实例介绍
【实例截图】
【核心代码】
Contents 1. Overview.................................................................................................................................................... 2 1.2 Purpose......................................................................................................................................... 2 2. Normative references................................................................................................................................. 2 3. Definitions ................................................................................................................................................. 2 3A.Definitions specific to IEEE Std 802.11.................................................................................................... 5 4. Abbreviations and acronyms ..................................................................................................................... 5 5. General description .................................................................................................................................... 7 5.2 Components of the IEEE 802.11 architecture ............................................................................. 7 5.2.2 STA membership in a BSS is dynamic........................................................................ 7 5.2.3 Distribution system (DS) concepts .............................................................................. 7 5.2.3.1 Extended service set (ESS): The large coverage network ....................... 7 5.2.6 QoS BSS: The QoS network........................................................................................ 7 5.2.9 High-throughput (HT) station (STA)........................................................................... 8 5.2.14 Mesh BSS: IEEE 802.11 wireless mesh network ........................................................ 8 5.2.14.1 General..................................................................................................... 8 5.2.14.2 Overview of the mesh BSS...................................................................... 8 5.2.14.3 Mesh STA ................................................................................................ 8 5.2.14.4 IEEE 802.11 components and mesh BSS ................................................ 9 5.2.14.5 Introduction to mesh functions .............................................................. 11 5.3 Logical service interfaces .......................................................................................................... 14 5.3.2 DSS ............................................................................................................................ 14 5.4 Overview of the services............................................................................................................ 15 5.4.1 Distribution of messages within a DS........................................................................ 15 5.4.1.1 Distribution ............................................................................................ 15 5.4.3 Access control and data confidentiality services ....................................................... 15 5.4.3.1 Authentication........................................................................................ 15 5.4.3.2 Deauthentication .................................................................................... 16 5.4.3.3 Data confidentiality................................................................................ 16 5.6a Differences between ESS and MBSS LANs ............................................................................. 16 5.8 IEEE Std 802.11 and IEEE Std 802.1X-2004 ........................................................................... 16 5.8.2 Infrastructure functional model overview.................................................................. 16 5.8.2.1a AKM Operations with a Password or PSK............................................ 17 5.8.2.2 Alternate Ooperations with PSK............................................................ 17 5.8.3 IBSS functional model description ............................................................................ 18 5.8.3.2 Sample IBSS 4-Way Handshake ........................................................... 18 6. MAC service definition ........................................................................................................................... 19 6.1 Overview of MAC services ....................................................................................................... 19 6.1.2 Security services ........................................................................................................ 19 6.1.5 MAC data service architecture .................................................................................. 19 7. Frame formats .......................................................................................................................................... 20 IEEE P802.11s/D12.0, May 2011 vi Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 7.1 MAC frame formats................................................................................................................... 20 7.1.1 Conventions ............................................................................................................... 20 7.1.2 General frame format................................................................................................. 20 7.1.3 Frame fields ............................................................................................................... 20 7.1.3.1 Frame Control field................................................................................ 20 7.1.3.5 QoS Control field................................................................................... 21 7.1.3.6 Frame Body field ................................................................................... 24 7.2 Format of individual frame types............................................................................................... 26 7.2.1 Control frames ........................................................................................................... 26 7.2.1.4 PS-Poll frame format ............................................................................. 26 7.2.2 Data frames ................................................................................................................ 27 7.2.2.1 Data frame format.................................................................................. 27 7.2.2.2 A-MSDU format .................................................................................... 28 7.2.3 Management frames................................................................................................... 