没有合适的资源?快使用搜索试试~ 我知道了~
首页IEEE 802.11-2016无线局域网标准解析
IEEE 802.11-2016无线局域网标准解析
需积分: 12 1 下载量 5 浏览量
更新于2024-07-15
1
收藏 36.23MB PDF 举报
"80211-2016.pdf 是一份关于 IEEE 802.11 标准协议的文档,该标准由电气和电子工程师协会 (IEEE) 制定,用于定义无线局域网 (WLAN) 的通信规范。此文档主要涵盖无线局域网介质访问控制 (MAC) 和物理层 (PHY) 规范。"
802.11 标准协议是无线局域网通信的核心,它定义了在无线环境中如何有效地共享传输介质,确保数据的正确传输。这份 IEEE 802.11-2016 文档是对 2012 版本的修订,旨在不断优化和完善无线通信技术。802.11 协议不仅包括了 MAC 层和 PHY 层的详细规格,还涉及到多个子标准,如 802.11a、802.11b、802.11g、802.11n、802.11ac 和 802.11ax(也称为 Wi-Fi 6),这些子标准分别定义了不同的传输速率、频段和信号处理方法。
1. **无线局域网介质访问控制 (MAC) 层**:MAC 层是 OSI 模型中的第二层,负责管理网络中设备如何共享介质。在 802.11 标准中,MAC 层采用了载波侦听多路访问/冲突避免 (CSMA/CA) 策略,与有线网络中的 CSMA/CD(载波侦听多路访问/碰撞检测)不同,无线环境无法检测到碰撞,因此使用 CA(避免)代替 CD(检测)。此外,MAC 层还包括帧的结构、确认机制、漫游和安全功能等。
2. **物理层 (PHY) 规范**:PHY 层是 OSI 模型的第一层,定义了无线信号的传输特性,如频率、调制方式、数据编码和功率级别。802.11 标准支持多种频段,包括 2.4 GHz、5 GHz 和 60 GHz,以及不同的调制技术,如 OFDM(正交频分复用)和 MIMO(多输入多输出)技术,这些技术提高了无线传输的速率和可靠性。
3. **Wi-Fi 协议的发展**:随着技术的进步,802.11 标准不断演进以满足更高的速度和更大的容量需求。例如,802.11n 引入了 MIMO 技术,显著提升了传输速率;802.11ac 提升了工作频段至 5 GHz,引入了更多空间流以进一步提高速度;802.11ax(Wi-Fi 6)则通过 OFDMA 和 TWT(目标唤醒时间)等技术,实现了更高效能和更低功耗。
4. **安全标准**:802.11 标准也包含了安全协议,如 WEP(有线等效加密)、WPA(Wi-Fi 保护访问)、WPA2 和 WPA3,这些协议提供了对无线网络连接的加密和认证,以保护用户数据的安全。
5. **应用范围**:802.11 协议广泛应用于家庭、办公室、公共场所的 Wi-Fi 网络,以及物联网设备之间的无线通信。其高速、低延迟的特性使其成为移动设备和无线设备连接互联网的主要方式。
6. **标准实施**:802.11 标准的实施通常由 Wi-Fi 联盟进行认证,确保产品符合标准并兼容其他设备。制造商生产的 Wi-Fi 设备必须通过该联盟的测试,才能获得 Wi-Fi 认证并标记为支持相应的 802.11 标准。
802.11-2016 标准文档详细阐述了无线局域网通信的各个方面,对于理解 Wi-Fi 技术的工作原理、设计和优化无线网络具有重要的参考价值。随着技术的不断发展,802.11 标准将继续演进,以适应新的需求和挑战。
15
Copyright © 2016 IEEE. All rights reserved.
