Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements--Part 11:Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications , includes Amendment 1
Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
1 Overview
1.1 Scope
The scope of this part is to develop a medium access control (MAC) and physical layer (PHY) specification for wireless connectivity for fixed, portable, and moving stations within a local area.
1.2 Purpose
The purpose of this part is to provide wireless connectivity to automatic machinery, equipment, or stations that require rapid deployment, which may be portable or hand-held, or which may be mounted on moving vehicles within a local area. This part also offers regulatory bodies a means of standardizing access to one or more frequency bands for the purpose of local area communication.
Specifically, this part:
— Describes the functions and services required by a this part compliant device to operate within ad hoc and infrastructure networks as well as the aspects of station mobility (transition) within those networks;
— Defines the MAC procedures to support the asynchronous MAC service data unit (MSDU) delivery services;
— Defines several PHY signaling techniques and interface functions that are controlled by this part MAC;
— Permits the operation of this part compliant device within a wireless local area network (LAN) that may coexist with multiple overlapping wireless LANs;
— Describes the requirements and procedures to provide privacy of user information being transferred over the wireless medium (WM) and authentication of this part compliant devices.
2 Normative References
The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of GB 15629. For dated references, subsequent amendments (excluding corrections), or revisions, of any of these publications do not apply to this part. However, parties to agreements based on this part are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. For undated references, the latest edition of the normative document referred to applies.
GB 7247.1-2001 Safety of Laser Products — Part 1: Equipment Classification, Requirements and Users Guide (IEC 60825-1:1993, IDT)
GB/T 9387.1-1998 Information Technology — Open Systems Interconnection — Basic Reference Model — Part 1: the Basic Model (ISO/IEC 7498-1:1994)
GB/T 15629.2 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 2: Logical Link Control (GB/T 15629.2-1995, ISO/IEC 8802-2:1998, IDT)
GB/T 16262.1-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 1: Specification of Basic Notation (ISO/IEC 8824-1:1995, IDT)
GB/T 16262.2-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 2: Information Object Specification (ISO/IEC 8824-2:1995, IDT)
GB/T 16262.3-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 3: Constraint Specification (ISO/IEC 8824-3:1995, IDT)
GB/T 16262.4-2006 Information Technology — Abstract Syntax Notation One (ASN.1) — Part 4: Parameterization of ASN.1 Specifications (ISO/IEC 8824-4:1995, IDT)
GB/T 16263.1-2006 Information Technology — ASN.1 Encoding Rules — Part 1: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) (ISO/IEC 8825-1:1995, IDT)
GB/T 16263.2-2006 Information Technology — ASN.1 Encoding Rules — Part 2: Specification of Packed Encoding Rules (PER) (ISO/IEC 8825-2:1996, IDT)
GB/T 17969.1-2000 Information Technology — Open Systems Interconnection — Procedures for the Operation of OSI Registration Authorities — Part 1: General Procedures
Guide for Wireless LAN Product Password Algorithm Application Commercial Cryptography Testing Center of State Cryptography Administration, December 2005
ISO/IEC 8802.11:1999 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specific Requirements — Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
RFC3280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
GB/T 18236.1 Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Common specifications — Part 1: Medium Access Control (MAC) Service Definition (GB/T 18236.1-2000, ISO/IEC 15802-1:1995, IDT)
ITU Radio Regulations Volumes 1-4
ITU-T Recommendation
X.210 (11/93) Information Technology — Open Systems Interconnection — Basic Reference Model: Conventions for the Definition of OSI Services (Common Text with ISO/IEC)
ITU-T Recommendation
Z.100 (03/93) CCITT Specification and Description Language (SDL)
ITU-T Recommendation
Z.105 (03/95) SDL Combined with ASN.1 (SDL/ASN.1)
3 Terms and Definitions
For the purpose of this document, the following terms and definitions apply.
