没有合适的资源?快使用搜索试试~ 我知道了~
首页深入解析IEEE802.11-2020:无线局域网协议权威指南
深入解析IEEE802.11-2020:无线局域网协议权威指南
需积分: 0 0 下载量 151 浏览量
更新于2024-06-16
收藏 38.84MB PDF 举报
"该资源是IEEE802.11-2020无线局域网协议的官方标准文档,全面覆盖了Wi-Fi技术的核心内容,包括物理层(PHY)和介质访问控制层(MAC)的规范,以及网络架构、QoS、安全性和电源管理等方面。这份PDF文档适合专业人士用于研究、工程实践和教学,对于理解和优化无线网络性能至关重要。"
**IEEE 802.11协议详解**
IEEE 802.11是无线局域网(WLAN)的标准,由IEEE的局域和城域网标准委员会制定。此协议定义了Wi-Fi网络的基本操作,包括数据传输方式、设备间通信的规则以及网络结构。802.11标准经历了多次修订,其中802.11-2020是最新版本,它更新和完善了之前的标准,如802.11-2016。
**物理层(PHY)与介质访问控制层(MAC)**
1. **物理层**:负责数据的物理传输,包括不同的调制解调技术,如802.11a/b/g/n/ac/ax等。这些不同的变种定义了不同的频率范围、数据速率和传输距离。例如,802.11n引入了MIMO(多输入多输出)技术,显著提高了数据传输速度。
2. **介质访问控制层**:MAC层管理网络中的数据传输,包括信道接入、冲突避免和流量控制。802.11协议定义了CSMA/CA(载波监听多路访问/冲突避免)机制,确保多个设备能公平地共享无线介质。
**服务质量(QoS)**
QoS机制确保网络能优先处理关键数据流,如语音和视频,保证其流畅性。802.11协议提供了多种QoS机制,如WMM(Wi-Fi多媒体)和TSPEC(时间敏感流配置)。
**安全措施**
802.11标准涵盖了多种安全机制,包括:
- WEP(有线等效加密):早期的安全标准,现已不再安全。
- WPA(Wi-Fi保护访问):取代WEP,提供更强的加密。
- WPA2:进一步增强了安全性,广泛应用于现代Wi-Fi网络。
- WPA3:最新的安全标准,提供了更强大的密码和个人设备保护。
**电源管理(如APSD)**
为移动设备提供节能策略,如自动功率节省配送(APSD),允许设备在不牺牲连接质量的前提下降低功耗。
**工作模式**
协议支持不同的工作模式,如基础设施模式(通过接入点连接)和对等模式(设备间直接通信)。这些模式下有不同的节能策略,比如休眠模式和唤醒间隔,帮助设备平衡性能和电池寿命。
**应用场景**
了解802.11协议有助于网络规划和优化,包括信号覆盖设计、频道选择、干扰管理等。对于开发者而言,深入理解标准可以帮助他们创建高效、安全的Wi-Fi应用和设备。
**总结**
IEEE 802.11-2020标准文档是一个深度学习无线通信技术的宝贵资源,它涵盖了Wi-Fi技术的各个方面,从基础架构到高级功能。对于网络工程师、研究人员和教育工作者来说,它是理解和掌握Wi-Fi技术不可或缺的工具。
15
Copyright © 2021 IEEE. All rights reserved.
