{"id":395972,"date":"2024-10-20T04:22:10","date_gmt":"2024-10-20T04:22:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-15-3-2003\/"},"modified":"2024-10-26T08:08:53","modified_gmt":"2024-10-26T08:08:53","slug":"ieee-802-15-3-2003","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-15-3-2003\/","title":{"rendered":"IEEE 802.15.3-2003"},"content":{"rendered":"

New IEEE Standard – Superseded. The protocol and compatible interconnection of data and multimedia communication equipment via 2.4 GHz radio transmissions in a Wireless Personal Area Network (WPAN) using low power and multiple modulation formats to support scalable data rates is defined in this standard. The Medium Access Control (MAC) sublayer protocol supports both isochronous and asynchronous data types<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nCover Page
CONTENTS <\/td>\n<\/tr>\n
2<\/td>\nTitle Page <\/td>\n<\/tr>\n
4<\/td>\nIntroduction <\/td>\n<\/tr>\n
5<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\n1. Overview
1.1 Scope <\/td>\n<\/tr>\n
11<\/td>\n1.2 Purpose
2. References <\/td>\n<\/tr>\n
12<\/td>\n3. Definitions <\/td>\n<\/tr>\n
14<\/td>\n4. Acronyms and abbreviations <\/td>\n<\/tr>\n
17<\/td>\n5. General description
5.1 What is a piconet?
5.2 Components of an 802.15.3 piconet
5.3 Overview of MAC functionality <\/td>\n<\/tr>\n
18<\/td>\n5.3.1 Coordination
5.3.1.1 Starting a piconet
5.3.1.2 Handing over control of the piconet
5.3.1.3 Creating a child piconet <\/td>\n<\/tr>\n
19<\/td>\n5.3.1.4 Creating a neighbor piconet
5.3.2 Ending a piconet
5.3.2.1 Ending a piconet with a dependent piconet involved <\/td>\n<\/tr>\n
20<\/td>\n5.3.3 Association and disassociation
5.3.4 Security overview
5.3.5 The 802.15.3 superframe <\/td>\n<\/tr>\n
21<\/td>\n5.3.6 Channel time management <\/td>\n<\/tr>\n
22<\/td>\n5.3.7 Data communications between DEVs
5.3.8 Information discovery in the piconet <\/td>\n<\/tr>\n
23<\/td>\n5.3.9 Dynamic channel selection
5.3.10 Power management <\/td>\n<\/tr>\n
24<\/td>\n5.3.11 Controlling transmit power in the piconet
5.4 Characteristics of the 2.4 GHz PHY
5.4.1 General characteristics <\/td>\n<\/tr>\n
25<\/td>\n5.4.2 Coexistence and interoperability
6. Layer management
6.1 Overview of management model <\/td>\n<\/tr>\n
27<\/td>\n6.2 Generic management primitives <\/td>\n<\/tr>\n
28<\/td>\n6.2.1 MLME-GET.request and PLME-GET.request
6.2.1.1 When generated
6.2.1.2 Effect of receipt
6.2.2 MLME-GET.confirm and PLME-GET.confirm
6.2.2.1 When generated
6.2.2.2 Effect of receipt <\/td>\n<\/tr>\n
29<\/td>\n6.2.3 MLME-SET.request and PLME-SET.request
6.2.3.1 When generated
6.2.3.2 Effect of receipt
6.2.4 MLME-SET.confirm and PLME-SET.confirm
6.2.4.1 When generated
6.2.4.2 Effect of receipt <\/td>\n<\/tr>\n
30<\/td>\n6.3 MLME SAP interface <\/td>\n<\/tr>\n
31<\/td>\n6.3.1 Reset
6.3.1.1 MLME-RESET.request <\/td>\n<\/tr>\n
32<\/td>\n6.3.2 Scan
6.3.2.1 MLME-SCAN.request <\/td>\n<\/tr>\n
34<\/td>\n6.3.2.2 MLME-SCAN.confirm <\/td>\n<\/tr>\n
35<\/td>\n6.3.3 Start <\/td>\n<\/tr>\n
36<\/td>\n6.3.3.1 MLME-START.request
6.3.3.2 MLME-START.confirm <\/td>\n<\/tr>\n
37<\/td>\n6.3.3.3 MLME-START-DEPENDENT.request
6.3.3.4 MLME-START-DEPENDENT.confirm <\/td>\n<\/tr>\n
