{"id":426650,"date":"2024-10-20T07:03:04","date_gmt":"2024-10-20T07:03:04","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30471808-dc\/"},"modified":"2024-10-26T13:20:10","modified_gmt":"2024-10-26T13:20:10","slug":"bsi-23-30471808-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30471808-dc\/","title":{"rendered":"BSI 23\/30471808 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
9<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1 Scope 2 Normative References <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 General 3.2 List of terms, abbreviated terms and definitions given in various standards <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.3 Terms defined in this document <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 3.4 Abbreviated terms and acronyms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 3.5 Conventions 3.5.1 Principles for (sub) clause selections of referenced documents 3.5.2 Convention for capitalizations 3.5.3 Unit conventions 3.5.4 Conventions for YANG contents <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4 Overview of TSN in industrial automation 4.1 Industrial application operation <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.2 Industrial applications 4.2.1 General <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.2.2 Control loop tasks <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.2.3 Start of control loop tasks 4.3 IA-stations 4.4 Ethernet interface <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.5 Mechanisms that can be used to meet control loop latency requirements <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.6 Translation between middleware and network provisioning 4.6.1 Interfaces of type l2vlan <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4.6.2 PTP Instances <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 4.7 Industrial traffic types 4.7.1 General 4.7.2 Traffic type characteristics 4.7.3 Traffic type categories 4.7.3.1 General 4.7.3.2 IA time-aware stream <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 4.7.3.3 IA stream 4.7.3.4 IA traffic engineered non-stream 4.7.3.5 IA non-stream 4.7.4 Traffic types 4.7.4.1 General <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 4.7.4.2 Isochronous 4.7.4.3 Cyclic-synchronous 4.7.4.4 Cyclic-asynchronous 4.7.4.5 Alarms and events 4.7.4.6 Configuration and diagnostics <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 4.7.4.7 Network control 4.7.4.8 Best effort 4.7.4.9 Traffic class to traffic type mapping 4.8 Security for TSN-IA 4.8.1 General 4.8.2 Security configuration model <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 4.8.3 NETCONF\/YANG processing <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.8.4 NETCONF\/YANG access control <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 4.8.5 Identity checking <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4.8.6 Secure device identity 4.8.6.1 Device Identity 4.8.6.2 Verifiable Device Identity 4.8.6.3 Verification Support Mechanisms 4.8.6.3.1 General 4.8.6.3.2 Secure Transports 4.8.6.3.3 Secure Information <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.8.6.3.4 IDevID and LDevID Credentials 4.8.6.3.5 IDevID Items beyond IEEE Std 802.1AR <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.8.6.3.6 Device Identity Representation in IDevID and LDevID Credentials 5 Conformance 5.1 General 5.2 Requirements terminology <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.3 Profile conformance statement (PCS) 5.4 Conformance classes 5.5 IA-station requirements 5.5.1 IA-station PHY and MAC requirements for external ports <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.5.2 IA-station topology discovery requirements 5.5.3 IA-station requirements for time synchronization <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.5.4 IA-station requirements for security 5.5.5 IA-station requirements for management 5.5.5.1 General 5.5.5.2 Network Configuration Protocol (NETCONF) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 5.5.5.3 IA-station management YANG modules 5.5.6 IA-station requirements for digital data sheet 5.6 IA-station options 5.6.1 IA-station PHY and MAC options for external ports <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 5.6.2 IA-station options for time synchronization 5.6.3 IA-station options for security 5.6.4 IA-station options for management <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5.7 Bridge component requirements 5.7.1 Common Bridge component requirements 5.7.2 ccA Bridge component requirements <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.7.3 ccB Bridge component requirements 5.8 Bridge component options 5.8.1 Common Bridge component options 5.8.2 ccA Bridge component options <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5.8.3 ccB Bridge component options 5.9 End station component requirements 5.9.1 Common End Station Component Requirements <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.9.2 