IEEE 1900.6b-2022
$82.33
IEEE Standard for Spectrum Sensing Interfaces and Data Structures for Dynamic Spectrum Access and Other Advanced Radio Communication Systems Amendment 2: Spectrum Database Interfaces
Published By | Publication Date | Number of Pages |
IEEE | 2022 | 152 |
Amendment Standard – Active. This amendment to IEEE Std 1900.6-2011 adds procedures, protocols, and message format specifications for the exchange of sensing related data, control data, and configuration data between spectrum sensors and spectrum databases. In addition, it adds specifications for the exchange of sensing related data between the data archive and spectrum databases, and the cognitive engine and spectrum databases.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 1900.6b-2022 Front Cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
9 | Introduction |
10 | Contents |
11 | 1. Overview 1.4 Word usage |
12 | 2. Normative references 3. Definitions, acronyms, and abbreviations 3.1 Definitions |
13 | 3.2 Acronyms and abbreviations 4. System model 4.5 Scenario 5: Single CE/DA, single Sensor and a single CE, DA, or Sensor hosting a gateway function as a service interface towards a client spectrum database |
15 | 4.6 Scenario 6: Single CE/DA, single Sensor and spectrum database as an IEEE 1900.6 compliant entity (SD) |
17 | 5. The IEEE 1900.6 reference model 5.1 General description |
19 | 5.1a Security requirements |
20 | 5.1b Entity identification method |
21 | 5.3 Service access points 5.3.1 Measurement service access point 5.3.1.3a Management and configuration services 5.3.1.3a.1 FeatureLockCapabilities.request |
22 | 5.3.1.3a.2 FeatureLockCapabilities.response |
24 | 5.3.1.3a.3 FeatureLock.request |
27 | 5.3.1.3a.4 FeatureLock.response |
29 | 5.3.1.3a.5 FeatureUnlock.request |
30 | 5.3.1.3a.6 FeatureUnlock.response |
31 | 5.3.1.3a.7 FeatureBreaklock.request |
33 | 5.3.1.3a.8 FeatureBreaklock.response |
34 | 5.3.1.4.16 Notification.request |
35 | 5.3.1.4.17 Notification.indication |
36 | 5.3.2 Communication service access point |
37 | 5.3.2.2a Management and configuration services 5.3.2.2a.1 FeatureLockCapabilities.request |
38 | 5.3.2.2a.2 FeatureLockCapabilities.response |
39 | 5.3.2.2a.3 FeatureLock.request |
42 | 5.3.2.2a.4 FeatureLock.response |
44 | 5.3.2.2a.5 FeatureUnlock.request |
45 | 5.3.2.2a.6 FeatureUnlock.response |
47 | 5.3.2.2a.7 FeatureBreaklock.request |
48 | 5.3.2.2a.8 FeatureBreaklock.response |
50 | 5.3.2.2a.9 EntityListCreate.request |
52 | 5.3.2.2a.10 EntityListCreate.response |
54 | 5.3.2.2a.11 EntityListModify.request |
55 | 5.3.2.2a.12 EntityListModify.response |
57 | 5.3.2.2a.13 EntityListDelete.request |
58 | 5.3.2.2a.14 EntityListDelete.response |
59 | 5.3.2.3.4 Notification.request |
60 | 5.3.2.3.5 Notification.indication |
61 | 5.3.2.4 Security services 5.3.2.4.1 SecAuth.request |
62 | 5.3.2.4.2 SecAuth.response |
63 | 5.3.3 Application service access point |
64 | 5.3.3.1.5 Advertisement.request 5.3.3.1.7 LinkSetup.request 5.3.3.1.8 LinkSetup.response 5.3.3.1.9 LinkTermination.request |
65 | 5.3.3.1.10 LinkTermination.response 5.3.3.2.1 Read_Sensing_Related_Info.request 5.3.3.2.3 Write_Sensing_Related_Info.request |
66 | 5.3.3.3.11 FeatureLockCapabilities.request |
67 | 5.3.3.3.12 FeatureLockCapabilities.response |
