{"id":397988,"date":"2024-10-20T04:33:17","date_gmt":"2024-10-20T04:33:17","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1815-2012-2\/"},"modified":"2024-10-26T08:21:30","modified_gmt":"2024-10-26T08:21:30","slug":"ieee-1815-2012-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1815-2012-2\/","title":{"rendered":"IEEE 1815-2012"},"content":{"rendered":"

Revision Standard – Active. The DNP3 protocol structure, functions, and interoperable application options (subset levels) are specified. The simplest application level is intended for low-cost distribution feeder devices, and the most complex for full-featured systems. The appropriate level is selected to suit the functionality required in each device. The protocol is suitable for operation on a variety of communication media consistent with the makeup of most electric power communication systems.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 1815-2012 Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle Page <\/td>\n<\/tr>\n
6<\/td>\nNotice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata <\/td>\n<\/tr>\n
7<\/td>\nPatents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\n0 Introduction
0.1 DNP3 purpose and history
0.1.1 Addressing an impediment to automation
0.1.2 Rationale for a new protocol based on standards <\/td>\n<\/tr>\n
11<\/td>\n0.1.3 Need for scalability
0.1.4 Emphasis on reliability <\/td>\n<\/tr>\n
12<\/td>\n0.1.5 Feature selection
0.1.6 Rationale for DNP3 subset definitions <\/td>\n<\/tr>\n
13<\/td>\n0.1.7 Features to support distributed capabilities <\/td>\n<\/tr>\n
14<\/td>\n0.1.8 Additional communications features <\/td>\n<\/tr>\n
15<\/td>\n0.1.9 Compatibility with IEC protocols <\/td>\n<\/tr>\n
16<\/td>\n0.1.9.1 Hamming Distance <\/td>\n<\/tr>\n
17<\/td>\n0.1.9.2 Addressing of binary outputs
0.1.9.3 Reality today
0.1.10 Transport Function <\/td>\n<\/tr>\n
18<\/td>\n0.1.11 DNP Users Group
0.1.12 Summary <\/td>\n<\/tr>\n
19<\/td>\n0.1.13 Background: Origins of the name \u201cDNP3\u201d <\/td>\n<\/tr>\n
20<\/td>\n0.2 DNP3 overview
0.2.1 Basic messages and data flow <\/td>\n<\/tr>\n
21<\/td>\n0.2.2 Layering
0.2.2.1 General <\/td>\n<\/tr>\n
22<\/td>\n0.2.2.2 Fragments, segments, and frames <\/td>\n<\/tr>\n
23<\/td>\n0.2.3 Message sequences <\/td>\n<\/tr>\n
26<\/td>\n0.2.4 Data loss and efficiency
0.2.5 Unsolicited responses
0.2.6 IP networking <\/td>\n<\/tr>\n
27<\/td>\n0.3 Organization of DNP3 Specification
0.4 Conventions used in this standard
0.4.1 Notes
0.4.2 Examples
0.4.3 Single master, single outstation perspective <\/td>\n<\/tr>\n
28<\/td>\nContents <\/td>\n<\/tr>\n
35<\/td>\nFigures <\/td>\n<\/tr>\n
37<\/td>\nTables <\/td>\n<\/tr>\n
41<\/td>\nExamples <\/td>\n<\/tr>\n
43<\/td>\nImportant Notice <\/td>\n<\/tr>\n
44<\/td>\n1 Overview
1.1 Scope
1.2 Purpose
1.3 Octet order <\/td>\n<\/tr>\n
45<\/td>\n2 Normative references <\/td>\n<\/tr>\n
47<\/td>\n3 Definitions, acronyms, and abbreviations
3.1 Definitions <\/td>\n<\/tr>\n
51<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
54<\/td>\n3.3 Special terms <\/td>\n<\/tr>\n
55<\/td>\n4 Application Layer\u2014part 1
4.1 Application Layer preface
4.1.1 Layering
4.1.2 Introduction to points and point types <\/td>\n<\/tr>\n
57<\/td>\n4.1.3 Introduction to indexes, groups, and variations
4.1.3.1 Indexes
4.1.3.2 Groups
4.1.3.3 Variations <\/td>\n<\/tr>\n
58<\/td>\n4.1.4 DNP3 objects
4.1.5 Static, event, and class data
4.1.5.1 Static
4.1.5.2 Events <\/td>\n<\/tr>\n
59<\/td>\n4.1.5.3 Classes <\/td>\n<\/tr>\n
60<\/td>\n4.1.6 Outstation event buffering <\/td>\n<\/tr>\n
61<\/td>\n4.2 Message structure <\/td>\n<\/tr>\n
62<\/td>\n4.2.1 Application Layer fragments
4.2.2 Application Layer fragment structure
4.2.2.1 General fragment structure
4.2.2.2 Application request header <\/td>\n<\/tr>\n
63<\/td>\n4.2.2.3 Application response header
4.2.2.4 Application control octet
4.2.2.4.1 FIR field
4.2.2.4.2 FIN field <\/td>\n<\/tr>\n
64<\/td>\n4.2.2.4.3 CON field
4.2.2.4.4 UNS field
4.2.2.4.5 SEQ field <\/td>\n<\/tr>\n
65<\/td>\n4.2.2.5 Function code octet <\/td>\n<\/tr>\n
70<\/td>\n4.2.2.6 Internal indications <\/td>\n<\/tr>\n
72<\/td>\n4.2.2.7 Object headers
4.2.2.7.1 Object group
4.2.2.7.1.1 Object group 60 <\/td>\n<\/tr>\n
73<\/td>\n4.2.2.7.2 Object variation
4.2.2.7.2.1 Variation 0
4.2.2.7.2.2 Variations other than Variation 0 <\/td>\n<\/tr>\n
74<\/td>\n4.2.2.7.3 Qualifier and range fields
4.2.2.7.3.1 Res field
4.2.2.7.3.2 Object prefix code <\/td>\n<\/tr>\n
75<\/td>\n4.2.2.7.3.3 Range specifier codes <\/td>\n<\/tr>\n
76<\/td>\n4.2.2.7.3.4 Valid qualifier codes
4.2.2.7.3.5 Preferred qualifier codes <\/td>\n<\/tr>\n
77<\/td>\n4.2.2.7.4 Qualifier examples <\/td>\n<\/tr>\n
80<\/td>\n4.3 Fragment rules <\/td>\n<\/tr>\n
82<\/td>\n4.4 Detailed function code procedures
4.4.1 Function code 0 <\/td>\n<\/tr>\n
83<\/td>\n4.4.2 Function code 1 (0x01)
4.4.2.1 Read Rules <\/td>\n<\/tr>\n
84<\/td>\n4.4.2.2 Examples <\/td>\n<\/tr>\n
88<\/td>\n4.4.3 Function code 2 (0x02) <\/td>\n<\/tr>\n
89<\/td>\n4.4.3.1 Rules
4.4.3.2 Examples <\/td>\n<\/tr>\n
90<\/td>\n4.4.4 Function codes 3 (0x03) and 4 (0x04)
4.4.4.1 Select\u2013operate philosophy <\/td>\n<\/tr>\n
91<\/td>\n4.4.4.2 Multiple control objects
4.4.4.2.1 CROBs and AOBs
4.4.4.2.2 Pattern Control Blocks and Masks
4.4.4.3 Control-related rules <\/td>\n<\/tr>\n
93<\/td>\n4.4.4.4 Examples <\/td>\n<\/tr>\n
96<\/td>\n4.4.5 Function codes 5 (0x05) and 6 (0x06) <\/td>\n<\/tr>\n
97<\/td>\n4.4.6 Function codes 7 (0x07) and 8 (0x08)
4.4.6.1 Objects in freeze requests <\/td>\n<\/tr>\n
98<\/td>\n4.4.6.2 Examples
4.4.7 Function codes 9 (0x09) and 10 (0x0A)
4.4.8 Function codes 11 (0x0B) and 12 (0x0C) <\/td>\n<\/tr>\n
100<\/td>\n4.4.9 Function codes 13 (0x0D) and 14 (0x0E)
4.4.10 Function code 15 (0x0F) <\/td>\n<\/tr>\n
101<\/td>\n4.4.11 Function codes 16 (0x10) and 17 (0x11) and 18 (0x12) <\/td>\n<\/tr>\n
102<\/td>\n4.4.12 Function code 19 (0x13)
4.4.13 Function code 20 (0x14) and 21 (0x15) <\/td>\n<\/tr>\n
103<\/td>\n4.4.14 Function code 22 (0x16) <\/td>\n<\/tr>\n
106<\/td>\n4.4.15 Function code 23 (0x17) <\/td>\n<\/tr>\n
107<\/td>\n4.4.15.1 Rules
4.4.15.2 Examples
4.4.16 Function code 24 (0x18) <\/td>\n<\/tr>\n
108<\/td>\n4.4.16.1 Rules
4.4.16.2 Examples
4.4.17 Function codes 25 (0x19), 26 (0x1A), 27 (0x1B), and 30 (0x1E) <\/td>\n<\/tr>\n
109<\/td>\n4.4.17.1 Preliminary notes
4.4.17.1.1 File handles
4.4.17.1.2 File Command Status Objects
4.4.17.1.3 File Transport Status objects <\/td>\n<\/tr>\n
110<\/td>\n4.4.17.1.4 Additional information
4.4.17.2 Opening a file
4.4.17.2.1 Request messages <\/td>\n<\/tr>\n
111<\/td>\n4.4.17.2.2 Response messages <\/td>\n<\/tr>\n
113<\/td>\n4.4.17.3 Closing a file <\/td>\n<\/tr>\n
114<\/td>\n4.4.17.4 Deleting a file <\/td>\n<\/tr>\n
115<\/td>\n4.4.17.5 Aborting a file transfer <\/td>\n<\/tr>\n
117<\/td>\n4.4.18 Function code 28 (0x1C) <\/td>\n<\/tr>\n
118<\/td>\n4.4.19 Function code 29 (0x1D) <\/td>\n<\/tr>\n
119<\/td>\n4.4.20 Function code 31 (0x1F) <\/td>\n<\/tr>\n
122<\/td>\n4.4.21 Function code 32 (0x20)
4.4.22 Function code 33 (0x21) <\/td>\n<\/tr>\n
123<\/td>\n4.4.23 Function code 129 (0x81)
4.4.24 Function code 130 (0x82)
4.4.25 Function code 131 (0x83)
4.5 Detailed IIN bit descriptions
4.5.1 IIN1.0\u2014Broadcast Message Received [BROADCAST] <\/td>\n<\/tr>\n
124<\/td>\n4.5.2 IIN1.1\u2014Additional Class 1 Event Data Is Available [CLASS_1_EVENTS]
4.5.3 IIN1.2\u2014Additional Class 2 Event Data Is Available [CLASS_2_EVENTS]
4.5.4 IIN1.3\u2014Additional Class 3 Event Data Is Available [CLASS_3_EVENTS] <\/td>\n<\/tr>\n
125<\/td>\n4.5.5 IIN1.4\u2014Time Synchronization Required [NEED_TIME]
4.5.6 IIN1.5\u2014Some Output Points Are In Local Mode [LOCAL_CONTROL] <\/td>\n<\/tr>\n
126<\/td>\n4.5.7 IIN1.6\u2014Device Trouble [DEVICE_TROUBLE]
4.5.8 IIN1.7\u2014Device Restart [DEVICE_RESTART]
4.5.9 IIN2.0\u2014Function Code Not Implemented [NO_FUNC_CODE_SUPPORT]
4.5.10 IIN2.1\u2014Object Unknown [OBJECT_UNKNOWN] <\/td>\n<\/tr>\n
127<\/td>\n4.5.11 IIN2.2\u2014Parameter Error [PARAMETER_ERROR] <\/td>\n<\/tr>\n
128<\/td>\n4.5.12 IIN2.3\u2014Event Buffer Overflow [EVENT_BUFFER_OVERFLOW] <\/td>\n<\/tr>\n
129<\/td>\n4.5.13 IIN2.4\u2014Operation Is Already Executing [ALREADY_EXECUTING] <\/td>\n<\/tr>\n
130<\/td>\n4.5.14 IIN2.5\u2014Configuration Corrupt [CONFIG_CORRUPT]
4.5.15 IIN2.6\u2014Reserved Bit [RESERVED_2]
4.5.16 IIN2.7\u2014Reserved Bit [RESERVED_1]
4.6 Unsolicited responses <\/td>\n<\/tr>\n
131<\/td>\n4.6.1 Unsolicited response timing
4.6.2 Outstation configuration
4.6.2.1 Compulsory configuration <\/td>\n<\/tr>\n
132<\/td>\n4.6.2.2 Non-compulsory configuration
4.6.3 Support unsolicited enabling and disabling
4.6.4 Confirmation and application control octet <\/td>\n<\/tr>\n
133<\/td>\n4.6.5 Device restart
4.6.6 Normal runtime behavior <\/td>\n<\/tr>\n
136<\/td>\n4.6.7 Unsolicited response timing examples <\/td>\n<\/tr>\n
141<\/td>\n4.7 Support for functions sent to a broadcast address <\/td>\n<\/tr>\n
143<\/td>\n5 Application Layer\u2014part 2
5.1 Additional details
5.1.1 Device startup
5.1.1.1 Outstation startup
5.1.1.1.1 Outstation requirements
5.1.1.1.2 Master requirements <\/td>\n<\/tr>\n
144<\/td>\n5.1.1.2 Master startup <\/td>\n<\/tr>\n
145<\/td>\n5.1.2 Point index range recommendations <\/td>\n<\/tr>\n
146<\/td>\n5.1.3 Event reporting
5.1.4 Data types in class data responses <\/td>\n<\/tr>\n
147<\/td>\n5.1.4.1 Static data, group 60, variation 1
5.1.4.2 Event data, group 60, variations 2, 3, and 4 <\/td>\n<\/tr>\n
148<\/td>\n5.1.5 Data processing order
5.1.5.1 Event and static data
5.1.5.1.1 Reporting binary input and double-bit binary input events <\/td>\n<\/tr>\n
149<\/td>\n5.1.5.1.2 Reporting non-binary input and non-double-bit binary input events
5.1.5.1.3 Mixed event and static data <\/td>\n<\/tr>\n
150<\/td>\n5.1.5.2 Integrity poll
5.1.5.3 Outstation event buffer overflow processing
5.1.6 Services provided
5.1.6.1 Masters <\/td>\n<\/tr>\n
