Professional Documents
Culture Documents
3e - 0658 - MAC
7Sponsor
18This document is an unapproved draft of a proposed IEEE Standard. As such, this document is subject to
19change. USE AT YOUR OWN RISK! IEEE copyright statements SHALL NOT BE REMOVED from draft
20or approved IEEE standards, or modified in any way. Because this is an unapproved draft, this document
21must not be utilized for any conformance/compliance purposes. Permission is hereby granted for officers
22from each IEEE Standards Working Group or Committee to reproduce the draft document developed by
23that Working Group for purposes of international standardization consideration. IEEE Standards
24Department must be informed of the submission for consideration prior to any reproduction for
25international standardization consideration (stds.ipr@ieee.org). Prior to adoption of this document, in
26whole or in part, by another standards development organization, permission must first be obtained from
27-IEEE Standards Department (stds.ipr@ieee.org). When requesting permission, IEEE Standards
28Department will require a copy of the standard development organization's document highlighting the use
29of IEEE content. Other entities seeking permission to reproduce this document, in whole or in part, must
30also obtain permission from the IEEE Standards Department.
31IEEE Standards Department
32445 Hoes Lane
33Piscataway, NJ 08854, USA
2 iv
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
1Abstract: <Select this text and type or paste Abstract—contents of the Scope may be used>
5
16 v
17 Copyright © 2015 IEEE. All rights reserved.
18 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
28In publishing and making its standards available, IEEE is not suggesting or rendering professional or other
29services for, or on behalf of, any person or entity nor is IEEE undertaking to perform any duty owed by any
30other person or entity to another. Any person utilizing any IEEE Standards document, should rely upon his
31or her own independent judgment in the exercise of reasonable care in any given circumstances or, as
32appropriate, seek the advice of a competent professional in determining the appropriateness of a given
33IEEE standard.
34IN NO EVENT SHALL IEEE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
35EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO:
36PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
37OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
38WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
39OTHERWISE) ARISING IN ANY WAY OUT OF THE PUBLICATION, USE OF, OR RELIANCE UPON
40ANY STANDARD, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE AND
41REGARDLESS OF WHETHER SUCH DAMAGE WAS FORESEEABLE.
42Translations
43The IEEE consensus development process involves the review of documents in English only. In the event
44that an IEEE standard is translated, only the English version published by IEEE should be considered the
45approved IEEE standard.
2 vi
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
1Official statements
2A statement, written or oral, that is not processed in accordance with the IEEE-SA Standards Board
3Operations Manual shall not be considered or inferred to be the official position of IEEE or any of its
4committees and shall not be considered to be, or be relied upon as, a formal position of IEEE. At lectures,
5symposia, seminars, or educational courses, an individual presenting information on IEEE standards shall
6make it clear that his or her views should be considered the personal views of that individual rather than the
7formal position of IEEE.
8Comments on standards
9Comments for revision of IEEE Standards documents are welcome from any interested party, regardless of
10membership affiliation with IEEE. However, IEEE does not provide consulting information or advice
11pertaining to IEEE Standards documents. Suggestions for changes in documents should be in the form of a
12proposed change of text, together with appropriate supporting comments. Since IEEE standards represent a
13consensus of concerned interests, it is important that any responses to comments and questions also receive
14the concurrence of a balance of interests. For this reason, IEEE and the members of its societies and
15Standards Coordinating Committees are not able to provide an instant response to comments or questions
16except in those cases where the matter has previously been addressed. For the same reason, IEEE does not
17respond to interpretation requests. Any person who would like to participate in revisions to an IEEE
18standard is welcome to join the relevant IEEE working group.
29Copyrights
30IEEE draft and approved standards are copyrighted by IEEE under U.S. and international copyright laws.
31They are made available by IEEE and are adopted for a wide variety of both public and private uses. These
32include both use, by reference, in laws and regulations, and use in private self-regulation, standardization,
33and the promotion of engineering practices and methods. By making these documents available for use and
34adoption by public authorities and private users, IEEE does not waive any rights in copyright to the
35documents.
36Photocopies
37Subject to payment of the appropriate fee, IEEE will grant users a limited, non-exclusive license to
38photocopy portions of any individual standard for company or organizational internal use or individual,
39non-commercial use only. To arrange for payment of licensing fees, please contact Copyright Clearance
40Center, Customer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; +1 978 750 8400. Permission
41to photocopy portions of any individual standard for educational classroom use can also be obtained
42through the Copyright Clearance Center.
2 vii
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
6Every IEEE standard is subjected to review at least every ten years. When a document is more than ten
7years old and has not undergone a revision process, it is reasonable to conclude that its contents, although
8still of some value, do not wholly reflect the present state of the art. Users are cautioned to check to
9determine that they have the latest edition of any IEEE standard.
10In order to determine whether a given document is the current edition and whether it has been amended
11through the issuance of amendments, corrigenda, or errata, visit the IEEE-SA Website at
12http://ieeexplore.ieee.org/xpl/standards.jsp or contact IEEE at the address listed previously. For more
13information about the IEEE SA or IEEE’s standards development process, visit the IEEE-SA Website at
14http://standards.ieee.org.
15Errata
16Errata, if any, for all IEEE standards can be accessed on the IEEE-SA Website at the following URL:
17http://standards.ieee.org/findstds/errata/index.html. Users are encouraged to check this URL for errata
18periodically.
