Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 11:Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications , includes Amendment 1
Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
1 Overview
1.1 Scope
The scope of this part is to develop a medium access control (MAC) and physical layer (PHY) specification for wireless connectivity for fixed, portable, and moving stations within a local area.
1.2 Purpose
The purpose of this part is to provide wireless connectivity to automatic machinery, equipment, or stations that require rapid deployment, which may be portable or hand-held, or which may be mounted on moving vehicles within a local area. This part also offers regulatory bodies a means of standardizing access to one or more frequency bands for the purpose of local area communication.
Specifically, this part:
— Describes the functions and services required by a this part compliant device to operate within ad hoc and infrastructure networks as well as the aspects of station mobility (transition) within those networks;
— Defines the MAC procedures to support the asynchronous MAC service data unit (MSDU) delivery services;
— Defines several PHY signaling techniques and interface functions that are controlled by this part MAC;
— Permits the operation of this part compliant device within a wireless local area network (LAN) that may coexist with multiple overlapping wireless LANs;
— Describes the requirements and procedures to provide privacy of user information being transferred over the wireless medium (WM) and authentication of this part compliant devices.
2 Normative References
The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of GB 15629. For dated references, subsequent amendments (excluding corrections), or revisions, of any of these publications do not apply to this part. However, parties to agreements based on this part are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. For undated references, the latest edition of the normative document referred to applies.
GB 7247.1-2001 Safety of Laser Products — Part 1: Equipment Classification, Requirements and Users Guide (IEC 60825-1:1993, IDT)
GB/T 9387.1-1998 Information Technology — Open Systems Interconnection — Basic Reference Model — Part 1: the Basic Model (ISO/IEC 7498-1:1994)
GB/T 15629.2 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 2: Logical Link Control (GB/T 15629.2-1995, ISO/IEC 8802-2:1998, IDT)
GB/T 16262.1-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 1: Specification of Basic Notation (ISO/IEC 8824-1:1995, IDT)
GB/T 16262.2-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 2: Information Object Specification (ISO/IEC 8824-2:1995, IDT)
GB/T 16262.3-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 3: Constraint Specification (ISO/IEC 8824-3:1995, IDT)
GB/T 16262.4-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 4: Parameterization of ASN.1 Specifications (ISO/IEC 8824-4:1995, IDT)
GB/T 16263.1-2006 Information Technology — ASN.1 Encoding Rules — Part 1: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) (ISO/IEC 8825-1:1995, IDT)
GB/T 16263.2-2006 Information Technology — ASN.1 Encoding Rules — Part 2: Specification of Packed Encoding Rules (PER) (ISO/IEC 8825-2:1996, IDT)
GB/T 17969.1-2000 Information Technology — Open Systems Interconnection — Procedures for the Operation of OSI Registration Authorities — Part 1: General Procedures
Guide for Wireless LAN Product Password Algorithm Application Commercial Cryptography Testing Center of State Cryptography Administration, December 2005
ISO/IEC 8802.11:1999 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
RFC3280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
GB/T 18236.1 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Common specifications — Part 1: Medium Access Control (MAC) Service Definition (GB/T 18236.1-2000, ISO/IEC 15802-1:1995, IDT)
ITU Radio Regulations Volumes 1-4
ITU-T Recommendation
X.210 (11/93) Information Technology — Open Systems Interconnection — Basic Reference Model: Conventions for the Definition of OSI Services (Common Text with ISO/IEC)
ITU-T Recommendation
Z.100 (03/93) CCITT Specification and Description Language (SDL)
ITU-T Recommendation
Z.105 (03/95) SDL Combined with ASN.1 (SDL/ASN.1)
3 Terms and Definitions
For the purpose of this document, the following terms and definitions apply.