151<\/td>\n5.1.6.2 Outstations
5.1.7 Services required
5.2 Using virtual terminal objects
5.2.1 General <\/td>\n<\/tr>\n
152<\/td>\n5.2.2 Group 112 and 113 objects <\/td>\n<\/tr>\n
153<\/td>\n5.2.3 Virtual terminal example
5.2.4 Discontinuous octet streams <\/td>\n<\/tr>\n
154<\/td>\n5.2.5 Rules
5.2.6 Virtual terminal bandwidth considerations
5.3 Sequential file transfer
5.3.1 Authentication <\/td>\n<\/tr>\n
155<\/td>\n5.3.2 File permissions
5.3.3 Reading a file <\/td>\n<\/tr>\n
157<\/td>\n5.3.4 Writing a file <\/td>\n<\/tr>\n
159<\/td>\n5.3.5 Retrieving individual file information
5.3.6 Retrieving file directory information <\/td>\n<\/tr>\n
161<\/td>\n5.3.7 Deleting a file
5.3.8 Rules relating to files <\/td>\n<\/tr>\n
162<\/td>\n5.4 Data sets
5.4.1 Preliminary background <\/td>\n<\/tr>\n
163<\/td>\n5.4.2 Data set, data set descriptor, and data set prototype overview
5.4.2.1 Data set <\/td>\n<\/tr>\n
164<\/td>\n5.4.2.2 Data set descriptor
5.4.2.3 Data set prototype
5.4.2.4 Relationship of data sets, data set descriptors, and data set prototypes <\/td>\n<\/tr>\n
165<\/td>\n5.4.2.5 Read, write, and control <\/td>\n<\/tr>\n
166<\/td>\n5.4.2.6 Data set and data set prototype definition
5.4.2.6.1 Outstation defined
5.4.2.6.2 Master defined <\/td>\n<\/tr>\n
167<\/td>\n5.4.2.7 Transmission sequence <\/td>\n<\/tr>\n
168<\/td>\n5.4.2.8 Identifiers
5.4.2.8.1 Data set and data set descriptor identifiers
5.4.2.8.2 Data set prototype identifiers <\/td>\n<\/tr>\n
169<\/td>\n5.4.3 Data sets are application specific
5.4.4 Data set details
5.4.4.1 List of elements
5.4.4.2 Event and static data sets <\/td>\n<\/tr>\n
170<\/td>\n5.4.4.3 Data set names
5.4.4.4 Data set identifiers
5.4.4.5 Data type codes specific to data sets <\/td>\n<\/tr>\n
171<\/td>\n5.4.5 Descriptor elements
5.4.5.1 Definitions
5.4.5.1.1 Namespaces
5.4.5.1.2 UUID <\/td>\n<\/tr>\n
172<\/td>\n5.4.5.2 Descriptor element overview
5.4.5.2.1 Descriptor element length
5.4.5.2.2 Descriptor element type <\/td>\n<\/tr>\n
173<\/td>\n5.4.5.2.3 Data type code
5.4.5.2.4 Maximum data length
5.4.5.2.5 Ancillary value <\/td>\n<\/tr>\n
174<\/td>\n5.4.6 Data set descriptor details
5.4.6.1 General
5.4.6.2 Data set descriptor construction
5.4.6.2.1 First descriptor element
5.4.6.2.2 Name descriptor element
5.4.6.2.3 Data descriptor elements
5.4.6.2.4 Control-related descriptor elements <\/td>\n<\/tr>\n
175<\/td>\n5.4.6.2.5 Prototype reference descriptor elements
5.4.6.2.6 Prohibited descriptor elements
5.4.6.2.7 Data value ordering
5.4.7 Data set prototypes
5.4.7.1 General
5.4.7.2 Data set prototype construction
5.4.7.2.1 First element
5.4.7.2.2 Second element <\/td>\n<\/tr>\n
176<\/td>\n5.4.7.2.3 Third and fourth elements
5.4.7.2.4 Data descriptor elements
5.4.7.2.5 Control-related descriptor elements
5.4.7.2.6 Prohibited descriptor elements
5.4.7.2.7 Data value ordering
5.4.8 Naming guidelines <\/td>\n<\/tr>\n
177<\/td>\n5.4.9 DNP3 object groups, classes, and indexes
5.4.9.1 Group numbers and class responses <\/td>\n<\/tr>\n
178<\/td>\n5.4.9.2 Point indexes
5.4.9.3 Event generation and class assignment
5.4.10 Point index attributes <\/td>\n<\/tr>\n
179<\/td>\n5.4.11 Control commands and responses <\/td>\n<\/tr>\n
180<\/td>\n5.4.11.1 CTLV, CTLS, and DAEL elements in control requests and responses
5.4.11.2 Control status element (CTLS) <\/td>\n<\/tr>\n
181<\/td>\n5.4.11.3 Control rules <\/td>\n<\/tr>\n
182<\/td>\n5.4.11.4 Message exchange illustration <\/td>\n<\/tr>\n
183<\/td>\n5.4.12 Example data descriptors, prototypes, and data sets <\/td>\n<\/tr>\n
188<\/td>\n5.4.13 Example Messages <\/td>\n<\/tr>\n
190<\/td>\n5.5 Device attributes
5.5.1 Group 0 and attribute sets <\/td>\n<\/tr>\n
191<\/td>\n5.5.2 Object variations
5.5.3 Function codes
5.5.4 General attribute object formats
5.5.4.1 Pictorial
5.5.4.2 Formal structure <\/td>\n<\/tr>\n
192<\/td>\n5.5.4.3 Attribute data type codes
5.5.5 Reading attributes <\/td>\n<\/tr>\n
193<\/td>\n5.5.6 Reading a list of attribute variations
5.5.6.1 Variation 255
5.5.6.2 Retrieving a list of standard attribute variations <\/td>\n<\/tr>\n
194<\/td>\n5.5.6.3 Retrieving a list of private attribute variations <\/td>\n<\/tr>\n
195<\/td>\n5.5.7 Reading all attributes single request
5.5.7.1 Specific variations request
5.5.7.2 Non-specific variations request
5.5.8 Writing attributes <\/td>\n<\/tr>\n
197<\/td>\n6 Application Layer\u2014part 3: State tables and diagrams
6.1 Outstation fragment state table <\/td>\n<\/tr>\n
203<\/td>\n6.2 Outstation fragment state diagram <\/td>\n<\/tr>\n
205<\/td>\n6.3 Master solicited response reception state table <\/td>\n<\/tr>\n
209<\/td>\n6.4 Master solicited response reception state diagram
6.5 Master unsolicited response reception state table <\/td>\n<\/tr>\n
212<\/td>\n6.6 Master unsolicited response reception state diagram <\/td>\n<\/tr>\n
213<\/td>\n7 Secure authentication
7.1 Purpose
7.2 Threats addressed
7.3 General principles
7.3.1 Authentication only
7.3.2 Application Layer only
7.3.3 Bi-directional <\/td>\n<\/tr>\n
214<\/td>\n7.3.4 Challenge-response
7.3.5 Pre-shared keys
7.3.6 Backwards tolerance
7.3.7 Upgradeable
7.3.8 Perfect forward secrecy
7.3.9 Multiple users and auditing <\/td>\n<\/tr>\n
215<\/td>\n7.4 Theory of operation
7.4.1 Narrative description <\/td>\n<\/tr>\n
216<\/td>\n7.4.1.1 Basic concepts <\/td>\n<\/tr>\n
217<\/td>\n7.4.1.2 Initiating the challenge
7.4.1.3 Replying to the challenge
7.4.1.4 Authenticating
7.4.1.5 Authentication failure
7.4.1.6 Aggressive Mode <\/td>\n<\/tr>\n
218<\/td>\n7.4.1.7 Changing keys <\/td>\n<\/tr>\n
219<\/td>\n7.4.1.7.1 Managing session keys <\/td>\n<\/tr>\n
220<\/td>\n7.4.1.7.2 Managing update keys <\/td>\n<\/tr>\n
221<\/td>\n7.4.1.8 Security statistics
7.4.2 Example message sequences
7.4.2.1 Overview
7.4.2.2 Challenge of a critical ASDU <\/td>\n<\/tr>\n
222<\/td>\n7.4.3 Aggressive Mode <\/td>\n<\/tr>\n
223<\/td>\n7.4.4 Initializing and changing keys <\/td>\n<\/tr>\n
226<\/td>\n7.4.5 State machine overview <\/td>\n<\/tr>\n
228<\/td>\n7.5 Formal specification
7.5.1 Message definitions
7.5.1.1 Master authentication implementation <\/td>\n<\/tr>\n
231<\/td>\n7.5.1.2 Outstation authentication implementation <\/td>\n<\/tr>\n
234<\/td>\n7.5.1.3 DNP3 sequence numbering <\/td>\n<\/tr>\n
237<\/td>\n7.5.1.4 More DNP3 message examples <\/td>\n<\/tr>\n
240<\/td>\n7.5.1.5 DNP3 state machine overviews
7.5.1.5.1 Authentication and session key change state machines <\/td>\n<\/tr>\n
242<\/td>\n7.5.1.5.2 Update key change state machines <\/td>\n<\/tr>\n
244<\/td>\n7.5.2 Formal procedures
7.5.2.1 States <\/td>\n<\/tr>\n
246<\/td>\n7.5.2.2 Security statistics <\/td>\n<\/tr>\n
249<\/td>\n7.5.2.3 Challenger procedures
7.5.2.3.1 Challenger role
7.5.2.3.2 Critical functions <\/td>\n<\/tr>\n
253<\/td>\n7.5.2.3.3 Use of Challenge Sequence Numbers <\/td>\n<\/tr>\n
255<\/td>\n7.5.2.3.4 Authentication procedures <\/td>\n<\/tr>\n
256<\/td>\n7.5.2.3.5 Challenger state machine <\/td>\n<\/tr>\n
265<\/td>\n7.5.2.4 Error messages
7.5.3 Responder procedures
7.5.3.1 Responder role
7.5.3.2 Responding to challenges <\/td>\n<\/tr>\n
266<\/td>\n7.5.3.3 Aggressive Mode
7.5.3.4 Authentication errors <\/td>\n<\/tr>\n
267<\/td>\n7.5.4 Master procedures
7.5.4.1 Master role
7.5.4.2 Changing session keys
7.5.4.3 Deriving keys
7.5.4.4 Assigning user numbers <\/td>\n<\/tr>\n
269<\/td>\n7.5.4.5 Changing user status <\/td>\n<\/tr>\n
271<\/td>\n7.5.4.6 Changing update keys <\/td>\n<\/tr>\n
272<\/td>\n7.5.4.7 Master state machine <\/td>\n<\/tr>\n
281<\/td>\n7.5.5 Outstation procedures
7.5.5.1 Outstation role
7.5.5.2 Key status
7.5.5.3 Authenticating session key changes
7.5.5.4 Changing session keys
7.5.5.5 Changing user status <\/td>\n<\/tr>\n
282<\/td>\n7.5.5.6 Changing update keys <\/td>\n<\/tr>\n
283<\/td>\n7.5.5.7 Enforcing user roles
7.6 Interoperability requirements
7.6.1 Minimum requirements
7.6.1.1 MAC algorithms
7.6.1.1.1 HMAC-SHA-1
7.6.1.1.2 HMAC-SHA-256 <\/td>\n<\/tr>\n
284<\/td>\n7.6.1.2 Key wrap \/ transport algorithms
7.6.1.2.1 AES-128 key wrap
7.6.1.3 Fixed values
7.6.1.3.1 Minimum session key size
7.6.1.3.2 Minimum update key size
7.6.1.4 Configurable values
7.6.1.4.1 Reply timeout
7.6.1.4.2 Security statistic event thresholds <\/td>\n<\/tr>\n
285<\/td>\n7.6.1.4.3 Session Key change interval
7.6.1.4.4 Session Key change count
7.6.1.4.5 Expected Session Key change interval and message count <\/td>\n<\/tr>\n
286<\/td>\n7.6.1.4.6 Maximum Session Key status count
7.6.1.4.7 Use of Aggressive Mode
7.6.1.4.8 Disabling authentication
7.6.1.4.9 Update Key Change Method <\/td>\n<\/tr>\n
288<\/td>\n7.6.1.4.10 Cryptographic information <\/td>\n<\/tr>\n
290<\/td>\n7.6.1.5 Protocol versions
7.6.2 Options
7.6.2.1 MAC algorithms
7.6.2.1.1 AES-GMAC <\/td>\n<\/tr>\n
292<\/td>\n7.6.2.1.2 Other MAC algorithms
7.6.2.2 Key wrap \/ transport algorithms
7.6.2.2.1 AES-256 key wrap
7.6.2.2.2 RSAES-OAEP <\/td>\n<\/tr>\n
293<\/td>\n7.6.2.2.3 Other key wrap algorithms
7.7 Special applications
7.7.1 Use with the internet protocol suite <\/td>\n<\/tr>\n
294<\/td>\n7.7.2 Use with redundant channels
7.7.3 Use with external link encryptors
7.7.4 Use with data concentrators
7.7.4.1 Definition of a data concentrator <\/td>\n<\/tr>\n
295<\/td>\n7.7.4.2 Authentication procedures for data concentrators <\/td>\n<\/tr>\n
296<\/td>\n7.8 Compliance with IEC\/TS 62351-3
7.8.1 Deprecation of non-encrypting cipher suites <\/td>\n<\/tr>\n
297<\/td>\n7.8.2 Mandatory cipher suite
7.8.3 Recommended cipher suites
7.8.4 Negotiation of versions
7.8.5 Cipher renegotiation <\/td>\n<\/tr>\n
298<\/td>\n7.8.6 Message authentication code
7.8.7 Certificate support
7.8.7.1 Multiple certificate authorities (CAs)
7.8.7.2 Certificate size
7.8.7.3 Certificate exchange
7.8.7.4 Certificate comparison <\/td>\n<\/tr>\n
299<\/td>\n7.8.7.4.1 Verification based upon CA
7.8.7.4.2 Verification based upon individual certificates
7.8.7.4.3 Certificate revocation
