没有合适的资源?快使用搜索试试~ 我知道了~
首页IEEE 802.15.7标准:短距离无线光学通信
IEEE 802.15.7标准:短距离无线光学通信
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 55 浏览量
更新于2024-07-08
收藏 2.82MB PDF 举报
"IEEE局域网和城域网标准,特别是IEEE 802.15.7标准,关注的是短距离无线光通信技术,利用可见光进行数据传输。该标准由IEEE计算机学会的局域网/城域网标准委员会制定,主要针对短距离、高数据速率的光学无线通信应用。"
IEEE 802.15.7是针对短距离无线光通信(Visible Light Communication, VLC)的一个标准,它定义了物理层(PHY)和媒体访问控制层(MAC)的规范。此标准的制定是为了在具有光学透明性的环境中,如室内照明系统,实现高效、安全的数据传输。VLC是一种利用可见光谱进行无线通信的技术,通常涉及到LED(发光二极管)作为光源和接收器。
物理层(PHY)部分涵盖了光发射机和接收机的设计,包括光调制技术、光信号的频率范围、功率级别以及光谱效率。例如,802.15.7可能定义了如何使用模拟或数字调制方法(如OOK,On-Off Keying,或更复杂的QAM,Quadrature Amplitude Modulation)来编码和解码数据,同时确保在光谱中有效地分配带宽。
媒体访问控制层(MAC)规定了多个设备如何共享光通信信道,避免冲突,并确保可靠的数据传输。这可能包括CSMA/CA(载波侦听多路访问/冲突避免)协议,类似于在传统无线局域网(如Wi-Fi)中使用的机制。此外,MAC层可能还涉及流量控制、错误检测和纠正,以及安全特性,如加密和身份验证。
VLC技术有多种潜在的应用,包括但不限于:
1. **室内无线通信**:利用现有的LED照明基础设施提供无线网络接入,如Wi-Fi替代方案。
2. **物联网(IoT)连接**:连接低功耗设备,如传感器和智能设备。
3. **安全通信**:由于光信号不能穿透墙壁,VLC可以提供比传统无线电频段更高的隐私和安全性。
4. **移动支付和身份验证**:通过LED灯的闪烁编码实现快速、安全的信息交换。
5. **汽车通信**:汽车前照灯可以用于车对车(V2V)或车对基础设施(V2I)的通信,增强交通安全。
802.15.7标准的制定考虑了这些应用的特定需求,包括通信距离、数据速率、环境影响(如光照变化)以及与其他无线技术的共存问题。随着LED照明技术的普及和对高速、安全、低功耗通信需求的增长,IEEE 802.15.7标准在无线光通信领域扮演着越来越重要的角色。
xiv Copyright © 2011 IEEE. All rights reserved.
5.3.1.1 MHR fields ......................................................................................................... 88
5.3.2 Association response command.......................................................................................... 89
5.3.2.1 MHR fields ......................................................................................................... 89
5.3.2.2 Short Address field ............................................................................................. 89
5.3.2.3 Association Status field ...................................................................................... 89
5.3.2.4 Capability negotiation response field ................................................................. 90
5.3.3 Disassociation notification command................................................................................. 90
5.3.3.1 MHR fields ......................................................................................................... 91
5.3.3.2 Disassociation Reason field................................................................................ 91
5.3.4 Data request command .......................................................................................................91
5.3.5 VPAN ID conflict notification command........................................................................... 93
5.3.6 Beacon request command ................................................................................................... 93
5.3.7 Coordinator realignment command .................................................................................... 94
5.3.7.1 MHR fields ......................................................................................................... 94
5.3.7.2 VPAN Identifier field ......................................................................................... 94
5.3.7.3 Coordinator Short Address field......................................................................... 94
5.3.7.4 Logical Channel field ......................................................................................... 95
5.3.7.5 Short Address field ............................................................................................. 95
5.3.8 GTS request command ....................................................................................................... 95
5.3.8.1 MHR fields ......................................................................................................... 95
5.3.8.2 GTS Characteristics field.................................................................................... 95
5.3.9 Blinking notification command .......................................................................................... 96
5.3.9.1 Blinking frequency ............................................................................................. 96
5.3.10 Dimming notification command......................................................................................... 96
5.3.11 Fast link recovery command............................................................................................... 97
5.3.12 Mobility notification command .......................................................................................... 98
5.3.13 GTS response command..................................................................................................... 98
5.3.13.1 MHR fields ......................................................................................................... 98
5.3.13.2 GTS Characteristics field.................................................................................... 98
5.3.14 Clock rate change notification command ........................................................................... 99
5.3.15 Multiple channel assignment command ............................................................................. 99
5.3.16 Color stabilization timer notification command ................................................................. 99
5.3.17 Color stabilization information command ........................................................................ 100
5.3.18 CVD disable command..................................................................................................... 100
5.3.19 Information element command......................................................................................... 101
5.3.19.1 Capabilities IE .................................................................................................. 101
5.3.19.1.1 Capability information field ......................................................... 102
5.3.19.1.2 Aggregation and guard channel.................................................... 105
5.3.19.2 Wavelength quality indication (WQI) IE ......................................................... 106
6. MAC sublayer service specification ...................................................................................................... 107
6.1 Overview ...................................................................................................................................... 107
6.2 MAC data service ......................................................................................................................... 107
6.2.1 MCPS-DATA.request....................................................................................................... 108
6.2.1.1 Appropriate usage............................................................................................. 110
6.2.1.2 Effect on receipt................................................................................................ 110
6.2.2 MCPS-DATA.confirm ..................................................................................................... 111
6.2.2.1 When generated ................................................................................................ 112
