没有合适的资源?快使用搜索试试~ 我知道了~
首页802.11ax标准详解:2020年最全更新
802.11ax标准详解:2020年最全更新
下载需积分: 0 | PDF格式 | 188.43MB |
更新于2024-06-19
| 127 浏览量 | 4 下载量 举报
"802.11ax标准是2020年更新的无线局域网(WLAN)技术规范,是对IEEE Std 802.11-2016的修订版,共有7524页,主要涉及WIFI6协议,即第六代Wi-Fi标准。此标准由IEEE计算机学会的局域/城域网络标准委员会制定。"
802.11ax,通常被称为Wi-Fi 6,是IEEE 802.11系列标准的最新版本,旨在提升无线网络的效率、速度和容量。该标准在2020年由IEEE-SA标准委员会批准,针对的是本地和城域网络的特定要求,包括无线局域网的介质访问控制(MAC)和物理层(PHY)规格。
Wi-Fi 6引入了一系列技术创新,以应对日益增长的无线设备连接需求和高密度环境下的性能挑战。其中的关键改进包括:
1. **OFDMA(正交频分多址)**:与前几代802.11标准相比,802.11ax支持在单个传输中同时服务多个设备,显著提高了频谱效率和网络容量。
2. **MU-MIMO(多用户多输入多输出)**:除了支持下行链路MU-MIMO外,802.11ax还引入了上行链路MU-MIMO,允许路由器同时与多个客户端通信,从而提升网络的双向传输能力。
3. **1024-QAM调制**:使用更高效的调制方案,将每个信号载波能承载的数据量增加,从而提高了数据传输速率。
4. **目标唤醒时间(TWT)**:允许设备与接入点协商唤醒和休眠的时间,降低了电池消耗,对物联网(IoT)设备特别有利。
5. **高效帧结构**:通过优化帧头和减少开销,提高数据传输效率。
6. **波束成形**:增强了信号的定向传输,提高了在密集环境中的覆盖范围和信号质量。
802.11ax标准不仅提升了家庭和办公室的Wi-Fi体验,还在公共场所如机场、体育馆和大型会议中心等高人流量区域提供了更好的连接性能。此外,它还考虑到了物联网设备的广泛使用,确保了低功耗设备能够高效地利用网络资源。
802.11ax或Wi-Fi 6通过引入这些先进技术,为用户带来了更快的速度、更高的网络容量、更低的延迟以及更好的能效,是当前无线网络技术的重要进步。对于那些需要处理大量数据传输、支持大量并发设备或寻求低功耗解决方案的环境来说,802.11ax是理想的选择。

13
Copyright © 2021 IEEE. All rights reserved.
Contents
1. Overview.......................................................................................................................................... 149
1.1 Scope...................................................................................................................................... 149
1.2 Purpose................................................................................................................................... 149
1.3 Supplementary information on purpose................................................................................. 149
1.4 Word usage ............................................................................................................................ 150
1.5 Terminology for mathematical, logical, and bit operations................................................... 151
2. Normative references....................................................................................................................... 154
3. Definitions, acronyms, and abbreviations........................................................................................ 158
3.1 Definitions ............................................................................................................................. 158
3.2 Definitions specific to IEEE Std 802.11................................................................................ 173
3.3 Definitions specific to IEEE 802.11 operation in some regulatory domains......................... 205
3.4 Acronyms and abbreviations ................................................................................................. 205
3.5 Abbreviations and acronyms in some regulatory domains.................................................... 218
4. General description .......................................................................................................................... 219
4.1 General description of the architecture.................................................................................. 219
4.2 How wireless local area networks (WLANs) are different.................................................... 219
4.2.1 Introduction............................................................................................................ 219
4.2.2 Wireless station (STA)........................................................................................... 219
4.2.3 Media impact on design and performance ............................................................. 219
4.2.4 The impact of handling mobile STAs.................................................................... 220
4.2.5 Interaction with other IEEE 802® layers............................................................... 220
4.2.6 Interaction with non-IEEE-802 protocols.............................................................. 220
4.3 Components of the IEEE 802.11 architecture ....................................................................... 220
4.3.1 General................................................................................................................... 220
4.3.2 Independent BSS (IBSS) ....................................................................................... 221
4.3.3 Personal BSS (PBSS)............................................................................................. 221
4.3.4 STA membership in a BSS is dynamic.................................................................. 221
4.3.5 Distribution system (DS) concepts ........................................................................ 222
4.3.5.1 Overview............................................................................................. 222
4.3.5.2 Extended service set (ESS): the large coverage network.................... 223
4.3.6 Area concepts......................................................................................................... 224
4.3.7 Integration with non-IEEE-802.11 LANs.............................................................. 225
4.3.8 Robust security network association (RSNA) ....................................................... 226
4.3.9 Centralized coordination service set (CCSS) and extended centralized AP or
PCP clustering (ECAPC) ....................................................................................... 226
4.3.10 QoS BSS ................................................................................................................ 228
4.3.11 Wireless LAN radio measurements ....................................................................... 229
4.3.11.1 General ................................................................................................ 229
4.3.11.2 Beacon................................................................................................. 230
4.3.11.3 Measurement pilot............................................................................... 230
4.3.11.4 Frame .................................................................................................. 230
4.3.11.5 Channel load ....................................................................................... 230
4.3.11.6 Noise histogram .................................................................................. 231
4.3.11.7 STA statistics ...................................................................................... 231
4.3.11.8 Location .............................................................................................. 231
4.3.11.9 Measurement pause............................................................................. 231
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.

