed. Any person who would like to participate in evaluating comments or revisions to an IEEE standard is welcome to join the relevant IEEE working group at http://standards.ieee.org/develop/wg/. Comments on standards should be submitted to the following address: Secretary, IEEE-SA Standards Board 445 Hoes Lane Piscataway, NJ 08854-4141 USA Photocopies: Authorization to photocopy portions of any individual standard for internal or personal use is granted by The Institute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of any individual standard for educational classroom use can also be obtained through the Copyright Clearance Center. Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
Notice to users Laws and regulations Users of IEEE Standards documents should consult all applicable laws and regulations. Compliance with the provisions of any IEEE Standards document does not imply compliance to any applicable regulatory requirements. Implementers of the standard are responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighted by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by reference, in laws and regulations, and use in private self- regulation, standardization, and the promotion of engineering practices and methods. By making this document available for use and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document. Updating of IEEE documents Users of IEEE Standards documents should be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the document together with any amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE-SA Website at http://standards.ieee.org/index.html or contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or at http://standards.ieee.org/index.html. IEEE-SA Website development process, visit the IEEE standards Errata if any, for Errata, the following URL: http://standards.ieee.org/findstds/errata/index.html. Users are encouraged to check this URL for errata periodically. this and all other standards can be accessed at iv Copyright © 2012 IEEE. All rights reserved. Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
Patents Attention is called to the possibility that implementation of this standard may require use of subject matter covered by patent rights. By publication of this standard, no position is taken by the IEEE with respect to the existence or validity of any patent rights in connection therewith. If a patent holder or patent applicant has filed a statement of assurance via an Accepted Letter of Assurance, then the statement is listed on the IEEE-SA Website at http://standards.ieee.org/about/sasb/patcom/patents.html. Letters of Assurance may indicate whether the Submitter is willing or unwilling to grant licenses under patent rights without compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination to applicants desiring to obtain such licenses. Essential Patent Claims may exist for which a Letter of Assurance has not been received. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely their own responsibility. Further information may be obtained from the IEEE Standards Association. v Copyright © 2012 IEEE. All rights reserved. Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
Participants At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Standard for Electric Power Systems Communications—Distributed Network Protocol (DNP3) Working Group had the following membership: Bill Ackerman Demos Andreou Philip Aubin Jim Baker James Bougie Jake Brodsky Carlos Bustamante Ed Cenzon Mason Clark Lorene Cunningham Mike Dood H. Lee Smith, Co-Chair Ron Farquharson, Co-Chair Andrew West, Vice Chair Chris Francis Charles Freedman Dan Friedman Grant Gilchrist Randy Kimura Marc Lacroix Bob Landman Parker McCauley Steve McCoy Bruce Muschlitz Craig Preuss James Recchia Craig Rodine Samuel Sciacca Alan Scott Barry Shephard Michael S. Smith John T. Tengdin Eric Thibodeau Tim Tibbals Jay Vellore Jack Verson David Wood The following members of the individual balloting committee voted on this standard. Balloters may have voted for approval, disapproval, or abstention. Bill Ackerman Satish Aggarwal Ali Al Awazi Saleman Alibhay Ficheux Arnaud Jim Baker Wallace Binder Paul Bishop Chris Brooks William Byrd Paul Cardinal Edgar Cenzon Jerry Corkran Lorene Cunningham Ray Davis Muhammad Dhodhi Mike Dood Randall Dotson Gary Engmann Ron Farquharson Dan Friedman Grant Gilchrist Mietek Glinkowski Roman Graf Stephen Grier Randall Groves Timothy Hayden Gary Heuston Gary Hoffman Yi Hu Noriyuki Ikeuchi Piotr Karocki Yuri Khersonsky James Kinney Stanley Klein Joseph L. Koepfinger Jim Kulchisky Marc Lacroix Chung-Yiu Lam G. Luri Ahmad Mahinfallah Wayne Manges Pierre Martin Jeffery Masters John McDonald Gary McNaughton Willam Moncrief Jose Morales Charles Morgan Adi Mulawarman R. Muprhy Bruce Muschlitz Pratap Mysore Arthur Neubauer Michael S. Newman Charles Ngethe Gary Nissen Lorraine Padden Mirko Palazzo Donald Parker Bansi Patel Craig Preuss John Randolph Michael Roberts Charles Rogers Bob Saint Steven Sano Bartien Sayogo Samuel Sciacca Gil Shultz Mark Simon Jerry Smith Joshua Smith Aaron Snyder John Spare Wayne Stec Gary Stoedter Walter Struppler Charles Sufana William Taylor David Tepen Eric Thibodeau Eric Udren John Vergis Jane Verner Daniel Ward Andrew West Janusz Zalewski Matthew Zeedyk vi Copyright © 2012 IEEE. All rights reserved. Authorized licensed use limited to: Pacific Gas & Electric Co. Downloaded on March 07,2013 at 01:55:39 UTC from IEEE Xplore. Restrictions apply.
分享到:
收藏