28 7.2.3.1 Beacon frame format ............................................................................. 31 7.2.3.6 Reassociation Request frame format ..................................................... 32 7.2.3.8 Probe Request frame format .................................................................. 32 7.2.3.9 Probe Response frame format................................................................ 32 7.2.3.10 Authentication frame format.................................................................. 33 7.2.3.12 Action frame format............................................................................... 35 7.3 Management frame body components....................................................................................... 35 7.3.1 Fields that are not information elements.................................................................... 35 7.3.1.1 Authentication algorithm number field.................................................. 35 7.3.1.4 Capability Information field .................................................................. 35 7.3.1.7 Reason Code field.................................................................................. 36 7.3.1.8 AID field ................................................................................................ 37 7.3.1.9 Status Code field.................................................................................... 37 7.3.1.11 Action field ............................................................................................ 38 7.3.1.35 Send-Confirm field ................................................................................ 38 7.3.1.36 Anti-Clogging Token field..................................................................... 38 7.3.1.37 Scalar field ............................................................................................. 38 7.3.1.38 Element field.......................................................................................... 39 7.3.1.39 Confirm field.......................................................................................... 39 7.3.1.40 Finite Cyclic Group field ....................................................................... 39 7.3.2 Information elements ................................................................................................. 40 7.3.2.1 SSID element ......................................................................................... 41 7.3.2.2 Supported Rates element ....................................................................... 41 7.3.2.6 TIM element .......................................................................................... 41 7.3.2.9 Country element..................................................................................... 41 7.3.2.13 ERP Information element ...................................................................... 41 7.3.2.14 Extended Supported Rates element ....................................................... 42 7.3.2.16 Power Capability element...................................................................... 42 7.3.2.19 Supported Channels element ................................................................. 42 7.3.2.20 Channel Switch Announcement element............................................... 42 7.3.2.20a Secondary Channel Offset element........................................................ 43 7.3.2.25 RSN element .......................................................................................... 43 7.3.2.53 Extended Channel Switch Announcement element............................... 44 7.3.2.56 HT Capabilities element ........................................................................ 44 7.3.2.57 HT Operation element ........................................................................... 45 7.3.2.92 Interworking information element ......................................................... 46 7.3.2.98 Mesh Configuration element ................................................................. 47 7.3.2.99 Mesh ID element.................................................................................... 51 7.3.2.100 Mesh Link Metric Report element......................................................... 52 7.3.2.101 Congestion Notification element ........................................................... 52 IEEE P802.11s/D12.0, May 2011 vii Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 7.3.2.102 Mesh Peering Management element...................................................... 53 7.3.2.103 Mesh Channel Switch Parameters element............................................ 54 7.3.2.104 Mesh Awake Window element.............................................................. 55 7.3.2.105 Beacon Timing element ......................................................................... 56 7.3.2.106 MCCAOP Setup Request element......................................................... 57 7.3.2.107 MCCAOP Setup Reply element ............................................................ 58 7.3.2.108 MCCAOP Advertisement Overview element........................................ 59 7.3.2.109 MCCAOP Advertisement element ........................................................ 60 7.3.2.110 MCCAOP Teardown element................................................................ 62 7.3.2.111 GANN element ...................................................................................... 63 7.3.2.112 RANN element ...................................................................................... 63 7.3.2.113 PREQ element........................................................................................ 64 7.3.2.114 PREP element ........................................................................................ 67 7.3.2.115 PERR element........................................................................................ 68 7.3.2.116 PXU element.......................................................................................... 69 7.3.2.117 PXUC element ....................................................................................... 71 7.3.2.118 Authenticated Mesh Peering Exchange element ................................... 71 7.3.2.119 MIC element .......................................................................................... 72 7.4 Action frame format details ....................................................................................................... 73 7.4.1 Spectrum management action details ........................................................................ 73 7.4.1.5 Channel Switch Announcement frame format....................................... 73 7.4.7 Public Action details.................................................................................................. 