Artificial intelligence (AI) policy: ASHRAE prohibits the entry of content from any ASHRAE publication or related ASHRAE intellectual property (IP) into any AI tool, including but not limited to ChatGPT. Additionally, creating derivative works of ASHRAE IP using AI is also prohibited without express written permission from ASHRAE.

Close
logoShaping Tomorrow’s Built Environment Today

Interpretations For Standard 135-2008

Share This

NOTE: All documents linked from this page are in pdf_icon.png PDF format.

pdf_icon.png Interpretation 135-2008-1 – June 20, 2009 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Sections 12.19.10 and 12.20.10, relating to Shrinking Number_of_States in Commandable Multi-state objects.)

pdf_icon.png Interpretation 135-2008-2 – June 20, 2009 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12.24.4, related to the calculation of the Present_Value property of a Schedule object.)

pdf_icon.png Interpretation 135-2008-3 – January 23, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12, relating to the data type of the number of elements of an array when accessing an array property with array index 0.)

pdf_icon.png Interpretation 135-2008-4 – January 23, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Section 12.13.7, File Object Modification_Date property value.)

pdf_icon.png Interpretation 135-2008-5 – May 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008 relating to Date and Time.)

pdf_icon.png Interpretation 135-2008-6 – October 28, 2010 (Refers to the change of requirements presented in ANSI/ASHRAE Addendum l to ANSI/ASHRAE Standard 135-2008, Section 1 and ANSI/ASHRAE Addendum v to ANSI/ASHRAE Standard 135-2008, Section 3, relating to the support of the BIBB NM-CE-A in the device profile B-AWS.)

pdf_icon.png Interpretation 135-2008-7 – October 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 5.4 and 5.4.5.3, relating to the CannotSendSegmentedComplexACK for the AWAIT_RESPONSE.)

pdf_icon.png Interpretation 135-2008-8 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Section 24.5 and Figure 24-2 (page 32), relating to securing proprietary network messages)

pdf_icon.png Interpretation 135-2008-9 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Sections 12.X.15 and 24.16.2, relating to the Do_Not_Hide property of the Network Security object)

pdf_icon.png Interpretation 135-2008-10 – October 28, 2010 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Section 24.16.1, relating to APDU and NPDU sizes.)

pdf_icon.png Interpretation 135-2008-11 – October 28, 2010 (Refers to the requirements presented in Addendum p to ANSI/ASHRAE Standard 135-2008, Section 13.3.X, relating to the CHANGE_OF_STATUS_FLAGS Algorithm.)

pdf_icon.png Interpretation 135-2008-12 – October 28, 2010 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Sections 12.1 and 12.1.11, relating to Accumulator object's Scale property)

pdf_icon.png Interpretation 135-2008-13 – January 29, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 6.4.7 and 6.4.8 (pages 55 and 56), relating Initialize-Routing-Table and Initialize-Routing-Table-Ack.)

pdf_icon.png Interpretation 135-2008-14 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.2.11 (page 13), relating to Authentication Data length encoding.)

pdf_icon.png Interpretation 135-2008-15 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.2.3 and 24.12.1 (pages 11 and 40), relating to Selecting General-Network-Access key for encryption when another key is used for signing.)

pdf_icon.png Interpretation 135-2008-16 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.16.2 and Tables 24-8, 24-18, 24-22 and 24-24 (pages 47, 19, 22-23, 26-27, 28-29), relating to order of error checking in key messages.)

pdf_icon.png Interpretation 135-2008-17 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.15.2.1 (page 45), relating to methods for discovering time.)

pdf_icon.png Interpretation 135-2008-18 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.2.8, 24.2.9, 24.3.7, 24.12.1, S.1 (pages 12, 29, 39, 98), relating to Security Applied to Request-Master-Key message.)

pdf_icon.png Interpretation 135-2008-19 – January 29, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clause 24.3.3.3 and Table 24.11 (page 20), relating to What it means for a device to "know a key".)

pdf_icon.png Interpretation 135-2008-20 – May 25, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses J.2 (page 617), relating to BACnet Broadcast Management Device (BBMD) and BACnet Virtual Link Layer (BVLL) Services.)

pdf_icon.png Interpretation 135-2008-21 – May 25, 2011 (Refers to the requirements presented in ANSI/ASHRAE Standard 135-2008, Clauses 12.25 (pages 259 and 281), relating to Timestamping of Trend Log records.)

pdf_icon.png Interpretation 135-2008-22 – October 27, 2011 (Refers to the requirements presented in Addendum g to ANSI/ASHRAE Standard 135-2008, Clauses 24.12.1, 24.13.6 and 24.15.2.1 (pages 39, 40, 44-46), relating to validation of time stamp and message ID routers.)

Close