没有合适的资源?快使用搜索试试~ 我知道了~
首页IEEE 802.11-2016标准:无线局域网MAC与PHY层规范
IEEE 802.11-2016标准:无线局域网MAC与PHY层规范
5星 · 超过95%的资源 需积分: 48 175 下载量 95 浏览量
更新于2024-07-18
3
收藏 36.26MB PDF 举报
“802.11-2016.pdf”是关于无线局域网(WLAN)介质访问控制(MAC)和物理层(PHY)规范的文档,由IEEE LAN/MAN标准委员会赞助,主要涉及信息技术、电信和系统间的信息交换,是IEEE 802.11标准的2016年修订版。
正文:
IEEE 802.11标准是无线局域网(WLAN)技术的基础,它定义了无线设备如何在共享介质上通信,包括介质访问控制(MAC)层和物理(PHY)层的规范。2016年的版本是对2012年版本的更新,旨在提升性能、增强安全性和适应新技术的发展。
1. 介质访问控制(MAC)层:
MAC层是网络协议栈的一部分,负责管理无线网络上的数据传输,确保多个设备能公平地共享无线信道。802.11标准中的MAC层规定了各种机制,如载波侦听多路访问/冲突避免(CSMA/CA),用于防止多个设备同时发送数据导致的冲突。此外,它还包括认证、关联、漫游和QoS(服务质量)等功能。
2. 物理层(PHY):
PHY层处理无线信号的传输和接收,包括调制、编码和解码等。802.11-2016标准涵盖了多种PHY技术,如802.11a/b/g/n/ac/ad等多个变种,分别对应不同的频段(2.4GHz、5GHz、60GHz)和传输速率。例如,802.11n引入了MIMO(多输入多输出)技术,显著提高了数据传输速度和可靠性;802.11ac进一步提升了速度,支持千兆位无线连接。
3. 技术改进与扩展:
IEEE 802.11-2016的修订可能包括对现有技术的增强,如更高的传输速率、更宽的频道带宽、低功耗模式(适用于物联网设备)以及更好的干扰管理。此外,它可能还包含了对新出现的技术,如波束成形和空间多流的支持,这些技术可以提高无线信号的定向性和效率。
4. 安全性:
802.11标准也关注网络安全,如WPA2(Wi-Fi保护访问第二版)提供强大的加密机制,防止未授权访问。随着技术发展,新的安全威胁不断出现,802.11-2016可能包含对现有安全协议的更新或增强,以应对这些挑战。
5. 兼容性和互操作性:
由于802.11标准的广泛采用,兼容性和互操作性是关键。2016年的修订版确保了新旧设备之间的兼容,允许用户无缝升级设备并保持网络连接。
IEEE 802.11-2016标准是无线通信领域的一个重要里程碑,它定义了无线局域网的通信规范,推动了无线网络技术的进步,为用户提供更快、更安全、更可靠的连接体验。对于IT专业人士来说,深入理解802.11标准对于设计、部署和维护WLAN至关重要。
15
Copyright © 2016 IEEE. All rights reserved.