14
Copyright © 2021 IEEE. All rights reserved.
4.3.11.10 Neighbor report ................................................................................... 231
4.3.11.11 Link measurement............................................................................... 231
4.3.11.12 Transmit stream/category measurement ............................................. 231
4.3.12 Operation in licensed frequency bands .................................................................. 232
4.3.12.1 General ................................................................................................ 232
4.3.12.2 Dynamic STA enablement (DSE) in licensed bands .......................... 232
4.3.12.3 Contention based protocol (CBP) in nonexclusively licensed bands . 232
4.3.12.4 Using DSE STA identification to resolve interference....................... 232
4.3.12.5 Further coexistence enhancements in nonexclusively licensed bands 232
4.3.13 High-throughput (HT) STA ................................................................................... 232
4.3.14 Sub 1 GHz (S1G) STA .......................................................................................... 233
4.3.14.1 Overview............................................................................................. 233
4.3.14.2 S1G relay............................................................................................. 234
4.3.15 Very high throughput (VHT) STA ........................................................................ 234
4.3.16 Television very high throughput (TVHT) STA ..................................................... 235
4.3.17 STA transmission of Data frames outside the context of a BSS ........................... 237
4.3.18 Tunneled direct-link setup ..................................................................................... 237
4.3.19 Wireless network management.............................................................................. 237
4.3.19.1 Overview............................................................................................. 237
4.3.19.2 BSS max idle period management ...................................................... 238
4.3.19.3 BSS transition management ................................................................ 238
4.3.19.4 Channel usage ..................................................................................... 238
4.3.19.5 Collocated interference reporting........................................................ 239
4.3.19.6 Diagnostic reporting............................................................................ 239
4.3.19.7 Directed multicast service (DMS)....................................................... 239
4.3.19.8 Event reporting.................................................................................... 239
4.3.19.9 Flexible multicast service (FMS)........................................................ 239
4.3.19.10 Location services................................................................................. 239
4.3.19.11 Multicast Diagnostic report................................................................. 239
4.3.19.12 Multiple BSSID capability.................................................................. 240
4.3.19.13 Proxy ARP .......................................................................................... 240
4.3.19.14 QoS traffic capability .......................................................................... 240
4.3.19.15 SSID list .............................................................................................. 240
4.3.19.16 Triggered STA statistics...................................................................... 240
4.3.19.17 TIM broadcast ..................................................................................... 240
4.3.19.18 Timing measurement........................................................................... 240
4.3.19.19 Fine timing measurement.................................................................... 240
4.3.19.20 Traffic filtering service ....................................................................... 241
4.3.19.21 U-APSD coexistence........................................................................... 241
4.3.19.22 WNM notification ............................................................................... 241
4.3.19.23 WNM sleep mode ............................................................................... 241
4.3.20 Subscription service provider network (SSPN) interface ...................................... 241
4.3.21 Mesh BSS .............................................................................................................. 242
4.3.21.1 General ................................................................................................ 242
4.3.21.2 Overview of the mesh BSS ................................................................. 242
4.3.21.3 Mesh STA ........................................................................................... 243
4.3.21.4 IEEE 802.11 components and mesh BSS ........................................... 243
4.3.21.5 Introduction to mesh functions ........................................................... 245
4.3.22 DMG STA.............................................................................................................. 248
4.3.23 DMG relay ............................................................................................................. 249
4.3.24 Robust audio video (AV) streaming ...................................................................... 249
4.3.24.1 Introduction......................................................................................... 249
4.3.24.2 Groupcast with retries (GCR) ............................................................. 249
4.3.24.3 Stream classification service (SCS) .................................................... 250
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.

