IEEE 802.15.3b-2005
$85.58
IEEE Standard for IEEE Amendment to Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN): Amendment to MAC Sublayer
Published By | Publication Date | Number of Pages |
IEEE | 2005 | 160 |
Amendment Standard – Superseded. This amendment provides corrections and optimizations to IEEE Std 802.15.3-2003. The management service access points (SAPs) have been completely updated to create a consistent, logical interface. As a consequence, most of the message sequence charts (MSCs) in the medium access control (MAC) functional specification have been updated as well. Channel time usage is more efficient with the addition of multiple contention periods, releasing channel time, implied acknowledgment, and multicast groups. (The PDF of this standard is available at no cost.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.15.3b-2005 Cover |
3 | Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs): Amendment 1: MAC Sublayer |
6 | Introduction Notice to users Errata Interpretations |
7 | Patents Conformance test methodology Participants |
11 | Contents |
15 | Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs): Amendment 1: MAC Sublayer 3. Definitions |
16 | 4. Acronyms and abbreviations 6. Layer management 6.1 Overview of management model |
17 | 6.2 Generic management primitives |
18 | 6.2.1 MLME-GET.request and PLME-GET.request |
19 | 6.2.2 MLME-GET.confirm and PLME-GET.confirm 6.2.3 MLME-SET.request and PLME-SET.request 6.2.4 MLME-SET.confirm and PLME-SET.confirm 6.3 MLME SAP interface |
21 | 6.3.1 Resetting the MAC/MLME 6.3.1.1 MLME-RESET.request |
22 | 6.3.1.2 MLME-RESET.confirm 6.3.2 Scanning for piconets |
24 | 6.3.2.1 MLME-SCAN.request |
25 | 6.3.2.2 MLME-SCAN.confirm 6.3.2.3 MLME-SCAN.indication 6.3.3 Starting a piconet |
26 | 6.3.3.1 MLME-START.request 6.3.3.2 MLME-START.confirm |
27 | 6.3.4 Stopping a piconet 6.3.4.1 MLME-STOP.request |
28 | 6.3.4.2 MLME-STOP.confirm 6.3.5 Associating with a piconet |
29 | 6.3.5.1 MLME-ASSOCIATE.request 6.3.5.2 MLME-ASSOCIATE.confirm 6.3.5.3 MLME-ASSOCIATE.indication |
30 | 6.3.6 Disassociation from a piconet 6.3.6.1 MLME-DISASSOCIATE.request 6.3.6.2 MLME-DISASSOCIATE.confirm |
31 | 6.3.6.3 MLME-DISASSOCIATE.indication 6.3.7 Security management |
33 | 6.3.7.1 MLME-MEMBERSHIP-UPDATE.request 6.3.7.2 MLME-MEMBERSHIP-UPDATE.confirm 6.3.7.3 MLME-SECURITY-ERROR.indication 6.3.7.4 MLME-SECURITY-MESSAGE.request |
34 | 6.3.7.5 MLME-SECURITY-MESSAGE.confirm 6.3.7.6 MLME-SECURITY-MESSAGE.indication 6.3.8 PNC handover |
35 | 6.3.8.1 MLME-PNC-HANDOVER.indication 6.3.8.2 MLME-PNC-HANDOVER.response 6.3.8.3 MLME-NEW-PNC.indication 6.3.9 Requesting DEV information from the PNC |
36 | 6.3.9.1 MLME-DEV-INFO.request 6.3.9.2 MLME-DEV-INFO.confirm 6.3.9.3 MLME-DEV-INFO.indication 6.3.10 Security information retrieval |
37 | 6.3.10.1 MLME-SECURITY-INFO.request |
