13/30293476 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
Hardcopy , PDF
30-04-2016
English
FOREWORD
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Definition of data types
5 WIA-PA overview
6 System management
7 Physical Layer
8 Data link layer
9 Network layer
10 Application Layer
11 Security
Annex A (informative) - Security strategy for WIA-PA
network
Annex B (informative) - Format description
Annex C (informative) - Example of UAO
Annex D (informative) - Country-specific and region-specific
provisions
Annex E (informative) - Common modification for
European spectrum regulation
Bibliography
BS EN 62601
Committee |
AMT/7
|
DocumentType |
Draft
|
Pages |
218
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
ISO/IEC TR 10000-1:1998 | Information technology — Framework and taxonomy of International Standardized Profiles — Part 1: General principles and documentation framework |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 7498-1:1994 | Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
IEC TR 62390:2005 | Common automation device - Profile guideline |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 9899:2011 | Information technology Programming languages C |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
IEC 61499-1:2012 | Function blocks - Part 1: Architecture |
ISO/IEC 10181-5:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
IEC 61499-2:2012 | Function blocks - Part 2: Software tool requirements |
ISO/IEC 10181-6:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
IEEE 754-2008 REDLINE | IEEE Standard for Floating-Point Arithmetic |
IEC 61804-2:2006 | Function blocks (FB) for process control - Part 2: Specification of FB concept |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.