BS ISO/IEC 14543-3-11:2016
$142.49
Information technology. Home electronic system (HES) architecture – Frequency modulated wireless short-packet (FMWSP) protocol optimised for energy harvesting. Architecture and lower layer protocols
Published By | Publication Date | Number of Pages |
BSI | 2016 | 30 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
6 | FOREWORD |
7 | INTRODUCTION |
9 | 1 Scope 2 Normative references |
10 | 3 Terms, definitions and abbreviations 3.1 Terms and definitions |
14 | 3.2 Abbreviations 4 Conformance |
15 | 5 Architecture 5.1 Generic protocol description 5.1.1 Overview 5.1.2 Physical layer 5.1.3 Data link layer Tables Table 1 ā The FMWSP protocol stack structure (OSI) |
16 | 5.1.4 Network layer 5.1.5 Transport layer 5.1.6 Session layer 5.1.7 Presentation layer 5.1.8 Application layer 5.2 Data unit description 6 Layer 1 ā Physical layer 6.1 Overview 6.2 General description |
17 | Figures Figure 1 ā Illustration of a frequency modulated signal and various associated physical parameters |
18 | 6.3 Physical specifications for a FMWSP transmitter |
19 | 6.4 Physical specifications for a FMWSP receiver 6.5 Packet structure Table 2 ā Requirements for a FMWSP transmitter Table 3 ā Requirements for a FMWSP receiver |
20 | 6.6 Relationship between a packet and a telegram Figure 2 ā The packet structure for the FMWSP protocol Table 4 ā Packet field values of the FMWSP protocol |
21 | 7 Layer 2 ā Data link layer 7.1 Overview 7.2 Structure of a telegram of length less than 8 B Figure 3 ā Relationship between a packet and a telegram Figure 4 ā Structure of a telegram length of less than 8 B Table 5 ā Field values and meaning of a telegram with less than 8Ā B of length |
22 | 7.3 Structure of a telegram length of more than 7 B Figure 5 ā Structure of a telegram length of more than 7 B |
23 | Table 6 ā Header (HDR) description |
24 | 7.4 Data integrity Table 7 ā Extended header (EXHDR) description Table 8 ā Extended telegram type (ETELTYP) description |
25 | 8 Layer 3 ā Network layer 8.1 Overview 8.2 Media access 8.2.1 General 8.2.2 Listen before talk 8.2.3 Random access |
26 | 8.3 Repeater |
27 | Annex A (informative) Examples of how to evaluate the hash value Figure A.1 ā C code program |
28 | Bibliography |