{"id":356086,"date":"2024-10-20T01:10:52","date_gmt":"2024-10-20T01:10:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-14543-3-102012\/"},"modified":"2024-10-26T01:31:39","modified_gmt":"2024-10-26T01:31:39","slug":"bs-iso-iec-14543-3-102012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-14543-3-102012\/","title":{"rendered":"BS ISO\/IEC 14543-3-10:2012"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
6<\/td>\nFOREWORD <\/td>\n<\/tr>\n
8<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Terms, definitions and abbreviations
3.1 Terms and definitions <\/td>\n<\/tr>\n
14<\/td>\n3.2 Abbreviations
4 Conformance
5 Architecture
5.1 Generic protocol description
5.1.1 Overview <\/td>\n<\/tr>\n
15<\/td>\n5.1.2 Physical layer
5.1.3 Data link layer
5.1.4 Network layer
Tables
Table 1 \u2013 WSP protocol stack structure (OSI) <\/td>\n<\/tr>\n
16<\/td>\n5.1.5 Transport layer
5.1.6 Session layer
5.1.7 Presentation layer
5.1.8 Application layer
5.2 Data unit description
Figures
Figure 1 \u2013 Structure of a subtelegram <\/td>\n<\/tr>\n
17<\/td>\n6 Layer 1 \u2013 Physical layer
6.1 Overview
6.2 General description <\/td>\n<\/tr>\n
18<\/td>\nFigure 2 \u2013 Illustration of an ASK envelope and various physical parameters <\/td>\n<\/tr>\n
20<\/td>\n6.3 Requirements for the 315 MHz WSP protocol
Table 2 \u2013 Transmitter requirements for the 315 MHz WSP protocol <\/td>\n<\/tr>\n
21<\/td>\nTable 3 \u2013 Receiver requirements for the 315 MHz WSP protocol
Table 4 \u2013 Minimum required link budget for the 315 MHz WSP protocol
Table 5 \u2013 Maximum RX power for the 315 MHz WSP protocol <\/td>\n<\/tr>\n
22<\/td>\n6.4 Requirements for the 868,3 MHz WSP protocol
Table 6 \u2013 Transmitter requirements for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n
23<\/td>\nTable 7 \u2013 Receiver requirements for the 868,3 MHz WSP protocol
Table 8 \u2013 Minimum required link budget for the 868,3 MHz WSP protocol
Table 9 \u2013 Maximum RX power for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n
24<\/td>\n6.5 Frame Structure
Figure 3 \u2013 Complete frame structure for the 868,3 MHz WSP protocol
Figure 4 \u2013 Encoded subframe <\/td>\n<\/tr>\n
25<\/td>\n7 Layer 2 \u2013 Data link layer
7.1 Overview
7.2 Subtelegram timing
Table 10 \u2013 Frame definition for the 315 MHz WSP protocol
Table 11 \u2013 Frame definition for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n
26<\/td>\nFigure 5 \u2013 TX maturity time divided into four 10 ms time ranges
Table 12 \u2013 Maturity time parameters
Table 13 \u2013 Allocation of time slots to the different subtelegrams <\/td>\n<\/tr>\n
27<\/td>\n7.3 Data integrity
7.3.1 General
7.3.2 4 bit summation hash function algorithm
7.3.3 8 bit summation hash function algorithm
Table 14 \u2013 Identification of the hash function used in the telegram <\/td>\n<\/tr>\n
28<\/td>\n7.3.4 8 bit Cyclic Redundancy Check (CRC) hash function algorithm
7.4 Listen before talk
8 Layer 3 \u2013 Network layer
8.1 Overview <\/td>\n<\/tr>\n
29<\/td>\n8.2 Switch telegram
Table 15 \u2013 Conversion of the telegram type and STATUS fieldsfrom a switch telegram to a telegram <\/td>\n<\/tr>\n
30<\/td>\n8.3 Repeater
8.3.1 General
8.3.2 Time response for collision avoidance
8.3.3 Bits of a repeater level in the STATUS byte
Figure 6 \u2013 Conversion of a switch telegram to a normal telegram <\/td>\n<\/tr>\n
31<\/td>\n8.4 Addressing
8.4.1 General
8.4.2 Encapsulation
Table 16 \u2013 STATUS byte with repeater level bits
Table 17 \u2013 Repeating bits in STATUS byte <\/td>\n<\/tr>\n
32<\/td>\nFigure 7 \u2013 Example of an encapsulation <\/td>\n<\/tr>\n
33<\/td>\nAnnex A (informative) Examples of how to evaluate the hash values
Figure A.1 \u2013 Example of a C code program of the 4 bit long summation hash value
Figure A.2 \u2013 Example of a C code program of the 8 bit long summation hash value <\/td>\n<\/tr>\n
34<\/td>\nFigure A.3 \u2013 Efficient C code program for the evaluationof an 8 bit long CRC type hash value <\/td>\n<\/tr>\n
35<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Home electronic system (HES) architecture – Wireless short-packet (WSP) protocol optimised for energy harvesting. Architecture and lower layer protocols<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2019<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":356092,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-356086","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/356086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/356092"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=356086"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=356086"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=356086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}