19Patents
20Attention is called to the possibility that implementation of this standard may require use of subject matter
21covered by patent rights. By publication of this standard, no position is taken by the IEEE with respect to
22the existence or validity of any patent rights in connection therewith. If a patent holder or patent applicant
23has filed a statement of assurance via an Accepted Letter of Assurance, then the statement is listed on the
24IEEE-SA Website at http://standards.ieee.org/about/sasb/patcom/patents.html. Letters of Assurance may
25indicate whether the Submitter is willing or unwilling to grant licenses under patent rights without
26compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of
27any unfair discrimination to applicants desiring to obtain such licenses.
28Essential Patent Claims may exist for which a Letter of Assurance has not been received. The IEEE is not
29responsible for identifying Essential Patent Claims for which a license may be required, for conducting
30inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or
31conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing
32agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that
33determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely
34their own responsibility. Further information may be obtained from the IEEE Standards Association.
2 viii
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
1Participants
2At the time this amendment was submitted to the IEEE-SA Standards Board for approval, the IEEE 802.15
3Working Group had the following membership:
25
26
27The following members of the individual balloting committee voted on this standard. Balloters may have
28voted for approval, disapproval, or abstention.
29
30(to be supplied by IEEE)
31
32 Balloter1 35 Balloter4 38 Balloter7
33 Balloter2 36 Balloter5 39 Balloter8
34 Balloter3 37 Balloter6 40 Balloter9
41
42
43When the IEEE-SA Standards Board approved this standard on <XX MONTH 20XX>, it had the following
44membership:
60 *Member Emeritus
61
62
63Also included are the following nonvoting IEEE-SA Standards Board liaisons:
2 ix
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
7Introduction
11
2 x
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 doc.: Proposal for IEEE802.15.3e - 0658 - MAC
1Contents
2<After draft body is complete, select this text and click Insert Special->Add (Table of) Contents>
2 xi
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
7IMPORTANT NOTICE: IEEE Standards documents are not intended to ensure safety, security, health, or
8environmental protection, or ensure against interference with or from other devices or networks.
9Implementers of IEEE Standards documents are responsible for determining and complying with all
10appropriate safety, security, environmental, health, and interference protection practices and all applicable
11laws and regulations.
12This IEEE document is made available for use subject to important notices and legal disclaimers.
13These notices and disclaimers appear in all publications containing this document and may
14be found under the heading “Important Notice” or “Important Notices and Disclaimers
15Concerning IEEE Documents.” They can also be obtained on request from IEEE or viewed at
16http://standards.ieee.org/IPR/disclaimers.html.
17
18NOTE—The editing instructions contained in this <amendment/corrigendum> define how to merge the material
19contained therein into the existing base standard and its amendments to form the comprehensive standard.
20The editing instructions are shown in bold italic. Four editing instructions are used: change, delete, insert, and replace.
21Change is used to make corrections in existing text or tables. The editing instruction specifies the location of the change
22and describes what is being changed by using strikethrough (to remove old material) and underscore (to add new material).
23Delete removes existing material. Insert adds new material without disturbing the existing material. Insertions may require
24renumbering. If so, renumbering instructions are given in the editing instruction. Replace is used to make changes in
25figures or equations by removing the existing figure or equation and replacing it with a new one. Editing instructions,
26change markings, and this NOTE will not be carried over into future editions because the changes will be incorporated into
27the base standard.
2
1
11. Overview
21.1 Scope
31.2 Purpose
93. Definitions
10Insert the following definition in alphabetical order:
113.24a P2P Access Period: Access period used for HRCP .Carrier sensing is not required during this period.
12
30A piconet PNPP is either a Piconet or a P2P structure forming a wireless ad hoc data communications system
31which allows a number of independent data devices (DEVs) to communicate with each other. A piconet is
32distinguished from other types of data networks in that communications are normally confined to a small area
33around person or object that typically covers at least 10 m in all directions and envelops the person or a thing
34whether stationary or in motion.
35This is in contrast to local area network (LAN), metropolitan area network (MAN), and wide area network
36(WAN), each of which covers a successively larger geographic area, such as a single building or a campus or
37that would interconnect facilities in different parts of a country or of the world.
38
2
1
13
14 Figure 1A – 802.15.3 P2P structure elements
15
165.2 Components of an 802.15.3 piconet
17
18Change the title of 5.2 as follows:
1A DEV that is capable of acting as the PPC starts the P2P structure by sending the beacon in the default
2channel. The default channel is defined in 12a.1.4. The PPC needs not make sure of the availability of the
3channel.
4NOTE—There is no dependent type in a P2P structure as in a piconet.
5
65.3.1.2 Handing over control of a piconet
7
8Insert the following sentence at the end of 5.3.1.2:
9
10This operation is not applicable for HRCP.
11
125.3.1.3 Creating a child piconet
13Insert the following sentence at the end of 5.3.1.3:
14
15This operation is not applicable for HRCP.
16
175.3.1.4 Creating a neighbor piconet
18Insert the following sentence at the end of 5.3.1.4:
19
20This operation is not applicable for HRCP.
21
225.3.2 Ending a piconet
23
24Change the title of 5.3.2 as follows:
1 All frames except Beacon and Association Request command are send by SIFS access or RIFS
2access.
3
54
6
7
85.3.6 Channel time management
9After 5.3.6, insert the following subclause as 5.3.6.1 and move all of 5.3.6 to 5.3.6.1:
2
1
95.3.14 Beamforming
24The MLME interface models a single piconetPNPP environment; while support for multiple P2P structures at
25HRCP DEVs is not allowed, support for multiple piconets at non-HRCP DEVs is implementation-dependent.