38<\/td>\n6.3.4 Synchronization
6.3.4.1 MLME-SYNCH.request <\/td>\n<\/tr>\n
39<\/td>\n6.3.4.2 MLME-SYNCH.confirm
6.3.4.3 MLME-ATP-EXPIRED.indication
6.3.5 Association <\/td>\n<\/tr>\n
41<\/td>\n6.3.5.1 MLME-ASSOCIATE.request <\/td>\n<\/tr>\n
42<\/td>\n6.3.5.2 MLME-ASSOCIATE.indication <\/td>\n<\/tr>\n
43<\/td>\n6.3.5.3 MLME-ASSOCIATE.response
6.3.5.4 MLME-ASSOCIATE.confirm <\/td>\n<\/tr>\n
44<\/td>\n6.3.5.5 MLME-DEV-ASSOCIATION-INFO.indication
6.3.6 Disassociation <\/td>\n<\/tr>\n
45<\/td>\n6.3.6.1 MLME-DISASSOCIATE.request
6.3.6.2 MLME-DISASSOCIATE.indication <\/td>\n<\/tr>\n
46<\/td>\n6.3.6.3 MLME-DISASSOCIATE.confirm
6.3.7 Key request <\/td>\n<\/tr>\n
47<\/td>\n6.3.7.1 MLME-REQUEST-KEY.request
6.3.7.2 MLME-REQUEST-KEY.indication <\/td>\n<\/tr>\n
48<\/td>\n6.3.7.3 MLME-REQUEST-KEY.response
6.3.7.4 MLME-REQUEST-KEY.confirm <\/td>\n<\/tr>\n
49<\/td>\n6.3.8 Key distribution
6.3.8.1 MLME-DISTRIBUTE-KEY.request <\/td>\n<\/tr>\n
50<\/td>\n6.3.8.2 MLME-DISTRIBUTE-KEY.indication
6.3.8.3 MLME-DISTRIBUTE-KEY.response <\/td>\n<\/tr>\n
51<\/td>\n6.3.8.4 MLME-DISTRIBUTE-KEY.confirm
6.3.9 Security management
6.3.9.1 MLME-MEMBERSHIP-UPDATE.request <\/td>\n<\/tr>\n
53<\/td>\n6.3.9.2 MLME-SECURITY-ERROR.indication
6.3.9.3 MLME-SECURITY-MESSAGE.request <\/td>\n<\/tr>\n
54<\/td>\n6.3.9.4 MLME-SECURITY-MESSAGE.indication
6.3.9.5 MLME-SECURITY-MESSAGE.confirm
6.3.10 PNC handover <\/td>\n<\/tr>\n
55<\/td>\n6.3.10.1 MLME-PNC-HANDOVER.request <\/td>\n<\/tr>\n
56<\/td>\n6.3.10.2 MLME-PNC-HANDOVER.indication
6.3.10.3 MLME-PNC-HANDOVER.response <\/td>\n<\/tr>\n
57<\/td>\n6.3.10.4 MLME-PNC-HANDOVER.confirm
6.3.10.5 MLME-NEW-PNC.indication
6.3.11 PNC requesting information <\/td>\n<\/tr>\n
58<\/td>\n6.3.11.1 MLME-PNC-INFO.request <\/td>\n<\/tr>\n
59<\/td>\n6.3.11.2 MLME-PNC-INFO.indication
6.3.11.3 MLME-PNC-INFO.response <\/td>\n<\/tr>\n
60<\/td>\n6.3.11.4 MLME-PNC-INFO.confirm
6.3.12 Security information retrieval
6.3.12.1 MLME-SECURITY-INFO.request <\/td>\n<\/tr>\n
61<\/td>\n6.3.12.2 MLME-SECURITY-INFO.indication <\/td>\n<\/tr>\n
62<\/td>\n6.3.12.3 MLME-SECURITY-INFO.response
6.3.12.4 MLME-SECURITY-INFO.confirm
6.3.13 ASIE management <\/td>\n<\/tr>\n
63<\/td>\n6.3.13.1 MLME-CREATE-ASIE.request <\/td>\n<\/tr>\n
64<\/td>\n6.3.13.2 MLME-CREATE-ASIE.confirm <\/td>\n<\/tr>\n
65<\/td>\n6.3.13.3 MLME-RECEIVE-ASIE.indication
6.3.14 Peer information retrieval <\/td>\n<\/tr>\n
66<\/td>\n6.3.14.1 MLME-PROBE.request
6.3.14.2 MLME-PROBE.indication <\/td>\n<\/tr>\n
67<\/td>\n6.3.14.3 MLME-PROBE.response
6.3.14.4 MLME-PROBE.confirm
6.3.15 Information announcement to peers <\/td>\n<\/tr>\n
68<\/td>\n6.3.15.1 MLME-ANNOUNCE.request
6.3.15.2 MLME-ANNOUNCE.indication <\/td>\n<\/tr>\n
69<\/td>\n6.3.15.3 MLME-ANNOUNCE.confirm
6.3.16 Piconet services
6.3.16.1 MLME-PICONET-SERVICES.indication <\/td>\n<\/tr>\n
70<\/td>\n6.3.16.2 MLME-PICONET-SERVICES.response <\/td>\n<\/tr>\n
71<\/td>\n6.3.16.3 MLME-PICONET-SERVICES.confirm
6.3.17 Stream management
6.3.17.1 MLME-CREATE-STREAM.request <\/td>\n<\/tr>\n
73<\/td>\n6.3.17.2 MLME-CREATE-STREAM.confirm <\/td>\n<\/tr>\n
74<\/td>\n6.3.17.3 MLME-MODIFY-STREAM.request
6.3.17.4 MLME-MODIFY-STREAM.confirm <\/td>\n<\/tr>\n
75<\/td>\n6.3.17.5 MLME-TERMINATE-STREAM.request
