HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 20965-2025 English PDF

GB/T 20965: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 20965-2025EnglishRFQ ASK 3 days [Need to translate] Control network HBES technical specification - Home and building control system Valid GB/T 20965-2025
GB/T 20965-2013EnglishRFQ ASK 3 days [Need to translate] Control network HBES technical specification -- Home and building control system Valid GB/T 20965-2013

PDF similar to GB/T 20965-2025


Standard similar to GB/T 20965-2025

GB/T 20438.5   GB/T 20438.4   GB/T 20438.6   GB/T 45510   GB/T 41771.6   

Basic data

Standard ID GB/T 20965-2025 (GB/T20965-2025)
Description (Translated English) Control network HBES technical specification - Home and building control system
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard N10
Classification of International Standard 25.040
Word Count Estimation 622,668
Date of Issue 2025-02-28
Date of Implementation 2025-09-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 20965-2025: Control network HBES technical specification - Home and building control system

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB/T 20965-2025 English version. Control network HBES technical specification - Home and building control system ICS 25.040 CCSN10 National Standard of the People's Republic of China Replace GB/T 20965-2013 HBES Technical Specifications for Residential and Control Networks Building Control Systems Home and building control system Released on 2025-02-28 2025-09-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface XXI Introduction XXII 1 Scope 1 2 Normative references 1 3 Terms and definitions 3 4 Abbreviations18 5 System 24 5.1 Architecture 24 5.1.1 Overview 24 5.1.2 HBES reference model 24 5.1.3 Reference points and functional groups 34 5.1.4 Interface standardization of specific reference points 36 5.1.5 System Characteristics 39 5.2 General technical requirements 42 5.2.1 Overview 42 5.2.2 Topology, wiring and power supply for devices connected to twisted pair or coaxial media 42 5.2.3 Security 43 5.2.4 Environmental conditions 47 5.2.5 Electromagnetic compatibility requirements for equipment connected to twisted pair or coaxial cable 48 5.2.6 Reliability 64 5.3 General functional safety requirements for HBES products 64 5.3.1 General 64 5.3.2 General requirements 64 5.3.3 Functional safety requirements 66 6 Application Features 71 6.1 Application Structure 71 6.1.1 Overview 71 6.1.2 Application Structure 71 6.2 Type 1 HBES User Process 72 6.2.1 Overview 72 6.2.2 Object Model 72 6.2.3 Group Object Server 73 6.2.4 Interface Object Server 77 7 Dielectric Independent Layer 81 7.1 Type 1 HBES application layer 81 7.1.1 Overview 81 7.1.2 Application layer services 81 7.1.3 Application Layer Protocol Data Unit (APDU) 82 7.1.4 Application layer services 89 7.1.5 Application layer parameters 144 7.2 Common parts of transport layer, network layer and data link layer of Class 1 HBES 144 7.2.1 Overview 144 7.2.2 Requirements for the Media-Independent Data Link Layer 144 7.2.3 Network Layer Requirements 152 7.2.4 Transport layer requirements 161 7.3 KNXnet/IP communication 184 7.3.1 Overview 184 7.3.2 Requirement 185 7.4 HBES Safety 250 7.4.1 General Introduction 250 7.4.2 Norm 255 7.5 Network Services 287 7.5.1 General Principles 287 7.5.2 Introduction to General Technology of HBES Network Services 287 7.5.3 Overview 288 7.5.4 HBES Information Model 290 7.5.5 HBES Network Interface OBIX 301 7.5.6 HBES Gateway OBIX 311 7.5.7 Gateway Profile 312 8 Medium and medium-related layers 315 8.1 Class 1 HBES Power Line 315 8.1.1 Overview 315 8.1.2 Requirements for Class 1 HBES, Power Line PL110 315 8.1.3 Requirements for Class 1 HBES, Power Line PL132 334 8.2 Twisted Pair Cables for Class 1 HBES Networks 344 8.2.1 Overview 344 8.2.2 Requirements for Class 1 HBES, Twisted Pair Type 0 (TP0) 344 8.2.3 Requirements for Class 1 HBES, Twisted Pair Type 1 (TP164 and TP1256) 365 8.3 HBESRF 397 8.3.1 General 397 8.3.2 HBESRF Physical Layer 397 8.3.3 Physical Layer 400 of HBESRFMulti 8.3.4 HBESRF Data Link Layer 403 8.3.5 Compatibility between HBESReady and HBESMulti 427 9 Management Regulations 428 9.1 Overview 428 9.2 Network Management Procedures 429 9.2.1 General Principles 429 9.2.2 NM_IndividualAddress_Read 429 9.2.3 NM_IndividualAddress_Write 430 9.2.4 NM_SerialNumberDefaultIA_Scan 432 9.2.5 NM_IndividualAddress_SerialNumber_Read 433 9.2.6 NM_IndividualAddress_SerialNumber_Write 434 9.2.7 NM_DomainAddress_Read 435 9.2.8 NM_DomainAddress_Write 435 9.2.9 NM_DomainAddress_Scan 438 9.2.10 NM_Router_Scan 438 9.2.11 NM_SubnetworkDevices_Scan 439 9.2.12 NM_SubnetworkAddress_Read 440 9.2.13 NM_IndividualAddress_Reset 440 9.2.14 NM_IndividualAddress_Scan 441 9.2.15 NM_IndividualAddress_Check 442 9.2.16 NM_IndividualAddress_Check_LocalSubnetwork 443 9.2.17 NM_GroupAddress_Check 444 9.2.18 NM_FunctionalBlock_Scan 445 9.3 Equipment Management Procedures 445 9.3.1 General Principles 445 9.3.2 General Exception Handling 446 9.3.3 DM_Connect 446 9.3.4 DM_Disconnect 447 9.3.5 DM_Authorize 448 9.3.6 DM_SetKey 449 9.3.7 DM_Restart 450 9.3.8 DM_Delay 451 9.3.9 DM_IndividualAddressRead 451 9.3.10 DM_IndividualAddressWrite 451 9.3.11 DM_DomainAddressRead 451 9.3.12 DM_DomainAddressWrite 451 9.3.13 DM_ProgMode_Switch 452 9.3.14 DM_GroupObject_Link_Read 452 9.3.15 DM_GroupObject_Link_Write 453 9.3.16 DM_MemWrite 454 9.3.17 DM_MemVerify 457 9.3.18 DM_MemRead 458 9.3.19 DM_UserMemWrite 459 9.3.20 DM_UserMemVerify 462 9.3.21 DM_UserMemRead 463 9.3.22 DM_InterfaceObjectWrite 464 9.3.23 DM_InterfaceObjectVerify 466 9.3.24 DM_InterfaceObjectRead 467 9.3.25 DM_InterfaceObjectScan 