没有合适的资源?快使用搜索试试~ 我知道了~
首页"2020 IEEE 802.11标准.pdf: 无线局域网MAC和PHY规范"
"2020 IEEE 802.11标准.pdf: 无线局域网MAC和PHY规范"
5星 · 超过95%的资源 需积分: 50 174 下载量 146 浏览量
更新于2023-12-23
5
收藏 48.31MB PDF 举报
"802.11-2020.pdf is the documentation of the 2020 802.11 protocol, which falls under the IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks—Specific Requirements Part 11. This standard specifies the requirements for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Developed by the LAN/MAN Standards Committee of the IEEE Computer Society, this is a revision of the previous standard IEEE Std 802.11-2016. This standard is authorized for licensed use, limited to the University of Science."
In summary, the 802.11-2020.pdf is a comprehensive document that outlines the specifications and requirements for the 2020 802.11 protocol, a wireless LAN standard. It is developed and maintained by the IEEE, specifically the LAN/MAN Standards Committee of the IEEE Computer Society. This standard is essential for organizations, researchers, and developers working in the field of wireless networking and telecommunications.
15
Copyright © 2021 IEEE. All rights reserved.
4.3.24.4 Mirrored stream classification service (MSCS).................................. 250
4.3.24.5 Overlapping BSS (OBSS) management ............................................. 250
4.3.24.6 Interworking with IEEE 802.1Q Stream Reservation Protocol (SRP) 250
4.3.24.7 Intra-access category prioritization..................................................... 250
4.3.25 Operation under geolocation database (GDB) control .......................................... 251
4.3.26 CDMG STA........................................................................................................... 252
4.3.27 CMMG STA .......................................................................................................... 253
4.3.28 General link (GLK)................................................................................................ 254
4.3.28.1 General ................................................................................................ 254
4.3.28.2 Selective reception of group addressed frames................................... 254
4.3.28.3 GLK Service Sets................................................................................ 255
4.3.29 Ethertype protocol discrimination (EPD) .............................................................. 259
4.4 Logical service interfaces ...................................................................................................... 260
4.4.1 General................................................................................................................... 260
4.4.2 SS ........................................................................................................................... 260
4.4.3 PBSS control point service (PCPS) ....................................................................... 261
4.4.4 DSS ........................................................................................................................ 261
4.5 Overview of the services........................................................................................................ 262
4.5.1 General................................................................................................................... 262
4.5.2 Distribution of MSDUs within a DS...................................................................... 263
4.5.2.1 Distribution ......................................................................................... 263
4.5.2.2 Integration ........................................................................................... 264
4.5.2.3 QoS traffic scheduling ........................................................................ 264
4.5.3 Connectivity-related services................................................................................. 264
4.5.3.1 General ................................................................................................ 264
4.5.3.2 Mobility types ..................................................................................... 265
4.5.3.3 Association.......................................................................................... 265
4.5.3.4 Reassociation ...................................................................................... 266
4.5.3.5 Disassociation ..................................................................................... 266
4.5.4 Access control and data confidentiality services ................................................... 267
4.5.4.1 General ................................................................................................ 267
4.5.4.2 Authentication..................................................................................... 267
4.5.4.3 Deauthentication ................................................................................. 268
4.5.4.4 Data confidentiality............................................................................. 269
4.5.4.5 Key management................................................................................. 270
4.5.4.6 Data origin authenticity....................................................................... 270
4.5.4.7 Replay detection.................................................................................. 270
4.5.4.8 Fast BSS transition.............................................................................. 270
4.5.4.9 Management frame protection ............................................................ 270
4.5.4.10 MAC privacy enhancements............................................................... 271
4.5.5 Spectrum management services............................................................................. 271
4.5.5.1 General ................................................................................................ 271
4.5.5.2 TPC ..................................................................................................... 271
4.5.5.3 DFS ..................................................................................................... 271
4.5.6 Traffic differentiation and QoS support................................................................. 272
4.5.6.1 General ................................................................................................ 272
4.5.6.2 Quality-of-service management frame support................................... 272
4.5.7 Support for higher layer timer synchronization ..................................................... 272
4.5.8 Radio measurement service ................................................................................... 273
4.5.9 Interworking with external networks ..................................................................... 273
4.5.9.1 General ................................................................................................ 273
4.5.9.2 Preassociation discovery (PAD) ......................................................... 274
4.5.10 Generic advertisement service (GAS) ................................................................... 275
4.6 Multiple logical address spaces ............................................................................................. 276
Authorized licensed use limited to: University of Science & Technology of China. Downloaded on April 29,2021 at 07:00:27 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2021 IEEE. All rights reserved.