26The primitives are summarized in Table 3.
29These primitives support the process of determining the presence or absence of piconetPNPP, as described in
308.2.1. The parameters used for these primitives are defined in Table 3b.
2
1
BSID Octet string As defined in 7.4.2 The text string of a specific piconet for
which to scan. This parameter is not
used if ScanForBSID is FALSE.
ScanFor PNIDPPID Boolean TRUE, FALSE Indicates if the scan process should
search for a specific PNIDPPID, as
described in 8.2.1.
PNCPNPCAddress MAC Any valid individual MAC The MAC address of a specific
address address, as described in 7.1 PNCPNPC for which to scan. This
parameter is not used if
ScanForPNCPNPCAddress is FALSE.
2
1
1
2
3 Table 3b—MLME-SCAN primitive parameters (continued)
4
Name Type Valid range Description
ChannelRatingList Ordered list 0 to the maximum number of Specifies a list of the channels scanned
of integers. PHY-dependent channels, as ordered from the best to the worst in
defined in 11.2.3 terms of interference.
Timeout Integer 0–65535 The time in milliseconds allowed for the
primitive to complete.
BSID Octet string As defined in 7.4.2 The text string identifier of a dis-
covered piconet.
PNCPNPCAddress MAC address Any valid individual The MAC address of the PNC of
MAC address the piconet that was found.
2
1
2Any security features of an existing piconetPNPP are ignored during the scan process.
36.3.2.1 MLME-SCAN.request
5This primitive is used to initiate the passive scan procedures to search for either a specific piconetPNPP or any
6piconetPNPP. The semantics of this primitive are:
7 MLME-SCAN.request (
8 ScanForBSID,
9 BSIDLength,
10 BSID,
11 ScanForPNIDScanForPPID,
12 PNIDPPID,
13 ScanForPNCAddress,
14 PNCAddress,
15 Timeout
16 )
17
186.3.2.2 MLME-SCAN.confirm
20This primitive is used to report the result of the request to initiate the passive scan procedure to search for
21either a specific piconetPNPP or any piconetPNPP. The semantics of this primitive are:
22
23 MLME-SCAN.confirm (
24 NumberOfPiconetsPNPP,
25 PiconetPNPPDescriptionSet,
26 NumberOfChannels,
27 ChannelRatingList,
28 ResultCode,
29 ReasonCode
30 )
31
32The primitive parameters are defined in Table 3b. All of the piconetsPNPP found during the scan will be
33reported in separate elements of the PiconetPNPPDescriptionSet, even if more than one piconetPNPP is found
34on a given channel. For an HRCP DEV, only P2P Structures will be reported.
35
366.3.2.3 MLME-SCAN.indication
38This primitive is used to report the result of a passive scan that was initiated by the MAC. The semantics of
39this primitive are:
40
41 MLME-SCAN.indication (
42 NumberOfPiconetsPNPP,
43 PiconetDescriptionSet,
44 NumberOfChannels,
45 ChannelRatingList
46 )
47The primitive parameters are defined in Table 3b.
2
1
1Change the title of 6.3.4 and change the subsequent text as follows:
3These primitives support the process of stopping operations as a PNCPNPC. The process may result in the
4shutdown of piconetPNPP operations, as described in 8.2.7, or the handover of PNC operations to another
5DEV in the piconet, as described in 8.2.3 and 8.2.4. The parameters used for these primitives are de fined in
6Table 3f.
12For HRCP, since handover is not used, related parameters are also not used.
136.3.4.1 MLME-STOP.request
15This primitive initiates the piconetPNPP shutdown procedure or the piconet handover procedure. The
16semantics of this primitive are:
176.3.4.2 MLME-STOP.confirm
2
1
2This primitive reports the results of the request to stop operations as a PNCPNPC. The semantics of this
3primitive are:
4Change the title of 6.3.5 and change the subsequent text as follows:
6The following primitives support the process of a DEV associating with a PNCPNPC, as defined in 8.3.1. The
7parameters used for these primitives are defined in Table 3g.
8
9Change Table 3g as follows:
2
1
1
2 Table 3g—MLME-ASSOCIATE primitive parameters (continued)
3
Na Type Valid range Description
me
ResultCode Enumeration SUCCESS, FAILURE Indicates the result of the MLME
request.
ReasonCode Enumeration REQUEST_TIMEOUT, Indicates the reason for a
PNCPNPC ResultCode of FAILURE.
NOT_FOUND, For HRCP DEV,
PNCPNPC_DENIED, NEIGHBOR_REFUSED is not
PNCPNPC _BUSY, applicable.
ALREADY_ASSOCIATED,
NEIGHBOR_REFUSED,
4
2
1
1
26.3.5.1 MLME-ASSOCIATE.request
46.3.5.3 MLME-ASSOCIATE.indication
6This primitive is used to indicate that a new non-HRCP DEV has associated with the same piconet as this DEV
7or a new HRCP DEV has associated with this HRCP DEV.
8Change the title of 6.3.6 and change the subsequent text as follows:
10The following primitives are used when a DEV disassociates from a PNCPNPC and when the PNCPNPC
11diassociates a DEV from the piconetPNPP, as described in 8.3.4. For the P2P, disassociation by either the DEV
12or the PPC invokes termination of the P2P structure.
