Shopping Cart

No products in the cart.

BSI PD CLC/TS 50560:2014:2015 Edition

$215.11

Interoperability framework requirement specification

Published By Publication Date Number of Pages
BSI 2015 90
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This Technical Specification contains a specification of an Interoperability Requirements Framework, specifying seven levels of interoperability, based on four groups of interoperability steps specified by five types of interaction, plus a methodology based on conformance clauses for satisfying requirements related to the claimed level of interoperability of devices installed in a Home and Building Electronic System (HBES, HES).

It is applicable to installations of a single type of HBES, or that interconnect two or more dissimilar HBESs. Within a HBES of a single type any of its capabilities for service, applications and connectivity topology can be used. Interconnection technologies used to interconnect dissimilar HBES are similarly unconstrained.

For applicable installations, the scope of its provisions applies to: the connection of devices to the various communications services to enable them to communicate end-to-end across internetworked media; the processes of discovery by which devices find out about each other and configuration to associate them with each other; and the generic aspects of application operation; and management.

This Technical Specification is not applicable to the interoperability required between devices to implement specific applications, such as heating or lighting control, energy management, or entertainment. The interoperability requirements defined in this Technical Specification are necessary for such application interoperability but not sufficient. This Technical Specification does not define how measurements are made; nor the algorithms that receive, process and respond to them; nor the interaction between users, service providers, and the HBES application(s). This is the responsibility of experts and organisations that specialise in particular application domains.

