ДСТУ EN ISO 16484-5:2014 Автоматизовані системи моніторингу та управління будівлями (АСМУБ). Частина 5. Протокол зв`язку передавання даних (EN ІSO 16484-5:2014, ІDT)

Даний документ доступний у тарифі «ВСЕ ВРАХОВАНО»

У Вас є питання стосовно документа? Ми раді на них відповісти!Перелік безкоштовних документівПомітили помилку в документі або на сайті? Будь ласка, напишіть нам про це!Залишити заявку на документ

ПІДТВЕРДЖУВАЛЬНЕ ПОВІДОМЛЕННЯ

Наказом Міністерства економічного розвитку і торгівлі України

від 30.12.2014 № 144

EN ISO 16484-5:2014

en: Building automation and control systems (BAGS) - Part 5: Data

communication protocol

прийнято як національний стандарт

методом «підтвердження» за позначенням
Відповідає офіційному тексту

ДСТУ EN ISO 16484-5:2014

ик: Автоматизовані системи моніторингу та управління будівлями (АСМУБ).

Частина 5. Протокол зв'язку передавання даних

(EN ISO 16484-5:2014, IDT)

З наданням чинності від 2016-01-01

 

CONTENTS

FOREWORD

1 PURPOSE

2 SCOPE

3 DEFINITIONS

3.1 Terms Adopted from International Standards

3.2 Terms Defined for this Standard

3.3 Abbreviations and Acronyms Used in this Standard

4 BACnet PROTOCOL ARCHITECTURE

4.1 The BACnet Collapsed Architecture

4.2 BACnet Network Topology

4.3 Security

5 THE APPLICATION LAYER

5.1 The Application Layer Model

5.2 Segmentation of BACnet Messages

5.3 Transmission of BACnet APDUs

5.4 Application Protocol State Machines

5.5 Application Protocol Time Sequence Diagrams

5.6 Application Layer Service Conventions

6 THE NETWORK LAYER

6.1 Network Layer Service Specification

6.2 Network Layer PDU Structure

6.3 Messages for Multiple Recipients

6.4 Network Layer Protocol Messages

6.5 Network Layer Procedures

6.6 BACnet Routers

6.7 Point-To-Point Half-Routers

7 DATA LINK/PHYSICAL LAYERS: ISO 8802-3 ("Ethernet") LAN

7.1 The Use of ISO 8802-2 Logical Link Control (LLC) .

7.2 Parameters Required by the LLC Primitives

7.3 Parameters Required by the MAC Primitives

7.4 Physical Media

8 DATA LINK/PHYSICAL LAYERS: ARCNET LAN 

8.1 The Use of ISO 8802-2 Logical Link Control (LLC)

8.2 Parameters Required by the LLC Primitives

8.3 Mapping the LLC Services to the ARCNET MAC Layer

8.4 Parameters Required by the MAC Primitives

8.5 Physical Media

9 DATA LINK/PHYSICAL LAYERS: MASTER-SLAVE/TOKEN PASSING (MS/TP) LAN

9.1 Service Specification

9.2 Physical Layer

9.3 MS/TP Frame Format

9.4 Overview of the MS/TP Network

9.5 MS/TP Medium Access Control

9.6 Cyclic Redundancy Check (CRC)

9.7 Interfacing MS/TP LANs with Other BACnet LANs

9.8 Responding BACnet User Processing of Messages from MS/TP

9.9 Repeaters

10 DATA LINK/PHYSICAL LAYERS: POINT-TO-POINT (PTP)

10.1 Overview

10.2 Service Specification

10.3 Point-to-Point Frame Format

10.4 PTP Medium Access Control Protocol

11 DATA LINK/PHYSICAL LAYERS: EIA/CEA-709.1 ("LonTalk") LAN 

11.1 The Use of ISO 8802-2 Logical Link Control (LLC) .

11.2 Parameters Required by the LLC Primitives

11.3 Mapping the LLC Services to the LonTalk Application Layer

11.4 Parameters Required by the Application Layer Primitives

11.5 Physical Media

12 MODELING CONTROL DEVICES AS A COLLECTION OF OBJECTS

12.1 Accumulator Object Type

12.2 Analog Input Object Type

12.3 Analog Output Object Type

12.4 Analog Value Object Type

12.5 Averaging Object Type

12.6 Binary Input Object Type

12.7 Binary Output Object Type

12.8 Binary Value Object Type

12.9 Calendar Object Type

12.10 Command Object Type

12.11 Device Object Type

12.12 Event Enrollment Object Type

12.13 File Object Type

12.14 Group Object Type

12.15 Life Safety Point Object Type

12.16 Life Safety Zone Object Type

12.17 Loop Object Type

12.18 Multi-state Input Object Type

12.19 Multi-state Output Object Type

12.20 Multi-state Value Object Type

12.21 Notification Class Object Type

12.22 Program Object Type

12.23 Pulse Converter Object Type

12.24 Schedule Object Type

12.25 Trend Log Object Type

12.26 Access Door Object Type

12.27 Event Log Object Type

12.28 Load Control Object Type

12.29 Structured View Object Type

12.30 Trend Log Multiple Object Type

12.31 Access Point Object Type

12.32 Access Zone Object Type

12.33 Access User Object Type