4.3.24 Operation under geolocation database (GDB) control .......................................... 213
4.4 Logical service interfaces ...................................................................................................... 215
4.4.1 General...................................................................................................................215
4.4.2 SS ........................................................................................................................... 215
4.4.3 PBSS control point service (PCPS) ....................................................................... 216
4.4.4 DSS ........................................................................................................................ 216
4.5 Overview of the services........................................................................................................ 217
4.5.1 General...................................................................................................................217
4.5.2 Distribution of MSDUs within a DS...................................................................... 218
4.5.2.1 Distribution ......................................................................................... 218
4.5.2.2 Integration ........................................................................................... 219
4.5.2.3 QoS traffic scheduling ........................................................................ 219
4.5.3 Services that support the distribution service and the PCP service ....................... 220
4.5.3.1 General ................................................................................................ 220
4.5.3.2 Mobility types ..................................................................................... 220
4.5.3.3 Association.......................................................................................... 220
4.5.3.4 Reassociation ...................................................................................... 221
4.5.3.5 Disassociation ..................................................................................... 221
4.5.4 Access control and data confidentiality services ................................................... 222
4.5.4.1 General ................................................................................................ 222
4.5.4.2 Authentication..................................................................................... 222
4.5.4.3 Deauthentication ................................................................................. 223
4.5.4.4 Data confidentiality............................................................................. 223
4.5.4.5 Key management................................................................................. 224
4.5.4.6 Data origin authenticity....................................................................... 224
4.5.4.7 Replay detection.................................................................................. 224
4.5.4.8 Fast BSS transition.............................................................................. 225
4.5.4.9 Robust management frame protection ................................................ 225
4.5.5 Spectrum management services............................................................................. 225
4.5.5.1 General ................................................................................................ 225
4.5.5.2 TPC ..................................................................................................... 225
4.5.5.3 DFS ..................................................................................................... 225
4.5.6 Traffic differentiation and QoS support................................................................. 226
4.5.6.1 General ................................................................................................ 226
4.5.6.2 Quality-of-service management frame support................................... 226
4.5.7 Support for higher layer timer synchronization..................................................... 226
4.5.8 Radio measurement service ................................................................................... 227
4.5.9 Interworking with external networks..................................................................... 227
4.5.10 Generic advertisement service (GAS) ................................................................... 228
4.6 Multiple logical address spaces ............................................................................................
.228
4
.
7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 229
4.8 Differences between ESS and MBSS LANs ......................................................................... 231
4.9 Reference model .................................................................................................................... 231
4.9.1 General...................................................................................................................231
4.9.2 Interworking reference model................................................................................ 231
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 233
4.9.4 Reference model for multi-band operation............................................................ 234
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 236
4.10.1 General................................................................................................................... 236
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 236
4.10.3 Infrastructure functional model overview.............................................................. 237
4.10.3.1 General................................................................................................ 237
4.10.3.2 AKM operations with AS ................................................................... 237
4.10.3.3 AKM operations with a password or PSK .......................................... 239
Authorized licensed use limited to: Fujian Star Net Communication Co LTD. Downloaded on October 10,2017 at 08:34:23 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2016 IEEE. All rights reserved.
4.10.3.4 Alternate operations with PSK............................................................ 240
4.10.3.5 Disassociation ..................................................................................... 241
4.10.4 IBSS functional model description ........................................................................ 241
4.10.4.1 General................................................................................................ 241
4.10.4.2 Key usage............................................................................................ 241
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 241
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 243
4.10.5 PBSS functional model description ....................................................................... 244
4.10.6 Authenticator-to-AS protocol ................................................................................ 245
4.10.7 PMKSA caching .................................................................................................... 245
4.10.8 Protection of group addressed robust Management frames................................... 245
5. MAC service definition ..................................................................................................................... 246
5.1 Overview of MAC services ................................................................................................... 246
5.1.1 Data service............................................................................................................ 246
5.1.1.1 General ................................................................................................ 246
5.1.1.2 Determination of UP ........................................................................... 246
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 246
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 247
5.1.2 Security services .................................................................................................... 248
5.1.3 MSDU ordering ..................................................................................................... 248
5.1.4 MSDU format ........................................................................................................ 249
5.1.5 MAC data service architecture .............................................................................. 250
5.1.5.1 General ................................................................................................ 250
5.1.5.2 Non-AP STA role................................................................................ 253
5.1.5.3 AP role ................................................................................................ 253
5.1.5.4 Mesh STA role.................................................................................... 253
5.1.5.5 Mesh gate role..................................................................................... 254
5.2 MAC data service specification............................................................................................. 254
5.2.1 General...................................................................................................................254
5.2.2 MA-UNITDATA.request ...................................................................................... 254
5.2.2.1 Function .............................................................................................. 254
5.2.2.2 Semantics of the service primitive...................................................... 255
5.2.2.3 When generated................................................................................... 255
5.2.2.4 Effect of receipt................................................................................... 255
5.2.3 MA-UNITDATA.indication .................................................................................. 257
5.2.3.1 Function .............................................................................................. 257
5.2.3.2 Semantics of the service primitive...................................................... 257
5.2.3.3 When generated................................................................................... 257
5.2.3.4 Effect of receipt.......................................
............................................ 258
5.2
.