73 7.4.7.6 Extended Channel Switch Announcement frame format ...................... 73 7.4.14 Self-protected Action frame details ........................................................................... 74 7.4.14.1 Self-protected Action fields ................................................................... 74 7.4.14.2 Mesh Peering Open frame format.......................................................... 75 7.4.14.3 Mesh Peering Confirm frame format..................................................... 77 7.4.14.4 Mesh Peering Close frame format ......................................................... 78 7.4.14.5 Mesh Group Key Inform frame format.................................................. 79 7.4.14.6 Mesh Group Key Acknowledge frame format ...................................... 80 7.4.15 Mesh Action frame details......................................................................................... 81 7.4.15.1 Mesh Action fields................................................................................. 81 7.4.15.2 Mesh Link Metric Report frame format ................................................ 81 7.4.15.3 HWMP Mesh Path Selection frame format ........................................... 82 7.4.15.4 Gate Announcement frame format ........................................................ 83 7.4.15.5 Congestion Control Notification frame format...................................... 83 7.4.15.6 MCCA Setup Request frame format...................................................... 84 7.4.15.7 MCCA Setup Reply frame format ......................................................... 84 7.4.15.8 MCCA Advertisement Request frame format ....................................... 85 7.4.15.9 MCCA Advertisement frame format ..................................................... 85 7.4.15.10 MCCA Teardown frame format ............................................................ 86 7.4.15.11 TBTT Adjustment Request frame format.............................................. 86 7.4.15.12 TBTT Adjustment Response frame format ........................................... 87 7.4.16 Multihop Action frame details................................................................................... 87 7.4.16.1 Multihop Action fields........................................................................... 87 7.4.16.2 Proxy Update frame format ................................................................... 88 7.4.16.3 Proxy Update Confirmation frame format............................................. 88 8. Security .................................................................................................................................................... 90 8.1 Framework ................................................................................................................................. 90 8.1.1 Security methods........................................................................................................ 90 8.1.3 RSNA Establishment ................................................................................................. 90 8.1.6 Emergency service establishment in an RSN ............................................................ 91 IEEE P802.11s/D12.0, May 2011 viii Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 8.2 Pre-RSNA security methods...................................................................................................... 91 8.2a Authentication using a password ............................................................................................... 91 8.2a.1 SAE overview ............................................................................................................ 91 8.2a.2 Assumptions on SAE ................................................................................................. 92 8.2a.3 Representation of a password .................................................................................... 92 8.2a.4 Finite cyclic groups.................................................................................................... 93 8.2a.4.1 General................................................................................................... 93 8.2a.4.2 Elliptic curve cryptography (ECC) groups ............................................ 93 8.2a.4.3 Finite field cryptography (FFC) groups................................................. 95 8.2a.5 SAE protocol.............................................................................................................. 96 8.2a.5.1 Message exchanges................................................................................ 96 8.2a.5.2 PWE and secret generation .................................................................... 97 8.2a.5.3 Construction of a Commit Message....................................................... 97 8.2a.5.4 Processing of a peer’s Commit Message ............................................... 97 8.2a.5.5 Construction of a Confirm Message ...................................................... 98 8.2a.5.6 Processing of a peer’s Confirm Message............................................... 98 8.2a.6 Anti-clogging tokens.................................................................................................. 98 8.2a.7 Framing of SAE ......................................................................................................... 99 8.2a.7.1 General................................................................................................... 99 8.2a.7.2 Data type conversion ............................................................................. 99 8.2a.7.3 Authentication transaction sequence number for SAE ........................ 100 8.2a.7.4 Encoding and decoding of Commit Messages..................................... 100 8.2a.7.5 Encoding and decoding of Confirm Messages .................................... 101 8.2a.7.6 Status codes.......................................................................................... 101 8.2a.8 SAE finite state machine.......................................................................................... 101 8.2a.8.1 General................................................................................................. 101 8.2a.8.2 States.................................................................................................... 101 8.2a.8.3 Events and output................................................................................. 102 8.2a.8.4 Timers .................................................................................................. 103 8.2a.8.5 Variables .............................................................................................. 103 8.2a.8.6 Behavior of state machine.................................................................... 