4.3.24 Operation under geolocation database (GDB) control .......................................... 213
4.4 Logical service interfaces ...................................................................................................... 215
4.4.1 General...................................................................................................................215
4.4.2 SS ........................................................................................................................... 215
4.4.3 PBSS control point service (PCPS) ....................................................................... 216
4.4.4 DSS ........................................................................................................................ 216
4.5 Overview of the services........................................................................................................ 217
4.5.1 General...................................................................................................................217
4.5.2 Distribution of MSDUs within a DS...................................................................... 218
4.5.2.1 Distribution ......................................................................................... 218
4.5.2.2 Integration ........................................................................................... 219
4.5.2.3 QoS traffic scheduling ........................................................................ 219
4.5.3 Services that support the distribution service and the PCP service ....................... 220
4.5.3.1 General ................................................................................................ 220
4.5.3.2 Mobility types ..................................................................................... 220
4.5.3.3 Association.......................................................................................... 220
4.5.3.4 Reassociation ...................................................................................... 221
4.5.3.5 Disassociation ..................................................................................... 221
4.5.4 Access control and data confidentiality services ................................................... 222
4.5.4.1 General ................................................................................................ 222
4.5.4.2 Authentication..................................................................................... 222
4.5.4.3 Deauthentication ................................................................................. 223
4.5.4.4 Data confidentiality............................................................................. 223
4.5.4.5 Key management................................................................................. 224
4.5.4.6 Data origin authenticity....................................................................... 224
4.5.4.7 Replay detection.................................................................................. 224
4.5.4.8 Fast BSS transition.............................................................................. 225
4.5.4.9 Robust management frame protection ................................................ 225
4.5.5 Spectrum management services............................................................................. 225
4.5.5.1 General ................................................................................................ 225
4.5.5.2 TPC ..................................................................................................... 225
4.5.5.3 DFS ..................................................................................................... 225
4.5.6 Traffic differentiation and QoS support................................................................. 226
4.5.6.1 General ................................................................................................ 226
4.5.6.2 Quality-of-service management frame support................................... 226
4.5.7 Support for higher layer timer synchronization..................................................... 226
4.5.8 Radio measurement service ................................................................................... 227
4.5.9 Interworking with external networks..................................................................... 227
4.5.10 Generic advertisement service (GAS) ................................................................... 228
4.6 Multiple logical address spaces ............................................................................................
.228
4
.
7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 229
4.8 Differences between ESS and MBSS LANs ......................................................................... 231
4.9 Reference model .................................................................................................................... 231
4.9.1 General...................................................................................................................231
4.9.2 Interworking reference model................................................................................ 231
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 233
4.9.4 Reference model for multi-band operation............................................................ 234
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 236
4.10.1 General................................................................................................................... 236
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 236
4.10.3 Infrastructure functional model overview.............................................................. 237
4.10.3.1 General................................................................................................ 237
4.10.3.2 AKM operations with AS ................................................................... 237
4.10.3.3 AKM operations with a password or PSK .......................................... 239
Authorized licensed use limited to: SHANGHAI UNIVERSITY. Downloaded on June 06,2020 at 09:17:02 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2016 IEEE. All rights reserved.
4.10.3.4 Alternate operations with PSK............................................................ 240
4.10.3.5 Disassociation ..................................................................................... 241
4.10.4 IBSS functional model description ........................................................................ 241
4.10.4.1 General................................................................................................ 241
4.10.4.2 Key usage............................................................................................ 241
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 241
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 243
4.10.5 PBSS functional model description ....................................................................... 244
4.10.6 Authenticator-to-AS protocol ................................................................................ 245
4.10.7 PMKSA caching .................................................................................................... 245
4.10.8 Protection of group addressed robust Management frames................................... 245
5. MAC service definition ..................................................................................................................... 246
5.1 Overview of MAC services ................................................................................................... 246
5.1.1 Data service............................................................................................................ 246
5.1.1.1 General ................................................................................................ 246
5.1.1.2 Determination of UP ........................................................................... 246
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 246
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 247
5.1.2 Security services .................................................................................................... 248
5.1.3 MSDU ordering ..................................................................................................... 248
5.1.4 MSDU format ........................................................................................................ 249
5.1.5 MAC data service architecture .............................................................................. 250
5.1.5.1 General ................................................................................................ 250
5.1.5.2 Non-AP STA role................................................................................ 253
5.1.5.3 AP role ................................................................................................ 253
5.1.5.4 Mesh STA role.................................................................................... 253
5.1.5.5 Mesh gate role..................................................................................... 254
5.2 MAC data service specification............................................................................................. 254
5.2.1 General...................................................................................................................254
5.2.2 MA-UNITDATA.request ...................................................................................... 254
5.2.2.1 Function .............................................................................................. 254
5.2.2.2 Semantics of the service primitive...................................................... 255
5.2.2.3 When generated................................................................................... 255
5.2.2.4 Effect of receipt................................................................................... 255
5.2.3 MA-UNITDATA.indication .................................................................................. 257
5.2.3.1 Function .............................................................................................. 257
5.2.3.2 Semantics of the service primitive...................................................... 257
5.2.3.3 When generated................................................................................... 257
5.2.3.4 Effect of receipt.......................................
............................................ 258
5.2
.
