您好,欢迎光临本网站![请登录][注册会员]  
文件名称: IEEE 802.15.4e-2012版.pdf 完整版
  所属分类: 互联网
  开发工具:
  文件大小: 1mb
  下载次数: 0
  上传时间: 2019-07-15
  提 供 者: weixin_********
 详细说明: IEEE 802.15.4e-2012版.pdf 完整版 Contents 3. Definitions, acronyms, and abbreviations............................................................................................ 2 3.1 Definitions ............................................................................................................................... 2 3.2 Acronyms and abbreviations ................................................................................................... 3 4. General description .............................................................................................................................. 5 4.1 General..................................................................................................................................... 5 4.3 Network topologies.................................................................................................................. 5 4.3.1 Star network formation .............................................................................................. 5 4.3.2 Peer-to-peer network formation................................................................................. 5 4.5 Functional overview ................................................................................................................ 5 4.5.1 Superframe structure.................................................................................................. 5 4.5.2 Data transfer model.................................................................................................... 7 4.5.3 Frame structure .......................................................................................................... 8 4.5.4 Improving probability of successful delivery ............................................................ 9 4.5.5 Power consumption considerations ........................................................................... 9 4.5.6 Security .................................................................................................................... 10 5. MAC protocol .................................................................................................................................... 11 5.1 MAC functional description .................................................................................................. 11 5.1.1 Channel access......................................................................................................... 11 5.1.1a Channel hopping ...................................................................................................... 11 5.1.2 Starting and maintaining PANs ............................................................................... 22 5.1.3 Association and disassociation ................................................................................ 26 5.1.4 Synchronization ....................................................................................................... 26 5.1.6 Transmission, reception, and acknowledgment....................................................... 30 5.1.9 LLDN transmission states........................................................................................ 32 5.1.10 Deterministic and synchronous multi-channel extension (DSME) ......................... 37 5.1.11 LE transmission, reception and acknowledgment ................................................... 51 5.1.12 Asynchronous multi-channel adaptation (AMCA).................................................. 57 5.2 MAC frame formats............................................................................................................... 59 5.2.1 General MAC frame format..................................................................................... 59 5.2.2 Format of individual frame types............................................................................. 63 5.2.3 Frame compatibility................................................................................................. 79 5.2.4 Information Element ................................................................................................ 80 5.3 MAC Command frames......................................................................................................... 95 5.3.1 Association request command ................................................................................. 95 5.3.2 Association response command............................................................................... 97 5.3.7 Beacon request command ........................................................................................ 97 5.3.10 LL commands .......................................................................................................... 98 5.3.11 DSME commands.................................................................................................. 104 5.3.12 LE commands ........................................................................................................ 117 5.3.13 AMCA commands ................................................................................................. 118 6. MAC services .................................................................................................................................. 123 6.2 MAC management service................................................................................................... 123 6.2.0a General................................................................................................................... 123 6.2.0b TSCH MAC management service ......................................................................... 123 xii Copyright . 2012 IEEE. All rights reserved. 6.2.0c LL-MAC management service .............................................................................. 123 6.2.0d DSME MAC management service ........................................................................ 123 6.2.1 Common requirements for MLME primitives....................................................... 124 6.2.2 Association primitives ........................................................................................... 124 6.2.4 Communications notification primitives ............................................................... 131 6.2.10 Primitives for channel scanning............................................................................. 133 6.2.12 Primitives for updating the superframe configuration........................................... 137 6.2.18 Primitives for Beacon Generation.......................................................................... 140 6.2.19 Primitives for TSCH .............................................................................................. 143 6.2.20 Primitives for LLDN.............................................................................................. 149 6.2.21 Primitives for DSME ............................................................................................. 153 6.3 MAC data service ................................................................................................................ 167 6.3.1 MCPS-DATA.request............................................................................................ 167 6.3.2 MCPS-DATA.confirm........................................................................................... 169 6.3.3 MCPS-DATA.indication ....................................................................................... 170 6.4 MAC constants and PIB attributes....................................................................................... 171 6.4.2 MAC PIB attributes ............................................................................................... 171 6.4.3 Calculating PHY dependent MAC PIB values ...................................................... 172 7. Security ............................................................................................................................................ 