没有合适的资源?快使用搜索试试~ 我知道了~
首页802.11ax标准详解:2020年最全更新
802.11ax标准详解:2020年最全更新
需积分: 0 4 下载量 51 浏览量
更新于2024-06-19
收藏 188.43MB PDF 举报
"802.11ax标准是2020年更新的无线局域网(WLAN)技术规范,是对IEEE Std 802.11-2016的修订版,共有7524页,主要涉及WIFI6协议,即第六代Wi-Fi标准。此标准由IEEE计算机学会的局域/城域网络标准委员会制定。"
802.11ax,通常被称为Wi-Fi 6,是IEEE 802.11系列标准的最新版本,旨在提升无线网络的效率、速度和容量。该标准在2020年由IEEE-SA标准委员会批准,针对的是本地和城域网络的特定要求,包括无线局域网的介质访问控制(MAC)和物理层(PHY)规格。
Wi-Fi 6引入了一系列技术创新,以应对日益增长的无线设备连接需求和高密度环境下的性能挑战。其中的关键改进包括:
1. **OFDMA(正交频分多址)**:与前几代802.11标准相比,802.11ax支持在单个传输中同时服务多个设备,显著提高了频谱效率和网络容量。
2. **MU-MIMO(多用户多输入多输出)**:除了支持下行链路MU-MIMO外,802.11ax还引入了上行链路MU-MIMO,允许路由器同时与多个客户端通信,从而提升网络的双向传输能力。
3. **1024-QAM调制**:使用更高效的调制方案,将每个信号载波能承载的数据量增加,从而提高了数据传输速率。
4. **目标唤醒时间(TWT)**:允许设备与接入点协商唤醒和休眠的时间,降低了电池消耗,对物联网(IoT)设备特别有利。
5. **高效帧结构**:通过优化帧头和减少开销,提高数据传输效率。
6. **波束成形**:增强了信号的定向传输,提高了在密集环境中的覆盖范围和信号质量。
802.11ax标准不仅提升了家庭和办公室的Wi-Fi体验,还在公共场所如机场、体育馆和大型会议中心等高人流量区域提供了更好的连接性能。此外,它还考虑到了物联网设备的广泛使用,确保了低功耗设备能够高效地利用网络资源。
802.11ax或Wi-Fi 6通过引入这些先进技术,为用户带来了更快的速度、更高的网络容量、更低的延迟以及更好的能效,是当前无线网络技术的重要进步。对于那些需要处理大量数据传输、支持大量并发设备或寻求低功耗解决方案的环境来说,802.11ax是理想的选择。
13
Copyright © 2021 IEEE. All rights reserved.
Contents
1. Overview.......................................................................................................................................... 149
1.1 Scope...................................................................................................................................... 149
1.2 Purpose................................................................................................................................... 149
1.3 Supplementary information on purpose................................................................................. 149
1.4 Word usage ............................................................................................................................ 150
1.5 Terminology for mathematical, logical, and bit operations................................................... 151
2. Normative references....................................................................................................................... 154
3. Definitions, acronyms, and abbreviations........................................................................................ 158
3.1 Definitions ............................................................................................................................. 158
3.2 Definitions specific to IEEE Std 802.11................................................................................ 173
3.3 Definitions specific to IEEE 802.11 operation in some regulatory domains......................... 205
3.4 Acronyms and abbreviations ................................................................................................. 205
3.5 Abbreviations and acronyms in some regulatory domains.................................................... 218
4. General description .......................................................................................................................... 219
4.1 General description of the architecture.................................................................................. 219
4.2 How wireless local area networks (WLANs) are different.................................................... 219
4.2.1 Introduction............................................................................................................ 219
4.2.2 Wireless station (STA)........................................................................................... 219
4.2.3 Media impact on design and performance ............................................................. 219
4.2.4 The impact of handling mobile STAs.................................................................... 220
4.2.5 Interaction with other IEEE 802® layers............................................................... 220
4.2.6 Interaction with non-IEEE-802 protocols.............................................................. 220
4.3 Components of the IEEE 802.11 architecture ....................................................................... 220
4.3.1 General................................................................................................................... 220
4.3.2 Independent BSS (IBSS) ....................................................................................... 221
4.3.3 Personal BSS (PBSS)............................................................................................. 221
4.3.4 STA membership in a BSS is dynamic.................................................................. 221
4.3.5 Distribution system (DS) concepts ........................................................................ 222
4.3.5.1 Overview............................................................................................. 222
4.3.5.2 Extended service set (ESS): the large coverage network.................... 223
4.3.6 Area concepts......................................................................................................... 224
4.3.7 Integration with non-IEEE-802.11 LANs.............................................................. 225
4.3.8 Robust security network association (RSNA) ....................................................... 226
4.3.9 Centralized coordination service set (CCSS) and extended centralized AP or
PCP clustering (ECAPC) ....................................................................................... 226
4.3.10 QoS BSS ................................................................................................................ 228
4.3.11 Wireless LAN radio measurements ....................................................................... 229
4.3.11.1 General ................................................................................................ 229
4.3.11.2 Beacon................................................................................................. 230
4.3.11.3 Measurement pilot............................................................................... 230
4.3.11.4 Frame .................................................................................................. 230
4.3.11.5 Channel load ....................................................................................... 230
4.3.11.6 Noise histogram .................................................................................. 231
4.3.11.7 STA statistics ...................................................................................... 231
4.3.11.8 Location .............................................................................................. 231
4.3.11.9 Measurement pause............................................................................. 231
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
14
Copyright © 2021 IEEE. All rights reserved.
