15
Copyright © 2016 IEEE. All rights reserved.
4.3.24 Operation under geolocation database (GDB) control .......................................... 213
4.4 Logical service interfaces ...................................................................................................... 215
4.4.1 General...................................................................................................................215
4.4.2 SS ........................................................................................................................... 215
4.4.3 PBSS control point service (PCPS) ....................................................................... 216
4.4.4 DSS ........................................................................................................................ 216
4.5 Overview of the services........................................................................................................ 217
4.5.1 General...................................................................................................................217
4.5.2 Distribution of MSDUs within a DS...................................................................... 218
4.5.2.1 Distribution ......................................................................................... 218
4.5.2.2 Integration ........................................................................................... 219
4.5.2.3 QoS traffic scheduling ........................................................................ 219
4.5.3 Services that support the distribution service and the PCP service ....................... 220
4.5.3.1 General ................................................................................................ 220
4.5.3.2 Mobility types ..................................................................................... 220
4.5.3.3 Association.......................................................................................... 220
4.5.3.4 Reassociation ...................................................................................... 221
4.5.3.5 Disassociation ..................................................................................... 221
4.5.4 Access control and data confidentiality services ................................................... 222
4.5.4.1 General ................................................................................................ 222
4.5.4.2 Authentication..................................................................................... 222
4.5.4.3 Deauthentication ................................................................................. 223
4.5.4.4 Data confidentiality............................................................................. 223
4.5.4.5 Key management................................................................................. 224
4.5.4.6 Data origin authenticity....................................................................... 224
4.5.4.7 Replay detection.................................................................................. 224
4.5.4.8 Fast BSS transition.............................................................................. 225
4.5.4.9 Robust management frame protection ................................................ 225
4.5.5 Spectrum management services............................................................................. 225
4.5.5.1 General ................................................................................................ 225
4.5.5.2 TPC ..................................................................................................... 225
4.5.5.3 DFS ..................................................................................................... 225
4.5.6 Traffic differentiation and QoS support................................................................. 226
4.5.6.1 General ................................................................................................ 226
4.5.6.2 Quality-of-service management frame support................................... 226
4.5.7 Support for higher layer timer synchronization..................................................... 226
4.5.8 Radio measurement service ................................................................................... 227
4.5.9 Interworking with external networks..................................................................... 227
4.5.10 Generic advertisement service (GAS) ................................................................... 228
4.6 Multiple logical address spaces ............................................................................................
.228
4
.
7 Differences among ESS, PBSS, and IBSS LANs.................................................................. 229
4.8 Differences between ESS and MBSS LANs ......................................................................... 231
4.9 Reference model .................................................................................................................... 231
4.9.1 General...................................................................................................................231
4.9.2 Interworking reference model................................................................................ 231
4.9.3 Reference model for supporting multiple MAC sublayers .................................... 233
4.9.4 Reference model for multi-band operation............................................................ 234
4.10 IEEE Std 802.11 and IEEE Std 802.1X-2010 ....................................................................... 236
4.10.1 General................................................................................................................... 236
4.10.2 IEEE 802.11 usage of IEEE Std 802.1X-2010 ...................................................... 236
4.10.3 Infrastructure functional model overview.............................................................. 237
4.10.3.1 General................................................................................................ 237
4.10.3.2 AKM operations with AS ................................................................... 237
4.10.3.3 AKM operations with a password or PSK .......................................... 239