{"id":356086,"date":"2024-10-20T01:10:52","date_gmt":"2024-10-20T01:10:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-14543-3-102012\/"},"modified":"2024-10-26T01:31:39","modified_gmt":"2024-10-26T01:31:39","slug":"bs-iso-iec-14543-3-102012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-14543-3-102012\/","title":{"rendered":"BS ISO\/IEC 14543-3-10:2012"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms, definitions and abbreviations 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.2 Abbreviations 4 Conformance 5 Architecture 5.1 Generic protocol description 5.1.1 Overview <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.1.2 Physical layer 5.1.3 Data link layer 5.1.4 Network layer Tables Table 1 \u2013 WSP protocol stack structure (OSI) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.1.5 Transport layer 5.1.6 Session layer 5.1.7 Presentation layer 5.1.8 Application layer 5.2 Data unit description Figures Figure 1 \u2013 Structure of a subtelegram <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6 Layer 1 \u2013 Physical layer 6.1 Overview 6.2 General description <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Figure 2 \u2013 Illustration of an ASK envelope and various physical parameters <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.3 Requirements for the 315 MHz WSP protocol Table 2 \u2013 Transmitter requirements for the 315 MHz WSP protocol <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table 3 \u2013 Receiver requirements for the 315 MHz WSP protocol Table 4 \u2013 Minimum required link budget for the 315 MHz WSP protocol Table 5 \u2013 Maximum RX power for the 315 MHz WSP protocol <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.4 Requirements for the 868,3 MHz WSP protocol Table 6 \u2013 Transmitter requirements for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Table 7 \u2013 Receiver requirements for the 868,3 MHz WSP protocol Table 8 \u2013 Minimum required link budget for the 868,3 MHz WSP protocol Table 9 \u2013 Maximum RX power for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.5 Frame Structure Figure 3 \u2013 Complete frame structure for the 868,3 MHz WSP protocol Figure 4 \u2013 Encoded subframe <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7 Layer 2 \u2013 Data link layer 7.1 Overview 7.2 Subtelegram timing Table 10 \u2013 Frame definition for the 315 MHz WSP protocol Table 11 \u2013 Frame definition for the 868,3 MHz WSP protocol <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Figure 5 \u2013 TX maturity time divided into four 10 ms time ranges Table 12 \u2013 Maturity time parameters Table 13 \u2013 Allocation of time slots to the different subtelegrams <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3 Data integrity 7.3.1 General 7.3.2 4 bit summation hash function algorithm 7.3.3 8 bit summation hash function algorithm Table 14 \u2013 Identification of the hash function used in the telegram <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.3.4 8 bit Cyclic Redundancy Check (CRC) hash function algorithm 7.4 Listen before talk 8 Layer 3 \u2013 Network layer 8.1 Overview <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.2 Switch telegram Table 15 \u2013 Conversion of the telegram type and STATUS fieldsfrom a switch telegram to a telegram <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.3 Repeater 8.3.1 General 8.3.2 Time response for collision avoidance 8.3.3 Bits of a repeater level in the STATUS byte Figure 6 \u2013 Conversion of a switch telegram to a normal telegram <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.4 Addressing 8.4.1 General 8.4.2 Encapsulation Table 16 \u2013 STATUS byte with repeater level bits Table 17 \u2013 Repeating bits in STATUS byte <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Figure 7 \u2013 Example of an encapsulation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex A (informative) Examples of how to evaluate the hash values Figure A.1 \u2013 Example of a C code program of the 4 bit long summation hash value Figure A.2 \u2013 Example of a C code program of the 8 bit long summation hash value <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Figure A.3 \u2013 Efficient C code program for the evaluationof an 8 bit long CRC type hash value <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Home electronic system (HES) architecture – Wireless short-packet (WSP) protocol optimised for energy harvesting. Architecture and lower layer protocols<\/b><\/p>\n |