ccA end station component requirements 5.9.3 ccB end station component requirements 5.10 End station component options 5.10.1 Common end station component options <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.10.2 ccA end station component options 5.10.3 ccB end station component options 5.11 CNC requirements <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 5.12 CNC options 5.13 CUC requirements 6 Required functions for an industrial network 6.1 General 6.2 Synchronization 6.2.1 General 6.2.2 PTP Instance requirements <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.2.3 PTP protocol requirements <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 6.2.4 Clock states <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 6.2.5 Grandmaster PTP Instance requirements 6.2.6 Application framework <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 6.2.7 Working Clock domain framework <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 6.2.8 Global Time domain framework 6.2.9 IA-station model for clocks <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 6.2.10 Clock usage for the Ethernet interface 6.2.10.1 Time-aware offset control 6.2.10.2 Gating cycle <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 6.2.11 Error model <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 6.2.12 gPTP domains and PTP Instances 6.2.13 Split and combine cases for a PTP domain <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 6.3 Security model 6.3.1 General <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 6.3.2 Security functionality 6.3.2.1 Message exchange protection 6.3.2.1.1 General 6.3.2.1.2 TLS profile 6.3.2.1.3 Certificate-to-name mapping <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 6.3.2.1.4 Role extension 6.3.2.2 Resource access authorization <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 6.3.3 IDevID Profile 6.3.3.1 General 6.3.3.2 Object Contents 6.3.3.2.1 General 6.3.3.2.2 IA-Station Identity <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 6.3.3.2.3 Signature Suites 6.3.3.3 Information Model 6.3.3.3.1 General 6.3.3.3.2 Entries 6.3.3.3.3 Entry Manifoldness <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 6.3.3.3.4 Entry Naming 6.3.3.4 Processing Model 6.3.3.4.1 General 6.3.3.4.2 Credentials 6.3.3.4.2.1 General 6.3.3.4.2.2 Creation 6.3.3.4.2.3 Distribution 6.3.3.4.2.4 Use <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 6.3.3.4.2.5 Storage 6.3.3.4.2.6 Revocation 6.3.3.4.3 Trust Anchors 6.3.3.4.3.1 General <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 6.3.3.4.3.2 Creation 6.3.3.4.3.3 Distribution 6.3.3.4.3.4 Use 6.3.3.4.3.5 Storage 6.3.3.4.3.6 Revocation 6.3.4 Security setup based on IDevID 6.3.4.1 General 6.3.4.2 imprintTrustAnchor <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 6.3.4.3 imprintCredential 6.3.4.3.1 General 6.3.4.3.2 Internal key generation <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 6.3.4.3.3 External key generation 6.3.4.4 imprintCertToNameMapping <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 6.3.5 Secure configuration based on LDevID-NETCONF 6.4 Bridge delay Requirements 6.5 Bridge FDB requirements <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 6.6 Bridge reporting requirements 6.7 Management 6.7.1 General 6.7.2 IA-station management model 6.7.2.1 General 6.7.2.2 IEEE 802.1Q management model <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.7.2.3 Internal LAN connection model <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 6.7.2.4 Spanning Tree, VLAN and TE-MSTID configuration <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 6.7.2.5 l2vlan type interfaces <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.7.3 Discovery of IA-station internal structure 6.7.4 Network engineering model <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 6.7.5 Operation 6.7.5.1 General <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 6.7.5.2 Domain port states <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6.7.5.3 Engineered network <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 6.7.5.4 Dynamic topology 6.7.5.4.1 General 6.7.5.4.2 Adding an IA-station 6.7.5.4.3 Removing an IA-station <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 6.7.5.4.4 Replacing an IA-station 6.7.5.5 Engineered network extended by dynamic topology 6.7.6 Engineered time-synchronization spanning tree 6.7.6.1 General 6.7.6.2 Sync tree requirements 6.7.6.3 STE phases 6.7.6.3.1 General 6.7.6.3.2 Discovery phase <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 6.7.6.3.3 Provisioning phase 6.7.6.3.4 Monitoring phase 6.7.6.3.4.1 General 6.7.6.3.4.2 Status monitoring 6.7.6.3.4.3 Performance monitoring <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 6.7.6.4 Adding an IA-station 6.7.6.5 Removing an IA-station 6.7.6.6 Replacing an IA-station 6.7.7 Diagnostics 6.7.7.1 General <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 6.7.7.2 Observer model 6.7.7.3 Usage of YANG Push <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 6.7.7.4 Mandatory RPCs 6.7.7.5 Mandatory notifications 6.7.7.6 Mandatory diagnostics data nodes 6.7.7.7 Usage of NETCONF notifications 6.7.8 Data sheet 6.7.8.1 General <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 6.7.8.2 Digital data sheet of an IA-station <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 6.7.8.3 Traffic requirements description 6.7.9 YANG representation of managed objects 6.7.9.1 General 6.7.9.2 Common YANG modules, features and leaves 6.7.9.2.1 General 6.7.9.2.2 IEEE standard for Ethernet <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 6.7.9.2.3 Station and media access control connectivity discovery <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 6.7.9.2.4 Synchronization 6.7.9.2.4.1 Timesync <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 6.7.9.2.4.2 Timesync (draft ieee802-dot1as-ptp) <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 6.7.9.2.4.3 Timesync (iecieee60802) 6.7.9.2.5 Security configuration modules 6.7.9.2.5.1 YANG module for a keystore <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 6.7.9.2.5.2 Network configuration access control 6.7.9.2.5.3 A YANG data module for a truststore 6.7.9.2.6 IA-station management 6.7.9.2.6.1 System capabilities <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 6.7.9.2.6.2 YANG library 6.7.9.2.6.3 NETCONF extensions to support the network management datastore architecture 6.7.9.2.6.4 YANG push 6.7.9.2.6.5 YANG notification capabilities 6.7.9.2.6.6 YANG notifications <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 6.7.9.2.6.7 NETCONF monitoring 6.7.9.2.6.8 System management 6.7.9.2.6.9 Hardware management <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 6.7.9.2.6.10 Interface management 6.7.9.2.6.11 Bridge component <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 6.7.9.2.6.12 IEC\/IEEE 60802 YANG module <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 6.7.9.2.6.13 NETCONF Client 6.7.9.2.6.14 NETCONF Server 6.7.9.2.7 YANG Module for TSN UNI <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 6.7.9.3 Optional YANG models, features and leaves 6.7.9.3.1 General 6.7.9.3.2 Scheduled traffic <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 6.7.9.3.3 Frame preemption 6.7.9.3.4 Credit-based shaper 6.8 Topology discovery and verification 6.8.1 Topology discovery and verification requirements <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 6.8.2 Topology discovery overview 6.8.2.1 General 6.8.2.2 LLDP operational control parameters <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 6.8.2.3 LLDPDU transmission, reception, and addressing 6.8.2.4 LLDP TLV selection 6.8.2.4.1 General 6.8.2.4.2 Chassis ID TLV 6.8.2.4.3 Port ID TLV 6.8.2.4.4 Time To Live TLV <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 6.8.2.4.5 System capabilities TLV 6.8.2.4.6 Management address TLV 6.8.2.5 LLDP remote systems data 6.8.3 Topology verification overview 6.9 CNC 6.9.1 General 6.9.2 Stream destination MAC address range <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Annex A (normative) PCS proforma \u2013 Time-sensitive networking profile for industrial automation A.1 General A.2 Abbreviations and special symbols A.2.1 Status symbols A.2.2 General abbreviations <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | A.3 Instructions for completing the PCS proforma A.3.1 General structure of the PCS proforma A.3.2 Additional information A.3.3 Exception information <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | A.3.4 Conditional status A.3.4.1 Conditional items A.3.4.2 Predicates A.3.4.3 References to other standards A.3.5 Electronic datasheet <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | A.4 Common requirements A.4.1 Implementation identification A.4.2 Profile summary, IEC\/IEEE 60802 A.4.3 Implementation type <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | Annex B (informative) Representative Configuration Domain <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Annex C (informative) Error model C.1 General C.2 Time error components due to relaying of time <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | C.3 Time error components due to providing time to the Grandmaster or to an end application <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Annex D (informative) Description of Clock Control System D.1 Introduction <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | D.2 Transfer function for control system <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | D.3 Frequency response for control system <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | D.4 Example <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | Annex Z (informative) Gaps Z.1 Gaps for Release 1: <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | Z.2 Topics for Edition 2: <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS EN IEC\/IEEE 60802. Time-sensitive networking profile for industrial automation<\/b><\/p>\n |