12.34 Access Rights Object Type

12.35 Access Credential Object Type

12.36 Credential Data Input Object Type.

12.37 CharacterString Value Object Type

12.38 DateTime Value Object Type

12.39 Large Analog Value Object Type

12.40 BitString Value Object Type

12.41 OctetString Value Object Type

12.42 Time Value Object Type

12.43 Integer Value Object Type

12.44 Positive Integer Value Object Type

12.45 Date Value Object Type

12.46 DateTime Pattern Value Object Type

12.47 Time Pattern Value Object Type

12.48 Date Pattern Value Object Type

12.49 Network Security Object Type

12.50 Global Group Object Type

12.51 Notification Forwarder Object Type

12.52 Alert Enrollment Object Type

12.53 Channel Object Type

12.54 Lighting Output Object Type

13 ALARM AND EVENT SERVICES.

13.1 Change of Value Reporting

13.2 Event Reporting

13.3 Event Algorithms

13.4 Fault Algorithms

13.5 AcknowledgeAlarm Service

13.6 ConfirmedCOVNotification Service

13.7 UnconfirmedCOVNotification Service

13.8 ConfirmedEventNotification Service

13.9 UnconfirmedEventNotification Service

13.10 GetAlarmSummary Service

13.11 GetEnrollmentSummary Service

13.12 GetEventInformation Service

13.13 LifeSafetyOperation Service

13.14 SubscribeCOV Service

13.15 SubscribeCOVProperty Service

14 FILE ACCESS SERVICES

14.1 AtomicReadFile Service

14.2 AtomicWriteFile Service

15 OBJECT ACCESS SERVICES

15.1 AddListElement Service

15.2 RemoveListElement Service

15.3 CreateObject Service

15.4 DeleteObject Service

15.5 ReadProperty Service

15.6 Deleted Clause

15.7 ReadPropertyMultiple Service

15.8 ReadRange Service

15.9 WriteProperty Service

15.10 WritePropertyMultiple Service

15.11 WriteGroup Service .

16 REMOTE DEVICE MANAGEMENT SERVICES

16.1 DeviceCommunicationControl Service .

16.2 ConfirmedPrivateTransfer Service

16.3 UnconfirmedPrivateTransfer Service

16.4 ReinitializeDevice Service

16.5 ConfirmedTextMessage Service

16.6 UnconfirmedTextMessage Service

16.7 TimeSynchronization Service

16.8 UTCTimeSynchronization Service

16.9 Who-Has and I-Have Services

16.10 Who-Is and I-Am Services

17 VIRTUAL TERMINAL SERVICES

17.1 Virtual Terminal Model

17.2 VT-Open Service

17.3 VT-Close Service

17.4 VT-Data Service

17.5 Default-terminal Characteristics

18 ERROR, REJECT, and ABORT CODES

18.1 Error Class - DEVICE

18.2 Error Class - OBJECT

18.3 Error Class - PROPERTY

18.4 Error Class - RESOURCES

18.5 Error Class - SECURITY

18.6 Error Class - SERVICES .

18.7 Error Class - COMMUNICATION

18.8 Error Class - VT

18.9 Reject Reason

18.10 Abort Reason

18.11 Confirmed Service Common Errors

19 BACnet PROCEDURES

19.1 Backup and Restore

19.2 Command Prioritization

19.3 Device Restart Procedure

20 ENCODING BACnet PROTOCOL DATA UNITS

20.1 Encoding the Fixed Part of BACnet APDUs

20.2 Encoding the Variable Part of BACnet APDUs

21 FORMAL DESCRIPTION OF APPLICATION PROTOCOL DATA UNITS

22 CONFORMANCE AND INTEROPERABILITY

22.1 Conformance to BACnet

22.2 BACnet Interoperability

23 EXTENDING BACnet TO ACCOMMODATE VENDOR PROPRIETARY INFORMATION

23.1 Extending Enumeration Values

23.2 Using the PrivateTransfer Services to Invoke Non-Standardized Services

23.3 Adding Proprietary Properties to a Standardized Object

23.4 Adding Proprietary Object Types to BACnet

23.5 Restrictions on Extending BACnet

24 NETWORK SECURITY

24.1 Overview

24.2 Security Wrapper

24.3 Security Messages

24.4 Securing an APDU

24.5 Securing an NPDU

24.6 Securing a BVLL

24.7 Securing Messages

24.8 Network Security Network Trust Levels .

24.9 Network Security Policies

24.10 Network Security

24.11 End-to-End Security

24.12 Wrapping and Unwrapping Secure Messages

24.13 Authenticating Messages

24.14 User Authentication

24.15 Time Synchronization Requirements .

24.16 Integrating the Security Layer into the BACnet Stack

24.17 BACnet Security In A NAT Environment .

24.18 BACnet Security Proxy

24.19 Deploying Secure Device on Non-Security Aware Networks .

24.20 Deploying Secure Single Network Installations

24.21 Security Keys

24.22 Key Server .

25 REFERENCES

ANNEX A - PROTOCOL IMPLEMENTATION CONFORMANCE STATEMENT (NORMATIVE)

ANNEX B - GUIDE TO SPECIFYING BACnet DEVICES (INFORMATIVE) .