469 9.3.26 DM_LoadStateMachineWrite 470 9.3.27 DM_LoadStateMachineVerify 478 9.3.28 DM_LoadStateMachineRead 480 9.3.29 DM_RunStateMachineWrite 482 9.3.30 DM_RunStateMachineVerify 483 9.3.31 DM_RunstateMachineRead 485 9.3.32 DM_LCSlaveMemWrite 487 9.3.33 DM_LCSlaveMemVerify 489 9.3.34 DM_LCSlaveMemRead 490 9.3.35 DM_LCExtMemWrite 491 9.3.36 DM_LCExtMemVerify 492 9.3.37 DM_LCExtMemRead 493 9.3.38 DM_LCExtMemOpen 494 9.3.39 DM_LCRouteTableStateWrite 495 9.3.40 DM_LCRouteTableStateVerify 496 9.3.41 DM_LCRouteTableStateRead 497 10 Product Conformity Assessment 498 10.1 Overview 498 10.2 Applicable Standards 498 10.2.1 Overview 498 10.2.2 Protocol 498 10.2.3 Electrical safety 498 10.2.4 Electromagnetic Compatibility (EMC) 498 10.2.5 Environment 498 10.2.6 Functional Safety 499 11 Installation Requirements - General Requirements for Category 1 HBES Twisted Pair Cabling 499 11.1 Overview 499 11.2 Systems and Cabling 499 11.3 Wiring Model and General Requirements 500 11.3.1 Segment connection, generally requires 500 11.3.2 Coexistence of HBES Control Bus, Broadband Multimedia and Mains Power 501 11.4 Infrastructure Requirements 502 11.4.1 General 502 11.4.2 Preliminary Configuration of Installation Space 505 11.5 Connector 510 for Category 1 HBES twisted pair cable 11.6 Cable and installation accessories requirements 512 11.6.1 Channel and Link Performance 512 11.6.2 TP cable characteristics 512 11.6.3 Annex 513 11.7 Electrical safety and functional safety 514 11.7.1 Electrical safety 514 11.7.2 Functional insulation of bus segments 515 11.7.3 Functional Safety 515 11.8 EMC 515 11.9 Grounding and shielding grounding for lightning protection 516 11.10 Fire reaction and fire resistance requirements 516 11.11 Environmental aspects 516 11.12 Management and Documentation 516 Appendix A (informative) Example of method for determining safety integrity level 517 Appendix B (Informative) Development of Hazard and Essential Functional Safety Requirements 519 Appendix C (Informative) Example of a transport layer connection-oriented state machine state diagram 526 Appendix D (Informative) Example of binary format of KNX/IP frame 536 Appendix E (Informative) Code Table 555 Appendix F (Informative) Application of CCM 561 Appendix G (Informative) Example - Complete Encoding of HBES Security APDU 565 Appendix H (Informative) Certification 571 Appendix I (Informative) Wiring Model 572 Appendix J (Informative) Preliminary Deployment and Planning Aspects 576 Appendix K (informative) Performance of building comfort levels 580 Appendix L (informative) Standard connectors for TP type 0 and type 1 of class 1 HBES 592 Appendix M (Informative) Cable/Channel and Link Requirements 594 References 596 Figure 1 Single address 6 Figure 2 Group Address 8 Figure 3 Overview of HBES reference model 25 Figure 4 HBES application process 28 Figure 5 HBES device application process structure 28 Figure 6 HBES device application process model 29 Figure 7 User process link 29 Figure 8 Communication resource management 31 Figure 9 Communication resource user interface 32 Figure 10 Example of device management function using common interface 32 Figure 11 Application process management 33 Figure 12 User interface of application process resources 33 Figure 13 Reference points and functional groups 34 Figure 14 Example of multiple reference points facing away from the network medium 34 Figure 15 Example of multiple reference points for network media 35 Figure 16 Gateways between different network segments 35 Figure 17 Reference point hierarchy 35 Figure 18 Standard interface position 36 Figure 19 Symbols used in Figures 20 to 22 36 Figure 20 Single-wire connection 37 Figure 21 Two-wire connection without interruption of bus when device is not connected (recommended solution) 37 Figure 22 Two-wire connection with bus interruption when device is not connected 37 Figure 23 General interface location 38 Figure 24 Process interface location 38 Figure 25 HBES interactive application 40 Figure 26 Geographical distribution zones in buildings 40 Figure 27 Power supply unit 43 of HBES equipment Figure 28 Protective isolation of separately installed HBES equipment 46 Figure 29 Protective isolation of adjacently installed HBES equipment 46 Figure 30 Validity range of this document 49 Figure 31 Testing the mains connection of the power supply unit 52 Figure 32 Testing the bus connection of the power supply unit 53 Figure 33 Testing the mains connection of bus equipment 53 Figure 34 Testing the media interface of the bus device 53 Figure 35 Testing the general interface, process interface and input/output connections of the bus device 54 Figure 36 Testing the mains connection of the power supply unit 54 Figure 37 Power supply unit bus connection test 55 Figure 38 Testing the mains connection of the HBES device 55 Figure 39 Media interface test of HBES equipment 56 Figure 40 Testing the common interface, process interface and input/output connections of the HBES device 56 Figure 41 Electrostatic discharge 57 Figure 42 Test in an anechoic chamber 57 Figure 43 Top view 58 Figure 44 Side view 1 58 Figure 45 Side view 2 58 Figure 46 Side view 3 59 Figure 47 Test arrangement for GB/T 17626.6 test 59 Figure 48 Example of test arrangement in an anechoic chamber 60 Figure 49 Side view 1 (example) 60 Figure 50 Side view 2 (example) 60 Figure 51 Side view 3 (example) 61 Figure 52 Side view 4 (example) 61 Figure 53 Test arrangement for conducted disturbance voltage on bus cables 62 Figure 54 Test arrangement for conducted disturbance voltage on mains terminals 63 Figure 55 Test arrangement for common mode noise current test on bus cable 63 Figure 56 