4.3.24.4 Mirrored stream classification service (MSCS).................................. 250
4.3.24.5 Overlapping BSS (OBSS) management ............................................. 250
4.3.24.6 Interworking with IEEE 802.1Q Stream Reservation Protocol (SRP) 250
4.3.24.7 Intra-access category prioritization..................................................... 250
4.3.25 Operation under geolocation database (GDB) control .......................................... 251
4.3.26 CDMG STA........................................................................................................... 252
4.3.27 CMMG STA .......................................................................................................... 253
4.3.28 General link (GLK)................................................................................................ 254
4.3.28.1 General ................................................................................................ 254
4.3.28.2 Selective reception of group addressed frames................................... 254
4.3.28.3 GLK Service Sets................................................................................ 255
4.3.29 Ethertype protocol discrimination (EPD) .............................................................. 259
4.4 Logical service interfaces ...................................................................................................... 260
4.4.1 General................................................................................................................... 260
4.4.2 SS ........................................................................................................................... 260
4.4.3 PBSS control point service (PCPS) ....................................................................... 261
4.4.4 DSS ........................................................................................................................ 261
4.5 Overview of the services........................................................................................................ 262
4.5.1 General................................................................................................................... 262
4.5.2 Distribution of MSDUs within a DS...................................................................... 263
4.5.2.1 Distribution ......................................................................................... 263
4.5.2.2 Integration ........................................................................................... 264
4.5.2.3 QoS traffic scheduling ........................................................................ 264
4.5.3 Connectivity-related services................................................................................. 264
4.5.3.1 General ................................................................................................ 264
4.5.3.2 Mobility types ..................................................................................... 265
4.5.3.3 Association.......................................................................................... 265
4.5.3.4 Reassociation ...................................................................................... 266
4.5.3.5 Disassociation ..................................................................................... 266
4.5.4 Access control and data confidentiality services ................................................... 267
4.5.4.1 General ................................................................................................ 267
4.5.4.2 Authentication..................................................................................... 267
4.5.4.3 Deauthentication ................................................................................. 268
4.5.4.4 Data confidentiality............................................................................. 269
4.5.4.5 Key management................................................................................. 270
4.5.4.6 Data origin authenticity....................................................................... 270
4.5.4.7 Replay detection.................................................................................. 270
4.5.4.8 Fast BSS transition.............................................................................. 270
4.5.4.9 Management frame protection ............................................................ 270
4.5.4.10 MAC privacy enhancements............................................................... 271
4.5.5 Spectrum management services............................................................................. 271
4.5.5.1 General ................................................................................................ 271
4.5.5.2 TPC ..................................................................................................... 271
4.5.5.3 DFS ..................................................................................................... 271
4.5.6 Traffic differentiation and QoS support................................................................. 272
4.5.6.1 General ................................................................................................ 272
4.5.6.2 Quality-of-service management frame support................................... 272
4.5.7 Support for higher layer timer synchronization ..................................................... 272
4.5.8 Radio measurement service ................................................................................... 273
4.5.9 Interworking with external networks ..................................................................... 273
4.5.9.1 General ................................................................................................ 273
4.5.9.2 Preassociation discovery (PAD) ......................................................... 274
4.5.10 Generic advertisement service (GAS) ................................................................... 275
4.6 Multiple logical address spaces ............................................................................................. 276
Authorized licensed use limited to: Leo Lee. Downloaded on April 09,2022 at 09:42:10 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2021 IEEE. All rights reserved.
4.7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 276
4.8 Differences between ESS and MBSS LANs ......................................................................... 278
4.9 Reference model .................................................................................................................... 279
4.9.1 General................................................................................................................... 279
4.9.2 Interworking reference model................................................................................ 279
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 281
4.9.4 Reference model for multi-band operation ............................................................ 282
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 284
4.10.1 General................................................................................................................... 284
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 284
4.10.3 Infrastructure functional model overview.............................................................. 284
4.10.3.1 General ................................................................................................ 284
4.10.3.2 AKM operations with AS ................................................................... 284
4.10.3.3 AKM operations with a password or PSK.......................................... 287
4.10.3.4 Alternate operations with PSK............................................................ 288
4.10.3.5 Disassociation ..................................................................................... 288
4.10.3.6 AKM operations using FILS authentication ....................................... 288
4.10.4 IBSS functional model description ........................................................................ 289
4.10.4.1 General ................................................................................................ 289
4.10.4.2 Key usage............................................................................................ 289
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 290
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 291
4.10.5 PBSS functional model description ....................................................................... 292
4.10.6 Authenticator-to-AS protocol ................................................................................ 293