6.2.2.2 Appropriate usage............................................................................................. 112
6.2.3 MCPS-DATA.indication .................................................................................................. 112
6.2.3.1 When generated ................................................................................................ 115
6.2.3.2 Appropriate usage............................................................................................. 115
6.2.4 MCPS-PURGE.request..................................................................................................... 115
Authorized licensed use limited to: Nanjing Southeast University. Downloaded on June 30,2012 at 05:53:45 UTC from IEEE Xplore. Restrictions apply.
Copyright © 2011 IEEE. All rights reserved. xv
6.2.4.1 Appropriate usage............................................................................................. 115
6.2.4.2 Effect on receipt................................................................................................ 115
6.2.5 MCPS-PURGE.confirm ................................................................................................... 115
6.2.5.1 When generated ................................................................................................ 116
6.2.5.2 Appropriate usage............................................................................................. 116
6.2.6 Data service message sequence chart ............................................................................... 116
6.3 MAC management service ........................................................................................................... 116
6.3.1 Association primitives ...................................................................................................... 116
6.3.1.1 MLME-ASSOCIATE.request .......................................................................... 118
6.3.1.1.1 Appropriate usage......................................................................... 119
6.3.1.1.2 Effect on receipt............................................................................ 119
6.3.1.2 MLME-ASSOCIATE.indication...................................................................... 120
6.3.1.2.1 When generated ............................................................................ 120
6.3.1.2.2 Appropriate usage......................................................................... 121
6.3.1.3 MLME-ASSOCIATE.response........................................................................ 121
6.3.1.3.1 Appropriate usage......................................................................... 122
6.3.1.3.2 Effect on receipt............................................................................ 122
6.3.1.4 MLME-ASSOCIATE.confirm ......................................................................... 123
6.3.1.4.1 When generated ............................................................................ 125
6.3.1.4.2 Appropriate usage......................................................................... 125
6.3.1.5 Association-message sequence charts .............................................................. 125
6.3.2 Disassociation primitives..................................................................................................126
6.3.2.1 MLME-DISASSOCIATE.request.................................................................... 126
6.3.2.1.1 Appropriate usage......................................................................... 127
6.3.2.1.2 Effect on receipt............................................................................ 127
6.3.2.2 MLME-DISASSOCIATE.indication ............................................................... 129
6.3.2.2.1 When generated ............................................................................ 130
6.3.2.2.2 Appropriate usage......................................................................... 130
6.3.2.3 MLME-DISASSOCIATE.confirm................................................................... 130
6.3.2.3.1 When generated ............................................................................ 131
6.3.2.3.2 Appropriate usage......................................................................... 131
6.3.2.4 Disassociation-message sequence charts.......................................................... 131
6.3.3 Beacon notification primitive ........................................................................................... 131
6.3.3.1 MLME-BEACON-NOTIFY.indication ........................................................... 131
6.3.3.1.1 When generated ............................................................................ 132
6.3.3.1.2 Appropriate usage......................................................................... 134
6.3.4 Primitives for reading PIB attributes ................................................................................ 134
6.3.4.1 MLME-GET.request......................................................................................... 134
6.3.4.1.1 Appropriate usage......................................................................... 135
6.3.4.1.2 Effect on receipt............................................................................ 135
6.3.4.2 MLME-GET.confirm ....................................................................................... 135
6.3.4.2.1 When generated ............................................................................ 136
6.3.4.2.2 Appropriate usage......................................................................... 136
6.3.5 GTS management primitives ............................................................................................ 136
6.3.5.1 MLME-GTS.request......................................................................................... 136
6.3.5.1.1 Appropriate usage......................................................................... 137
6.3.5.1.2 Effect on receipt............................................................................ 137
6.3.5.2 MLME-GTS.indication .................................................................................... 138
6.3.5.2.1 When generated ............................................................................ 140
6.3.5.2.2 Appropriate usage......................................................................... 140
6.3.5.3 MLME-GTS.confirm........................................................................................ 140
6.3.5.3.1 When generated ............................................................................ 141
6.3.5.3.2 Appropriate usage......................................................................... 141
6.3.5.4 GTS management message sequence charts .................................................... 141
Authorized licensed use limited to: Nanjing Southeast University. Downloaded on June 30,2012 at 05:53:45 UTC from IEEE Xplore. Restrictions apply.