3.1
access control
the prevention of unauthorized usage of resources
3.2
access point (AP)
any entity that has station functionality and provides access to the distribution services, via the wireless medium (WM) for associated stations
3.3
ad hoc network
a network composed solely of stations within mutual communication range of each other via the wireless medium (WM). An ad hoc network is typically created in a spontaneous manner. The principal distinguishing characteristic of an ad hoc network is its limited temporal and spatial extent. These limitations allow the act of creating and dissolving the ad hoc network to be sufficiently straightforward and convenient so as to be achievable by nontechnical users of the network facilities; i.e., no specialized “technical skills" are required and little or no investment of time or additional resources is required beyond the stations that are to participate in the ad hoc network. The term ad hoc is often used as slang to refer to an independent basic service set (IBSS)
Foreword XIII
Introduction XVI
1 Overview
1.1 Scope
1.2 Purpose
2 Normative References
3 Terms and Definitions
4 Abbreviations
5 General Description
5.1 General description of the architecture
5.2 Components of this part architecture
5.2.1 The independent BSS (IBSS) as an ad hoc network
5.2.2 Distribution system (DS) concepts
5.2.3 Area concepts
5.2.4 Integration with wired LANs
5.3 Logical service interfaces
5.3.1 SS
5.3.2 DSS
5.3.3 Multiple logical address spaces
5.4 Overview of the services
5.4.1 Distribution of messages within a DS
5.4.2 Services that support the distribution service
5.4.3 Access and confidentiality control services
5.5 Relationships between services
5.5.1 Class 1 frames (permitted from within States 1, 2, and 3)
5.5.2 Class 2 frames (if and only if authenticated; allowed from within States 2 and 3 only)
5.5.3 Class 3 frames (if and only if associated; allowed only from within State 3)
5.6 Differences between ESS and IBSS LANs
5.7 Message information contents that support the services
5.7.1 Data
5.7.2 Association
5.7.3 Reassociation
5.7.4 Disassociation
5.7.5 Privacy
5.7.6 Authentication
5.7.7 Deauthentication
5.8 Reference model
5.9 Establishing a security association
5.9.1 Infrastructure
5.9.2 AD hoc network mode
6 MAC Service Definition
6.1 Overview of MAC services
6.1.1 Asynchronous data service
6.1.2 Security services
6.1.3 MSDU ordering
6.1.4 MAC Data Service Infrastructure
6.2 Detailed service specification
6.2.1 MAC data services
7 Frame Formats
7.1 MAC frame formats
7.1.1 Conventions
7.1.2 General frame format
7.1.3 Frame fields
7.2 Format of individual frame types
7.2.1 Control frames
7.2.2 Data frames
7.2.3 Management frames
7.3 Management frame body components
7.3.1 Fixed fields
7.3.2 Information elements
8 Safety
8.1 WAI authentication and key management
8.1.1 Structure of authentication system
8.1.2 Management of WAPI security association
8.1.3 Certificate
8.1.4 WMS Protocol
8.2 WLAN privacy infrastructure of WPI
8.2.1 WPI-SMS4 working mode
8.2.2 Key
8.2.3 Encapsulation and decapsulation
8.2.4 Usage rules of data packet sequence number PN
9 MAC Sublayer Functional Description
9.1 MAC architecture
9.1.1 DCF
9.1.2 PCF
9.1.3 Coexistence of DCF and PCF
9.1.4 Fragmentation/defragmentation overview
9.1.5 MAC data service
9.2 DCF
9.2.1 CS mechanism
9.2.2 MAC-Level acknowledgments
9.2.3 IFS
9.2.4 Random backoff time
9.2.5 DCF access procedure
9.2.6 Directed MPDU transfer procedure
9.2.7 Broadcast and multicast MPDU transfer procedure
9.2.8 ACK procedure
9.2.9 Duplicate detection and recovery
9.2.10 DCF timing relations
9.3 PCF
9.3.1 CFP structure and timing
9.3.2 PCF access procedure
9.3.3 PCF transfer procedure
9.3.4 CF polling list
9.4 Fragmentation
9.5 Defragmentation
9.6 Multirate support