136.3.6.1 MLME-DISASSOCIATE.request
15This primitive initiates the procedure for a DEV to disassociate from a piconetDEV with which it has an
16association. The semantics of this primitive are:
17 MLME-DISASSOCIATE.request (
18 DEVID,
19 DEVAddress,
20 Timeout,
21 ReasonCode
22 )
23
246.3.6.3 MLME-DISASSOCIATE.indication
26This primitive is used to indicate that either this DEV or another DEV has been disassociated from the
27piconetPNPP. The semantics of this primitive are:
28 MLME-DISASSOCIATE.indication (
29 DEVID,
30 DEVAddress,
31 ResultCode,
32 ReasonCode
33 )
34
356.3.8 PNC handover
10This mechanism supports the process of establishment and maintenance of power management (PM) modes
11of a DEV, as described in 8.13, and is applicable for piconets only.
14These primitives support multicast operations and thus are not applicable for HRCP which have a P2P structure
15and do not use multicast.
196.3.18
25The figures in this subclause are a representation of the MAC header and MAC frame body. The HCS is not
26shown since this is calculated and verified by the PHY. The MAC frame shall be formatted as illustrated in
27Figure 6. The maximum size of the MAC frame body, pMaxFrameBodySize, is a PHY dependent parameter
28that includes the frame payload and FCS, but not the PHY preamble, PHY header, MAC header, MAC
29subheader, or MAC Header validation. The parameter pMaxFrameBodySize is defined in the following:
30— 11.2.8.1 for the 2.4 GHz PHY
31— 12.2.7.1 for the SC PHY mode
32— 12.3.6.3 for the HSI PHY mode
33— 12.4.1.3.1 for the AV PHY mode
34— xx.x.x.x.x for the HRCP-SC PHY mode
35— xx.x.x.x.x for the HRCP-OOK PHY mode
2 25
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2Change caption of Figure 6 and insert Figure 6a as follows:
17
18 Figure 8a—Secure MAC frame body format for HRCP
19
207.2.1 Frame control
24
25 Figure 9a—Frame control field format for HRCP
26
277.2.1.1 Protocol version
2 26
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
2 The Protocol Version field is invariant in size and placement across all revisions of the 802.15.3 standard.
3 For this revision of the standard the value of the protocol version is 0b000 for piconet and 0b001 for
4 HRCP. All other values are reserved. The revision level will be incremented only when a fundamental
5 incompatibility exists between a new revision and the prior revision of the standard. A DEV that receives a
6 frame with a revision which it does not support may discard the frame without indication to the sending
7 DEV.
8
97.2.1.2 Frame type
227.2.1.4 ACK policy, implied ACK (Imp-ACK) request and Blk-ACK for piconet
23
247.2.1.4a ACK policy for HRCP
25The ACK Policy field is used to indicate the type of acknowledgment procedure that the addressed recipient is
26required or allowed to perform. The use of the ACK procedures is described in 8.8. The allowed values of the
27ACK Policy field are defined in Table 40a. The ACK policy of a frame is determined by the combination of the
28ACK Policy field.
29
30Change the caption of Table 40 and insert new Table 40a as follows
29When the PHY receives a frame it validates the received frame’s MAC header before passing the MAC header
30and its associated MAC frame body to the MAC. The protection mechanism used to validate the MAC header
31is PHY dependent. In addition, the bit order and the length of the protection mechanism, pLengthHCS, are also
32PHY dependent. The MAC header protection mechanism is defined in the following;
33— 11.2.9 for the 2.4 GHz PHY
34— 12.2.3.2.2 for the SC PHY mode
35— 12.3.3.4 for the HSI PHY mode
36— 12.4.1.4 for the AV PHY mode
37— xx.x.x.x for HRCP-SC PHY mode
38— xx.x.x.x for HRCP-OOK PHY mode
39
40Change the title of 7.2.7 as follows:
45The MAC frame body for HRCP is described in 7.3.1.1a, 7,3,3.1a and 7.2.4.1a.
2 28
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
octet: 1 2 2
Frame security SFC SECID
3
4 Figure 10xx—Security Header
5
6The SECID field is used to identify the key set that is used to encrypt and/or authenticate the data in the
7frame, as defined in 7.2.7a.2. The SFC field contains a counter that is used to ensure the uniqueness of the
8nonce of a secure frame, as defined in 7.2.7.3.
9The Frame Security field contains a bitmap that indicate if a frame applies security or not. The bit
10position zero, which is the first bit from right in Figure 10xx, corresponds to the first frame. The bit shall be set
11to one if the subframe applies security and shall be set to zero otherwise.
12
137.2.7a.2 Secure session ID (SECID)
14The SECID field shall be included in the frame body of all secure frames. The SECID field contains a 2-
15octet identifier for the key that is being used to protect the frame. The lowest order octet of the SECID for all
16keys except the PNPP group data key shall be set to the DEVID of the key originator in the relationship. The
17SECID for the PNPP group data key shall have the lowest order octet set to the BcstID, as described in 7.2.3.
18The higher order octet shall designate a unique value for the key associated with the security relationship. The
19SECID for a given key is selected by the key originator in a security relationship, as described in 9.3.7.
20
217.2.7a.3 Secure frame body
22The Secure MAC frame body for HRCP is described in 7.3.1.2a, 7,3,3.2a and 7.2.4.2a.