6.3.17.6 MLME-TERMINATE-STREAM.indication <\/td>\n<\/tr>\n
76<\/td>\n6.3.17.7 MLME-TERMINATE-STREAM.confirm
6.3.17.8 MLME-MULTICAST-RX-SETUP.request <\/td>\n<\/tr>\n
77<\/td>\n6.3.18 Channel status request <\/td>\n<\/tr>\n
78<\/td>\n6.3.18.1 MLME-CHANNEL-STATUS.request
6.3.18.2 MLME-CHANNEL-STATUS.indication <\/td>\n<\/tr>\n
79<\/td>\n6.3.18.3 MLME-CHANNEL-STATUS.response
6.3.18.4 MLME-CHANNEL-STATUS.confirm <\/td>\n<\/tr>\n
80<\/td>\n6.3.19 Remote scan
6.3.19.1 MLME-REMOTE-SCAN.request <\/td>\n<\/tr>\n
81<\/td>\n6.3.19.2 MLME-REMOTE-SCAN.indication <\/td>\n<\/tr>\n
82<\/td>\n6.3.19.3 MLME-REMOTE-SCAN.response
6.3.19.4 MLME-REMOTE-SCAN.confirm <\/td>\n<\/tr>\n
83<\/td>\n6.3.20 Piconet parameter change
6.3.20.1 MLME-PICONET-PARM-CHANGE.request <\/td>\n<\/tr>\n
84<\/td>\n6.3.20.2 MLME-PICONET-PARM-CHANGE.confirm
6.3.21 Power change <\/td>\n<\/tr>\n
85<\/td>\n6.3.21.1 MLME-TX-POWER-CHANGE.request
6.3.21.2 MLME-TX-POWER-CHANGE.indication <\/td>\n<\/tr>\n
86<\/td>\n6.3.21.3 MLME-TX-POWER-CHANGE.confirm
6.3.22 Power management operation
6.3.22.1 MLME-PS-SET-INFORMATION.request <\/td>\n<\/tr>\n
88<\/td>\n6.3.22.2 MLME-PS-SET-INFORMATION.confirm
6.3.22.3 MLME-SPS-CONFIGURE.request <\/td>\n<\/tr>\n
89<\/td>\n6.3.22.4 MLME-SPS-CONFIGURE.confirm
6.3.22.5 MLME-PM-MODE-CHANGE.request <\/td>\n<\/tr>\n
90<\/td>\n6.3.22.6 MLME-PM-MODE-CHANGE.confirm
6.3.22.7 MLME-PM-MODE-ACTIVE.indication
6.4 PLME SAP interface <\/td>\n<\/tr>\n
91<\/td>\n6.4.1 PLME-RESET.request
6.4.1.1 When generated
6.4.1.2 Effect of receipt <\/td>\n<\/tr>\n
92<\/td>\n6.4.2 PLME-RESET.confirm
6.4.2.1 When generated
6.4.2.2 Effect of receipt
6.4.3 PLME-TESTMODE.request
6.4.3.1 When generated
6.4.3.2 Effect of receipt
6.4.4 PLME-TESTMODE.confirm
6.4.4.1 When generated <\/td>\n<\/tr>\n
93<\/td>\n6.4.4.2 Effect of receipt
6.4.5 PLME-TESTOUTPUT.request
6.4.5.1 When generated
6.4.5.2 Effect of receipt
6.5 MAC management
6.5.1 MAC PIB PNC group
6.5.2 MAC PIB characteristic group <\/td>\n<\/tr>\n
96<\/td>\n6.6 MAC SAP <\/td>\n<\/tr>\n
97<\/td>\n6.6.1 MAC-ASYNC-DATA.request
6.6.1.1 When generated
6.6.1.2 Effect of receipt <\/td>\n<\/tr>\n
98<\/td>\n6.6.2 MAC-ASYNC-DATA.confirm
6.6.2.1 When generated
6.6.2.2 Effect of receipt
6.6.3 MAC-ASYNC-DATA.indication
6.6.3.1 When generated
6.6.3.2 Effect of receipt <\/td>\n<\/tr>\n
99<\/td>\n6.6.4 MAC-ISOCH-DATA.request
6.6.4.1 When generated
6.6.4.2 Effect of receipt
6.6.5 MAC-ISOCH-DATA.confirm
6.6.5.1 When generated
6.6.5.2 Effect of receipt <\/td>\n<\/tr>\n
100<\/td>\n6.6.6 MAC-ISOCH-DATA.indication
6.6.6.1 When generated
6.6.6.2 Effect of receipt
6.7 Physical layer (PHY) service specification <\/td>\n<\/tr>\n
102<\/td>\n6.7.1 Transferring PHY data
6.7.1.1 PHY-DATA.request
6.7.1.2 PHY-DATA.indication
6.7.1.3 PHY-DATA.confirm <\/td>\n<\/tr>\n
103<\/td>\n6.7.2 Controlling PHY transmission
6.7.2.1 PHY-TX-START.request
6.7.2.2 PHY-TX-START.confirm <\/td>\n<\/tr>\n
104<\/td>\n6.7.2.3 PHY-TX-END.request
6.7.2.4 PHY-TX-END.confirm
6.7.3 PHY CCA functions
6.7.3.1 PHY-CCA-START.request <\/td>\n<\/tr>\n
105<\/td>\n6.7.3.2 PHY-CCA-START.confirm
6.7.3.3 PHY-CCA-END.request
6.7.3.4 PHY-CCA-END.confirm <\/td>\n<\/tr>\n
106<\/td>\n6.7.3.5 PHY-CCA.indication