7.8.7.4.4 Expired certificates
7.8.7.4.5 Signing
7.8.7.4.6 Key exchange <\/td>\n<\/tr>\n
300<\/td>\n7.8.8 Co-existence with non-secure protocol traffic
7.9 Compliance with IEC\/TS 62351-5
7.9.1 Selected options <\/td>\n<\/tr>\n
301<\/td>\n7.9.2 Operations considered critical
7.9.3 Addressing information
7.9.4 Message format mapping
7.9.5 Reference to procedures <\/td>\n<\/tr>\n
302<\/td>\n7.10 Compliance with ISO\/IEC 11770
7.10.1 Requirements
7.10.1.1 Functional requirements
7.10.1.1.1 Change update keys remotely
7.10.1.1.2 Enable centralized key management
7.10.1.1.3 Permit global names <\/td>\n<\/tr>\n
303<\/td>\n7.10.1.1.4 Permit assignment of role-based access
7.10.1.1.5 Permit revocation of update keys
7.10.1.1.6 Permit expiry of update keys
7.10.1.1.7 Permit assignment of user number (USR)
7.10.1.1.8 Follow standards
7.10.1.2 Qualitative requirements
7.10.1.2.1 Minimize key vulnerability
7.10.1.2.2 Minimize messages and octets required
7.10.1.2.3 Minimize configuration required
7.10.1.2.4 Minimize processing power required
7.10.2 Notation <\/td>\n<\/tr>\n
305<\/td>\n7.10.3 Sequence <\/td>\n<\/tr>\n
309<\/td>\n8 Transport Function
8.1 Overview
8.1.1 Layering
8.1.2 Purpose <\/td>\n<\/tr>\n
310<\/td>\n8.2 Transport Function description
8.2.1 Transport header
8.2.1.1 FIN field
8.2.1.2 FIR field
8.2.1.3 SEQUENCE number field
8.2.1.4 Rules <\/td>\n<\/tr>\n
311<\/td>\n8.2.2 Application Layer data <\/td>\n<\/tr>\n
312<\/td>\n8.2.3 Segmenting example <\/td>\n<\/tr>\n
313<\/td>\n8.2.4 Reception state table <\/td>\n<\/tr>\n
315<\/td>\n8.2.5 Reception state diagram <\/td>\n<\/tr>\n
316<\/td>\n9 Data Link Layer
9.1 Layering overview
9.2 DNP3 Data Link Layer description
9.2.1 Introduction <\/td>\n<\/tr>\n
317<\/td>\n9.2.2 Services
9.2.3 Transaction model <\/td>\n<\/tr>\n
318<\/td>\n9.2.4 Frame format
9.2.4.1 Data Link Layer header frame fields <\/td>\n<\/tr>\n
319<\/td>\n9.2.4.1.1 START field
9.2.4.1.2 LENGTH field
9.2.4.1.3 CONTROL field
9.2.4.1.3.1 DIR bit field
9.2.4.1.3.2 PRM bit field
9.2.4.1.3.3 FCB bit field <\/td>\n<\/tr>\n
320<\/td>\n9.2.4.1.3.4 FCV bit field
9.2.4.1.3.5 DFC bit field
9.2.4.1.3.6 FUNCTION CODE field <\/td>\n<\/tr>\n
322<\/td>\n9.2.4.1.4 DESTINATION field
9.2.4.1.5 SOURCE field
9.2.4.2 User data
9.2.4.3 CRC fields <\/td>\n<\/tr>\n
323<\/td>\n9.2.4.4 Inter-octet and inter-frame gaps
9.2.5 Addressing notes
9.2.5.1 Choosing addresses <\/td>\n<\/tr>\n
324<\/td>\n9.2.5.2 Reserved and special use addresses
9.2.5.2.1 Broadcast addresses
9.2.5.2.2 Self-address
9.2.5.2.3 DNP3 reserved addresses
9.2.6 Primary-to-secondary function codes <\/td>\n<\/tr>\n
325<\/td>\n9.2.6.1 Function code 0 RESET_LINK_STATES
9.2.6.2 Function code 2 TEST_LINK_STATES
9.2.6.3 Function code 3 CONFIRMED_USER_DATA <\/td>\n<\/tr>\n
326<\/td>\n9.2.6.4 Function code 4 UNCONFIRMED_USER_DATA
9.2.6.5 Function code 9 REQUEST_LINK_STATUS
9.2.7 Secondary-to-primary function codes
9.2.7.1 Function code 0 ACK
9.2.7.2 Function code 1 NACK <\/td>\n<\/tr>\n
327<\/td>\n9.2.7.3 Function code 11 LINK_STATUS
9.2.7.4 Function code 15 NOT_SUPPORTED
9.2.8 Link control variables
9.2.9 Frame error detection <\/td>\n<\/tr>\n
328<\/td>\n9.2.10 Collision avoidance <\/td>\n<\/tr>\n
329<\/td>\n9.3 State tables and diagrams
9.3.1 Primary Station state requirements
9.3.1.1 Explanatory statements <\/td>\n<\/tr>\n
330<\/td>\n9.3.1.2 Primary Station state table <\/td>\n<\/tr>\n
332<\/td>\n9.3.1.3 Primary Station state diagram
9.3.2 Secondary Station state requirements
9.3.2.1 Explanatory statements <\/td>\n<\/tr>\n
334<\/td>\n9.3.2.2 Secondary Station state table <\/td>\n<\/tr>\n
336<\/td>\n9.3.2.3 Secondary Station state diagram <\/td>\n<\/tr>\n
337<\/td>\n10 Layer-independent topics
10.1 Purpose of layer-independent topics
10.2 Confirmation and retry guidelines
10.2.1 Recommendations
10.2.2 Background
10.2.2.1 Data Link Layer confirms and Application Layer confirms
10.2.2.2 Why confirmations are necessary <\/td>\n<\/tr>\n
338<\/td>\n10.2.2.3 Retransmissions
10.2.3 Discussion
10.2.3.1 Why Application Layer confirms are preferred
10.2.3.1.1 Data Link Layer confirms are redundant
10.2.3.1.2 Bandwidth <\/td>\n<\/tr>\n
339<\/td>\n10.2.3.1.3 Assures understanding not just reception
10.2.3.1.4 Noisy environments
10.2.3.2 Retries and polling
10.2.3.2.1 Media access control
10.2.3.2.2 Unsolicited responses <\/td>\n<\/tr>\n
340<\/td>\n10.2.3.3 Exceptions
10.3 Time synchronization
10.3.1 General
10.3.2 Time base <\/td>\n<\/tr>\n
341<\/td>\n10.3.3 Messages for time synchronization
10.3.3.1 Non-LAN procedure <\/td>\n<\/tr>\n
343<\/td>\n10.3.3.2 LAN procedure <\/td>\n<\/tr>\n
345<\/td>\n10.3.4 Time synchronization retries
10.3.4.1 Requirements <\/td>\n<\/tr>\n
346<\/td>\n10.3.4.2 Justification for non-LAN applications
10.3.4.3 Justification for LAN applications <\/td>\n<\/tr>\n
347<\/td>\n10.4 Handling multiple messages
10.4.1 Requirements
10.4.2 Back-to-back confirmation and request\/response
10.4.3 Back-to-back without confirmation
10.4.4 Multi-drop communications <\/td>\n<\/tr>\n
348<\/td>\n10.4.5 Unsolicited responses <\/td>\n<\/tr>\n
349<\/td>\n11 Data object library\u2014basics
11.1 Overview
11.2 Library documentation organization
11.3 Primitive data types
11.3.1 Summary of types <\/td>\n<\/tr>\n
350<\/td>\n11.3.2 Numeric notation conventions
11.3.2.1 Decimal values
11.3.2.2 Binary-code decimal values
11.3.2.3 Hexadecimal values
11.3.2.4 Binary values
11.3.2.5 Floating-point values
11.3.3 Bit strings <\/td>\n<\/tr>\n
351<\/td>\n11.3.4 Unsigned and signed integers <\/td>\n<\/tr>\n
352<\/td>\n11.3.5 Floating-point values <\/td>\n<\/tr>\n
353<\/td>\n11.3.6 Binary-coded decimal
11.3.6.1 Coding practice <\/td>\n<\/tr>\n
354<\/td>\n11.3.6.2 Characteristics
11.3.7 Printable ASCII strings
11.3.7.1 Printable characters <\/td>\n<\/tr>\n
361<\/td>\n11.3.7.2 Characteristics
11.3.8 Octet string
11.3.9 SET of n <\/td>\n<\/tr>\n
362<\/td>\n11.3.10 Variant
11.3.11 Unicode string <\/td>\n<\/tr>\n
363<\/td>\n11.4 Object data type codes
11.5 DNP3 object types <\/td>\n<\/tr>\n
364<\/td>\n11.5.1 Static type
11.5.2 Event type
11.5.3 Command (Cmnd) type
11.5.4 Information (Info) type
11.5.5 Attribute (Attrib) type
11.6 Object flags
11.6.1 Flag definitions <\/td>\n<\/tr>\n
368<\/td>\n11.6.1.1 Flag description notes <\/td>\n<\/tr>\n
370<\/td>\n11.6.2 Interaction or combinations of flags
11.6.3 Implementation rules
11.6.4 Considerations for data concentrators (non-originating devices) <\/td>\n<\/tr>\n
371<\/td>\n11.6.5 Object groups having variations with flags and without flags
11.7 Status codes
11.7.1 Status codes for control-related objects <\/td>\n<\/tr>\n
372<\/td>\n11.7.2 Status codes for file-related objects <\/td>\n<\/tr>\n
373<\/td>\n11.8 Group number categories
11.9 Point types <\/td>\n<\/tr>\n
374<\/td>\n11.9.1 Analog input point type
11.9.1.1 General description
11.9.1.2 Analog input model <\/td>\n<\/tr>\n
375<\/td>\n11.9.1.3 Analog deadbands
11.9.1.4 Applicable DNP3 object groups <\/td>\n<\/tr>\n
376<\/td>\n11.9.1.5 Non-frozen and frozen data in the same message
11.9.2 Analog output point type
11.9.2.1 General description <\/td>\n<\/tr>\n
377<\/td>\n11.9.2.2 Analog output model <\/td>\n<\/tr>\n
378<\/td>\n11.9.2.3 Applicable DNP3 objects
11.9.3 BCD point type
11.9.3.1 General description
11.9.3.2 Applicable DNP3 objects
11.9.4 Binary output point type
11.9.4.1 General description <\/td>\n<\/tr>\n
379<\/td>\n11.9.4.2 Activation model
11.9.4.3 Complementary latch model <\/td>\n<\/tr>\n
380<\/td>\n11.9.4.4 Complementary, two-output model <\/td>\n<\/tr>\n
381<\/td>\n11.9.4.5 Common features of models <\/td>\n<\/tr>\n
382<\/td>\n11.9.4.6 Applicable DNP3 Objects
11.9.5 Counter point type
11.9.5.1 General description
11.9.5.2 Counter model <\/td>\n<\/tr>\n
384<\/td>\n11.9.5.3 Implementation precedence
11.9.5.4 Positive and negative accumulations
11.9.5.5 Counts and frozen counts in the same message
11.9.5.6 Applicable DNP3 objects
11.9.5.7 Counter processing rules <\/td>\n<\/tr>\n
386<\/td>\n11.9.6 Double-bit binary input point type
11.9.6.1 General description
11.9.6.2 Double-bit binary input model <\/td>\n<\/tr>\n
388<\/td>\n11.9.6.3 Point space
11.9.6.4 Applicable DNP3 objects
11.9.7 Octet string point type
11.9.7.1 General description
11.9.7.2 Octet string model <\/td>\n<\/tr>\n
389<\/td>\n11.9.7.3 Applicable DNP3 objects
11.9.8 Single-bit binary input point type
11.9.8.1 General description
11.9.8.2 Single-bit binary input model
11.9.8.3 Applicable DNP3 objects <\/td>\n<\/tr>\n
390<\/td>\n11.9.9 Virtual terminal point type
11.9.9.1 General description
11.9.9.2 Applicable DNP3 objects <\/td>\n<\/tr>\n
391<\/td>\n11.9.10 Security statistics point type
11.9.10.1 General description <\/td>\n<\/tr>\n
392<\/td>\n11.9.10.2 Security statistics model
11.9.10.3 Applicable DNP3 objects <\/td>\n<\/tr>\n
393<\/td>\n12 DNP3 object library\u2014parsing codes
12.1 Subset parsing codes
12.1.1 How to interpret the subset parsing tables
12.1.1.1 Request and response column independence
12.1.1.2 Interpreting the subset parsing tables for outstation devices
12.1.1.3 Interpreting the subset parsing tables for master devices <\/td>\n<\/tr>\n
394<\/td>\n12.1.2 Subset parsing tables <\/td>\n<\/tr>\n
404<\/td>\n12.2 Parsing guidelines <\/td>\n<\/tr>\n
405<\/td>\n12.2.1 How to interpret the parsing guideline tables
12.2.1.1 Request and response column independence
12.2.1.2 Interpreting the parsing guideline tables for outstation devices
12.2.1.3 Interpreting the parsing guideline tables for master devices <\/td>\n<\/tr>\n
406<\/td>\n12.2.2 Parsing guideline tables <\/td>\n<\/tr>\n
418<\/td>\n13 IP networking
13.1 IP networking overview
13.1.1 IP networking purpose
13.1.2 IP networking scope
13.1.3 IP networking suite and device identification
13.1.4 Protocol stack <\/td>\n<\/tr>\n
419<\/td>\n13.2 Layer requirements
13.2.1 DNP3 link, transport, and application
13.2.1.1 Confirmations
13.2.1.2 Message transfer <\/td>\n<\/tr>\n
