没有合适的资源?快使用搜索试试~ 我知道了~
首页IEEE 802.11-2016: 无线局域网MAC与PHY规范
"802.11-2016.pdf是关于802.11标准的无线局域网(WLAN)媒体访问控制(MAC)和物理层(PHY)规范的文档,由IEEE LAN/MAN标准委员会赞助。这份文档是2012年版的修订版,详细阐述了信息技术、电信和系统间的信息交换在本地及城域网络中的具体要求。主要由802.11工作组准备,并于2016年12月获得IEEE-SA标准局的批准。"
802.11标准是定义无线局域网通信的一个关键国际标准,其2016年的版本主要包含以下几个方面的内容:
1. **无线局域网介质访问控制(MAC)**:
- MAC层是网络协议栈的一部分,负责控制网络设备如何共享传输介质。802.11标准的MAC层采用CSMA/CA(载波监听多路访问/冲突避免)机制,确保多个设备能够无冲突地接入网络。
- 这个部分还涵盖了数据帧的结构,包括地址字段、控制字段和数据字段,以及用于认证、关联、同步和流量控制的管理帧。
- 802.11-2016可能引入了新的MAC功能,如QoS(服务质量)改进,以支持多媒体应用。
2. **物理层(PHY)**:
- PHY层定义了无线传输的物理特性,包括调制方式、编码方案、信道带宽和传输速率。802.11标准支持多种PHY技术,如802.11a/g/n/ac等,它们分别对应不同的传输速度和频段。
- 2016版可能包含了对更高数据速率的支持,例如802.11ac的多用户MIMO(多输入多输出)技术,以提高无线网络的吞吐量。
3. **安全**:
- 802.11标准也涉及了网络安全,如WEP(有线等效加密)、WPA(Wi-Fi保护访问)和WPA2,这些协议提供了数据加密和用户认证,以保护无线网络不受非法访问。
4. **网络拓扑和漫游**:
- 标准可能定义了基础架构模式(如AP与客户端之间的连接)和自组织网络(Ad Hoc模式)的配置,以及客户端在网络间的漫游过程。
5. **信道管理和干扰处理**:
- 802.11标准可能包含了对多信道操作的管理,以及如何在存在其他无线信号干扰时优化通信的策略。
6. **效率和性能提升**:
- 可能增加了节能模式,允许设备在不使用时进入休眠状态以节省电力,同时保持连接能力。
7. **兼容性和互操作性**:
- 802.11标准确保不同厂商的设备能在相同的标准下协同工作,提供广泛的兼容性和互操作性测试要求。
802.11-2016标准是无线局域网技术的基石,它定义了无线通信的关键参数,推动了Wi-Fi技术的发展,使我们能够在各种环境中享受到高速、可靠的无线连接。通过不断的技术迭代和更新,802.11标准确保了与日新月异的无线设备需求保持同步。
15
Copyright © 2016 IEEE. All rights reserved.
4.3.24 Operation under geolocation database (GDB) control .......................................... 213
4.4 Logical service interfaces ...................................................................................................... 215
4.4.1 General...................................................................................................................215
4.4.2 SS ........................................................................................................................... 215
4.4.3 PBSS control point service (PCPS) ....................................................................... 216
4.4.4 DSS ........................................................................................................................ 216
4.5 Overview of the services........................................................................................................ 217
4.5.1 General...................................................................................................................217
4.5.2 Distribution of MSDUs within a DS...................................................................... 218
4.5.2.1 Distribution ......................................................................................... 218
4.5.2.2 Integration ........................................................................................... 219
4.5.2.3 QoS traffic scheduling ........................................................................ 219
4.5.3 Services that support the distribution service and the PCP service ....................... 220
4.5.3.1 General ................................................................................................ 220
4.5.3.2 Mobility types ..................................................................................... 220
4.5.3.3 Association.......................................................................................... 220
4.5.3.4 Reassociation ...................................................................................... 221
4.5.3.5 Disassociation ..................................................................................... 221
4.5.4 Access control and data confidentiality services ................................................... 222
4.5.4.1 General ................................................................................................ 222
4.5.4.2 Authentication..................................................................................... 222
4.5.4.3 Deauthentication ................................................................................. 223
4.5.4.4 Data confidentiality............................................................................. 223
4.5.4.5 Key management................................................................................. 224
4.5.4.6 Data origin authenticity....................................................................... 224
4.5.4.7 Replay detection.................................................................................. 224
4.5.4.8 Fast BSS transition.............................................................................. 225
4.5.4.9 Robust management frame protection ................................................ 225
4.5.5 Spectrum management services............................................................................. 225
4.5.5.1 General ................................................................................................ 225
4.5.5.2 TPC ..................................................................................................... 225
4.5.5.3 DFS ..................................................................................................... 225
4.5.6 Traffic differentiation and QoS support................................................................. 226
4.5.6.1 General ................................................................................................ 226
4.5.6.2 Quality-of-service management frame support................................... 226
4.5.7 Support for higher layer timer synchronization..................................................... 226
4.5.8 Radio measurement service ................................................................................... 227
4.5.9 Interworking with external networks..................................................................... 227
4.5.10 Generic advertisement service (GAS) ................................................................... 228
4.6 Multiple logical address spaces ............................................................................................
