{"id":426650,"date":"2024-10-20T07:03:04","date_gmt":"2024-10-20T07:03:04","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30471808-dc\/"},"modified":"2024-10-26T13:20:10","modified_gmt":"2024-10-26T13:20:10","slug":"bsi-23-30471808-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30471808-dc\/","title":{"rendered":"BSI 23\/30471808 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
9<\/td>\nFOREWORD <\/td>\n<\/tr>\n
11<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
12<\/td>\n1 Scope
2 Normative References <\/td>\n<\/tr>\n
15<\/td>\n3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 General
3.2 List of terms, abbreviated terms and definitions given in various standards <\/td>\n<\/tr>\n
17<\/td>\n3.3 Terms defined in this document <\/td>\n<\/tr>\n
19<\/td>\n3.4 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
22<\/td>\n3.5 Conventions
3.5.1 Principles for (sub) clause selections of referenced documents
3.5.2 Convention for capitalizations
3.5.3 Unit conventions
3.5.4 Conventions for YANG contents <\/td>\n<\/tr>\n
23<\/td>\n4 Overview of TSN in industrial automation
4.1 Industrial application operation <\/td>\n<\/tr>\n
24<\/td>\n4.2 Industrial applications
4.2.1 General <\/td>\n<\/tr>\n
26<\/td>\n4.2.2 Control loop tasks <\/td>\n<\/tr>\n
27<\/td>\n4.2.3 Start of control loop tasks
4.3 IA-stations
4.4 Ethernet interface <\/td>\n<\/tr>\n
28<\/td>\n4.5 Mechanisms that can be used to meet control loop latency requirements <\/td>\n<\/tr>\n
29<\/td>\n4.6 Translation between middleware and network provisioning
4.6.1 Interfaces of type l2vlan <\/td>\n<\/tr>\n
30<\/td>\n4.6.2 PTP Instances <\/td>\n<\/tr>\n
32<\/td>\n4.7 Industrial traffic types
4.7.1 General
4.7.2 Traffic type characteristics
4.7.3 Traffic type categories
4.7.3.1 General
4.7.3.2 IA time-aware stream <\/td>\n<\/tr>\n
33<\/td>\n4.7.3.3 IA stream
4.7.3.4 IA traffic engineered non-stream
4.7.3.5 IA non-stream
4.7.4 Traffic types
4.7.4.1 General <\/td>\n<\/tr>\n
34<\/td>\n4.7.4.2 Isochronous
4.7.4.3 Cyclic-synchronous
4.7.4.4 Cyclic-asynchronous
4.7.4.5 Alarms and events
4.7.4.6 Configuration and diagnostics <\/td>\n<\/tr>\n
35<\/td>\n4.7.4.7 Network control
4.7.4.8 Best effort
4.7.4.9 Traffic class to traffic type mapping
4.8 Security for TSN-IA
4.8.1 General
4.8.2 Security configuration model <\/td>\n<\/tr>\n
36<\/td>\n4.8.3 NETCONF\/YANG processing <\/td>\n<\/tr>\n
37<\/td>\n4.8.4 NETCONF\/YANG access control <\/td>\n<\/tr>\n
38<\/td>\n4.8.5 Identity checking <\/td>\n<\/tr>\n
39<\/td>\n4.8.6 Secure device identity
4.8.6.1 Device Identity
4.8.6.2 Verifiable Device Identity
4.8.6.3 Verification Support Mechanisms
4.8.6.3.1 General
4.8.6.3.2 Secure Transports
4.8.6.3.3 Secure Information <\/td>\n<\/tr>\n
40<\/td>\n4.8.6.3.4 IDevID and LDevID Credentials
4.8.6.3.5 IDevID Items beyond IEEE Std 802.1AR <\/td>\n<\/tr>\n
41<\/td>\n4.8.6.3.6 Device Identity Representation in IDevID and LDevID Credentials
5 Conformance
5.1 General
5.2 Requirements terminology <\/td>\n<\/tr>\n
42<\/td>\n5.3 Profile conformance statement (PCS)
5.4 Conformance classes
5.5 IA-station requirements
5.5.1 IA-station PHY and MAC requirements for external ports <\/td>\n<\/tr>\n
43<\/td>\n5.5.2 IA-station topology discovery requirements
5.5.3 IA-station requirements for time synchronization <\/td>\n<\/tr>\n
