{"id":272978,"date":"2024-10-19T18:19:35","date_gmt":"2024-10-19T18:19:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-14908-12014\/"},"modified":"2024-10-25T14:40:12","modified_gmt":"2024-10-25T14:40:12","slug":"bs-en-14908-12014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-14908-12014\/","title":{"rendered":"BS EN 14908-1:2014"},"content":{"rendered":"

This European Standard applies to a communication protocol for networked control systems in commercial Building Automation, Controls and Building Management. The protocol provides peer-topeer communication for networked control and is suitable for implementing both peer-to-peer and master-slave control strategies. This specification describes services in layers 2 to 7. In the layer 2 (data link layer) specification, it also describes the MAC sub-layer interface to the physical layer. The physical layer provides a choice of transmission media. The interface described in this specification supports multiple transmission media at the physical layer. In the layer 7 specification, it includes a description of the types of messages used by applications to exchange application and network management data.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nContents <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
11<\/td>\n4 Symbols and abbreviations
4.1 Symbols and graphical representations <\/td>\n<\/tr>\n
12<\/td>\nFigure 1 \u2014 Network topology & symbols
Figure 2 \u2014 Protocol terminology
4.2 Abbreviations <\/td>\n<\/tr>\n
13<\/td>\n5 Overview of protocol layering <\/td>\n<\/tr>\n
14<\/td>\nFigure 3 \u2014 Protocol layering <\/td>\n<\/tr>\n
15<\/td>\n6 MAC sublayer
6.1 General
6.2 Service provided
6.3 Interface to the link layer <\/td>\n<\/tr>\n
16<\/td>\nFigure 4 \u2014 Interface between the MAC and the link layers
6.4 Interface to the physical layer <\/td>\n<\/tr>\n
17<\/td>\n6.5 MPDU format
Figure 5 \u2014 MPDU\/LPDU format
6.6 Predictive p-persistent CSMA \u2014 overview description <\/td>\n<\/tr>\n
18<\/td>\nFigure 6 \u2014 Predictive p-persistent CSMA concepts and parameters
6.7 Idle channel detection <\/td>\n<\/tr>\n
19<\/td>\n6.8 Randomising
6.9 Backlog estimation <\/td>\n<\/tr>\n
20<\/td>\n6.10 Optional priority
Figure 7 \u2014 Allocation of priority slots within the Busy Channel Packet Cycle <\/td>\n<\/tr>\n
21<\/td>\n6.11 Optional collision detection <\/td>\n<\/tr>\n
22<\/td>\n6.12 Beta1, Beta2 and Preamble Timings <\/td>\n<\/tr>\n
24<\/td>\n7 Link layer
7.1 Assumptions
7.2 Service provided
7.3 CRC <\/td>\n<\/tr>\n
25<\/td>\nFigure 8 \u2014 CRC register state behaviour example
7.4 Transmit algorithm
7.5 Receive Algorithm
8 Network layer
8.1 Assumptions <\/td>\n<\/tr>\n
26<\/td>\nFigure 9 \u2014 Single channel topologies <\/td>\n<\/tr>\n
27<\/td>\nFigure 10 \u2014 Typical tree-like domain topology
8.2 Service provided
8.3 Service interface <\/td>\n<\/tr>\n
28<\/td>\nFigure 11 \u2014 Network service interface
8.4 Internal structuring of the network layer
Figure 12 \u2014 Network layer\u2014internal structure
8.5 NPDU format
Figure 13 \u2014 NPDU format <\/td>\n<\/tr>\n
29<\/td>\n8.6 Address recognition
8.7 Routers <\/td>\n<\/tr>\n
30<\/td>\n8.8 Routing algorithm
8.9 Learning algorithm \u2014 subnets
9 Transaction control sublayer
9.1 Assumptions <\/td>\n<\/tr>\n
31<\/td>\n9.2 Service provided
9.3 Service interface
Figure 14 \u2014 Transaction control service interface <\/td>\n<\/tr>\n
32<\/td>\n9.4 State variables
9.5 Transaction control algorithm <\/td>\n<\/tr>\n
33<\/td>\n10 Transport layer
10.1 Assumptions
10.2 Service provided
10.3 Service interface
Figure 15 \u2014 Transport interface to upper layers <\/td>\n<\/tr>\n
34<\/td>\n10.4 TPDU types and formats
Figure 16 \u2014 TPDU types and formats <\/td>\n<\/tr>\n
35<\/td>\n10.5 Protocol diagram <\/td>\n<\/tr>\n