.228
4
.
7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 229
4.8 Differences between ESS and MBSS LANs ......................................................................... 231
4.9 Reference model .................................................................................................................... 231
4.9.1 General...................................................................................................................231
4.9.2 Interworking reference model................................................................................ 231
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 233
4.9.4 Reference model for multi-band operation............................................................ 234
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 236
4.10.1 General................................................................................................................... 236
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 236
4.10.3 Infrastructure functional model overview.............................................................. 237
4.10.3.1 General................................................................................................ 237
4.10.3.2 AKM operations with AS ................................................................... 237
4.10.3.3 AKM operations with a password or PSK .......................................... 239
Authorized licensed use limited to: Hong Xiang. Downloaded on December 14,2019 at 09:54:04 UTC from IEEE Xplore. Restrictions apply.
16
Copyright © 2016 IEEE. All rights reserved.
4.10.3.4 Alternate operations with PSK............................................................ 240
4.10.3.5 Disassociation ..................................................................................... 241
4.10.4 IBSS functional model description ........................................................................ 241
4.10.4.1 General................................................................................................ 241
4.10.4.2 Key usage............................................................................................ 241
4.10.4.3 Sample IBSS 4-way handshakes......................................................... 241
4.10.4.4 IBSS IEEE 802.1X example ............................................................... 243
4.10.5 PBSS functional model description ....................................................................... 244
4.10.6 Authenticator-to-AS protocol ................................................................................ 245
4.10.7 PMKSA caching .................................................................................................... 245
4.10.8 Protection of group addressed robust Management frames................................... 245
5. MAC service definition ..................................................................................................................... 246
5.1 Overview of MAC services ................................................................................................... 246
5.1.1 Data service............................................................................................................ 246
5.1.1.1 General ................................................................................................ 246
5.1.1.2 Determination of UP ........................................................................... 246
5.1.1.3 Interpretation of priority parameter in MAC service primitives......... 246
5.1.1.4 Interpretation of service class parameter in MAC service
primitives in a STA ............................................................................. 247
5.1.2 Security services .................................................................................................... 248
5.1.3 MSDU ordering ..................................................................................................... 248
5.1.4 MSDU format ........................................................................................................ 249
5.1.5 MAC data service architecture .............................................................................. 250
5.1.5.1 General ................................................................................................ 250
5.1.5.2 Non-AP STA role................................................................................ 253
5.1.5.3 AP role ................................................................................................ 253
5.1.5.4 Mesh STA role.................................................................................... 253
5.1.5.5 Mesh gate role..................................................................................... 254
5.2 MAC data service specification............................................................................................. 254
5.2.1 General...................................................................................................................254
5.2.2 MA-UNITDATA.request ...................................................................................... 254
5.2.2.1 Function .............................................................................................. 254
5.2.2.2 Semantics of the service primitive...................................................... 255
5.2.2.3 When generated................................................................................... 255
5.2.2.4 Effect of receipt................................................................................... 255
5.2.3 MA-UNITDATA.indication .................................................................................. 257
5.2.3.1 Function .............................................................................................. 257
5.2.3.2 Semantics of the service primitive...................................................... 257
5.2.3.3 When generated................................................................................... 257
5.2.3.4 Effect of receipt.......................................
............................................ 258
5.2
.