44<\/td>\n5.5.4 IA-station requirements for security
5.5.5 IA-station requirements for management
5.5.5.1 General
5.5.5.2 Network Configuration Protocol (NETCONF) <\/td>\n<\/tr>\n
45<\/td>\n5.5.5.3 IA-station management YANG modules
5.5.6 IA-station requirements for digital data sheet
5.6 IA-station options
5.6.1 IA-station PHY and MAC options for external ports <\/td>\n<\/tr>\n
46<\/td>\n5.6.2 IA-station options for time synchronization
5.6.3 IA-station options for security
5.6.4 IA-station options for management <\/td>\n<\/tr>\n
47<\/td>\n5.7 Bridge component requirements
5.7.1 Common Bridge component requirements
5.7.2 ccA Bridge component requirements <\/td>\n<\/tr>\n
48<\/td>\n5.7.3 ccB Bridge component requirements
5.8 Bridge component options
5.8.1 Common Bridge component options
5.8.2 ccA Bridge component options <\/td>\n<\/tr>\n
49<\/td>\n5.8.3 ccB Bridge component options
5.9 End station component requirements
5.9.1 Common End Station Component Requirements <\/td>\n<\/tr>\n
50<\/td>\n5.9.2 ccA end station component requirements
5.9.3 ccB end station component requirements
5.10 End station component options
5.10.1 Common end station component options <\/td>\n<\/tr>\n
51<\/td>\n5.10.2 ccA end station component options
5.10.3 ccB end station component options
5.11 CNC requirements <\/td>\n<\/tr>\n
52<\/td>\n5.12 CNC options
5.13 CUC requirements
6 Required functions for an industrial network
6.1 General
6.2 Synchronization
6.2.1 General
6.2.2 PTP Instance requirements <\/td>\n<\/tr>\n
53<\/td>\n6.2.3 PTP protocol requirements <\/td>\n<\/tr>\n
56<\/td>\n6.2.4 Clock states <\/td>\n<\/tr>\n
57<\/td>\n6.2.5 Grandmaster PTP Instance requirements
6.2.6 Application framework <\/td>\n<\/tr>\n
58<\/td>\n6.2.7 Working Clock domain framework <\/td>\n<\/tr>\n
59<\/td>\n6.2.8 Global Time domain framework
6.2.9 IA-station model for clocks <\/td>\n<\/tr>\n
61<\/td>\n6.2.10 Clock usage for the Ethernet interface
6.2.10.1 Time-aware offset control
6.2.10.2 Gating cycle <\/td>\n<\/tr>\n
62<\/td>\n6.2.11 Error model <\/td>\n<\/tr>\n
63<\/td>\n6.2.12 gPTP domains and PTP Instances
6.2.13 Split and combine cases for a PTP domain <\/td>\n<\/tr>\n
65<\/td>\n6.3 Security model
6.3.1 General <\/td>\n<\/tr>\n
66<\/td>\n6.3.2 Security functionality
6.3.2.1 Message exchange protection
6.3.2.1.1 General
6.3.2.1.2 TLS profile
6.3.2.1.3 Certificate-to-name mapping <\/td>\n<\/tr>\n
67<\/td>\n6.3.2.1.4 Role extension
6.3.2.2 Resource access authorization <\/td>\n<\/tr>\n
68<\/td>\n6.3.3 IDevID Profile
6.3.3.1 General
6.3.3.2 Object Contents
6.3.3.2.1 General
6.3.3.2.2 IA-Station Identity <\/td>\n<\/tr>\n
69<\/td>\n6.3.3.2.3 Signature Suites
6.3.3.3 Information Model
6.3.3.3.1 General
6.3.3.3.2 Entries
6.3.3.3.3 Entry Manifoldness <\/td>\n<\/tr>\n
70<\/td>\n6.3.3.3.4 Entry Naming
6.3.3.4 Processing Model
6.3.3.4.1 General
6.3.3.4.2 Credentials
6.3.3.4.2.1 General
6.3.3.4.2.2 Creation
6.3.3.4.2.3 Distribution
6.3.3.4.2.4 Use <\/td>\n<\/tr>\n
71<\/td>\n6.3.3.4.2.5 Storage
6.3.3.4.2.6 Revocation
6.3.3.4.3 Trust Anchors
6.3.3.4.3.1 General <\/td>\n<\/tr>\n
72<\/td>\n6.3.3.4.3.2 Creation
6.3.3.4.3.3 Distribution
6.3.3.4.3.4 Use
6.3.3.4.3.5 Storage
6.3.3.4.3.6 Revocation
6.3.4 Security setup based on IDevID
6.3.4.1 General
