没有合适的资源?快使用搜索试试~ 我知道了~
首页802.11-2007:无线局域网MAC与PHY规格标准解读
"802.11-2007是IEEE针对无线局域网(Wireless LAN)制定的一项标准,它详细规定了介质访问控制(MAC)层和物理层(PHY)的规范,旨在促进信息技术领域的电信与信息交换。这个版本是对1999年版802.11标准的修订。该标准由IEEE计算机学会的局域网/城域网标准委员会赞助并批准。"
802.11-2007标准是无线局域网络通信的核心依据,它的主要目标是确保不同厂商的设备之间可以互操作,从而实现广泛的无线网络覆盖。以下是对802.11-2007标准中的关键知识点的详细说明:
1. **介质访问控制(MAC)层**:这部分定义了如何在共享无线介质上有效地传输数据,避免冲突。802.11采用了载波侦听多路访问/冲突避免(CSMA/CA)机制,而非有线网络中常见的CSMA/CD。此外,MAC层还包含认证、关联、去关联、漫游和功率管理等子层。
2. **物理层(PHY)**:802.11-2007标准支持多种PHY类型,包括原始的802.11(2Mbps、11Mbps)、802.11a(54Mbps,使用5GHz频段)、802.11b(11Mbps,使用2.4GHz频段)以及后来加入的802.11g(54Mbps,也使用2.4GHz频段)。每个PHY层都定义了不同的调制解调技术和数据传输速率。
3. **频谱和频道划分**:2.4GHz频段被划分为多个非重叠信道,如1, 6, 和11。在5GHz频段,有更多的非重叠信道可用,提供更宽的带宽选择。
4. **服务质量(QoS)**:802.11e引入了WMM(Wi-Fi Multimedia)以提供QoS保证,确保视频、音频等实时应用的顺畅传输。
5. **安全**:802.11i引入了WPA(Wi-Fi Protected Access)作为安全增强措施,后来的802.11n支持WPA2,采用AES加密提高安全性。
6. **扩展服务集(ESS)**:802.11允许创建ESS,即多个接入点(AP)组成的单个无线网络,允许用户在网络覆盖范围内无缝漫游。
7. **传输速率和效率**:802.11-2007标准的修订提升了传输速率,例如802.11g和802.11a支持的最大理论速率分别达到54Mbps和54Mbps,相比最初的802.11b(11Mbps)有了显著提升。
8. **帧结构**:802.11数据帧包含了前导符、同步字段、MAC头、有效载荷和尾部,用于确保数据的正确接收和解码。
9. **漫游**:当移动设备离开当前AP的覆盖范围时,802.11标准提供了自动漫游功能,允许设备自动连接到信号更强的AP。
10. **射频管理**:标准还包括了射频资源的管理和协调,以优化无线信号质量,避免干扰。
802.11-2007是无线局域网技术发展的一个重要里程碑,它为后续的802.11n、802.11ac、802.11ax(Wi-Fi 6)等高速标准奠定了基础。通过不断的技术演进,802.11标准继续推动着无线通信技术的进步,满足日益增长的数据传输需求。
xiv Copyright © 2007 IEEE. All rights reserved.
8.2.1 Wired equivalent privacy (WEP)........................................................................... 158
8.2.1.1 WEP overview ..................................................................................... 158
8.2.1.2 WEP MPDU format............................................................................. 158
8.2.1.3 WEP state............................................................................................. 158
8.2.1.4 WEP procedures .................................................................................. 159
8.2.2 Pre-RSNA authentication ...................................................................................... 161
8.2.2.1 Overview.............................................................................................. 161
8.2.2.2 Open System authentication ................................................................ 161
8.2.2.3 Shared Key authentication ................................................................... 162
8.3 RSNA data confidentiality protocols .................................................................................... 165
8.3.1 Overview................................................................................................................ 165
8.3.2 Temporal Key Integrity Protocol (TKIP) .............................................................. 165
8.3.2.1 TKIP overview..................................................................................... 165
8.3.2.2 TKIP MPDU formats........................................................................... 168
8.3.2.3 TKIP MIC ............................................................................................ 169
8.3.2.4 TKIP countermeasures procedures ...................................................... 171
8.3.2.5 TKIP mixing function.......................................................................... 175
8.3.2.6 TKIP replay protection procedures...................................................... 179
8.3.3 CTR with CBC-MAC Protocol (CCMP)............................................................... 179
8.3.3.1 CCMP overview .................................................................................. 179
8.3.3.2 CCMP MPDU format .......................................................................... 180
8.3.3.3 CCMP cryptographic encapsulation .................................................... 181
8.3.3.4 CCMP decapsulation ........................................................................... 184
8.4 RSNA security association management .............................................................................. 185
8.4.1 Security associations.............................................................................................. 185
8.4.1.1 Security association definitions ........................................................... 185
8.4.1.2 Security association life cycle.............................................................. 187
8.4.2 RSNA selection...................................................................................................... 189
8.4.3 RSNA policy selection in an ESS.......................................................................... 189
8.4.3.1 TSN policy selection in an ESS........................................................... 190
8.4.4 RSNA policy selection in an IBSS ........................................................................ 190
8.4.4.1 TSN policy selection in an IBSS ......................................................... 191
8.4.5 RSN management of the IEEE 802.1X Controlled Port........................................ 191
8.4.6 RSNA authentication in an ESS ............................................................................ 192
8.4.6.1 Preauthentication and RSNA key management................................... 192
8.4.6.2 Cached PMKSAs and RSNA key management .................................. 193
8.4.7 RSNA authentication in an IBSS........................................................................... 193
8.4.8 RSNA key management in an ESS........................................................................ 195
8.4.9 RSNA key management in an IBSS ...................................................................... 195
8.4.10 RSNA security association termination................................................................. 196
8.5 Keys and key distribution ..................................................................................................... 196
8.5.1 Key hierarchy......................................................................................................... 196
8.5.1.1 PRF ...................................................................................................... 197
8.5.1.2 Pairwise key hierarchy......................................................................... 198