3.1
access control
the prevention of unauthorized usage of resources
3.2
access point (AP)
any entity that has station functionality and provides access to the distribution services, via the wireless medium (WM) for associated stations
3.3
ad hoc network
a network composed solely of stations within mutual communication range of each other via the wireless medium (WM). An ad hoc network is typically created in a spontaneous manner. The principal distinguishing characteristic of an ad hoc network is its limited temporal and spatial extent. These limitations allow the act of creating and dissolving the ad hoc network to be sufficiently straightforward and convenient so as to be achievable by nontechnical users of the network facilities; i.e., no specialized “technical skills" are required and little or no investment of time or additional resources is required beyond the stations that are to participate in the ad hoc network. The term ad hoc is often used as slang to refer to an independent basic service set (IBSS)
Foreword XIII Introduction XVI 1 Overview 1.1 Scope 1.2 Purpose 2 Normative References 3 Terms and Definitions 4 Abbreviations 5 General Description 5.1 General description of the architecture 5.2 Components of this part architecture 5.2.1 The independent BSS (IBSS) as an ad hoc network 5.2.2 Distribution system (DS) concepts 5.2.3 Area concepts 5.2.4 Integration with wired LANs 5.3 Logical service interfaces 5.3.1 SS 5.3.2 DSS 5.3.3 Multiple logical address spaces 5.4 Overview of the services 5.4.1 Distribution of messages within a DS 5.4.2 Services that support the distribution service 5.4.3 Access and confidentiality control services 5.5 Relationships between services 5.5.1 Class 1 frames (permitted from within States 1, 2, and 3) 5.5.2 Class 2 frames (if and only if authenticated; allowed from within States 2 and 3 only) 5.5.3 Class 3 frames (if and only if associated; allowed only from within State 3) 5.6 Differences between ESS and IBSS LANs 5.7 Message information contents that support the services 5.7.1 Data 5.7.2 Association 5.7.3 Reassociation 5.7.4 Disassociation 5.7.5 Privacy 5.7.6 Authentication 5.7.7 Deauthentication 5.8 Reference model 5.9 Establishing a security association 5.9.1 Infrastructure 5.9.2 AD hoc network mode 6 MAC Service Definition 6.1 Overview of MAC services 6.1.1 Asynchronous data service 6.1.2 Security services 6.1.3 MSDU ordering 6.1.4 MAC Data Service Infrastructure 6.2 Detailed service specification 6.2.1 MAC data services 7 Frame Formats 7.1 MAC frame formats 7.1.1 Conventions 7.1.2 General frame format 7.1.3 Frame fields 7.2 Format of individual frame types 7.2.1 Control frames 7.2.2 Data frames 7.2.3 Management frames 7.3 Management frame body components 7.3.1 Fixed fields 7.3.2 Information elements 8 Safety 8.1 WAI authentication and key management 8.1.1 Structure of authentication system 8.1.2 Management of WAPI security association 8.1.3 Certificate 8.1.4 WMS Protocol 8.2 WLAN privacy infrastructure of WPI 8.2.1 WPI-SMS4 working mode 8.2.2 Key 8.2.3 Encapsulation and decapsulation 8.2.4 Usage rules of data packet sequence number PN 9 MAC Sublayer Functional Description 9.1 MAC architecture 9.1.1 DCF 9.1.2 PCF 9.1.3 Coexistence of DCF and PCF 9.1.4 Fragmentation/defragmentation overview 9.1.5 MAC data service 9.2 DCF 9.2.1 CS mechanism 9.2.2 MAC-Level acknowledgments 9.2.3 IFS 9.2.4 Random backoff time 9.2.5 DCF access procedure 9.2.6 Directed MPDU transfer procedure 9.2.7 Broadcast and multicast MPDU transfer procedure 9.2.8 ACK procedure 9.2.9 Duplicate detection and recovery 9.2.10 DCF timing relations 9.3 PCF 9.3.1 CFP structure and timing 9.3.2 PCF access procedure 9.3.3 PCF transfer procedure 9.3.4 CF polling list 9.4 Fragmentation 9.5 Defragmentation 9.6 Multirate support 