104 8.4 RSNA security association management................................................................................. 108 8.4.1 Security associations................................................................................................ 108 8.4.1.1 Security association definitions ........................................................... 108 8.4.1.2 Security association life cycle.............................................................. 111 8.4.6 RSNA authentication in an ESS .............................................................................. 112 8.4.6.2 Cached PMKSAs and RSNA key management .................................. 112 8.4.7 RSNA authentication in an IBSS............................................................................. 113 8.4.8 RSNA key management in an ESS.......................................................................... 113 8.5 Keys and key distribution ........................................................................................................ 113 8.5.1 Key hierarchy........................................................................................................... 113 8.5.1.5 FT key hierarchy.................................................................................. 113 8.5.3 4-Way Handshake.................................................................................................... 115 8.5.3.1 4-Way Handshake Message 1.............................................................. 115 8.5.6 RSNA Authenticator key management state machine............................................. 115 8.5.6.1 Authenticator state machine states....................................................... 115 8.8 Keys and key derivation algorithm for the authenticated mesh peering exchange (AMPE)... 115 8.8.1 Keys and key derivation algorithm.......................................................................... 115 9. MAC sublayer functional description.................................................................................................... 117 9.1 MAC architecture .................................................................................................................... 117 9.1.3 Hybrid coordination function (HCF) ....................................................................... 117 9.1.3.1 HCF contention-based channel access (EDCA) .................................. 118 IEEE P802.11s/D12.0, May 2011 ix Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 9.1.3a Mesh coordination function (MCF)......................................................................... 118 9.6 Multirate support...................................................................................................................... 118 9.6.0c1 Basic Rate Set and Basic MCS Set for mesh STA .................................................. 119 9.7d A-MPDU operation.................................................................................................................. 119 9.7d.4 A-MPDU aggregation of group addressed data frames........................................... 119 9.9 HCF.......................................................................................................................................... 119 9.9.1 HCF contention-based channel access (EDCA)...................................................... 119 9.9.1.2 EDCA TXOPs...................................................................................... 119 9.9a Mesh coordination function (MCF)......................................................................................... 120 9.9a.1 General..................................................................................................................... 120 9.9a.2 MCF contention-based channel access .................................................................... 120 9.9a.3 MCF controlled channel access (MCCA)................................................................ 120 9.9a.3.1 General................................................................................................. 120 9.9a.3.2 MCCA activation................................................................................. 121 9.9a.3.3 MCCAOP reservations ........................................................................ 121 9.9a.3.4 Neighborhood MCCAOP periods at a mesh STA ............................... 122 9.9a.3.5 MCCA access fraction (MAF)............................................................. 123 9.9a.3.6 MCCAOP setup procedure .................................................................. 123 9.9a.3.7 MCCAOP advertisement ..................................................................... 124 9.9a.3.8 MCCAOP teardown............................................................................. 129 9.9a.3.9 Access during MCCAOPs ................................................................... 130 9.9a.3.10 Interaction with time synchronization ................................................. 131 9.13 Protection mechanisms ............................................................................................................ 132 9.13.2 Protection mechanisms for non-ERP receivers ....................................................... 132 9.13.3 Protection mechanisms for transmissions of HT PPDUs ........................................ 132 9.13.3.1 General................................................................................................. 132 9.13.3.4a Protection rules for an HT mesh STA in an MBSS............................. 133 9.13.5 L-SIG TXOP protection........................................................................................... 134 9.13.5.1 General rules ........................................................................................ 134 9.22 Mesh forwarding framework ................................................................................................... 134 9.22.1 General..................................................................................................................... 134 9.22.2 Forwarding information........................................................................................... 134 9.22.3 Frame addressing in an MBSS................................................................................. 135 9.22.4 Addressing and forwarding of individually addressed Mesh Data frames.............. 137 9.22.4.1 At source mesh STAs (individually addressed)................................... 137 9.22.4.2 At intermediate and destination mesh STAs (individually addressed) 137 9.22.5 Addressing and forwarding of group addressed Mesh Data frames........................ 139 9.22.5.1 At source mesh STAs (group addressed)............................................. 139 9.22.5.2 At recipient mesh STAs (group addressed) ......................................... 139 9.22.6 Addressing of Management frames and MMPDU forwarding ............................... 140 9.22.6.1 General................................................................................................. 140 9.22.6.2 MMPDU forwarding using individually addressed Multihop Action frames 140 9.22.6.3 MMPDU forwarding using group addressed Multihop Action frames 141 9.22.7 Detection of duplicate MSDUs/MMPDUs .............................................................. 142 9.22.8 Mesh STAs that do not forward............................................................................... 142 9.22.9 Frame forwarding and unknown destination ........................................................... 142 10. Layer management................................................................................................................................. 144 10.3 MLME SAP interface .............................................................................................................. 144 10.3.2 Scan.......................................................................................................................... 144 10.3.2.1 MLME-SCAN.request......................................................................... 144 10.3.2.2 MLME-SCAN.confirm........................................................................ 145 IEEE P802.11s/D12.0, May 2011 x Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 10.3.3 Synchronization ....................................................................................................... 146 10.3.3.1 MLME-JOIN.request........................................................................... 146 10.3.4 Authenticate ............................................................................................................. 146 10.3.4.1 MLME-AUTHENTICATE.request..................................................... 146 10.3.4.2 MLME-AUTHENTICATE.confirm.................................................... 147 10.3.4.3 MLME-AUTHENTICATE.indication ................................................ 148 10.3.4.4 MLME-AUTHENTICATE.response .................................................. 149 10.3.5 Deauthenticate ......................................................................................................... 150 10.3.5.1 MLME-DEAUTHENTICATE.request................................................ 150 10.3.10 Start.......................................................................................................................... 150 10.3.10.1 MLME-START.request....................................................................... 151 10.3.10.2 MLME-START.confirm...................................................................... 153 10.3.15 Channel switch......................................................................................................... 153 10.3.15.1 MLME-CHANNELSWITCH.request ................................................. 153 10.3.15.3 MLME-CHANNELSWITCH.indication............................................. 154 10.3.15.4 MLME-CHANNELSWITCH.response............................................... 155 10.3.35 Extended channel switch announcement ................................................................. 156 10.3.35.1 MLME-EXTCHANNELSWITCH.request ......................................... 156 10.3.35.3 MLME-EXTCHANNELSWITCH.indication..................................... 157 10.3.35.4 MLME-EXTCHANNELSWITCH.response....................................... 158 10.3.77 Mesh peering management ...................................................................................... 159 10.3.77.1 Introduction.......................................................................................... 159 10.3.77.2 MLME-MESHPEERINGMANAGEMENT.request........................... 159 10.3.77.3 MLME-MESHPEERINGMANAGEMENT.confirm.......................... 160 10.3.77.4 MLME-MESHPEERINGMANAGEMENT.indication ...................... 161 10.3.77.5 MLME-MESHPEERINGMANAGEMENT.response ........................ 162 10.3.78 Mesh power management ........................................................................................ 162 10.3.78.1 Introduction.......................................................................................... 162 10.3.78.2 MLME-MESHPOWERMGT.request.................................................. 163 10.3.78.3 MLME-MESHPOWERMGT.confirm ................................................ 163 10.3.79 Mesh neighbor offset synchronization..................................................................... 164 10.3.79.1 Introduction.......................................................................................... 164 10.3.79.2 MLME-MESHNEIGHBOROFFSETSYNCSTART.request .............. 164 10.3.79.3 MLME-MESHNEIGHBOROFFSETSYNCSTART.confirm............. 165 10.3.79.4 MLME-MESHNEIGHBOROFFSETCALCULATE.request.............. 166 10.3.79.5 MLME-MESHNEIGHBOROFFSETCALCULATE.confirm ............ 166 10.3.79.6 MLME-MESHNEIGHBOROFFSETSYNCSTOP.request................. 167 10.3.79.7 MLME-MESHNEIGHBOROFFSETSYNCSTOP.confirm................ 168 10.3.80 Mesh TBTT adjustment ........................................................................................... 168 10.3.80.1 Introduction.......................................................................................... 168 10.3.80.2 MLME-MESHTBTTADJUSTMENT.request .................................... 169 10.3.80.3 MLME-MESHTBTTADJUSTMENT.confirm ................................... 169 10.3.80.4 MLME-MESHTBTTADJUSTMENT.indication................................ 170 10.3.80.5 MLME-MESHTBTTADJUSTMENT.response.................................. 171 10.3.81 MCCA management interface ................................................................................. 172 10.3.81.1 Introduction.......................................................................................... 172 10.3.81.2 MLME-ACTIVATEMCCA.request.................................................... 172 10.3.81.3 MLME-ACTIVATEMCCA.confirm................................................... 173 10.3.81.4 MLME-MCCASETUP.request............................................................ 174 10.3.81.5 MLME-MCCASETUP.confirm .......................................................... 175 10.3.81.6 MLME-MCCASETUP.indication ....................................................... 176 10.3.81.7 MLME-MCCASETUP.response ......................................................... 177 10.3.81.8 MLME-MCCAADVERTISEMENT.request ...................................... 178 10.3.81.9 MLME-MCCAADVERTISEMENT.confirm ..................................... 179 IEEE P802.11s/D12.0, May 2011 xi Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 10.3.81.10 MLME-MCCAADVERTISEMENT.indication.................................. 180 10.3.81.11 MLME-MCCAADVERTISEMENT.response.................................... 181 10.3.81.12 MLME-MCCATEARDOWN.request................................................. 181 10.3.81.13 MLME-MCCATEARDOWN.confirm................................................ 182 10.3.81.14 MLME-MCCATEARDOWN.indication ............................................ 183 10.3.82 MBSS congestion control ........................................................................................ 184 10.3.82.1 Introduction.......................................................................................... 184 10.3.82.2 MLME-MBSSCONGESTIONCONTROL.request ............................ 184 10.3.82.3 MLME-MBSSCONGESTIONCONTROL.confirm ........................... 185 10.3.82.4 MLME-MBSSCONGESTIONCONTROL.indication ........................ 185 10.3.83 MBSS proxy update................................................................................................. 186 10.3.83.1 Introduction.......................................................................................... 186 10.3.83.2 MLME-MBSSPROXYUPDATE.request............................................ 186 10.3.83.3 MLME-MBSSPROXYUPDATE.confirm .......................................... 187 10.3.83.4 MLME-MBSSPROXYUPDATE.indication ....................................... 188 10.3.83.5 MLME-MBSSPROXYUPDATE.response ......................................... 189 10.3.84 MBSS mesh gate announcement ............................................................................. 190 10.3.84.1 Introduction.......................................................................................... 190 10.3.84.2 MLME-MBSSGATEANNOUNCEMENT.request ............................ 190 10.3.84.3 MLME-MBSSGATEANNOUNCEMENT.confirm ........................... 191 10.3.84.4 MLME-MBSSGATEANNOUNCEMENT.indication ........................ 191 10.3.85 Mesh link metric ...................................................................................................... 192 10.3.85.1 Introduction.......................................................................................... 192 10.3.85.2 MLME-MESHLINKMETRICREAD.request..................................... 192 10.3.85.3 MLME-MESHLINKMETRICREAD.confirm.................................... 193 10.3.85.4 MLME-MESHLINKMETRICREPORT.request ................................ 194 10.3.85.5 MLME-MESHLINKMETRICREPORT.confirm ............................... 195 10.3.85.6 MLME-MESHLINKMETRICREPORT.indication ............................ 196 10.3.86 HWMP mesh path selection .................................................................................... 197 10.3.86.1 Introduction.......................................................................................... 197 10.3.86.2 MLME-HWMPMESHPATHSELECTION.request............................ 197 10.3.86.3 MLME-HWMPMESHPATHSELECTION.confirm........................... 198 10.3.86.4 MLME-HWMPMESHPATHSELECTION.indication ....................... 199 11. MLME ................................................................................................................................................... 201 11.1 Synchronization ....................................................................................................................... 201 11.1.1 Basic approach......................................................................................................... 201 11.1.1.3 TSF for an MBSS ................................................................................ 201 11.1.2 Maintaining synchronization ................................................................................... 201 11.1.2.2a Beacon generation in an MBSS ........................................................... 201 11.1.2.3 Beacon reception.................................................................................. 201 11.1.3 Acquiring synchronization, scanning ...................................................................... 201 11.1.3.2 Active scanning.................................................................................... 202 11.2 Power management.................................................................................................................. 203 11.2.2a Power management in an MBSS ............................................................................. 203 11.3 STA authentication and association......................................................................................... 203 11.3.1 Authentication and deauthentication ....................................................................... 204 11.3.1.1 Authentication—originating STA........................................................ 204 11.3.1.2 Authentication—destination STA........................................................ 205 11.3.1.3 Deauthentication—originating STA .................................................... 205 11.3.1.4 Deauthentication—destination STA .................................................... 205 11.3.3 Additional mechanisms for an AP collocated with a mesh STA............................. 205 11.7 DLS operation.......................................................................................................................... 205 IEEE P802.11s/D12.0, May 2011 xii Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 11.8 TPC procedures........................................................................................................................ 206 11.8.1a Peering based on transmit power capability ............................................................ 206 11.8.2 Specification of regulatory and local maximum transmit power levels .................. 206 11.9 DFS procedures........................................................................................................................ 207 11.9.2 Quieting channels for testing ................................................................................... 207 11.9.6 Requesting and reporting of measurements............................................................. 207 11.9.7 Selecting and advertising a new channel ................................................................. 207 11.9.7.2a MBSS channel switching..................................................................... 208 11.9a Extended channel switching (ECS) ......................................................................................... 210 11.9a.1 General..................................................................................................................... 210 11.9a.3 Selecting and advertising a new channel and/or regulatory class............................ 