4.10.7 PMKSA caching .................................................................................................... 293
4.10.8 Protection of group addressed robust Management frames................................... 294
5. MAC service definition ................................................................................................................... 295
5.1 Overview of MAC services ................................................................................................... 295
5.1.1 Data service............................................................................................................ 295
5.1.1.1 General ................................................................................................ 295
5.1.1.2 Determination of UP ........................................................................... 295
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 295
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 296
5.1.2 Security services .................................................................................................... 297
5.1.3 MSDU ordering ..................................................................................................... 297
5.1.4 MSDU format ........................................................................................................ 298
5.1.5 MAC data service architecture .............................................................................. 299
5.1.5.1 General ................................................................................................ 299
5.1.5.2 Non-GLK non-AP STA role ............................................................... 302
5.1.5.3 Non-GLK AP role............................................................................... 302
5.1.5.4 Non-GLK mesh STA role ................................................................... 303
5.1.5.5 Mesh gate role..................................................................................... 303
5.1.5.6 S1G relay............................................................................................. 303
5.1.5.7 GLK STA role..................................................................................... 305
5.1.5.8 GLK AP role ....................................................................................... 305
5.1.5.9 GLK mesh STA role ........................................................................... 305
5.2 MAC data service specification............................................................................................. 307
5.2.1 General................................................................................................................... 307
5.2.2 GLK MAC data service specification.................................................................... 307
5.2.3 MA-UNITDATA.request ...................................................................................... 307
5.2.3.1 Function .............................................................................................. 307
Authorized licensed use limited to: Leo Lee. Downloaded on April 09,2022 at 09:42:10 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2021 IEEE. All rights reserved.
5.2.3.2 Semantics of the service primitive ...................................................... 307
5.2.3.3 When generated................................................................................... 308
5.2.3.4 Effect of receipt................................................................................... 308
5.2.4 MA-UNITDATA.indication .................................................................................. 310
5.2.4.1 Function .............................................................................................. 310
5.2.4.2 Semantics of the service primitive ...................................................... 310
5.2.4.3 When generated................................................................................... 311
5.2.4.4 Effect of receipt................................................................................... 311
5.2.5 MA-UNITDATA-STATUS.indication.................................................................. 313
5.2.5.1 Function .............................................................................................. 313
5.2.5.2 Semantics of the service primitive ...................................................... 313
5.2.5.3 When generated................................................................................... 314
5.2.5.4 Effect of receipt................................................................................... 314
6. Layer management........................................................................................................................... 315
6.1 Overview of management model........................................................................................... 315
6.2 Generic management primitives ............................................................................................ 316
6.3 MLME SAP interface ............................................................................................................ 316
6.3.1 Introduction............................................................................................................ 316
6.3.2 Power management................................................................................................ 317
6.3.2.1 Introduction......................................................................................... 317
6.3.2.2 MLME-POWERMGT.request............................................................ 317
6.3.2.3 MLME-POWERMGT.confirm........................................................... 318
6.3.3 Scan........................................................................................................................ 318
6.3.3.1 Introduction......................................................................................... 318
6.3.3.2 MLME-SCAN.request ........................................................................ 318
6.3.3.3 MLME-SCAN.confirm ....................................................................... 322
6.3.3.4 MLME-SCAN-STOP.request ............................................................. 337
6.3.4 Synchronization ..................................................................................................... 337
6.3.4.1 Introduction......................................................................................... 337
6.3.4.2 MLME-JOIN.request .......................................................................... 337
6.3.4.3 MLME-JOIN.confirm ......................................................................... 340
6.3.5 Authenticate ........................................................................................................... 341
6.3.5.1 Introduction......................................................................................... 341
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 341
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 342
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 344
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 345
6.3.6 Deauthenticate ....................................................................................................... 347
6.3.6.1 Introduction......................................................................................... 347
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 347
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 347
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 348
6.3.7 Associate................................................................................................................ 348
6.3.7.1 Introduction......................................................................................... 348
6.3.7.2 MLME-ASSOCIATE.request............................................................. 349
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 352
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 358
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 363
6.3.8 Reassociate............................................................................................................. 367
6.3.8.1 Introduction......................................................................................... 367
6.3.8.2 MLME-REASSOCIATE.request........................................................ 367
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 371
Authorized licensed use limited to: Leo Lee. Downloaded on April 09,2022 at 09:42:10 UTC from IEEE Xplore. Restrictions apply.
