{"id":243896,"date":"2024-10-19T16:00:49","date_gmt":"2024-10-19T16:00:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62541-62011\/"},"modified":"2024-10-25T10:58:30","modified_gmt":"2024-10-25T10:58:30","slug":"bs-en-62541-62011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62541-62011\/","title":{"rendered":"BS EN 62541-6:2011"},"content":{"rendered":"

This part of IEC 62541 specifies the OPC Unified Architecture (OPC UA) mapping between the security model described in IEC 62541-2, the abstract service definitions, described in IEC 62541-4, the data structures defined in IEC 62541-5 and the physical network protocols that can be used to implement the OPC UA specification.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
11<\/td>\nFOREWORD <\/td>\n<\/tr>\n
13<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
14<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
16<\/td>\n3 Terms, definitions and abbreviations
3.1 Terms and definitions <\/td>\n<\/tr>\n
17<\/td>\n3.2 Abbreviations
4 Overview <\/td>\n<\/tr>\n
18<\/td>\n5 Data Encoding
5.1 General
Figures
Figure 1 \u2013 The OPC UA Stack Overview <\/td>\n<\/tr>\n
19<\/td>\nTables
Table 1 \u2013 Built-in data types
Table 2 \u2013 Guid Structure <\/td>\n<\/tr>\n
20<\/td>\n5.2 OPC UA Binary <\/td>\n<\/tr>\n
21<\/td>\nFigure 2 \u2013 Encoding Integers in a Binary Stream
Table 3 \u2013 Supported Floating Point Types <\/td>\n<\/tr>\n
22<\/td>\nFigure 3 \u2013 Encoding Floating Points in a Binary Stream
Figure 4 \u2013 Encoding Strings in a Binary Stream <\/td>\n<\/tr>\n
23<\/td>\nFigure 5 \u2013 Encoding Guids in a Binary Stream
Figure 6 \u2013 Encoding XmlElements in a Binary Stream <\/td>\n<\/tr>\n
24<\/td>\nFigure 7 \u2013 A String NodeId
Table 4 \u2013 NodeId Components
Table 5 \u2013 NodeId Encoding Values
Table 6 \u2013 Standard NodeId Binary Encoding <\/td>\n<\/tr>\n
25<\/td>\nFigure 8 \u2013 A Two Byte NodeId
Figure 9 \u2013 A Four Byte NodeId
Table 7 \u2013 Two Byte NodeId Binary Encoding
Table 8 \u2013 Four Byte NodeId Binary Encoding <\/td>\n<\/tr>\n
26<\/td>\nTable 9 \u2013 ExpandedNodeId Binary Encoding
Table 10 \u2013 DiagnosticInfo Binary Encoding <\/td>\n<\/tr>\n
27<\/td>\nTable 11 \u2013 QualifiedName Binary Encoding
Table 12 \u2013 LocalizedText Binary Encoding <\/td>\n<\/tr>\n
28<\/td>\nTable 13 \u2013 Extension Object Binary Encoding
Table 14 \u2013 Variant Binary Encoding <\/td>\n<\/tr>\n
29<\/td>\nTable 15 \u2013 Data Value Binary Encoding <\/td>\n<\/tr>\n
30<\/td>\nTable 16 \u2013 Sample OPC UA Binary Encoded Structure <\/td>\n<\/tr>\n
31<\/td>\n5.3 XML
Table 17 \u2013 XML Data Type Mappings for Integers
Table 18 \u2013 XML Data Type Mappings for Floating Points <\/td>\n<\/tr>\n
33<\/td>\nTable 19 \u2013 Components of NodeId
Table 20 \u2013 Components of ExpandedNodeId <\/td>\n<\/tr>\n
36<\/td>\nTable 21 \u2013 Components of Enumeration <\/td>\n<\/tr>\n
38<\/td>\n6 Security Protocols
6.1 Security Handshake
Figure 10 \u2013\u00a0Security Handshake <\/td>\n<\/tr>\n
39<\/td>\n6.2 Certificates
Table 22 \u2013 SecurityPolicy <\/td>\n<\/tr>\n
40<\/td>\nTable 23 \u2013 ApplicationInstanceCertificate <\/td>\n<\/tr>\n
41<\/td>\n6.3 WS Secure Conversation
Table 24 \u2013 SignedSoftwareCertificate <\/td>\n<\/tr>\n
42<\/td>\nFigure 11 \u2013 Relevant XML Web Services Specifications
Figure 12 \u2013 The WS Secure Conversation Handshake <\/td>\n<\/tr>\n