4.3.11.10 Neighbor report ................................................................................... 231
4.3.11.11 Link measurement............................................................................... 231
4.3.11.12 Transmit stream/category measurement ............................................. 231
4.3.12 Operation in licensed frequency bands .................................................................. 232
4.3.12.1 General ................................................................................................ 232
4.3.12.2 Dynamic STA enablement (DSE) in licensed bands .......................... 232
4.3.12.3 Contention based protocol (CBP) in nonexclusively licensed bands . 232
4.3.12.4 Using DSE STA identification to resolve interference....................... 232
4.3.12.5 Further coexistence enhancements in nonexclusively licensed bands 232
4.3.13 High-throughput (HT) STA ................................................................................... 232
4.3.14 Sub 1 GHz (S1G) STA .......................................................................................... 233
4.3.14.1 Overview............................................................................................. 233
4.3.14.2 S1G relay............................................................................................. 234
4.3.15 Very high throughput (VHT) STA ........................................................................ 234
4.3.16 Television very high throughput (TVHT) STA ..................................................... 235
4.3.17 STA transmission of Data frames outside the context of a BSS ........................... 237
4.3.18 Tunneled direct-link setup ..................................................................................... 237
4.3.19 Wireless network management.............................................................................. 237
4.3.19.1 Overview............................................................................................. 237
4.3.19.2 BSS max idle period management ...................................................... 238
4.3.19.3 BSS transition management ................................................................ 238
4.3.19.4 Channel usage ..................................................................................... 238
4.3.19.5 Collocated interference reporting........................................................ 239
4.3.19.6 Diagnostic reporting............................................................................ 239
4.3.19.7 Directed multicast service (DMS)....................................................... 239
4.3.19.8 Event reporting.................................................................................... 239
4.3.19.9 Flexible multicast service (FMS)........................................................ 239
4.3.19.10 Location services................................................................................. 239
4.3.19.11 Multicast Diagnostic report................................................................. 239
4.3.19.12 Multiple BSSID capability.................................................................. 240
4.3.19.13 Proxy ARP .......................................................................................... 240
4.3.19.14 QoS traffic capability .......................................................................... 240
4.3.19.15 SSID list .............................................................................................. 240
4.3.19.16 Triggered STA statistics...................................................................... 240
4.3.19.17 TIM broadcast ..................................................................................... 240
4.3.19.18 Timing measurement........................................................................... 240
4.3.19.19 Fine timing measurement.................................................................... 240
4.3.19.20 Traffic filtering service ....................................................................... 241
4.3.19.21 U-APSD coexistence........................................................................... 241
4.3.19.22 WNM notification ............................................................................... 241
4.3.19.23 WNM sleep mode ............................................................................... 241
4.3.20 Subscription service provider network (SSPN) interface ...................................... 241
4.3.21 Mesh BSS .............................................................................................................. 242
4.3.21.1 General ................................................................................................ 242
4.3.21.2 Overview of the mesh BSS ................................................................. 242
4.3.21.3 Mesh STA ........................................................................................... 243
4.3.21.4 IEEE 802.11 components and mesh BSS ........................................... 243
4.3.21.5 Introduction to mesh functions ........................................................... 245
4.3.22 DMG STA.............................................................................................................. 248
4.3.23 DMG relay ............................................................................................................. 249
4.3.24 Robust audio video (AV) streaming ...................................................................... 249
4.3.24.1 Introduction......................................................................................... 249
4.3.24.2 Groupcast with retries (GCR) ............................................................. 249
4.3.24.3 Stream classification service (SCS) .................................................... 250
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
15
Copyright © 2021 IEEE. All rights reserved.