36<\/td>\nFigure 17 \u2014 Transport protocol diagram for multicast message with a loss of both the message and the ACK TPDUs
10.6 Transport protocol state variables
10.7 Send algorithm
Figure 18 \u2014 Transport protocol\u2014Send FSM
10.8 Receive algorithm
Figure 19 \u2014 Transport protocol\u2014Receive FSM
10.9 Receive transaction record pool size and configuration engineering
10.9.1 General <\/td>\n<\/tr>\n
37<\/td>\n10.9.2 Number of retries <\/td>\n<\/tr>\n
38<\/td>\nFigure 20 \u2014 Probability of transaction completion in k Retries
10.9.3 Transport layer timers <\/td>\n<\/tr>\n
39<\/td>\nFigure 21 \u2014 Methodology for calculating timer values
11 Session layer
11.1 Assumptions
11.2 Service Provided <\/td>\n<\/tr>\n
40<\/td>\n11.3 Service interface
Figure 22 \u2014 Session layer interface to application layer
11.4 Internal structure of the session layer
Figure 23 \u2014 Session layer\u2014internal structuring <\/td>\n<\/tr>\n
41<\/td>\n11.5 SPDU types and formats
Figure 24 \u2014 SPDU types and formats <\/td>\n<\/tr>\n
42<\/td>\n11.6 Protocol timing diagrams <\/td>\n<\/tr>\n
43<\/td>\nFigure 25 \u2014 Non-Idempotent request with multiple SPDU losses <\/td>\n<\/tr>\n
44<\/td>\nFigure 26 \u2014 Secure idempotent request with multiple SPDU losses <\/td>\n<\/tr>\n
45<\/td>\n11.7 Request-response state variables
11.8 Request-response protocol \u2014 client part
Figure 27 \u2014 Request-response protocol\u2014client FSM
11.9 Request-response protocol \u2014 server part
Figure 28 \u2014 Request-response protocol\u2014simplified server FSM <\/td>\n<\/tr>\n
46<\/td>\n11.10 Request-response protocol timers
11.11 Authentication protocol
11.12 Encryption algorithm
11.13 Retries and the role of the checksum function <\/td>\n<\/tr>\n
47<\/td>\n11.14 Random Number Generation
11.15 Using Authentication
12 Presentation\/application layer
12.1 Assumptions
12.2 Service provided <\/td>\n<\/tr>\n
48<\/td>\n12.3 Service interface
Figure 29 \u2014 Application layer interface
Table 1 \u2014 Application layer primitives <\/td>\n<\/tr>\n
49<\/td>\n12.4 APDU types and formats <\/td>\n<\/tr>\n
50<\/td>\nFigure 30 \u2014 APDU format
12.5 Protocol diagrams <\/td>\n<\/tr>\n
51<\/td>\nFigure 31 \u2014 Application protocol diagram for multicast acknowledged transaction <\/td>\n<\/tr>\n
52<\/td>\nFigure 32 \u2014 Application protocol diagram for multicast request\/response transaction
12.6 Application protocol state variables
12.7 Request – response messaging in offline state <\/td>\n<\/tr>\n
53<\/td>\n12.8 Network variables
12.8.1 General
12.8.2 Network variable processing <\/td>\n<\/tr>\n
54<\/td>\n12.9 Error notification to the application program
12.9.1 General
12.9.2 Error notification for messages
12.9.3 Error notification for network variables <\/td>\n<\/tr>\n
55<\/td>\n13 Network management & diagnostics
13.1 Assumptions
13.2 Services provided
13.3 Network management and diagnostics application structure
13.4 Node states <\/td>\n<\/tr>\n
56<\/td>\n13.5 Using the network management services
13.5.1 General <\/td>\n<\/tr>\n
57<\/td>\n13.5.2 Addressing considerations
13.5.3 Making network configuration changes
13.5.4 Downloading an Application Program <\/td>\n<\/tr>\n
58<\/td>\n13.5.5 Error handling conditions (informative) <\/td>\n<\/tr>\n
60<\/td>\n13.6 Using router network management commands <\/td>\n<\/tr>\n
61<\/td>\n13.7 NMPDU formats and types
13.7.1 General <\/td>\n<\/tr>\n
62<\/td>\n13.7.2 Query ID
13.7.3 Respond to query
13.7.4 Update domain
13.7.5 Leave domain <\/td>\n<\/tr>\n
63<\/td>\n13.7.6 Update key
13.7.7 Update address
13.7.8 Query address
13.7.9 Query network variable configuration
13.7.10 Update group address
13.7.11 Query domain
13.7.12 Update network variable configuration <\/td>\n<\/tr>\n
64<\/td>\n13.7.13 Set node mode
13.7.14 Read memory
13.7.15 Write memory <\/td>\n<\/tr>\n
65<\/td>\n13.7.16 Checksum recalculate