8.5.1.3 Group key hierarchy ............................................................................ 200
8.5.1.4 PeerKey key hierarchy......................................................................... 201
8.5.2 EAPOL-Key frames............................................................................................... 202
8.5.2.1 EAPOL-Key frame notation ................................................................ 210
8.5.3 4-Way Handshake.................................................................................................. 211
8.5.3.1 4-Way Handshake Message 1.............................................................. 211
8.5.3.2 4-Way Handshake Message 2.............................................................. 213
8.5.3.3 4-Way Handshake Message 3.............................................................. 214
8.5.3.4 4-Way Handshake Message 4.............................................................. 215
8.5.3.5 4-Way Handshake implementation considerations.............................. 216
Copyright © 2007 IEEE. All rights reserved. xv
8.5.3.6 Sample 4-Way Handshake................................................................... 217
8.5.3.7 4-Way Handshake analysis.................................................................. 218
8.5.4 Group Key Handshake........................................................................................... 220
8.5.4.1 Group Key Handshake Message 1....................................................... 220
8.5.4.2 Group Key Handshake Message 2....................................................... 221
8.5.4.3 Group Key Handshake implementation considerations....................... 222
8.5.4.4 Sample Group Key Handshake............................................................ 222
8.5.5 RSNA Supplicant key management state machine................................................ 223
8.5.5.1 Supplicant state machine states............................................................ 223
8.5.5.2 Supplicant state machine variables ...................................................... 224
8.5.5.3 Supplicant state machine procedures................................................... 224
8.5.5.4 Supplicant PeerKey state machine states............................................. 227
8.5.5.5 Supplicant PeerKey state machine variables ....................................... 227
8.5.6 RSNA Authenticator key management state machine........................................... 229
8.5.6.1 Authenticator state machine states....................................................... 229
8.5.6.2 Authenticator state machine variables ................................................. 233
8.5.6.3 Authenticator state machine procedures .............................................. 234
8.5.7 Nonce generation ................................................................................................... 234
8.5.8 PeerKey Handshake............................................................................................... 235
8.5.8.1 SMK Handshake .................................................................................. 236
8.5.8.2 PeerKey setup and handshake error conditions ................................... 241
8.5.8.3 STKSA rekeying.................................................................................. 241
8.5.8.4 Error Reporting .................................................................................... 242
8.6 Mapping EAPOL keys to IEEE 802.11 keys........................................................................ 244
8.6.1 Mapping PTK to TKIP keys .................................................................................. 244
8.6.2 Mapping GTK to TKIP keys ................................................................................. 244
8.6.3 Mapping PTK to CCMP keys................................................................................ 244
8.6.4 Mapping GTK to CCMP keys ............................................................................... 244
8.6.5 Mapping GTK to WEP-40 keys............................................................................. 244
8.6.6 Mapping GTK to WEP-104 keys........................................................................... 244
8.7 Per-frame pseudo-code.......................................................................................................... 245
8.7.1 WEP frame pseudo-code ....................................................................................... 245
8.7.2 RSNA frame pseudo-code ..................................................................................... 246
8.7.2.1 Per-MSDU Tx pseudo-code................................................................. 246
8.7.2.2 Per-MPDU Tx pseudo-code................................................................. 247
8.7.2.3 Per-MPDU Rx pseudo-code ................................................................ 248
8.7.2.4 Per-MSDU Rx pseudo-code ................................................................ 249
9. MAC sublayer functional description.............................................................................................. 251
9.1 MAC architecture.................................................................................................................. 251
9.1.1 DCF........................................................................................................................251
9.1.2 PCF ........................................................................................................................252
9.1.3 Hybrid coordination function (HCF) ..................................................................... 252
9.1.3.1 HCF contention-based channel access (EDCA) .................................. 252
9.1.3.2 HCF controlled channel access (HCCA) ............................................. 254
9.1.4 Combined use of DCF, PCF, and HCF.................................................................. 254
9.1.5 Fragmentation/defragmentation overview............................................................. 255
9.1.6 MAC data service .................................................................................................. 255
9.2 DCF....................................................................................................................................... 256