4.3.24.4 Mirrored stream classification service (MSCS).................................. 250
4.3.24.5 Overlapping BSS (OBSS) management ............................................. 250
4.3.24.6 Interworking with IEEE 802.1Q Stream Reservation Protocol (SRP) 250
4.3.24.7 Intra-access category prioritization..................................................... 250
4.3.25 Operation under geolocation database (GDB) control .......................................... 251
4.3.26 CDMG STA........................................................................................................... 252
4.3.27 CMMG STA .......................................................................................................... 253
4.3.28 General link (GLK)................................................................................................ 254
4.3.28.1 General ................................................................................................ 254
4.3.28.2 Selective reception of group addressed frames................................... 254
4.3.28.3 GLK Service Sets................................................................................ 255
4.3.29 Ethertype protocol discrimination (EPD) .............................................................. 259
4.4 Logical service interfaces ...................................................................................................... 260
4.4.1 General................................................................................................................... 260
4.4.2 SS ........................................................................................................................... 260
4.4.3 PBSS control point service (PCPS) ....................................................................... 261
4.4.4 DSS ........................................................................................................................ 261
4.5 Overview of the services........................................................................................................ 262
4.5.1 General................................................................................................................... 262
4.5.2 Distribution of MSDUs within a DS...................................................................... 263
4.5.2.1 Distribution ......................................................................................... 263
4.5.2.2 Integration ........................................................................................... 264
4.5.2.3 QoS traffic scheduling ........................................................................ 264
4.5.3 Connectivity-related services................................................................................. 264
4.5.3.1 General ................................................................................................ 264
4.5.3.2 Mobility types ..................................................................................... 265
4.5.3.3 Association.......................................................................................... 265
4.5.3.4 Reassociation ...................................................................................... 266
4.5.3.5 Disassociation ..................................................................................... 266
4.5.4 Access control and data confidentiality services ................................................... 267
4.5.4.1 General ................................................................................................ 267
4.5.4.2 Authentication..................................................................................... 267
4.5.4.3 Deauthentication ................................................................................. 268
4.5.4.4 Data confidentiality............................................................................. 269
4.5.4.5 Key management................................................................................. 270
4.5.4.6 Data origin authenticity....................................................................... 270
4.5.4.7 Replay detection.................................................................................. 270
4.5.4.8 Fast BSS transition.............................................................................. 270
4.5.4.9 Management frame protection ............................................................ 270
4.5.4.10 MAC privacy enhancements............................................................... 271
4.5.5 Spectrum management services............................................................................. 271
4.5.5.1 General ................................................................................................ 271
4.5.5.2 TPC ..................................................................................................... 271
4.5.5.3 DFS ..................................................................................................... 271
4.5.6 Traffic differentiation and QoS support................................................................. 272
4.5.6.1 General ................................................................................................ 272
4.5.6.2 Quality-of-service management frame support................................... 272
4.5.7 Support for higher layer timer synchronization ..................................................... 272
4.5.8 Radio measurement service ................................................................................... 273
4.5.9 Interworking with external networks ..................................................................... 273
4.5.9.1 General ................................................................................................ 273
4.5.9.2 Preassociation discovery (PAD) ......................................................... 274
4.5.10 Generic advertisement service (GAS) ................................................................... 275
4.6 Multiple logical address spaces ............................................................................................. 276
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2021 IEEE. All rights reserved.
4.7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 276
4.8 Differences between ESS and MBSS LANs ......................................................................... 278
4.9 Reference model .................................................................................................................... 279
4.9.1 General................................................................................................................... 279
4.9.2 Interworking reference model................................................................................ 279
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 281
4.9.4 Reference model for multi-band operation ............................................................ 282
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 284
4.10.1 General................................................................................................................... 284
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 284
4.10.3 Infrastructure functional model overview.............................................................. 284
4.10.3.1 General ................................................................................................ 284
4.10.3.2 AKM operations with AS ................................................................... 284
4.10.3.3 AKM operations with a password or PSK.......................................... 287
4.10.3.4 Alternate operations with PSK............................................................ 288
4.10.3.5 Disassociation ..................................................................................... 288
4.10.3.6 AKM operations using FILS authentication ....................................... 288
4.10.4 IBSS functional model description ........................................................................ 289
4.10.4.1 General ................................................................................................ 289
4.10.4.2 Key usage............................................................................................ 289
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 290
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 291
4.10.5 PBSS functional model description ....................................................................... 292
4.10.6 Authenticator-to-AS protocol ................................................................................ 293
4.10.7 PMKSA caching .................................................................................................... 293
4.10.8 Protection of group addressed robust Management frames................................... 294
5. MAC service definition ................................................................................................................... 295
5.1 Overview of MAC services ................................................................................................... 295
5.1.1 Data service............................................................................................................ 295
5.1.1.1 General ................................................................................................ 295
5.1.1.2 Determination of UP ........................................................................... 295
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 295
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 296
5.1.2 Security services .................................................................................................... 297
5.1.3 MSDU ordering ..................................................................................................... 297
5.1.4 MSDU format ........................................................................................................ 298
5.1.5 MAC data service architecture .............................................................................. 299
5.1.5.1 General ................................................................................................ 299
5.1.5.2 Non-GLK non-AP STA role ............................................................... 302
5.1.5.3 Non-GLK AP role............................................................................... 302
5.1.5.4 Non-GLK mesh STA role ................................................................... 303
5.1.5.5 Mesh gate role..................................................................................... 303
5.1.5.6 S1G relay............................................................................................. 303
5.1.5.7 GLK STA role..................................................................................... 305
5.1.5.8 GLK AP role ....................................................................................... 305
5.1.5.9 GLK mesh STA role ........................................................................... 305
5.2 MAC data service specification............................................................................................. 307
5.2.1 General................................................................................................................... 307
5.2.2 GLK MAC data service specification.................................................................... 307
5.2.3 MA-UNITDATA.request ...................................................................................... 307
5.2.3.1 Function .............................................................................................. 307
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2021 IEEE. All rights reserved.
