Already a subscriber? 

MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?

23/30471808 DC BS EN IEC/IEEE 60802. Time-sensitive networking profile for industrial automation, 2023
- 65C_1251e_CD.pdf [Go to Page]
- 65c-60802-Ed1-IS-5CD-OE.pdf [Go to Page]
- FOREWORD
- INTRODUCTION
- 1 Scope
- 2 Normative References
- 3 Terms, definitions, symbols, abbreviated terms and conventions [Go to Page]
- 3.1 General
- 3.2 List of terms, abbreviated terms and definitions given in various standards
- 3.3 Terms defined in this document
- 3.4 Abbreviated terms and acronyms
- 3.5 Conventions [Go to Page]
- 3.5.1 Principles for (sub) clause selections of referenced documents
- 3.5.2 Convention for capitalizations
- 3.5.3 Unit conventions
- 3.5.4 Conventions for YANG contents
- 4 Overview of TSN in industrial automation [Go to Page]
- 4.1 Industrial application operation
- 4.2 Industrial applications [Go to Page]
- 4.2.1 General
- 4.2.2 Control loop tasks
- 4.2.3 Start of control loop tasks
- 4.3 IA-stations
- 4.4 Ethernet interface
- 4.5 Mechanisms that can be used to meet control loop latency requirements
- 4.6 Translation between middleware and network provisioning [Go to Page]
- 4.6.1 Interfaces of type l2vlan
- 4.6.2 PTP Instances
- 4.7 Industrial traffic types [Go to Page]
- 4.7.1 General
- 4.7.2 Traffic type characteristics
- 4.7.3 Traffic type categories [Go to Page]
- 4.7.3.1 General
- 4.7.3.2 IA time-aware stream
- 4.7.3.3 IA stream
- 4.7.3.4 IA traffic engineered non-stream
- 4.7.3.5 IA non-stream
- 4.7.4 Traffic types [Go to Page]
- 4.7.4.1 General
- 4.7.4.2 Isochronous
- 4.7.4.3 Cyclic-synchronous
- 4.7.4.4 Cyclic-asynchronous
- 4.7.4.5 Alarms and events
- 4.7.4.6 Configuration and diagnostics
- 4.7.4.7 Network control
- 4.7.4.8 Best effort
- 4.7.4.9 Traffic class to traffic type mapping
- 4.8 Security for TSN-IA [Go to Page]
- 4.8.1 General
- 4.8.2 Security configuration model
- 4.8.3 NETCONF/YANG processing
- 4.8.4 NETCONF/YANG access control
- 4.8.5 Identity checking
- 4.8.6 Secure device identity [Go to Page]
- 4.8.6.1 Device Identity
- 4.8.6.2 Verifiable Device Identity
- 4.8.6.3 Verification Support Mechanisms [Go to Page]
- 4.8.6.3.1 General
- 4.8.6.3.2 Secure Transports
- 4.8.6.3.3 Secure Information
- 4.8.6.3.4 IDevID and LDevID Credentials
- 4.8.6.3.5 IDevID Items beyond IEEE Std 802.1AR
- 4.8.6.3.6 Device Identity Representation in IDevID and LDevID Credentials
- 5 Conformance [Go to Page]
- 5.1 General
- 5.2 Requirements terminology
- 5.3 Profile conformance statement (PCS)
- 5.4 Conformance classes
- 5.5 IA-station requirements [Go to Page]
- 5.5.1 IA-station PHY and MAC requirements for external ports
- 5.5.2 IA-station topology discovery requirements
- 5.5.3 IA-station requirements for time synchronization
- 5.5.4 IA-station requirements for security
- 5.5.5 IA-station requirements for management [Go to Page]
- 5.5.5.1 General
- 5.5.5.2 Network Configuration Protocol (NETCONF)
- 5.5.5.3 IA-station management YANG modules
- 5.5.6 IA-station requirements for digital data sheet
- 5.6 IA-station options [Go to Page]
- 5.6.1 IA-station PHY and MAC options for external ports
- 5.6.2 IA-station options for time synchronization
- 5.6.3 IA-station options for security
- 5.6.4 IA-station options for management
- 5.7 Bridge component requirements [Go to Page]
- 5.7.1 Common Bridge component requirements
- 5.7.2 ccA Bridge component requirements
- 5.7.3 ccB Bridge component requirements
- 5.8 Bridge component options [Go to Page]
- 5.8.1 Common Bridge component options
- 5.8.2 ccA Bridge component options
- 5.8.3 ccB Bridge component options
- 5.9 End station component requirements [Go to Page]