9.7 Frame exchange sequences
9.8 MSDU transmission restrictions
10 Layer Management
10.1 Overview of management model
10.2 Generic management primitives
Figure 78 GET and SET operations
10.3 MLME SAP interface
10.3.1 Power management
10.3.2 Scan
10.3.3 Synchronization
10.3.4 Link authentication
10.3.5 Deauthenticate
10.3.6 Associate
10.3.7 Reassociate
10.3.8 Disassociate
10.3.10 Start
10.3.11 Setting the WPI key
10.3.13 Establishment of STAKey
10.3.14 Protection setting
10.3.15 Discarding of protected frame
10.4 PLME SAP interface
10.4.1 PLME-RESET.request
10.4.2 PLME-CHARACTERISTICS.request
10.4.3 PLME-CHARACTERISTICS.confirm
10.4.4 PLME-DSSSTESTMODE.request
10.4.5 PLME-DSSSTESTOUTPUT.request
11 MLME
11.1 Synchronization
11.1.1 Basic approach
11.1.2 Maintaining synchronization
11.1.3 Acquiring synchronization, scanning
11.1.4 Adjusting STA timers
11.1.5 Timing synchronization for FH PHYs
11.2 Power management
11.2.1 Power management in an infrastructure network
11.2.2 Power management in an IBSS
11.3 Link authentication and delink authentication
11.3.1 Link authentication - Source STA
11.3.2 Link authentication - destination STA
11.3.3 Delink authentication - Source STA
11.3.4 Delink authentication - destination STA
11.4 Association, reassociation and deassociation
11.4.1 STA association procedures
11.4.2 AP association procedures
11.4.3 STA reassociation procedures
11.4.4 AP reassociation procedures
11.4.5 STA Disassociation Procedure
11.4.6 AP disassociation procedure
11.5 MIB definitions
12 PHY Service Specification
12.1 Scope
12.2 PHY functions
12.3 Detailed PHY service specifications
12.3.1 Scope and field of application
12.3.2 Overview of the service
12.3.3 Overview of interactions
12.3.4 Basic service and options
12.3.5 PHY-SAP detailed service specification
13 PHY Management
14 Frequency-Hopping Spread Spectrum (FHSS) PHY Specification for the 2.4 GHz Industrial, Scientific, and Medical (ISM) Band
14.1 Overview
14.1.1 Overview of FHSS PHY
14.1.2 FHSS PHY functions
14.1.3 Service specification method and notation
14.2 FHSS PHY-specific service parameter lists
14.2.1 Overview
14.2.2 TXVECTOR parameters
14.2.3 RXVECTOR parameters
14.3 FHSS PLCP sublayer
14.3.1 Overview
14.3.2 PLCP frame format
14.3.3 PLCP state machines
14.4 PLME SAP layer management
14.4.1 Overview
14.4.2 FH PHY specific MLME procedures
14.4.3 FH PLME state machines
14.5 FHSS PMD sublayer services
14.5.1 Scope and field of application
14.5.2 Overview of services
14.5.3 Overview of interactions
14.5.4 Basic service and options
14.5.5 PMD_SAP detailed service specification
14.6 FHSS PMD sublayer, 1.0 Mbit/s
14.6.1 1 Mbit/s PMD operating specifications, general
14.6.2 Regulatory requirements
14.6.3 Operating frequency range
14.6.4 Number of operating channels
14.6.6 Occupied channel bandwidth
14.6.7 Minimum hop rate
14.6.8 Hop sequences
14.6.9 Unwanted emissions
14.6.10 Modulation
14.6.11 Channel data rate
14.6.12 Channel switching/settling time
14.6.13 Receive to transmit switch time
14.6.14 PMD transmit specifications
14.6.15 PMD receiver specifications
14.6.16 Operating temperature range
14.7 FHSS PMD sublayer, 2.0 Mbit/s
14.7.1 Overview
14.7.2 4GFSK modulation
14.7.3 Channel data rate
14.8 FHSS PHY MIB
14.8.1 General
14.8.2 FH PHY attributes
14.9 FH PHY characteristics
15 DSSS PHY Specification for the 2.4 GHz Band Designated for ISM Applications
15.1 Overview
15.1.1 Scope
15.1.2 DSSS PHY functions
15.1.3 Service specification method and notation
15.2 DSSS PLCP sublayer
15.2.1 Overview
15.2.2 PLCP frame format
15.2.3 PLCP field definitions
15.2.4 PLCP/DSSS PHY data scrambler and descrambler
15.2.5 PLCP data modulation and modulation rate change
15.2.6 Transmit PLCP
15.2.7 Receive PLCP
15.3 DSSS PLME
15.3.1 PLME_SAP sublayer management primitives