68 | 5.3.3.3.13 FeatureLock.request |
71 | 5.3.3.3.14 FeatureLock.response |
73 | 5.3.3.3.15 FeatureUnlock.request |
74 | 5.3.3.3.16 FeatureUnlock.response |
76 | 5.3.3.3.17 FeatureBreaklock.request |
77 | 5.3.3.3.18 FeatureBreaklock.response |
80 | 5.3.3.4.3b Notification.indication |
81 | 5.3.3.4.4 Get_Data_Source_List.request 5.3.3.4.5 Get_Data_Source_List.response 5.3.3.5 Security services 5.3.3.5.1 SecAuth.request |
83 | 5.3.3.5.2 SecAuth.response |
84 | 6. Information description 6.2.2.5 CERT 6.2.2.6 SecKey |
85 | 6.2.2.7 SecCha 6.3 Description of sensing-related parameters 6.3.20a Security key (SecKey) 6.3.20b Secure Channel (SecCha) 6.3.20c Secure Status (SecStatus) |
86 | 6.3.22 ClientLogID 6.3.22e Data source logical ID (DataSourceLogID) 6.3.22f DataSourceType 6.3.29 SensorID 6.3.30 Sensor logical ID (SensorLogID) |
87 | 6.3.33b Logical entity identifier (LogicalID) 6.3a Description of SAP exception and error codes |
90 | 7. State diagram and generic procedures 7.5 Service access point life cycle 7.5.1 Default SAP instances |
91 | 7.5.2 Dynamic SAP implementations |
92 | 7.5.3 Dynamic SAP identities 7.5.4 Dynamic SAP addressing |
94 | Annex A (informative) Use cases A.2 Use cases from the perspective of spectrum sensing A.3 Use cases involving spectrum databases A.3.1 Generic spectrum database-related use cases (SDG) A.3.1.1 Basic Use Case 1: Database-Internal Model Update (SDG1) |
95 | A.3.1.2 Basic Use Case 2: Database Parameter Initialization (SDG2) A.3.1.3 Basic Use Case 3: Database Acting as a Sensor or Data Archive (SDG3) |
96 | A.3.1.4 Basic Use Case 4: Regulatory-Compliant Database Enhancement (SDG4) |
97 | A.3.1.5 Basic Use Case 5: Sensing System Processed Information for Database Improvement (SDG5) A.3.1.6 Basic Use Case 6: Spectrum Database Sensing System Configuration and Optimization (SDG6) |
98 | A.3.1.7 Compressed sensing information (SDG7) |
101 | A.3.2 Regulatory use of spectrum databases (SDREG) A.3.2.1 TV white space spectrum databases (SDREG1) |
103 | A.3.2.2 Spectrum database resource awareness and allocation with aggregation considerations (SDREG2) |
107 | A.3.2.3 Citizens Broadband Radio Service (SDREG3) |
109 | A.3.3 Operator use of spectrum database (SDOPR) A.3.3.1 Licensed-shared access (SDOPR1) |
111 | A.3.3.2 Wide area sensing (SDOPR2) |
113 | A.3.4 Vertical use of spectrum databases (SDVER) A.3.4.1 Industrial communications (SDVER1) |
116 | Annex B (informative) Use case classification |
123 | Annex DA (informative) IEEE 1900.6 SD: Scope and usage DA.1 Introduction DA.2 Scope and usage of the SD |
124 | DA.3 SD requirements |
126 | DA.4 SD interfaces |
128 | DA.5 SD deployment examples |
136 | DA.6 Best practice referencing and addressing IEEE 1900.6 entities |
139 | Annex DB (informative) Entity list use and management best practice |
143 | Annex DC (informative) Security considerations |
147 | Annex DD (informative) IEEE 1900.6 SAP Information model and best-practice architecture DD.1 Adaptation layer |
148 | DD.2 SAP Management DD.3 SAP Logic DD.4 Security sublayer DD.5 Communication system abstraction layer |
149 | DD.6 Simplifications for trusted subsystems |
150 | DD.7 Sophisticated and special-use SAP adaptation layers |
151 | Annex F (informative) Bibliography |
152 | Back Cover |