Test arrangement for voltage dips and short interruptions 64 Figure 57 Application structure 71 Figure 58 Possible information flow 72 Figure 59 User process model 73 Figure 60 Data structure of group object 73 Figure 61 Reading group object value 76 Figure 62 Receiving a request to read the value of a group object 76 Figure 63 Write group object value 77 Figure 64 Receive group object value update 77 Figure 65 The structure of the interface object 78 Figure 66 Message flow for A_PropertyValue_Read service 79 Figure 67 Message flow 80 for A_PropertyValue_Write service Figure 68 Message flow 80 for A_PropertyDescription_Read service Figure 69 Application layer interaction for non-remote authentication services 82 Figure 70 Application layer interaction of remote authentication service 82 Figure 71 APDU Example 82 Figure 72 ASAP is mapped to TSAP example 89 Figure 73 TSAP mapping to ASAP 89 Figure 74 Processing requests and responses 89 Figure 75 Message flow of A_Group_Value_Read service 90 Figure 76 A_GroupValue_Read-PDU Example 90 Figure 77 Example of A_GroupValue_Response-PDU with ASAP data length greater than 6 bits 91 Figure 78 Example of A_GroupValue_Response-PDU with ASAP data length equal to or less than 6 bits 91 Figure 79 Message flow of A_Group_Value_Write service 92 Figure 80 Example of A_GroupValue_Write-PDU with ASAP data length greater than 6 bits 93 Figure 81 Example of A_GroupValue_Write-PDU with ASAP data length equal to or less than 6 bits 93 Figure 82 A_IndividualAddress_Write-PDU Example 94 Figure 83 A_IndividualAddress_Read-PDU Example 95 Figure 84 A_IndividualAddress_Response-PDU Example 95 Figure 85 A_IndividualAddressSerialNumber_Read service message flow 97 Figure 86 A_IndividualAddressSerialNumber_Read-PDU Example 97 Figure 87 A_IndividualAddressSerialNumber_Response-PDU Example 98 Figure 88 A_IndividualAddressSerialNumber_Write-PDU Example 100 Figure 89 A_ServiceInformation_Indication_Write-PDU Example 101 Figure 90 A_DomainAddress_Write-PDU 102 Figure 91 A_DomainAddress_Read-PDU Example 103 Figure 92 A_DomainAddress_Response-PDU Example 104 Figure 93 A_DomainAddressSelective_Read-PDU Example 105 Figure 94 A_NetworkParameter_Read-PDU Example 106 Figure 95 A_NetworkParameter_Response-PDU Example 107 Figure 96 A_NetworkParameter_Write-PDU Example 109 Figure 97 A_PropertyValue_Read-PDU Example 110 Figure 98 A_PropertyValue_Response-PDU Example 111 Figure 99 A_PropertyValue_Write-PDU Example 113 Figure 100 A_PropertyDescription_Read-PDU Example 115 Figure 101 A_PropertyDescription_Response-PDU Example 115 Figure 102 A_DeviceDescriptor_Read-PDU Example 117 Figure 103 A_DeviceDescriptor_Response-PDU Example 117 Figure 104 A_Link_Read service message flow 119 Figure 105 A_Link_Read-PDU Example 119 Figure 106 A_Link_Response-PDU Example 119 Figure 107 A_Link_Write service message flow 120 Figure 108 A_Link_Write-PDU 121 Figure 109 A_ADC_Read-PDU Example 122 Figure 110 A_ADC_Response-PDU Example 122 Figure 111 A_Memory_Read-PDU Example 124 Figure 112 A_Memory_Response-PDU Example 124 Figure 113 A_Memory_Write-PDU Example 126 Figure 114 A_MemoryBit_Write-PDU 129 Figure 115 A_UserMemory_Read-PDU Example 131 Figure 116 A_UserMemory_Response-PDU 131 Figure 117 A_UserMemory_Write-PDU 133 Figure 118 A_UserMemoryBit_Write-PDU Example 136 Figure 119 A_UserManufacturerInfo_Read-PDU Example 138 Figure 120 A_UserManufacturerInfo_Response-PDU 138 Figure 121 A_Restart-PDU Example 140 Figure 122 A_Authorize_Request-PDU Example 141 Figure 123 A_Authorize_Response-PDU Example 141 Figure 124 A_Key_Write-PDU Example 143 Figure 125 A_Key_Response-PDU Example 143 Figure 126 Data link layer interaction 145 Figure 127 Exchange of Figure L_Data service primitives 146 Figure 128 Frame_format parameter 148 Figure 129 Coding of extended frame format 149 Figure 130 Network layer interconnection (not used for bridges or routers) 153 Figure 131 Basic functions of a router or bridge 153 Figure 132 Example of NPDU format 154 Figure 133 Transport layer interaction 161 Figure 134 TPDU format example 162 Figure 135 Transmission Control Field 162 Figure 136 Device type and configuration example 184 Figure 137 Binary format of KNXnet/IP frame 190 Figure 138 KNXnet/IP header binary format 190 Figure 139 KNXnet/IP server endpoint configuration example 191 Figure 140 Discovery Procedure 192 Figure 141 Establishing data connection 194 Figure 142 General connection header 194 Figure 143 KNX project with multiple installations 197 Figure 144 KNXnet/IP message header 198 Figure 145 Binary format of HPAI structure.200 Figure 146 Binary format of CRI structure.201 Figure 147 Binary format of CRD structure.201 Figure 148 Binary format describing structure 202 Figure 149 Supported Service Family DIB 205 Figure 150 Manufacturer Data DIB 205 Figure 151 Binary format of SEARCH_REQUEST frame 206 Figure 152 Binary format of SEARCH_RESPONSE frame 207 Figure 153 Binary format of DESCRIPTION_REQUEST frame 208 Figure 154 Binary format of DESCRIPTION_RESPONSE frame 209 Figure 155 Binary format of CONNECT_REQUEST frame 210 Figure 156 Binary format of CONNECT_RESPONSE frame 211 Figure 157 Binary format of CONNECTIONSTATE_REQUEST frame 212 Figure 158 Binary format of CONNECTIONSTATE_RESPONSE frame 213 Figure 159 Binary format of DISCONNECT_REQUEST frame 214 Figure 160 Binary format of DISCONNECT_RESPONSE frame 214 Figure 161 IP protocol stack 215 Figure 162 Address allocation procedure 217 Figure 163 IP host protocol address information binary format 218 Figure 164 KNXnet/IP device endpoint 221 Figure 165 PID_PROJECT_INSTALLATION_ID 222 Figure 166 Binary format of KNXnet/IP device management CRI 230 Figure 167 Binary