Shopping Cart

No products in the cart.

BS EN 61784-3-3:2017

$215.11

Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 3

Published By Publication Date Number of Pages
BSI 2017 144
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 3 of IEC 61784-1, IEC 61784-2 (CP 3/1, CP 3/2, CP 3/4, CP 3/5 and CP 3/6) and IEC 61158 Types 3 and 10. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This safety communication layer is intended for implementation in safety devices only.

NOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.

This part 1 defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2 for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.

This part provides guidelines for both developers and assessors of compliant devices and systems.

NOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system – implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.

PDF Catalog

PDF Pages PDF Title
2 National foreword
7 English
CONTENTS
13 FOREWORD
15 Figures
Figure 1 – Relationships of IEC 617843 with other standards (machinery)
16 Figure 2 – Relationships of IEC 617843 with other standards (process)
19 1 Scope
2 Normative references
21 3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions
3.1.1 Common terms and definitions
27 3.1.2 CPF 3: Additional terms and definitions
31 3.2 Symbols and abbreviated terms
3.2.1 Common symbols and abbreviated terms
32 3.2.2 CPF 3: Additional symbols and abbreviated terms
33 3.3 Conventions
4 Overview of FSCP 3/1 (PROFIsafe™)
34 Figure 3 – Basic communication preconditions for FSCP 3/1
Figure 4 – Structure of an FSCP 3/1 safety PDU
35 Figure 5 – Safety communication on CPF 3
36 5 General
5.1 External documents providing specifications for the profile
5.2 Safety functional requirements
5.3 Safety measures
37 5.4 Safety communication layer structure
5.4.1 Principle of FSCP 3/1 safety communications
Figure 6 – Standard CPF 3 transmission system
Tables
Table 1 – Deployed measures to master errors
38 5.4.2 CPF 3 communication structures
Figure 7 – Safety layer architecture
39 Figure 8 – Basic communication layers
Figure 9 – Multiport switch bus structure
40 Figure 10 – Linear bus structure
Figure 11 – Crossing network borders with routers
41 5.5 Relationships with FAL (and DLL, PhL)
5.5.1 Device model
Figure 12 – Complete safety transmission paths
42 5.5.2 Application and communication relationships
5.5.3 Data types
Figure 13 – IO Device model
Table 2 – Data types for FSCP 3/1
43 6 Safety communication layer services
6.1 F-Host services
Figure 14 – FSCP 3/1 communication structure
44 Figure 15 – F user interface of F-Host driver instances
45 Figure 16 – Motivation for "Channel-related Passivation"
46 6.2 F-Device services
47 Figure 17 – F-Device driver interfaces
48 6.3 Diagnosis
6.3.1 Safety alarm generation
6.3.2 F-Device safety layer diagnosis including the iPar-Server
49 7 Safety communication layer protocol
7.1 Safety PDU format
7.1.1 Safety PDU structure
Table 3 – Safety layer diagnosis messages
50 7.1.2 Safety IO data
7.1.3 Status and Control Byte
Figure 18 – Safety PDU for CPF 3
Figure 19 – Status Byte
51 Figure 20 – Control Byte
52 7.1.4 (Virtual) MonitoringNumber
Figure 21 – The Toggle Bit function
53 7.1.5 (Virtual) MNR mechanism (F_CRC_Seed=0)
7.1.6 (Virtual) MNR mechanism (F_CRC_Seed=1)
Figure 22 – F-Device MonitoringNumber
Table 4 – MonitoringNumber of an F-Host PDU
Table 5 – MonitoringNumber of an F-Device PDU
54 Table 6 – MonitoringNumber of an F-Host PDU
Table 7 – MonitoringNumber of an F-Device PDU
55 7.1.7 CRC2 Signature (F_CRC_Seed=0)
Figure 23 – F-Host CRC2 signature generation (F_CRC_Seed=0)
56 7.1.8 CRC2 Signature (F_CRC_Seed=1)
Figure 24 – Details of the CRC2 signature calculation (F_CRC_Seed=0)
Figure 25 – CRC2 signature calculation (F_CRC_Seed=1)
57 7.1.9 Non-safety IO data
7.2 FSCP 3/1 behavior
7.2.1 General
Figure 26 – Details of the CRC2 signature calculation (F_CRC_Seed=1)
Figure 27 – Safety layer communication relationship
