Table of Contents

 1     Scope            
 2     References   
 3     Definitions   
 4     Abbreviations and acronyms  
 5     Introduction
 6     General description    
        6.1     Overview of the system  
 7     Physical layer specification for the CENELEC-A bandplan             
        7.1     Fundamental system parameters 
        7.2     Frame structure
        7.3     Preamble           
        7.4     Frame control header      
        7.5     Scrambler          
        7.6     FEC coding       
        7.7     Interleaver         
        7.8     DBPSK/DQPSK/D8PSK mapping               
        7.9     Frequency domain pre-emphasis 
       7.10     OFDM generation (IFFT and CP addition)
       7.11     Windowing       
       7.12     Adaptive tone mapping and transmit power control               
       7.13     Crossing MV/LV transformer      
       7.14     MV coupler (informative)             
       7.15     AC phase detection        
 8     Transmitter electrical specifications       
        8.1     Output level measurement             
        8.2     Transmit spectrum mask               
        8.3     Spurious transmission     
        8.4     System clock frequency tolerance               
        8.5     Transmit constellation accuracy  
        8.6     Transmitter spectral flatness         
 9     PHY primitives           
        9.1     Data primitive  
        9.2     Management primitives 
10     Physical layer specification for FCC bandplans 
       10.1     System fundamental parameters for bandplan FCC-1          
11     Data link layer specifications 
       11.1     Introduction    
       11.2     Conventions    
       11.3     MAC sublayer specification         
       11.4     Adaptation sublayer specification              
       11.5     Functional description   
12     Security       
       12.1     Access control and authentication              
       12.2     Confidentiality and integrity        
       12.3     Anti-replay and DoS prevention  
       12.4     Authentication and key distribution protocol – Selections from IETF RFC 3748             
       12.5     EAP method    
Annex A – Protocol implementation conformance statement    
        A.1     Overview           
        A.2     PICS proforma tables    
Annex B – Routing Cost    
Annex C – Channel access    
        C.1     Overview           
        C.2     Inter-frame (IFS) spacing              
        C.3     CSMA-CA        
        C.4     Priority               
        C.5     ARQ   
        C.6     Segmentation and reassembly overview    
Annex D – Modified MAC sublayer data primitives    
        D.1     MCPS-DATA.request     
        D.2     MCPS-DATA.indication
Annex E – MAC acknowledgement    
Annex F – Adaptation sublayer service primitives    
        F.1     ADP data service             
        F.2     ADP management service              
        F.3     Behaviour to MAC indications     
Annex G – Device Starting Sequence of messages    
Annex H – 6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD)    
        H.1     Introduction     
        H.2     Requirements notation  
        H.3     Overview          
        H.4     Terminology    
        H.5     Data Structures               
        H.6     Operation         
        H.7     Configuration Parameters             
      Page
        H.8     IANA Consideration      
        H.9     Security Considerations 
       H.10     Acknowledgments         
       H.11     References      
Annex J – Commissioning in 6LoWPAN    
        J.1                   Introduction        
        J.2                   Terminology        
        J.3                   Bootstrapping     
        J.4                   IANA Consideration          
        J.5                   Security Considerations    
        J.6                   Contributors        
        J.7                   Acknowledgments              
        J.8                   References           
Annex K – Regional requirements for Japan    
Appendix I Examples on encoding and decoding    
        I.1                   Example for data encoding              
        I.2          Example for data decoding