18
Copyright © 2021 IEEE. All rights reserved.
6.3.8.4 MLME-REASSOCIATE.indication ................................................... 377
6.3.8.5 MLME-REASSOCIATE.response ..................................................... 383
6.3.9 Disassociate ........................................................................................................... 388
6.3.9.1 MLME-DISASSOCIATE.request ...................................................... 388
6.3.9.2 MLME-DISASSOCIATE.confirm ..................................................... 388
6.3.9.3 MLME-DISASSOCIATE.indication.................................................. 389
6.3.10 Reset....................................................................................................................... 389
6.3.10.1 Introduction......................................................................................... 389
6.3.10.2 MLME-RESET.request....................................................................... 389
6.3.11 Start........................................................................................................................ 390
6.3.11.1 Introduction......................................................................................... 390
6.3.11.2 MLME-START.request ...................................................................... 390
6.3.11.3 MLME-START.confirm ..................................................................... 396
6.3.12 Stop ........................................................................................................................ 397
6.3.12.1 General ................................................................................................ 397
6.3.12.2 MLME-STOP.request ......................................................................... 397
6.3.13 Protocol layer model for spectrum management and radio measurement............. 398
6.3.14 Measurement request ............................................................................................. 401
6.3.14.1 Introduction......................................................................................... 401
6.3.14.2 MLME-MREQUEST.request ............................................................. 401
6.3.14.3 MLME-MREQUEST.indication......................................................... 402
6.3.15 Channel measurement............................................................................................ 403
6.3.15.1 Introduction......................................................................................... 403
6.3.15.2 MLME-MEASURE.request................................................................ 403
6.3.15.3 MLME-MEASURE.confirm............................................................... 403
6.3.16 Measurement report ............................................................................................... 404
6.3.16.1 Introduction......................................................................................... 404
6.3.16.2 MLME-MREPORT.request................................................................ 404
6.3.16.3 MLME-MREPORT.indication ........................................................... 405
6.3.17 Channel switch....................................................................................................... 406
6.3.17.1 MLME-CHANNELSWITCH.request ................................................ 406
6.3.17.2 MLME-CHANNELSWITCH.confirm ............................................... 407
6.3.17.3 MLME-CHANNELSWITCH.indication............................................ 408
6.3.17.4 MLME-CHANNELSWITCH.response.............................................. 409
6.3.18 TPC request............................................................................................................ 410
6.3.18.1 Introduction......................................................................................... 410
6.3.18.2 MLME-TPCADAPT.request .............................................................. 410
6.3.18.3 MLME-TPCADAPT.confirm ............................................................. 411
6.3.19 SetKeys .................................................................................................................. 412
6.3.19.1 MLME-SETKEYS.request ................................................................. 412
6.3.20 DeleteKeys............................................................................................................. 413
6.3.20.1 MLME-DELETEKEYS.request ......................................................... 413
6.3.21 MIC (michael) failure event .................................................................................. 414
6.3.21.1 MLME-MICHAELMICFAILURE.indication.................................... 414
6.3.22 EAPOL................................................................................................................... 415
6.3.22.1 MLME-EAPOL.request...................................................................... 415
6.3.22.2 MLME-EAPOL.confirm..................................................................... 416
6.3.23 SetProtection.......................................................................................................... 416
6.3.23.1 MLME-SETPROTECTION.request................................................... 416
6.3.24 MLME-PROTECTEDFRAMEDROPPED ........................................................... 417
6.3.24.1 MLME-PROTECTEDFRAMEDROPPED.indication ....................... 417
6.3.25 TS management interface ...................................................................................... 418
6.3.25.1 General ................................................................................................ 418
6.3.25.2 MLME-ADDTS.request ..................................................................... 419
Authorized licensed use limited to: Leo Lee. Downloaded on April 09,2022 at 09:42:10 UTC from IEEE Xplore. Restrictions apply.
19
Copyright © 2021 IEEE. All rights reserved.