15.3.2 DSSS PHY MIB
15.3.3 DS PHY characteristics
15.4 DSSS PMD sublayer
15.4.1 Scope and field of application
15.4.2 Overview of service
15.4.3 Overview of interactions
15.4.4 Basic service and options
15.4.5 PMD_SAP detailed service specification
15.4.6 PMD operating specifications, general
15.4.7 PMD transmit specifications
15.4.8 PMD receiver specifications
16 Infrared (IR) PHY Specification
16.1 Overview
16.1.1 Scope
16.1.2 IR PHY functions
16.1.3 Service specification method and notation
16.2 IR PLCP sublayer
16.2.1 Overview
16.2.2 PLCP frame format
16.2.3 PLCP modulation and rate change
16.2.4 PLCP field definitions
16.2.5 PLCPs
16.3 IR PMD sublayer
16.3.1 Overview
16.3.2 PMD operating specifications, general
16.3.3 PMD transmit specifications
16.3.4 PMD receiver specifications
16.3.5 ED, CS, and CCA definitions
16.4 PHY attributes
A.1 Introduction
A.2 Abbreviations and special symbols
A.2.1 Symbols for Status column
A.2.2 General abbreviations for Item and Support columns
A.3 Instructions for completing the PICS proforma
A.3.1 General structure of the PICS proforma
A.3.2 Additional information
A.3.3 Exception information
A.3.4 Conditional status
A.4 PICS proforma
A.4.1 Implementation identification
A.4.2 Protocol summary
A.4.3 IUT configuration
A.4.4 MAC protocol
A.4.5 Frequency hopping (FH) PHY functions
A.4.6 Direct sequence PHY functions
A.4.7 IR baseband PHY functions
Annex B (Informative) Hopping Sequences
Annex C (Normative) Formal Description of MAC Operation
C.1 Introduction to the MAC formal description
C.1.1 Fundamental assumptions
C.1.2 Notation conventions
C.1.3 Modeling techniques
C.2 Data type and operator definitions for the MAC state machines
C.3 State machines for MAC stations
C.4 State machines for MAC AP
Annex D (normative) ASN.1 Encoding of the MAC and PHY MIB
Annex E (Informativex) Reference Implementation and Test Vectors of Message Authentication and Key Derivation Algorithms
E.1 Message authentication algorithm
E.1.1 Reference implementation (C language)
E.1.2 Test vector
E.2 Key derivation algorithm
E.2.1 Reference implementation
E.2.2 Test vector
Bibliography
Figure 1 BSSs
Figure 2 DSs and APs
Figure 3 ESS
Figure 4 A representative signal intensity map
Figure 5 Collocated coverage areas
Figure 6 Connecting to other GB 15629 LANs
Figure 7 Complete this part architecture
Figure 8 Relationship between state variables and services
Figure 9 This part compliant architecture
Figure 10 Logical architecture of an IBSS
Figure 11 Portion of the basic reference model covered in this part
Figure 11a Security association establishment in infrastructure mode
Figure 11b MAC data plane structure
Figure 12 MAC frame format
Figure 13 Frame Control field
Figure 14 Sequence Control field
Figure 15 Frame Control field subfield values within control frames
Figure 16 RTS frame
Figure 17 CTS frame
Figure 18 ACK frame
Figure 19 PS-Poll frame
Figure 20 CF-End frame
Figure 21 CF-End+CF-Ack Frame
Figure 22 Data frame
Figure 23 Management frame format
Figure 24 Authentication Algorithm Number fixed field
Figure 25 Authentication Transaction Sequence Number fixed field
Figure 26 Beacon Interval fixed field
Figure 27 Capability Information fixed field
Figure 28 Current AP Address fixed field
Figure 29 Listen Interval fixed field
Figure 30 Reason Code fixed field
Figure 31 AID fixed field
Figure 32 Status Code fixed field
Figure 33 Timestamp fixed field
Figure 34 Element format
Figure 35 SSID element format
Figure 36 Supported rates element format
Figure 37 FH Parameter Set element format
Figure 38 DS Parameter Set element format
Figure 39 CF Parameter Set element format
Figure 40 TIM element format
Figure 41 IBSS Parameter Set element format
Figure 41a Format of WAPI information element
Figure 41b WAPI capability information
