Shaping Tomorrow's Built Environment Today

Interpretations For Standard 135-2008

Share This

NOTE: All documents linked from this page are in pdf_icon.png PDF format.

pdf_icon.png Interpretation 135-2008-1 – June 20, 2009 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Sections 12.19.10 and 12.20.10, relating to Shrinking Number_of_States in Commandable Multi-state objects.)

pdf_icon.png Interpretation 135-2008-2 – June 20, 2009 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12.24.4, related to the calculation of the Present_Value property of a Schedule object.)

pdf_icon.png Interpretation 135-2008-3 – January 23, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12, relating to the data type of the number of elements of an array when accessing an array property with array index 0.)

pdf_icon.png Interpretation 135-2008-4 – January 23, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12.13.7, File Object Modification_Date property value.)

pdf_icon.png Interpretation 135-2008-5 – May 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008 relating to Date and Time.)

pdf_icon.png Interpretation 135-2008-6 – October 28, 2010 (Refers to the change of requirements presented in ANSI/ASHRAE Addendum l to ANSI/ASHRAE Standard 135-2008, Section 1 and ANSI/ASHRAE Addendum v to ANSI/ASHRAE Standard 135-2008, Section 3, relating to the support of the BIBB NM-CE-A in the device profile B-AWS.)

pdf_icon.png Interpretation 135-2008-7 – October 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 5.4 and 5.4.5.3, relating to the CannotSendSegmentedComplexACK for the AWAIT_RESPONSE.)

pdf_icon.png Interpretation 135-2008-8 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Section 24.5 and Figure 24-2 (page 32), relating to securing proprietary network messages)

pdf_icon.png Interpretation 135-2008-9 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Sections 12.X.15 and 24.16.2, relating to the Do_Not_Hide property of the Network Security object)

pdf_icon.png Interpretation 135-2008-10 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Section 24.16.1, relating to APDU and NPDU sizes.)

pdf_icon.png Interpretation 135-2008-11 – October 28, 2010 (Refers to the requirements presented in Addendum p to ANSI/ASHRAE Standard 135-2008, Section 13.3.X, relating to the CHANGE_OF_STATUS_FLAGS Algorithm.)

pdf_icon.png Interpretation 135-2008-12 – October 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Sections 12.1 and 12.1.11, relating to Accumulator object's Scale property)

pdf_icon.png Interpretation 135-2008-13 – January 29, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 6.4.7 and 6.4.8 (pages 55 and 56), relating Initialize-Routing-Table and Initialize-Routing-Table-Ack.)

pdf_icon.png Interpretation 135-2008-14 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.2.11 (page 13), relating to Authentication Data length encoding.)

pdf_icon.png Interpretation 135-2008-15 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.2.3 and 24.12.1 (pages 11 and 40), relating to Selecting General-Network-Access key for encryption when another key is used for signing.)

pdf_icon.png Interpretation 135-2008-16 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.16.2 and Tables 24-8, 24-18, 24-22 and 24-24 (pages 47, 19, 22-23, 26-27, 28-29), relating to order of error checking in key messages.)

pdf_icon.png Interpretation 135-2008-17 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.15.2.1 (page 45), relating to methods for discovering time.)

pdf_icon.png Interpretation 135-2008-18 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.2.8, 24.2.9, 24.3.7, 24.12.1, S.1 (pages 12, 29, 39, 98), relating to Security Applied to Request-Master-Key message.)

pdf_icon.png Interpretation 135-2008-19 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.3.3.3 and Table 24.11 (page 20), relating to What it means for a device to "know a key".)

pdf_icon.png Interpretation 135-2008-20 – May 25, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses J.2 (page 617), relating to BACnet Broadcast Management Device (BBMD) and BACnet Virtual Link Layer (BVLL) Services.)

pdf_icon.png Interpretation 135-2008-21 – May 25, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 12.25 (pages 259 and 281), relating to Timestamping of Trend Log records.)

pdf_icon.png Interpretation 135-2008-22 – October 27, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.12.1, 24.13.6 and 24.15.2.1 (pages 39, 40, 44-46), relating to validation of time stamp and message ID routers.)

Close