ANNEX C - Removed

ANNEX D - Removed 0

ANNEX E - EXAMPLES OF BACnet APPLICATION SERVICES (INFORMATIVE)

E.1 Alarm and Event Services

E.2 File Access Services

E.3 Object Access Services.

E.4 Remote Device Management Services

E.5 Virtual Terminal Services

ANNEX F - EXAMPLES OF APDU ENCODING (INFORMATIVE)

F.1 Example Encodings for Alarm and Event Services

F.2 Example Encodings for File Access Services

F.3 Example Encodings for Object Access Services

F.4 Example Encodings for Remote Device Management Services

F.5 Example Encodings for Virtual Terminal Services

ANNEX G - CALCULATION OF CRC (INFORMATIVE)

G.1 Calculation of the Header CRC

G.2 Calculation of the Data CRC

ANNEX H - COMBINING BACnet NETWORKS WITH NON-BACnet NETWORKS (NORMATIVE)

H.1 Mapping Non-BACnet Networks onto BACnet Routers

H.2 Multiple "Virtual" BACnet Devices in a Single Physical Device

H.3 Using BACnet with the DARPA Internet Protocols

H.4 Using BACnet with the IPX Protocol

H.5 Using BACnet with EIB/KNX

H.6 Using BACnet with the BACnet/WS Web Services Interface (Annex N)

H.7 Virtual MAC Addressing

ANNEX I - COMMANDABLE PROPERTIES WITH MINIMUM ON AND OFF TIMES (INFORMATIVE) .

ANNEX J - BACnet/IP (NORMATIVE)

J.1 General

J.2 BACnet Virtual Link Layer .

J.3 BACnet/IP Directed Messages .

J.4 BACnet/IP Broadcast Messages .

J.5 Addition of Foreign B/IP Devices to an Existing B/IP Network

J.6 Routing Between B/IP and non-B/IP BACnet Networks

J.7 Routing Between Two B/IP BACnet Networks

J.8 Use of IP Multicast within BACnet/IP .

J.9 Sources for Internet Information .

ANNEX K - BACnet INTEROPERABILITY BUILDING BLOCKS (BIBBs) (NORMATIVE)

K.1 Data Sharing BIBBs

K.2 Alarm and Event Management BIBBs

K.3 Scheduling BIBBs

K.4 Trending BIBBs

K.5 Device and Network Management BIBBs

ANNEX L - DESCRIPTIONS AND PROFILES OF STANDARDIZED BACnet DEVICES (NORMATIVE)

L.1 Operator Interfaces

L.2 BACnet Building Controller (B-BC)

L.3 BACnet Advanced Application Controller (B-AAC)

L.4 BACnet Application Specific Controller (B-ASC)

L.5 BACnet Smart Actuator (B-SA)

L.6 BACnet Smart Sensor (B-SS)

L.7 Profiles of the Standard BACnet Devices

ANNEX M - GUIDE TO EVENT NOTIFICATION PRIORITY ASSIGNMENTS (INFORMATIVE)

ANNEX N - BACnet/WS WEB SERVICES INTERFACE (NORMATIVE)

N.1 Data Model

N.2 Paths

N.3 Normalized Points

N.4 Reference Nodes

N.5 Localization

N.6 Security

N.7 Sessions

N.8 Attributes

N.9 Standard Nodes

N.10 Encodings

N.11 Service Options

N.12 Services

N.13 Errors

N.14 Extending BACnet/WS

ANNEX O - BACnet OVER ZigBee AS A DATA LINK LAYER (NORMATIVE)

O.1 General

O.2 ZigBee Overview

O.3 Definitions

O.4 Unicast Addressing

O.5 Broadcast Addressing

O.6 BACnet/ZigBee Data Link Layer (BZLL)

O.7 Maximum Payload Size .

O.8 Vendor Specific Commands

ANNEX P - BACnet ENCODING OF STANDARD AUTHENTICATION FACTOR FORMATS (NORMATIVE)

ANNEX Q - XML DATA FORMATS (NORMATIVE)

Q.1 Introduction

Q.2 Document Structure

Q.3 Expressing BACnet Datatypes in XML

Q.4 Expressing BACnet Objects and Properties in XML

Q.5 Definitions, Types, Instances, and Inheritance

Q.7 Extensibility

ANNEX R - MAPPING NETWORK LAYER ERRORS (NORMATIVE)

ANNEX S - EXAMPLES OF SECURE BACnet MESSAGES (INFORMATIVE)

HISTORY OF REVISIONS

Повна версія документа доступна в тарифі «ВСЕ ВРАХОВАНО».

Увійти в Особистий кабінет Детальніше про тарифи

БУДСТАНДАРТ Online