9.2.1 CS mechanism ....................................................................................................... 257
9.2.2 MAC-Level acknowledgments .............................................................................. 257
9.2.3 IFS.......................................................................................................................... 258
9.2.3.1 SIFS ..................................................................................................... 258
xvi Copyright © 2007 IEEE. All rights reserved.
9.2.3.2 PIFS ..................................................................................................... 259
9.2.3.3 DIFS..................................................................................................... 259
9.2.3.4 AIFS..................................................................................................... 259
9.2.3.5 EIFS ..................................................................................................... 259
9.2.4 Random backoff time............................................................................................. 260
9.2.5 DCF access procedure ........................................................................................... 261
9.2.5.1 Basic access ......................................................................................... 261
9.2.5.2 Backoff procedure for DCF ................................................................. 262
9.2.5.3 Recovery procedures and retransmit limits ......................................... 263
9.2.5.4 Setting and resetting the NAV ............................................................. 264
9.2.5.5 Control of the channel.......................................................................... 264
9.2.5.6 RTS/CTS usage with fragmentation .................................................... 266
9.2.5.7 CTS procedure ..................................................................................... 267
9.2.6 Individually addressed MPDU transfer procedure ................................................ 267
9.2.7 Broadcast and multicast MPDU transfer procedure .............................................. 268
9.2.8 ACK procedure ...................................................................................................... 268
9.2.9 Duplicate detection and recovery .......................................................................... 269
9.2.10 DCF timing relations ............................................................................................. 270
9.2.11 NAV distribution ................................................................................................... 271
9.2.12 Determination of PLME aCWmin characteristics ................................................. 271
9.3 PCF........................................................................................................................................ 271
9.3.1 CFP structure and timing ....................................................................................... 272
9.3.2 PCF access procedure ............................................................................................ 274
9.3.2.1 Fundamental access ............................................................................. 274
9.3.2.2 NAV operation during the CFP ........................................................... 274
9.3.3 PCF transfer procedure .......................................................................................... 275
9.3.3.1 PCF transfers when the PC STA is transmitter or recipient ................ 275
9.3.3.2 Operation with overlapping point-coordinated BSSs .......................... 277
9.3.3.3 CFPMaxDuration limit ........................................................................ 277
9.3.3.4 CF usage rules...................................................................................... 277
9.3.4 CF polling list ........................................................................................................ 278
9.3.4.1 Polling list processing.......................................................................... 278
9.3.4.2 Polling list update procedure ............................................................... 278
9.4 Fragmentation ....................................................................................................................... 279
9.5 Defragmentation.................................................................................................................... 279
9.6 Multirate support................................................................................................................... 280
9.6.1 Modulation classes................................................................................................. 281
9.7 MSDU transmission restrictions ........................................................................................... 282
9.8 Operation across regulatory domains.................................................................................... 282
9.8.1 Operation upon entering a regulatory domain ....................................................... 283
9.8.2 Support for FH PHYs ............................................................................................ 283
9.8.2.1 Determination of hopping patterns ...................................................... 283
9.9 HCF....................................................................................................................................... 286
9.9.1 HCF contention-based channel access (EDCA) .................................................... 286
9.9.1.1 Reference implementation ................................................................... 286
9.9.1.2 EDCA TXOPs...................................................................................... 287
9.9.1.3 Obtaining an EDCA TXOP ................................................................. 287
9.9.1.4 Multiple frame transmission in an EDCA TXOP................................ 289
9.9.1.5 EDCA backoff procedure .................................................................... 290
9.9.1.6 Retransmit procedures ......................................................................... 291