420<\/td>\n13.2.2 Internet Protocol suite
13.2.2.1 Configuration requirements
13.2.2.2 Registered port number
13.2.2.2.1 Optional port numbers
13.2.2.3 IP address assignment
13.2.3 Connection management
13.2.3.1 TCP usage <\/td>\n<\/tr>\n
421<\/td>\n13.2.3.1.1 Initiating end point
13.2.3.1.2 Listening end point
13.2.3.1.3 Dual end point
13.2.3.1.4 Basic requirements
13.2.3.1.5 Configuration parameter guidance <\/td>\n<\/tr>\n
422<\/td>\n13.2.3.2 UDP usage
13.2.3.2.1 UDP ports <\/td>\n<\/tr>\n
424<\/td>\n13.2.3.2.2 Basic requirements
13.2.3.2.3 Multiple frames
13.2.3.2.4 Broadcast address
13.2.3.3 TCP connection status
13.2.3.3.1 Keep-alive mechanism <\/td>\n<\/tr>\n
425<\/td>\n13.2.3.3.2 Broken connections
13.2.3.3.3 Closed connections <\/td>\n<\/tr>\n
426<\/td>\n13.2.3.4 Single master connection <\/td>\n<\/tr>\n
428<\/td>\n13.2.3.4.1 Requirements
13.2.3.5 Multiple master connections
13.2.3.5.1 Connection establishment\u2014method 1 <\/td>\n<\/tr>\n
429<\/td>\n13.2.3.5.2 Connection establishment\u2014method 2
13.2.3.5.3 Connection establishment\u2014method 3 <\/td>\n<\/tr>\n
430<\/td>\n13.2.3.5.4 Requirements <\/td>\n<\/tr>\n
431<\/td>\n13.2.3.6 Multiple outstation connections
13.2.3.6.1 Requirements <\/td>\n<\/tr>\n
432<\/td>\n13.3 Security
13.3.1 Rudimentary
13.3.2 Advanced
13.3.3 External
13.4 Time synchronization
13.5 UML statecharts
13.5.1 Dual end point\u2014master <\/td>\n<\/tr>\n
433<\/td>\n13.5.2 Dual end point\u2014outstation <\/td>\n<\/tr>\n
435<\/td>\n14 Interoperability
14.1 About this clause
14.1.1 Purpose of this clause
14.1.2 Who should use this clause
14.1.3 How this clause is organized <\/td>\n<\/tr>\n
436<\/td>\n14.2 Overview
14.2.1 Terminology
14.2.2 Reading the subset tables <\/td>\n<\/tr>\n
437<\/td>\n14.2.3 Goals and assumptions <\/td>\n<\/tr>\n
438<\/td>\n14.3 Level 1 DNP3 implementation (DNP3-L1)
14.3.1 Intended use
14.3.2 General description <\/td>\n<\/tr>\n
439<\/td>\n14.3.3 Implementation table <\/td>\n<\/tr>\n
442<\/td>\n14.4 Level 2 DNP3 implementation (DNP3-L2)
14.4.1 Intended use
14.4.2 General description <\/td>\n<\/tr>\n
443<\/td>\n14.4.3 Implementation table <\/td>\n<\/tr>\n
446<\/td>\n14.5 Level 3 DNP3 implementation (DNP3-L3)
14.5.1 Intended use
14.5.2 General description <\/td>\n<\/tr>\n
447<\/td>\n14.5.3 Implementation table <\/td>\n<\/tr>\n
453<\/td>\n14.6 Level 4 DNP3 implementation (DNP3-L4)
14.6.1 Intended use <\/td>\n<\/tr>\n
454<\/td>\n14.6.2 General description
14.6.3 Implementation table <\/td>\n<\/tr>\n
469<\/td>\n14.7 Conformance
14.7.1 Outstation devices
14.7.2 Master devices <\/td>\n<\/tr>\n
470<\/td>\n14.8 XML representation
14.8.1 Background
14.8.1.1 XML <\/td>\n<\/tr>\n
471<\/td>\n14.8.1.2 XML schemas <\/td>\n<\/tr>\n
472<\/td>\n14.8.1.3 XSLT
14.8.1.4 XML schema specifications
14.8.2 Use cases <\/td>\n<\/tr>\n
473<\/td>\n14.8.2.1 Utility compares implementations
14.8.2.2 Utility publishes proposed device requirements
14.8.2.3 Outstation publishes current configuration
14.8.2.4 Master updates outstation configuration
14.8.3 DNP3 XML Schema overview
14.8.3.1 Checking for required parameters <\/td>\n<\/tr>\n
474<\/td>\n14.8.3.2 ReferenceDevice and AuxillaryInfo <\/td>\n<\/tr>\n
475<\/td>\n14.8.3.3 Empty element versus enumeration <\/td>\n<\/tr>\n
476<\/td>\n14.8.3.4 Per group versus per point parameters
14.8.3.5 Representation of real-time DNP3 data <\/td>\n<\/tr>\n
477<\/td>\n14.8.3.6 User extensions
14.8.4 Mapping DNP3 data points to IEC 61850 object models <\/td>\n<\/tr>\n
478<\/td>\n14.9 Instructions for creating a Device Profile document <\/td>\n<\/tr>\n
480<\/td>\nAnnex A (normative) DNP3 data object library\u2014object descriptions
A.1 Object group 0: device attributes
A.1.1 Device attributes\u2014secure authentication version
A.1.1.1 Description
A.1.1.2 Coding
A.1.1.2.1 Pictorial
A.1.1.2.2 Formal structure <\/td>\n<\/tr>\n
481<\/td>\nA.1.2 Device attributes\u2014number of security statistics per association
A.1.2.1 Description
A.1.2.2 Coding
A.1.2.2.1 Pictorial
A.1.2.2.2 Formal structure <\/td>\n<\/tr>\n
482<\/td>\nA.1.3 Device attributes\u2014identification of support for user-specific attributes
A.1.3.1 Description
A.1.3.2 Coding
A.1.3.2.1 Pictorial
A.1.3.2.2 Formal structure <\/td>\n<\/tr>\n
483<\/td>\nA.1.3.3 Examples of the use of this attribute are: <\/td>\n<\/tr>\n
485<\/td>\nA.1.4 Device attributes\u2014number of master-defined data set prototypes
A.1.4.1 Description
A.1.4.2 Coding
A.1.4.2.1 Pictorial
A.1.4.2.2 Formal structure
A.1.4.2.3 Notes <\/td>\n<\/tr>\n
486<\/td>\nA.1.5 Device attributes\u2014number of outstation-defined data set prototypes
A.1.5.1 Description
A.1.5.2 Coding
A.1.5.2.1 Pictorial
A.1.5.2.2 Formal structure
A.1.5.2.3 Notes <\/td>\n<\/tr>\n
487<\/td>\nA.1.6 Device attributes\u2014number of master-defined data sets
A.1.6.1 Description
A.1.6.2 Coding
A.1.6.2.1 Pictorial
A.1.6.2.2 Formal structure
A.1.6.2.3 Notes <\/td>\n<\/tr>\n
488<\/td>\nA.1.7 Device attributes\u2014number of outstation-defined data sets
A.1.7.1 Description
A.1.7.2 Coding
A.1.7.2.1 Pictorial
A.1.7.2.2 Formal structure
A.1.7.2.3 Notes <\/td>\n<\/tr>\n
489<\/td>\nA.1.8 Device attributes\u2014maximum number of binary output objects per request
A.1.8.1 Description
A.1.8.2 Coding
A.1.8.2.1 Pictorial
A.1.8.2.2 Formal structure <\/td>\n<\/tr>\n
490<\/td>\nA.1.9 Device attributes\u2014local timing accuracy
A.1.9.1 Description
A.1.9.2 Coding
A.1.9.2.1 Pictorial
A.1.9.2.2 Formal structure
A.1.9.2.3 Notes <\/td>\n<\/tr>\n
492<\/td>\nA.1.10 Device attributes\u2014duration of time accuracy
A.1.10.1 Description
A.1.10.2 Coding
A.1.10.2.1 Pictorial
A.1.10.2.2 Formal structure <\/td>\n<\/tr>\n
493<\/td>\nA.1.10.2.3 Notes <\/td>\n<\/tr>\n
494<\/td>\nA.1.11 Device attributes\u2014support for analog output events
A.1.11.1 Description
A.1.11.2 Coding
A.1.11.2.1 Pictorial
A.1.11.2.2 Formal structure <\/td>\n<\/tr>\n
495<\/td>\nA.1.12 Device attributes\u2014maximum analog output index
A.1.12.1 Description
A.1.12.2 Coding
A.1.12.2.1 Pictorial
A.1.12.2.2 Formal structure
A.1.12.2.3 Notes <\/td>\n<\/tr>\n
496<\/td>\nA.1.13 Device attributes\u2014number of analog outputs
A.1.13.1 Description
A.1.13.2 Coding
A.1.13.2.1 Pictorial
A.1.13.2.2 Formal structure
A.1.13.2.3 Notes <\/td>\n<\/tr>\n
497<\/td>\nA.1.14 Device attributes\u2014support for binary output events
A.1.14.1 Description
A.1.14.2 Coding
A.1.14.2.1 Pictorial
A.1.14.2.2 Formal structure <\/td>\n<\/tr>\n
498<\/td>\nA.1.15 Device attributes\u2014maximum binary output index
A.1.15.1 Description
A.1.15.2 Coding
A.1.15.2.1 Pictorial
A.1.15.2.2 Formal structure
A.1.15.2.3 Notes <\/td>\n<\/tr>\n
499<\/td>\nA.1.16 Device attributes\u2014number of binary outputs
A.1.16.1 Description
A.1.16.2 Coding
A.1.16.2.1 Pictorial
A.1.16.2.2 Formal structure
A.1.16.2.3 Notes <\/td>\n<\/tr>\n
500<\/td>\nA.1.17 Device attributes\u2014support for frozen counter events
A.1.17.1 Description
A.1.17.2 Coding
A.1.17.2.1 Pictorial
A.1.17.2.2 Formal structure <\/td>\n<\/tr>\n
501<\/td>\nA.1.18 Device attributes\u2014support for frozen counters
A.1.18.1 Description
A.1.18.2 Coding
A.1.18.2.1 Pictorial
A.1.18.2.2 Formal structure <\/td>\n<\/tr>\n
502<\/td>\nA.1.19 Device attributes\u2014support for counter events
A.1.19.1 Description
A.1.19.2 Coding
A.1.19.2.1 Pictorial
A.1.19.2.2 Formal structure <\/td>\n<\/tr>\n
503<\/td>\nA.1.20 Device attributes\u2014maximum counter index
A.1.20.1 Description
A.1.20.2 Coding
A.1.20.2.1 Pictorial
A.1.20.2.2 Formal structure
A.1.20.2.3 Notes <\/td>\n<\/tr>\n
504<\/td>\nA.1.21 Device attributes\u2014number of counter points
A.1.21.1 Description
A.1.21.2 Coding
A.1.21.2.1 Pictorial
A.1.21.2.2 Formal structure
A.1.21.2.3 Notes <\/td>\n<\/tr>\n
505<\/td>\nA.1.22 Device attributes\u2014support for frozen analog inputs
A.1.22.1 Description
A.1.22.2 Coding
A.1.22.2.1 Pictorial
A.1.22.2.2 Formal structure <\/td>\n<\/tr>\n
506<\/td>\nA.1.23 Device attributes\u2014support for analog input events
A.1.23.1 Description
A.1.23.2 Coding
A.1.23.2.1 Pictorial
A.1.23.2.2 Formal structure <\/td>\n<\/tr>\n
507<\/td>\nA.1.24 Device attributes\u2014maximum analog input index
A.1.24.1 Description
A.1.24.2 Coding
A.1.24.2.1 Pictorial
A.1.24.2.2 Formal structure
A.1.24.2.3 Notes <\/td>\n<\/tr>\n
508<\/td>\nA.1.25 Device attributes\u2014number of analog input points
A.1.25.1 Description
A.1.25.2 Coding
A.1.25.2.1 Pictorial
A.1.25.2.2 Formal structure
A.1.25.2.3 Notes <\/td>\n<\/tr>\n
509<\/td>\nA.1.26 Device attributes\u2014support for double-bit binary input events
A.1.26.1 Description
A.1.26.2 Coding
A.1.26.2.1 Pictorial
A.1.26.2.2 Formal structure <\/td>\n<\/tr>\n
510<\/td>\nA.1.27 Device attributes\u2014maximum double-bit binary index
A.1.27.1 Description
A.1.27.2 Coding
A.1.27.2.1 Pictorial
A.1.27.2.2 Formal structure
A.1.27.2.3 Notes <\/td>\n<\/tr>\n
511<\/td>\nA.1.28 Device attributes\u2014number of double-bit binary input points
A.1.28.1 Description
A.1.28.2 Coding
A.1.28.2.1 Pictorial
A.1.28.2.2 Formal structure
A.1.28.2.3 Notes <\/td>\n<\/tr>\n
512<\/td>\nA.1.29 Device attributes\u2014support for binary input events
A.1.29.1 Description
A.1.29.2 Coding
A.1.29.2.1 Pictorial
A.1.29.2.2 Formal structure <\/td>\n<\/tr>\n
513<\/td>\nA.1.30 Device attributes\u2014maximum binary input index
A.1.30.1 Description
A.1.30.2 Coding
A.1.30.2.1 Pictorial
A.1.30.2.2 Formal structure
A.1.30.2.3 Notes <\/td>\n<\/tr>\n
514<\/td>\nA.1.31 Device attributes\u2014number of binary input points
A.1.31.1 Description
A.1.31.2 Coding
A.1.31.2.1 Pictorial
A.1.31.2.2 Formal structure
A.1.31.2.3 Notes <\/td>\n<\/tr>\n
515<\/td>\nA.1.32 Device attributes\u2014maximum transmit fragment size
A.1.32.1 Description
A.1.32.2 Coding
A.1.32.2.1 Pictorial
A.1.32.2.2 Formal structure <\/td>\n<\/tr>\n
516<\/td>\nA.1.33 Device attributes\u2014maximum receive fragment size
A.1.33.1 Description
A.1.33.2 Coding
A.1.33.2.1 Pictorial
A.1.33.2.2 Formal structure <\/td>\n<\/tr>\n