6.7.4 Controlling the PHY receiver
6.7.4.1 PHY-RX-START.request
6.7.4.2 PHY-RX-START.confirm <\/td>\n<\/tr>\n
107<\/td>\n6.7.4.3 PHY-RX-START.indication
6.7.4.4 PHY-RX-END.request <\/td>\n<\/tr>\n
108<\/td>\n6.7.4.5 PHY-RX-END.confirm
6.7.4.6 PHY-RX-END.indication <\/td>\n<\/tr>\n
109<\/td>\n6.7.5 Controlling the PHY power usage
6.7.5.1 PHY-PM.request
6.7.5.2 PHY-PM.confirm
7. MAC frame formats <\/td>\n<\/tr>\n
110<\/td>\n7.1 Frame format conventions <\/td>\n<\/tr>\n
111<\/td>\n7.2 General frame format <\/td>\n<\/tr>\n
112<\/td>\n7.2.1 Frame control <\/td>\n<\/tr>\n
113<\/td>\n7.2.1.1 Protocol version
7.2.1.2 Frame type
7.2.1.3 SEC
7.2.1.4 ACK policy
7.2.1.5 Retry <\/td>\n<\/tr>\n
114<\/td>\n7.2.1.6 More data
7.2.2 Piconet ID (PNID)
7.2.3 SrcID and DestID <\/td>\n<\/tr>\n
115<\/td>\n7.2.4 Fragmentation control
7.2.4.1 MSDU number
7.2.4.2 Fragment number
7.2.4.3 Last fragment number
7.2.5 Stream index
7.2.6 MAC header validation <\/td>\n<\/tr>\n
116<\/td>\n7.2.7 MAC frame body
7.2.7.1 Frame payload
7.2.7.2 Secure session ID (SECID)
7.2.7.3 Secure frame counter (SFC)
7.2.7.4 Secure payload
7.2.7.5 Integrity code
7.2.7.6 FCS <\/td>\n<\/tr>\n
117<\/td>\n7.3 Format of individual frame types
7.3.1 Beacon frame
7.3.1.1 Non-secure beacon frame <\/td>\n<\/tr>\n
119<\/td>\n7.3.1.2 Secure beacon frame <\/td>\n<\/tr>\n
120<\/td>\n7.3.2 Acknowledgement frames
7.3.2.1 Immediate ACK (Imm-ACK) frame
7.3.2.2 Delayed ACK (Dly-ACK) frame <\/td>\n<\/tr>\n
122<\/td>\n7.3.3 Command frame
7.3.3.1 Non-secure command frame <\/td>\n<\/tr>\n
123<\/td>\n7.3.3.2 Secure command frame <\/td>\n<\/tr>\n
124<\/td>\n7.3.4 Data frame
7.3.4.1 Non-secure data frame
7.3.4.2 Secure data frame <\/td>\n<\/tr>\n
125<\/td>\n7.4 Information elements <\/td>\n<\/tr>\n
126<\/td>\n7.4.1 Channel time allocation <\/td>\n<\/tr>\n
127<\/td>\n7.4.2 BSID
7.4.3 Parent piconet
7.4.4 DEV association <\/td>\n<\/tr>\n
128<\/td>\n7.4.5 PNC shutdown
7.4.6 Piconet parameter change <\/td>\n<\/tr>\n
129<\/td>\n7.4.7 Application specific <\/td>\n<\/tr>\n
130<\/td>\n7.4.8 Pending channel time map (PCTM)
7.4.9 PNC handover
7.4.10 CTA status <\/td>\n<\/tr>\n
131<\/td>\n7.4.11 Capability <\/td>\n<\/tr>\n
133<\/td>\n7.4.12 Transmit power parameters
7.4.13 PS status <\/td>\n<\/tr>\n
134<\/td>\n7.4.14 Continued wake beacon (CWB)
7.4.15 Overlapping PNID
7.4.16 Piconet services <\/td>\n<\/tr>\n
135<\/td>\n7.4.17 Vendor specific
7.5 MAC command types <\/td>\n<\/tr>\n
137<\/td>\n7.5.1 Association and disassociation commands
7.5.1.1 Association request <\/td>\n<\/tr>\n
138<\/td>\n7.5.1.2 Association response
7.5.1.3 Disassociation request <\/td>\n<\/tr>\n
139<\/td>\n7.5.2 Security commands
7.5.2.1 Request key
7.5.2.2 Request key response
7.5.2.3 Distribute key request <\/td>\n<\/tr>\n
140<\/td>\n7.5.2.4 Distribute key response
7.5.3 PNC handover commands
7.5.3.1 PNC handover request <\/td>\n<\/tr>\n
141<\/td>\n7.5.3.2 PNC handover response
7.5.3.3 PNC handover information
7.5.4 Information request commands <\/td>\n<\/tr>\n
142<\/td>\n7.5.4.1 PNC information request
7.5.4.2 PNC information <\/td>\n<\/tr>\n
143<\/td>\n7.5.4.3 Security information request
7.5.4.4 Security information <\/td>\n<\/tr>\n