9.9.2 HCCA .................................................................................................................... 292
9.9.2.1 HCCA procedure ................................................................................. 292
9.9.2.2 TXOP structure and timing.................................................................. 295
9.9.2.3 HCCA transfer rules ............................................................................ 296
Copyright © 2007 IEEE. All rights reserved. xvii
9.9.3 Admission Control at the HC................................................................................. 298
9.9.3.1 Contention-based admission control procedures ................................. 298
9.9.3.2 Controlled-access admission control ................................................... 300
9.10 Block Acknowledgment (Block Ack)................................................................................... 302
9.10.1 Introduction............................................................................................................ 302
9.10.2 Setup and modification of the Block Ack parameters ........................................... 303
9.10.3 Data and acknowledgment transfer........................................................................ 303
9.10.4 Receive buffer operation........................................................................................ 306
9.10.5 Teardown of the Block Ack mechanism................................................................ 306
9.11 No Acknowledgment (No Ack) ............................................................................................ 306
9.12 Frame exchange sequences ................................................................................................... 306
9.13 Protection mechanism for non-ERP receivers ...................................................................... 310
10. Layer management........................................................................................................................... 313
10.1 Overview of management model .......................................................................................... 313
10.2 Generic management primitives ........................................................................................... 314
10.3 MLME SAP interface ........................................................................................................... 314
10.3.1 Power management................................................................................................ 315
10.3.1.1 MLME-POWERMGT.request............................................................. 315
10.3.1.2 MLME-POWERMGT.confirm............................................................ 316
10.3.2 Scan........................................................................................................................ 317
10.3.2.1 MLME-SCAN.request......................................................................... 317
10.3.2.2 MLME-SCAN.confirm........................................................................ 318
10.3.3 Synchronization ..................................................................................................... 320
10.3.3.1 MLME-JOIN.request........................................................................... 320
10.3.3.2 MLME-JOIN.confirm.......................................................................... 321
10.3.4 Authenticate ........................................................................................................... 322
10.3.4.1 MLME-AUTHENTICATE.request..................................................... 322
10.3.4.2 MLME-AUTHENTICATE.confirm.................................................... 323
10.3.4.3 MLME-AUTHENTICATE.indication ................................................ 324
10.3.4.4 MLME-AUTHENTICATE.response .................................................. 325
10.3.5 Deauthenticate ....................................................................................................... 326
10.3.5.1 MLME-DEAUTHENTICATE.request................................................ 326
10.3.5.2 MLME-DEAUTHENTICATE.confirm .............................................. 327
10.3.5.3 MLME-DEAUTHENTICATE.indication ........................................... 328
10.3.6 Associate................................................................................................................ 329
10.3.6.1 MLME-ASSOCIATE.request.............................................................. 329
10.3.6.2 MLME-ASSOCIATE.confirm ............................................................ 330
10.3.6.3 MLME-ASSOCIATE.indication ......................................................... 331
10.3.6.4 MLME-ASSOCIATE.response ........................................................... 332
10.3.7 Reassociate............................................................................................................. 333
10.3.7.1 MLME-REASSOCIATE.request ........................................................ 333
10.3.7.2 MLME-REASSOCIATE.confirm ....................................................... 334
10.3.7.3 MLME-REASSOCIATE.indication.................................................... 335
10.3.7.4 MLME-REASSOCIATE.response...................................................... 336
10.3.8 Disassociate ........................................................................................................... 337
10.3.8.1 MLME-DISASSOCIATE.request ....................................................... 337
10.3.8.2 MLME-DISASSOCIATE.confirm ...................................................... 338
10.3.8.3 MLME-DISASSOCIATE.indication................................................... 339
10.3.9 Reset....................................................................................................................... 340
10.3.9.1 MLME-RESET.request ....................................................................... 340
10.3.9.2 MLME-RESET.confirm ...................................................................... 341
10.3.10 Start........................................................................................................................ 342
xviii Copyright © 2007 IEEE. All rights reserved.