187 7.3 Security operations .............................................................................................................. 187 7.3.2 CCM* Nonce ......................................................................................................... 187 7.4 Auxiliary security header..................................................................................................... 187 7.4.1 Security Control field............................................................................................. 187 7.4.2 Frame Counter field ............................................................................................... 188 7.5 Security-related MAC-PIB attributes .................................................................................. 188 10. O-QPSK PHY.................................................................................................................................. 189 10.1 PPDU format........................................................................................................................ 189 10.1.3 Frame Length field................................................................................................. 189 Annex A (informative) Bibliography .......................................................................................................... 191 Annex D (informative) Protocol implementation conformance statement (PICS) proforma...................... 192 D.7 PICS proforma tables....................................................................................................... 192 D.7.3 Major capabilities for the MAC sublayer........................................................... 192 D.7.3.1 MAC sublayer functions ..................................................................... 192 Annex I (informative) MAC behaviors for industrial and commercial application domains...................... 195 I.1 General............................................................................................................................. 195 I.2 Timestimeslotlotted Channel Hopping (TSCH) .............................................................. 196 I.2.1 Typical application domains addressed by the TSCH mode.............................. 196 I.2.2 TSCH mode overview........................................................................................ 196 I.2.3 MAC behaviors unique to TSCH....................................................................... 196 I.3 Low Latency Deterministic Networks............................................................................. 197 I.3.1 Typical application domains and requirements addressed by LLDNs............... 197 I.3.2 LLDN application domain overview.................................................................. 197 I.3.3 LLDN assumptions ............................................................................................ 198 I.3.4 LLDN mode characteristics................................................................................ 198 I.3.4.1 General ................................................................................................ 198 Copyright . 2012 IEEE. All rights reserved. xiii I.3.4.2 Time Division Multiple Access (TDMA)........................................... 199 I.3.4.3 Addressing........................................................................................... 199 I.3.4.4 Network topology................................................................................ 199 I.3.5 MAC behaviors unique to the LLDN mode....................................................... 200 I.4 Deterministic and synchronous multi channel extension (DSME).................................. 200 I.4.1 Typical application domains and requirements.................................................. 200 I.4.1.1 Features ............................................................................................... 200 I.4.2 Recommended DSME parameter settings for various application types ........... 201 I.4.3 MAC behaviors unique to the DSME mode ...................................................... 201 I.4.4 Channel diversity................................................................................................ 202 I.4.4.1 Overview ............................................................................................. 202 I.4.4.2 Channel diversity methods.................................................................. 202 I.4.4.3 MAC behaviors unique to Channel Diversity..................................... 204 I.5 Blink................................................................................................................................. 204 I.5.1 Blink mode overview ......................................................................................... 204 I.5.2 MAC behaviors unique to the Blink mode......................................................... 204 I.6 Asymmetric multi-channel adaptation (AMCA) ............................................................. 204 I.6.1 AMCA mode overview ...................................................................................... 204 I.6.2 MAC behaviors unique to AMCA ..................................................................... 205 I.7 Low energy ...................................................................................................................... 205 I.7.1 LE overview ....................................................................................................... 205 I.7.2 MAC behaviors unique to LE ............................................................................ 205 I.8 Information elements ....................................................................................................... 206 I.8.1 Overview ............................................................................................................ 206 I.8.2 IE types............................................................................................................... 206 I.8.3 IE Identification.................................................................................................. 206 I.8.4 IE Construction .................................................................................................. 206 I.8.5 MAC behaviors unique to IE ............................................................................. 206 I.9 Enhanced beacons (EB) and enhanced beacon requests (EBR) ...................................... 206 I.9.1 EB and EBR overview ....................................................................................... 206 I.9.2 MAC behaviors unique to EB and EBR............................................................. 207 I.10 Multipurpose frame.......................................................................................................... 207 I.10.1 Multipurpose frame overview ............................................................................ 207 I.10.2 MAC behaviors unique to the multipurpose frame ............................................ 207 I.11 MAC performance metrics .............................................................................................. 208 I.11.1 Requirements of routing (such as in mesh networks) ........................................ 208 I.11.2 Requirements of long transmit durations due to large frames or low data rates 208 I.11.3 Metrics................................................................................................................ 208 I.11.4 MAC behaviors unique to MAC performance metrics ...................................... 208 I.12 Fast association ................................................................................................................ 208 I.12.1 Overview ............................................................................................................ 208 I.12.2 Operation............................................................................................................ 209 I.12.3 MAC behaviors unique to FastA........................................................................ 209
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索:
 输入关键字,在本站1000多万海量源码库中尽情搜索: