1、147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHS-,-,-The Institute of Electrical and Electronics Engineers, Inc.3 Park Avenue, N
2、ew York, NY 10016-5997, USACopyright 200X by the Institute of Electrical and Electronics Engineers, Inc.All rights reserved. Published xx Month 200X. Printed in the United States of America.IEEE and 802 are registered trademarks in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of
3、 any indi-vidual standard for educational classroom use can also be obtained through the Copyright Clearance Center.NOTEAttention is called to the possibility that implementation of this standard may require use of subjectmatter covered by patent rights. By publication of this standard, no position
4、is taken with respect to theexistence or validity of any patent rights in connection therewith. The IEEE shall not be responsible foridentifying patents for which a license may be required by an IEEE standard or for conducting inquiries into thelegal validity or scope of those patents that are broug
5、ht to its attention.Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHS-,-,-147101316192225283134374043464952Copyright The Institute of Electrical and Electronics E
6、ngineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHS-,-,-IntroductionIEEE draft standard P802.11maThis revision specifies technical corrections and clarifications to IEEE 802.11-1999 as reaffirmed in 2003for wireless loc
7、al area networks (WLANS) as well as enhancements to the existing MAC and PHYfunctions.Notice to usersErrataErrata, if any, for this and all other standards can be accessed at the following URL: http:/stan-dards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL f
8、or errataperiodically.InterpretationsCurrent interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/index.html.PatentsAttention is called to the possibility that implementation of this standard may require use of subject mattercovered by patent rights. By
9、publication of this standard, no position is taken with respect to the existence orvalidity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying pat-ents for which a license may be required by an IEEE standard or for conducting inquiries into the legal vali
10、d-ity or scope of those patents that are brought to its attention. A patent holder has filed a statement ofassurance that it will grant licenses under these rights without compensation or under reasonable rates andnondiscriminatory, reasonable terms and conditions to all applications desiring to obt
11、ain such licenses. TheIEEE makes no representation as to the reasonableness of rates and/or terms and conditions of the licenseagreements offered by patent holders. Further information may be obtained from the IEEE StandardDepartment.Interpretations and errataInterpretations and errata associated wi
12、th revised standard may be found at one of the following Internetlocations: http:/standards.ieee.org/reading/ieee/interp http:/standards.ieee.org/reading/ieee/updates/errataThis introduction is not part of draft standard IEEE P802.11REVma, Draft Standard for Information TechnologyTelecommunications
13、and information exchange between systemsLocal and metropolitan area networkSpecificrequirementsPart 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.Copyright 2006 IEEE. All rights reserved. iii147101316192225283134374043464952Copyright The Institute of Electrical
14、 and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHSParticipantsWhen the IEEE 802.11 Working Group approved this amendment, it has the following membership:When the IEEE 802.11 Working Group approved th
15、is amendment, the Task Group m had the followingmembership:Major contributions were received from the following individuals:The following members of the individual balloting committee voted on this amendment. Balloters may havevoted for approval, disapproval, or abstention.When the IEEE-SA Standards
16、 Board approved this standard on XX Month 200X, it had the followingmembership:Also included are the following nonvoting IEEE-SA Standards Board Liaisons:iv Copyright 2006 IEEE. All rights reserved.-,-,-147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers,
17、 Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHSCopyright 2006 IEEE. All rights reserved. v-,-,-147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under lice
18、nse with IEEENot for ResaleNo reproduction or networking permitted without license from IHSvi Copyright 2006 IEEE. All rights reserved.-,-,-147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo r
19、eproduction or networking permitted without license from IHS-,-,-Contents1. Overview 11.1 Scope. 11.2 Purpose 22. Normative references. 33. Definitions . 64. Abbreviations and acronyms . 195. General description 255.1 General description of the architecture . 255.1.1 How wireless LAN systems are dif
20、ferent 255.1.1.1 Destination address does not equal destination location . 255.1.1.2 The mMedia impact theon design and performance 255.1.1.3 The impact of handling mobile stations. 255.1.1.4 Interaction with other IEEE 802 layers 265.1.1.5 Interaction with non-IEEE 802 protocols 265.2 Components of
21、 the IEEE 802.11 architecture. 265.2.1 The independent BSS (IBSS) as an ad hoc network 275.2.2 STA membership in a BSS is dynamic 275.2.3 Distribution system (DS) concepts 275.2.3.1 Extended service set (ESS): The large coverage network . 285.2.3.2 RSNA. 295.2.4 Area concepts. 305.2.5 Integration wi
22、th wired LANs. 315.2.6 5.2.5 QoS basic service set (QBSS): The QoS network 325.3 Logical service interfaces 335.3.1 SS . 345.3.2 DSS 345.4 Overview of the services. 355.4.1 Distribution of messages within a DS 365.4.1.1 Distribution 365.4.1.2 Integration 365.4.1.3 QoS traffic scheduling . 365.4.2 Se
23、rvices that support the distribution service 375.4.2.1 Mobility types 375.4.2.2 Association. 375.4.2.3 Reassociation . 385.4.2.4 Disassociation 385.4.3 Access control and data confidentiality services . 385.4.3.1 Authentication 395.4.3.2 Deauthentication 405.4.3.3 Data Confidentiality. 405.4.3.4 Key
24、 management . 415.4.3.5 Data origin authenticity . 415.4.3.6 Replay detection 415.4.4 Spectrum management services. 415.4.4.1 TPC 41Copyright 2006 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change vii147101316192225283134374043464952Copyright The Institute of El
25、ectrical and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHS5.4.4.2 DFS 425.4.5 Traffic differentiation and QoS support. 425.4.6 Support for higher layer timer synchronization. 425.5 Multiple logical ad
26、dress spaces. 435.6 Relationships between services.435.7 Differences between ESS and IBSS LANs. 465.8 Reference model 475.9 IEEE 802.11 and IEEE 802.1X. 475.9.1 IEEE 802.11 usage of IEEE 802.1X 485.9.2 Infrastructure functional model overview 485.9.2.1 AKM operations with AS 485.9.2.2 Operations wit
27、h PSK . 505.9.2.3 Disassociation 515.9.3 IBSS functional model description 515.9.3.1 Key usage. 515.9.3.2 Sample IBSS 4-Way Handshakes 515.9.3.3 IBSS IEEE 802.1X example 535.9.4 Authenticator-to-AS protocol 535.9.5 PMKSA caching 536. MAC service definition . 556.1 Overview of MAC services.556.1.1 As
28、ynchronous dData service . 556.1.1.1 Determination of UP 556.1.1.2 Interpretation of priority parameter in MAC service primitives 566.1.1.3 Interpretation of service class parameter in MAC service primitives in a QSTA 566.1.2 Security services 576.1.3 MSDU ordering . 576.1.4 MSDU format 586.1.5 MAC
29、data service architecture 586.2 Detailed service specification . 596.2.1 MAC data services. 596.2.1.1 MA-UNITDATA.request 596.2.1.2 MA-UNITDATA.indication 606.2.1.3 MA-UNITDATA-STATUS.indication 627. Frame formats 657.1 MAC frame formats 657.1.1 Conventions . 657.1.2 General frame format. 667.1.3 Fr
30、ame fields .677.1.3.1 Frame Control field 677.1.3.2 Duration/ID field 707.1.3.3 Address fields 717.1.3.4 Sequence Control field. 737.1.3.5 QoS Control field. 737.1.3.6 7.1.3.5 Frame Body field . 777.1.3.7 7.1.3.6 FCS field 777.1.4 Duration/ID field in data and management frames 777.2 Format of indiv
31、idual frame types 787.2.1 Control frames . 78viii Copyright 2006 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change.-,-,-147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEE
32、Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-7.2.1.1 RTS frame format 787.2.1.2 CTS frame format 797.2.1.3 ACK frame format . 807.2.1.4 PS-Poll frame format . 817.2.1.5 CF-End frame format. 817.2.1.6 CF-End+CF-Ack frame format 817.2.1.7 Block Ack Request (BlockA
33、ckReq) frame format 827.2.1.8 Block Ack (BlockAck) frame format 837.2.2 Data frames 847.2.3 Management frames. 867.2.3.1 Beacon frame format . 877.2.3.2 IBSS ATIM frame format 887.2.3.3 Disassociation frame format 887.2.3.4 Association Request frame format. 897.2.3.5 Association Response frame forma
34、t 897.2.3.6 Reassociation Request frame format . 897.2.3.7 Reassociation Response frame format. 907.2.3.8 Probe Request frame format 917.2.3.9 Probe Response frame format 917.2.3.10 Authentication frame format 937.2.3.11 Deauthentication 947.2.3.12 Action frame format. 947.3 Management frame body co
35、mponents 947.3.1 Fields that are not information elements 947.3.1.1 Authentication Algorithm Number field 947.3.1.2 Authentication Transaction Sequence Number field . 957.3.1.3 Beacon Interval field 957.3.1.4 Capability Information field 957.3.1.5 Current AP Address field. 997.3.1.6 Listen Interval
36、field 997.3.1.7 Reason Code field 997.3.1.8 AID field 1017.3.1.9 Status Code field 1017.3.1.10 Timestamp field . 1037.3.1.11 Action field 1037.3.1.12 Dialog Token field . 1047.3.1.13 DLS Timeout Value field 1047.3.1.14 Block Ack Parameter Set field. 1047.3.1.15 Block Ack Timeout Value field. 1057.3.
