Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 28847.5-2021 English PDF

Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 28847.5-2021RFQ ASK 3 days Building automation and control systems - Part 5: Data communication protocol Valid

Similar standards

GB/T 38633   GB/T 38666   GB/T 38672   GB/T 28847.6   GB/T 28847.2   GB/T 28847.3   

Basic data

Standard ID: GB/T 28847.5-2021 (GB/T28847.5-2021)
Description (Translated English): Building automation and control systems - Part 5: Data communication protocol
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L67
Word Count Estimation: 930,959
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GB/T 28847.5-2021: Building automation and control systems - Part 5: Data communication protocol

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Building automation and control systems - Part 5.Data communication protocol ICS 35.240.50 L67 National Standards of People's Republic of China Building Automation and Control System Part 5.Data Communication Protocol (ISO 16484-5.2012, NEQ) Released on 2021-03-09 2021-10-01 implementation State Administration of Market Supervision and Administration Issued by the National Standardization Management Committee

Table of contents

Foreword Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Abbreviations and symbols 11 5 BACnet protocol structure 14 6 Application layer 18 7 Network layer 49 8 Data link/physical layer. ISO /IEC 8802-3 ("Ethernet") LAN 73 9 Data link/physical layer. ARCNET LAN 74 10 Data transmission/physical layer. master-slave/token pass (MS/TP) LAN 75 11 Data link layer/physical layer. point-to-point (PTP) 106 12 Data link/physical layer. EIA/CEA-709.1 ("LonTalk") LAN 133 13 Object modeling of control equipment 135 14 Alarm and Event Service 440 15 File Access Service 503 16 Object Access Service 509 17 Remote Device Management Service 532 18 Virtual Terminal Service 547 19 Error, Rejection and Abort Code 559 20 BACnet Regulation 566 21 BACnet protocol data unit coding 576 22 Standardized description of application protocol data unit 601 23 Conformance and Interoperability 694 24 BACnet extension 697 25 Cyber Security 700 Appendix A (normative appendix) Protocol implementation conformance statement 750 Appendix B (normative appendix) BACnet network combined with non-BACnet network 753 Appendix C (Normative Appendix) BACnet/IP 772 Appendix D (Normative Appendix) BACnet Interoperability Components (BIBBs) 788 Appendix E (Normative Appendix) Description and configuration of standard BACnet equipment 819 Appendix F (normative appendix) BACnet/WS web service interface 826 Appendix G (Normative Appendix) ZigBee is used as the BACnet data link layer 860 Appendix H (normative appendix) BACnet coding in standard discriminating factor format 865 Appendix I (Normative Appendix) XML Data Format 871 Appendix J (Normative Appendix) Network layer mapping error 918 Appendix K (Normative Appendix) List of Standard Terms 920 References 926 Building Automation and Control System Part 5.Data Communication Protocol

1 Scope

This part of GB/T 28847 specifies the BACnet protocol structure and application involved in the data communication protocol in building automation and control systems. Use layer, network layer, data link/physical layer. ISO /IEC 8802-3 ("Ethernet") LAN, data link/physical layer. ARCNET local area Network, data link/physical layer. master-slave/token pass (MS/TP) LAN, data link/physical layer. point-to-point (PTP), data link/ Physical layer. EIA/CEA-709.1 ("LonTalk") local area network, modeling control equipment as a set of objects, alarm and event services, file access Services, object access services, remote device management services, virtual terminal services, errors, denial and termination codes, BACnet procedures, BACnet Protocol data unit coding, application protocol data unit standardized description, consistency and interoperability, BACnet extension, network security and other requirements. This section applies to data communication services and protocols between related equipment in building automation and control systems.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article Pieces. For undated reference documents, the latest version (including all amendments) is applicable to this document. GM/T 0002-2012 SM4 block cipher algorithm GM/T 0004-2012 SM3 cryptographic hash algorithm ISO 7498 (all parts) Information Processing System Open System Interconnection Basic Reference Model (Informationprocessing