9.7 Frame exchange sequences 9.8 MSDU transmission restrictions 10 Layer Management 10.1 Overview of management model 10.2 Generic management primitives Figure 78 GET and SET operations 10.3 MLME SAP interface 10.3.1 Power management 10.3.2 Scan 10.3.3 Synchronization 10.3.4 Link authentication 10.3.5 Deauthenticate 10.3.6 Associate 10.3.7 Reassociate 10.3.8 Disassociate 10.3.10 Start 10.3.11 Setting the WPI key 10.3.13 Establishment of STAKey 10.3.14 Protection setting 10.3.15 Discarding of protected frame 10.4 PLME SAP interface 10.4.1 PLME-RESET.request 10.4.2 PLME-CHARACTERISTICS.request 10.4.3 PLME-CHARACTERISTICS.confirm 10.4.4 PLME-DSSSTESTMODE.request 10.4.5 PLME-DSSSTESTOUTPUT.request 11 MLME 11.1 Synchronization 11.1.1 Basic approach 11.1.2 Maintaining synchronization 11.1.3 Acquiring synchronization, scanning 11.1.4 Adjusting STA timers 11.1.5 Timing synchronization for FH PHYs 11.2 Power management 11.2.1 Power management in an infrastructure network 11.2.2 Power management in an IBSS 11.3 Link authentication and delink authentication 11.3.1 Link authentication - Source STA 11.3.2 Link authentication - destination STA 11.3.3 Delink authentication - Source STA 11.3.4 Delink authentication - destination STA 11.4 Association, reassociation and deassociation 11.4.1 STA association procedures 11.4.2 AP association procedures 11.4.3 STA reassociation procedures 11.4.4 AP reassociation procedures 11.4.5 STA Disassociation Procedure 11.4.6 AP disassociation procedure 11.5 MIB definitions 12 PHY Service Specification 12.1 Scope 12.2 PHY functions 12.3 Detailed PHY service specifications 12.3.1 Scope and field of application 12.3.2 Overview of the service 12.3.3 Overview of interactions 12.3.4 Basic service and options 12.3.5 PHY-SAP detailed service specification 13 PHY Management 14 Frequency-Hopping Spread Spectrum (FHSS) PHY Specification for the 2.4 GHz Industrial, Scientific, and Medical (ISM) Band 14.1 Overview 14.1.1 Overview of FHSS PHY 14.1.2 FHSS PHY functions 14.1.3 Service specification method and notation 14.2 FHSS PHY-specific service parameter lists 14.2.1 Overview 14.2.2 TXVECTOR parameters 14.2.3 RXVECTOR parameters 14.3 FHSS PLCP sublayer 14.3.1 Overview 14.3.2 PLCP frame format 14.3.3 PLCP state machines 14.4 PLME SAP layer management 14.4.1 Overview 14.4.2 FH PHY specific MLME procedures 14.4.3 FH PLME state machines 14.5 FHSS PMD sublayer services 14.5.1 Scope and field of application 14.5.2 Overview of services 14.5.3 Overview of interactions 14.5.4 Basic service and options 14.5.5 PMD_SAP detailed service specification 14.6 FHSS PMD sublayer, 1.0 Mbit/s 14.6.1 1 Mbit/s PMD operating specifications, general 14.6.2 Regulatory requirements 14.6.3 Operating frequency range 14.6.4 Number of operating channels 14.6.6 Occupied channel bandwidth 14.6.7 Minimum hop rate 14.6.8 Hop sequences 14.6.9 Unwanted emissions 14.6.10 Modulation 14.6.11 Channel data rate 14.6.12 Channel switching/settling time 14.6.13 Receive to transmit switch time 14.6.14 PMD transmit specifications 14.6.15 PMD receiver specifications 14.6.16 Operating temperature range 14.7 FHSS PMD sublayer, 2.0 Mbit/s 14.7.1 Overview 14.7.2 4GFSK modulation 14.7.3 Channel data rate 14.8 FHSS PHY MIB 14.8.1 General 14.8.2 FH PHY attributes 14.9 FH PHY characteristics 15 DSSS PHY Specification for the 2.4 GHz Band Designated for ISM Applications 15.1 Overview 15.1.1 Scope 15.1.2 DSSS PHY functions 15.1.3 Service specification method and notation 15.2 DSSS PLCP sublayer 15.2.1 Overview 15.2.2 PLCP frame format 15.2.3 PLCP field definitions 15.2.4 PLCP/DSSS PHY data scrambler and descrambler 15.2.5 PLCP data modulation and modulation rate change 15.2.6 Transmit PLCP 15.2.7 Receive PLCP 15.3 DSSS PLME 15.3.1 PLME_SAP sublayer management primitives 