xvi Copyright © 2011 IEEE. All rights reserved.
6.3.6 Primitives for resetting the MAC sublayer....................................................................... 142
6.3.6.1 MLME-RESET.request .................................................................................... 143
6.3.6.1.1 Appropriate usage......................................................................... 143
6.3.6.1.2 Effect on receipt............................................................................ 143
6.3.6.2 MLME-RESET.confirm ................................................................................... 143
6.3.6.2.1 When generated ............................................................................ 144
6.3.6.2.2 Appropriate usage......................................................................... 144
6.3.7 Primitives for specifying the receiver enable time ........................................................... 144
6.3.7.1 MLME-RX-ENABLE.request.......................................................................... 144
6.3.7.1.1 Appropriate usage......................................................................... 144
6.3.7.1.2 Effect on receipt............................................................................ 145
6.3.7.2 MLME-RX-ENABLE.confirm......................................................................... 146
6.3.7.2.1 When generated ............................................................................ 146
6.3.7.2.2 Appropriate usage......................................................................... 146
6.3.7.3 Message sequence chart for changing the state of the receiver........................ 147
6.3.8 Primitives for channel scanning ....................................................................................... 147
6.3.8.1 MLME-SCAN.request...................................................................................... 148
6.3.8.1.1 Appropriate usage......................................................................... 149
6.3.8.1.2 Effect on receipt............................................................................ 149
6.3.8.2 MLME-SCAN.confirm..................................................................................... 150
6.3.8.2.1 When generated ............................................................................ 151
6.3.8.2.2 Appropriate usage......................................................................... 151
6.3.8.3 Channel scan message sequence charts ............................................................ 151
6.3.9 Communication status primitive....................................................................................... 151
6.3.9.1 MLME-COMM-STATUS.indication............................................................... 151
6.3.9.1.1 When generated ............................................................................ 154
6.3.9.1.2 Appropriate usage......................................................................... 154
6.3.10 Primitives for writing PIB attributes ................................................................................ 154
6.3.10.1 MLME-SET.request ......................................................................................... 154
6.3.10.1.1 Semantics of the primitive............................................................ 154
6.3.10.1.2 Appropriate usage......................................................................... 155
6.3.10.1.3 Effect on receipt............................................................................ 155
6.3.10.2 MLME-SET.confirm ........................................................................................ 156
6.3.10.2.1 When generated ............................................................................ 156
6.3.10.2.2 Appropriate usage......................................................................... 156
6.3.11 Primitives for updating the superframe configuration...................................................... 157
6.3.11.1 MLME-START.request.................................................................................... 157
6.3.11.1.1 Appropriate usage......................................................................... 159
6.3.11.1.2 Effect on receipt............................................................................ 159
6.3.11.2 MLME-START.confirm................................................................................... 160
6.3.11.2.1 When generated ............................................................................ 161
6.3.11.2.2 Appropriate usage......................................................................... 161
6.3.11.3 Message sequence chart for updating the superframe configuration................ 161
6.3.12 Primitive for synchronizing with a coordinator................................................................ 161
6.3.12.1 MLME-SYNC.request...................................................................................... 161
6.3.12.1.1 Appropriate usage......................................................................... 162
6.3.12.1.2 Effect on receipt............................................................................ 163
6.3.13 Primitive for synchronization loss with a coordinator...................................................... 163
6.3.13.1 MLME-SYNC-LOSS.indication ...................................................................... 163
6.3.13.2 Message sequence chart for synchronizing with a coordinator ........................ 165
6.3.13.2.1 When generated ............................................................................ 165
6.3.13.2.2 Appropriate usage......................................................................... 166
6.3.14 Primitives for requesting data from a coordinator............................................................ 167
6.3.14.1 MLME-POLL.request ...................................................................................... 167
Authorized licensed use limited to: Nanjing Southeast University. Downloaded on June 30,2012 at 05:53:45 UTC from IEEE Xplore. Restrictions apply.