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Abstract syntax The application layer data or application protocol control information uses the regulations to be followed by the symbolic rules independent of the coding technology that represents them. 3.2 Application A collection of user information processing requests. 3.3 Application-entity The OSI-related part of an application process. 3.4 Application-process An element of a specific application for information processing in an open system. 3.5 Application-protocol-control-information Use presentation layer services to coordinate the exchange of information between application entities that connect operations. 3.6 Application-protocol-data-unit The data unit specified in the application protocol includes application protocol control information and so on. 3.7 Application-service-element When appropriate, the OSI environment is provided through the use of lower-layer services, part of the application entity. 3.8 Concrete grammar concretesyntax The specific realization of a certain data representation is used in the grammatical rules in the formal specification of the data. 3.9 Confirm(primitive) confirm(primitive) An interactive representation in which a service provider indicates that certain procedures have been completed on a specific service access point. 3.10 Indication(primitive) indication(primitive) An interactive representation in which the service provider either indicates that it has actively requested some procedures, or indicates that a procedure has been Requested by the service user at the access point of the peer-to-peer service. 3.11 Peer-entities Entities at the same layer in the protocol. 3.12 Real open system realopensystem A real system that complies with the requirements of the OSI standard when communicating with other real systems. 3.13 Realsystem A collection consisting of one or more computers, related software, external software, terminals, operators, physical processes, information transmission methods, etc. Note. It is an autonomous whole with the ability of information processing and information transmission. 3.14 Request(primitive) In the interaction, the service user requests the execution of some procedures in an interactive representation. 3.15 Response(primitive) response(primitive) In the interaction, the service user indicates that it has completed some procedures. 3.16 N-layer service access point (N)-service-access-point The Nth layer entity provides the access point of the Nth layer service to the N-1th layer entity. 3.17 Nth layer service data unit (N)-service-data-unit The interface data of the Nth layer maintains consistency in the Nth layer communication. 3.18 Service-user An entity in a single open system that uses a service through a service access point. 3.19 Service-primitive The interaction between service users and service providers is an abstract representation that has nothing to do with concrete realization. 3.20 Service-provider An abstraction of all entities that provide services to peer-to-peer service users. 3.21 Transfer-syntax The specific syntax used for data transfer between open systems. 3.22 User element userelement A representation of a certain part of an application process that uses required application service elements in order to achieve the communication purpose of the application process. 3.23 Accesscontrol Adjust and restrict access to network resources. 3.24 Access rights (physical access control) accessrights (physicalaccesscontrol) Give access privileges to a certificate. 3.25 Access user (physical access control) accessuser (physicalaccesscontrol) A person or device that holds one or more certificates. 3.26 Alarm In the form of sound or vision or both, it is a warning to the human operator of an abnormal working condition that may need to be corrected Announcements. 3.27 Alarm-acknowledgment Indicates a process that a human operator has viewed and reacted to event notifications. 3.28 Algorithmicchangereporting Based on an algorithm specified in an EventEnrolment object, an alarm or event is detected and reported. 3.29 Authentication The act of verifying identity. 3.30 Authenticationfactor The data element used to prove the identity of the certificate. 3.31 Authentication(networksecurity) authorization(networksecurity) Based on known identities and access rules, access to network resources is controlled. 3.32 Authentication (physical access control) authorization (physicalaccesscontrol) The process of determining whether a certain access user is allowed to enter a certain protected area through an access control point. 3.33 BACnet device BACnetdevice A real or virtual device that supports digital communication using the BACnet protocol. 3.34 BACnet user BACnet-user Use the BACnet user element to represent a part of the application process. 3.35 Blink-warn A typical method in lighting control to notify the occupants of the room that the light is about to be automatically turned off. Note. In the process, the lights may flash one or more times, or produce an acoustic signal. After the alarm occurs, the room lighting will be maintained for a period of time to The occupants must either leave the room safely or initiate a request to maintain the room's lighting. Flashing alarms are also called "flick alarms" or "flashing alarm". 3.36 Bridge At the physical layer or data link layer, devices that connect more than two network segments. Note. The device can perform packet filtering based on the MAC layer address. 3.37 Broadcast A message that is applied to multiple devices as a single unit. 3.38 State change changeofstate An event that occurs when the tested or calculated Boolean value or discrete enumeration value changes. 