4 MA-UNITDATA-STATUS.indication.................................................................. 259
5.2.4.1 Function .............................................................................................. 259
5.2.4.2 Semantics of the service primitive...................................................... 259
5.2.4.3 When generated................................................................................... 261
5.2.4.4 Effect of receipt................................................................................... 261
6. Layer management............................................................................................................................. 262
6.1 Overview of management model........................................................................................... 262
6.2 Generic management primitives ............................................................................................ 263
6.3 MLME SAP interface ............................................................................................................ 263
6.3.1 Introduction............................................................................................................ 263
Authorized licensed use limited to: Fujian Star Net Communication Co LTD. Downloaded on October 10,2017 at 08:34:23 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2016 IEEE. All rights reserved.
6.3.2 Power management................................................................................................ 264
6.3.2.1 Introduction......................................................................................... 264
6.3.2.2 MLME-POWERMGT.request............................................................ 264
6.3.2.3 MLME-POWERMGT.confirm........................................................... 264
6.3.3 Scan........................................................................................................................ 265
6.3.3.1 Introduction......................................................................................... 265
6.3.3.2 MLME-SCAN.request ........................................................................ 265
6.3.3.3 MLME-SCAN.confirm ....................................................................... 267
6.3.4 Synchronization ..................................................................................................... 276
6.3.4.1 Introduction......................................................................................... 276
6.3.4.2 MLME-JOIN.request .......................................................................... 276
6.3.4.3 MLME-JOIN.confirm ......................................................................... 278
6.3.5 Authenticate ........................................................................................................... 279
6.3.5.1 Introduction......................................................................................... 279
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 279
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 280
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 282
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 283
6.3.6 Deauthenticate ....................................................................................................... 284
6.3.6.1 Introduction......................................................................................... 284
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 284
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 285
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 285
6.3.7 Associate................................................................................................................ 286
6.3.7.1 Introduction......................................................................................... 286
6.3.7.2 MLME-ASSOCIATE.request............................................................. 286
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 288
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 292
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 295
6.3.8 Reassociate............................................................................................................. 297
6.3.8.1 Introduction......................................................................................... 297
6.3.8.2 MLME-REASSOCIATE.request........................................................ 297
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 299
6.3.8.4 MLME-REASSOCIATE.indication ................................................... 303
6.3.8.5 MLME-REASSOCIATE.response ..................................................... 306
6.3.9 Disassociate ........................................................................................................... 309
6.3.9.1 MLME-DISASSOCIATE.request ...................................................... 309
6.3.9.2 MLME-DISASSOCIATE.confirm ..................................................... 309
6.3.9.3 MLME-DISASSOCIATE.indication.................................................. 310
6.3.10 Reset....................................................................................................................... 310
6.3.10.1 Introduction......................................................................................... 310
6.3.10.2 MLME-RESET.request....................................................................... 311
6.3.11 Start........................................................................................................................ 311
6.3.11.1 Introduction......................................................................................... 311
6.3.11.2 MLME-START.request ...................................................................... 311
6.3.11.3 MLME-START.confirm.....................................
................................ 317
6.
3.
12 Stop ........................................................................................................................ 317
6.3.12.1 General................................................................................................ 317
6.3.12.2 MLME-STOP.request......................................................................... 317
6.3.13 Protocol layer model for spectrum management and radio measurement............. 318
6.3.14 Measurement request ............................................................................................. 321
6.3.14.1 Introduction......................................................................................... 321
6.3.14.2 MLME-MREQUEST.request ............................................................. 321
6.3.14.3 MLME-MREQUEST.indication......................................................... 322
Authorized licensed use limited to: Fujian Star Net Communication Co LTD. Downloaded on October 10,2017 at 08:34:23 UTC from IEEE Xplore. Restrictions apply.
18
Copyright © 2016 IEEE. All rights reserved.