58 7.2.2 F-Host state diagram
Figure 28 – F-Host state diagram
59 Table 8 – Definition of terms used in F-Host state diagram
Table 9 – F-Host states and transitions
61 7.2.3 F-Device state diagram
62 Figure 29 – F-Device state diagram
Table 10 – Definition of terms used in Figure 29
63 Table 11 – F-Device states and transitions
65 7.2.4 Sequence diagrams
Figure 30 – Interaction F-Host / F-Device during start-up
66 Figure 31 – Interaction F-Host / F-Device during F-Host power off → on
67 Figure 32 – Interaction F-Host / F-Device with delayed power on
68 Figure 33 – Interaction F-Host / F-Device during power off → on
69 Figure 34 – Interaction F-Host / F-Device while host recognizes CRC error
70 Figure 35 – Interaction F-Host / F-Device while device recognizes CRC error
71 7.2.5 Timing diagram for a MonitoringNumber reset
7.2.6 Monitoring of safety times
Figure 36 – Impact of the MNR reset signal
72 Figure 37 – Monitoring the message transit time F-Host ↔ F-Output
Figure 38 – Monitoring the message transit time F-Input ↔ F-Host
74 7.3 Reaction in the event of a malfunction
7.3.1 Unintended repetition
Figure 39 – Extended watchdog time on request
Table 12 – SIL monitor times
75 7.3.2 Loss
7.3.3 Insertion
7.3.4 Incorrect sequence
7.3.5 Corruption of safety data
7.3.6 Unacceptable delay
7.3.7 Masquerade
76 7.3.8 Addressing
7.3.9 Memory failures within switches
Table 13 – Remedies for switch failures
77 7.3.10 Loop-back
7.3.11 Network boundaries and router
Table 14 – Safety network boundaries
78 7.4 F-Startup and parameter change at runtime
7.4.1 Standard startup procedure
7.4.2 iParameter assignment deblocking
8 Safety communication layer management
8.1 F-Parameter
8.1.1 Summary
Figure 40 – iParameter assignment deblocking by the F-Host
79 8.1.2 F_Source/Destination_Address (Codename)
8.1.3 F_WD_Time (F-Watchdog time)
Table 15 – Codename octet order
80 8.1.4 F_WD_Time_2 (secondary F-Watchdog time)
8.1.5 F_Prm_Flag1 (Parameters for the safety layer management)
Figure 41 – Effect of F_WD_Time_2
Figure 42 – F_Prm_Flag1
81 Figure 43 – F_Check_SeqNr
Figure 44 – F_Check_iPar
Figure 45 – F_SIL
82 8.1.6 F_Prm_Flag2 (Parameters for the safety layer management)
Figure 46 – F_CRC_Length
Figure 47 – F_CRC_Seed
Figure 48 – F_Prm_Flag2
83 8.1.7 F_iPar_CRC (value of iPar_CRC across iParameters)
Figure 49 – F_Passivation
Figure 50 – F_Block_ID
Figure 51 – F_Par_Version
84 8.1.8 F_Par_CRC calculation (across F-Parameters)
8.1.9 Structure of the F-Parameter record data object
8.2 iParameter and iPar_CRC
Figure 52 – F-Parameter
85 8.3 Safety parameterization
8.3.1 Objectives
Figure 53 – iParameter block
86 8.3.2 GSDL and GSDML safety extensions
Table 16 – GSDL keywords for F-Parameters and F-IO structures
87 Figure 54 – F-Parameter extension within the GSDML specification
88 8.3.3 Securing safety parameters and GSD data
89 Figure 55 – F_Par_CRC signature including iPar_CRC
Figure 56 – Algorithm to build CRC0
90 Table 17 – GSD example in GSDL notation
91 Figure 57 – GSD example in GSDML notation
Table 18 – Serialized octet stream for the examples
92 8.4 Safety configuration
8.4.1 Securing the safety IO data description (CRC7)
Table 19 – IO data structure items
93 8.4.2 DataItem data type section examples
94 Figure 58 – DataItem section for F_IN_OUT_1
95 Figure 59 – DataItem section for F_IN_OUT_2
96 Figure 60 – DataItem section for F_IN_OUT_5
97 8.5 Data type information usage
8.5.1 F-Channel driver
Figure 61 – DataItem section for F_IN_OUT_6
98 8.5.2 Rules for standard F-Channel drivers
Figure 62 – F-Channel driver as "glue" between F-Device and user program
Table 20 – Sample F-Channel drivers
99 8.5.3 Recommendations for F-Channel drivers
Figure 63 – Layout example of an F-Channel driver
100 8.6 Safety parameter assignment mechanisms
8.6.1 F-Parameter assignment
8.6.2 General iParameter assignment
Figure 64 – F-Parameter assignment for simple F-Devices and F-Slaves
101 8.6.3 System integration requirements for iParameterization tools