format of KNXnet/IP device management CRD 230 Figure 168 Binary format of DEVICE_CONFIGURATION_REQUEST frame 231 Figure 169 Binary format of DEVICE_CONFIGURATION_ACK frame 232 Figure 170 Tunnel connection in KNXnet/IP server and KNX single address 235 Figure 171 Tunnel CRI binary format 237 Figure 172 Tunnel CRD binary format 238 Figure 173 Tunnel connection header binary format 238 Figure 174 TUNNELLING_REQUEST frame binary format 239 Figure 175 TUNNELING_ACK frame binary format 240 Figure 176 KNX group datagram routing 242 Figure 177 KNXnet/IP group datagram routing 242 Figure 178 Mixed topology (unexpected subnet addressing) 243 Figure 179 Hybrid topology (expected subnet address assignment) 244 Figure 180 ROUTING_INDICATION frame binary format 248 Figure 181 ROUTING_LOST_MESSAGE frame binary format 249 Figure 182 Secure communication between a secure two-way transmitter and an authorized two-way receiver 251 Figure 183 Secure communication between a secure two-way transmitter and a two-way receiver requiring authorization and confidentiality 252 Figure 184 HBES data security location in the stack 254 Figure 185 The location of S-AL in the application layer 256 Figure 186 Security APDU (taking TP1 as an example) 257 Figure 187 B0 format 258 Figure 188 Format of the field TPCI/APCISec in B0 258 Figure 189 Ctrj format 258 Figure 190 Use only authorized security data (taking TP1 as an example) 259 Figure 191 Security data with authorization and confidentiality 260 Figure 192 Format of encrypted secure APDU 262 Figure 193 Security Control Field 263 Figure 194 Tool Access 263 Figure 195 Serial number format 265 Figure 196 S-A_Sync_Req-PDUs format (e.g. SCF setup with tool key and SBC) 266 Figure 197 S-A_Sync_Res-PDU format (e.g. SCF setup with tool key and SBC) 268 Figure 198 Application layer interaction of non-remotely confirmed services 271 Figure.199 Application layer interaction of remote confirmation service 271 Figure.200 Processing T_Data_Group.ind 273 through S-AL Figure.201 Processing T_Data_Group.req through S-AL 274 Figure 202 Processing T_Data_Tag_Group.ind 275 through S-AL Figure 203 S-AL processes T_Data_Tag_Group.req 276 via S-AL Figure 204 Processing T_Data_Individual.ind/.con and T_Data_Connected.ind/.con via S-AL 277 Figure 205 Processing T_Data_Individual.req and T_Data_Connected.req via S-AL (Informative) 278 Figure 206 Many links with different licenses resulting in a large amount of definition data 281 Figure 207 The introduction of roles reduces the number of different permission definitions for each DP 282 Figure 208 Example of a point-to-point key table 283 Figure 209 General schematic diagram of HBES network service interface 288 Figure 210 Overall architecture 289 Figure 211 Abstract model 290 Figure 212 Metamodel of entities, tags, and tag/value pairs 292 Figure 213 Entity, label/value pair and label modeling example 292 Figure 214 HBES information model example 300 Figure 215 Device read request 301 Figure 216 Device object response 302 Figure 217 Data point read request 302 Figure 218 Response 303 of the data point object Figure 219 Installation Agreement 305 Figure 220 Device Agreement 305 Figure 221 DPST9.001 Agreement 306 Figure 222 Example of function block type agreement 306 Figure 223 Example of parameter type agreement 307 Figure 224 Example of installation instance 307 Figure 225 Example of enumeration object 307 Figure 226 HBES network interface object tree 308 Figure 227 Read Transaction Processing 310 Figure 228 Write transaction processing 310 Figure 229 Calling transaction processing 311 Figure 230 Gateway Profile 314 Figure 231 Structure example of MAU 316 Figure 232 Signal Code 318 Figure 233 Idealized overlap of 105.6kHz and 115.2kHz 318 Figure 234 PL inductive coupling line example 319 Figure 235 Typical PL topology example 319 Figure 236 Character 321 Figure 237 Data message structure 321 Figure 238 Confirmation frame structure 321 Figure 239 PL110 generation matrix 322 Figure 240 Operation of Galois field GF2 323 Figure 241 Three-phase system 323 Figure 242 Domain address 324 Figure 243 Single address 324 Figure 244 Group address 325 Figure 245 Format 1s, frame field 325 with standard field name abbreviations Figure 246 Format 1s, L_Data_Standard request frame format 326 Figure 247 Control field 326 Figure 248 Check octet 327 Figure 249 Frame field 328 with standard field name abbreviations Figure 250 Format 1e, L_Data_Extended request frame format 328 Figure 251 Extended Control Field 328 Figure 252 Format 2, short confirmation frame format 329 Figure 253 L_Data request frame time frame diagram 331 Figure 254 Complete frame encapsulation (data message) 336 Figure 255 Primitive Overview 336 Figure 256 Frame Field 338 with Standard Field Name Abbreviations Figure 257 L_Data request standard frame format 338 Figure 258 Control field 338 Figure 259 NPCI field 339 Figure 260 Frame field 340 with standard field name abbreviations Figure 261 L_Data_Extended request frame format 340 Figure 262 Extended control field 340 Figure 263 Data field in a positive acknowledgement frame (ACK) 341 Figure 264 Complete confirmation frame encapsulation 341 Figure 265 NRZ line coding 344 Figure 266 Character format 345 Figure 267 Transmitter rising and falling edges 346 Figure 268 Repeater maximum switching time 348 Figure 269 TP0 power supply specification 350 Figure 270 Power supply dynamic internal impedance measurement test configuration 351 Figure 271 Falling edge and overcurrent measurement 351 Figure 272 TP0 network with distributed power supply 352 Figure 273 Voltage/current requirements for a node 353 Figure 274 Voltage/current specifications