Figure 41c Suite Format Selection
Figure 42 Schematic Diagram of Authentication Subsystem
Figure 43 Authentication State of Controlled Port
Figure 44 Usage of Controlled Port and Uncontrolled Port
Figure 45 Structure of Authentication System
Figure 46 Format of Public Key Certificate
Figure 47 Definition of certificate content
Figure 48 Extended attributes
Figure 49 Issuance format of certificate
Figure 50 Digest Field
Figure 51 Attribute field
Figure 52 Basic Format of WAI Protocol Packet Data of the WAI Authentication System
Figure 53 Identification FLAG
Figure 54 Certificate
Figure 55 Identity
Figure 56 Identity data
Figure 57 Address index
Figure 58 Attribute format
Figure 59 gnature attribute
Figure 60 Certificate validation result
Figure 61 entity list
Figure 61a Certificate authentication process
Figure 61b Format of Authentication Activation Packet Data Field
Figure 61c Data Field Format of Access Authentication Request Packet
Figure 61d Data Field of Certificate Authentication Request Packet
Figure 61e Data Field format of Certificate Authentication Response Packet
Figure 61f Data Field Format of Access Authentication Response Packet
Figure 61g Unicast Key Negotiation Process
Figure 61h Data Field Format of Unicast Key Negotiation Request Packet
Figure 61i Data Field Format of Unicast Key Negotiation Response Packet
Figure 61j Data Field Format of Unicast Key Negotiation Acknowledge Packet
Figure 61k Multicast key/station key notification process
Figure 61l Data field format of multicast key/station key notification packet
Figure 61m Data Field Format of Multicast Key/Station Key Response Packet
Figure 61n Data Field Format of Station Key Establishment Request Packet
Figure 61o Station Key Establishment Flow Chart
Figure 61p Data Field Format of Pre-authentication Start Packet
Figure 61q BK Key Export System Architecture
Figure 61r Unicast Key Export System Architecture
Figure 61s Multicast/Station Key Export System Architecture
Figure 61t Preshared Key Export System
Figure 61u Working Mode
Figure 61v WPI-SMS4 MPDU Encapsulation Structure
Figure 61w Integrity Check Data
Figure 62 MAC architecture
Figure 63 Fragmentation
Figure 64 Some IFS relationships
Figure 65 Example of exponential increase of CW
Figure 66 Basic access method
Figure 67 Backoff procedure
Figure 68 RTS/CTS/data/ACK and NAV setting
Figure 69 Transmission of a multiple-fragment MSDU using SIFS
Figure 70 RTS/CTS with fragmented MSDU
Figure 71 RTS/CTS with transmitter priority and missed acknowledgment
Figure 72 Directed data/ACK MPDU
Figure 73 DCF timing relationships
Figure 74 CFP/CP alternation
Figure 75 Beacons and CFPs
Figure 76 Example of delayed beacon and foreshortened CFP
Figure 77 Example of PCF frame transfer
Figure 79 Beacon transmission on a busy network
Figure 80 Beacon transmission in an IBSS
Figure 81 Probe response
Figure 82 Infrastructure power management operation (no PCF operating)
Figure 83 Power management in an IBSS-basic operation
Figure 84 State diagram notation example
Figure 85 PLCP frame format
Figure 86 Frame synchronous scrambler/descrambler
Figure 87 PLCP data whitener format
Figure 88 PLCP top-level state diagram
Figure 89 Transmit state machine
Figure 90 Data whitener encoding procedure
Figure 91 Transmit state timing
Figure 92 CS/CCA state machine
Figure 93 CS/CCA state timing
Figure 94 Receive state machine
Figure 95 Data whitener decoding procedure
Figure 96 Receive timing
Figure 97 PLME state machine
Figure 98 PMD layer reference model
Figure 99 Transmit modulation mask
Figure 100 4GFSK transmit modulation
Figure 101 PLCP frame format
Figure 102 CRC-16 implementation
Figure 103 Example CRC calculation
Figure 104 Data scrambler
Figure 105 Data descrambler
Figure 106 Transmit PLCP
Figure 107 PLCP transmit state machine