517<\/td>\nA.1.34 Device attributes\u2014device manufacturer\u2019s software version
A.1.34.1 Description
A.1.34.2 Coding
A.1.34.2.1 Pictorial
A.1.34.2.2 Formal structure <\/td>\n<\/tr>\n
518<\/td>\nA.1.35 Device attributes\u2014device manufacturer\u2019s hardware version
A.1.35.1 Description
A.1.35.2 Coding
A.1.35.2.1 Pictorial
A.1.35.2.2 Formal structure <\/td>\n<\/tr>\n
519<\/td>\nA.1.36 Device attributes\u2014user-assigned location name
A.1.36.1 Description
A.1.36.2 Coding
A.1.36.2.1 Pictorial
A.1.36.2.2 Formal structure
A.1.36.2.3 Notes <\/td>\n<\/tr>\n
520<\/td>\nA.1.37 Device attributes\u2014user-assigned ID code\/number
A.1.37.1 Description
A.1.37.2 Coding
A.1.37.2.1 Pictorial
A.1.37.2.2 Formal structure
A.1.37.2.3 Notes <\/td>\n<\/tr>\n
521<\/td>\nA.1.38 Device attributes\u2014user-assigned device name
A.1.38.1 Description
A.1.38.2 Coding
A.1.38.2.1 Pictorial
A.1.38.2.2 Formal structure
A.1.38.2.3 Notes <\/td>\n<\/tr>\n
522<\/td>\nA.1.39 Device attributes\u2014device serial number
A.1.39.1 Description
A.1.39.2 Coding
A.1.39.2.1 Pictorial
A.1.39.2.2 Formal structure <\/td>\n<\/tr>\n
523<\/td>\nA.1.40 Device attributes\u2014DNP3 subset and conformance
A.1.40.1 Description
A.1.40.2 Coding
A.1.40.2.1 Pictorial
A.1.40.2.2 Formal structure <\/td>\n<\/tr>\n
524<\/td>\nA.1.40.2.3 Notes <\/td>\n<\/tr>\n
525<\/td>\nA.1.41 Device attributes\u2014device manufacturer\u2019s product name and model
A.1.41.1 Description
A.1.41.2 Coding
A.1.41.2.1 Pictorial
A.1.41.2.2 Formal structure <\/td>\n<\/tr>\n
526<\/td>\nA.1.42 Device attributes\u2014device manufacturer\u2019s name
A.1.42.1 Description
A.1.42.2 Coding
A.1.42.2.1 Pictorial
A.1.42.2.2 Formal structure <\/td>\n<\/tr>\n
527<\/td>\nA.1.43 Device attributes\u2014non-specific all attributes request
A.1.43.1 Description
A.1.43.2 Coding
A.1.43.2.1 Notes <\/td>\n<\/tr>\n
528<\/td>\nA.1.44 Device attributes\u2014list of attribute variations
A.1.44.1 Description
A.1.44.2 Coding
A.1.44.2.1 Pictorial
A.1.44.2.2 Formal structure <\/td>\n<\/tr>\n
529<\/td>\nA.1.44.2.3 Notes <\/td>\n<\/tr>\n
530<\/td>\nA.2 Object group 1: binary inputs
A.2.1 Binary input\u2014packed format
A.2.1.1 Description
A.2.1.2 Coding
A.2.1.2.1 Pictorial
A.2.1.2.2 Formal structure
A.2.1.2.3 Notes <\/td>\n<\/tr>\n
531<\/td>\nA.2.2 Binary input\u2014with flags
A.2.2.1 Description
A.2.2.2 Coding
A.2.2.2.1 Pictorial
A.2.2.2.2 Formal structure
A.2.2.2.3 Notes <\/td>\n<\/tr>\n
532<\/td>\nA.3 Object group 2: binary input events
A.3.1 Binary input event\u2014without time
A.3.1.1 Description
A.3.1.2 Coding
A.3.1.2.1 Pictorial
A.3.1.2.2 Formal structure
A.3.1.2.3 Notes <\/td>\n<\/tr>\n
533<\/td>\nA.3.2 Binary input event\u2014with absolute time
A.3.2.1 Description
A.3.2.2 Coding
A.3.2.2.1 Pictorial
A.3.2.2.2 Formal structure
A.3.2.2.3 Notes <\/td>\n<\/tr>\n
534<\/td>\nA.3.3 Binary input event\u2014with relative time
A.3.3.1 Description
A.3.3.2 Coding
A.3.3.2.1 Pictorial
A.3.3.2.2 Formal structure
A.3.3.2.3 Notes <\/td>\n<\/tr>\n
535<\/td>\nA.4 Object group 3: double-bit binary inputs
A.4.1 Double-bit binary input\u2014packed format
A.4.1.1 Description
A.4.1.2 Coding
A.4.1.2.1 Pictorial
A.4.1.2.2 Formal structure
A.4.1.2.3 Notes <\/td>\n<\/tr>\n
536<\/td>\nA.4.2 Double-bit binary input\u2014with flags
A.4.2.1 Description
A.4.2.2 Coding
A.4.2.2.1 Pictorial
A.4.2.2.2 Formal structure
A.4.2.2.3 Notes <\/td>\n<\/tr>\n
537<\/td>\nA.5 Object group 4: double-bit binary input events
A.5.1 Double-bit binary input event\u2014without time
A.5.1.1 Description
A.5.1.2 Coding
A.5.1.2.1 Pictorial
A.5.1.2.2 Formal structure
A.5.1.2.3 Notes <\/td>\n<\/tr>\n
538<\/td>\nA.5.2 Double-bit binary input event\u2014with absolute time
A.5.2.1 Description
A.5.2.2 Coding
A.5.2.2.1 Pictorial
A.5.2.2.2 Formal structure
A.5.2.2.3 Notes <\/td>\n<\/tr>\n
539<\/td>\nA.5.3 Double-bit binary input event\u2014with relative time
A.5.3.1 Description
A.5.3.2 Coding
A.5.3.2.1 Pictorial
A.5.3.2.2 Formal structure
A.5.3.2.3 Notes <\/td>\n<\/tr>\n
540<\/td>\nA.6 Object group 10: binary outputs
A.6.1 Binary output\u2014packed format
A.6.1.1 Description
A.6.1.2 Coding
A.6.1.2.1 Pictorial
A.6.1.2.2 Formal structure <\/td>\n<\/tr>\n
541<\/td>\nA.6.1.2.3 Notes <\/td>\n<\/tr>\n
542<\/td>\nA.6.2 Binary output\u2014output status with flags
A.6.2.1 Description
A.6.2.2 Coding
A.6.2.2.1 Pictorial
A.6.2.2.2 Formal structure
A.6.2.2.3 Notes <\/td>\n<\/tr>\n
543<\/td>\nA.7 Object group 11: binary output events
A.7.1 Binary output event\u2014status without time
A.7.1.1 Description <\/td>\n<\/tr>\n
544<\/td>\nA.7.1.2 Coding
A.7.1.2.1 Pictorial
A.7.1.2.2 Formal structure
A.7.1.2.3 Notes <\/td>\n<\/tr>\n
545<\/td>\nA.7.2 Binary output event\u2014status with time
A.7.2.1 Description
A.7.2.2 Coding
A.7.2.2.1 Pictorial
A.7.2.2.2 Formal structure <\/td>\n<\/tr>\n
546<\/td>\nA.7.2.2.3 Notes <\/td>\n<\/tr>\n
547<\/td>\nA.8 Object group 12: binary output commands
A.8.1 Binary output command\u2014control relay output block\u2014also known as CROB
A.8.1.1 Description
A.8.1.2 Coding
A.8.1.2.1 Pictorial
A.8.1.2.2 Formal structure <\/td>\n<\/tr>\n
549<\/td>\nA.8.1.3 Notes
A.8.1.3.1 Timing illustrations <\/td>\n<\/tr>\n
550<\/td>\nA.8.1.3.2 Operational functions
A.8.1.3.2.1 Interoperable commands <\/td>\n<\/tr>\n
551<\/td>\nA.8.1.3.2.2 Additional requirements <\/td>\n<\/tr>\n
552<\/td>\nA.8.1.3.2.3 Interpreting the time fields
A.8.1.3.2.4 Master configuration
A.8.1.3.2.5 Minimal outstation implementation
A.8.1.3.2.6 Point index correlation <\/td>\n<\/tr>\n
553<\/td>\nA.8.2 Binary output command\u2014pattern control block\u2014also known as PCB
A.8.2.1 Description
A.8.2.2 Coding
A.8.2.2.1 Pictorial
A.8.2.2.2 Formal structure <\/td>\n<\/tr>\n
554<\/td>\nA.8.2.2.3 Notes <\/td>\n<\/tr>\n
555<\/td>\nA.8.3 Binary output command\u2014pattern mask
A.8.3.1 Description
A.8.3.2 Coding
A.8.3.2.1 Pictorial
A.8.3.2.2 Formal structure
A.8.3.2.3 Notes <\/td>\n<\/tr>\n
556<\/td>\nA.9 Object group 13: binary output command events
A.9.1 Binary output command event\u2014command status without time
A.9.1.1 Description <\/td>\n<\/tr>\n
557<\/td>\nA.9.1.2 Coding
A.9.1.2.1 Pictorial
A.9.1.2.2 Formal structure
A.9.1.2.3 Notes <\/td>\n<\/tr>\n
558<\/td>\nA.9.2 Binary output command event\u2014command status with time
A.9.2.1 Description
A.9.2.2 Coding
A.9.2.2.1 Pictorial
A.9.2.2.2 Formal structure
A.9.2.2.3 Notes <\/td>\n<\/tr>\n
559<\/td>\nA.10 Object group 20: counters
A.10.1 Counter\u201432-bit with flag
A.10.1.1 Description
A.10.1.2 Coding
A.10.1.2.1 Pictorial
A.10.1.2.2 Formal structure
A.10.1.2.3 Notes <\/td>\n<\/tr>\n
560<\/td>\nA.10.2 Counter\u201416-bit with flag
A.10.2.1 Description
A.10.2.2 Coding
A.10.2.2.1 Pictorial
A.10.2.2.2 Formal structure
A.10.2.2.3 Notes <\/td>\n<\/tr>\n
561<\/td>\nA.10.3 Counter\u201432-bit with flag, delta
A.10.3.1 Description
A.10.3.2 Coding
A.10.3.2.1 Pictorial
A.10.3.2.2 Formal structure
A.10.3.2.3 Notes <\/td>\n<\/tr>\n
562<\/td>\nA.10.4 Counter\u201416-bit with flag, delta
A.10.4.1 Description
A.10.4.2 Coding
A.10.4.2.1 Pictorial
A.10.4.2.2 Formal structure
A.10.4.2.3 Notes <\/td>\n<\/tr>\n
563<\/td>\nA.10.5 Counter\u201432-bit without flag
A.10.5.1 Description
A.10.5.2 Coding
A.10.5.2.1 Pictorial
A.10.5.2.2 Formal structure
A.10.5.2.3 Notes <\/td>\n<\/tr>\n
564<\/td>\nA.10.6 Counter\u201416-bit without flag
A.10.6.1 Description
A.10.6.2 Coding
A.10.6.2.1 Pictorial
A.10.6.2.2 Formal structure
A.10.6.2.3 Notes <\/td>\n<\/tr>\n
565<\/td>\nA.10.7 Counter\u201432-bit without flag, delta
A.10.7.1 Description
A.10.7.2 Coding
A.10.7.2.1 Pictorial
A.10.7.2.2 Formal structure
A.10.7.2.3 Notes <\/td>\n<\/tr>\n
566<\/td>\nA.10.8 Counter\u201416-bit without flag, delta
A.10.8.1 Description
A.10.8.2 Coding
A.10.8.2.1 Pictorial
A.10.8.2.2 Formal structure
A.10.8.2.3 Notes <\/td>\n<\/tr>\n
567<\/td>\nA.11 Object group 21: frozen counters
A.11.1 Frozen counter\u201432-bit with flag
A.11.1.1 Description
A.11.1.2 Coding
A.11.1.2.1 Pictorial
A.11.1.2.2 Formal structure
A.11.1.2.3 Notes <\/td>\n<\/tr>\n
568<\/td>\nA.11.2 Frozen counter\u201416-bit with flag
A.11.2.1 Description
A.11.2.2 Coding
A.11.2.2.1 Pictorial
A.11.2.2.2 Formal structure
A.11.2.2.3 Notes <\/td>\n<\/tr>\n
569<\/td>\nA.11.3 Frozen counter\u201432-bit with flag, delta
A.11.3.1 Description
A.11.3.2 Coding
A.11.3.2.1 Pictorial
A.11.3.2.2 Formal structure
A.11.3.2.3 Notes <\/td>\n<\/tr>\n
570<\/td>\nA.11.4 Frozen counter\u201416-bit with flag, delta
A.11.4.1 Description
A.11.4.2 Coding
A.11.4.2.1 Pictorial
A.11.4.2.2 Formal structure
A.11.4.2.3 Notes <\/td>\n<\/tr>\n
571<\/td>\nA.11.5 Frozen counter\u201432-bit with flag and time
A.11.5.1 Description
A.11.5.2 Coding
A.11.5.2.1 Pictorial
A.11.5.2.2 Formal structure <\/td>\n<\/tr>\n
572<\/td>\nA.11.5.2.3 Notes <\/td>\n<\/tr>\n
573<\/td>\nA.11.6 Frozen counter\u201416-bit with flag and time
A.11.6.1 Description
A.11.6.2 Coding
A.11.6.2.1 Pictorial
A.11.6.2.2 Formal structure <\/td>\n<\/tr>\n
574<\/td>\nA.11.6.2.3 Notes <\/td>\n<\/tr>\n
575<\/td>\nA.11.7 Frozen counter\u201432-bit with flag and time, delta
A.11.7.1 Description
A.11.7.2 Coding
A.11.7.2.1 Pictorial
A.11.7.2.2 Formal structure <\/td>\n<\/tr>\n
576<\/td>\nA.11.7.2.3 Notes <\/td>\n<\/tr>\n
577<\/td>\nA.11.8 Frozen counter\u201416-bit with flag and time, delta
A.11.8.1 Description
A.11.8.2 Coding
A.11.8.2.1 Pictorial
A.11.8.2.2 Formal structure <\/td>\n<\/tr>\n
578<\/td>\nA.11.8.2.3 Notes <\/td>\n<\/tr>\n
579<\/td>\nA.11.9 Frozen counter\u201432-bit without flag
A.11.9.1 Description
A.11.9.2 Coding
A.11.9.2.1 Pictorial
A.11.9.2.2 Formal structure
A.11.9.2.3 Notes <\/td>\n<\/tr>\n
580<\/td>\nA.11.10 Frozen counter\u201416-bit without flag
A.11.10.1 Description
A.11.10.2 Coding
A.11.10.2.1 Pictorial
A.11.10.2.2 Formal structure
A.11.10.2.3 Notes <\/td>\n<\/tr>\n
581<\/td>\nA.11.11 Frozen counter\u201432-bit without flag, delta
A.11.11.1 Description
A.11.11.2 Coding
A.11.11.2.1 Pictorial
A.11.11.2.2 Formal structure
A.11.11.2.3 Notes <\/td>\n<\/tr>\n