3.39 Change of value changeofvalue An event that occurs when the tested or calculated analog value is changed by a predefined value. 3.40 Client A system or device uses another device through a service request instance for some special purpose. Note. The client requests service from the server. 3.41 Controller Equipment that adjusts or manages systems or components. 3.42 Credential(physicalaccesscontrol) credential(physicalaccesscontrol) The combination of authentication factor and access authority. 3.43 Dataconfidentiality For illegal individuals, entities, or processes, the nature of the inaccessibility or disclosure of information. 3.44 Dataintegrity The nature of data that cannot be altered or destroyed by illegal means. 3.45 Data source identification dataoriginauthentication The act of confirming whether the source of the data received is the source of its claim. 3.46 Datepattern A date that contains more than one unspecified byte or specific date value. 3.47 Directly connected network A network that can be directly accessed through a router, without the need for an intermediate router to forward packets. Note. When the PTP connection is valid and no intermediate router is used, the PTP connection is a direct connection network. 3.48 Download download A specific type of file transfer that transfers executable programs or databases to a remote device, where these programs The sequence or database can be executed. 3.49 Encryptedmessage Text or signals that cannot be directly understood through the cryptographic system. 3.50 Entity An identifiable, independent and distinguishable existence that can be described by a set of attributes. 3.51 Error detection A procedure used to identify whether an error occurred in the communication process. 3.52 Errorrecovery Procedures activated by detected errors are used to ensure that the exchange of information continues. 3.53 Event algorithm eventalgorithm The algorithm used to determine the event-initiating (event-initiating) object to switch between normal and abnormal states. 3.54 Event-initiating object It can be used to monitor its own status and report changes in event status. 3.55 Event-notification-distribution When the object changes the event or confirm state, the server executes the decision to notify the client and send the information. 3.56 Event notification message eventnotificationmessage ConfirmedEventNotification used to indicate a change in the confirmed state of an event or an event-initialized object Or UnconfirmedEventNotification service request. 3.57 Event-state-detection Execute object event algorithm and monitor the progress of object properties. 3.58 Event-summarization Use one of the event summary services to query the event-initialization object in the device to determine which event-initialization object satisfies the characteristics. Determine the event status or report conditions. 3.59 Fading The actual output gradually increases or decreases from one set value to another within a certain period. 3.60 Gateway Devices that connect two or more different networks, allowing information to be exchanged between these networks. 3.61 Global All devices or nodes on the communication network. 3.62 Globalbroadcast A message sent to all the networks or nodes on a BACnet Internet. 3.63 Half router halfrouter A device or node at one end of a PTP connection. 3.64 Incapabledevice Essentially incapable, or configured as a device that is incapable of generating and consuming secure BACnet messages. 3.65 Initialization The process of establishing a known state caused by power-up. 3.66 Internetwork A collection of more than two networks connected by a router. 3.67 Internal reporting The detection and reporting of alarms or events is based on the algorithm specified in the object type. Does not involve external to the EventEnrolment object Reference. 3.68 Invertednetwork In the BACnet Internet, there are more than two networks connected by one network, and the relevant NPDU size is smaller than the network it joins. 3.69 Key A sequence of symbols that controls encryption and decryption operations. 3.70 Local Related devices on the same network as the reference device. 3.71 Localbroadcast A message sent to all devices or nodes on the same network. 3.72 Medium Physical transmission entity. Twisted pair, optical fiber and coaxial cable are typical media. 3.73 Mediumaccesscontrol The process of maintaining the order of access to the communication medium. 3.74 Network A collection of more than one network segment with the same network address connected by a bridge. 3.75 Network resource networkresource Any physical or logical entity that can be accessed through a communication medium. 3.76 Node An addressable device connected to a communication medium. 3.77 Notification-client The BACnet device that receives and processes event notification messages. 3.78 Notification-server Contains events-BACnet devices that initialize objects and perform event notification distribution. 3.79 Object Specific instances of data classification. 3.80 Objectprofile The configuration defines a composition consisting of attributes, behaviors, and/or requirements for a private object, or private extensions to a standard object set.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 28847.5-2021_English be delivered?

Answer: Upon your order, we will start to translate GB/T 28847.5-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 28847.5-2021_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 28847.5-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.