144<\/td>\n7.5.4.5 Probe request <\/td>\n<\/tr>\n
145<\/td>\n7.5.4.6 Probe response <\/td>\n<\/tr>\n
146<\/td>\n7.5.5 Information announcement commands
7.5.5.1 Piconet services <\/td>\n<\/tr>\n
147<\/td>\n7.5.5.2 Announce
7.5.6 Channel time allocation request, modification, and termination commands <\/td>\n<\/tr>\n
148<\/td>\n7.5.6.1 Channel time request <\/td>\n<\/tr>\n
150<\/td>\n7.5.6.2 Channel time response <\/td>\n<\/tr>\n
151<\/td>\n7.5.7 Channel status commands
7.5.7.1 Channel status request
7.5.7.2 Channel status response <\/td>\n<\/tr>\n
152<\/td>\n7.5.7.3 Remote scan request
7.5.7.4 Remote scan response <\/td>\n<\/tr>\n
154<\/td>\n7.5.7.5 Transmit power change
7.5.8 Power management commands
7.5.8.1 PS set information request
7.5.8.2 PS set information response <\/td>\n<\/tr>\n
155<\/td>\n7.5.8.3 SPS configuration request <\/td>\n<\/tr>\n
156<\/td>\n7.5.8.4 SPS configuration response <\/td>\n<\/tr>\n
157<\/td>\n7.5.8.5 PM mode change
7.5.9 Special commands
7.5.9.1 Security message <\/td>\n<\/tr>\n
158<\/td>\n7.5.9.2 Vendor specific
8. MAC functional description
8.1 Introduction <\/td>\n<\/tr>\n
159<\/td>\n8.2 Starting, maintaining and stopping piconets
8.2.1 Scanning through channels <\/td>\n<\/tr>\n
160<\/td>\n8.2.2 Starting a piconet <\/td>\n<\/tr>\n
161<\/td>\n8.2.3 PNC handover <\/td>\n<\/tr>\n
164<\/td>\n8.2.4 Dependent PNC handover <\/td>\n<\/tr>\n
167<\/td>\n8.2.5 Child piconet <\/td>\n<\/tr>\n
170<\/td>\n8.2.6 Neighbor piconet <\/td>\n<\/tr>\n
172<\/td>\n8.2.7 Stopping piconet operations
8.2.7.1 Stopping an independent or parent piconet
8.2.7.2 Parent PNC stopping a dependent piconet <\/td>\n<\/tr>\n
173<\/td>\n8.2.7.3 Dependent PNC termination of a dependent piconet
8.2.8 Non-PNC capable DEVs
8.3 Association and disassociation with a piconet
8.3.1 Association <\/td>\n<\/tr>\n
175<\/td>\n8.3.2 Piconet services <\/td>\n<\/tr>\n
177<\/td>\n8.3.3 Broadcasting piconet information
8.3.4 Disassociation <\/td>\n<\/tr>\n
178<\/td>\n8.4 Channel access <\/td>\n<\/tr>\n
179<\/td>\n8.4.1 Interframe space (IFS)
8.4.2 Contention based channel access <\/td>\n<\/tr>\n
180<\/td>\n8.4.3 Channel time allocation period channel access <\/td>\n<\/tr>\n
181<\/td>\n8.4.3.1 Channel time allocations (CTA) <\/td>\n<\/tr>\n
182<\/td>\n8.4.3.2 Channel time allocation (CTA) and channel time usage <\/td>\n<\/tr>\n
183<\/td>\n8.4.3.3 Management CTAs <\/td>\n<\/tr>\n
184<\/td>\n8.4.3.4 Slotted aloha access for open and association MCTAs
8.4.3.5 Allocation of MCTAs <\/td>\n<\/tr>\n
185<\/td>\n8.4.3.6 Guard time <\/td>\n<\/tr>\n
187<\/td>\n8.4.3.7 Calculating channel time requests <\/td>\n<\/tr>\n
188<\/td>\n8.5 Channel time management <\/td>\n<\/tr>\n
189<\/td>\n8.5.1 Isochronous stream management
8.5.1.1 Isochronous stream creation <\/td>\n<\/tr>\n
192<\/td>\n8.5.1.2 Isochronous stream modification <\/td>\n<\/tr>\n
195<\/td>\n8.5.1.3 Isochronous stream termination <\/td>\n<\/tr>\n
197<\/td>\n8.5.2 Asynchronous channel time reservation and termination
8.5.2.1 Asynchronous channel time reservation <\/td>\n<\/tr>\n
199<\/td>\n8.5.2.2 Asynchronous channel time termination <\/td>\n<\/tr>\n
200<\/td>\n8.6 Synchronization
8.6.1 Time accuracy
8.6.2 Beacon generation <\/td>\n<\/tr>\n
