BSI PD CLC/TS 50136-9:2017
$198.66
Alarm systems. Alarm transmission systems and equipment – Requirements for common protocol for alarm transmission using the Internet Protocol (IP)
Published By | Publication Date | Number of Pages |
BSI | 2017 | 58 |
This Technical Specification specifies a protocol for point-to-point transmission of alarms and faults, as well as communications monitoring, between a Supervised Premises Transceiver and a Receiving Centre Transceiver using the Internet Protocol (IP).
The protocol is intended for use over any network that supports the transmission of IP data. These include Ethernet, xDSL, GPRS, WiFi, UMTS and WIMAX.
The system performance characteristics for alarm transmission are specified in EN 50136‑1 .
The performance characteristics of the supervised premises equipment should comply with the requirements of its associated alarm system standard and applies for transmission of all types of alarms including, but not limited to, fire, intrusion, access control and social alarms.
Compliance with this Technical Specification is voluntary.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
9 | 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations |
10 | 4 Objective 5 Messaging 5.1 General |
11 | 5.2 Message format overview 5.2.1 General 5.2.2 Identifiers |
12 | 5.2.3 Message format |
13 | 5.2.4 Connection handle 5.2.5 Device ID 5.2.5.1 General 5.2.5.2 SPT Device ID |
14 | 5.2.6 Message ID |
15 | 5.2.7 Message Length 5.2.8 Sequence numbers 5.2.9 Flags 5.3 Padding and message length 5.3.1 General |
16 | 5.3.2 Message Length 5.4 Hashing 5.4.1 General 5.4.2 Invalid hash – transmitter response 5.4.3 Invalid hash – receiver response 5.5 Encryption 5.5.1 General |
17 | 5.5.2 Key exchange 5.6 Timeouts and retries |
18 | 5.7 Version number 5.8 Reverse commands 5.9 Initial values |
19 | 6 Message types 6.1 Path supervision 6.1.1 General 6.1.2 Poll message |
20 | 6.1.3 Poll response 6.2 Event message format 6.2.1 General |
22 | 6.2.2 Event field 6.2.3 Time event field 6.2.4 Time message field |
23 | 6.2.5 Link field – IP Address 6.2.6 Link field – Port number 6.2.7 Link field – URL |
24 | 6.2.8 Link field – Filename 6.2.9 Alarm Text 6.2.10 Site Name 6.2.11 Building Name 6.2.12 Location |
25 | 6.2.13 Room 6.2.14 Alarm Trigger 6.2.15 Longitude 6.2.16 Latitude |
26 | 6.2.17 Altitude 6.3 Event response format |
27 | 6.4 Configuration messages 6.4.1 General 6.4.2 Connection handle request 6.4.3 Connection handle response |
28 | 6.4.4 Device ID request |
29 | 6.4.5 Device ID response 6.4.6 Encryption selection request |
30 | 6.4.7 Encryption selection response 6.4.8 Encryption key exchange request |
31 | 6.4.9 Encryption key exchange response 6.4.10 Hash selection request |
32 | 6.4.11 Hash selection response 6.4.12 Path supervision request |
33 | 6.4.13 Path supervision response 6.4.14 Set time command 6.4.15 Set time response |
34 | 6.4.16 Protocol version request 6.4.17 Protocol version response |
35 | 6.4.18 Transparent message 6.4.19 Transparent response |
36 | 6.4.20 DTLS completed request 6.4.21 DTLS completed response |
37 | 6.4.22 RCT IP parameter request 6.4.23 RCT IP parameter response |
38 | 7 Commissioning and connection setup 7.1 Commissioning 7.1.1 General 7.1.2 Procedures 7.1.3 Commissioning message sequence |
39 | 7.1.4 Commissioning using Shared Secret 7.1.4.1 General |
40 | 7.1.4.2 Transferring the Shared Secret via out-of-band channel 7.1.5 Commissioning using X.509 Certificates and DTLS |
41 | 7.2 Connection setup |
43 | Annex A (normative)Result codes |
44 | Annex B (normative)Protocol Identifiers |
45 | Annex C (normative)Shared secret C.1 Formatting of the shared secret C.2 Checksum for Shared Secret Formatting C.3 Example of Secret Encoding and Formatting |
46 | Annex D (informative)Examples of messaging sequences D.1 Commissioning |
50 | D.2 Connection setup |
53 | Annex E (informative)Examples of application protocols E.1 SIA E.2 Ademco Contact ID |
54 | E.3 Scancom Fast Format E.4 VdS 2465 |
56 | Annex F (informative)Design principles F.1 General F.2 Information security F.3 Use of UDP signalling |