15.3.2 DSSS PHY MIB 15.3.3 DS PHY characteristics 15.4 DSSS PMD sublayer 15.4.1 Scope and field of application 15.4.2 Overview of service 15.4.3 Overview of interactions 15.4.4 Basic service and options 15.4.5 PMD_SAP detailed service specification 15.4.6 PMD operating specifications, general 15.4.7 PMD transmit specifications 15.4.8 PMD receiver specifications 16 Infrared (IR) PHY Specification 16.1 Overview 16.1.1 Scope 16.1.2 IR PHY functions 16.1.3 Service specification method and notation 16.2 IR PLCP sublayer 16.2.1 Overview 16.2.2 PLCP frame format 16.2.3 PLCP modulation and rate change 16.2.4 PLCP field definitions 16.2.5 PLCPs 16.3 IR PMD sublayer 16.3.1 Overview 16.3.2 PMD operating specifications, general 16.3.3 PMD transmit specifications 16.3.4 PMD receiver specifications 16.3.5 ED, CS, and CCA definitions 16.4 PHY attributes A.1 Introduction A.2 Abbreviations and special symbols A.2.1 Symbols for Status column A.2.2 General abbreviations for Item and Support columns A.3 Instructions for completing the PICS proforma A.3.1 General structure of the PICS proforma A.3.2 Additional information A.3.3 Exception information A.3.4 Conditional status A.4 PICS proforma A.4.1 Implementation identification A.4.2 Protocol summary A.4.3 IUT configuration A.4.4 MAC protocol A.4.5 Frequency hopping (FH) PHY functions A.4.6 Direct sequence PHY functions A.4.7 IR baseband PHY functions Annex B (Informative) Hopping Sequences Annex C (Normative) Formal Description of MAC Operation C.1 Introduction to the MAC formal description C.1.1 Fundamental assumptions C.1.2 Notation conventions C.1.3 Modeling techniques C.2 Data type and operator definitions for the MAC state machines C.3 State machines for MAC stations C.4 State machines for MAC AP Annex D (normative) ASN.1 Encoding of the MAC and PHY MIB Annex E (Informativex) Reference Implementation and Test Vectors of Message Authentication and Key Derivation Algorithms E.1 Message authentication algorithm E.1.1 Reference implementation (C language) E.1.2 Test vector E.2 Key derivation algorithm E.2.1 Reference implementation E.2.2 Test vector Bibliography Figure 1 BSSs Figure 2 DSs and APs Figure 3 ESS Figure 4 A representative signal intensity map Figure 5 Collocated coverage areas Figure 6 Connecting to other GB 15629 LANs Figure 7 Complete this part architecture Figure 8 Relationship between state variables and services Figure 9 This part compliant architecture Figure 10 Logical architecture of an IBSS Figure 11 Portion of the basic reference model covered in this part Figure 11a Security association establishment in infrastructure mode Figure 11b MAC data plane structure Figure 12 MAC frame format Figure 13 Frame Control field Figure 14 Sequence Control field Figure 15 Frame Control field subfield values within control frames Figure 16 RTS frame Figure 17 CTS frame Figure 18 ACK frame Figure 19 PS-Poll frame Figure 20 CF-End frame Figure 21 CF-End+CF-Ack Frame Figure 22 Data frame Figure 23 Management frame format Figure 24 Authentication Algorithm Number fixed field Figure 25 Authentication Transaction Sequence Number fixed field Figure 26 Beacon Interval fixed field Figure 27 Capability Information fixed field Figure 28 Current AP Address fixed field Figure 29 Listen Interval fixed field Figure 30 Reason Code fixed field Figure 31 AID fixed field Figure 32 Status Code fixed field Figure 33 Timestamp fixed field Figure 34 Element format Figure 35 SSID element format Figure 36 Supported rates element format Figure 37 FH Parameter Set element format Figure 38 DS Parameter Set element format Figure 39 CF Parameter Set element format Figure 40 TIM element format Figure 41 IBSS Parameter Set element format Figure 41a Format of WAPI information element Figure 41b WAPI capability information