23
24Insert 7.2.10 and 7.2.11 as follows:
octet: 4 Ln … L1 21 10
FCS Information Information P2P structure MAC header
element-n element-1 synchronization
parameters
Beacon frame body
7
8 Figure 11a—Non-secure beacon frame format for HRCP
9
10The individual information elements (IEs) in the beacon frame body are listed in Table 48. These IEs are
11encoded in type, length, value format and are defined in 7.4. The IEs in the beacon payload may appear in
12any order.
13The P2P structure Synchronization Parameters field shall be formatted as illustrated in Figure 12a.
14
octet: 8 1 1 1 2 2 1 5
PPC Expected P2P Next Recommended Superframe Number of Reserved
address RSSI structure DevID ATP duration association
mode slots
15
16 Figure 12a—P2P Structure Synchronization Parameters field format for HRCP
17
18Number of association slots field indicates the number of slots available for the DEVs to send Association
19Request commands.
20
21The Superframe Duration field contains the duration of the current superframe. The resolution of this field is 1
22s and therefore has a range of [0–65535] s. However, the valid range of this field lies between
23mMinSuperframeDuration and mMaxSuperframeDuration.
24
25The Recommended ATP field indicates ATP length value that is recommended by PPC. The resolution of this
26field is 1ms and therefore has a range of [0–65535] ms.
27
28The Next DevID field indicates the DevID for the subsequent DEV. The DEV that wishes to associate with the
29PPC shall set this value as its own DevID. The value of Next DevID field shall be selected randomly.
30
31The Expected RSSI field indicates the RSSI value of received signal at the antenna input of DEV. The DEV
32shall only send an Association Request command when the actual received RSSI level of the beacon exceeds
33this value. The resolution of this field is 1dB and therefore has a range of [+30 to -226] dB.
34
35The P2P Structure Mode field defines certain characteristics about the P2P structure and the superframe. The
36encoding of this octet shall be formatted as illustrated in Figure 13a.
37
bits: b7-b5 b4 b2-b0
Reserved SEC mode Reserved
38
39 Figure 13a—P2P Structure Mode field
40
41The SEC Mode field indicates the current security settings in the P2P structure as defined in 9.2. The field is
42encoded as illustrated in Table 41.
2 30
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2The PPC Address field contains the DEV address of the PPC, as described in 7.1.
3
4The MAC header settings for a non-secure beacon frame shall be set and interpreted as described in
5Table 42a.
6
7 Table 42a—MAC header settings for a non-secure beacon frame for HRCP
8
Header field Setting on transmission Interpretation on reception
Frame type Beacon value in Table 39 Decoded
SEC 0 Decoded
ACK policy No-ACK value in Table 40 May be ignored
DestID BcstID Decoded
SrcID PPCID Decoded
TX and ACK Information 0x000000 May be ignored
Rate Adaptation Information 0x00 May be ignored
9
10Change title of section 7.3.1.2 and insert section 7.2.1.2a as follows:
13The Secure Beacon frame shall be formatted as illustrated in Figure 15a. The Secure Beacon frame format is
14used when the piconet is operating in a secure mode.
15
octe: 4 Ln … L1 21 2 2 10
FCS Information Information P2P synchronization SEC SECID MAC header
element-n element-1 parameters
Beacon frame body
16
17 Figure 15a—Secure beacon frame format for HRCP
18
19The SECID field is defined in 7.2.7a.2
20
21The SFC field is used by the DEV for this frame to ensure uniqueness of the nonce, as defined in 7.2.7.3.
22
23The P2P Synchronization Parameters field is defined in 7.3.1.1a.
24
25The Integrity Code is defined in 7.2.7.5.
26
27The MAC header settings for a Secure Beacon frame shall be set and interpreted as described in Table 43a.
28
29 Table 43a—MAC header settings for a secure beacon frame for HRCP
30
Header field Setting on transmission Interpretation on reception
Frame type Beacon value in Table 39 Decoded
SEC 1 Decoded
ACK policy No-ACK value in Table 40 May be ignored
DestID BcstID Decoded
SrcID PPCID Decoded
TX and ACK Information 0x000000 May be ignored
Rate Adaptation Information 0x00 May be ignored
31
32
33
34Change title of section 7.3.3 and insert section 7.3.3a as follows:
2 31
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
2 32
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
11Figure 22a and 22b illustrate the Non-secure data frame format and HRCP Aggregated frame format.
12
octets: Ln 10
HRCP Aggregated MAC header
Frame
Data frame body
13
14 Figure 22a—Non-secure data frame format
15
octets: variable 4 … variable 4
MAC MAC … MAC MAC
Subframe Subheader Subframe Subheader
body n n body 1 1
HRCP Aggregated Frame
16
17 Figure 22b—HRCP Aggregated frame format for HRCP
18
19The MAC Subframe body and MAC subheader for aggregation are defined in 7.2.4.1.1 and 7.2.13.2.
20
217.3.4a.1.1 HRCP Aggregated frame format for HRCP
22
23To use non-secure aggregation, the Aggregation field in PHY header shall be set as described in x.x.x.x.x.
24The MAC subheader for non-secure aggregation shall be formatted as illustrated in Figure 10ap
25
octet: 1 3
subheader HCS Subframe
Information
26
27 Figure 22c—MAC subheader format for non-secure aggregation
28
29RX buffer size indicates preferred buffer size to be prepared in RX side.
30
31HCS is an 8 bit CRC defined as the One’s-complement of the remainder of the division of the 16 bits of the
32header by the polynomial x8 + x2 + x + 1. A serial implementation is illustrated in
33
2 33
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2
3 Figure 22d—HCS implementation example for subheader HCS
4
5The subheader HCS is an exception to data ordering convention in 7.1 and is transmitted with the msb first.