Copyright © 2011 IEEE. All rights reserved. xvii
6.3.14.1.1 Appropriate usage......................................................................... 168
6.3.14.1.2 Effect on receipt............................................................................ 168
6.3.14.2 MLME-POLL.confirm ..................................................................................... 168
6.3.14.2.1 When generated ............................................................................ 169
6.3.14.2.2 Appropriate usage......................................................................... 169
6.3.14.3 Message sequence chart for requesting data from a coordinator...................... 169
6.4 MAC constants and PIB attributes ............................................................................................... 169
6.4.1 MAC constants ................................................................................................................. 169
6.4.2 MAC PIB attributes .......................................................................................................... 171
6.5 Optical-clock-rate selection.......................................................................................................... 180
6.5.1 Optical-clock-rate selection for P2P topology.................................................................. 180
6.5.1.1 Explicit notification .......................................................................................... 181
6.5.1.2 Without explicit notification............................................................................. 182
6.5.2 Optical-clock-rate selection for star topology .................................................................. 182
6.5.2.1 Explicit notification .......................................................................................... 182
6.5.2.2 Without explicit notification............................................................................. 183
6.5.3 Clock-rate selection for multicast topology...................................................................... 184
6.5.3.1 Explicit notification .......................................................................................... 184
6.5.3.2 Without explicit notification............................................................................. 186
6.6 Message sequence charts illustrating MAC-PHY interaction ...................................................... 186
7. Security suite specifications................................................................................................................... 193
7.1 Overview ...................................................................................................................................... 193
7.2 Functional description .................................................................................................................. 194
7.2.1 Outgoing frame security procedure .................................................................................. 194
7.2.2 Outgoing frame key retrieval procedure........................................................................... 195
7.2.3 Incoming frame security procedure .................................................................................. 196
7.2.4 Incoming frame security material retrieval procedure...................................................... 197
7.2.5 Key descriptor lookup procedure...................................................................................... 199
7.2.6 Blacklist checking procedure............................................................................................ 199
7.2.7 Device descriptor lookup procedure................................................................................. 199
7.2.8 Incoming security level checking procedure .................................................................... 200
7.2.9 Incoming key usage policy checking procedure............................................................... 200
7.3 Security operations ....................................................................................................................... 201
7.3.1 Integer and octet representation........................................................................................ 201
7.3.2 CCM* nonce..................................................................................................................... 201
7.3.3 CCM* prerequisites .......................................................................................................... 201
7.3.4 CCM* transformation data representation ....................................................................... 201
7.3.4.1 Key and nonce data inputs................................................................................ 202
7.3.4.2 a data and m data .............................................................................................. 202
7.3.4.3 c data output...................................................................................................... 202
7.3.5 CCM* inverse transformation data representation ........................................................... 203
7.3.5.1 Key and nonce data inputs................................................................................ 203
7.3.5.2 c data and a data................................................................................................ 203
7.3.5.3 m data output .................................................................................................... 203
7.4 Auxiliary Security header............................................................................................................. 203
7.4.1 Integer and octet representation........................................................................................ 204
7.4.2 Security Control field ....................................................................................................... 204
7.4.2.1 Security Level subfield..................................................................................... 205
7.4.2.2 Key Identifier Mode subfield ........................................................................... 205
7.4.3 Frame Counter field.......................................................................................................... 206
7.4.4 Key Identifier field ........................................................................................................... 206
7.4.4.1 Key Source subfield.......................................................................................... 207
Authorized licensed use limited to: Nanjing Southeast University. Downloaded on June 30,2012 at 05:53:45 UTC from IEEE Xplore. Restrictions apply.
xviii Copyright © 2011 IEEE. All rights reserved.