5.2.3.2 Semantics of the service primitive ...................................................... 307
5.2.3.3 When generated................................................................................... 308
5.2.3.4 Effect of receipt................................................................................... 308
5.2.4 MA-UNITDATA.indication .................................................................................. 310
5.2.4.1 Function .............................................................................................. 310
5.2.4.2 Semantics of the service primitive ...................................................... 310
5.2.4.3 When generated................................................................................... 311
5.2.4.4 Effect of receipt................................................................................... 311
5.2.5 MA-UNITDATA-STATUS.indication.................................................................. 313
5.2.5.1 Function .............................................................................................. 313
5.2.5.2 Semantics of the service primitive ...................................................... 313
5.2.5.3 When generated................................................................................... 314
5.2.5.4 Effect of receipt................................................................................... 314
6. Layer management........................................................................................................................... 315
6.1 Overview of management model........................................................................................... 315
6.2 Generic management primitives ............................................................................................ 316
6.3 MLME SAP interface ............................................................................................................ 316
6.3.1 Introduction............................................................................................................ 316
6.3.2 Power management................................................................................................ 317
6.3.2.1 Introduction......................................................................................... 317
6.3.2.2 MLME-POWERMGT.request............................................................ 317
6.3.2.3 MLME-POWERMGT.confirm........................................................... 318
6.3.3 Scan........................................................................................................................ 318
6.3.3.1 Introduction......................................................................................... 318
6.3.3.2 MLME-SCAN.request ........................................................................ 318
6.3.3.3 MLME-SCAN.confirm ....................................................................... 322
6.3.3.4 MLME-SCAN-STOP.request ............................................................. 337
6.3.4 Synchronization ..................................................................................................... 337
6.3.4.1 Introduction......................................................................................... 337
6.3.4.2 MLME-JOIN.request .......................................................................... 337
6.3.4.3 MLME-JOIN.confirm ......................................................................... 340
6.3.5 Authenticate ........................................................................................................... 341
6.3.5.1 Introduction......................................................................................... 341
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 341
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 342
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 344
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 345
6.3.6 Deauthenticate ....................................................................................................... 347
6.3.6.1 Introduction......................................................................................... 347
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 347
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 347
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 348
6.3.7 Associate................................................................................................................ 348
6.3.7.1 Introduction......................................................................................... 348
6.3.7.2 MLME-ASSOCIATE.request............................................................. 349
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 352
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 358
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 363
6.3.8 Reassociate............................................................................................................. 367
6.3.8.1 Introduction......................................................................................... 367
6.3.8.2 MLME-REASSOCIATE.request........................................................ 367
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 371
Authorized licensed use limited to: The Hong Kong University of Science and Technology (Guangzhou). Downloaded on November 16,2023 at 12:43:17 UTC from IEEE Xplore. Restrictions apply.
剩余7523页未读,继续阅读
2018-10-25 上传
2022-07-15 上传
2021-10-08 上传
2023-05-17 上传
2019-02-28 上传
2020-06-04 上传
WYCSZDS
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 高清艺术文字图标资源,PNG和ICO格式免费下载
- mui框架HTML5应用界面组件使用示例教程
- Vue.js开发利器:chrome-vue-devtools插件解析
- 掌握ElectronBrowserJS:打造跨平台电子应用
- 前端导师教程:构建与部署社交证明页面
- Java多线程与线程安全在断点续传中的实现
- 免Root一键卸载安卓预装应用教程
- 易语言实现高级表格滚动条完美控制技巧
- 超声波测距尺的源码实现
- 数据可视化与交互:构建易用的数据界面
- 实现Discourse外聘回复自动标记的简易插件
- 链表的头插法与尾插法实现及长度计算
- Playwright与Typescript及Mocha集成:自动化UI测试实践指南
- 128x128像素线性工具图标下载集合
- 易语言安装包程序增强版:智能导入与重复库过滤
- 利用AJAX与Spotify API在Google地图中探索世界音乐排行榜
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功