582<\/td>\nA.11.12 Frozen counter\u201416-bit without flag, delta
A.11.12.1 Description
A.11.12.2 Coding
A.11.12.2.1 Pictorial
A.11.12.2.2 Formal structure
A.11.12.2.3 Notes <\/td>\n<\/tr>\n
583<\/td>\nA.12 Object group 22: counter events
A.12.1 Counter event\u201432-bit with flag
A.12.1.1 Description
A.12.1.2 Coding
A.12.1.2.1 Pictorial
A.12.1.2.2 Formal structure
A.12.1.2.3 Notes <\/td>\n<\/tr>\n
584<\/td>\nA.12.2 Counter event\u201416-bit with flag
A.12.2.1 Description
A.12.2.2 Coding
A.12.2.2.1 Pictorial
A.12.2.2.2 Formal structure
A.12.2.2.3 Notes <\/td>\n<\/tr>\n
585<\/td>\nA.12.3 Counter event\u201432-bit with flag, delta
A.12.3.1 Description
A.12.3.2 Coding
A.12.3.2.1 Pictorial
A.12.3.2.2 Formal structure
A.12.3.2.3 Notes <\/td>\n<\/tr>\n
586<\/td>\nA.12.4 Counter event\u201416-bit with flag, delta
A.12.4.1 Description
A.12.4.2 Coding
A.12.4.2.1 Pictorial
A.12.4.2.2 Formal structure
A.12.4.2.3 Notes <\/td>\n<\/tr>\n
587<\/td>\nA.12.5 Counter event\u201432-bit with flag and time
A.12.5.1 Description
A.12.5.2 Coding
A.12.5.2.1 Pictorial
A.12.5.2.2 Formal structure <\/td>\n<\/tr>\n
588<\/td>\nA.12.5.2.3 Notes <\/td>\n<\/tr>\n
589<\/td>\nA.12.6 Counter event\u201416-bit with flag and time
A.12.6.1 Description
A.12.6.2 Coding
A.12.6.2.1 Pictorial
A.12.6.2.2 Formal structure <\/td>\n<\/tr>\n
590<\/td>\nA.12.6.2.3 Notes <\/td>\n<\/tr>\n
591<\/td>\nA.12.7 Counter event\u201432-bit with flag and time, delta
A.12.7.1 Description
A.12.7.2 Coding
A.12.7.2.1 Pictorial
A.12.7.2.2 Formal structure <\/td>\n<\/tr>\n
592<\/td>\nA.12.7.2.3 Notes <\/td>\n<\/tr>\n
593<\/td>\nA.12.8 Counter event\u201416-bit with flag and time, delta
A.12.8.1 Description
A.12.8.2 Coding
A.12.8.2.1 Pictorial
A.12.8.2.2 Formal structure <\/td>\n<\/tr>\n
594<\/td>\nA.12.8.2.3 Notes <\/td>\n<\/tr>\n
595<\/td>\nA.13 Object group 23: frozen counter events
A.13.1 Frozen counter event\u201432-bit with flag
A.13.1.1 Description
A.13.1.2 Coding
A.13.1.2.1 Pictorial
A.13.1.2.2 Formal structure
A.13.1.2.3 Notes <\/td>\n<\/tr>\n
596<\/td>\nA.13.2 Frozen counter event\u201416-bit with flag
A.13.2.1 Description
A.13.2.2 Coding
A.13.2.2.1 Pictorial
A.13.2.2.2 Formal structure
A.13.2.2.3 Notes <\/td>\n<\/tr>\n
597<\/td>\nA.13.3 Frozen counter event\u201432-bit with flag, delta
A.13.3.1 Description
A.13.3.2 Coding
A.13.3.2.1 Pictorial
A.13.3.2.2 Formal structure
A.13.3.2.3 Notes <\/td>\n<\/tr>\n
598<\/td>\nA.13.4 Frozen counter event\u201416-bit with flag, delta
A.13.4.1 Description
A.13.4.2 Coding
A.13.4.2.1 Pictorial
A.13.4.2.2 Formal structure
A.13.4.2.3 Notes <\/td>\n<\/tr>\n
599<\/td>\nA.13.5 Frozen counter event\u201432-bit with flag and time
A.13.5.1 Description
A.13.5.2 Coding
A.13.5.2.1 Pictorial
A.13.5.2.2 Formal structure <\/td>\n<\/tr>\n
600<\/td>\nA.13.5.2.3 Notes <\/td>\n<\/tr>\n
601<\/td>\nA.13.6 Frozen counter event\u201416-bit with flag and time
A.13.6.1 Description
A.13.6.2 Coding
A.13.6.2.1 Pictorial
A.13.6.2.2 Formal structure <\/td>\n<\/tr>\n
602<\/td>\nA.13.6.2.3 Notes <\/td>\n<\/tr>\n
603<\/td>\nA.13.7 Frozen counter event\u201432-bit with flag and time, delta
A.13.7.1 Description
A.13.7.2 Coding
A.13.7.2.1 Pictorial
A.13.7.2.2 Formal structure <\/td>\n<\/tr>\n
604<\/td>\nA.13.7.2.3 Notes <\/td>\n<\/tr>\n
605<\/td>\nA.13.8 Frozen counter event\u201416-bit with flag and time, delta
A.13.8.1 Description
A.13.8.2 Coding
A.13.8.2.1 Pictorial
A.13.8.2.2 Formal structure <\/td>\n<\/tr>\n
606<\/td>\nA.13.8.2.3 Notes <\/td>\n<\/tr>\n
607<\/td>\nA.14 Object group 30: analog inputs
A.14.1 Analog input\u201432-bit with flag
A.14.1.1 Description
A.14.1.2 Coding
A.14.1.2.1 Pictorial
A.14.1.2.2 Formal structure
A.14.1.2.3 Notes <\/td>\n<\/tr>\n
608<\/td>\nA.14.2 Analog input\u201416-bit with flag
A.14.2.1 Description
A.14.2.2 Coding
A.14.2.2.1 Pictorial
A.14.2.2.2 Formal structure
A.14.2.2.3 Notes <\/td>\n<\/tr>\n
609<\/td>\nA.14.3 Analog input\u201432-bit without flag
A.14.3.1 Description
A.14.3.2 Coding
A.14.3.2.1 Pictorial
A.14.3.2.2 Formal structure
A.14.3.2.3 Notes <\/td>\n<\/tr>\n
610<\/td>\nA.14.4 Analog input\u201416-bit without flag
A.14.4.1 Description
A.14.4.2 Coding
A.14.4.2.1 Pictorial
A.14.4.2.2 Formal structure
A.14.4.2.3 Notes <\/td>\n<\/tr>\n
611<\/td>\nA.14.5 Analog input\u2014single-precision, floating-point with flag
A.14.5.1 Description
A.14.5.2 Coding
A.14.5.2.1 Pictorial
A.14.5.2.2 Formal structure
A.14.5.2.3 Notes <\/td>\n<\/tr>\n
612<\/td>\nA.14.6 Analog input\u2014double-precision, floating-point with flag
A.14.6.1 Description
A.14.6.2 Coding
A.14.6.2.1 Pictorial
A.14.6.2.2 Formal structure
A.14.6.2.3 Notes <\/td>\n<\/tr>\n
613<\/td>\nA.15 Object group 31: frozen analog inputs
A.15.1 Frozen analog input\u201432-bit with flag
A.15.1.1 Description
A.15.1.2 Coding
A.15.1.2.1 Pictorial
A.15.1.2.2 Formal structure
A.15.1.2.3 Notes <\/td>\n<\/tr>\n
614<\/td>\nA.15.2 Frozen analog input\u201416-bit with flag
A.15.2.1 Description
A.15.2.2 Coding
A.15.2.2.1 Pictorial
A.15.2.2.2 Formal structure
A.15.2.2.3 Notes <\/td>\n<\/tr>\n
615<\/td>\nA.15.3 Frozen analog input\u201432-bit with time-of-freeze
A.15.3.1 Description
A.15.3.2 Coding
A.15.3.2.1 Pictorial
A.15.3.2.2 Formal structure <\/td>\n<\/tr>\n
616<\/td>\nA.15.3.2.3 Notes <\/td>\n<\/tr>\n
617<\/td>\nA.15.4 Frozen analog input\u201416-bit with time-of-freeze
A.15.4.1 Description
A.15.4.2 Coding
A.15.4.2.1 Pictorial
A.15.4.2.2 Formal structure <\/td>\n<\/tr>\n
618<\/td>\nA.15.4.2.3 Notes <\/td>\n<\/tr>\n
619<\/td>\nA.15.5 Frozen analog input\u201432-bit without flag
A.15.5.1 Description
A.15.5.2 Coding
A.15.5.2.1 Pictorial
A.15.5.2.2 Formal structure
A.15.5.2.3 Notes <\/td>\n<\/tr>\n
620<\/td>\nA.15.6 Frozen analog input\u201416-bit without flag
A.15.6.1 Description
A.15.6.2 Coding
A.15.6.2.1 Pictorial
A.15.6.2.2 Formal structure
A.15.6.2.3 Notes <\/td>\n<\/tr>\n
621<\/td>\nA.15.7 Frozen analog input\u2014single-precision, floating-point with flag
A.15.7.1 Description
A.15.7.2 Coding
A.15.7.2.1 Pictorial
A.15.7.2.2 Formal structure
A.15.7.2.3 Notes <\/td>\n<\/tr>\n
622<\/td>\nA.15.8 Frozen analog input\u2014double-precision, floating-point with flag
A.15.8.1 Description
A.15.8.2 Coding
A.15.8.2.1 Pictorial
A.15.8.2.2 Formal structure
A.15.8.2.3 Notes <\/td>\n<\/tr>\n
623<\/td>\nA.16 Object group 32: analog input events
A.16.1 Analog input event\u201432-bit without time
A.16.1.1 Description
A.16.1.2 Coding
A.16.1.2.1 Pictorial
A.16.1.2.2 Formal structure
A.16.1.2.3 Notes <\/td>\n<\/tr>\n
624<\/td>\nA.16.2 Analog input event\u201416-bit without time
A.16.2.1 Description
A.16.2.2 Coding
A.16.2.2.1 Pictorial
A.16.2.2.2 Formal structure
A.16.2.2.3 Notes <\/td>\n<\/tr>\n
625<\/td>\nA.16.3 Analog input event\u201432-bit with time
A.16.3.1 Description
A.16.3.2 Coding
A.16.3.2.1 Pictorial
A.16.3.2.2 Formal structure <\/td>\n<\/tr>\n
626<\/td>\nA.16.3.2.3 Notes <\/td>\n<\/tr>\n
627<\/td>\nA.16.4 Analog input event\u201416-bit with time
A.16.4.1 Description
A.16.4.2 Coding
A.16.4.2.1 Pictorial
A.16.4.2.2 Formal structure <\/td>\n<\/tr>\n
628<\/td>\nA.16.4.2.3 Notes <\/td>\n<\/tr>\n
629<\/td>\nA.16.5 Analog input event\u2014single-precision, floating-point without time
A.16.5.1 Description
A.16.5.2 Coding
A.16.5.2.1 Pictorial
A.16.5.2.2 Formal structure
A.16.5.2.3 Notes <\/td>\n<\/tr>\n
630<\/td>\nA.16.6 Analog input event\u2014double-precision, floating-point without time
A.16.6.1 Description
A.16.6.2 Coding
A.16.6.2.1 Pictorial
A.16.6.2.2 Formal structure
A.16.6.2.3 Notes <\/td>\n<\/tr>\n
631<\/td>\nA.16.7 Analog input event\u2014single-precision, floating-point with time
A.16.7.1 Description
A.16.7.2 Coding
A.16.7.2.1 Pictorial
A.16.7.2.2 Formal structure <\/td>\n<\/tr>\n
632<\/td>\nA.16.7.2.3 Notes <\/td>\n<\/tr>\n
633<\/td>\nA.16.8 Analog input event\u2014double-precision, floating-point with time
A.16.8.1 Description
A.16.8.2 Coding
A.16.8.2.1 Pictorial
A.16.8.2.2 Formal structure <\/td>\n<\/tr>\n
634<\/td>\nA.16.8.2.3 Notes <\/td>\n<\/tr>\n
635<\/td>\nA.17 Object group 33: frozen analog input events
A.17.1 Frozen analog input event\u201432-bit without time
A.17.1.1 Description
A.17.1.2 Coding
A.17.1.2.1 Pictorial
A.17.1.2.2 Formal structure
A.17.1.2.3 Notes <\/td>\n<\/tr>\n
636<\/td>\nA.17.2 Frozen analog input event\u201416-bit without time
A.17.2.1 Description
A.17.2.2 Coding
A.17.2.2.1 Pictorial
A.17.2.2.2 Formal structure
A.17.2.2.3 Notes <\/td>\n<\/tr>\n
637<\/td>\nA.17.3 Frozen analog input event\u201432-bit with time
A.17.3.1 Description
A.17.3.2 Coding
A.17.3.2.1 Pictorial
A.17.3.2.2 Formal structure <\/td>\n<\/tr>\n
638<\/td>\nA.17.3.2.3 Notes <\/td>\n<\/tr>\n
639<\/td>\nA.17.4 Frozen analog input event\u201416-bit with time
A.17.4.1 Description
A.17.4.2 Coding
A.17.4.2.1 Pictorial
A.17.4.2.2 Formal structure <\/td>\n<\/tr>\n
640<\/td>\nA.17.4.2.3 Notes <\/td>\n<\/tr>\n
641<\/td>\nA.17.5 Frozen analog input event\u2014single-precision, floating-point without time
A.17.5.1 Description
A.17.5.2 Coding
A.17.5.2.1 Pictorial
A.17.5.2.2 Formal structure
A.17.5.2.3 Notes <\/td>\n<\/tr>\n
642<\/td>\nA.17.6 Frozen analog input event\u2014double-precision, floating-point without time
A.17.6.1 Description
A.17.6.2 Coding
A.17.6.2.1 Pictorial
A.17.6.2.2 Formal structure <\/td>\n<\/tr>\n
643<\/td>\nA.17.6.2.3 Notes <\/td>\n<\/tr>\n
644<\/td>\nA.17.7 Frozen analog input event\u2014single-precision, floating-point with time
A.17.7.1 Description
A.17.7.2 Coding
A.17.7.2.1 Pictorial
A.17.7.2.2 Formal structure <\/td>\n<\/tr>\n
645<\/td>\nA.17.7.2.3 Notes <\/td>\n<\/tr>\n
646<\/td>\nA.17.8 Frozen analog input event\u2014double-precision, floating-point with time
A.17.8.1 Description
A.17.8.2 Coding
A.17.8.2.1 Pictorial
A.17.8.2.2 Formal structure <\/td>\n<\/tr>\n
647<\/td>\nA.17.8.2.3 Notes <\/td>\n<\/tr>\n
648<\/td>\nA.18 Object group 34: analog input reporting deadbands
A.18.1 Analog input reporting deadband\u201416-bit
A.18.1.1 Description
A.18.1.2 Coding
A.18.1.2.1 Pictorial
A.18.1.2.2 Formal structure