201<\/td>\n8.6.3 Beacon reception
8.6.4 Beacon information announcement <\/td>\n<\/tr>\n
202<\/td>\n8.6.5 Acquiring synchronization
8.7 Fragmentation and defragmentation <\/td>\n<\/tr>\n
203<\/td>\n8.8 Acknowledgement and retransmission
8.8.1 No-ACK
8.8.2 Immediate ACK
8.8.3 Delayed acknowledgement <\/td>\n<\/tr>\n
205<\/td>\n8.8.4 Retransmissions
8.8.5 Duplicate detection
8.9 Peer discovery <\/td>\n<\/tr>\n
206<\/td>\n8.9.1 PNC information request
8.9.2 Probe request and response <\/td>\n<\/tr>\n
207<\/td>\n8.9.3 Announce <\/td>\n<\/tr>\n
208<\/td>\n8.9.4 Channel status request <\/td>\n<\/tr>\n
209<\/td>\n8.9.5 Remote scan <\/td>\n<\/tr>\n
210<\/td>\n8.9.6 PNC channel scanning <\/td>\n<\/tr>\n
211<\/td>\n8.10 Changing piconet parameters
8.10.1 Moving beacon <\/td>\n<\/tr>\n
212<\/td>\n8.10.2 Changing superframe duration
8.10.3 Setting the PNID or BSID <\/td>\n<\/tr>\n
213<\/td>\n8.10.4 Maintaining synchronization in dependent piconets
8.11 Interference mitigation <\/td>\n<\/tr>\n
214<\/td>\n8.11.1 Dynamic channel selection <\/td>\n<\/tr>\n
215<\/td>\n8.11.2 Transmit power control <\/td>\n<\/tr>\n
216<\/td>\n8.11.2.1 Maximum transmitter power for the CAP, beacon and directed MCTAs
8.11.2.2 Adjustable transmitter power in a CTA
8.12 Multi-rate support <\/td>\n<\/tr>\n
217<\/td>\n8.13 Power management <\/td>\n<\/tr>\n
218<\/td>\n8.13.1 Piconet synchronized power save (PSPS) mode <\/td>\n<\/tr>\n
219<\/td>\n8.13.2 Device synchronized power save (DSPS) mode
8.13.2.1 Creation, use and management of DSPS sets <\/td>\n<\/tr>\n
220<\/td>\n8.13.2.2 Changing DSPS mode and operation <\/td>\n<\/tr>\n
221<\/td>\n8.13.2.3 CTA timing in DSPS mode <\/td>\n<\/tr>\n
223<\/td>\n8.13.3 Asynchronous power save (APS) mode <\/td>\n<\/tr>\n
224<\/td>\n8.13.4 Message sequence charts for power save modes <\/td>\n<\/tr>\n
228<\/td>\n8.14 ASIE operation <\/td>\n<\/tr>\n
229<\/td>\n8.15 MAC sublayer parameters <\/td>\n<\/tr>\n
230<\/td>\n9. Security
9.1 Security mechanisms
9.1.1 Security membership and key establishment
9.1.2 Key transport
9.1.3 Data encryption
9.1.4 Data integrity
9.1.5 Beacon integrity protection <\/td>\n<\/tr>\n
231<\/td>\n9.1.6 Command integrity protection
9.1.7 Freshness protection
9.2 Security modes
9.2.1 Security mode 0
9.2.2 Security mode 1
9.3 Security support <\/td>\n<\/tr>\n
232<\/td>\n9.3.1 PNC handover
9.3.2 Changes in the piconet group data key
9.3.3 Joining a secure piconet
9.3.4 Membership update <\/td>\n<\/tr>\n
233<\/td>\n9.3.5 Secure frame generation <\/td>\n<\/tr>\n
234<\/td>\n9.3.6 Secure frame reception <\/td>\n<\/tr>\n
235<\/td>\n9.3.7 Selecting the SECID for a new key
9.3.8 Key selection <\/td>\n<\/tr>\n
238<\/td>\n9.4 Protocol details <\/td>\n<\/tr>\n
239<\/td>\n9.4.1 Security information request and distribution <\/td>\n<\/tr>\n
240<\/td>\n9.4.2 Key distribution protocol <\/td>\n<\/tr>\n
241<\/td>\n9.4.3 Key request protocol <\/td>\n<\/tr>\n
242<\/td>\n10. Security specifications
10.1 Modes for security
10.2 Symmetric cryptography building blocks
10.2.1 Security interfaces
10.2.2 CTR + CBC-MAC (CCM) combined encryption and data authentication
10.2.3 CCM parameters <\/td>\n<\/tr>\n
243<\/td>\n10.2.4 Nonce value
10.2.5 AES encryption