10.3.10.1 MLME-START.request....................................................................... 342
10.3.10.2 MLME-START.confirm...................................................................... 344
10.3.11 Spectrum management protocol layer model ........................................................ 345
10.3.12 Measurement request ............................................................................................. 350
10.3.12.1 MLME-MREQUEST.request .............................................................. 350
10.3.12.2 MLME-MREQUEST.confirm............................................................. 351
10.3.12.3 MLME-MREQUEST.indication.......................................................... 352
10.3.13 Channel measurement............................................................................................ 353
10.3.13.1 MLME-MEASURE.request ................................................................ 353
10.3.13.2 MLME-MEASURE.confirm ............................................................... 354
10.3.14 Measurement report ............................................................................................... 355
10.3.14.1 MLME-MREPORT.request................................................................. 355
10.3.14.2 MLME-MREPORT.confirm................................................................ 356
10.3.14.3 MLME-MREPORT.indication ............................................................ 357
10.3.15 Channel switch....................................................................................................... 358
10.3.15.1 MLME-CHANNELSWITCH.request ................................................. 358
10.3.15.2 MLME-CHANNELSWITCH.confirm ................................................ 359
10.3.15.3 MLME-CHANNELSWITCH.indication............................................. 360
10.3.15.4 MLME-CHANNELSWITCH.response............................................... 361
10.3.16 TPC request............................................................................................................ 362
10.3.16.1 MLME-TPCADAPT.request............................................................... 362
10.3.16.2 MLME-TPCADAPT.confirm.............................................................. 363
10.3.17 SetKeys ..................................................................................................................364
10.3.17.1 MLME-SETKEYS.request .................................................................. 364
10.3.17.2 MLME-SETKEYS.confirm................................................................. 365
10.3.18 DeleteKeys............................................................................................................. 366
10.3.18.1 MLME-DELETEKEYS.request.......................................................... 366
10.3.18.2 MLME-DELETEKEYS.confirm ......................................................... 367
10.3.19 MIC (Michael) failure event .................................................................................. 368
10.3.19.1 MLME-MICHAELMICFAILURE.indication .................................... 368
10.3.20 EAPOL................................................................................................................... 369
10.3.20.1 MLME-EAPOL.request....................................................................... 369
10.3.20.2 MLME-EAPOL.confirm...................................................................... 370
10.3.21 MLME-PeerKeySTART........................................................................................ 371
10.3.21.1 MLME- PeerKeySTART.request ........................................................ 371
10.3.22 SetProtection.......................................................................................................... 372
10.3.22.1 MLME-SETPROTECTION.request.................................................... 372
10.3.22.2 MLME-SETPROTECTION.confirm .................................................. 373
10.3.23 MLME-PROTECTEDFRAMEDROPPED ........................................................... 374
10.3.23.1 MLME- PROTECTEDFRAMEDROPPED.indication ....................... 374
10.3.24 TS management interface ...................................................................................... 375
10.3.24.1 MLME-ADDTS.request ...................................................................... 375
10.3.24.2 MLME-ADDTS.confirm ..................................................................... 377
10.3.24.3 MLME-ADDTS.indication.................................................................. 379
10.3.24.4 MLME-ADDTS.response.................................................................... 381
10.3.24.5 MLME-DELTS.request ....................................................................... 383
10.3.24.6 MLME-DELTS.confirm ...................................................................... 384
10.3.24.7 MLME-DELTS.indication................................................................... 385
10.3.25 Management of direct links ................................................................................... 386
10.3.25.1 MLME-DLS.request ............................................................................ 386
10.3.25.2 MLME-DLS.confirm........................................................................... 387
10.3.25.3 MLME-DLS.indication........................................................................ 388
10.3.25.4 MLME-DLSTeardown.request............................................................ 389
10.3.25.5 MLME-DLSTeardown.confirm........................................................... 390
剩余1231页未读,继续阅读
2017-12-15 上传
2019-08-05 上传
2018-07-15 上传
118 浏览量
2017-08-22 上传
点击了解资源详情
点击了解资源详情
点击了解资源详情
点击了解资源详情
rf_lover
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- Angular程序高效加载与展示海量Excel数据技巧
- Argos客户端开发流程及Vue配置指南
- 基于源码的PHP Webshell审查工具介绍
- Mina任务部署Rpush教程与实践指南
- 密歇根大学主题新标签页壁纸与多功能扩展
- Golang编程入门:基础代码学习教程
- Aplysia吸引子分析MATLAB代码套件解读
- 程序性竞争问题解决实践指南
- lyra: Rust语言实现的特征提取POC功能
- Chrome扩展:NBA全明星新标签壁纸
- 探索通用Lisp用户空间文件系统clufs_0.7
- dheap: Haxe实现的高效D-ary堆算法
- 利用BladeRF实现简易VNA频率响应分析工具
- 深度解析Amazon SQS在C#中的应用实践
- 正义联盟计划管理系统:udemy-heroes-demo-09
- JavaScript语法jsonpointer替代实现介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功