A.18.1.2.3 Notes <\/td>\n<\/tr>\n
649<\/td>\nA.18.2 Analog input reporting deadband\u201432-bit
A.18.2.1 Description
A.18.2.2 Coding
A.18.2.2.1 Pictorial
A.18.2.2.2 Formal structure
A.18.2.2.3 Notes <\/td>\n<\/tr>\n
650<\/td>\nA.18.3 Analog input reporting deadband\u2014single-precision, floating-point
A.18.3.1 Description
A.18.3.2 Coding
A.18.3.2.1 Pictorial
A.18.3.2.2 Formal structure
A.18.3.2.3 Notes <\/td>\n<\/tr>\n
652<\/td>\nA.19 Object group 40: analog output status
A.19.1 Analog output status\u201432-bit with flag
A.19.1.1 Description
A.19.1.2 Coding
A.19.1.2.1 Pictorial
A.19.1.2.2 Formal structure
A.19.1.2.3 Notes <\/td>\n<\/tr>\n
653<\/td>\nA.19.2 Analog output status\u201416-bit with flag
A.19.2.1 Description
A.19.2.2 Coding
A.19.2.2.1 Pictorial
A.19.2.2.2 Formal structure
A.19.2.2.3 Notes <\/td>\n<\/tr>\n
654<\/td>\nA.19.3 Analog output status\u2014single-precision, floating-point with flag
A.19.3.1 Description
A.19.3.2 Coding
A.19.3.2.1 Pictorial
A.19.3.2.2 Formal structure
A.19.3.2.3 Notes <\/td>\n<\/tr>\n
655<\/td>\nA.19.4 Analog output status\u2014double-precision, floating-point with flag
A.19.4.1 Description
A.19.4.2 Coding
A.19.4.2.1 Pictorial
A.19.4.2.2 Formal structure <\/td>\n<\/tr>\n
656<\/td>\nA.19.4.2.3 Notes <\/td>\n<\/tr>\n
657<\/td>\nA.20 Object group 41: analog outputs
A.20.1 Analog output\u201432-bit
A.20.1.1 Description
A.20.1.2 Coding
A.20.1.2.1 Pictorial
A.20.1.2.2 Formal structure
A.20.1.2.3 Notes <\/td>\n<\/tr>\n
658<\/td>\nA.20.2 Analog output\u201416-bit
A.20.2.1 Description
A.20.2.2 Coding
A.20.2.2.1 Pictorial
A.20.2.2.2 Formal structure
A.20.2.2.3 Notes <\/td>\n<\/tr>\n
659<\/td>\nA.20.3 Analog output\u2014single-precision, floating-point
A.20.3.1 Description
A.20.3.2 Coding
A.20.3.2.1 Pictorial
A.20.3.2.2 Formal structure
A.20.3.2.3 Notes <\/td>\n<\/tr>\n
660<\/td>\nA.20.4 Analog output\u2014double-precision, floating-point
A.20.4.1 Description
A.20.4.2 Coding
A.20.4.2.1 Pictorial
A.20.4.2.2 Formal structure <\/td>\n<\/tr>\n
661<\/td>\nA.20.4.2.3 Notes <\/td>\n<\/tr>\n
662<\/td>\nA.21 Object group 42: analog output events
A.21.1 Analog output event\u201432-bit without time
A.21.1.1 Description <\/td>\n<\/tr>\n
663<\/td>\nA.21.1.2 Coding
A.21.1.2.1 Pictorial
A.21.1.2.2 Formal structure
A.21.1.2.3 Notes <\/td>\n<\/tr>\n
664<\/td>\nA.21.2 Analog output event\u201416-bit without time
A.21.2.1 Description
A.21.2.2 Coding
A.21.2.2.1 Pictorial
A.21.2.2.2 Formal structure
A.21.2.2.3 Notes <\/td>\n<\/tr>\n
665<\/td>\nA.21.3 Analog output event\u201432-bit with time
A.21.3.1 Description
A.21.3.2 Coding
A.21.3.2.1 Pictorial
A.21.3.2.2 Formal structure <\/td>\n<\/tr>\n
666<\/td>\nA.21.3.2.3 Notes <\/td>\n<\/tr>\n
667<\/td>\nA.21.4 Analog output event\u201416-bit with time
A.21.4.1 Description
A.21.4.2 Coding
A.21.4.2.1 Pictorial
A.21.4.2.2 Formal structure <\/td>\n<\/tr>\n
668<\/td>\nA.21.4.2.3 Notes <\/td>\n<\/tr>\n
669<\/td>\nA.21.5 Analog output event\u2014single-precision, floating-point without time
A.21.5.1 Description
A.21.5.2 Coding
A.21.5.2.1 Pictorial
A.21.5.2.2 Formal structure
A.21.5.2.3 Notes <\/td>\n<\/tr>\n
670<\/td>\nA.21.6 Analog output event\u2014double-precision, floating-point without time
A.21.6.1 Description
A.21.6.2 Coding
A.21.6.2.1 Pictorial
A.21.6.2.2 Formal structure <\/td>\n<\/tr>\n
671<\/td>\nA.21.6.2.3 Notes <\/td>\n<\/tr>\n
672<\/td>\nA.21.7 Analog output event\u2014single-precision, floating-point with time
A.21.7.1 Description
A.21.7.2 Coding
A.21.7.2.1 Pictorial
A.21.7.2.2 Formal structure <\/td>\n<\/tr>\n
673<\/td>\nA.21.7.2.3 Notes <\/td>\n<\/tr>\n
674<\/td>\nA.21.8 Analog output event\u2014double-precision, floating-point with time
A.21.8.1 Description
A.21.8.2 Coding
A.21.8.2.1 Pictorial
A.21.8.2.2 Formal structure <\/td>\n<\/tr>\n
675<\/td>\nA.21.8.2.3 Notes <\/td>\n<\/tr>\n
676<\/td>\nA.22 Object group 43: analog output command events
A.22.1 Analog output command event\u201432-bit without time
A.22.1.1 Description <\/td>\n<\/tr>\n
677<\/td>\nA.22.1.2 Coding
A.22.1.2.1 Pictorial
A.22.1.2.2 Formal structure
A.22.1.2.3 Notes <\/td>\n<\/tr>\n
678<\/td>\nA.22.2 Analog output command event\u201416-bit without time
A.22.2.1 Description
A.22.2.2 Coding
A.22.2.2.1 Pictorial
A.22.2.2.2 Formal structure
A.22.2.2.3 Notes <\/td>\n<\/tr>\n
679<\/td>\nA.22.3 Analog output command event\u201432-bit with time
A.22.3.1 Description
A.22.3.2 Coding
A.22.3.2.1 Pictorial
A.22.3.2.2 Formal structure <\/td>\n<\/tr>\n
680<\/td>\nA.22.3.2.3 Notes <\/td>\n<\/tr>\n
681<\/td>\nA.22.4 Analog output command event\u201416-bit with time
A.22.4.1 Description
A.22.4.2 Coding
A.22.4.2.1 Pictorial
A.22.4.2.2 Formal structure <\/td>\n<\/tr>\n
682<\/td>\nA.22.4.2.3 Notes <\/td>\n<\/tr>\n
683<\/td>\nA.22.5 Analog output command event\u2014single-precision, floating-point without time
A.22.5.1 Description
A.22.5.2 Coding
A.22.5.2.1 Pictorial
A.22.5.2.2 Formal structure
A.22.5.2.3 Notes <\/td>\n<\/tr>\n
684<\/td>\nA.22.6 Analog output command event\u2014double-precision, floating-point without time
A.22.6.1 Description
A.22.6.2 Coding
A.22.6.2.1 Pictorial
A.22.6.2.2 Formal structure <\/td>\n<\/tr>\n
685<\/td>\nA.22.6.2.3 Notes <\/td>\n<\/tr>\n
686<\/td>\nA.22.7 Analog output command event\u2014single-precision, floating-point with time
A.22.7.1 Description
A.22.7.2 Coding
A.22.7.2.1 Pictorial
A.22.7.2.2 Formal structure <\/td>\n<\/tr>\n
687<\/td>\nA.22.7.2.3 Notes <\/td>\n<\/tr>\n
688<\/td>\nA.22.8 Analog output command event\u2014double-precision, floating-point with time
A.22.8.1 Description
A.22.8.2 Coding
A.22.8.2.1 Pictorial
A.22.8.2.2 Formal structure <\/td>\n<\/tr>\n
689<\/td>\nA.22.8.2.3 Notes <\/td>\n<\/tr>\n
690<\/td>\nA.23 Object group 50: time and date
A.23.1 Time and date\u2014absolute time
A.23.1.1 Description
A.23.1.2 Coding
A.23.1.2.1 Pictorial
A.23.1.2.2 Formal structure
A.23.1.2.3 Notes <\/td>\n<\/tr>\n
691<\/td>\nA.23.2 Time and date\u2014absolute time and interval
A.23.2.1 Description
A.23.2.2 Coding
A.23.2.2.1 Pictorial
A.23.2.2.2 Formal structure <\/td>\n<\/tr>\n
692<\/td>\nA.23.3 Time and date\u2014absolute time at last recorded time
A.23.3.1 Description
A.23.3.2 Coding
A.23.3.2.1 Pictorial
A.23.3.2.2 Formal structure
A.23.3.2.3 Notes <\/td>\n<\/tr>\n
693<\/td>\nA.23.4 Time and date\u2014indexed absolute time and long interval
A.23.4.1 Description
A.23.4.2 Coding:
A.23.4.2.1 Pictorial
A.23.4.2.2 Formal structure <\/td>\n<\/tr>\n
694<\/td>\nA.23.4.2.3 Notes <\/td>\n<\/tr>\n
696<\/td>\nA.24 Object group 51: time and date common time-of-occurrences
A.24.1 Time and date common time-of-occurrence\u2014absolute time, synchronized
A.24.1.1 Description
A.24.1.2 Coding
A.24.1.2.1 Pictorial
A.24.1.2.2 Formal structure
A.24.1.2.3 Notes <\/td>\n<\/tr>\n
698<\/td>\nA.24.2 Time and date common time-of-occurrence\u2014absolute time, unsynchronized
A.24.2.1 Description
A.24.2.2 Coding
A.24.2.2.1 Pictorial
A.24.2.2.2 Formal structure
A.24.2.2.3 Notes <\/td>\n<\/tr>\n
700<\/td>\nA.25 Object group 52: time delays
A.25.1 Time delay\u2014coarse
A.25.1.1 Description
A.25.1.2 Coding
A.25.1.2.1 Pictorial
A.25.1.2.2 Formal structure
A.25.1.2.3 Notes <\/td>\n<\/tr>\n
701<\/td>\nA.25.2 Time delay\u2014fine
A.25.2.1 Description
A.25.2.2 Coding
A.25.2.2.1 Pictorial
A.25.2.2.2 Formal structure
A.25.2.2.3 Notes <\/td>\n<\/tr>\n
702<\/td>\nA.26 Object group 60: class objects
A.26.1 Class objects\u2014Class 0 data
A.26.1.1 Description
A.26.1.2 Coding
A.26.1.2.1 Notes <\/td>\n<\/tr>\n
703<\/td>\nA.26.2 Class objects\u2014Class 1 data
A.26.2.1 Description
A.26.2.2 Coding
A.26.2.2.1 Notes <\/td>\n<\/tr>\n
704<\/td>\nA.26.3 Class objects\u2014Class 2 data
A.26.3.1 Description
A.26.3.2 Coding
A.26.3.2.1 Notes <\/td>\n<\/tr>\n
705<\/td>\nA.26.4 Class objects\u2014Class 3 data
A.26.4.1 Description
A.26.4.2 Coding
A.26.4.2.1 Notes <\/td>\n<\/tr>\n
706<\/td>\nA.27 Object group 70: file-control
A.27.1 File-control\u2014file identifier\u2014superseded
A.27.1.1 Description
A.27.1.2 Coding
A.27.1.2.1 Pictorial <\/td>\n<\/tr>\n
708<\/td>\nA.27.1.2.2 Formal structure <\/td>\n<\/tr>\n
709<\/td>\nA.27.1.2.3 Notes <\/td>\n<\/tr>\n
710<\/td>\nA.27.2 File-control\u2014authentication
A.27.2.1 Description
A.27.2.2 Coding
A.27.2.2.1 Pictorial
A.27.2.2.2 Formal structure <\/td>\n<\/tr>\n
711<\/td>\nA.27.2.2.3 Notes <\/td>\n<\/tr>\n
712<\/td>\nA.27.3 File-control\u2014file command
A.27.3.1 Description
A.27.3.2 Coding
A.27.3.2.1 Pictorial <\/td>\n<\/tr>\n
713<\/td>\nA.27.3.2.2 Formal structure <\/td>\n<\/tr>\n
715<\/td>\nA.27.3.2.3 Notes <\/td>\n<\/tr>\n
716<\/td>\nA.27.4 File-control\u2014file command status
A.27.4.1 Description
A.27.4.1.1 Responses
A.27.4.1.2 Requests
A.27.4.2 Coding
A.27.4.2.1 Pictorial <\/td>\n<\/tr>\n
717<\/td>\nA.27.4.2.2 Formal structure <\/td>\n<\/tr>\n
719<\/td>\nA.27.5 File-control\u2014file transport
A.27.5.1 Description
A.27.5.1.1 Requests
A.27.5.1.2 Responses
A.27.5.2 Coding
A.27.5.2.1 Pictorial
A.27.5.2.2 Formal structure <\/td>\n<\/tr>\n
720<\/td>\nA.27.5.2.3 Notes <\/td>\n<\/tr>\n
721<\/td>\nA.27.6 File-control\u2014file transport status
A.27.6.1 Description
A.27.6.2 Coding
A.27.6.2.1 Pictorial
A.27.6.2.2 Formal structure <\/td>\n<\/tr>\n
723<\/td>\nA.27.7 File-control\u2014file descriptor
A.27.7.1 Description
A.27.7.1.1 Requests
A.27.7.1.2 Responses <\/td>\n<\/tr>\n
724<\/td>\nA.27.7.2 Coding
A.27.7.2.1 Pictorial
A.27.7.2.2 Formal structure <\/td>\n<\/tr>\n
726<\/td>\nA.27.8 File-control\u2014file specification string
A.27.8.1 Description
A.27.8.2 Coding
A.27.8.2.1 Pictorial
A.27.8.2.2 Formal structure
A.27.8.2.3 Notes <\/td>\n<\/tr>\n
728<\/td>\nA.28 Object group 80: internal indications
A.28.1 Internal indications\u2014packed format
A.28.1.1 Description
A.28.1.2 Coding
A.28.1.2.1 Pictorial <\/td>\n<\/tr>\n
729<\/td>\nA.28.1.2.2 Formal structure <\/td>\n<\/tr>\n
730<\/td>\nA.29 Object group 81: device storage
A.29.1 Device storage\u2014buffer fill status
A.29.1.1 Description
A.29.1.2 Coding
