Shopping Cart

No products in the cart.

IEEE 802.15.3b-2005

$85.58

IEEE Standard for IEEE Amendment to Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN): Amendment to MAC Sublayer

Published By Publication Date Number of Pages
IEEE 2005 160
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Amendment Standard – Superseded. This amendment provides corrections and optimizations to IEEE Std 802.15.3-2003. The management service access points (SAPs) have been completely updated to create a consistent, logical interface. As a consequence, most of the message sequence charts (MSCs) in the medium access control (MAC) functional specification have been updated as well. Channel time usage is more efficient with the addition of multiple contention periods, releasing channel time, implied acknowledgment, and multicast groups. (The PDF of this standard is available at no cost.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.15.3b-2005 Cover
3 Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs): Amendment 1: MAC Sublayer
6 Introduction
Notice to users
Errata
Interpretations
7 Patents
Conformance test methodology
Participants
11 Contents
15 Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs): Amendment 1: MAC Sublayer
3. Definitions
16 4. Acronyms and abbreviations
6. Layer management
6.1 Overview of management model
17 6.2 Generic management primitives
18 6.2.1 MLME-GET.request and PLME-GET.request
19 6.2.2 MLME-GET.confirm and PLME-GET.confirm
6.2.3 MLME-SET.request and PLME-SET.request
6.2.4 MLME-SET.confirm and PLME-SET.confirm
6.3 MLME SAP interface
21 6.3.1 Resetting the MAC/MLME
6.3.1.1 MLME-RESET.request
22 6.3.1.2 MLME-RESET.confirm
6.3.2 Scanning for piconets
24 6.3.2.1 MLME-SCAN.request
25 6.3.2.2 MLME-SCAN.confirm
6.3.2.3 MLME-SCAN.indication
6.3.3 Starting a piconet
26 6.3.3.1 MLME-START.request
6.3.3.2 MLME-START.confirm
27 6.3.4 Stopping a piconet
6.3.4.1 MLME-STOP.request
28 6.3.4.2 MLME-STOP.confirm
6.3.5 Associating with a piconet
29 6.3.5.1 MLME-ASSOCIATE.request
6.3.5.2 MLME-ASSOCIATE.confirm
6.3.5.3 MLME-ASSOCIATE.indication
30 6.3.6 Disassociation from a piconet
6.3.6.1 MLME-DISASSOCIATE.request
6.3.6.2 MLME-DISASSOCIATE.confirm
31 6.3.6.3 MLME-DISASSOCIATE.indication
6.3.7 Security management
33 6.3.7.1 MLME-MEMBERSHIP-UPDATE.request
6.3.7.2 MLME-MEMBERSHIP-UPDATE.confirm
6.3.7.3 MLME-SECURITY-ERROR.indication
6.3.7.4 MLME-SECURITY-MESSAGE.request
34 6.3.7.5 MLME-SECURITY-MESSAGE.confirm
6.3.7.6 MLME-SECURITY-MESSAGE.indication
6.3.8 PNC handover
35 6.3.8.1 MLME-PNC-HANDOVER.indication
6.3.8.2 MLME-PNC-HANDOVER.response
6.3.8.3 MLME-NEW-PNC.indication
6.3.9 Requesting DEV information from the PNC
36 6.3.9.1 MLME-DEV-INFO.request
6.3.9.2 MLME-DEV-INFO.confirm
6.3.9.3 MLME-DEV-INFO.indication
6.3.10 Security information retrieval
37 6.3.10.1 MLME-SECURITY-INFO.request
38 6.3.10.2 MLME-SECURITY-INFO.confirm
6.3.10.3 MLME-SECURITY-INFO.indication
6.3.10.4 MLME-SECURITY-INFO.response
6.3.11 Application specific data management
40 6.3.11.1 MLME-APPLICATION-SPECIFIC.request
6.3.11.2 MLME-APPLICATION-SPECIFIC.confirm
6.3.11.3 MLME-APPLICATION-SPECIFIC.indication
6.3.12 Piconet services management
42 6.3.12.1 MLME-ANNOUNCE-SERVICE.request
6.3.12.2 MLME-ANNOUNCE-SERVICE.confirm
6.3.12.3 MLME-PICONET-SERVICES.request
6.3.12.4 MLME-PICONET-SERVICES.confirm
43 6.3.12.5 MLME-PICONET-SERVICES.indication
6.3.13 Stream management
45 6.3.13.1 MLME-CREATE-STREAM.request
6.3.13.2 MLME-CREATE-STREAM.confirm
6.3.13.3 MLME-CREATE-STREAM.indication
46 6.3.13.4 MLME-MODIFY-STREAM.request
6.3.13.5 MLME-MODIFY-STREAM.confirm
6.3.13.6 MLME-TERMINATE-STREAM.request
47 6.3.13.7 MLME-TERMINATE-STREAM.confirm
6.3.13.8 MLME-TERMINATE-STREAM.indication