13.7.17 Install <\/td>\n<\/tr>\n
66<\/td>\nTable 2 \u2014Resource codes <\/td>\n<\/tr>\n
67<\/td>\nTable 3 \u2014Space of the property ID <\/td>\n<\/tr>\n
79<\/td>\n13.7.18 Memory refresh
13.7.19 Query SI <\/td>\n<\/tr>\n
80<\/td>\n13.7.20 Network variable value fetch
13.7.21 Manual service request message
13.7.22 Network management escape code <\/td>\n<\/tr>\n
81<\/td>\n13.7.23 Router mode
13.7.24 Router clear group or subnet table
13.7.25 Router group or subnet table download
13.7.26 Router group forward
13.7.27 Router subnet forward
13.7.28 Router Do Not forward group
13.7.29 Router Do Not forward subnet <\/td>\n<\/tr>\n
82<\/td>\n13.7.30 Router group or subnet table report
13.7.31 Router status
13.7.32 Router half escape code
13.8 DPDU types and formats
13.8.1 General
13.8.2 Query status <\/td>\n<\/tr>\n
85<\/td>\n13.8.3 Proxy status
13.8.4 Clear status <\/td>\n<\/tr>\n
86<\/td>\n13.8.5 Query transceiver status <\/td>\n<\/tr>\n
87<\/td>\nAnnex A (normative) Reference implementation
A.1 General
A.2 Predictive CSMA algorithm <\/td>\n<\/tr>\n
141<\/td>\nA.3 LPDU transmit algorithm <\/td>\n<\/tr>\n
143<\/td>\nA.4 LPDU receive algorithm <\/td>\n<\/tr>\n
144<\/td>\nA.5 Routing algorithm <\/td>\n<\/tr>\n
145<\/td>\nA.6 Learning algorithm
A.7 Transaction control algorithm <\/td>\n<\/tr>\n
152<\/td>\nA.8 Network layer algorithm <\/td>\n<\/tr>\n
168<\/td>\nA.9 TPDU and SPDU send algorithm with authentication <\/td>\n<\/tr>\n
221<\/td>\nA.10 Application Layer <\/td>\n<\/tr>\n
276<\/td>\nA.11 Network Management Commands <\/td>\n<\/tr>\n
312<\/td>\nA.12 Configuration data structures <\/td>\n<\/tr>\n
331<\/td>\nA.13 Include files for the reference implementation <\/td>\n<\/tr>\n
360<\/td>\nA.14 Application protocol state variables and address recognition Structures <\/td>\n<\/tr>\n
363<\/td>\nA.15 Query-id data structures
A.16 Respond to query data structure
A.17 Update somain data structures
A.18 Leave domain data structures <\/td>\n<\/tr>\n
364<\/td>\nA.19 Update key data structures
A.20 Update address data structures <\/td>\n<\/tr>\n
365<\/td>\nA.21 Query address data structures
A.22 Query NV Cnfg data structures
A.23 Update group address data structures <\/td>\n<\/tr>\n
366<\/td>\nA.24 Query domain data structures
A.25 Update network variable configuration data structures
A.26 Set node mode data structures <\/td>\n<\/tr>\n
367<\/td>\nA.27 Read memory data structures
A.28 Write memory data structures
A.29 Checksum recalculate data structures <\/td>\n<\/tr>\n
368<\/td>\nA.30 Install command data structures <\/td>\n<\/tr>\n
376<\/td>\nA.31 Memory refresh data structures
A.32 Query SI data structures
A.33 NV fetch data structures <\/td>\n<\/tr>\n
377<\/td>\nA.34 Manual service request message ddata structures
A.35 Product query data structures
A.36 Router mode data structures
A.37 Router table clear group or subnet table data structures <\/td>\n<\/tr>\n
378<\/td>\nA.38 Router group or subnet download data structures
A.39 Router group forward data structures
A.40 Router subnet forward data structures
A.41 Router group No-Forward data structures <\/td>\n<\/tr>\n
379<\/td>\nA.42 Router subnet No-Forward data structures
A.43 Group \/ subnet table report data structures
A.44 Router status data structures
A.45 Query status data structures <\/td>\n<\/tr>\n
380<\/td>\nA.46 Proxy status data structures
A.47 Clear status data structures
A.48 Query transceiver status data structures <\/td>\n<\/tr>\n
382<\/td>\nAnnex B (normative) Additional Data Structures
B.1 General
B.1.1 System image
B.1.2 Application image <\/td>\n<\/tr>\n
383<\/td>\nB.1.3 Network image
B.2 Read-only structures
B.2.1 Fixed read-only data structures <\/td>\n<\/tr>\n
384<\/td>\nB.2.2 Read-only structure field descriptions <\/td>\n<\/tr>\n
386<\/td>\nTable B. 1 \u2014 Buffer size encodings <\/td>\n<\/tr>\n
387<\/td>\nTable B. 2 \u2014 Buffer Count Encodings <\/td>\n<\/tr>\n
