I.S. EN 62601:2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA
Hardcopy , PDF
21-04-2021
English
01-01-2016
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
National Foreword
FOREWORD
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Definition of data types
5 WIA-PA overview
6 System management
7 Physical layer
8 Data link layer
9 Network layer
10 Application layer
11 Security
Annex A (informative) - Security strategy for WIA-PA
network
Annex B (informative) - Format description
Annex C (informative) - Example of UAO
Annex D (informative) - Country-specific and region-
specific provisions
Annex E (informative) - Regional modification for
compliance with ETSI standards
Bibliography
Annex ZA (normative) - Normative references to
international publications with their
corresponding European publications
Defines the system architecture and the communication protocol of Wireless networks for Industrial Automation - Process Automation (WIA-PA) that is built on IEEE STD 802.15.4-2011.
DevelopmentNote |
For CENELEC adoptions of IEC publications, please check www.iec.ch to be sure that you have any corrigenda that may apply. (01/2017)
|
DocumentType |
Standard
|
Pages |
502
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
EN 62601:2016 | Identical |
ISO/IEC TR 10000-1:1998 | Information technology — Framework and taxonomy of International Standardized Profiles — Part 1: General principles and documentation framework |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 7498-1:1994 | Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
EN 61499-1:2013 | Function blocks - Part 1: Architecture |
EN 61499-2:2013 | Function blocks - Part 2: Software tool requirements |
IEC TR 62390:2005 | Common automation device - Profile guideline |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
EN ISO 3166-1:2014 | Codes for the representation of names of countries and their subdivisions - Part 1: Country codes (ISO 3166-1:2013) |
ISO/IEC/IEEE 60559:2011 | Information technology — Microprocessor Systems — Floating-Point arithmetic |
EN 300 440-2 : 1.4.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 2: HARMONIZED EN COVERING THE ESSENTIAL REQUIREMENTS OF ARTICLE 3.2 OF THE R&TTE DIRECTIVE |
EN 300 328 : 2.1.1 | WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING WIDE BAND MODULATION TECHNIQUES; HARMONISED STANDARD COVERING THE ESSENTIAL REQUIREMENTS OF ARTICLE 3.2 OF DIRECTIVE 2014/53/EU |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
2014/53/EU : 2014 COR 1 2015 | DIRECTIVE 2014/53/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 16 APRIL 2014 ON THE HARMONISATION OF THE LAWS OF THE MEMBER STATES RELATING TO THE MAKING AVAILABLE ON THE MARKET OF RADIO EQUIPMENT AND REPEALING DIRECTIVE 1999/5/EC TEXT WITH EEA RELEVANCE |
ISO/IEC 9899:2011 | Information technology Programming languages C |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
IEC 61499-1:2012 | Function blocks - Part 1: Architecture |
ISO/IEC 10181-5:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
119999/5/EC : 1999 | DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 MARCH 1999 ON RADIO EQUIPMENT AND TELECOMMUNICATIONS TERMINAL EQUIPMENT AND THE MUTUAL RECOGNITION OF THEIR CONFORMITY |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
IEC 61499-2:2012 | Function blocks - Part 2: Software tool requirements |
ISO/IEC 10181-6:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
IEEE 754-2008 REDLINE | IEEE Standard for Floating-Point Arithmetic |
IEC 61804-2:2006 | Function blocks (FB) for process control - Part 2: Specification of FB concept |
EN 61804-2:2007 | Function blocks (FB) for process control - Part 2: Specification of FB concept |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.