6
7The Subframe Information field shall be formatted as illustrated in Figure 10ar.
8
bits: 1 10 13
fragmentMore
numberSequence
lengthPayload
9
10 Figure 22e—Subframe Information field format
11
12The Payload Length field is used to determine the length of the payload before coding, not including the FCS.
13This field contains the length of the payload in octets. A value of zero in the Payload length field is reserved,
14
15The Sequence Number field indicates the Sequence number of this subframe.
16
17The More Fragment bit shall be set to zero if the subframe contains the MPDU which is the last fragment of
18the MSDU and shall be set to one otherwise.
19
20The maximum number of subframes that are aggregated in one frame shall be mMaxSubframeSize, as
21defined in 8.15.
22
23The MAC subframe body for non-secure aggregation shall be formatted as illustrated in Figure 10e.
24
octets: 4 Ln
FCS MPDU n
MAC subframe body n
25
26 Figure 10e—Subframe body for non-secure aggregation
27
28The MPDU field is a variable length field that carries the information that is to be transferred to a DEV.
29
307.3.4a.2 Secure aggregation format for HRCP
31Figure 23a and 23b illustrate the secure data frame format and HRCP Aggregated secure frame format.
32
octet: Ln 5 10
HRCP Aggregated secure Security Header MAC header
Frame
Secure Data frame body
33
34 Figure 23a—Secure data frame format
2 34
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
octets: 4 8 Ln 4 4 8 Ln 4
FCS Integrity Sequence MAC FCS Integrity Sequence MAC
Code number n subheader
… Code number 1 subheader
Secure MAC subframe body n n Secure MAC subframe body 1 1
22
23For the HRCP PHYs, the DEV Capabilities field shall be formatted as illustrated in Figure 42a.
24
25(TBD)
26
27
2 35
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2
3Insert 7.3.37 as follows:
b00000 reserved
b00001 1(SISO)
b00010 2
… …
b10000 16
b10001-b11111 reserved
1
27.4.37.2 Number of Association Request from DEV
3The Number of Association Request from DEV field indicates the required number of Association Request
4commands from DEV for MIMO negotiation training.
5
6 Table xx— Valid MIMO information field value
7
Number of Resend of Association Request Number of Association
from DEV value Request
b000000000 1
b000000001 2
… …
b000001000 16
b000001001-b111111111 Reserved
8
97.5 MAC command types
10
11Change the subclause as follows
12The MAC command types are listed in Table 50 and Table 50a and are described in the following subclauses.
13If the column labeled “Associated” in Table 50 and Table50a is marked with an “X” then that command shall
14only be sent by a DEV that is associated in PNPPthe piconet. If the column labeled “Secure membership (if
15required)” in Table 50 and Table 50a is marked with an “X” and secure membership is required for PNPPthe
16piconet, then that command shall only be sent by a DEV that has established secure membership with the
17PNPCPNC in PNPPthe piconet.
18
19For the case of a piconet, because a neighbor PNC is not a member of the piconet, it sends only non-secure
20commands. The PNC or destination DEV shall ignore any command from a DEV that is not allowed to be sent
21as indicated in Table 50. The PNC or destination DEV shall transmit an Imm-ACK following reception of the
22frame if the ACK Policy field is set to Imm-ACK.
23
24For peer-to-peer communications, if the DEV has established a secure relationship with a peer DEV, and the
25“Secure membership (if required)” column is marked with an “X”, that command shall be sent to the peer DEV
26with a secure command using the key specified in Table 62.
27
28Change title of Table 50 and insert Table 50a as follows:
2 37
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1For the successful association of a neighbor PNC, the DEVID shall be one of the reserved NbrIDs, as
2described in 7.2.3.
3
4The ATP field contains the finalized value for the Association Timeout Period in milliseconds. This value
5may be different from that requested by the DEV in its Association Request command if the PPC is not able to
6support the value requested.
7
8The valid values of the Reason Code are:
9— 0 –> Success
10— 1 –> Reserved Already serving maximum number of DEVs
11— 2 –> Lack of available channel time to serve the DEV
12— 3 –> Channel too severe to serve the DEV
13— 4 –> PNC turning off with no PNC capable DEV in the piconet
14— 5 –> Neighbor piconet not allowed
15— 6 –> Channel change in progress
16— 7 –> PNC handover in progress
17— 4–7 –> reserved
18— 8 –> Association denied
19— 9–255 –> reserved
20The Vendor Specific IE is defined in 7.4.17 and is an optional field.
21
227.5.1a.3 Disassociation request
23
24 The Disassociation Request command shall be formatted as illustrated in Figure 52.
25
octets: 1 2 2
2 39
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
27.5.4.1a PNPC information request
3The DestID for the PNPC Information Request command shall be the PNPCID. The PNPC Information
4Request command shall be formatted as illustrated in Figure 60a.
5
octets: 1 2 2
System wake ATP Overall capabilities DEV info DEVID DEV address
beacon interval utility
1The Probe Request command is used either to request information about a DEV or to see if a DEV is still
2present in PNPCthe piconet. This command may be exchanged between any two DEVs in the piconet
3according to the rules outlined in Table 51 and Table 52. The individual IEs used in this frame are described in
47.4. The Probe Request command shall be formatted as illustrated in Figure 67.
5
octets: 2 4 2 2
Request index Reserved Length (=6) Command type
6 Figure 67a—Probe request command format
7
8
97.5.7.5a Transmit power change (TBD)
10The Transmit Power Change command shall be formatted as illustrated in Figure 82 in 7.5.7.5. This command
11is used to request a change in the transmit power of a PPC and DEV.