4.7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 276
4.8 Differences between ESS and MBSS LANs ......................................................................... 278
4.9 Reference model .................................................................................................................... 279
4.9.1 General................................................................................................................... 279
4.9.2 Interworking reference model................................................................................ 279
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 281
4.9.4 Reference model for multi-band operation ............................................................ 282
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 284
4.10.1 General................................................................................................................... 284
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 284
4.10.3 Infrastructure functional model overview.............................................................. 284
4.10.3.1 General ................................................................................................ 284
4.10.3.2 AKM operations with AS ................................................................... 284
4.10.3.3 AKM operations with a password or PSK.......................................... 287
4.10.3.4 Alternate operations with PSK............................................................ 288
4.10.3.5 Disassociation ..................................................................................... 288
4.10.3.6 AKM operations using FILS authentication ....................................... 288
4.10.4 IBSS functional model description ........................................................................ 289
4.10.4.1 General ................................................................................................ 289
4.10.4.2 Key usage............................................................................................ 289
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 290
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 291
4.10.5 PBSS functional model description ....................................................................... 292
4.10.6 Authenticator-to-AS protocol ................................................................................ 293
4.10.7 PMKSA caching .................................................................................................... 293
4.10.8 Protection of group addressed robust Management frames................................... 294
5. MAC service definition ................................................................................................................... 295
5.1 Overview of MAC services ................................................................................................... 295
5.1.1 Data service............................................................................................................ 295
5.1.1.1 General ................................................................................................ 295
5.1.1.2 Determination of UP ........................................................................... 295
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 295
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 296
5.1.2 Security services .................................................................................................... 297
5.1.3 MSDU ordering ..................................................................................................... 297
5.1.4 MSDU format ........................................................................................................ 298
5.1.5 MAC data service architecture .............................................................................. 299
5.1.5.1 General ................................................................................................ 299
5.1.5.2 Non-GLK non-AP STA role ............................................................... 302
5.1.5.3 Non-GLK AP role............................................................................... 302
5.1.5.4 Non-GLK mesh STA role ................................................................... 303
5.1.5.5 Mesh gate role..................................................................................... 303
5.1.5.6 S1G relay............................................................................................. 303
5.1.5.7 GLK STA role..................................................................................... 305
5.1.5.8 GLK AP role ....................................................................................... 305
5.1.5.9 GLK mesh STA role ........................................................................... 305
5.2 MAC data service specification............................................................................................. 307
5.2.1 General................................................................................................................... 307
5.2.2 GLK MAC data service specification.................................................................... 307
5.2.3 MA-UNITDATA.request ...................................................................................... 307
5.2.3.1 Function .............................................................................................. 307
Authorized licensed use limited to: University of Science & Technology of China. Downloaded on April 29,2021 at 07:00:27 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2021 IEEE. All rights reserved.