15
Copyright © 2021 IEEE. All rights reserved.
4.3.24.4 Mirrored stream classification service (MSCS).................................. 250
4.3.24.5 Overlapping BSS (OBSS) management ............................................. 250
4.3.24.6 Interworking with IEEE 802.1Q Stream Reservation Protocol (SRP) 250
4.3.24.7 Intra-access category prioritization..................................................... 250
4.3.25 Operation under geolocation database (GDB) control .......................................... 251
4.3.26 CDMG STA........................................................................................................... 252
4.3.27 CMMG STA .......................................................................................................... 253
4.3.28 General link (GLK)................................................................................................ 254
4.3.28.1 General ................................................................................................ 254
4.3.28.2 Selective reception of group addressed frames................................... 254
4.3.28.3 GLK Service Sets................................................................................ 255
4.3.29 Ethertype protocol discrimination (EPD) .............................................................. 259
4.4 Logical service interfaces ...................................................................................................... 260
4.4.1 General................................................................................................................... 260
4.4.2 SS ........................................................................................................................... 260
4.4.3 PBSS control point service (PCPS) ....................................................................... 261
4.4.4 DSS ........................................................................................................................ 261
4.5 Overview of the services........................................................................................................ 262
4.5.1 General................................................................................................................... 262
4.5.2 Distribution of MSDUs within a DS...................................................................... 263
4.5.2.1 Distribution ......................................................................................... 263
4.5.2.2 Integration ........................................................................................... 264
4.5.2.3 QoS traffic scheduling ........................................................................ 264
4.5.3 Connectivity-related services................................................................................. 264
4.5.3.1 General ................................................................................................ 264
4.5.3.2 Mobility types ..................................................................................... 265
4.5.3.3 Association.......................................................................................... 265
4.5.3.4 Reassociation ...................................................................................... 266
4.5.3.5 Disassociation ..................................................................................... 266
4.5.4 Access control and data confidentiality services ................................................... 267
4.5.4.1 General ................................................................................................ 267
4.5.4.2 Authentication..................................................................................... 267
4.5.4.3 Deauthentication ................................................................................. 268
4.5.4.4 Data confidentiality............................................................................. 269
4.5.4.5 Key management................................................................................. 270
4.5.4.6 Data origin authenticity....................................................................... 270
4.5.4.7 Replay detection.................................................................................. 270
4.5.4.8 Fast BSS transition.............................................................................. 270
4.5.4.9 Management frame protection ............................................................ 270
4.5.4.10 MAC privacy enhancements............................................................... 271
4.5.5 Spectrum management services............................................................................. 271
4.5.5.1 General ................................................................................................ 271
4.5.5.2 TPC ..................................................................................................... 271
4.5.5.3 DFS ..................................................................................................... 271
4.5.6 Traffic differentiation and QoS support................................................................. 272
4.5.6.1 General ................................................................................................ 272
4.5.6.2 Quality-of-service management frame support................................... 272
4.5.7 Support for higher layer timer synchronization ..................................................... 272
4.5.8 Radio measurement service ................................................................................... 273
4.5.9 Interworking with external networks ..................................................................... 273
4.5.9.1 General ................................................................................................ 273
4.5.9.2 Preassociation discovery (PAD) ......................................................... 274
4.5.10 Generic advertisement service (GAS) ................................................................... 275
4.6 Multiple logical address spaces ............................................................................................. 276
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.

16
Copyright © 2021 IEEE. All rights reserved.
4.7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 276
4.8 Differences between ESS and MBSS LANs ......................................................................... 278
4.9 Reference model .................................................................................................................... 279
4.9.1 General................................................................................................................... 279
4.9.2 Interworking reference model................................................................................ 279
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 281
4.9.4 Reference model for multi-band operation ............................................................ 282
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 284
4.10.1 General................................................................................................................... 284
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 284
4.10.3 Infrastructure functional model overview.............................................................. 284
4.10.3.1 General ................................................................................................ 284
4.10.3.2 AKM operations with AS ................................................................... 284
4.10.3.3 AKM operations with a password or PSK.......................................... 287
4.10.3.4 Alternate operations with PSK............................................................ 288
4.10.3.5 Disassociation ..................................................................................... 288
4.10.3.6 AKM operations using FILS authentication ....................................... 288
4.10.4 IBSS functional model description ........................................................................ 289
4.10.4.1 General ................................................................................................ 289
4.10.4.2 Key usage............................................................................................ 289
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 290
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 291
4.10.5 PBSS functional model description ....................................................................... 292
4.10.6 Authenticator-to-AS protocol ................................................................................ 293
4.10.7 PMKSA caching .................................................................................................... 293
4.10.8 Protection of group addressed robust Management frames................................... 294
5. MAC service definition ................................................................................................................... 295
5.1 Overview of MAC services ................................................................................................... 295
5.1.1 Data service............................................................................................................ 295
5.1.1.1 General ................................................................................................ 295
5.1.1.2 Determination of UP ........................................................................... 295
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 295
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 296
5.1.2 Security services .................................................................................................... 297
5.1.3 MSDU ordering ..................................................................................................... 297
5.1.4 MSDU format ........................................................................................................ 298
5.1.5 MAC data service architecture .............................................................................. 299
5.1.5.1 General ................................................................................................ 299
5.1.5.2 Non-GLK non-AP STA role ............................................................... 302
5.1.5.3 Non-GLK AP role............................................................................... 302
5.1.5.4 Non-GLK mesh STA role ................................................................... 303
5.1.5.5 Mesh gate role..................................................................................... 303
5.1.5.6 S1G relay............................................................................................. 303
5.1.5.7 GLK STA role..................................................................................... 305
5.1.5.8 GLK AP role ....................................................................................... 305
5.1.5.9 GLK mesh STA role ........................................................................... 305
5.2 MAC data service specification............................................................................................. 307
5.2.1 General................................................................................................................... 307
5.2.2 GLK MAC data service specification.................................................................... 307
5.2.3 MA-UNITDATA.request ...................................................................................... 307
5.2.3.1 Function .............................................................................................. 307
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.