6.3.4.2 imprintTrustAnchor <\/td>\n<\/tr>\n
74<\/td>\n6.3.4.3 imprintCredential
6.3.4.3.1 General
6.3.4.3.2 Internal key generation <\/td>\n<\/tr>\n
75<\/td>\n6.3.4.3.3 External key generation
6.3.4.4 imprintCertToNameMapping <\/td>\n<\/tr>\n
76<\/td>\n6.3.5 Secure configuration based on LDevID-NETCONF
6.4 Bridge delay Requirements
6.5 Bridge FDB requirements <\/td>\n<\/tr>\n
77<\/td>\n6.6 Bridge reporting requirements
6.7 Management
6.7.1 General
6.7.2 IA-station management model
6.7.2.1 General
6.7.2.2 IEEE 802.1Q management model <\/td>\n<\/tr>\n
78<\/td>\n6.7.2.3 Internal LAN connection model <\/td>\n<\/tr>\n
79<\/td>\n6.7.2.4 Spanning Tree, VLAN and TE-MSTID configuration <\/td>\n<\/tr>\n
81<\/td>\n6.7.2.5 l2vlan type interfaces <\/td>\n<\/tr>\n
82<\/td>\n6.7.3 Discovery of IA-station internal structure
6.7.4 Network engineering model <\/td>\n<\/tr>\n
86<\/td>\n6.7.5 Operation
6.7.5.1 General <\/td>\n<\/tr>\n
88<\/td>\n6.7.5.2 Domain port states <\/td>\n<\/tr>\n
90<\/td>\n6.7.5.3 Engineered network <\/td>\n<\/tr>\n
91<\/td>\n6.7.5.4 Dynamic topology
6.7.5.4.1 General
6.7.5.4.2 Adding an IA-station
6.7.5.4.3 Removing an IA-station <\/td>\n<\/tr>\n
92<\/td>\n6.7.5.4.4 Replacing an IA-station
6.7.5.5 Engineered network extended by dynamic topology
6.7.6 Engineered time-synchronization spanning tree
6.7.6.1 General
6.7.6.2 Sync tree requirements
6.7.6.3 STE phases
6.7.6.3.1 General
6.7.6.3.2 Discovery phase <\/td>\n<\/tr>\n
93<\/td>\n6.7.6.3.3 Provisioning phase
6.7.6.3.4 Monitoring phase
6.7.6.3.4.1 General
6.7.6.3.4.2 Status monitoring
6.7.6.3.4.3 Performance monitoring <\/td>\n<\/tr>\n
94<\/td>\n6.7.6.4 Adding an IA-station
6.7.6.5 Removing an IA-station
6.7.6.6 Replacing an IA-station
6.7.7 Diagnostics
6.7.7.1 General <\/td>\n<\/tr>\n
95<\/td>\n6.7.7.2 Observer model
6.7.7.3 Usage of YANG Push <\/td>\n<\/tr>\n
96<\/td>\n6.7.7.4 Mandatory RPCs
6.7.7.5 Mandatory notifications
6.7.7.6 Mandatory diagnostics data nodes
6.7.7.7 Usage of NETCONF notifications
6.7.8 Data sheet
6.7.8.1 General <\/td>\n<\/tr>\n
97<\/td>\n6.7.8.2 Digital data sheet of an IA-station <\/td>\n<\/tr>\n
98<\/td>\n6.7.8.3 Traffic requirements description
6.7.9 YANG representation of managed objects
6.7.9.1 General
6.7.9.2 Common YANG modules, features and leaves
6.7.9.2.1 General
6.7.9.2.2 IEEE standard for Ethernet <\/td>\n<\/tr>\n
99<\/td>\n6.7.9.2.3 Station and media access control connectivity discovery <\/td>\n<\/tr>\n
100<\/td>\n6.7.9.2.4 Synchronization
6.7.9.2.4.1 Timesync <\/td>\n<\/tr>\n
101<\/td>\n6.7.9.2.4.2 Timesync (draft ieee802-dot1as-ptp) <\/td>\n<\/tr>\n
102<\/td>\n6.7.9.2.4.3 Timesync (iecieee60802)
6.7.9.2.5 Security configuration modules
6.7.9.2.5.1 YANG module for a keystore <\/td>\n<\/tr>\n
103<\/td>\n6.7.9.2.5.2 Network configuration access control
6.7.9.2.5.3 A YANG data module for a truststore
6.7.9.2.6 IA-station management
6.7.9.2.6.1 System capabilities <\/td>\n<\/tr>\n
104<\/td>\n6.7.9.2.6.2 YANG library
6.7.9.2.6.3 NETCONF extensions to support the network management datastore architecture
6.7.9.2.6.4 YANG push
6.7.9.2.6.5 YANG notification capabilities
6.7.9.2.6.6 YANG notifications <\/td>\n<\/tr>\n
105<\/td>\n6.7.9.2.6.7 NETCONF monitoring
6.7.9.2.6.8 System management
6.7.9.2.6.9 Hardware management <\/td>\n<\/tr>\n