4 MA-UNITDATA-STATUS.indication.................................................................. 259
5.2.4.1 Function .............................................................................................. 259
5.2.4.2 Semantics of the service primitive...................................................... 259
5.2.4.3 When generated................................................................................... 261
5.2.4.4 Effect of receipt................................................................................... 261
6. Layer management............................................................................................................................. 262
6.1 Overview of management model........................................................................................... 262
6.2 Generic management primitives ............................................................................................ 263
6.3 MLME SAP interface ............................................................................................................ 263
6.3.1 Introduction............................................................................................................ 263
Authorized licensed use limited to: SHANGHAI UNIVERSITY. Downloaded on June 06,2020 at 09:17:02 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2016 IEEE. All rights reserved.
6.3.2 Power management................................................................................................ 264
6.3.2.1 Introduction......................................................................................... 264
6.3.2.2 MLME-POWERMGT.request............................................................ 264
6.3.2.3 MLME-POWERMGT.confirm........................................................... 264
6.3.3 Scan........................................................................................................................ 265
6.3.3.1 Introduction......................................................................................... 265
6.3.3.2 MLME-SCAN.request ........................................................................ 265
6.3.3.3 MLME-SCAN.confirm ....................................................................... 267
6.3.4 Synchronization ..................................................................................................... 276
6.3.4.1 Introduction......................................................................................... 276
6.3.4.2 MLME-JOIN.request .......................................................................... 276
6.3.4.3 MLME-JOIN.confirm ......................................................................... 278
6.3.5 Authenticate ........................................................................................................... 279
6.3.5.1 Introduction......................................................................................... 279
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 279
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 280
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 282
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 283
6.3.6 Deauthenticate ....................................................................................................... 284
6.3.6.1 Introduction......................................................................................... 284
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 284
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 285
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 285
6.3.7 Associate................................................................................................................ 286
6.3.7.1 Introduction......................................................................................... 286
6.3.7.2 MLME-ASSOCIATE.request............................................................. 286
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 288
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 292
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 295
6.3.8 Reassociate............................................................................................................. 297
6.3.8.1 Introduction......................................................................................... 297
6.3.8.2 MLME-REASSOCIATE.request........................................................ 297
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 299
6.3.8.4 MLME-REASSOCIATE.indication ................................................... 303
6.3.8.5 MLME-REASSOCIATE.response ..................................................... 306
6.3.9 Disassociate ........................................................................................................... 309
6.3.9.1 MLME-DISASSOCIATE.request ...................................................... 309
6.3.9.2 MLME-DISASSOCIATE.confirm ..................................................... 309
6.3.9.3 MLME-DISASSOCIATE.indication.................................................. 310
6.3.10 Reset....................................................................................................................... 310
6.3.10.1 Introduction......................................................................................... 310
6.3.10.2 MLME-RESET.request....................................................................... 311
6.3.11 Start........................................................................................................................ 311
6.3.11.1 Introduction......................................................................................... 311
6.3.11.2 MLME-START.request ...................................................................... 311
6.3.11.3 MLME-START.confirm.....................................
................................ 317
6.
3.
12 Stop ........................................................................................................................ 317
6.3.12.1 General................................................................................................ 317
6.3.12.2 MLME-STOP.request......................................................................... 317
6.3.13 Protocol layer model for spectrum management and radio measurement............. 318
6.3.14 Measurement request ............................................................................................. 321
6.3.14.1 Introduction......................................................................................... 321
6.3.14.2 MLME-MREQUEST.request ............................................................. 321
6.3.14.3 MLME-MREQUEST.indication......................................................... 322
Authorized licensed use limited to: SHANGHAI UNIVERSITY. Downloaded on June 06,2020 at 09:17:02 UTC from IEEE Xplore. Restrictions apply.
18
Copyright © 2016 IEEE. All rights reserved.