Figure 41c Suite Format Selection Figure 42 Schematic Diagram of Authentication Subsystem Figure 43 Authentication State of Controlled Port Figure 44 Usage of Controlled Port and Uncontrolled Port Figure 45 Structure of Authentication System Figure 46 Format of Public Key Certificate Figure 47 Definition of certificate content Figure 48 Extended attributes Figure 49 Issuance format of certificate Figure 50 Digest Field Figure 51 Attribute field Figure 52 Basic Format of WAI Protocol Packet Data of the WAI Authentication System Figure 53 Identification FLAG Figure 54 Certificate Figure 55 Identity Figure 56 Identity data Figure 57 Address index Figure 58 Attribute format Figure 59 gnature attribute Figure 60 Certificate validation result Figure 61 entity list Figure 61a Certificate authentication process Figure 61b Format of Authentication Activation Packet Data Field Figure 61c Data Field Format of Access Authentication Request Packet Figure 61d Data Field of Certificate Authentication Request Packet Figure 61e Data Field format of Certificate Authentication Response Packet Figure 61f Data Field Format of Access Authentication Response Packet Figure 61g Unicast Key Negotiation Process Figure 61h Data Field Format of Unicast Key Negotiation Request Packet Figure 61i Data Field Format of Unicast Key Negotiation Response Packet Figure 61j Data Field Format of Unicast Key Negotiation Acknowledge Packet Figure 61k Multicast key/station key notification process Figure 61l Data field format of multicast key/station key notification packet Figure 61m Data Field Format of Multicast Key/Station Key Response Packet Figure 61n Data Field Format of Station Key Establishment Request Packet Figure 61o Station Key Establishment Flow Chart Figure 61p Data Field Format of Pre-authentication Start Packet Figure 61q BK Key Export System Architecture Figure 61r Unicast Key Export System Architecture Figure 61s Multicast/Station Key Export System Architecture Figure 61t Preshared Key Export System Figure 61u Working Mode Figure 61v WPI-SMS4 MPDU Encapsulation Structure Figure 61w Integrity Check Data Figure 62 MAC architecture Figure 63 Fragmentation Figure 64 Some IFS relationships Figure 65 Example of exponential increase of CW Figure 66 Basic access method Figure 67 Backoff procedure Figure 68 RTS/CTS/data/ACK and NAV setting Figure 69 Transmission of a multiple-fragment MSDU using SIFS Figure 70 RTS/CTS with fragmented MSDU Figure 71 RTS/CTS with transmitter priority and missed acknowledgment Figure 72 Directed data/ACK MPDU Figure 73 DCF timing relationships Figure 74 CFP/CP alternation Figure 75 Beacons and CFPs Figure 76 Example of delayed beacon and foreshortened CFP Figure 77 Example of PCF frame transfer Figure 79 Beacon transmission on a busy network Figure 80 Beacon transmission in an IBSS Figure 81 Probe response Figure 82 Infrastructure power management operation (no PCF operating) Figure 83 Power management in an IBSS-basic operation Figure 84 State diagram notation example Figure 85 PLCP frame format Figure 86 Frame synchronous scrambler/descrambler Figure 87 PLCP data whitener format Figure 88 PLCP top-level state diagram Figure 89 Transmit state machine Figure 90 Data whitener encoding procedure Figure 91 Transmit state timing Figure 92 CS/CCA state machine Figure 93 CS/CCA state timing Figure 94 Receive state machine Figure 95 Data whitener decoding procedure Figure 96 Receive timing Figure 97 PLME state machine Figure 98 PMD layer reference model Figure 99 Transmit modulation mask Figure 100 4GFSK transmit modulation Figure 101 PLCP frame format Figure 102 CRC-16 implementation Figure 103 Example CRC calculation Figure 104 Data scrambler Figure 105 Data descrambler Figure 106 Transmit PLCP Figure 107 PLCP transmit state