4 MA-UNITDATA-STATUS.indication.................................................................. 259
5.2.4.1 Function .............................................................................................. 259
5.2.4.2 Semantics of the service primitive...................................................... 259
5.2.4.3 When generated................................................................................... 261
5.2.4.4 Effect of receipt................................................................................... 261
6. Layer management............................................................................................................................. 262
6.1 Overview of management model........................................................................................... 262
6.2 Generic management primitives ............................................................................................ 263
6.3 MLME SAP interface ............................................................................................................ 263
6.3.1 Introduction............................................................................................................ 263
Authorized licensed use limited to: Hong Xiang. Downloaded on December 14,2019 at 09:54:04 UTC from IEEE Xplore. Restrictions apply.
17
Copyright © 2016 IEEE. All rights reserved.
6.3.2 Power management................................................................................................ 264
6.3.2.1 Introduction......................................................................................... 264
6.3.2.2 MLME-POWERMGT.request............................................................ 264
6.3.2.3 MLME-POWERMGT.confirm........................................................... 264
6.3.3 Scan........................................................................................................................ 265
6.3.3.1 Introduction......................................................................................... 265
6.3.3.2 MLME-SCAN.request ........................................................................ 265
6.3.3.3 MLME-SCAN.confirm ....................................................................... 267
6.3.4 Synchronization ..................................................................................................... 276
6.3.4.1 Introduction......................................................................................... 276
6.3.4.2 MLME-JOIN.request .......................................................................... 276
6.3.4.3 MLME-JOIN.confirm ......................................................................... 278
6.3.5 Authenticate ........................................................................................................... 279
6.3.5.1 Introduction......................................................................................... 279
6.3.5.2 MLME-AUTHENTICATE.request .................................................... 279
6.3.5.3 MLME-AUTHENTICATE.confirm ................................................... 280
6.3.5.4 MLME-AUTHENTICATE.indication................................................ 282
6.3.5.5 MLME-AUTHENTICATE.response.................................................. 283
6.3.6 Deauthenticate ....................................................................................................... 284
6.3.6.1 Introduction......................................................................................... 284
6.3.6.2 MLME-DEAUTHENTICATE.request............................................... 284
6.3.6.3 MLME-DEAUTHENTICATE.confirm.............................................. 285
6.3.6.4 MLME-DEAUTHENTICATE.indication .......................................... 285
6.3.7 Associate................................................................................................................ 286
6.3.7.1 Introduction......................................................................................... 286
6.3.7.2 MLME-ASSOCIATE.request............................................................. 286
6.3.7.3 MLME-ASSOCIATE.confirm............................................................ 288
6.3.7.4 MLME-ASSOCIATE.indication ........................................................ 292
6.3.7.5 MLME-ASSOCIATE.response .......................................................... 295
6.3.8 Reassociate............................................................................................................. 297
6.3.8.1 Introduction......................................................................................... 297
6.3.8.2 MLME-REASSOCIATE.request........................................................ 297
6.3.8.3 MLME-REASSOCIATE.confirm....................................................... 299
6.3.8.4 MLME-REASSOCIATE.indication ................................................... 303
6.3.8.5 MLME-REASSOCIATE.response ..................................................... 306
6.3.9 Disassociate ........................................................................................................... 309
6.3.9.1 MLME-DISASSOCIATE.request ...................................................... 309
6.3.9.2 MLME-DISASSOCIATE.confirm ..................................................... 309
6.3.9.3 MLME-DISASSOCIATE.indication.................................................. 310
6.3.10 Reset....................................................................................................................... 310
6.3.10.1 Introduction......................................................................................... 310
6.3.10.2 MLME-RESET.request....................................................................... 311
6.3.11 Start........................................................................................................................ 311
6.3.11.1 Introduction......................................................................................... 311
6.3.11.2 MLME-START.request ...................................................................... 311
6.3.11.3 MLME-START.confirm.....................................
................................ 317
6.
3.
12 Stop ........................................................................................................................ 317
6.3.12.1 General................................................................................................ 317
6.3.12.2 MLME-STOP.request......................................................................... 317
6.3.13 Protocol layer model for spectrum management and radio measurement............. 318
6.3.14 Measurement request ............................................................................................. 321
6.3.14.1 Introduction......................................................................................... 321
6.3.14.2 MLME-MREQUEST.request ............................................................. 321
6.3.14.3 MLME-MREQUEST.indication......................................................... 322
Authorized licensed use limited to: Hong Xiang. Downloaded on December 14,2019 at 09:54:04 UTC from IEEE Xplore. Restrictions apply.