5.2.3.2 Semantics of the service primitive ...................................................... 307
5.2.3.3 When generated................................................................................... 308
5.2.3.4 Effect of receipt................................................................................... 308
5.2.4 MA-UNITDATA.indication .................................................................................. 310
5.2.4.1 Function .............................................................................................. 310
5.2.4.2 Semantics of the service primitive ...................................................... 310
5.2.4.3 When generated................................................................................... 311
5.2.4.4 Effect of receipt................................................................................... 311
5.2.5 MA-UNITDATA-STATUS.indication.................................................................. 313
5.2.5.1 Function .............................................................................................. 313
5.2.5.2 Semantics of the service primitive ...................................................... 313
5.2.5.3 When generated................................................................................... 314
5.2.5.4 Effect of receipt................................................................................... 314
6. Layer management........................................................................................................................... 315
6.1 Overview of management model........................................................................................... 315
6.2 Generic management primitives ............................................................................................ 316
6.3 MLME SAP interface ............................................................................................................ 316
6.3.1 Introduction............................................................................................................ 316
6.3.2 Power management................................................................................................ 317
6.3.2.1 Introduction......................................................................................... 317
6.3.2.2 MLME-POWERMGT.request............................................................ 317
6.3.2.3 MLME-POWERMGT.confirm........................................................... 318
6.3.3 Scan........................................................................................................................ 318
6.3.3.1 Introduction......................................................................................... 318
6.3.3.2 MLME-SCAN.request ........................................................................ 318
6.3.3.3 MLME-SCAN.confirm ....................................................................... 322
6.3.3.4 MLME-SCAN-STOP.request ............................................................. 337
6.3.4 Synchronization ..................................................................................................... 337
6.3.4.1 Introduction......................................................................................... 337
6.3.4.2 MLME-JOIN.request .......................................................................... 337
6.3.4.3 MLME-JOIN.confirm ......................................................................... 340
6.3.5 Authenticate ........................................................................................................... 341
6.3.5.1 Introduction......................................................................................... 341
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 341
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 342
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 344
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 345
6.3.6 Deauthenticate ....................................................................................................... 347
6.3.6.1 Introduction......................................................................................... 347
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 347
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 347
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 348
6.3.7 Associate................................................................................................................ 348
6.3.7.1 Introduction......................................................................................... 348
6.3.7.2 MLME-ASSOCIATE.request............................................................. 349
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 352
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 358
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 363
6.3.8 Reassociate............................................................................................................. 367
6.3.8.1 Introduction......................................................................................... 367
6.3.8.2 MLME-REASSOCIATE.request........................................................ 367
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 371
Authorized licensed use limited to: University of Science & Technology of China. Downloaded on April 29,2021 at 07:00:27 UTC from IEEE Xplore. Restrictions apply.
18
Copyright © 2021 IEEE. All rights reserved.
6.3.8.4 MLME-REASSOCIATE.indication ................................................... 377
6.3.8.5 MLME-REASSOCIATE.response ..................................................... 383
6.3.9 Disassociate ........................................................................................................... 388
6.3.9.1 MLME-DISASSOCIATE.request ...................................................... 388
6.3.9.2 MLME-DISASSOCIATE.confirm ..................................................... 388
6.3.9.3 MLME-DISASSOCIATE.indication.................................................. 389
6.3.10 Reset....................................................................................................................... 389
6.3.10.1 Introduction......................................................................................... 389
6.3.10.2 MLME-RESET.request....................................................................... 389
6.3.11 Start........................................................................................................................ 390
6.3.11.1 Introduction......................................................................................... 390
6.3.11.2 MLME-START.request ...................................................................... 390
6.3.11.3 MLME-START.confirm ..................................................................... 396
6.3.12 Stop ........................................................................................................................ 397
6.3.12.1 General ................................................................................................ 397
6.3.12.2 MLME-STOP.request ......................................................................... 397
6.3.13 Protocol layer model for spectrum management and radio measurement............. 398
6.3.14 Measurement request ............................................................................................. 401
6.3.14.1 Introduction......................................................................................... 401
6.3.14.2 MLME-MREQUEST.request ............................................................. 401
6.3.14.3 MLME-MREQUEST.indication......................................................... 402
6.3.15 Channel measurement............................................................................................ 403
6.3.15.1 Introduction......................................................................................... 403
6.3.15.2 MLME-MEASURE.request................................................................ 403
6.3.15.3 MLME-MEASURE.confirm............................................................... 403
6.3.16 Measurement report ............................................................................................... 404
6.3.16.1 Introduction......................................................................................... 404
6.3.16.2 MLME-MREPORT.request................................................................ 404
6.3.16.3 MLME-MREPORT.indication ........................................................... 405
6.3.17 Channel switch....................................................................................................... 406
6.3.17.1 MLME-CHANNELSWITCH.request ................................................ 406
6.3.17.2 MLME-CHANNELSWITCH.confirm ............................................... 407
6.3.17.3 MLME-CHANNELSWITCH.indication............................................ 408
6.3.17.4 MLME-CHANNELSWITCH.response.............................................. 409
6.3.18 TPC request............................................................................................................ 410
6.3.18.1 Introduction......................................................................................... 410
6.3.18.2 MLME-TPCADAPT.request .............................................................. 410
6.3.18.3 MLME-TPCADAPT.confirm ............................................................. 411
6.3.19 SetKeys .................................................................................................................. 412
6.3.19.1 MLME-SETKEYS.request ................................................................. 412
6.3.20 DeleteKeys............................................................................................................. 413
6.3.20.1 MLME-DELETEKEYS.request ......................................................... 413
6.3.21 MIC (michael) failure event .................................................................................. 414
6.3.21.1 MLME-MICHAELMICFAILURE.indication.................................... 414
6.3.22 EAPOL................................................................................................................... 415
6.3.22.1 MLME-EAPOL.request...................................................................... 415
6.3.22.2 MLME-EAPOL.confirm..................................................................... 416
6.3.23 SetProtection.......................................................................................................... 416
6.3.23.1 MLME-SETPROTECTION.request................................................... 416
6.3.24 MLME-PROTECTEDFRAMEDROPPED ........................................................... 417
6.3.24.1 MLME-PROTECTEDFRAMEDROPPED.indication ....................... 417
6.3.25 TS management interface ...................................................................................... 418
6.3.25.1 General ................................................................................................ 418
6.3.25.2 MLME-ADDTS.request ..................................................................... 419
Authorized licensed use limited to: University of Science & Technology of China. Downloaded on April 29,2021 at 07:00:27 UTC from IEEE Xplore. Restrictions apply.
19
Copyright © 2021 IEEE. All rights reserved.
6.3.25.3 MLME-ADDTS.confirm .................................................................... 421
6.3.25.4 MLME-ADDTS.indication ................................................................. 424
6.3.25.5 MLME-ADDTS.response ................................................................... 426