- 5.9.1 Common End Station Component Requirements
- 5.9.2 ccA end station component requirements
- 5.9.3 ccB end station component requirements
- 5.10 End station component options [Go to Page]
- 5.10.1 Common end station component options
- 5.10.2 ccA end station component options
- 5.10.3 ccB end station component options
- 5.11 CNC requirements
- 5.12 CNC options
- 5.13 CUC requirements
- 6 Required functions for an industrial network [Go to Page]
- 6.1 General
- 6.2 Synchronization [Go to Page]
- 6.2.1 General
- 6.2.2 PTP Instance requirements
- 6.2.3 PTP protocol requirements
- 6.2.4 Clock states
- 6.2.5 Grandmaster PTP Instance requirements
- 6.2.6 Application framework
- 6.2.7 Working Clock domain framework
- 6.2.8 Global Time domain framework
- 6.2.9 IA-station model for clocks
- 6.2.10 Clock usage for the Ethernet interface [Go to Page]
- 6.2.10.1 Time-aware offset control
- 6.2.10.2 Gating cycle
- 6.2.11 Error model
- 6.2.12 gPTP domains and PTP Instances
- 6.2.13 Split and combine cases for a PTP domain
- 6.3 Security model [Go to Page]
- 6.3.1 General
- 6.3.2 Security functionality [Go to Page]
- 6.3.2.1 Message exchange protection [Go to Page]
- 6.3.2.1.1 General
- 6.3.2.1.2 TLS profile
- 6.3.2.1.3 Certificate-to-name mapping
- 6.3.2.1.4 Role extension
- 6.3.2.2 Resource access authorization
- 6.3.3 IDevID Profile [Go to Page]
- 6.3.3.1 General
- 6.3.3.2 Object Contents [Go to Page]
- 6.3.3.2.1 General
- 6.3.3.2.2 IA-Station Identity
- 6.3.3.2.3 Signature Suites
- 6.3.3.3 Information Model [Go to Page]
- 6.3.3.3.1 General
- 6.3.3.3.2 Entries
- 6.3.3.3.3 Entry Manifoldness
- 6.3.3.3.4 Entry Naming
- 6.3.3.4 Processing Model [Go to Page]
- 6.3.3.4.1 General
- 6.3.3.4.2 Credentials [Go to Page]
- 6.3.3.4.2.1 General
- 6.3.3.4.2.2 Creation
- 6.3.3.4.2.3 Distribution
- 6.3.3.4.2.4 Use
- 6.3.3.4.2.5 Storage
- 6.3.3.4.2.6 Revocation
- 6.3.3.4.3 Trust Anchors [Go to Page]
- 6.3.3.4.3.1 General
- 6.3.3.4.3.2 Creation
- 6.3.3.4.3.3 Distribution
- 6.3.3.4.3.4 Use
- 6.3.3.4.3.5 Storage
- 6.3.3.4.3.6 Revocation
- 6.3.4 Security setup based on IDevID [Go to Page]
- 6.3.4.1 General
- 6.3.4.2 imprintTrustAnchor
- 6.3.4.3 imprintCredential [Go to Page]
- 6.3.4.3.1 General
- 6.3.4.3.2 Internal key generation
- 6.3.4.3.3 External key generation
- 6.3.4.4 imprintCertToNameMapping
- 6.3.5 Secure configuration based on LDevID-NETCONF
- 6.4 Bridge delay Requirements
- 6.5 Bridge FDB requirements
- 6.6 Bridge reporting requirements
- 6.7 Management [Go to Page]
- 6.7.1 General
- 6.7.2 IA-station management model [Go to Page]
- 6.7.2.1 General
- 6.7.2.2 IEEE 802.1Q management model
- 6.7.2.3 Internal LAN connection model
- 6.7.2.4 Spanning Tree, VLAN and TE-MSTID configuration
- 6.7.2.5 l2vlan type interfaces
- 6.7.3 Discovery of IA-station internal structure
- 6.7.4 Network engineering model
- 6.7.5 Operation [Go to Page]
- 6.7.5.1 General
- 6.7.5.2 Domain port states
- 6.7.5.3 Engineered network
- 6.7.5.4 Dynamic topology [Go to Page]
- 6.7.5.4.1 General
- 6.7.5.4.2 Adding an IA-station
- 6.7.5.4.3 Removing an IA-station
- 6.7.5.4.4 Replacing an IA-station
- 6.7.5.5 Engineered network extended by dynamic topology
- 6.7.6 Engineered time-synchronization spanning tree [Go to Page]
- 6.7.6.1 General
- 6.7.6.2 Sync tree requirements
- 6.7.6.3 STE phases [Go to Page]
- 6.7.6.3.1 General
- 6.7.6.3.2 Discovery phase
- 6.7.6.3.3 Provisioning phase
- 6.7.6.3.4 Monitoring phase [Go to Page]
- 6.7.6.3.4.1 General
- 6.7.6.3.4.2 Status monitoring
- 6.7.6.3.4.3 Performance monitoring
- 6.7.6.4 Adding an IA-station
- 6.7.6.5 Removing an IA-station
- 6.7.6.6 Replacing an IA-station
- 6.7.7 Diagnostics [Go to Page]
- 6.7.7.1 General
