Table of Contents

 1     Scope          
 2     References
 3     Conventions and definitions              
        3.1     Conventions 
        3.2     Terms defined elsewhere       
        3.3     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Introduction to OFDM and the power line channel  
 6     General description              
        6.1     Overall infrastructure
        6.2     Coexistence with other PLC networks
 7     Physical layer specification 
        7.1     Introduction 
        7.2     System parameters   
        7.3     Data rate, Reed-Solomon block size and maximum PSDU length            
        7.4     Frame structure          
        7.5     Preamble       
        7.6     Frame control header
        7.7     Payload of PHY frame
        7.8     Scrambler      
        7.9     FEC coding     
       7.10     Interleaver  
       7.11     Mapping for DBPSK/DQPSK/D8PSK   
       7.12     Frequency domain pre-emphasis       
       7.13     OFDM generation (IFFT and CP addition)        
       7.14     Windowing  
       7.15     Tone masking and tone mapping        
       7.16     Coherent modulation scheme             
       7.17     PHY primitives            
 8     Transmitter specifications  
        8.1     Output level measurement    
        8.2     Transmit spectrum mask         
        8.3     Transmitter attenuation          
        8.4     Spurious transmission              
        8.5     System clock frequency tolerance       
        8.6     Transmitter spectral flatness 
        8.7     Crossing MV/LV transformer 
        8.8     MV coupler (informative)       
        8.9     AC phase detection   
 9     Data link layer specifications             
        9.1     Introduction 
        9.2     Conventions 
        9.3     MAC sublayer specification    
        9.4     IPv6 adaptation sublayer specifications             
        9.5     Functional description              
10     Security    
       10.1     Access control and authentication     
       10.2     Confidentiality and integrity 
       10.3     Anti-replay and DoS prevention          
       10.4     Authentication and key distribution protocol – Selections from [IETF RFC 3748]             
       10.5     EAP method
Annex A – Protocol implementation conformance statement    
        A.1     Overview      
        A.2     PICS proforma tables
Annex B – Routing cost    
        B.1     Composite metric method     
Annex C – Device starting sequence of messages    
Annex D – The lightweight on-demand Ad hoc distance-vector  routing protocol – next generation (LOADng)    
        D.1     Introduction
        D.2     Terminology and notation      
        D.3     Applicability statement           
        D.4     Protocol overview and functioning     
        D.5     Protocol parameters
        D.6     Protocol message content     
        D.7     Information base       
        D.8     LOADng router sequence numbers    
        D.9     Route maintenance  
       D.10     Unidirectional link handling  
       D.11     Common rules for RREQ and RREP messages
       D.12     Route requests (RREQs)        
       D.13     Route replies (RREPs)             
       D.14     Route errors (RERRs)
       D.15     Route reply acknowledgments (RREP_ACKs)
       D.16     Metrics         
       D.17     Security considerations          
Annex E – Commissioning in 6LoWPAN    
        E.1     Introduction 
        E.2     Terminology 
        E.3     Bootstrapping              
        E.4     IANA consideration   
        E.5     Security considerations            
Annex F Regional requirements for Japan    
        F.1     Overview       
        F.2     Physical layer specifications for ARIB bandplan              
        F.3     Data link layer specifications  
Annex G Regional requirements for the USA    
Appendix I – Examples on encoding and decoding    
        I.1     Example for data encoding      
        I.2     Example for data decoding      
Appendix II – Test vectors for cryptographic building blocks    
       II.1     Introduction