10.3 Symmetric cryptography implementation
10.3.1 Symmetric cryptography data formats <\/td>\n<\/tr>\n
244<\/td>\n10.3.2 Symmetric cryptographic operations <\/td>\n<\/tr>\n
245<\/td>\n10.4 CCM mode <\/td>\n<\/tr>\n
246<\/td>\n10.4.1 Inputs
10.4.2 Data authentication <\/td>\n<\/tr>\n
249<\/td>\n10.4.3 Encryption
10.4.4 Output <\/td>\n<\/tr>\n
250<\/td>\n10.4.5 Decryption
10.4.6 Restrictions
10.4.7 List of symbols <\/td>\n<\/tr>\n
251<\/td>\n11. PHY specification for the 2.4 GHz band
11.1 Overview of the 2.4 GHz PHY <\/td>\n<\/tr>\n
252<\/td>\n11.2 General requirements
11.2.1 Operating frequency range
11.2.2 RF power measurements
11.2.3 Channel assignments
11.2.4 Scanning channels <\/td>\n<\/tr>\n
253<\/td>\n11.2.5 Unwanted emissions
11.2.6 Operating temperature range
11.2.7 PHY layer timing
11.2.7.1 Interframe space <\/td>\n<\/tr>\n
254<\/td>\n11.2.7.2 Receive-to-transmit turnaround time
11.2.7.3 Transmit-to-receive turnaround time
11.2.7.4 Time between successive transmissions
11.2.7.5 Channel switch time
11.2.8 Data size restrictions
11.2.8.1 Maximum frame length
11.2.8.2 Maximum transfer unit size
11.2.8.3 Minimum fragment size <\/td>\n<\/tr>\n
255<\/td>\n11.2.9 Header check sequence <\/td>\n<\/tr>\n
256<\/td>\n11.2.10 Channel access methods <\/td>\n<\/tr>\n
257<\/td>\n11.3 Modulation and coding
11.3.1 Base data rate
11.3.2 Signal constellations <\/td>\n<\/tr>\n
258<\/td>\n11.3.3 DQPSK modulation <\/td>\n<\/tr>\n
259<\/td>\n11.3.4 QPSK and 16\/32\/64-QAM with trellis coding <\/td>\n<\/tr>\n
267<\/td>\n11.4 PHY frame format
11.4.1 Frame format <\/td>\n<\/tr>\n
269<\/td>\n11.4.2 PHY preamble <\/td>\n<\/tr>\n
271<\/td>\n11.4.3 Header modulation
11.4.4 Scrambling <\/td>\n<\/tr>\n
272<\/td>\n11.4.5 PHY header
11.4.6 Stuff bits <\/td>\n<\/tr>\n
273<\/td>\n11.4.7 Tail symbols <\/td>\n<\/tr>\n
276<\/td>\n11.5 Transmitter specifications
11.5.1 Error vector magnitude definition <\/td>\n<\/tr>\n
277<\/td>\n11.5.2 EVM calculated values
11.5.3 Transmit PSD mask <\/td>\n<\/tr>\n
278<\/td>\n11.5.4 Transmit center frequency tolerance
11.5.5 Symbol rate <\/td>\n<\/tr>\n
279<\/td>\n11.5.6 Clock synchronization
11.5.7 Transmit power-on and power-down ramp
11.5.8 RF carrier suppression
11.5.9 Transmit power <\/td>\n<\/tr>\n
280<\/td>\n11.6 Receiver specifications
11.6.1 Error rate criterion
11.6.2 Receiver sensitivity
11.6.3 Receiver maximum input level
11.6.4 Receiver jamming resistance <\/td>\n<\/tr>\n
281<\/td>\n11.6.5 Receiver CCA performance <\/td>\n<\/tr>\n
282<\/td>\n11.6.6 Receiver RSSI
11.6.7 Link quality indication
11.7 PHY management <\/td>\n<\/tr>\n
286<\/td>\nAnnex A (normative) Frame convergence sublayer
A.1 Generic convergence layer <\/td>\n<\/tr>\n
287<\/td>\nA.1.1 FCSL PDU classification <\/td>\n<\/tr>\n
288<\/td>\nA.1.2 IEEE 802.2 FCSL
A.1.2.1 IEEE 802.2 FCSL QoS support <\/td>\n<\/tr>\n
289<\/td>\nA.1.2.2 Data entity inter-relationships <\/td>\n<\/tr>\n
290<\/td>\nA.2 802.2 FCSL SAP
A.2.1 MA-UNITDATA.request <\/td>\n<\/tr>\n
291<\/td>\nA.2.1.1 When generated
A.2.1.2 Effect of receipt
A.2.2 MA-UNITDATA.indication <\/td>\n<\/tr>\n
292<\/td>\nA.2.2.1 When generated
A.2.2.2 Effect of receipt
A.2.3 MA-UNITDATA-STATUS.indication <\/td>\n<\/tr>\n