for a complete distributed power supply with 6 to 8 power supply nodes 355 Figure 275 Common part of the frame structure 356 Figure 276 Control field 357 Figure 277 CTRLE field 357 Figure 278 Format 1s, L_Data_Standard frame format 358 with standard field name abbreviations Figure 279 Format 1e, L_Data_Extended frame format with standard field name abbreviations 358 Figure 280 EFF field 359 Figure 281 Format 2, short confirmation frame format 360 Figure 282 Transmission definition 363 Figure 283 Format 1s, complete L_Data_Standard request frame format 364 Figure 284 Format 1e, complete L_Data_Extended request frame format 364 Figure 285 Logical structure of physical layer type TP1 366 Figure 286 Mapping to octet 366 of serial character Figure 287 "1" bit structure 367 Figure 288 "0" bit structure 368 Figure 289 Delayed logical "0" 369 Figure 290 Example of two logical "0" overlap 369 Figure 291 Transmission method 372 Figure 292 Transmitter characteristics example 373 Figure 293 Example of TP164 transmitter block diagram 373 􀃼 Figure 294 Example of TP1256 transmitter block diagram (Ilimit 0.4A) 374 Figure 295 Relationship between frame data and asynchronous signal 375 Figure 296 Relationship between digital signal and serial bit stream 376 Figure 297 Example of dimmer 377 Figure 298 Physical segment 380 Figure 299 Physical segment 380 combined to line Figure 300 Combined to the line of the domain 381 Figure 301 Network topology 382 Figure 302 Control Field 385 Figure 303 Frame fields with standard field name abbreviations 385 Figure 304 Format 1s, L_Data_Standard frame format 386 Figure 305 Check octet 386 Figure 306 Frame fields 387 with standard frame field abbreviations Figure 307 Format 1e, L_Data_Extended frame format 387 Figure 308 Extended Control Field 387 Figure 309 Format 3 --- L_Pol_Data request frame format 388 Figure 310 L_Pol_Data response frame structure 388 Figure 311 Format 2 --- Short confirmation frame format 389 Figure 312 Character timing 390 Figure 313 Priority Operation 391 Figure 314 Guarantee of fair access 392 Figure 315 Data link layer state machine 396 Figure 316 Data link layer frame 405 Figure 317 The first data block structure 405 Figure 318 Structure of the second data block in a standard frame 406 Figure 319 Data link layer and network layer flow chart of HBESRFReady repeater 410 Figure 320 RF domain address based on RF repeater (basic flow chart) 411 Figure 321 Medium access algorithm for fast RF channel 412 Figure 322 PRM fast receiver scan sequence 414 Figure 323 Scan sequence 415 for PRM fast and slow receivers Figure 324 Scanning sequence of NPRM fast receiver 415 Figure 325 Scanning sequence for NPRM fast and slow receivers 416 Figure 326 NPRM low speed receiver scanning sequence 417 Figure 327 Contents of the post-amble message with Ack end 418 Figure 328 General Ack Insertion 419 Figure 329 Ack frame format 419 Figure 330 Time Slot Filling (R2KO) 420 􀃽 Figure 331 Ack algorithm, sender end 421 Figure 332 Ack algorithm, processing error 421 Figure 333 Ack algorithm, receiver end 422 Figure 334 General Repeater Algorithm 423 Figure 335 HBESRFReady algorithm 424 Figure 336 Fast HBESRFMulti repeater algorithm 424 Figure 337 Low-speed repeater algorithm 425 Figure 338 Communication between HBESRF1.1 and HBESRF1Muti devices 427 Figure 339 Communication between HBESRFReady and HBESRFMuti devices 428 Figure 340 Communication between HBESRFMuti devices and HBESRFMuti devices 428 Figure 341 Data format 455 Figure 342 Topology example 499 Figure 343 HBES installation space (IS) principle 500 Figure 344 HBES installation space layout 501 Figure 345 Example of a general infrastructure for a cabling system in a building 505 Figure 346 Park Infrastructure 506 Figure 347 Building infrastructure 507 Figure 348 Horizontal infrastructure 508 Figure 349 Apartment unit and single dwelling infrastructure 509 Figure 350 Actual location of the installation space in the room 510 Figure 351 Standardized HBES connector 511 Figure A.1 Risk reduction. general concepts517 Figure D.1 Binary format of the SEARCH_REQUEST frame. IP example 536 Figure D.2 Binary format of the SEARCH_RESPONSE frame. IP example 537 Figure D.3 Example of binary format of a KNXnet/IPDESCRIPTION_REQUEST frame 540 Figure D.4 Binary format of DESCRIPTION_RESPONSE frame. IP example 540 Figure D.5 Example of binary format of KNXnet/IPCONNECT_REQUEST frame 544 Figure D.6 Binary format of the CONNECT_RESPONSE frame. IP example 545 Figure D.7 Binary format of the CONNECTIONSTATE_REQUEST frame. IP example 547 Figure D.8 Binary format of a CONNECTIONSTATE_RESPONSE frame. IP example 548 Figure D.9 Binary format of the DISCONNECT_REQUEST frame. IP example 548 Figure D.10 Binary format of the DISCONNECT_RESPONSE frame. IP example 549 Figure D.11 Binary format of the DEVICE_CONFIGURATION_REQUEST frame. Example 550 Figure D.12 Binary format of the DEVICE_CONFIGURATION_ACK frame. Example 550 Figure D.13 Binary format of the TUNNELING_REQUEST frame. Example 551 Figure D.14 Binary format of the TUNNELING_ACK frame. Example 552 Figure D.15 Binary format of the ROUTING_INDICATION frame. Example 553 􀃾 Figure D.16 Binary format of the ROUTING_LOST_MESSAGE frame. Example 553 Figure F.1 Block diagram of AES-128 with CBC-MAC 562 Figure F.2 AES-CTR mode block diagram 563 Figure H.1 Authentication Procedure 571 Figure I.1 General wiring model 573 Figure I.2 Topology --- Case A 574 Figure I.3 Topology --- Case B 575 Figure J.1 Relationship between building cabling and building comfort performance level 577 Figure K.1 Application/device location 590 Figure L.1 Existing connectors for HBES and mains 593 Table 1 Layer