6.3.14 Piconet parameter management
48 6.3.14.1 MLME-BSID-CHANGE.request
6.3.14.2 MLME-BSID-CHANGE.confirm
6.3.14.3 MLME-PICONET-PARM-CHANGE.indication
6.3.15 Power management
50 6.3.15.1 MLME-PS-SET-INFORMATION.request
6.3.15.2 MLME-PS-SET-INFORMATION.confirm
51 6.3.15.3 MLME-SPS-CONFIGURE.request
6.3.15.4 MLME-SPS-CONFIGURE.confirm
6.3.15.5 MLME-PM-MODE-CHANGE.request
6.3.15.6 MLME-PM-MODE-CHANGE.confirm
52 6.3.15.7 MLME-PM-MODE-CHANGE.indication
6.3.15.8 MLME-MONITOR-PM-MODE.request
6.3.15.9 MLME-MONITOR-PM-MODE.confirm
6.3.15.10 MLME-MONITOR-PM-MODE.indication
53 6.3.16 Multicast operations
54 6.3.16.1 MLME-MULTICAST-CONFIGURATION.request
6.3.16.2 MLME-MULTICAST-CONFIGURATION.confirm
55 6.3.16.3 MLME-MULTICAST-RX-SETUP.request
6.3.16.4 MLME-MULTICAST-RX-SETUP.confirm
6.3.17 Timing synchronization
6.3.17.1 MLME-BEACON-EVENT.request
56 6.3.17.2 MLME-BEACON-EVENT.confirm
6.3.17.3 MLME-BEACON-EVENT.indication
6.5 MAC management
6.5.1 MAC PIB PNC group
57 6.5.2 MAC PIB characteristics group
58 6.6 MAC SAP
60 6.6.1 MAC-ASYNC-DATA.request
6.6.2 MAC-ASYNC-DATA.confirm
61 6.6.3 MAC-ASYNC-DATA.indication
6.6.4 MAC-ISOCH-DATA.request
6.6.5 MAC-ISOCH-DATA.confirm
62 6.6.6 MAC-ISOCH-DATA.indication
7. MAC frame formats
7.1 Frame format conventions
63 7.2 General frame format
7.2.1 Frame control
7.2.1.2 Frame type
7.2.1.4 ACK policy and implied ACK (Imp-ACK) request
64 7.2.1.6 More data
7.2.1.7 Imp-ACK negative acknowledgment (NAK)
7.2.1.8 CTA relinquish
7.2.3 SrcID and DestID
65 7.2.4 Fragmentation control
7.2.4.1 MSDU number
7.2.5 Stream index
7.2.6 MAC header validation
7.2.7 MAC frame body
7.2.7.3 Secure frame counter (SFC)
66 7.3 Format of individual frame types
7.3.1 Beacon frame
7.3.1.1 Non-secure beacon frame
7.3.2 Acknowledgment frames
7.3.2.1 Immediate ACK (Imm-ACK) frame
7.3.2.2 Delayed ACK (Dly-ACK) frame
67 7.3.4 Data frame
7.3.4.2 Secure data frame
7.3.5 LLC/SNAP data frame
7.3.5.1 Non-secure LLC/SNAP data frame
7.3.5.2 Secure LLC/SNAP data frame
68 7.4 Information elements
7.4.2 BSID
7.4.7 Application specific
69 7.4.10 CTA status
7.4.11 Capability
70 7.4.16 Piconet services
71 7.4.18 Group ID
7.4.19 Stream renew
7.4.20 Next PNC
72 7.4.21 Piconet channel status
7.5 MAC command types
73 7.5.1 Association and disassociation commands
7.5.1.2 Association response
7.5.1.3 Disassociation request
7.5.3 PNC handover commands
7.5.3.1 PNC handover request
7.5.4 Information request commands
7.5.4.5 Probe request
74 7.5.4.6 Probe response
7.5.5 Information announcement commands
7.5.5.2 Announce
75 7.5.5.3 Announce response
7.5.6 Channel time allocation request, modification, and termination commands
7.5.6.1 Channel time request
76 7.5.6.2 Channel time response
77 7.5.7 Channel status commands
7.5.7.2 Channel status response
7.5.7.4 Remote scan response
7.5.8 Power management commands
7.5.8.4 SPS configuration response
7.5.8.6 PM mode change response
78 7.5.9 Special commands
7.5.9.2 Vendor specific
7.5.9.3 ASIE request
7.5.9.4 ASIE response
79 7.5.10 Multicast configuration commands
7.5.10.1 Multicast configuration request
7.5.10.2 Multicast configuration response
80 8. MAC functional description
8.1 Introduction
81 8.2 Starting, maintaining, and stopping piconets
8.2.1 Scanning through channels
82 8.2.2 Starting a piconet
8.2.3 PNC handover
85 8.2.3a Preliminary handover
86 8.2.3b Next PNC
87 8.2.4 Dependent PNC handover
89 8.2.5 Child piconet
90 8.2.6 Neighbor piconet
91 8.2.7 Stopping piconet operations
8.2.7.1 Stopping an independent or parent piconet
92 8.2.7.2 Parent PNC stopping a dependent piconet
8.3 Association and disassociation with a piconet
8.3.1 Association
94 8.3.2 Piconet services
96 8.3.3 Broadcasting piconet information
8.3.4 Disassociation
97 8.4 Channel access
