Shopping Cart

No products in the cart.

BSI PD CLC/TS 50136-9:2017 – TC:2020 Edition

$258.95

Tracked Changes. Alarm systems. Alarm transmission systems and equipment – Requirements for common protocol for alarm transmission using the Internet Protocol (IP)

Published By Publication Date Number of Pages
BSI 2020 126
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This Technical Specification specifies a protocol for point-to-point transmission of alarms and faults, as well as communications monitoring, between a Supervised Premises Transceiver and a Receiving Centre Transceiver using the Internet protocol (IP). The protocol is intended for use over any network that supports the transmission of IP data. These include Ethernet, xDSL, GPRS, WiFi, UMTS and WIMAX. The system performance characteristics for alarm transmission are specified in EN 50136-1 and EN 50136-1-5. The performance characteristics of the supervised premises equipment should comply with the requirements of its associated alarm system standard and shall apply for transmission of all types of alarms including, but not limited to, fire, intrusion, access control and social alarms. Compliance with this Technical Specification is voluntary.

PDF Catalog

PDF Pages PDF Title
68 National foreword
75 1 Scope
2 Normative references
3 Terms, definitions and abbreviations
3.1 Terms and definitions
3.2 Abbreviations
76 4 Objective
5 Messaging
5.1 General
77 5.2 Message format overview
5.2.1 General
5.2.2 Identifiers
78 5.2.3 Message format
79 5.2.4 Connection handle
5.2.5 Device ID
5.2.5.1 General
5.2.5.2 SPT Device ID
80 5.2.6 Message ID
81 5.2.7 Message Length
5.2.8 Sequence numbers
5.2.9 Flags
5.3 Padding and message length
5.3.1 General
82 5.3.2 Message Length
5.4 Hashing
5.4.1 General
5.4.2 Invalid hash – transmitter response
5.4.3 Invalid hash – receiver response
5.5 Encryption
5.5.1 General
83 5.5.2 Key exchange
5.6 Timeouts and retries
84 5.7 Version number
5.8 Reverse commands
5.9 Initial values
85 6 Message types
6.1 Path supervision
6.1.1 General
6.1.2 Poll message
86 6.1.3 Poll response
6.2 Event message format
6.2.1 General
88 6.2.2 Event field
6.2.3 Time event field
6.2.4 Time message field
89 6.2.5 Link field – IP Address
6.2.6 Link field – Port number
6.2.7 Link field – URL
90 6.2.8 Link field – Filename
6.2.9 Alarm Text
6.2.10 Site Name
6.2.11 Building Name
6.2.12 Location
91 6.2.13 Room
6.2.14 Alarm Trigger
6.2.15 Longitude
6.2.16 Latitude
92 6.2.17 Altitude
6.3 Event response format
93 6.4 Configuration messages
6.4.1 General
6.4.2 Connection handle request
6.4.3 Connection handle response
94 6.4.4 Device ID request
95 6.4.5 Device ID response
6.4.6 Encryption selection request
96 6.4.7 Encryption selection response
6.4.8 Encryption key exchange request
97 6.4.9 Encryption key exchange response
6.4.10 Hash selection request
98 6.4.11 Hash selection response
6.4.12 Path supervision request
99 6.4.13 Path supervision response
6.4.14 Set time command
6.4.15 Set time response
100 6.4.16 Protocol version request
6.4.17 Protocol version response
101 6.4.18 Transparent message
6.4.19 Transparent response
102 6.4.20 DTLS completed request
6.4.21 DTLS completed response
103 6.4.22 RCT IP parameter request
6.4.23 RCT IP parameter response
104 7 Commissioning and connection setup
7.1 Commissioning
7.1.1 General
7.1.2 Procedures
7.1.3 Commissioning message sequence
105 7.1.4 Commissioning using Shared Secret
7.1.4.1 General
106 7.1.4.2 Transferring the Shared Secret via out-of-band channel
7.1.5 Commissioning using X.509 Certificates and DTLS
107 7.2 Connection setup
109 Annex A (normative)Result codes
110 Annex B (normative)Protocol Identifiers
111 Annex C (normative)Shared secret
C.1 Formatting of the shared secret
C.2 Checksum for Shared Secret Formatting
C.3 Example of Secret Encoding and Formatting
112 Annex D (informative)Examples of messaging sequences
D.1 Commissioning
116 D.2 Connection setup
119 Annex E (informative)Examples of application protocols
E.1 SIA
E.2 Ademco Contact ID
120 E.3 Scancom Fast Format
E.4 VdS 2465
122 Annex F (informative)Design principles
F.1 General
F.2 Information security
F.3 Use of UDP signalling
BSI PD CLC/TS 50136-9:2017 - TC
$258.95