12
13The TX Power Change field contains the requested TX power level change in dB at the destination PPC and
14DEV in 2s complement format. For example, a +2 db change in the TX power level is 0x02 while a –2 dB TX
15power level change is encoded as 0xFE.
16
178. MAC functional description
18
198.3 Association and disassociation with a piconet
20Insert the following sentence at the beginning of 8.3:
23 8.3a.1 Association
24 To start a P2P structure, a HRCP DEV that is capable of acting as the PPC send a beacon with Next DEVID
25 (1 octet) which will be assigned to a HRCP DEV as DEVID. The NEXT DEVID is generated randomly, but after
26 sending a new beacon, the PPC shall not change the value in this P2P structure.
27
28 Before a H R C P DEV has completed the association process, all frames sent to the PPC by the
29 H R C P DEV shall be exchanged in the PPAP of the superframe. An unassociated HRCP DEV initiates
30 the association process by sending an Association Request command, as described in 7.xxx, to the PPC.
31 An unassociated HRCP DEV can send an Association Request with random backoff time (n slot times
32 random number, after receiving every beacon and starts Association timeout timer. Carrier sense for sending an
33 Association Request is not required. Association Request commands shall be sent with s No-ACK policy. When
34 the PPC receives one of the Association Request commands, whose DEVID is the same value as the Next
35 DEVID in the beacon, it shall stop sending the beacon, send an Association Response command and start
36 Association timeout timer. If a HRCP DEV received the Association Response command with the DEV
37 address matching its own, the HRCP DEV becomes an associated HRCP DEV and sends the Stk-ACK to
38 the Association Response command to the PNC. The PPC may maintain a list of DEV addresses that are
39 allowed to join the P2P structure. If the list is in use, when the PPC receives the Association Request
40 command, the PPC shall consult the list to determine if the DEV address in the request is included. If the
41 DEV address is not in the list, the PPC may send a disassociation command.
42
43 The associated HRCP DEV shall start keep-alive timer once it has sent an Stk-ACK and the PPC shall start
44 a keep-alive timer once it has received an Stk-ACK.
45
46
2 41
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2
3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19 Figure a102 illustrates the message flow for a successful association process
20
21
22
23 Figure a102—MSC of DEV-2 associating
2 42
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
2 43
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
2
38.3a.2 Disassociation
4 When a PPC wants to remove a HRCP DEV from the P2P structure, the PPC shall send a Disassociation
5 Request command, as described in 7.xxx, to that HRCP DEV with an appropriate reason code. Similarly
6 when a HRCP DEV wants to leave the P2P structure, the HRCP DEV shall send a Disassociation Request
7 command to the PPC with an appropriate reason code.
8
9 If Stk-ACK policy is selected at the PPC, Disassociation Request commands, when received correctly,
10 shall be acknowledged by the intended recipient.
11
12 The HRCP DEV in the P2P structure shall send frames to the PPC often enough to assure that the
13 association timeout period is not reached. If the PPC does not receive any frame originating from an
14 associated HRCP DEV within this timeout duration, the PPC shall disassociate the HRCP DEV. The HRCP
15 DEV may send a Probe Request command instead of Stk-ACK without requesting any information to
16 cause the PPC to reset the ATP if the HRCP DEV does not have any other traffic that it needs to send to
17 the PPC.
18
19 The PPC shall send a Disassociation Request command to the HRCP DEV that sends a frame after its
20 ATP has expired.
21
22 The PPC upon receiving a Disassociate Request command or an ATP expiration may send a new beacon with
23 new NEXT DEVID which will be assigned to the next HRCP DEV as DEVID.
24
27There are four IFSs that are defined; the minimum interframe space (MIFS), the short interframe space (SIFS),
28the backoff interframe space (BIFS) and the retransmission interframe space (RIFS). MIFS and BIFS are not
29used in HRCP. The actual values of the MIFS, SIFS, BIFS, and RIFS are PHY dependent. For the 2.4 GHz
30PHY, they are listed in 11.2.7.1. For the SC PHY, they are listed in 12.2.6. For the HSI PHY, they are listed in
3112.3.5.5. For the AV PHY, they are listed in 12.4.1.2. For HRCP-SC PHY, they are listed in 12a.2.x.x. For
32HRCP-OOK PHY, they are listed in 12a.3.x.y.
34The SIFS is the shortest interframe space when Rx-Tx turnaround time is required. All Imm-ACK frames,
35frames sent as a response frame for Imp-ACK, and Dly-ACK frames shall start transmission over the medium
36a SIFS after the end of the transmission of the previous frame which requested the ACK. The IFS between all
37received Imm-ACK frames and Dly-ACK frames and the next frame transmitted over the medium shall be no
38less than a SIFS. The MIFS is the shortest interrframe space which can be taken when Rx-Tx turnaround time
39is not required. The IFS in a CTA between a frame and the next frame transmitted over the medium by the
40same DEV if the first frame had the ACK Policy field set to either no-ACK or Dly-ACK shall be no less than a
41MIFS.
42During the CTAP, all DEVs shall use an IFS no less than a RIFS for retransmissions. During the CAP a CP,
43however, the retransmissions shall follow the CAP rules described in 8.4.2. The rules for acknowledgment and
44retransmissions are described in 8.8. The interframe space requirement for the beacon is ensured by the
45location of the CTAs, which is determined by the PNC, as described in 8.4.3.6.