388<\/td>\nB.3 Domain table
B.3.1 Domain table field descriptions
B.4 Address table <\/td>\n<\/tr>\n
389<\/td>\nB.4.1 Declaration of group address format
B.4.2 Group address field descriptions <\/td>\n<\/tr>\n
390<\/td>\nB.4.3 Declaration of subnet\/node address format
B.4.4 Subnet\/node address field descriptions
B.4.5 Declaration of broadcast address format <\/td>\n<\/tr>\n
391<\/td>\nB.4.6 Broadcast address field descriptions
B.4.7 Declaration of turnaround address format
B.4.8 Turnaround address field descriptions
B.4.9 Declaration of protocol processor\u2019s address format <\/td>\n<\/tr>\n
392<\/td>\nB.4.10 Protocol processor address field descriptions
B.4.11 Timer field descriptions <\/td>\n<\/tr>\n
393<\/td>\nTable B. 3 \u2014 Encoding of timer field values
B.5 Network variable tables – informative <\/td>\n<\/tr>\n
394<\/td>\nB.5.1 Network variable configuration table field descriptions – informative
B.5.2 Network variable alias table field descriptions – informative <\/td>\n<\/tr>\n
395<\/td>\nB.5.3 Network variable fixed table field descriptions – informative
B.6 Self-Identification structures <\/td>\n<\/tr>\n
396<\/td>\nB.6.1 SI Structure field descriptions <\/td>\n<\/tr>\n
397<\/td>\nB.6.2 NV descriptor table field descriptions
B.6.3 SNVT table extension records <\/td>\n<\/tr>\n
398<\/td>\nB.6.4 SNVT alias field descriptions
B.6.5 Version 2 SI data <\/td>\n<\/tr>\n
399<\/td>\nFigure B. 1 \u2014SI data
B.6.5.1 Alias record (alias_field Annex B.6.4 above)
B.6.5.2 SI Extended header record (si_header_ext)
B.6.5.3 Clarification of the use of existing fields in the snvt_struct (Annex B.6) <\/td>\n<\/tr>\n
400<\/td>\nB.6.5.4 Capability info record (snvt_capability_info) <\/td>\n<\/tr>\n
401<\/td>\nB.6.5.5 Read-Only Data Structure <\/td>\n<\/tr>\n
402<\/td>\nB.7 Configuration structure
B.7.1 General <\/td>\n<\/tr>\n
403<\/td>\nB.7.2 Configuration structure field descriptions <\/td>\n<\/tr>\n
404<\/td>\nTable B. 4 \u2014 Buffer timeout encoding
B.8 Statistics relative structure <\/td>\n<\/tr>\n
406<\/td>\nAnnex C (informative) Behavioral characteristics
C.1 Channel capacity and throughput <\/td>\n<\/tr>\n
407<\/td>\nTable C. 1 \u2014 Key throughput parameters
C.2 Network metrics <\/td>\n<\/tr>\n
408<\/td>\nFigure C. 1 \u2014 Probability of successful delivery over k hops
C.3 Transaction metrics <\/td>\n<\/tr>\n
409<\/td>\nC.4 Boundary conditions \u2014 power-up
C.5 Boundary conditions \u2014 high load <\/td>\n<\/tr>\n
410<\/td>\nAnnex D (normative) PDU summary <\/td>\n<\/tr>\n
411<\/td>\nFigure D. 1 \u2014 Protocol PDU summary <\/td>\n<\/tr>\n
412<\/td>\nAnnex E (normative) Naming and addressing
E.1 Address types and formats
E.2 Domains <\/td>\n<\/tr>\n
413<\/td>\nE.3 Subnets and nodes
E.4 Groups <\/td>\n<\/tr>\n
414<\/td>\nFigure E. 1 \u2014 Physical topology and logical addressing (single domain)
E.5 Unique_Node_ID and node address assignment <\/td>\n<\/tr>\n
415<\/td>\nE.6 NPDU addressing
Table E. 1 \u2014 NPDU\/TPDU\/SPDU addressing – logical address formats
Figure E. 2 \u2014 NPDU\/TPDU\/SPDU addressing\u2014physical address formats <\/td>\n<\/tr>\n
417<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Open Data Communication in Building Automation, Controls and Building Management. Control Network Protocol – Protocol Stack<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n420<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":272985,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-272978","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/272978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/272985"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=272978"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=272978"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=272978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}