38 | 6.3.10.2 MLME-SECURITY-INFO.confirm 6.3.10.3 MLME-SECURITY-INFO.indication 6.3.10.4 MLME-SECURITY-INFO.response 6.3.11 Application specific data management |
40 | 6.3.11.1 MLME-APPLICATION-SPECIFIC.request 6.3.11.2 MLME-APPLICATION-SPECIFIC.confirm 6.3.11.3 MLME-APPLICATION-SPECIFIC.indication 6.3.12 Piconet services management |
42 | 6.3.12.1 MLME-ANNOUNCE-SERVICE.request 6.3.12.2 MLME-ANNOUNCE-SERVICE.confirm 6.3.12.3 MLME-PICONET-SERVICES.request 6.3.12.4 MLME-PICONET-SERVICES.confirm |
43 | 6.3.12.5 MLME-PICONET-SERVICES.indication 6.3.13 Stream management |
45 | 6.3.13.1 MLME-CREATE-STREAM.request 6.3.13.2 MLME-CREATE-STREAM.confirm 6.3.13.3 MLME-CREATE-STREAM.indication |
46 | 6.3.13.4 MLME-MODIFY-STREAM.request 6.3.13.5 MLME-MODIFY-STREAM.confirm 6.3.13.6 MLME-TERMINATE-STREAM.request |
47 | 6.3.13.7 MLME-TERMINATE-STREAM.confirm 6.3.13.8 MLME-TERMINATE-STREAM.indication 6.3.14 Piconet parameter management |
48 | 6.3.14.1 MLME-BSID-CHANGE.request 6.3.14.2 MLME-BSID-CHANGE.confirm 6.3.14.3 MLME-PICONET-PARM-CHANGE.indication 6.3.15 Power management |
50 | 6.3.15.1 MLME-PS-SET-INFORMATION.request 6.3.15.2 MLME-PS-SET-INFORMATION.confirm |
51 | 6.3.15.3 MLME-SPS-CONFIGURE.request 6.3.15.4 MLME-SPS-CONFIGURE.confirm 6.3.15.5 MLME-PM-MODE-CHANGE.request 6.3.15.6 MLME-PM-MODE-CHANGE.confirm |
52 | 6.3.15.7 MLME-PM-MODE-CHANGE.indication 6.3.15.8 MLME-MONITOR-PM-MODE.request 6.3.15.9 MLME-MONITOR-PM-MODE.confirm 6.3.15.10 MLME-MONITOR-PM-MODE.indication |
53 | 6.3.16 Multicast operations |
54 | 6.3.16.1 MLME-MULTICAST-CONFIGURATION.request 6.3.16.2 MLME-MULTICAST-CONFIGURATION.confirm |
55 | 6.3.16.3 MLME-MULTICAST-RX-SETUP.request 6.3.16.4 MLME-MULTICAST-RX-SETUP.confirm 6.3.17 Timing synchronization 6.3.17.1 MLME-BEACON-EVENT.request |
56 | 6.3.17.2 MLME-BEACON-EVENT.confirm 6.3.17.3 MLME-BEACON-EVENT.indication 6.5 MAC management 6.5.1 MAC PIB PNC group |
57 | 6.5.2 MAC PIB characteristics group |
58 | 6.6 MAC SAP |
60 | 6.6.1 MAC-ASYNC-DATA.request 6.6.2 MAC-ASYNC-DATA.confirm |
61 | 6.6.3 MAC-ASYNC-DATA.indication 6.6.4 MAC-ISOCH-DATA.request 6.6.5 MAC-ISOCH-DATA.confirm |
62 | 6.6.6 MAC-ISOCH-DATA.indication 7. MAC frame formats 7.1 Frame format conventions |
63 | 7.2 General frame format 7.2.1 Frame control 7.2.1.2 Frame type 7.2.1.4 ACK policy and implied ACK (Imp-ACK) request |
64 | 7.2.1.6 More data 7.2.1.7 Imp-ACK negative acknowledgment (NAK) 7.2.1.8 CTA relinquish 7.2.3 SrcID and DestID |
65 | 7.2.4 Fragmentation control 7.2.4.1 MSDU number 7.2.5 Stream index 7.2.6 MAC header validation 7.2.7 MAC frame body 7.2.7.3 Secure frame counter (SFC) |
66 | 7.3 Format of individual frame types 7.3.1 Beacon frame 7.3.1.1 Non-secure beacon frame 7.3.2 Acknowledgment frames 7.3.2.1 Immediate ACK (Imm-ACK) frame 7.3.2.2 Delayed ACK (Dly-ACK) frame |
67 | 7.3.4 Data frame 7.3.4.2 Secure data frame 7.3.5 LLC/SNAP data frame 7.3.5.1 Non-secure LLC/SNAP data frame 7.3.5.2 Secure LLC/SNAP data frame |