18
Copyright © 2016 IEEE. All rights reserved.
6.3.15 Channel measurement............................................................................................ 323
6.3.15.1 Introduction......................................................................................... 323
6.3.15.2 MLME-MEASURE.request................................................................ 323
6.3.15.3 MLME-MEASURE.confirm............................................................... 324
6.3.16 Measurement report ............................................................................................... 325
6.3.16.1 Introduction......................................................................................... 325
6.3.16.2 MLME-MREPORT.request................................................................ 325
6.3.16.3 MLME-MREPORT.indication ........................................................... 326
6.3.17 Channel switch....................................................................................................... 327
6.3.17.1 MLME-CHANNELSWITCH.request ................................................ 327
6.3.17.2 MLME-CHANNELSWITCH.confirm ............................................... 328
6.3.17.3 MLME-CHANNELSWITCH.indication............................................ 328
6.3.17.4 MLME-CHANNELSWITCH.response.............................................. 329
6.3.18 TPC request............................................................................................................ 331
6.3.18.1 Introduction......................................................................................... 331
6.3.18.2 MLME-TPCADAPT.request .............................................................. 331
6.3.18.3 MLME-TPCADAPT.confirm............................................................. 331
6.3.19 SetKeys ..................................................................................................................332
6.3.19.1 MLME-SETKEYS.request ................................................................. 332
6.3.20 DeleteKeys............................................................................................................. 333
6.3.20.1 MLME-DELETEKEYS.request ......................................................... 333
6.3.21 MIC (michael) failure event .................................................................................. 334
6.3.21.1 MLME-MICHAELMICFAILURE.indication.................................... 334
6.3.22 EAPOL................................................................................................................... 335
6.3.22.1 MLME-EAPOL.request...................................................................... 335
6.3.22.2 MLME-EAPOL.confirm..................................................................... 336
6.3.23 MLME-PEERKEY-START .................................................................................. 336
6.3.23.1 MLME-PEERKEY-START.request................................................... 336
6.3.24 SetProtection.......................................................................................................... 337
6.3.24.1 MLME-SETPROTECTION.request................................................... 337
6.3.25 MLME-PROTECTEDFRAMEDROPPED ........................................................... 338
6.3.25.1 MLME- PROTECTEDFRAMEDROPPED.indication ...................... 338
6.3.26 TS management interface ...................................................................................... 338
6.3.26.1 General................................................................................................ 338
6.3.26.2 MLME-ADDTS.request ..................................................................... 339
6.3.26.3 MLME-ADDTS.confirm .................................................................... 341
6.3.26.4 MLME-ADDTS.indication................................................................. 344
6.3.26.5 MLME-ADDTS.response................................................................... 346
6.3.26.6 MLME-DELTS.request ...................................................................... 349
6.3.26.7 MLME-DELTS.indication.................................................................. 350
6.3.26.8 MLME-ADDTSRESERVE.request ................................................... 351
6.3.26.9 MLME-ADDTSRESERVE.confirm................................................... 352
6.3.26.10 MLME-ADDTSRESERVE.indication ............................................... 353
6.3.26.11 MLME-ADDTSRESERVE.response ................................................. 354
6.3.27 Management of direct links ................................................................................... 354
6.3.27.1 Introduction......................................................................................... 354
6.3.27.2 MLME-DLS.request ........................................................................... 355
6.3.27.3 MLME-DLS.confirm .......................................................................... 355
6.3.27.4 MLME-DLS.indication.....................................
..
................................ 356
6.3.27.5 MLME-DLS.response......................................................................... 357
6.3.27.6 MLME-DLS-TEARDOWN.request................................................... 358
6.3.27.7 MLME-DLS-TEARDOWN.indication............................................... 359
6.3.28 Higher layer synchronization support.................................................................... 360
6.3.28.1 Introduction......................................................................................... 360
Authorized licensed use limited to: Hong Xiang. Downloaded on December 14,2019 at 09:54:04 UTC from IEEE Xplore. Restrictions apply.
19
Copyright © 2016 IEEE. All rights reserved.