17
Copyright © 2021 IEEE. All rights reserved.
5.2.3.2 Semantics of the service primitive ...................................................... 307
5.2.3.3 When generated................................................................................... 308
5.2.3.4 Effect of receipt................................................................................... 308
5.2.4 MA-UNITDATA.indication .................................................................................. 310
5.2.4.1 Function .............................................................................................. 310
5.2.4.2 Semantics of the service primitive ...................................................... 310
5.2.4.3 When generated................................................................................... 311
5.2.4.4 Effect of receipt................................................................................... 311
5.2.5 MA-UNITDATA-STATUS.indication.................................................................. 313
5.2.5.1 Function .............................................................................................. 313
5.2.5.2 Semantics of the service primitive ...................................................... 313
5.2.5.3 When generated................................................................................... 314
5.2.5.4 Effect of receipt................................................................................... 314
6. Layer management........................................................................................................................... 315
6.1 Overview of management model........................................................................................... 315
6.2 Generic management primitives ............................................................................................ 316
6.3 MLME SAP interface ............................................................................................................ 316
6.3.1 Introduction............................................................................................................ 316
6.3.2 Power management................................................................................................ 317
6.3.2.1 Introduction......................................................................................... 317
6.3.2.2 MLME-POWERMGT.request............................................................ 317
6.3.2.3 MLME-POWERMGT.confirm........................................................... 318
6.3.3 Scan........................................................................................................................ 318
6.3.3.1 Introduction......................................................................................... 318
6.3.3.2 MLME-SCAN.request ........................................................................ 318
6.3.3.3 MLME-SCAN.confirm ....................................................................... 322
6.3.3.4 MLME-SCAN-STOP.request ............................................................. 337
6.3.4 Synchronization ..................................................................................................... 337
6.3.4.1 Introduction......................................................................................... 337
6.3.4.2 MLME-JOIN.request .......................................................................... 337
6.3.4.3 MLME-JOIN.confirm ......................................................................... 340
6.3.5 Authenticate ........................................................................................................... 341
6.3.5.1 Introduction......................................................................................... 341
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 341
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 342
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 344
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 345
6.3.6 Deauthenticate ....................................................................................................... 347
6.3.6.1 Introduction......................................................................................... 347
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 347
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 347
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 348
6.3.7 Associate................................................................................................................ 348
6.3.7.1 Introduction......................................................................................... 348
6.3.7.2 MLME-ASSOCIATE.request............................................................. 349
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 352
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 358
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 363
6.3.8 Reassociate............................................................................................................. 367
6.3.8.1 Introduction......................................................................................... 367
6.3.8.2 MLME-REASSOCIATE.request........................................................ 367
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 371
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
剩余7523页未读,继续阅读
相关推荐









WYCSZDS
- 粉丝: 0
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

最新资源
- 武汉大学数字图像处理课程课件精要
- 搭建个性化知识付费平台——Laravel开发MeEdu教程
- SSD7练习7完整解答指南
- Android中文API合集第三版:开发者必备指南
- Python测试自动化实践:深入理解更多测试案例
- 中国风室内装饰网站模板设计发布
- Android情景模式中音量定时控制与铃声设置技巧
- 温度城市的TypeScript实践应用
- 新版高通QPST刷机工具下载支持高通CPU
- C++实现24点问题求解的源代码
- 核电厂水处理系统的自动化控制解决方案
- 自定义进度条组件AMProgressView用于统计与下载进度展示
- 中国古典红木家具网页模板免费下载
- CSS定位技术之Position-master解析
- 复选框状态持久化及其日期同步技术
- Winform版HTML编辑器:强大功能与广泛适用性
安全验证
文档复制为VIP权益,开通VIP直接复制