68 | 7.4 Information elements 7.4.2 BSID 7.4.7 Application specific |
69 | 7.4.10 CTA status 7.4.11 Capability |
70 | 7.4.16 Piconet services |
71 | 7.4.18 Group ID 7.4.19 Stream renew 7.4.20 Next PNC |
72 | 7.4.21 Piconet channel status 7.5 MAC command types |
73 | 7.5.1 Association and disassociation commands 7.5.1.2 Association response 7.5.1.3 Disassociation request 7.5.3 PNC handover commands 7.5.3.1 PNC handover request 7.5.4 Information request commands 7.5.4.5 Probe request |
74 | 7.5.4.6 Probe response 7.5.5 Information announcement commands 7.5.5.2 Announce |
75 | 7.5.5.3 Announce response 7.5.6 Channel time allocation request, modification, and termination commands 7.5.6.1 Channel time request |
76 | 7.5.6.2 Channel time response |
77 | 7.5.7 Channel status commands 7.5.7.2 Channel status response 7.5.7.4 Remote scan response 7.5.8 Power management commands 7.5.8.4 SPS configuration response 7.5.8.6 PM mode change response |
78 | 7.5.9 Special commands 7.5.9.2 Vendor specific 7.5.9.3 ASIE request 7.5.9.4 ASIE response |
79 | 7.5.10 Multicast configuration commands 7.5.10.1 Multicast configuration request 7.5.10.2 Multicast configuration response |
80 | 8. MAC functional description 8.1 Introduction |
81 | 8.2 Starting, maintaining, and stopping piconets 8.2.1 Scanning through channels |
82 | 8.2.2 Starting a piconet 8.2.3 PNC handover |
85 | 8.2.3a Preliminary handover |
86 | 8.2.3b Next PNC |
87 | 8.2.4 Dependent PNC handover |
89 | 8.2.5 Child piconet |
90 | 8.2.6 Neighbor piconet |
91 | 8.2.7 Stopping piconet operations 8.2.7.1 Stopping an independent or parent piconet |
92 | 8.2.7.2 Parent PNC stopping a dependent piconet 8.3 Association and disassociation with a piconet 8.3.1 Association |
94 | 8.3.2 Piconet services |
96 | 8.3.3 Broadcasting piconet information 8.3.4 Disassociation |
97 | 8.4 Channel access |
98 | 8.4.1 Interframe space (IFS) 8.4.2 Carrier sense multiple access with collision avoidance (CSMA/CA) Contention based channel access |
99 | 8.4.3 Channel time allocation period channel access 8.4.3.1 Channel time allocations (CTA) |
101 | 8.4.3.2 Channel time allocation (CTA) and channel time usage 8.4.3.3 Management CTAs |
102 | 8.4.3.4 Slotted-aloha access for open and association MCTAs 8.4.3.8 Relinquishing CTA time to another DEV |
103 | 8.5 Channel time management 8.5.1 Isochronous stream management |
104 | 8.5.1.1 Isochronous stream creation |
106 | 8.5.1.2 Isochronous stream modification |
107 | 8.5.1.3 Isochronous stream termination |
110 | 8.5.2 Asynchronous channel time reservation and termination 8.5.2.1 Asynchronous channel time reservation |
111 | 8.5.2.2 Asynchronous channel time termination 8.5.3 Multicast group configuration |
113 | 8.6 Synchronization 8.6.2 Beacon generation 8.6.3 Beacon reception |