management functions 30 Table 2 General management functions 31 Table 3 Application Management Entity (AME) Function Example 33 Table 4 Connection Type 41 Table 5 Applicable standards for HBES equipment 44 Table 6 Common methods of providing required insulation for protective isolation 45 Table 7 Performance criteria 49 Table 8 Media interface 50 Table 9 General interface, process interface and input/output 50 Table 10 Mains power (220VAC) 51 Table 11 Shell 51 Table 12 Conducted common mode disturbance limits for control lines, signal lines and DC power lines 61 Table 13 Mains terminal disturbance voltage limit 61 Table 14 Requirements for avoiding improper operation and possible implementation methods 70 Table 15 Group object type 74 Table 16 APCI Overview 83 Table 17 Function table 128 of A_MemoryBit_Write service Table 18 Function table 135 of A_UserMemoryBit_Write service Table 19 Key and access level association table 142 Table 20 Use of priority 147 Table 21 Connection-oriented state machine actions 172 Table 22 Conversion table --- Type 1 174 Table 23 Conversion table --- Rationalization type 1 176 Table 24 Conversion table --- Type 2 179 Table 25 Conversion table --- Type 3 181 Table 26 KNXnet/IP service types and IP protocols 186 􀃿 ⅩⅦ Table 27 KNXnet/IP device class 187 Table 28 Description Type Code 202 Table 29 Connection Type 209 Table 30 Generic CONNECT_RESPONSE status code 211 Table 31 CONNECTIONSTATE_RESPONSE status code 212 Table 32 Host protocol code for IP network 218 Table 33 Attribute Identifier 221 Table 34 Equipment performance 223 Table 35 Equipment performance 225 Table 36 Device Status 225 Table 37 Routing Performance 226 Table 38 KNXnet/IP parameter object attributes 227 Table 39 Device Statistics 229 Table 40 KNXnet/IP device management service type identifier 230 Table 41 Configuration status code 232 Table 42 KNXnet/IP service type identifier for tunneling 237 Table 43 Establishing tunnel 238 on KNX layer Table 44 Tunnel CONNECT_ACK error code 238 Table 45 KNXnet/IP routing service type identifier 248 Table 46 Security characteristics of HBES layer 254 Table 47 Security Algorithm Identification 263 Table 48 System Broadcast Identifier 264 Table 49 SBC-flag setting in S-A_Data-PDU 264 Table 50 Security whitelist and security blacklist for services 284 Table 51 Security middleware list service 285 Table 52 Safe intermediate list of data points 286 Table 53 Communication Mode for Security Services Received in Broadcast Communication Mode 286 Table 54 Core Tags 293 Table 55 Relationships between core tags 296 Table 56 REST Method 312 Table 57 HBES Network Service Selection 313 Table 58 General requirements for physical layer PL110 315 Table 59 Example of typical cable characteristics 317 Table 60 Power supply of MAU 317 Table 61 Impedance requirements for MAU 319 Table 62 Relationship between error group and error Table 322 Table 63 L_Data request priority 331 ⅩⅧ Table 64 Parameters for Ph-Data service 337 Table 65 Ph-Service_Class parameter 337 Table 66 Ph-Result value 337 Table 67 Electrical data code 345 Table 68 Transceiver Characteristics --- Transmit Part 346 Table 69 Transceiver Characteristics --- Receiver Part 346 Table 70 Mandatory and optional requirements for physical layer services 347 Table 71 Ph-Result parameters 347 Table 72 TP0 line requirements 348 Table 73 General Hardware Requirements 349 Table 74 Current consumption requirements 349 Table 75 Supply voltage 350 Table 76 Requirements for DPS power supply equipment 352 Table 77 Complete DPS requirements 354 Table 78 Possible cable lengths related to the number of connected DPS devices (for typical cables) 355 Table 79 Frame Priority - IFT 361 Table 80 Acknowledgement wait time, frame retransmission requirements 362 Table 81 Total waiting time, frame retransmission requirements 362 Table 82 System parameters 365 for physical layer types TP1-64 and TP1-256 Table 83 Analog and digital signals of logic "1" 367 Table 84 Analog and digital signals for logic "0" 368 Table 85 Restrictions on characters 370 Table 86 Unit current of standard equipment 371 Table 87 Dynamic requirements of TP164 transmitter 372 Table 88 Dynamic requirements of TP1256 transmitter 373 Table 89 Receiver Requirements 374 Table 90 Bit Encoding Requirements 375 Table 91 Requirements for bit decoding unit 376 Table 92 TP1 cable requirements 377 Table 93 Character encoding requirements 390 Table 94 Character decoding requirements 390 Table 95 Priority order, in descending order of importance 391 Table 96 Compliance Guide 397 Table 97 General requirements for the physical layer of HBESRFReady 398 Table 98 RFReady message structure 398 Table 99 Media Access Time 399 Table 100 HBESRFMulti physical layer wireless channel 400 ⅩⅨ Table 101 HBESRF channel definition 401 for RF channels F1, F2 and F3 Table 102 HBESRF channel definition 402 for RF channels S1 and S2 Table 103 HBESRFMulti message structure 403 Table 104 HBES serial number RF domain address usage 403 Table 105 HBESCTRL field value 408 Table 106 Media Access Time 411 Table 107 Communication Matrix 413 Table 108 Sending Matrix 417 Table 109 Transmission Matrix 426 Table 110 Bidirectional mode definition 427 Table 111 Result status after each event 470 Table 112 Summary of state machine types and tables 471 Table 113 Load management control address summary 472 Table 114 Loading status control address 478 Table 115 Loading status control address 480 Table 116 Run Status Events and Results Run Status 482 Table 117 Address 483 of operation status control Table 118 Application and HBES Class Example 502 Table 119 Minimum requirements for installation space functionality 