37、1.16 DELBA Parameter Set field 1057.3.1.17 QoS Info field 1057.3.2 Information elements . 1077.3.2.1 SSID element . 1087.3.2.2 Supported Rates element . 1097.3.2.3 FH Parameter Set element . 1107.3.2.4 DS Parameter Set element . 1107.3.2.5 CF Parameter Set element 1107.3.2.6 TIM 1117.3.2.7 IBSS Para
38、meter Set element 1127.3.2.8 Challenge Text element . 1127.3.2.9 Country information element. 1127.3.2.10 Hopping Pattern Parameters information element. 1157.3.2.11 Hopping Pattern Table information element . 1157.3.2.12 Request information element . 117Copyright 2006 IEEE. All rights reserved.This
39、 is an unapproved IEEE Standards Draft, subject to change ix147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under license with IEEENot for ResaleNo reproduction or networking permitted without license from IHS-,-,-7.3.2.13 ERP In
40、formation element 1177.3.2.14 Extended Supported Rates element . 1197.3.2.15 Power Constraint element 1197.3.2.16 Power Capability element 1207.3.2.17 TPC Request element. 1207.3.2.18 TPC Report element. 1217.3.2.19 Supported Channels element . 1217.3.2.20 Channel Switch Announcement element. 1227.3
41、.2.21 Measurement Request element 1227.3.2.22 Measurement Report element 1267.3.2.23 Quiet element. 1307.3.2.24 IBSS DFS element . 1307.3.2.25 RSN information element 1317.3.2.26 Vendor Specific information element 1367.3.2.27 Extended Capabilities information element. 1377.3.2.28 QBSS Load element.
42、 1377.3.2.29 EDCA Parameter Set element 1387.3.2.30 TSPEC element 1397.3.2.31 TCLAS element . 1447.3.2.32 TS Delay element. 1467.3.2.33 TCLAS Processing element. 1477.3.2.34 Schedule element . 1477.3.2.35 QoS Capability element . 1487.4 Action frame format details 1487.4.1 Spectrum management action
43、 details 1487.4.1.1 Measurement Request frame format 1487.4.1.2 Measurement Report frame format 1497.4.1.3 TPC Request frame format 1507.4.1.4 TPC Report frame format 1507.4.1.5 Channel Switch Announcement frame format. 1517.4.2 QoS Action frame details. 1517.4.2.1 ADDTS Request frame format 1517.4.
44、2.2 ADDTS Response frame format 1527.4.2.3 DELTS frame format . 1537.4.2.4 Schedule frame format. 1537.4.3 DLS Action frame details 1547.4.3.1 DLS Request frame format 1547.4.3.2 DLS Response frame format 1557.4.3.3 DLS Teardown frame format. 1567.4.4 Block Ack Action frame details. 1567.4.4.1 ADDBA
45、 Request frame format . 1577.4.4.2 ADDBA Response frame format. 1577.4.4.3 DELBA frame format 1587.5 Frame usage 1588. Security 1618.1 Framework 1618.1.1 Security methods 1618.1.2 RSNA equipment and RSNA capabilities . 1618.1.3 RSNA establishment 1618.1.4 RSNA assumptions and constraints. 1628.2 Pre
46、-RSNA security methods . 1638.2.1 Wired equivalent privacy (WEP). 163x Copyright 2006 IEEE. All rights reserved.This is an unapproved IEEE Standards Draft, subject to change.147101316192225283134374043464952Copyright The Institute of Electrical and Electronics Engineers, Inc. Provided by IHS under l
47、icense with IEEENot for ResaleNo reproduction or networking permitted without license from IHS-,-,-8.2.1.1 WEP overview . 1638.2.1.2 WEP MPDU format. 1648.2.1.3 WEP state. 1648.2.1.4 WEP procedures 1658.2.2 Pre-RSNA authentication 1678.2.2.1 Overview 1678.2.2.2 Open System authentication 1678.2.2.3
48、Shared Key authentication. 1688.3 RSNA data confidentiality protocols 1718.3.1 Overview 1718.3.2 Temporal Key Integrity Protocol (TKIP) 1718.3.2.1 TKIP overview. 1718.3.2.2 TKIP MPDU formats. 1748.3.2.3 TKIP MIC 1758.3.2.4 TKIP countermeasures procedures 1778.3.2.5 TKIP mixing function 1808.3.2.6 TKIP replay protection procedures 1858.3.3 CTR with CBC-MAC Protocol (CCMP). 1868.3.3.1 CCMP overview 1868.3.3.2 CCMP MPDU format 1868.3.3.3 CCMP cryptographic encapsulation 1878.3.3.4 CCMP decapsulation . 1908.4 RSNA security association management 1918