6.3.25.3 MLME-ADDTS.confirm .................................................................... 421
6.3.25.4 MLME-ADDTS.indication ................................................................. 424
6.3.25.5 MLME-ADDTS.response ................................................................... 426
6.3.25.6 MLME-DELTS.request ...................................................................... 429
6.3.25.7 MLME-DELTS.indication.................................................................. 430
6.3.25.8 MLME-ADDTSRESERVE.request.................................................... 431
6.3.25.9 MLME-ADDTSRESERVE.confirm................................................... 432
6.3.25.10 MLME-ADDTSRESERVE.indication ............................................... 433
6.3.25.11 MLME-ADDTSRESERVE.response ................................................. 434
6.3.26 Higher layer synchronization support.................................................................... 434
6.3.26.1 Introduction......................................................................................... 434
6.3.26.2 MLME-HL-SYNC.request ................................................................. 435
6.3.26.3 MLME-HL-SYNC.indication ............................................................. 435
6.3.27 Block Ack .............................................................................................................. 436
6.3.27.1 General ................................................................................................ 436
6.3.27.2 MLME-ADDBA.request..................................................................... 436
6.3.27.3 MLME-ADDBA.confirm ................................................................... 437
6.3.27.4 MLME-ADDBA.indication ................................................................ 439
6.3.27.5 MLME-ADDBA.response .................................................................. 440
6.3.27.6 MLME-DELBA.request ..................................................................... 441
6.3.27.7 MLME-DELBA.indication ................................................................. 442
6.3.28 Schedule element management.............................................................................. 443
6.3.28.1 Introduction......................................................................................... 443
6.3.28.2 MLME-SCHEDULE.request.............................................................. 443
6.3.28.3 MLME-SCHEDULE.indication ......................................................... 444
6.3.29 Vendor-specific action........................................................................................... 445
6.3.29.1 Introduction......................................................................................... 445
6.3.29.2 MLME-VSPECIFIC.request............................................................... 445
6.3.29.3 MLME-VSPECIFIC.indication .......................................................... 446
6.3.30 Neighbor report request ......................................................................................... 447
6.3.30.1 General ................................................................................................ 447
6.3.30.2 MLME-NEIGHBORREPREQ.request............................................... 447
6.3.30.3 MLME-NEIGHBORREPREQ.indication .......................................... 448
6.3.31 Neighbor report response....................................................................................... 449
6.3.31.1 General ................................................................................................ 449
6.3.31.2 MLME-NEIGHBORREPRESP.request ............................................. 449
6.3.31.3 MLME-NEIGHBORREPRESP.indication......................................... 450
6.3.32 Link Measure Request ........................................................................................... 451
6.3.32.1 General ................................................................................................ 451
6.3.32.2 MLME-LINKMEASURE.request ...................................................... 451
6.3.32.3 MLME-LINKMEASURE.confirm ..................................................... 452
6.3.33 MLME SAP interface for resource request ........................................................... 453
6.3.33.1 MLME-RESOURCE-REQUEST.request........................................... 453
6.3.33.2 MLME-RESOURCE-REQUEST.indication ...................................... 454
6.3.33.3 MLME-RESOURCE-REQUEST.response ........................................ 455
6.3.33.4 MLME-RESOURCE-REQUEST.confirm ......................................... 455
6.3.33.5 MLME-RESOURCE-REQUEST-LOCAL.request............................ 456
6.3.33.6 MLME-RESOURCE-REQUEST-LOCAL.confirm........................... 457
6.3.34 MLME SAP interface for remote requests ............................................................ 457
6.3.34.1 MLME-REMOTE-REQUEST.request ............................................... 457
6.3.34.2 MLME-REMOTE-REQUEST.indication........................................... 458
6.3.35 Extended channel switch announcement ............................................................... 458
6.3.35.1 General ................................................................................................ 458
6.3.35.2 MLME-EXTCHANNELSWITCH.request......................................... 459
Authorized licensed use limited to: Leo Lee. Downloaded on April 09,2022 at 09:42:10 UTC from IEEE Xplore. Restrictions apply.
剩余4378页未读,继续阅读
2021-05-27 上传
2021-09-10 上传
2022-05-09 上传
2022-05-09 上传
2022-05-09 上传
无线网络系统
- 粉丝: 140
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功