Figure 108 Receive PLCP
Figure 109 PLCP receive state machine
Figure 110 PMD layer reference model
Figure 111 Transmit spectrum mask
Figure 112 Transmit power-on ramp
Figure 113 Transmit power-down ramp
Figure 114 Modulation accuracy measurement example
Figure 115 Chip clock alignment with baseband eye pattern
Figure 116 PPDU frame format
Figure 117 Basic pulse shape
Figure 118 Emitter radiation pattern mask
Figure 119 Mask 2 device orientation drawing
Figure 120 Emitter radiation pattern mask
Figure 121 Transmit spectrum mask
Table 1 Valid type and subtype combinations
Table 2 To/From DS combinations in data type frames
Table 3 Duration/ID field encoding
Table 4 Address field contents
Table 5 Beacon frame body
Table 6 Disassociation frame body
Table 7 Association Request frame body
Table 8 Association Response frame body
Table 9 Reassociation Request frame body
Table 10 Reassociation Response frame body
Table 11 Probe Request frame body
Table 12 Probe Response frame body
Table 13 Authentication frame body
Table 14 Deauthentication frame body
Table 15 STA usage of CF-Pollable and CF-Poll Request
Table 16 AP usage of CF-Pollable and CF-Poll Request
Table 17 Reason codes
Table 18 Status codes
Table 19 Element IDs
Table 19b Cipher suite
Table 19c Cipher suite
Table 20 Frame sequences
Table 21 CF frame sequences
Table 22 Power Management modes
Table 23 PHY-SAP peer-to-peer service primitives
Table 24 PHY-SAP sublayer-to-sublayer service primitives
Table 25 PHY-SAP service primitive parameters
Table 26 Vector descriptions
Table 27 TXVECTOR parameters
Table 28 RXVECTOR parameters
Table 29 PSF bit descriptions
Table 30 PLCP field bit descriptions
Table 31 PMD_SAP peer-to-peer service primitives
Table 32 PMD_SAP sublayer-to-sublayer service primitives
Table 33 List of parameters for PMD primitives
Table 34 Transmit power levels
Table 35 Operating frequency range
Table 36 Number of operating channels
Table 37 Requirements in China, North America and Europe (excluding Spain and France)
Table 38 Requirements in Japan
Table 39 Requirements in Spain
Table 40 Requirements in France
Table 41 Base-Hopping sequence b(i) for China, North America and most of Europe
Table 42 Base-Hopping sequence b(i) for Spain
Table 43 Base-Hopping sequence b(i) for France
Table 44 Symbol encoding into carrier deviation (1 Mbit/s, 2GFSK)
Table 45 1 Mbit/s Dp
Table 46 Symbol encoding into carrier deviation
Table 47 2 Mbit/s Dp
Table 48 FHSS PHY attributes
Table 49 Regulatory domain codes
Table 50 Supported data rate codes (dot11SupportedDataRatesTX)
Table 51 Supported data rate codes (dot11SupportedDataRatesRX)
Table 52 Number of transmit antennas
Table 53 Number of receive antennas
Table 54 Diversity support codes
Table 55 Diversity select antenna codes
Table 56 Transmit power levels
Table 56a FH PHY characteristics
Table 57 MIB attribute default values/ranges
Table 58 DS PHY characteristics
Table 59 PMD_SAP peer-to-peer service primitives
Table 60 DSSS PMD_SAP peer-to-peer service primitives
Table 61 PMD_SAP sublayer-to-sublayer service primitives
Table 62 List of parameters for the PMD primitives
Table 63 DSSS PHY frequency channel plan
Table 64 1 Mbit/s DBPSK encoding table
Table 65 2 Mbit/s DQPSK encoding table
Table 66 Transmit power levels
Table 67 IR PMD_SAP peer-to-peer service primitives
Table 68 Sixteen-PPM basic rate mapping
Table 69 Four-PPM enhanced rate mapping
Table 70 Peak optical power as a function of emitter radiation pattern mask
Table 71 Definition of the emitter radiation pattern mask
Table 72 Definition of emitter radiation pattern mask
Table 73 Definition of the receiver FOV
Table 74 IR PHY MIB attributes
Table 75 IR PHY characteristics
Table B.1 Hopping sequence set
Table B.2 Hopping sequence set
Table B.3 Hopping sequence set