{"id":243896,"date":"2024-10-19T16:00:49","date_gmt":"2024-10-19T16:00:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62541-62011\/"},"modified":"2024-10-25T10:58:30","modified_gmt":"2024-10-25T10:58:30","slug":"bs-en-62541-62011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62541-62011\/","title":{"rendered":"BS EN 62541-6:2011"},"content":{"rendered":"
This part of IEC 62541 specifies the OPC Unified Architecture (OPC UA) mapping between the security model described in IEC 62541-2, the abstract service definitions, described in IEC 62541-4, the data structures defined in IEC 62541-5 and the physical network protocols that can be used to implement the OPC UA specification.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3 Terms, definitions and abbreviations 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.2 Abbreviations 4 Overview <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Data Encoding 5.1 General Figures Figure 1 \u2013 The OPC UA Stack Overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Tables Table 1 \u2013 Built-in data types Table 2 \u2013 Guid Structure <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2 OPC UA Binary <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Figure 2 \u2013 Encoding Integers in a Binary Stream Table 3 \u2013 Supported Floating Point Types <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Figure 3 \u2013 Encoding Floating Points in a Binary Stream Figure 4 \u2013 Encoding Strings in a Binary Stream <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure 5 \u2013 Encoding Guids in a Binary Stream Figure 6 \u2013 Encoding XmlElements in a Binary Stream <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Figure 7 \u2013 A String NodeId Table 4 \u2013 NodeId Components Table 5 \u2013 NodeId Encoding Values Table 6 \u2013 Standard NodeId Binary Encoding <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Figure 8 \u2013 A Two Byte NodeId Figure 9 \u2013 A Four Byte NodeId Table 7 \u2013 Two Byte NodeId Binary Encoding Table 8 \u2013 Four Byte NodeId Binary Encoding <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Table 9 \u2013 ExpandedNodeId Binary Encoding Table 10 \u2013 DiagnosticInfo Binary Encoding <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Table 11 \u2013 QualifiedName Binary Encoding Table 12 \u2013 LocalizedText Binary Encoding <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Table 13 \u2013 Extension Object Binary Encoding Table 14 \u2013 Variant Binary Encoding <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table 15 \u2013 Data Value Binary Encoding <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Table 16 \u2013 Sample OPC UA Binary Encoded Structure <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.3 XML Table 17 \u2013 XML Data Type Mappings for Integers Table 18 \u2013 XML Data Type Mappings for Floating Points <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Table 19 \u2013 Components of NodeId Table 20 \u2013 Components of ExpandedNodeId <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Table 21 \u2013 Components of Enumeration <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6 Security Protocols 6.1 Security Handshake Figure 10 \u2013\u00a0Security Handshake <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.2 Certificates Table 22 \u2013 SecurityPolicy <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Table 23 \u2013 ApplicationInstanceCertificate <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.3 WS Secure Conversation Table 24 \u2013 SignedSoftwareCertificate <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Figure 11 \u2013 Relevant XML Web Services Specifications Figure 12 \u2013 The WS Secure Conversation Handshake <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Table 25 \u2013 WS-* Namespace Prefixes <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Table 26 \u2013 RST\/SCT Mapping to an OpenSecureChannel Request <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Table 27 \u2013 RSTR\/SCT Mapping to an OpenSecureChannel Response <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.4 OPC UA Secure Conversation Figure 13 \u2013 OPC UA Secure Conversation MessageChunk <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Table 28 \u2013 OPC UA Secure Conversation Message Header Table 29 \u2013 Asymmetric Algorithm Security Header <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Table 30 \u2013 Symmetric Algorithm Security Header Table 31 \u2013 Sequence Header <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Table 32 \u2013 OPC UA Secure Conversation Message Footer <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Table 33 \u2013 OPC UA Secure Conversation Message Abort Body Table 34 \u2013 OPC UA Secure Conversation OpenSecureChannel Service <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Table 35 \u2013 Cryptography Key Generation Parameters <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 7 Transport Protocols 7.1 OPC UA TCP Table 36 \u2013 OPC UA TCP Message Header <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Table 37 \u2013 OPC UA TCP Hello Message Table 38 \u2013 OPC UA TCP Acknowledge Message <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Figure 14 \u2013 OPC UA TCP Message Structure Table 39 \u2013 OPC UA TCP Error Message <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Figure\u00a015 \u2013 Establishing a OPC UA TCP Connection Figure 16 \u2013 Closing a OPC UA TCP Connection <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Table 40 \u2013 OPC UA TCP Error Codes <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Figure\u00a017 \u2013 Recovering an OPC UA TCP Connection <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.2 SOAP\/HTTP Table 41 \u2013 WS-Addressing Headers <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.3 Well Known Addresses 8 Normative Contracts 8.1 OPC Binary Schema 8.2 XML Schema and WSDL Table 42 \u2013 Well Known Addresses for Local Discovery Servers <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Annex A (normative) Constants Table A.1 \u2013 Identifiers Assigned to Attributes <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Annex B (normative) Type Declarations for the OPC UA Native Mapping <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex C (normative) WSDL for the XML Mapping <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Annex D (normative) Security Settings Management <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Table D.1 \u2013 SecuredApplication <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Table D.2 \u2013 CertificateIdentfier <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Table D.3 \u2013 CertificateStoreIdentfier <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Table D.4 \u2013 CertificateTrustList Table D.5 \u2013 CertificateValidationOptions <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Table D.6 \u2013 ApplicationAccessRule Table D.7 \u2013 ApplicationSecurityPolicy <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" OPC unified architecture – Mappings<\/b><\/p>\n |