6.3.15 Channel measurement............................................................................................ 323
6.3.15.1 Introduction......................................................................................... 323
6.3.15.2 MLME-MEASURE.request................................................................ 323
6.3.15.3 MLME-MEASURE.confirm............................................................... 324
6.3.16 Measurement report ............................................................................................... 325
6.3.16.1 Introduction......................................................................................... 325
6.3.16.2 MLME-MREPORT.request................................................................ 325
6.3.16.3 MLME-MREPORT.indication ........................................................... 326
6.3.17 Channel switch....................................................................................................... 327
6.3.17.1 MLME-CHANNELSWITCH.request ................................................ 327
6.3.17.2 MLME-CHANNELSWITCH.confirm ............................................... 328
6.3.17.3 MLME-CHANNELSWITCH.indication............................................ 328
6.3.17.4 MLME-CHANNELSWITCH.response.............................................. 329
6.3.18 TPC request............................................................................................................ 331
6.3.18.1 Introduction......................................................................................... 331
6.3.18.2 MLME-TPCADAPT.request .............................................................. 331
6.3.18.3 MLME-TPCADAPT.confirm............................................................. 331
6.3.19 SetKeys ..................................................................................................................332
6.3.19.1 MLME-SETKEYS.request ................................................................. 332
6.3.20 DeleteKeys............................................................................................................. 333
6.3.20.1 MLME-DELETEKEYS.request ......................................................... 333
6.3.21 MIC (michael) failure event .................................................................................. 334
6.3.21.1 MLME-MICHAELMICFAILURE.indication.................................... 334
6.3.22 EAPOL................................................................................................................... 335
6.3.22.1 MLME-EAPOL.request...................................................................... 335
6.3.22.2 MLME-EAPOL.confirm..................................................................... 336
6.3.23 MLME-PEERKEY-START .................................................................................. 336
6.3.23.1 MLME-PEERKEY-START.request................................................... 336
6.3.24 SetProtection.......................................................................................................... 337
6.3.24.1 MLME-SETPROTECTION.request................................................... 337
6.3.25 MLME-PROTECTEDFRAMEDROPPED ........................................................... 338
6.3.25.1 MLME- PROTECTEDFRAMEDROPPED.indication ...................... 338
6.3.26 TS management interface ...................................................................................... 338
6.3.26.1 General................................................................................................ 338
6.3.26.2 MLME-ADDTS.request ..................................................................... 339
6.3.26.3 MLME-ADDTS.confirm .................................................................... 341
6.3.26.4 MLME-ADDTS.indication................................................................. 344
6.3.26.5 MLME-ADDTS.response................................................................... 346
6.3.26.6 MLME-DELTS.request ...................................................................... 349
6.3.26.7 MLME-DELTS.indication.................................................................. 350
6.3.26.8 MLME-ADDTSRESERVE.request ................................................... 351
6.3.26.9 MLME-ADDTSRESERVE.confirm................................................... 352
6.3.26.10 MLME-ADDTSRESERVE.indication ............................................... 353
6.3.26.11 MLME-ADDTSRESERVE.response ................................................. 354
6.3.27 Management of direct links ................................................................................... 354
6.3.27.1 Introduction......................................................................................... 354
6.3.27.2 MLME-DLS.request ........................................................................... 355
6.3.27.3 MLME-DLS.confirm .......................................................................... 355
6.3.27.4 MLME-DLS.indication.....................................
..
................................ 356
6.3.27.5 MLME-DLS.response......................................................................... 357
6.3.27.6 MLME-DLS-TEARDOWN.request................................................... 358
6.3.27.7 MLME-DLS-TEARDOWN.indication............................................... 359
6.3.28 Higher layer synchronization support.................................................................... 360
6.3.28.1 Introduction......................................................................................... 360
Authorized licensed use limited to: Fujian Star Net Communication Co LTD. Downloaded on October 10,2017 at 08:34:23 UTC from IEEE Xplore. Restrictions apply.
19
Copyright © 2016 IEEE. All rights reserved.