43<\/td>\nTable 25 \u2013 WS-* Namespace Prefixes <\/td>\n<\/tr>\n
44<\/td>\nTable 26 \u2013 RST\/SCT Mapping to an OpenSecureChannel Request <\/td>\n<\/tr>\n
45<\/td>\nTable 27 \u2013 RSTR\/SCT Mapping to an OpenSecureChannel Response <\/td>\n<\/tr>\n
46<\/td>\n6.4 OPC UA Secure Conversation
Figure 13 \u2013 OPC UA Secure Conversation MessageChunk <\/td>\n<\/tr>\n
47<\/td>\nTable 28 \u2013 OPC UA Secure Conversation Message Header
Table 29 \u2013 Asymmetric Algorithm Security Header <\/td>\n<\/tr>\n
48<\/td>\nTable 30 \u2013 Symmetric Algorithm Security Header
Table 31 \u2013 Sequence Header <\/td>\n<\/tr>\n
49<\/td>\nTable 32 \u2013 OPC UA Secure Conversation Message Footer <\/td>\n<\/tr>\n
50<\/td>\nTable 33 \u2013 OPC UA Secure Conversation Message Abort Body
Table 34 \u2013 OPC UA Secure Conversation OpenSecureChannel Service <\/td>\n<\/tr>\n
51<\/td>\nTable 35 \u2013 Cryptography Key Generation Parameters <\/td>\n<\/tr>\n
53<\/td>\n7 Transport Protocols
7.1 OPC UA TCP
Table 36 \u2013 OPC UA TCP Message Header <\/td>\n<\/tr>\n
54<\/td>\nTable 37 \u2013 OPC UA TCP Hello Message
Table 38 \u2013 OPC UA TCP Acknowledge Message <\/td>\n<\/tr>\n
55<\/td>\nFigure 14 \u2013 OPC UA TCP Message Structure
Table 39 \u2013 OPC UA TCP Error Message <\/td>\n<\/tr>\n
56<\/td>\nFigure\u00a015 \u2013 Establishing a OPC UA TCP Connection
Figure 16 \u2013 Closing a OPC UA TCP Connection <\/td>\n<\/tr>\n
57<\/td>\nTable 40 \u2013 OPC UA TCP Error Codes <\/td>\n<\/tr>\n
58<\/td>\nFigure\u00a017 \u2013 Recovering an OPC UA TCP Connection <\/td>\n<\/tr>\n
59<\/td>\n7.2 SOAP\/HTTP
Table 41 \u2013 WS-Addressing Headers <\/td>\n<\/tr>\n
61<\/td>\n7.3 Well Known Addresses
8 Normative Contracts
8.1 OPC Binary Schema
8.2 XML Schema and WSDL
Table 42 \u2013 Well Known Addresses for Local Discovery Servers <\/td>\n<\/tr>\n
62<\/td>\nAnnex A (normative) Constants
Table A.1 \u2013 Identifiers Assigned to Attributes <\/td>\n<\/tr>\n
64<\/td>\nAnnex B (normative) Type Declarations for the OPC UA Native Mapping <\/td>\n<\/tr>\n
65<\/td>\nAnnex C (normative) WSDL for the XML Mapping <\/td>\n<\/tr>\n
66<\/td>\nAnnex D (normative) Security Settings Management <\/td>\n<\/tr>\n
67<\/td>\nTable D.1 \u2013 SecuredApplication <\/td>\n<\/tr>\n
69<\/td>\nTable D.2 \u2013 CertificateIdentfier <\/td>\n<\/tr>\n
70<\/td>\nTable D.3 \u2013 CertificateStoreIdentfier <\/td>\n<\/tr>\n
71<\/td>\nTable D.4 \u2013 CertificateTrustList
Table D.5 \u2013 CertificateValidationOptions <\/td>\n<\/tr>\n
72<\/td>\nTable D.6 \u2013 ApplicationAccessRule
Table D.7 \u2013 ApplicationSecurityPolicy <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

OPC unified architecture – Mappings<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2012<\/td>\n74<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":243901,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[668,2641],"product_tag":[],"class_list":{"0":"post-243896","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-05","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/243896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/243901"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=243896"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=243896"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=243896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}