106<\/td>\n6.7.9.2.6.10 Interface management
6.7.9.2.6.11 Bridge component <\/td>\n<\/tr>\n
108<\/td>\n6.7.9.2.6.12 IEC\/IEEE 60802 YANG module <\/td>\n<\/tr>\n
109<\/td>\n6.7.9.2.6.13 NETCONF Client
6.7.9.2.6.14 NETCONF Server
6.7.9.2.7 YANG Module for TSN UNI <\/td>\n<\/tr>\n
110<\/td>\n6.7.9.3 Optional YANG models, features and leaves
6.7.9.3.1 General
6.7.9.3.2 Scheduled traffic <\/td>\n<\/tr>\n
111<\/td>\n6.7.9.3.3 Frame preemption
6.7.9.3.4 Credit-based shaper
6.8 Topology discovery and verification
6.8.1 Topology discovery and verification requirements <\/td>\n<\/tr>\n
112<\/td>\n6.8.2 Topology discovery overview
6.8.2.1 General
6.8.2.2 LLDP operational control parameters <\/td>\n<\/tr>\n
113<\/td>\n6.8.2.3 LLDPDU transmission, reception, and addressing
6.8.2.4 LLDP TLV selection
6.8.2.4.1 General
6.8.2.4.2 Chassis ID TLV
6.8.2.4.3 Port ID TLV
6.8.2.4.4 Time To Live TLV <\/td>\n<\/tr>\n
114<\/td>\n6.8.2.4.5 System capabilities TLV
6.8.2.4.6 Management address TLV
6.8.2.5 LLDP remote systems data
6.8.3 Topology verification overview
6.9 CNC
6.9.1 General
6.9.2 Stream destination MAC address range <\/td>\n<\/tr>\n
116<\/td>\nAnnex A (normative) PCS proforma \u2013 Time-sensitive networking profile for industrial automation
A.1 General
A.2 Abbreviations and special symbols
A.2.1 Status symbols
A.2.2 General abbreviations <\/td>\n<\/tr>\n
117<\/td>\nA.3 Instructions for completing the PCS proforma
A.3.1 General structure of the PCS proforma
A.3.2 Additional information
A.3.3 Exception information <\/td>\n<\/tr>\n
118<\/td>\nA.3.4 Conditional status
A.3.4.1 Conditional items
A.3.4.2 Predicates
A.3.4.3 References to other standards
A.3.5 Electronic datasheet <\/td>\n<\/tr>\n
119<\/td>\nA.4 Common requirements
A.4.1 Implementation identification
A.4.2 Profile summary, IEC\/IEEE 60802
A.4.3 Implementation type <\/td>\n<\/tr>\n
120<\/td>\nAnnex B (informative) Representative Configuration Domain <\/td>\n<\/tr>\n
121<\/td>\nAnnex C (informative) Error model
C.1 General
C.2 Time error components due to relaying of time <\/td>\n<\/tr>\n
122<\/td>\nC.3 Time error components due to providing time to the Grandmaster or to an end application <\/td>\n<\/tr>\n
123<\/td>\nAnnex D (informative) Description of Clock Control System
D.1 Introduction <\/td>\n<\/tr>\n
124<\/td>\nD.2 Transfer function for control system <\/td>\n<\/tr>\n
125<\/td>\nD.3 Frequency response for control system <\/td>\n<\/tr>\n
130<\/td>\nD.4 Example <\/td>\n<\/tr>\n
132<\/td>\nAnnex Z (informative) Gaps
Z.1 Gaps for Release 1: <\/td>\n<\/tr>\n
133<\/td>\nZ.2 Topics for Edition 2: <\/td>\n<\/tr>\n
134<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS EN IEC\/IEEE 60802. Time-sensitive networking profile for industrial automation<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n134<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":426657,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-426650","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/426650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/426657"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=426650"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=426650"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=426650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}