7.4.4.2 Key Index subfield............................................................................................ 207
7.5 Security-related MAC PIB attributes ........................................................................................... 207
7.5.1 PIB security material ........................................................................................................ 207
7.5.2 Key table........................................................................................................................... 210
7.5.3 Device table ...................................................................................................................... 211
7.5.4 Minimum security level table ........................................................................................... 211
7.5.5 Frame counter ................................................................................................................... 211
7.5.6 Automatic request attributes............................................................................................. 211
7.5.7 Default key source ............................................................................................................ 211
7.5.8 Coordinator address.......................................................................................................... 212
8. PHY layer specification ......................................................................................................................... 212
8.1 Overview ...................................................................................................................................... 212
8.2 Operating modes........................................................................................................................... 212
8.3 General requirements.................................................................................................................... 214
8.3.1 Wavelength band plan ...................................................................................................... 214
8.3.2 Optical mapping ............................................................................................................... 214
8.3.3 Maximum error tolerance for multiple optical sources .................................................... 215
8.3.4 Minimum LIFS, SIFS, and RIFS periods ......................................................................... 216
8.3.5 TX-to-RX turnaround time ............................................................................................... 216
8.3.6 RX-to-TX turnaround time ............................................................................................... 216
8.3.7 Transmit data clock frequency tolerance.......................................................................... 216
8.3.8 Wavelength quality indicator (WQI) ................................................................................ 216
8.3.8.1 OOK and VPPM WQI support......................................................................... 216
8.3.8.2 CSK wavelength quality indication support ..................................................... 217
8.3.9 Clear channel assessment (CCA) ..................................................................................... 217
8.4 Data modes ................................................................................................................................... 217
8.5 Dimming and flicker mitigation ................................................................................................... 218
8.5.1 Dimming during idle time ................................................................................................ 218
8.5.1.1 Idle pattern and compensation time dimming .................................................. 218
8.5.1.2 Visibility pattern dimming................................................................................ 219
8.5.2 Dimming during data transmission time .......................................................................... 220
8.5.2.1 CSK-mode dimming......................................................................................... 220
8.5.2.2 OOK-mode dimming........................................................................................ 220
8.5.2.3 VPPM-mode dimming...................................................................................... 221
8.5.3 Flicker mitigation ............................................................................................................. 222
8.5.4 CSK color stabilization at the transmitter......................................................................... 222
8.6 PPDU format ................................................................................................................................ 224
8.6.1 Preamble field................................................................................................................... 224
8.6.2 PHY header....................................................................................................................... 225
8.6.2.1 Burst mode........................................................................................................ 226
8.6.2.2 Channel number................................................................................................ 226
8.6.2.3 MCS ID............................................................................................................. 226
8.6.2.4 Length of PSDU field ....................................................................................... 226
8.6.2.5 Dimmed OOK extension .................................................................................. 228
8.6.3 Header check sequence (HCS) ......................................................................................... 228
8.6.4 Optional fields .................................................................................................................. 228
8.6.4.1 Tail bits ............................................................................................................. 228
8.6.4.2 Compensation length ........................................................................................ 228
8.6.4.3 Resync length ................................................................................................... 228
8.6.4.4 Subframe length and generation ....................................................................... 229
8.6.4.5 Optional field check sequence generation ........................................................ 229
8.6.4.6 Channel estimation sequence............................................................................ 229
Authorized licensed use limited to: Nanjing Southeast University. Downloaded on June 30,2012 at 05:53:45 UTC from IEEE Xplore. Restrictions apply.
剩余308页未读,继续阅读
2023-12-11 上传
2022-07-04 上传
2024-10-31 上传
2024-10-31 上传
2024-10-31 上传
2023-10-26 上传
2023-07-07 上传
2024-10-30 上传
BigYijianfeihong
- 粉丝: 2
- 资源: 6287
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 黑板风格计算机毕业答辩PPT模板下载
- CodeSandbox实现ListView快速创建指南
- Node.js脚本实现WXR文件到Postgres数据库帖子导入
- 清新简约创意三角毕业论文答辩PPT模板
- DISCORD-JS-CRUD:提升 Discord 机器人开发体验
- Node.js v4.3.2版本Linux ARM64平台运行时环境发布
- SQLight:C++11编写的轻量级MySQL客户端
- 计算机专业毕业论文答辩PPT模板
- Wireshark网络抓包工具的使用与数据包解析
- Wild Match Map: JavaScript中实现通配符映射与事件绑定
- 毕业答辩利器:蝶恋花毕业设计PPT模板
- Node.js深度解析:高性能Web服务器与实时应用构建
- 掌握深度图技术:游戏开发中的绚丽应用案例
- Dart语言的HTTP扩展包功能详解
- MoonMaker: 投资组合加固神器,助力$GME投资者登月
- 计算机毕业设计答辩PPT模板下载
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功