46
47During the synchronous phase in PPAP, all DEVs shall use SIFS and alternately exchange transmission rights.
48During the asynchronous phase in PPAP, all DEVs shall use RIFS. The RIFS value of the PPC is always
2 44
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1shorter than the one for the associated DEV. The RIFS values used within the HRCP shall be longer than a
2SIFS plus the time to acquire the Stk-ACK information in the MAC header. The rules for acknowledgment and
3retransmissions are described in 8.8.
10Stk-ACK is used for data frame acknowledgement in PPAP and is indicated in the MAC header and may be
11piggybacked with the data payload. The PPAP has two phases, synchronous phase and asynchronous phase.
12The DEVs that comprise the P2P structure determine individually which phase they are in internally. The
13synchronous phase is either after completion of link setup or when the Ping-Pong transmission between the
14PPC and the DEV continues, i.e., when frame exchange continues using SIFS. Otherwise, it will be the
15asynchronous phase. After receiving a frame that has either a MAC header error or has not received a frame
16after SIFS from the end of its transmission, the asynchronous phase starts. When the DEV receives a frame
17with correct MAC header within the RIFS, the DEV determines that it entered the synchronous phase. The
18recovery procedure during the asynchronous phase is described in 8.8.3c.
19During the synchronous phase, when the DEV of either side receives the frame and the MAC header has no
20error, after the end of the PPDU following the SIFS containing the frame, the DEV transmits the frame to the
21other DEV. This continues in an alternate fashion. When the PPC or the associated DEV has no data frame to
22transmit, only the MAC header is transmitted. After completion of link setup, the DEV which has scheduled
23data transmission may access the medium by SIFS.
24During the asynchronous phase, each of the DEVs within the P2P structure accesses the medium with RIFS
25and shall transmit the frame with only the MAC header. The Stk-ACK information shall always be set in the
26MAC header of the transmitted frames. The PPC and the associated DEV use different RIFS values.
27
288.6 Synchronization
2 45
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1A subheader is created and configured, as defined in 7.3.4a, for each subframe to contain the necessary
2information that helps the target DEV to retrieve the original data. The ACK Policy field in MAC header shall
3be set to Stk-ACK as described in 7.2.1.4a.
54
MSDU#3 MSDU#2 MSDU#1
Fragmentation Fragmentation
More fragment=0
FCS
HCS
MAC
MPDU#1
Subheader#1
More fragment flag is set to 1
to indicate the corresponding
subframe is not a final frame Subframe#1
More fragment=1
of fragmentation.
FCS
HCS
MAC
MPDU#2
Subheader#2
Subframe#2
More fragment=0
FCS
HCS
MAC
MPDU#3
Subheader#3 MPDU# and MPDU length are
shown in Sub Header
Subframe#3
More fragment=1
FCS
HCS
2 46
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
1
MSDU#3 MSDU#2 MSDU#1
Defragmentation Defragmentation
More fragment=0
FCS
HCS
MAC
MPDU#1
Subheader#1
More fragment flag is set to 1
to indicate the corresponding
subframe is not a final frame Subframe#1
More fragment=1
of fragmentation.
FCS
HCS
MAC
MPDU#2
Subheader#2
Subframe#2
More fragment=0
FCS
HCS
MAC
MPDU#3
Subheader#3 MPDU# and MPDU length are
shown in Sub Header
Subframe#3
More fragment=1
FCS
HCS
HCS
Subframe# Subframe# Subframe# Subframe# Subframe#
MAC Header PHY Header
n 4 3 2 1
m+n m+4 m+3 m+2 m+1 Sequence Number
1
28.8.3c Stack ACK
27
28
298.8.3c.2 Recovery Process (Asynchronous Phase)
30
31If the destination detects a MAC header error, namely the destination lost the ACK frame, DEVs in the P2P
32structure shall enter the asynchronous phase. When PHY-RX-END.indication reports that there is error at the
33destination, then the DEV may also enter the asynchronous phase. When the device enters asynchronous phase,
34the device shall start recovery process. Figure XX illustrates the recovery process. As described in 8.4.4, each
35of the DEVs within the P2P structure accesses the medium with RIFS and shall transmit the frame with no data
36payload. The Stk-ACK information shall be always set in the MAC header of the transmitted frames. The PPC
37and the associated DEV use different RIFS values. RIFS shall be longer than the time domain frame length
38with no data payload. When the DEV receives a frame with the correct MAC header within RIFS, the DEV
39determines that it entered the synchronous phase.
40
2 48
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1
2 49
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 IEEE P<designation>/D<draft_number>, <draft_month> <draft_year>
2
3
4
58.15 MAC sublayer parameters
6
7 After Table 61, insert Table 61a as follows:
8
9 Table 61a—MAC sublayer parameters - HRCP PHY dependent
10
Parameter Values
pAccessSlot SC TBD
OOK TBD
11
12
2 1
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.
1 IEEE P<designation>/D<draft_number>, <draft_month> <draft_year>
1Annex A
2(informative)
3Bibliography
4Bibliographical references are resources that provide additional or helpful material but do not need to be
5understood or used to implement this standard. Reference to these resources is made for informational use
6only.
2 2
3 Copyright © 2015 IEEE. All rights reserved.
4 This is an unapproved IEEE Standards Draft, subject to change.