IEEE 1815-2012 REDLINE
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
03-30-2023
English
10-10-2012
0 Introduction
1 Overview
2 Normative references
3 Definitions, acronyms, and abbreviations
4 Application Layer - part 1
5 Application Layer - part 2
6 Application Layer - part 3: State tables and diagrams
7 Secure authentication
8 Transport Functions
9 Data Link Layer
10 Layer-independent topics
11 Data object library - basics
12 DNP3 object library - parsing codes
13 IP networking
14 Interoperability
Annex A (normative) - DNP3 data object library - object
descriptions
Annex B (informative) - DNP3 quick reference
Annex C (informative) - Associations
Annex D (normative) - UTF-8 related copyright
Annex E (informative) - Sample CRC calculations
Annex F (informative) - Managing Secure Authentication
updates
Annex G (informative) - Bibliography
This document specifies the DNP3 protocol structure, functions, and interoperable application options (subset levels).
Committee |
Power System Communications and Cybersecurity
|
DocumentType |
Standard
|
ISBN |
978-0-7381-7292-7
|
Pages |
821
|
PublisherName |
Institute of Electrical & Electronics Engineers
|
Status |
Withdrawn
|
Supersedes |
IEEE C37.238-2011 | IEEE Standard Profile for Use of IEEE 1588 Precision Time Protocol in Power System Applications |
IEEE 525-2007 | IEEE Guide for the Design and Installation of Cable Systems in Substations |
IEC TR 62351-13:2016 | Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
IEC 61400-25-4:2016 RLV | Wind energy generation systems - Part 25-4: Communications for monitoring and control of wind power plants - Mapping to communication profile |
EN 61400-25-4:2017 | Wind energy generation systems - Part 25-4: Communications for monitoring and control of wind power plants - Mapping to communication profile |
IEEE 1547-2018 | IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces |
BS EN 62351-7:2017 | Power systems management and associated information exchange. Data and communications security Network and System Management (NSM) data object models |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
IEC TR 62357-200:2015 | Power systems management and associated information exchange - Part 200: Guidelines for migration from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) |
IEC 62351-7:2017 | Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models |
IEEE 1547-2003 | IEEE Standard for Interconnecting Distributed Resources with Electric Power Systems |
DD IEC/TS 62351-8:2011 | Power systems management and associated information exchange. Data and communications security Role-based access control |
PD IEC/TR 62357-200:2015 | Power systems management and associated information exchange Guidelines for migration from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6) |
IEEE 45.1-2017 | IEEE Recommended Practice for Electrical Installations on Shipboard--Design |
IEEE C37.104-2012 REDLINE | IEEE Guide for Automatic Reclosing of Circuit Breakers for AC Distribution and Transmission Lines |
IEC TR 62351-90-1:2018 | Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems |
IEEE 45.3-2015 | IEEE Recommended Practice for Shipboard Electrical Installations -- Systems Engineering |
IEC 61400-25-4:2016 | Wind energy generation systems - Part 25-4: Communications for monitoring and control of wind power plants - Mapping to communication profile |
EN 62351-7:2017 | Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models |
IEEE 1815.1-2015 | IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)] |
I.S. EN 61400-25-4:2017 | WIND ENERGY GENERATION SYSTEMS - PART 25-4: COMMUNICATIONS FOR MONITORING AND CONTROL OF WIND POWER PLANTS - MAPPING TO COMMUNICATION PROFILE |
I.S. EN 62351-7:2017 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 7: NETWORK AND SYSTEM MANAGEMENT (NSM) DATA OBJECT MODELS |
IEEE 2030.100-2017 | IEEE Recommended Practice for Implementing an IEC 61850-Based Substation Communications, Protection, Monitoring, and Control System |
IEEE 1547.1-2020 | IEEE Standard Conformance Test Procedures for Equipment Interconnecting Distributed Energy Resources with Electric Power Systems and Associated Interfaces |
IEEE 2030.11-2021 | IEEE Guide for Distributed Energy Resources Management Systems (DERMS) Functional Specification |
ISO/IEC 10646:2014 | Information technology Universal Coded Character Set (UCS) |
TIA 232 : F1997(R2012) | INTERFACE BETWEEN DATA TERMINAL EQUIPMENT AND DATA CIRCUIT-TERMINATING EQUIPMENT EMPLOYING SERIAL BINARY DATA INTERCHANGE |
IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
IEC 60870-5-101:2003+AMD1:2015 CSV | Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
ISO 8601:2004 | Data elements and interchange formats Information interchange Representation of dates and times |
IEC 60870-5-2:1992 | Telecontrol equipment and systems - Part 5: Transmission protocols - Section 2: Link transmission procedures |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
TIA 485 : A1998(R2012) | ELECTRICAL CHARACTERISTICS OF GENERATORS AND RECEIVERS FOR USE IN BALANCED DIGITAL MULTIPOINT SYSTEMS |
IEC 60870-5-1:1990 | Telecontrol equipment and systems. Part 5: Transmission protocols - Section One: Transmission frame formats |
IEEE 754-2008 REDLINE | IEEE Standard for Floating-Point Arithmetic |
FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.