6.3.15 Channel measurement............................................................................................ 323
6.3.15.1 Introduction......................................................................................... 323
6.3.15.2 MLME-MEASURE.request................................................................ 323
6.3.15.3 MLME-MEASURE.confirm............................................................... 324
6.3.16 Measurement report ............................................................................................... 325
6.3.16.1 Introduction......................................................................................... 325
6.3.16.2 MLME-MREPORT.request................................................................ 325
6.3.16.3 MLME-MREPORT.indication ........................................................... 326
6.3.17 Channel switch....................................................................................................... 327
6.3.17.1 MLME-CHANNELSWITCH.request ................................................ 327
6.3.17.2 MLME-CHANNELSWITCH.confirm ............................................... 328
6.3.17.3 MLME-CHANNELSWITCH.indication............................................ 328
6.3.17.4 MLME-CHANNELSWITCH.response.............................................. 329
6.3.18 TPC request............................................................................................................ 331
6.3.18.1 Introduction......................................................................................... 331
6.3.18.2 MLME-TPCADAPT.request .............................................................. 331
6.3.18.3 MLME-TPCADAPT.confirm............................................................. 331
6.3.19 SetKeys ..................................................................................................................332
6.3.19.1 MLME-SETKEYS.request ................................................................. 332
6.3.20 DeleteKeys............................................................................................................. 333
6.3.20.1 MLME-DELETEKEYS.request ......................................................... 333
6.3.21 MIC (michael) failure event .................................................................................. 334
6.3.21.1 MLME-MICHAELMICFAILURE.indication.................................... 334
6.3.22 EAPOL................................................................................................................... 335
6.3.22.1 MLME-EAPOL.request...................................................................... 335
6.3.22.2 MLME-EAPOL.confirm..................................................................... 336
6.3.23 MLME-PEERKEY-START .................................................................................. 336
6.3.23.1 MLME-PEERKEY-START.request................................................... 336
6.3.24 SetProtection.......................................................................................................... 337
6.3.24.1 MLME-SETPROTECTION.request................................................... 337
6.3.25 MLME-PROTECTEDFRAMEDROPPED ........................................................... 338
6.3.25.1 MLME- PROTECTEDFRAMEDROPPED.indication ...................... 338
6.3.26 TS management interface ...................................................................................... 338
6.3.26.1 General................................................................................................ 338
6.3.26.2 MLME-ADDTS.request ..................................................................... 339
6.3.26.3 MLME-ADDTS.confirm .................................................................... 341
6.3.26.4 MLME-ADDTS.indication................................................................. 344
6.3.26.5 MLME-ADDTS.response................................................................... 346
6.3.26.6 MLME-DELTS.request ...................................................................... 349
6.3.26.7 MLME-DELTS.indication.................................................................. 350
6.3.26.8 MLME-ADDTSRESERVE.request ................................................... 351
6.3.26.9 MLME-ADDTSRESERVE.confirm................................................... 352
6.3.26.10 MLME-ADDTSRESERVE.indication ............................................... 353
6.3.26.11 MLME-ADDTSRESERVE.response ................................................. 354
6.3.27 Management of direct links ................................................................................... 354
6.3.27.1 Introduction......................................................................................... 354
6.3.27.2 MLME-DLS.request ........................................................................... 355
6.3.27.3 MLME-DLS.confirm .......................................................................... 355
6.3.27.4 MLME-DLS.indication.....................................
..
................................ 356
6.3.27.5 MLME-DLS.response......................................................................... 357
6.3.27.6 MLME-DLS-TEARDOWN.request................................................... 358
6.3.27.7 MLME-DLS-TEARDOWN.indication............................................... 359
6.3.28 Higher layer synchronization support.................................................................... 360
6.3.28.1 Introduction......................................................................................... 360
Authorized licensed use limited to: SHANGHAI UNIVERSITY. Downloaded on June 06,2020 at 09:17:02 UTC from IEEE Xplore. Restrictions apply.
19
Copyright © 2016 IEEE. All rights reserved.