114 | 8.6.4 Beacon information announcement 8.8 Acknowledgment and retransmission 8.8.3 Delayed acknowledgment |
115 | 8.8.3a Implied acknowledgment (Imp-ACK) |
117 | 8.8.4 Retransmissions 8.9 Peer discovery 8.9.1 PNC information request 8.9.2 Probe request and response |
118 | 8.9.3 Announce command 8.9.4 Channel status request 8.9.5 Remote scan 8.9.6 PNC channel scanning 8.10 Changing piconet parameters 8.10.3 Setting the PNID or BSID |
119 | 8.11 Interference mitigation 8.11.1 Dynamic channel selection |
120 | 8.11.2 Transmit power control 8.11.2.2 Adjustable transmitter power in a CTA 8.13 Power management |
121 | 8.13.1 Piconet synchronized power save (PSPS) mode 8.13.2 Device synchronized power save (DSPS) mode 8.13.2.1 Creation, use, and management of DSPS sets 8.13.2.2 CTA timing in DSPS mode 8.13.4 Message sequence charts for power save modes |
125 | 8.14 ASIE operation |
128 | 8.15 MAC parameters 9. Security 9.1 Security mechanisms 9.1.1 Security membership and key establishment 9.1.4 Data integrity |
129 | 9.1.6 Command integrity protection 9.3 Security support 9.3.4 Membership update |
130 | 9.3.5 Secure frame generation 9.3.6 Secure frame reception |
131 | 9.3.8 Key selection |
132 | 9.4 Protocol details 9.4.1 Security information request and distribution |
133 | 9.4.2 Key distribution protocol |
134 | 9.4.3 Key request protocol 10. Security specifications 10.2 Symmetric cryptography building blocks 10.2.4 Nonce value |
135 | 11. PHY specification for the 2.4 GHz band 11.2 General requirements 11.2.7 PHY layer timing 11.2.7.4 Time between successive transmissions 11.7 PHY management |
138 | Annex A (normative) Frame convergence sublayer A.1 Generic convergence sublayer A.1a A.1.1 FCSL PDU classification |
139 | A.1b A.1.2 IEEE 802.2 FCSL A.1b.1 A.1.2.1 IEEE 802.2 FCSL QoS support A.1b.2 A.1.2.2 Data entity inter-relationships |
140 | A.2 802.2 FCSL SAP A.2.1 MA-UNITDATA.request |
141 | A.2.3 MA-UNITDATA-STATUS.indication |
142 | Annex B (informative) Security considerations B.1 Background assumptions B.1.4 Security key lifecycle issues B.3 Properties of the 802.15.3 security suite B.3.1 Key usage B.3.2 Replay prevention |
144 | Annex D (normative) Protocol implementation conformance statement (PICS) proforma D.7 PICS proforma-IEEE Std. 802.15.3-2003 D.7.1 Major roles for IEEE 802.15.3 DEVs D.7.2 PHY functions |
145 | D.7.3 Major capabilities for the MAC sublayer |
148 | Annex D1 (informative) Implementation considerations D1.1 Channel time requests D1.1.1 Types of CTAs |
149 | D1.1.2 Interpretation of channel time requests |
150 | D1.1.3 Determining CTA Rate Factor from stream requirements |
152 | D1.1.4 PNC interpretation of CTA rate factor |
153 | D1.1.5 Creating channel time requests from MLME requests |
155 | D1.1.6 Interpreting channel time requests |
157 | D1.2 Sample frames |
159 | D1.3 64-bit DEV address mapping |
160 | Annex E (informative) Bibliography |