6.3.28.2 MLME-HL-SYNC.request ................................................................. 360
6.3.28.3 MLME-HL-SYNC.indication............................................................. 361
6.3.29 Block Ack .............................................................................................................. 361
6.3.29.1 General................................................................................................ 361
6.3.29.2 MLME-ADDBA.request..................................................................... 361
6.3.29.3 MLME-ADDBA.confirm ................................................................... 363
6.3.29.4 MLME-ADDBA.indication ................................................................ 364
6.3.29.5 MLME-ADDBA.response .................................................................. 365
6.3.29.6 MLME-DELBA.request ..................................................................... 367
6.3.29.7 MLME-DELBA.indication................................................................. 368
6.3.30 Schedule element management.............................................................................. 369
6.3.30.1 Introduction......................................................................................... 369
6.3.30.2 MLME-SCHEDULE.request.............................................................. 369
6.3.30.3 MLME-SCHEDULE.indication ......................................................... 369
6.3.31 Vendor-specific action........................................................................................... 370
6.3.31.1 Introduction......................................................................................... 370
6.3.31.2 MLME-VSPECIFIC.request............................................................... 370
6.3.31.3 MLME-VSPECIFIC.indication .......................................................... 371
6.3.32 Neighbor report request ......................................................................................... 372
6.3.32.1 General................................................................................................ 372
6.3.32.2 MLME-NEIGHBORREPREQ.request............................................... 372
6.3.32.3 MLME-NEIGHBORREPREQ.indication .......................................... 373
6.3.33 Neighbor report response....................................................................................... 374
6.3.33.1 General................................................................................................ 374
6.3.33.2 MLME-NEIGHBORREPRESP.request ............................................. 374
6.3.33.3 MLME-NEIGHBORREPRESP.indication......................................... 375
6.3.34 Link Measure Request ........................................................................................... 376
6.3.34.1 General................................................................................................ 376
6.3.34.2 MLME-LINKMEASURE.request ...................................................... 376
6.3.34.3 MLME-LINKMEASURE.confirm..................................................... 377
6.3.35 MLME SAP interface for resource request ........................................................... 378
6.3.35.1 MLME-RESOURCE-REQUEST.request........................................... 378
6.3.35.2 MLME-RESOURCE-REQUEST.indication ...................................... 379
6.3.35.3 MLME-RESOURCE-REQUEST.response ........................................ 380
6.3.35.4 MLME-RESOURCE-REQUEST.confirm ......................................... 380
6.3.35.5 MLME-RESOURCE-REQUEST-LOCAL.request............................ 381
6.3.35.6 MLME-RESOURCE-REQUEST-LOCAL.confirm........................... 382
6.3.36 MLME SAP interface for remote requests ............................................................ 382
6.3.36.1 MLME-REMOTE-REQUEST.request............................................... 382
6.3.36.2 MLME-REMOTE-REQUEST.indication........................................... 383
6.3.37 Extended channel switch announcement ............................................................... 383
6.3.37.1 General................................................................................................ 383
6.3.37.2 MLME-EXTCHANNELSWITCH.request......................................... 384
6.3.37.3 MLME-EXTCHANNELSWITCH.confirm ....................................... 385
6.3.37.4 MLME-EXTCHANNELSWITCH.indication .................................... 385
6.3.37.5 MLME-EXTCHANNELSWITCH.response ...................................... 387
6.3.38 DSE power constraint announcement........................
............................................ 388
6.3.38.
1
General ................................................................................................ 388
6.3.38.2 MLME-DSETPC.request.................................................................... 388
6.3.38.3 MLME-DSETPC.confirm................................................................... 389
6.3.38.4 MLME-DSETPC.indication ............................................................... 390
6.3.38.5 MLME-DSETPC.response ................................................................. 390
6.3.39 Enablement ............................................................................................................ 391
6.3.39.1 General................................................................................................ 391
Authorized licensed use limited to: Fujian Star Net Communication Co LTD. Downloaded on October 10,2017 at 08:34:23 UTC from IEEE Xplore. Restrictions apply.
剩余3533页未读,继续阅读
2010-05-22 上传
2020-03-06 上传
2020-05-09 上传
2022-04-07 上传
2017-12-14 上传
2018-05-15 上传
2023-09-05 上传
竹笋545
- 粉丝: 0
- 资源: 7
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功