A.29.1.2.1 Pictorial
A.29.1.2.2 Formal structure
A.29.1.2.3 Notes <\/td>\n<\/tr>\n
731<\/td>\nA.30 Object group 82: Device Profiles
A.30.1 Device Profile\u2014functions and indexes
A.30.1.1 Description <\/td>\n<\/tr>\n
732<\/td>\nA.30.1.2 Coding
A.30.1.2.1 Pictorial
A.30.1.2.2 Formal structure <\/td>\n<\/tr>\n
734<\/td>\nA.31 Object group 83: data sets
A.31.1 Data set\u2014private registration object
A.31.1.1 Description
A.31.1.2 Coding
A.31.1.2.1 Pictorial <\/td>\n<\/tr>\n
735<\/td>\nA.31.1.2.2 Formal structure
A.31.1.2.3 Notes <\/td>\n<\/tr>\n
736<\/td>\nA.31.2 Data set\u2014private registration object descriptor
A.31.2.1 Description
A.31.2.2 Coding
A.31.2.2.1 Pictorial <\/td>\n<\/tr>\n
737<\/td>\nA.31.2.2.2 Formal structure
A.31.2.2.3 Format of data object specifier
A.31.2.2.4 Notes <\/td>\n<\/tr>\n
738<\/td>\nA.32 Object group 85: data set prototypes
A.32.1 Data set prototype\u2014with UUID
A.32.1.1 Description
A.32.1.2 Coding
A.32.1.2.1 Pictorial
A.32.1.2.2 Formal structure <\/td>\n<\/tr>\n
739<\/td>\nA.32.1.2.3 Notes <\/td>\n<\/tr>\n
740<\/td>\nA.33 Object group 86: data set descriptors
A.33.1 Data set descriptor\u2014data set contents
A.33.1.1 Description
A.33.1.2 Coding
A.33.1.2.1 Pictorial
A.33.1.2.2 Formal structure <\/td>\n<\/tr>\n
741<\/td>\nA.33.1.2.3 Notes <\/td>\n<\/tr>\n
742<\/td>\nA.33.2 Data set descriptor\u2014characteristics
A.33.2.1 Description
A.33.2.2 Coding
A.33.2.2.1 Pictorial
A.33.2.2.2 Formal structure
A.33.2.2.3 Notes <\/td>\n<\/tr>\n
743<\/td>\nA.33.3 Data set descriptor\u2014point index attributes
A.33.3.1 Description
A.33.3.2 Coding
A.33.3.2.1 Pictorial
A.33.3.2.2 Formal structure <\/td>\n<\/tr>\n
744<\/td>\nA.33.3.2.3 Notes <\/td>\n<\/tr>\n
745<\/td>\nA.34 Object group 87: data sets
A.34.1 Data set\u2014present value
A.34.1.1 Description
A.34.1.2 Coding
A.34.1.2.1 Pictorial
A.34.1.2.2 Formal structure <\/td>\n<\/tr>\n
746<\/td>\nA.34.1.2.3 Notes <\/td>\n<\/tr>\n
747<\/td>\nA.35 Object group 88: data set events
A.35.1 Data set event\u2014snapshot
A.35.1.1 Description
A.35.1.2 Coding
A.35.1.2.1 Pictorial
A.35.1.2.2 Formal structure <\/td>\n<\/tr>\n
748<\/td>\nA.35.1.2.3 Notes <\/td>\n<\/tr>\n
749<\/td>\nA.36 Object group 90: applications
A.36.1 Application\u2014identifier
A.36.1.1 Description
A.36.1.2 Coding
A.36.1.2.1 Pictorial
A.36.1.2.2 Formal structure
A.36.1.2.3 Notes <\/td>\n<\/tr>\n
750<\/td>\nA.37 Object group 91: status of requested operations
A.37.1 Status of requested operation\u2014active configuration
A.37.1.1 Description
A.37.1.2 Coding
A.37.1.2.1 Pictorial
A.37.1.2.2 Formal structure <\/td>\n<\/tr>\n
751<\/td>\nA.37.1.2.3 Notes <\/td>\n<\/tr>\n
752<\/td>\nA.38 Object group 100: floating-point
A.38.1 Floating-point\u2014none\u2014general description common to all variations
A.38.1.1 Description <\/td>\n<\/tr>\n
753<\/td>\nA.39 Object group 101: binary-coded decimal integers
A.39.1 Binary-coded decimal integer\u2014small
A.39.1.1 Description
A.39.1.2 Coding
A.39.1.2.1 Pictorial
A.39.1.2.2 Formal structure <\/td>\n<\/tr>\n
754<\/td>\nA.39.2 Binary-coded decimal integer\u2014medium
A.39.2.1 Description
A.39.2.2 Coding
A.39.2.2.1 Pictorial
A.39.2.2.2 Formal structure <\/td>\n<\/tr>\n
755<\/td>\nA.39.3 Binary-coded decimal integer\u2014large
A.39.3.1 Description
A.39.3.2 Coding
A.39.3.2.1 Pictorial
A.39.3.2.2 Formal structure <\/td>\n<\/tr>\n
756<\/td>\nA.40 Object group 102: unsigned integers
A.40.1 Unsigned integer\u20148-bit
A.40.1.1 Description
A.40.1.2 Coding
A.40.1.2.1 Pictorial
A.40.1.2.2 Formal structure <\/td>\n<\/tr>\n
757<\/td>\nA.41 Object group 110: octet strings
A.41.1 Octet string\u2014none\u2014general description common to all variations
A.41.1.1 Description
A.41.1.2 Coding
A.41.1.2.1 Pictorial
A.41.1.2.2 Formal structure
A.41.1.2.3 Notes <\/td>\n<\/tr>\n
758<\/td>\nA.42 Object group 111: octet string events
A.42.1 Octet string event\u2014none\u2014general description common to all variations
A.42.1.1 Description
A.42.1.2 Coding
A.42.1.2.1 Pictorial
A.42.1.2.2 Formal structure
A.42.1.2.3 Notes <\/td>\n<\/tr>\n
759<\/td>\nA.43 Object group 112: virtual terminal output blocks
A.43.1 Virtual terminal output block\u2014none\u2014general description common to all variations
A.43.1.1 Description
A.43.1.2 Coding
A.43.1.2.1 Pictorial
A.43.1.2.2 Formal structure
A.43.1.2.3 Notes <\/td>\n<\/tr>\n
760<\/td>\nA.44 Object group 113: virtual terminal event data
A.44.1 Virtual terminal event data\u2014none\u2014general description common to all variations
A.44.1.1 Description
A.44.1.2 Coding
A.44.1.2.1 Pictorial
A.44.1.2.2 Formal structure
A.44.1.2.3 Notes <\/td>\n<\/tr>\n
761<\/td>\nA.45 Object group 120: authentication
A.45.1 Authentication\u2014challenge
A.45.1.1 Description
A.45.1.2 Coding
A.45.1.2.1 Pictorial <\/td>\n<\/tr>\n
762<\/td>\nA.45.1.2.2 Formal structure <\/td>\n<\/tr>\n
763<\/td>\nA.45.1.2.3 Notes <\/td>\n<\/tr>\n
764<\/td>\nA.45.2 Authentication\u2014reply
A.45.2.1 Description
A.45.2.2 Coding
A.45.2.2.1 Pictorial
A.45.2.2.2 Formal structure <\/td>\n<\/tr>\n
765<\/td>\nA.45.2.2.3 Notes <\/td>\n<\/tr>\n
766<\/td>\nA.45.3 Authentication\u2014Aggressive Mode request
A.45.3.1 Description
A.45.3.2 Coding
A.45.3.2.1 Pictorial
A.45.3.2.2 Formal structure <\/td>\n<\/tr>\n
767<\/td>\nA.45.3.2.3 Notes <\/td>\n<\/tr>\n
768<\/td>\nA.45.4 Authentication\u2014session key status request
A.45.4.1 Description
A.45.4.2 Coding
A.45.4.2.1 Pictorial
A.45.4.2.2 Formal structure
A.45.4.2.3 Notes <\/td>\n<\/tr>\n
769<\/td>\nA.45.5 Authentication\u2014session key status
A.45.5.1 Description
A.45.5.2 Coding
A.45.5.2.1 Pictorial <\/td>\n<\/tr>\n
770<\/td>\nA.45.5.2.2 Formal structure <\/td>\n<\/tr>\n
771<\/td>\nA.45.5.2.3 Notes <\/td>\n<\/tr>\n
772<\/td>\nA.45.6 Authentication\u2014session key change
A.45.6.1 Description
A.45.6.2 Coding
A.45.6.2.1 Pictorial
A.45.6.2.2 Formal structure <\/td>\n<\/tr>\n
774<\/td>\nA.45.6.2.3 Notes <\/td>\n<\/tr>\n
775<\/td>\nA.45.7 Authentication\u2014error
A.45.7.1 Description
A.45.7.2 Coding
A.45.7.2.1 Pictorial <\/td>\n<\/tr>\n
776<\/td>\nA.45.7.2.2 Formal structure <\/td>\n<\/tr>\n
777<\/td>\nA.45.7.2.3 Notes <\/td>\n<\/tr>\n
778<\/td>\nA.45.8 Authentication\u2014user certificate
A.45.8.1 Description
A.45.8.2 Coding
A.45.8.2.1 Pictorial
A.45.8.2.2 Formal structure <\/td>\n<\/tr>\n
782<\/td>\nA.45.8.3 Notes <\/td>\n<\/tr>\n
783<\/td>\nA.45.9 Authentication\u2014message authentication code (MAC)
A.45.9.1 Description
A.45.9.2 Coding
A.45.9.2.1 Pictorial
A.45.9.2.2 Formal structure <\/td>\n<\/tr>\n
784<\/td>\nA.45.9.3 Notes <\/td>\n<\/tr>\n
785<\/td>\nA.45.10 Authentication\u2014user status change
A.45.10.1 Description <\/td>\n<\/tr>\n
786<\/td>\nA.45.10.2 Coding
A.45.10.2.1 Pictorial <\/td>\n<\/tr>\n
787<\/td>\nA.45.10.2.2 Formal structure <\/td>\n<\/tr>\n
789<\/td>\nA.45.10.3 Notes <\/td>\n<\/tr>\n
790<\/td>\nA.45.11 Authentication\u2014update key change request
A.45.11.1 Description
A.45.11.2 Coding
A.45.11.2.1 Pictorial <\/td>\n<\/tr>\n
791<\/td>\nA.45.11.2.2 Formal structure
A.45.11.2.3 Notes <\/td>\n<\/tr>\n
792<\/td>\nA.45.12 Authentication\u2014update key change reply
A.45.12.1 Description
A.45.12.2 Coding
A.45.12.2.1 Pictorial
A.45.12.2.2 Formal structure <\/td>\n<\/tr>\n
793<\/td>\nA.45.12.2.3 Notes <\/td>\n<\/tr>\n
794<\/td>\nA.45.13 Authentication\u2014update key change
A.45.13.1 Description
A.45.13.2 Coding
A.45.13.2.1 Pictorial <\/td>\n<\/tr>\n
795<\/td>\nA.45.13.2.2 Formal structure
A.45.13.2.3 Notes <\/td>\n<\/tr>\n
796<\/td>\nA.45.14 Authentication\u2014update key change signature
A.45.14.1 Description
A.45.14.2 Coding
A.45.14.2.1 Pictorial
A.45.14.2.2 Formal structure <\/td>\n<\/tr>\n
797<\/td>\nA.45.14.2.3 Notes <\/td>\n<\/tr>\n
798<\/td>\nA.45.15 Authentication\u2014update key change confirmation
A.45.15.1 Description
A.45.15.2 Coding
A.45.15.2.1 Pictorial
A.45.15.2.2 Formal structure <\/td>\n<\/tr>\n
799<\/td>\nA.45.15.2.3 Notes <\/td>\n<\/tr>\n
800<\/td>\nA.46 Object group 121: security statistics
A.46.1 Security statistic\u201432-bit with flag
A.46.1.1 Description
A.46.1.2 Coding
A.46.1.2.1 Pictorial
A.46.1.2.2 Formal structure <\/td>\n<\/tr>\n
801<\/td>\nA.46.1.2.3 Notes <\/td>\n<\/tr>\n
802<\/td>\nA.47 Object group 122: security statistic events
A.47.1 Security statistic event\u201432-bit with flag
A.47.1.1 Description
A.47.1.2 Coding
A.47.1.2.1 Pictorial
A.47.1.2.2 Formal structure <\/td>\n<\/tr>\n
803<\/td>\nA.47.1.2.3 Notes <\/td>\n<\/tr>\n
804<\/td>\nA.47.2 Security statistic event\u201432-bit with flag and time
A.47.2.1 Description
A.47.2.2 Coding
A.47.2.2.1 Pictorial
A.47.2.2.2 Formal structure <\/td>\n<\/tr>\n
805<\/td>\nA.47.2.2.3 Notes <\/td>\n<\/tr>\n
806<\/td>\nAnnex B (informative) DNP3 quick reference <\/td>\n<\/tr>\n
811<\/td>\nAnnex C (informative) Associations
C.1 Introduction
C.2 Association definition
C.3 Association issues <\/td>\n<\/tr>\n
812<\/td>\nC.4 UDP associations
C.5 TCP associations <\/td>\n<\/tr>\n
814<\/td>\nAnnex D (normative) UTF-8 related copyright <\/td>\n<\/tr>\n
815<\/td>\nAnnex E (informative) Sample CRC calculations <\/td>\n<\/tr>\n
818<\/td>\nAnnex F (informative) Managing Secure Authentication updates
F.1 Introduction <\/td>\n<\/tr>\n
819<\/td>\nF.2 Secure Authentication version updates
F.3 Recommendations
F.3.1 For outstations
F.3.2 For master stations <\/td>\n<\/tr>\n
820<\/td>\nF.3.3 For DNP3 system users
F.3.4 Commercial considerations <\/td>\n<\/tr>\n
821<\/td>\nAnnex G (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2012<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":397996,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-397988","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/397988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/397996"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=397988"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=397988"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=397988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}