503 Table 120 Standardized HBES connector 511 Table 121 HBES standard cable requirements 512 Table 122 Cable distribution in wiring duct 513 Table A.1 Example of risk categories for unexpected events 518 Table A.2 Explanation of risk categories 518 Table B.1 Hazardous events, sub-events leading to hazardous events and necessary risk reduction measures 519 Table E.1 General constants 555 Table E.2 Service type identifier 555 of the KNXnet/IP core specification Table E.3 Device Management Service Type Identifier 556 Table E.4 Tunnel service type identifier 556 Table E.5 Routing service type identifier 557 Table E.6 Connection type 557 Table E.7 Common KNXnet/IP error code 558 Table E.8 Generic CONNECT_RESPONSE status code 558 Table E.9 CONNECTIONSTATE_RESPONSE status code 558 Table E.10 Tunnel CONNECT_ACK error code 559 Table E.11 Device Management DEVICE_CONFIGURATION_ACK Status Code 559 Table E.12 Description type code 559 ⅩⅩ Table E.13 KNX media code 559 Table E.14 Host protocol code 560 for IP network Table E.15 Timeout constant 560 Table E.16 KNXnet/IP Internet protocol constants 560 Table J.1 Networks that may coexist in a cabling concept 576 Table K.1 Abbreviations used in Tables K.2 to K.14 580 Table K.2 Single-family multi-storey or multi-area villas --- economical and practical type 581 Table K.3 Single-family multi-storey or multi-area villas --- general use type 581 Table K.4 Single-family multi-storey or multi-area villas --- luxury applicable type 582 Table K.5 Apartment---Affordable Type 583 Table K.6 Apartment---Public Applicability 584 Table K.7 Apartment---Luxury Applicable Type 584 Table K.8 Hotel 585 Table K.9 Nursing Home 586 Table K.10 Store 587 Table K.11 Bar-Restaurant 587 Table K.12 Office 588 Table K.13 Recommended application locations in rooms 589 Table K.14 Comfort level (Example 2) 590 Table L.1 Standard connectors for TP type 0 and type 1 for class 1 HBES 592 Table M.1 General requirements 594 Table M.2 Requirements for HBES standard cables 594 ⅩⅩⅠ

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document replaces GB/T 20965-2013 "Control Network HBES Technical Specification Residential and Building Control Systems" and Compared with GB/T 20965-2013, in addition to structural adjustments and editorial changes, the main technical changes are as follows. --- Added "HBES safety" (see Section 7.4); --- Added "Network Services" (see Section 7.5); --- Added "HBESRF" (see Section 8.3). Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was jointly issued by the National Technical Committee for Standardization of Industrial Process Measurement, Control and Automation (SAC/TC124) and the National Technical Committee for Intelligent Buildings and Residential Buildings (SAC/TC124). It is jointly under the Technical Committee on Digital Standardization of Residential Areas (SAC/TC426). This document was drafted by. Mechanical Industry Instrumentation Comprehensive Technical and Economic Research Institute, Beijing Instrumentation Technology Development Co., Ltd., Haige Electrical Management (Shanghai) Co., Ltd., Guangzhou Vision Intelligent Co., Ltd., Guangzhou Hedong Technology Co., Ltd., Beijing Haian Ruihang Technology Co., Ltd. Co., Ltd., Zhuhai Huaxun Intelligent Control Technology Co., Ltd., Siemens (China) Co., Ltd., Komanli (Guangdong) Electric Co., Ltd., Nanjing Tiansuo Automation Control Systems Co., Ltd., Taichuang Technology Co., Ltd. The main drafters of this document are. Wang Linkun, Zheng Qiuping, Wang Jun, Wang Zhou, Du Jialin, Zhu Xiangjun, He Hairong, Gao Wei, Wu Yuanfu, Ye Minli, Hu Jingqun, Lu Jin, Fang Ming, Shen Pu, Yu Zhipeng, and Song Xiaoming. The previous versions of this document and the documents it replaces are as follows. ---Published as GB /Z 20965-2007 in.2007; ---First revised in.2013 to GB/T 20965-2013; ---This is the second revision. ⅩⅩⅡ

Introduction

The technical content specified in this document is also called KNX technology, which originated in Europe and is mainly used in the field of residential and building control. A distributed bus control technology. Note 1.KNX technology is derived from three bus control technologies used in homes and buildings, namely EIB, Batibus and EHS. tionBus, European installation bus) is its technical main body. Note 2.The technical content specified in this document is part of KNX technology. Other technical contents, such as application description, communication rules and interoperability regulations, are not included in this document. Etc., refer to the relevant technical documents of the KNX Association. Note 3.HBES is the name used by KNX technology during the standardization process. KNX is used uniformly in the market and technology promotion process. This document describes a distributed bus system based on event control, which mainly consists of the following parts. ---System overview. It mainly describes three aspects. system architecture, general technical requirements and product functional safety requirements. Characteristics and architecture; defines residential and building electronic systems based on safety extra low voltage (SELV) and protective extra low voltage (PELV) General technical requirements for HBES, including cabling and topology, electrical and functional safety, environmental conditions and failure and specific HBES installations Behavior under regulatory circumstances; specifies general functional safety requirements for HBES products and systems. ---Application characteristics. The application structure and the first type of HBES user process are mainly described. The basic concept of user process related to the application is given; The structure