6.3.28.2 MLME-HL-SYNC.request ................................................................. 360
6.3.28.3 MLME-HL-SYNC.indication............................................................. 361
6.3.29 Block Ack .............................................................................................................. 361
6.3.29.1 General................................................................................................ 361
6.3.29.2 MLME-ADDBA.request..................................................................... 361
6.3.29.3 MLME-ADDBA.confirm ................................................................... 363
6.3.29.4 MLME-ADDBA.indication ................................................................ 364
6.3.29.5 MLME-ADDBA.response .................................................................. 365
6.3.29.6 MLME-DELBA.request ..................................................................... 367
6.3.29.7 MLME-DELBA.indication................................................................. 368
6.3.30 Schedule element management.............................................................................. 369
6.3.30.1 Introduction......................................................................................... 369
6.3.30.2 MLME-SCHEDULE.request.............................................................. 369
6.3.30.3 MLME-SCHEDULE.indication ......................................................... 369
6.3.31 Vendor-specific action........................................................................................... 370
6.3.31.1 Introduction......................................................................................... 370
6.3.31.2 MLME-VSPECIFIC.request............................................................... 370
6.3.31.3 MLME-VSPECIFIC.indication .......................................................... 371
6.3.32 Neighbor report request ......................................................................................... 372
6.3.32.1 General................................................................................................ 372
6.3.32.2 MLME-NEIGHBORREPREQ.request............................................... 372
6.3.32.3 MLME-NEIGHBORREPREQ.indication .......................................... 373
6.3.33 Neighbor report response....................................................................................... 374
6.3.33.1 General................................................................................................ 374
6.3.33.2 MLME-NEIGHBORREPRESP.request ............................................. 374
6.3.33.3 MLME-NEIGHBORREPRESP.indication......................................... 375
6.3.34 Link Measure Request ........................................................................................... 376
6.3.34.1 General................................................................................................ 376
6.3.34.2 MLME-LINKMEASURE.request ...................................................... 376
6.3.34.3 MLME-LINKMEASURE.confirm..................................................... 377
6.3.35 MLME SAP interface for resource request ........................................................... 378
6.3.35.1 MLME-RESOURCE-REQUEST.request........................................... 378
6.3.35.2 MLME-RESOURCE-REQUEST.indication ...................................... 379
6.3.35.3 MLME-RESOURCE-REQUEST.response ........................................ 380
6.3.35.4 MLME-RESOURCE-REQUEST.confirm ......................................... 380
6.3.35.5 MLME-RESOURCE-REQUEST-LOCAL.request............................ 381
6.3.35.6 MLME-RESOURCE-REQUEST-LOCAL.confirm........................... 382
6.3.36 MLME SAP interface for remote requests ............................................................ 382
6.3.36.1 MLME-REMOTE-REQUEST.request............................................... 382
6.3.36.2 MLME-REMOTE-REQUEST.indication........................................... 383
6.3.37 Extended channel switch announcement ............................................................... 383
6.3.37.1 General................................................................................................ 383
6.3.37.2 MLME-EXTCHANNELSWITCH.request......................................... 384
6.3.37.3 MLME-EXTCHANNELSWITCH.confirm ....................................... 385
6.3.37.4 MLME-EXTCHANNELSWITCH.indication .................................... 385
6.3.37.5 MLME-EXTCHANNELSWITCH.response ...................................... 387
6.3.38 DSE power constraint announcement........................
............................................ 388
6.3.38.
1
General ................................................................................................ 388
6.3.38.2 MLME-DSETPC.request.................................................................... 388
6.3.38.3 MLME-DSETPC.confirm................................................................... 389
6.3.38.4 MLME-DSETPC.indication ............................................................... 390
6.3.38.5 MLME-DSETPC.response ................................................................. 390
6.3.39 Enablement ............................................................................................................ 391
6.3.39.1 General................................................................................................ 391
Authorized licensed use limited to: SHANGHAI UNIVERSITY. Downloaded on June 06,2020 at 09:17:02 UTC from IEEE Xplore. Restrictions apply.
剩余3533页未读,继续阅读
2020-07-24 上传
2023-07-26 上传
2023-07-07 上传
2023-08-18 上传
2023-07-30 上传
2023-09-21 上传
2024-03-14 上传
qq_23993039
- 粉丝: 2
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 磁性吸附笔筒设计创新,行业文档精选
- Java Swing实现的俄罗斯方块游戏代码分享
- 骨折生长的二维与三维模型比较分析
- 水彩花卉与羽毛无缝背景矢量素材
- 设计一种高效的袋料分离装置
- 探索4.20图包.zip的奥秘
- RabbitMQ 3.7.x延时消息交换插件安装与操作指南
- 解决NLTK下载停用词失败的问题
- 多系统平台的并行处理技术研究
- Jekyll项目实战:网页设计作业的入门练习
- discord.js v13按钮分页包实现教程与应用
- SpringBoot与Uniapp结合开发短视频APP实战教程
- Tensorflow学习笔记深度解析:人工智能实践指南
- 无服务器部署管理器:防止错误部署AWS帐户
- 医疗图标矢量素材合集:扁平风格16图标(PNG/EPS/PSD)
- 人工智能基础课程汇报PPT模板下载
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功