6.3.28.2 MLME-HL-SYNC.request ................................................................. 360
6.3.28.3 MLME-HL-SYNC.indication............................................................. 361
6.3.29 Block Ack .............................................................................................................. 361
6.3.29.1 General................................................................................................ 361
6.3.29.2 MLME-ADDBA.request..................................................................... 361
6.3.29.3 MLME-ADDBA.confirm ................................................................... 363
6.3.29.4 MLME-ADDBA.indication ................................................................ 364
6.3.29.5 MLME-ADDBA.response .................................................................. 365
6.3.29.6 MLME-DELBA.request ..................................................................... 367
6.3.29.7 MLME-DELBA.indication................................................................. 368
6.3.30 Schedule element management.............................................................................. 369
6.3.30.1 Introduction......................................................................................... 369
6.3.30.2 MLME-SCHEDULE.request.............................................................. 369
6.3.30.3 MLME-SCHEDULE.indication ......................................................... 369
6.3.31 Vendor-specific action........................................................................................... 370
6.3.31.1 Introduction......................................................................................... 370
6.3.31.2 MLME-VSPECIFIC.request............................................................... 370
6.3.31.3 MLME-VSPECIFIC.indication .......................................................... 371
6.3.32 Neighbor report request ......................................................................................... 372
6.3.32.1 General................................................................................................ 372
6.3.32.2 MLME-NEIGHBORREPREQ.request............................................... 372
6.3.32.3 MLME-NEIGHBORREPREQ.indication .......................................... 373
6.3.33 Neighbor report response....................................................................................... 374
6.3.33.1 General................................................................................................ 374
6.3.33.2 MLME-NEIGHBORREPRESP.request ............................................. 374
6.3.33.3 MLME-NEIGHBORREPRESP.indication......................................... 375
6.3.34 Link Measure Request ........................................................................................... 376
6.3.34.1 General................................................................................................ 376
6.3.34.2 MLME-LINKMEASURE.request ...................................................... 376
6.3.34.3 MLME-LINKMEASURE.confirm..................................................... 377
6.3.35 MLME SAP interface for resource request ........................................................... 378
6.3.35.1 MLME-RESOURCE-REQUEST.request........................................... 378
6.3.35.2 MLME-RESOURCE-REQUEST.indication ...................................... 379
6.3.35.3 MLME-RESOURCE-REQUEST.response ........................................ 380
6.3.35.4 MLME-RESOURCE-REQUEST.confirm ......................................... 380
6.3.35.5 MLME-RESOURCE-REQUEST-LOCAL.request............................ 381
6.3.35.6 MLME-RESOURCE-REQUEST-LOCAL.confirm........................... 382
6.3.36 MLME SAP interface for remote requests ............................................................ 382
6.3.36.1 MLME-REMOTE-REQUEST.request............................................... 382
6.3.36.2 MLME-REMOTE-REQUEST.indication........................................... 383
6.3.37 Extended channel switch announcement ............................................................... 383
6.3.37.1 General................................................................................................ 383
6.3.37.2 MLME-EXTCHANNELSWITCH.request......................................... 384
6.3.37.3 MLME-EXTCHANNELSWITCH.confirm ....................................... 385
6.3.37.4 MLME-EXTCHANNELSWITCH.indication .................................... 385
6.3.37.5 MLME-EXTCHANNELSWITCH.response ...................................... 387
6.3.38 DSE power constraint announcement........................
............................................ 388
6.3.38.
1
General ................................................................................................ 388
6.3.38.2 MLME-DSETPC.request.................................................................... 388
6.3.38.3 MLME-DSETPC.confirm................................................................... 389
6.3.38.4 MLME-DSETPC.indication ............................................................... 390
6.3.38.5 MLME-DSETPC.response ................................................................. 390
6.3.39 Enablement ............................................................................................................ 391
6.3.39.1 General................................................................................................ 391
Authorized licensed use limited to: Hong Xiang. Downloaded on December 14,2019 at 09:54:04 UTC from IEEE Xplore. Restrictions apply.
剩余3533页未读,继续阅读
2024-03-31 上传
2021-12-19 上传
2020-07-16 上传
2021-08-22 上传
2019-07-31 上传
2018-05-15 上传
点击了解资源详情
1223 浏览量
2018-04-13 上传
gnaix_98765
- 粉丝: 0
- 资源: 6
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功