- 6.7.7.2 Observer model
- 6.7.7.3 Usage of YANG Push
- 6.7.7.4 Mandatory RPCs
- 6.7.7.5 Mandatory notifications
- 6.7.7.6 Mandatory diagnostics data nodes
- 6.7.7.7 Usage of NETCONF notifications
- 6.7.8 Data sheet [Go to Page]
- 6.7.8.1 General
- 6.7.8.2 Digital data sheet of an IA-station
- 6.7.8.3 Traffic requirements description
- 6.7.9 YANG representation of managed objects [Go to Page]
- 6.7.9.1 General
- 6.7.9.2 Common YANG modules, features and leaves [Go to Page]
- 6.7.9.2.1 General
- 6.7.9.2.2 IEEE standard for Ethernet
- 6.7.9.2.3 Station and media access control connectivity discovery
- 6.7.9.2.4 Synchronization [Go to Page]
- 6.7.9.2.4.1 Timesync
- 6.7.9.2.4.2 Timesync (draft ieee802-dot1as-ptp)
- 6.7.9.2.4.3 Timesync (iecieee60802)
- 6.7.9.2.5 Security configuration modules [Go to Page]
- 6.7.9.2.5.1 YANG module for a keystore
- 6.7.9.2.5.2 Network configuration access control
- 6.7.9.2.5.3 A YANG data module for a truststore
- 6.7.9.2.6 IA-station management [Go to Page]
- 6.7.9.2.6.1 System capabilities
- 6.7.9.2.6.2 YANG library
- 6.7.9.2.6.3 NETCONF extensions to support the network management datastore architecture
- 6.7.9.2.6.4 YANG push
- 6.7.9.2.6.5 YANG notification capabilities
- 6.7.9.2.6.6 YANG notifications
- 6.7.9.2.6.7 NETCONF monitoring
- 6.7.9.2.6.8 System management
- 6.7.9.2.6.9 Hardware management
- 6.7.9.2.6.10 Interface management
- 6.7.9.2.6.11 Bridge component
- 6.7.9.2.6.12 IEC/IEEE 60802 YANG module
- 6.7.9.2.6.13 NETCONF Client
- 6.7.9.2.6.14 NETCONF Server
- 6.7.9.2.7 YANG Module for TSN UNI
- 6.7.9.3 Optional YANG models, features and leaves [Go to Page]
- 6.7.9.3.1 General
- 6.7.9.3.2 Scheduled traffic
- 6.7.9.3.3 Frame preemption
- 6.7.9.3.4 Credit-based shaper
- 6.8 Topology discovery and verification [Go to Page]
- 6.8.1 Topology discovery and verification requirements
- 6.8.2 Topology discovery overview [Go to Page]
- 6.8.2.1 General
- 6.8.2.2 LLDP operational control parameters
- 6.8.2.3 LLDPDU transmission, reception, and addressing
- 6.8.2.4 LLDP TLV selection [Go to Page]
- 6.8.2.4.1 General
- 6.8.2.4.2 Chassis ID TLV
- 6.8.2.4.3 Port ID TLV
- 6.8.2.4.4 Time To Live TLV
- 6.8.2.4.5 System capabilities TLV
- 6.8.2.4.6 Management address TLV
- 6.8.2.5 LLDP remote systems data
- 6.8.3 Topology verification overview
- 6.9 CNC [Go to Page]
- 6.9.1 General
- 6.9.2 Stream destination MAC address range
- Annex A (normative) PCS proforma – Time-sensitive networking profile for industrial automation [Go to Page]
- A.1 General
- A.2 Abbreviations and special symbols [Go to Page]
- A.2.1 Status symbols
- A.2.2 General abbreviations
- A.3 Instructions for completing the PCS proforma [Go to Page]
- A.3.1 General structure of the PCS proforma
- A.3.2 Additional information
- A.3.3 Exception information
- A.3.4 Conditional status [Go to Page]
- A.3.4.1 Conditional items
- A.3.4.2 Predicates
- A.3.4.3 References to other standards
- A.3.5 Electronic datasheet
- A.4 Common requirements [Go to Page]
- A.4.1 Implementation identification
- A.4.2 Profile summary, IEC/IEEE 60802
- A.4.3 Implementation type
- Annex B (informative) Representative Configuration Domain
- Annex C (informative) Error model [Go to Page]
- C.1 General
- C.2 Time error components due to relaying of time
- C.3 Time error components due to providing time to the Grandmaster or to an end application
- Annex D (informative) Description of Clock Control System [Go to Page]
- D.1 Introduction
- D.2 Transfer function for control system
- D.3 Frequency response for control system
- D.4 Example
- Annex Z (informative) Gaps [Go to Page]
- Z.1 Gaps for Release 1:
- Z.2 Topics for Edition 2:
- Bibliography [Go to Page]