PDF Catalog

PDF Pages PDF Title
4 Contents
8 Foreword
9 Introduction
Figure 1
11 1 Scope
2 Normative References
12 3 Terms, definitions and Abbreviations
3.1 Security Definitions
14 3.2 Process Definitions
16 3.3 Interoperability
3.4 Abbreviations
19 4 The Interoperability Framework
4.1 The Function Steps
4.1.1 General
4.1.2 Discovery
4.1.3 Configuration
4.1.4 Operation
20 4.1.5 Management
4.2 The Levels
Table 1 – Interoperability Levels
21 5 Conformance clauses
5.1 Interoperability Conformance Requirements
5.1.1 General
5.1.2 Identifier
5.1.3 Object Description
22 5.1.4 Object Discovery
5.1.5 Object Configuration
5.1.6 Object Operation
5.1.7 Object Management
5.1.8 Object Access and Safety Requirements
5.2 Conformance sub-clauses
5.2.1 Object Identifier Description Requirements
23 5.2.2 Object Functional Description Requirements
5.2.2.1 General
5.2.2.2 Object Classification
5.2.2.3 Object Functional Interface
24 5.2.2.4 Object Discovery Interface
5.2.2.5 Object Configuration Interface
5.2.2.6 Object Management Interface
5.2.3 Discovery Process Requirements
5.2.3.1 General
5.2.3.2 Object Descriptions: Self and Objects to be Discovered
5.2.3.3 Communication Mode
5.2.3.4 Discovery Process
5.2.3.5 Discovery Scope
25 5.2.3.6 Security and Privacy
5.2.4 Configuration Process Requirements
5.2.4.1 General
5.2.4.2 Bindings
5.2.4.3 Communication Mode
5.2.4.4 Configuration Process
5.2.4.5 Security and Privacy
5.2.5 Operation Requirements
5.2.5.1 Application Operation
5.2.5.2 Security and Privacy
5.2.6 Management Requirements
5.2.6.1 Communication Mode
26 5.2.6.2 Management Process
5.2.6.3 Security and Privacy
5.2.7 Object Security, Safety and Priority and Access Requirements
5.2.7.1 Object Security
5.2.7.2 Object Safety
5.2.7.3 Object Access Rights
5.2.7.4 Object Priority of Control
27 Annex A (informative) Steps of discovery, configuration, operation and management
A.1 Methodology
A.1.1 Objectives
A.1.2 Assumptions
28 A.2 Approach
A.3 The Function Steps
A.3.1 General
A.3.2 Discovery
29 Table A.1
31 A.3.3 Configuration
32 A.3.4 Operation
A.3.5 Management
A.4 The Levels
A.4.1 Level 0
33 Figure A.1 – Collection of Level 0 Systems
A.4.2 Level 1
34 Figure A.2 – HBES System at Level 1
A.4.3 Level 2
35 Figure A.3 – Multiple interworking systems at Level 2
A.4.4 Level 3
36 Figure A.4 – Interoperability at Level 3
A.4.5 Level 4
37 Figure A.5 – IFRS Interoperability at Level 4
38 Table A.2
39 A.4.6 Level 5
Figure A.6 – IFRS Interoperability at Level 5
40 Table A.3
A.4.7 Level 6
41 Figure A.7: IFRS Interoperability at Level 6
Table A.4
42 A.4.8 Combinations of Different Levels in the Same Installation
Table A.5
43 A.5 Use Cases
A.5.1 Methodology
A.5.1.1 General
A.5.1.2 Describe use-case
44 Table A.6
Table A.7
A.5.2 Scenarios to Illustrate Interoperability Levels
A.5.2.1 General
45 A.5.2.2 Level 0
A.5.2.3 Level 1
A.5.2.4 Level 2
46 A.5.2.5 Level 3
A.5.2.6 Level 4
A.5.2.7 Level 5
47 A.5.2.8 Level 6
A.6 IFRS Methodology
A.6.1 General
A.6.2 Physical Layer, Pathways and Media (PHY)
48 A.6.3 Data Link Control (DLC)
49 A.6.4 Network Layer and Routing (NWK)
50 A.6.5 Transport and Session (TRS)
51 A.6.6 Presentation and Application (APP)
A.6.7 IFRS Issues – A Summary
52 A.6.8 Working Assumptions
53 A.6.9 Rationale for the Function Steps and Associated Processes
A.6.9.1 General
Table A.8
54 A.6.9.2 Architectural Issues
A.7 Security, Safety, Access and Priority Considerations
A.7.1 Introduction to Security Considerations
55 Table A.9 – Security, Safety and Access Rights and their priority by Interoperability Level
57 A.7.2 References and Standards
58 Annex B (normative) Interoperability Implementation Conformance Statement
B.1 Scope
B.2 References
B.3 Definitions and abbreviations
B.3.1 Definitions
B.3.1.1 General Definitions
62 B.3.1.2 Security Definitions
64 B.3.1.3 Interaction Model Definitions
68 B.3.1.4 Process Definition
69 B.3.1.5 Interoperability
70 B.3.1.6 Other Definitions
71 B.4 Requirements for Conformance to this IICS
B.4.1 General
B.4.2 Object Identifier Description Requirements
B.4.3 Object Functional Description Requirements
B.4.3.1 General
B.4.3.2 Object Classification
72 B.4.3.3 Object Discovery Interface
B.4.3.4 Object Configuration Interface
B.4.3.5 Object Management Interface
B.4.3.6 Object Functional Interface
B.4.4 Discovery Requirements
B.4.4.1 General
B.4.4.2 Object Descriptions: Self and Objects to be Discovered
73 B.4.4.3 Communication Mode
B.4.4.4 Discovery Process
B.4.4.5 Discovery Scope
B.4.4.6 Security and Privacy
B.4.5 Configuration Requirements
B.4.5.1 Bindings
B.4.5.2 Communication Mode
B.4.5.3 Configuration Process
74 B.4.5.4 Security and Privacy
B.4.6 Operation Requirements
B.4.6.1 Application Operation
B.4.6.2 Security and Privacy
B.4.7 Management Requirements
B.4.7.1 Communication Mode
B.4.7.2 Management Process
75 B.4.7.3 Security and Privacy
B.5 Instructions for Completion of the IICS
B.5.1 General
B.5.2 Key to the Table Entries
76 B.6 Global Statement of IICS Conformance
B.7 Specific Statements of IICS Conformance
B.7.1 General
B.7.2 Object Catalogue
77 B.7.3 Operation Catalogue
78 B.7.4 Object and Operation Interoperability Catalogue
79 B.7.5 Upper Layer PICS (APP)
B.7.5.1 General
B.7.5.2 Additional Requirements for Gateways at APP Layer
80 B.7.6 Network Layer and Routing PICS (NWK)
B.7.6.1 General
81 B.7.6.2 Additional Requirements for Gateways at NWK Layer
82 B.7.7 Data Link Control and MAC PICS (DLC/MAC)
B.7.7.1 General
83 B.7.7.2 Additional Requirements for Gateways at DLC/MAC Layer
84 B.7.8 Media and PHY PICS (PHY)
85 Bibliography
BSI PD CLC/TS 50560:2014
$215.11