Figure 65 – F and iParameter assignment for complex F-Devices
Table 21 – Requirements for iParameterization
102 Figure 66 – System integration of CPD-Tools
103 8.6.4 iPar-Server
Figure 67 – iPar-Server mechanism (commissioning)
104 Figure 68 – iPar-Server mechanism (for example F-Device replacement)
105 Figure 69 – iPar-Server request coding ("status model")
106 Figure 70 – Coding of SR_Type
Table 22 – Specifier for the iPar-Server Request
107 Figure 71 – iPar-Server request coding ("alarm model")
Table 23 – Structure of the Read_RES_PDU ("read record")
108 Table 24 – Structure of the Write_REQ_PDU ("write record")
Table 25 – Structure of the Pull_RES_PDU ("Pull")
Table 26 – Structure of the Push_REQ_PDU ("Push")
109 Figure 72 – iPar-Server state diagram
110 Table 27 – iPar-Server states and transitions
111 Table 28 – iPar-Server management measures
112 9 System requirements
9.1 Indicators and switches
9.2 Installation guidelines
9.3 Safety function response time
9.3.1 Model
113 Figure 73 – Example safety function with a critical response time path
Figure 74 – Simplified typical response time model
114 9.3.2 Calculation and optimization
Figure 75 – Frequency distributions of typical response times of the model
115 Figure 76 – Context of delay times and watchdog times
116 9.3.3 Adjustment of watchdog times for FSCP 3/1
Figure 77 – Timing sections forming the FSCP 3/1 F_WD_Time
117 9.3.4 Engineering tool support
9.3.5 Retries (repetition of messages)
Figure 78 – Frequency distribution of response times with message retries
118 9.4 Duration of demands
Figure 79 – Retries with CP 3/1
Figure 80 – Retries with CP 3/RTE
119 9.5 Constraints for the calculation of system characteristics
9.5.1 Probabilistic considerations
Figure 81 – Residual error probabilities for the 24-bit CRC polynomial
120 Figure 82 – Residual error probabilities for the 32-bit CRC polynomial
121 9.5.2 Safety related assumptions
Figure 83 – Monitoring of corrupted messages
Table 29 – Definition of terms in Figure 83
122 9.5.3 Non safety related constraints (availability)
9.6 Maintenance
9.6.1 F-Module commissioning / replacement
9.6.2 Identification and maintenance functions
9.7 Safety manual
123 Table 30 – Information to be included in the safety manual
124 9.8 Wireless transmission channels
9.8.1 Black channel approach
9.8.2 Availability
9.8.3 Security measures
Figure 84 – Considerations against systematic loop-back configuration errors
125 Figure 85 – Security for WLAN networks
Table 31 – Definition of terms in Figure 85
Table 32 – Security measures for WLAN (IEEE 802.11)
126 Figure 86 – Security for Bluetooth networks
Table 33 – Definition of terms in Figure 86
127 9.8.4 Stationary and mobile applications
9.9 Conformance classes
Table 34 – Security measures for Bluetooth (IEEE 802.15.1)
Table 35 – F-Host conformance class requirements
129 10 Assessment
10.1 Safety policy
10.2 Obligations
Table 36 – Main characteristics of protocol versions
Table 37 – F-Host/F-Device conformance matrix
131 Annex A (informative) Additional information for functional safety communication profiles of CPF 3
A.1 Hash function calculation
Figure A.1 – Typical "C" procedure of a cyclic redundancy check
132 Table A.1 – The table "Crctab24" for 24 bit CRC signature calculations
133 Table A.2 – The table "Crctab32" for 32 bit CRC signature calculations
134 A.2 Example values for MonitoringNumbers (MNR)
Table A.3 – The table "Crctab16" for 16 bit CRC signature calculations
135 A.3 Response time measurements
Figure A.2 – Comparison of the response time model and a real application
Table A.4 – Values of CN_incrNR_64 and MNR for F-Host PDU
136 Figure A.3 – Frequency distribution of measured response times
137 Figure A.4 – F-Host with standard and safety-related application programs
138 Annex B (informative) Information for assessment of the functional safety communication profiles of CPF 3
139 Bibliography
BS EN 61784-3-3:2017
$215.11