293<\/td>\nA.2.3.1 When generated
A.2.3.2 Effect of receipt <\/td>\n<\/tr>\n
294<\/td>\nAnnex B (informative) Security considerations
B.1 Background assumptions
B.1.1 Physical assumptions
B.1.2 Network assumptions <\/td>\n<\/tr>\n
295<\/td>\nB.1.3 Attack model assumptions
B.1.4 Security key lifecycle issues
B.1.4.1 Key lifecycle
B.1.4.2 Membership lifecycle
B.1.4.3 Group membership change rekey
B.2 Claimed security services
B.2.1 Beacon protection protocol <\/td>\n<\/tr>\n
296<\/td>\nB.2.2 Distribute key protocol
B.2.3 Key request protocol <\/td>\n<\/tr>\n
297<\/td>\nB.2.4 Data protection protocol <\/td>\n<\/tr>\n
298<\/td>\nAnnex C (informative) Coexistence, interoperability, and interference
C.1 Interoperability
C.1.1 Interoperability with 802.11 DSSS and 802.11b <\/td>\n<\/tr>\n
299<\/td>\nC.1.2 802.11 FHSS and 802.15.1
C.2 Coexistence
C.2.1 Coexistence with 802.11b <\/td>\n<\/tr>\n
300<\/td>\nC.2.1.1 Passive scanning
C.2.1.2 Dynamic channel selection
C.2.1.3 The ability to request channel quality information
C.2.1.4 Link quality and RSSI
C.2.1.5 Channel plan that minimizes channel overlap <\/td>\n<\/tr>\n
301<\/td>\nC.2.1.6 Lower transmit power
C.2.1.7 Transmit power control
C.2.1.8 Neighbor piconet capability <\/td>\n<\/tr>\n
302<\/td>\nC.2.2 Coexistence with 802.15.1 and 802.11 FHSS
C.2.2.1 PHY colloaborative coexistence enhancements
C.2.2.2 MAC coexistence via collaboration <\/td>\n<\/tr>\n
303<\/td>\nC.2.2.3 Other techniques
C.3 Coexistence performance
C.3.1 Allowed operation
C.3.2 Assumptions for coexistence calculations <\/td>\n<\/tr>\n
305<\/td>\nC.3.3 Peformance impact on 802.15.3 piconets <\/td>\n<\/tr>\n
306<\/td>\nC.3.3.1 802.11b overlapping with 802.15.3 <\/td>\n<\/tr>\n
310<\/td>\nC.3.3.2 802.15.1 and 802.11 FHSS overlapping with 802.15.3 <\/td>\n<\/tr>\n
311<\/td>\nC.4 Notes on the calculations <\/td>\n<\/tr>\n
312<\/td>\nAnnex D (normative) Protocol implementation conformance statement (PICS) proforma
D.1 Introduction
D.1.1 Scope
D.1.2 Purpose
D.2 Abbreviations and special symbols <\/td>\n<\/tr>\n
313<\/td>\nD.3 Instructions for completing the PICS proforma
D.4 Identification of the implementation <\/td>\n<\/tr>\n
314<\/td>\nD.5 Identification of the protocol <\/td>\n<\/tr>\n
315<\/td>\nD.6 Global statement of conformance
D.7 PICS proforma-IEEE Std. 802.15.3-2003
D.7.1 Major roles for IEEE 802.15.3 DEVs <\/td>\n<\/tr>\n
316<\/td>\nD.7.2 PHY functions <\/td>\n<\/tr>\n
317<\/td>\nD.7.3 Major capabilities for the MAC sublayer
D.7.3.1 MAC frames <\/td>\n<\/tr>\n
319<\/td>\nD.7.3.2 MAC sublayer functions <\/td>\n<\/tr>\n
322<\/td>\nD.7.4 Security support <\/td>\n<\/tr>\n
323<\/td>\nAnnex E (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2003<\/td>\n324<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":395973,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-395972","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/395972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/395973"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=395972"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=395972"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=395972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}