98 8.4.1 Interframe space (IFS)
8.4.2 Carrier sense multiple access with collision avoidance (CSMA/CA) Contention based channel access
99 8.4.3 Channel time allocation period channel access
8.4.3.1 Channel time allocations (CTA)
101 8.4.3.2 Channel time allocation (CTA) and channel time usage
8.4.3.3 Management CTAs
102 8.4.3.4 Slotted-aloha access for open and association MCTAs
8.4.3.8 Relinquishing CTA time to another DEV
103 8.5 Channel time management
8.5.1 Isochronous stream management
104 8.5.1.1 Isochronous stream creation
106 8.5.1.2 Isochronous stream modification
107 8.5.1.3 Isochronous stream termination
110 8.5.2 Asynchronous channel time reservation and termination
8.5.2.1 Asynchronous channel time reservation
111 8.5.2.2 Asynchronous channel time termination
8.5.3 Multicast group configuration
113 8.6 Synchronization
8.6.2 Beacon generation
8.6.3 Beacon reception
114 8.6.4 Beacon information announcement
8.8 Acknowledgment and retransmission
8.8.3 Delayed acknowledgment
115 8.8.3a Implied acknowledgment (Imp-ACK)
117 8.8.4 Retransmissions
8.9 Peer discovery
8.9.1 PNC information request
8.9.2 Probe request and response
118 8.9.3 Announce command
8.9.4 Channel status request
8.9.5 Remote scan
8.9.6 PNC channel scanning
8.10 Changing piconet parameters
8.10.3 Setting the PNID or BSID
119 8.11 Interference mitigation
8.11.1 Dynamic channel selection
120 8.11.2 Transmit power control
8.11.2.2 Adjustable transmitter power in a CTA
8.13 Power management
121 8.13.1 Piconet synchronized power save (PSPS) mode
8.13.2 Device synchronized power save (DSPS) mode
8.13.2.1 Creation, use, and management of DSPS sets
8.13.2.2 CTA timing in DSPS mode
8.13.4 Message sequence charts for power save modes
125 8.14 ASIE operation
128 8.15 MAC parameters
9. Security
9.1 Security mechanisms
9.1.1 Security membership and key establishment
9.1.4 Data integrity
129 9.1.6 Command integrity protection
9.3 Security support
9.3.4 Membership update
130 9.3.5 Secure frame generation
9.3.6 Secure frame reception
131 9.3.8 Key selection
132 9.4 Protocol details
9.4.1 Security information request and distribution
133 9.4.2 Key distribution protocol
134 9.4.3 Key request protocol
10. Security specifications
10.2 Symmetric cryptography building blocks
10.2.4 Nonce value
135 11. PHY specification for the 2.4 GHz band
11.2 General requirements
11.2.7 PHY layer timing
11.2.7.4 Time between successive transmissions
11.7 PHY management
138 Annex A (normative) Frame convergence sublayer
A.1 Generic convergence sublayer
A.1a A.1.1 FCSL PDU classification
139 A.1b A.1.2 IEEE 802.2 FCSL
A.1b.1 A.1.2.1 IEEE 802.2 FCSL QoS support
A.1b.2 A.1.2.2 Data entity inter-relationships
140 A.2 802.2 FCSL SAP
A.2.1 MA-UNITDATA.request
141 A.2.3 MA-UNITDATA-STATUS.indication
142 Annex B (informative) Security considerations
B.1 Background assumptions
B.1.4 Security key lifecycle issues
B.3 Properties of the 802.15.3 security suite
B.3.1 Key usage
B.3.2 Replay prevention
144 Annex D (normative) Protocol implementation conformance statement (PICS) proforma
D.7 PICS proforma-IEEE Std. 802.15.3-2003
D.7.1 Major roles for IEEE 802.15.3 DEVs
D.7.2 PHY functions
145 D.7.3 Major capabilities for the MAC sublayer
148 Annex D1 (informative) Implementation considerations
D1.1 Channel time requests
D1.1.1 Types of CTAs
149 D1.1.2 Interpretation of channel time requests
150 D1.1.3 Determining CTA Rate Factor from stream requirements
152 D1.1.4 PNC interpretation of CTA rate factor
153 D1.1.5 Creating channel time requests from MLME requests
155 D1.1.6 Interpreting channel time requests
157 D1.2 Sample frames
159 D1.3 64-bit DEV address mapping
160 Annex E (informative) Bibliography
IEEE 802.15.3b-2005
$85.58