6.3.25.6 MLME-DELTS.request ...................................................................... 429
6.3.25.7 MLME-DELTS.indication.................................................................. 430
6.3.25.8 MLME-ADDTSRESERVE.request.................................................... 431
6.3.25.9 MLME-ADDTSRESERVE.confirm................................................... 432
6.3.25.10 MLME-ADDTSRESERVE.indication ............................................... 433
6.3.25.11 MLME-ADDTSRESERVE.response ................................................. 434
6.3.26 Higher layer synchronization support.................................................................... 434
6.3.26.1 Introduction......................................................................................... 434
6.3.26.2 MLME-HL-SYNC.request ................................................................. 435
6.3.26.3 MLME-HL-SYNC.indication ............................................................. 435
6.3.27 Block Ack .............................................................................................................. 436
6.3.27.1 General ................................................................................................ 436
6.3.27.2 MLME-ADDBA.request..................................................................... 436
6.3.27.3 MLME-ADDBA.confirm ................................................................... 437
6.3.27.4 MLME-ADDBA.indication ................................................................ 439
6.3.27.5 MLME-ADDBA.response .................................................................. 440
6.3.27.6 MLME-DELBA.request ..................................................................... 441
6.3.27.7 MLME-DELBA.indication ................................................................. 442
6.3.28 Schedule element management.............................................................................. 443
6.3.28.1 Introduction......................................................................................... 443
6.3.28.2 MLME-SCHEDULE.request.............................................................. 443
6.3.28.3 MLME-SCHEDULE.indication ......................................................... 444
6.3.29 Vendor-specific action........................................................................................... 445
6.3.29.1 Introduction......................................................................................... 445
6.3.29.2 MLME-VSPECIFIC.request............................................................... 445
6.3.29.3 MLME-VSPECIFIC.indication .......................................................... 446
6.3.30 Neighbor report request ......................................................................................... 447
6.3.30.1 General ................................................................................................ 447
6.3.30.2 MLME-NEIGHBORREPREQ.request............................................... 447
6.3.30.3 MLME-NEIGHBORREPREQ.indication .......................................... 448
6.3.31 Neighbor report response....................................................................................... 449
6.3.31.1 General ................................................................................................ 449
6.3.31.2 MLME-NEIGHBORREPRESP.request ............................................. 449
6.3.31.3 MLME-NEIGHBORREPRESP.indication......................................... 450
6.3.32 Link Measure Request ........................................................................................... 451
6.3.32.1 General ................................................................................................ 451
6.3.32.2 MLME-LINKMEASURE.request ...................................................... 451
6.3.32.3 MLME-LINKMEASURE.confirm ..................................................... 452
6.3.33 MLME SAP interface for resource request ........................................................... 453
6.3.33.1 MLME-RESOURCE-REQUEST.request........................................... 453
6.3.33.2 MLME-RESOURCE-REQUEST.indication ...................................... 454
6.3.33.3 MLME-RESOURCE-REQUEST.response ........................................ 455
6.3.33.4 MLME-RESOURCE-REQUEST.confirm ......................................... 455
6.3.33.5 MLME-RESOURCE-REQUEST-LOCAL.request............................ 456
6.3.33.6 MLME-RESOURCE-REQUEST-LOCAL.confirm........................... 457
6.3.34 MLME SAP interface for remote requests ............................................................ 457
6.3.34.1 MLME-REMOTE-REQUEST.request ............................................... 457
6.3.34.2 MLME-REMOTE-REQUEST.indication........................................... 458
6.3.35 Extended channel switch announcement ............................................................... 458
6.3.35.1 General ................................................................................................ 458
6.3.35.2 MLME-EXTCHANNELSWITCH.request......................................... 459
Authorized licensed use limited to: University of Science & Technology of China. Downloaded on April 29,2021 at 07:00:27 UTC from IEEE Xplore. Restrictions apply.
剩余4378页未读,继续阅读
2023-04-27 上传
2023-07-07 上传
2023-10-27 上传
2024-01-18 上传
2023-08-18 上传
2023-07-30 上传
2023-09-21 上传
weixin_40696743
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- MATLAB实现小波阈值去噪:Visushrink硬软算法对比
- 易语言实现画板图像缩放功能教程
- 大模型推荐系统: 优化算法与模型压缩技术
- Stancy: 静态文件驱动的简单RESTful API与前端框架集成
- 掌握Java全文搜索:深入Apache Lucene开源系统
- 19计应19田超的Python7-1试题整理
- 易语言实现多线程网络时间同步源码解析
- 人工智能大模型学习与实践指南
- 掌握Markdown:从基础到高级技巧解析
- JS-PizzaStore: JS应用程序模拟披萨递送服务
- CAMV开源XML编辑器:编辑、验证、设计及架构工具集
- 医学免疫学情景化自动生成考题系统
- 易语言实现多语言界面编程教程
- MATLAB实现16种回归算法在数据挖掘中的应用
- ***内容构建指南:深入HTML与LaTeX
- Python实现维基百科“历史上的今天”数据抓取教程
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功