Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS EN IEC 61850-8-2:2019 Communication networks and systems for power utility automation Specific Communication Service Mapping (SCSM). Mapping to Extensible Messaging Presence Protocol (XMPP)
Sponsored link
sklademVydáno: 2019-03-05
BS EN IEC 61850-8-2:2019 Communication networks and systems for power utility automation Specific Communication Service Mapping (SCSM). Mapping to Extensible Messaging Presence Protocol (XMPP)

BS EN IEC 61850-8-2:2019

Communication networks and systems for power utility automation Specific Communication Service Mapping (SCSM). Mapping to Extensible Messaging Presence Protocol (XMPP)

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
383.91 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
38.39 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
115.17 €
Anglicky Hardcopy
In stock
383.91 €
Označení normy:BS EN IEC 61850-8-2:2019
Počet stran:232
Vydáno:2019-03-05
ISBN:978 0 580 90794 4
Status:Standard
DESCRIPTION

BS EN IEC 61850-8-2:2019


This standard BS EN IEC 61850-8-2:2019 Communication networks and systems for power utility automation is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering
EC 61850-8-2:2018 specifies a method of exchanging data through any kinds of network, including public networks. Among the various kinds of services specified in IEC 61850-7-2, only the client/server and time synchronization services are considered so far.
NOTE Client/server services of GOOSE and SMV models are mapped as well.
For the client/server services, the principle is to map the objects and services of the ACSI (Abstract Communication Service Interface defined in IEC 61850-7-2) to XML messages transported over XMPP. The mapping description includes mainly three aspects:
• The usage of the XMPP protocol itself, describing in details which features are really used and how they are used by the mapping.
• How to achieve end-to-end secured communications.
• The description of the XML payloads corresponding to each ACSI service thanks in particular to the XML Schema and XML message examples.