machine Figure 108 Receive PLCP Figure 109 PLCP receive state machine Figure 110 PMD layer reference model Figure 111 Transmit spectrum mask Figure 112 Transmit power-on ramp Figure 113 Transmit power-down ramp Figure 114 Modulation accuracy measurement example Figure 115 Chip clock alignment with baseband eye pattern Figure 116 PPDU frame format Figure 117 Basic pulse shape Figure 118 Emitter radiation pattern mask Figure 119 Mask 2 device orientation drawing Figure 120 Emitter radiation pattern mask Figure 121 Transmit spectrum mask Table 1 Valid type and subtype combinations Table 2 To/From DS combinations in data type frames Table 3 Duration/ID field encoding Table 4 Address field contents Table 5 Beacon frame body Table 6 Disassociation frame body Table 7 Association Request frame body Table 8 Association Response frame body Table 9 Reassociation Request frame body Table 10 Reassociation Response frame body Table 11 Probe Request frame body Table 12 Probe Response frame body Table 13 Authentication frame body Table 14 Deauthentication frame body Table 15 STA usage of CF-Pollable and CF-Poll Request Table 16 AP usage of CF-Pollable and CF-Poll Request Table 17 Reason codes Table 18 Status codes Table 19 Element IDs Table 19b Cipher suite Table 19c Cipher suite Table 20 Frame sequences Table 21 CF frame sequences Table 22 Power Management modes Table 23 PHY-SAP peer-to-peer service primitives Table 24 PHY-SAP sublayer-to-sublayer service primitives Table 25 PHY-SAP service primitive parameters Table 26 Vector descriptions Table 27 TXVECTOR parameters Table 28 RXVECTOR parameters Table 29 PSF bit descriptions Table 30 PLCP field bit descriptions Table 31 PMD_SAP peer-to-peer service primitives Table 32 PMD_SAP sublayer-to-sublayer service primitives Table 33 List of parameters for PMD primitives Table 34 Transmit power levels Table 35 Operating frequency range Table 36 Number of operating channels Table 37 Requirements in China, North America and Europe (excluding Spain and France) Table 38 Requirements in Japan Table 39 Requirements in Spain Table 40 Requirements in France Table 41 Base-Hopping sequence b(i) for China, North America and most of Europe Table 42 Base-Hopping sequence b(i) for Spain Table 43 Base-Hopping sequence b(i) for France Table 44 Symbol encoding into carrier deviation (1 Mbit/s, 2GFSK) Table 45 1 Mbit/s Dp Table 46 Symbol encoding into carrier deviation Table 47 2 Mbit/s Dp Table 48 FHSS PHY attributes Table 49 Regulatory domain codes Table 50 Supported data rate codes (dot11SupportedDataRatesTX) Table 51 Supported data rate codes (dot11SupportedDataRatesRX) Table 52 Number of transmit antennas Table 53 Number of receive antennas Table 54 Diversity support codes Table 55 Diversity select antenna codes Table 56 Transmit power levels Table 56a FH PHY characteristics Table 57 MIB attribute default values/ranges Table 58 DS PHY characteristics Table 59 PMD_SAP peer-to-peer service primitives Table 60 DSSS PMD_SAP peer-to-peer service primitives Table 61 PMD_SAP sublayer-to-sublayer service primitives Table 62 List of parameters for the PMD primitives Table 63 DSSS PHY frequency channel plan Table 64 1 Mbit/s DBPSK encoding table Table 65 2 Mbit/s DQPSK encoding table Table 66 Transmit power levels Table 67 IR PMD_SAP peer-to-peer service primitives Table 68 Sixteen-PPM basic rate mapping Table 69 Four-PPM enhanced rate mapping Table 70 Peak optical power as a function of emitter radiation pattern mask Table 71 Definition of the emitter radiation pattern mask Table 72 Definition of emitter radiation pattern mask Table 73 Definition of the receiver FOV Table 74 IR PHY MIB attributes Table 75 IR PHY characteristics Table B.1 Hopping sequence set Table B.2 Hopping sequence set Table B.3 Hopping sequence set