and function of the server side, which is used to form the interface objects and their data structures between the application layer and the application and management; define the application The data structure of the application interface layer and each application interface layer object is defined, and its functions are specified. ---Media independent layer. This paper mainly describes the common parts of the application layer, transport layer, network layer and data link layer of Class 1 HBES based on twisted pair and power line. The KNX protocol is integrated on the Internet Protocol (IP), namely KNXnet/IP. The common part of HBES application layer, transport layer, network layer and data link layer specifies the application layer, physical layer and data link layer in the process of HBES use. The services and protocols of the data link layer, network layer and transport layer, as well as the services and interfaces provided to the user process; KNXnet/IP specification The HBES security protocol specifies the standard protocol used by KNX devices connected to the IP network; the HBES security protocol specifies the HBES data security protocol; web Service defines the network interface protocol specification. ---Medium dependent layer. This paper mainly describes the Class 1 HBES power line and the twisted pair based on the Class 1 HBES network. It specifies two types of Class 1 power lines. PL110 and PL132 provide the necessary and optional requirements for the media-specific physical layer and data link layer; specify the two-pair cable of Category 1 HBES The HBESRF specifies the mandatory and optional requirements for the media-specific physical layer and data link layer of different types of TP0 and TP1; Protocol specifications. ---System management. The basic principles of network management and device management are given, and the interaction between management clients and management servers is standardized to achieve device configuration. Specifies the communication requirements between the management client and the management server. ---Product conformity assessment. It defines the criteria and standards for functional compliance testing and evaluation of HBES products and specifies the general compliance evaluation of communication protocols. The standard for HBES product and/or system conformity assessment is given in the standard. ---Installation requirements. It specifies the installation requirements of HBES; provides general rules for HBES design, engineering and wiring system installation; specifies the The rules for parallel laying of HBES1 category wiring and other networks. HBES Technical Specifications for Residential and Control Networks Building Control Systems

1 Scope

This document establishes the concept of an event-based distributed bus system (Home and Building Electronic System, HBES) The overall structure of HBES was established, and the management procedures for HBES were formulated, which stipulated the requirements for the medium-independent layer and the medium-dependent layer, product compliance testing and evaluation. Criteria and standards for assessment and installation requirements. This document applies to the design, manufacture, integration, installation and maintenance of automation control systems and products, especially to residential and building control systems. System field.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 2423.1 Environmental testing for electric and electronic products Part 2.Test methods Test A. Low temperature GB/T 2423.2 Environmental testing for electric and electronic products Part 2.Test methods Test B. High temperature GB/T 2423.3 Environmental testing Part 2.Test method Test Cab. Steady state damp heat test GB/T 2423.4 Environmental testing for electric and electronic products Part 2.Test method Test Db. Cyclic damp heat (12h 12h cycle) GB/T 2423.5 Environmental testing Part 2.Test method Test Ea and guidance. Impact GB/T 2423.10 Environmental testing Part 2.Test methods Test Fc. Vibration (sinusoidal) GB/T 2423.22 Environmental testing Part 2.Test method Test N. Temperature change GB/T 4798.3 Classification of environmental conditions Classification of environmental parameter groups and their severity classification Part 3.Climate-protected locations Fixed use GB/T 5023.1 Polyvinyl chloride insulated cables with rated voltage up to and including 450/750V Part 1.General requirements GB/T 5023.2 Thermoplastic insulated cables with rated voltage up to and including 450/750V Part 2.Test methods GB/T 7289-2017 Reference conditions for reliability failure rate of electrical components and stress model for failure rate conversion GB/T 9387.1 Information technology Open Systems Interconnection Basic Reference Model Part 1.Basic Model GB/T 16895.3 Low voltage electrical installations Part 5-54.Selection and installation of electrical equipment Grounding arrangements and protective conductors GB/T 16895.6 Low voltage electrical installations Part 5-52.Selection and installation of wiring systems for electrical equipment GB/T 16895.21-2020 Low voltage electrical installations Part 4-41.Safety protection Protection against electric shock GB/T 16935.1-2023 Insulation coordination for equipment in low-voltage power supply systems Part 1.Principles, requirements and tests GB/T 17045-2020 Common parts for electric shock protection devices and equipment GB/T 17625.2 Electromagnetic compatibility limits for equipment with a rated current of ≤16A per phase and unconditionally connected to the public low-voltage power supply Limitation of voltage changes, voltage fluctuations and flickers generated in the system