210 11.9a.3.3 Selecting and advertising a new channel in an MBSS......................... 210 11.19 STAs communicating data frames outside the context of a BSS ............................................ 210 11.21 Tunneled direct-link setup ....................................................................................................... 211 11.21.1 General..................................................................................................................... 211 11.23 WLAN interworking with external networks procedures........................................................ 211 11.23.2 Interworking capabilities and information............................................................... 211 11.23.6 Interworking procedures: emergency services support ........................................... 211 11A.Fast BSS transition............................................................................................................................... 213 11A.2 Key holders .............................................................................................................................. 213 11A.2.2 Authenticator key holders........................................................................................ 213 11A.2.3 Supplicant key holders............................................................................................. 213 11A.4 FT initial mobility domain association .................................................................................... 213 11A.4.2 FT initial mobility domain association in an RSN .................................................. 213 11A.5 FT Protocol .............................................................................................................................. 214 11A.5.3 Over-the-DS FT Protocol authentication in an RSN ............................................... 214 11A.8 FT authentication sequence ..................................................................................................... 214 11A.8.4 FT authentication sequence: contents of third message........................................... 214 11A.8.5 FT authentication sequence: contents of fourth message ........................................ 214 11C.MLME mesh procedures...................................................................................................................... 215 11C.1 Mesh STA dependencies ......................................................................................................... 215 11C.2 Mesh discovery ........................................................................................................................ 215 11C.2.1 General..................................................................................................................... 215 11C.2.2 Mesh identifier......................................................................................................... 215 11C.2.3 Mesh profile............................................................................................................. 216 11C.2.4 Mesh STA configuration ......................................................................................... 216 11C.2.5 Supplemental information for the mesh discovery .................................................. 216 11C.2.6 Scanning mesh BSSs ............................................................................................... 217 11C.2.7 Candidate peer mesh STA ....................................................................................... 217 11C.2.8 Establishing or becoming a member of a mesh BSS ............................................... 217 11C.2.9 Establishing mesh peerings...................................................................................... 218 11C.3 Mesh peering management (MPM) ......................................................................................... 219 11C.3.1 General..................................................................................................................... 219 11C.3.2 State variable management ...................................................................................... 220 11C.3.3 Mesh authentication................................................................................................. 220 11C.3.4 Mesh peering instance controller............................................................................. 221 11C.3.4.1 Overview.............................................................................................. 221 11C.3.4.2 Creating a new mesh peering instance................................................. 222 11C.3.4.3 Deleting mesh peering instances.......................................................... 222 11C.3.5 Mesh peering instance selection .............................................................................. 222 IEEE P802.11s/D12.0, May 2011 xiii Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 11C.3.6 Mesh peering open................................................................................................... 223 11C.3.6.1 Generating Mesh Peering Open frames ............................................... 223 11C.3.6.2 Mesh Peering Open frame processing ................................................. 223 11C.3.7 Mesh peering confirm.............................................................................................. 224 11C.3.7.1 Generating Mesh Peering Confirm frames .......................................... 224 11C.3.7.2 Mesh Peering Confirm frame processing ............................................ 224 11C.3.8 Mesh peering close .................................................................................................. 224 11C.3.8.1 Generating Mesh Peering Close frames............................................... 224 11C.3.8.2 Mesh Peering Close frame processing................................................. 225 11C.4 Mesh peering management finite state machine (MPM FSM)................................................ 225 11C.4.1 General..................................................................................................................... 225 11C.4.2 States........................................................................................................................ 225 11C.4.3 Events and actions ................................................................................................... 225 11C.4.4 Timers ...................................................................................................................... 227 11C.4.5 State transitions........................................................................................................ 227 11C.4.6 IDLE state ................................................................................................................ 229 11C.4.7 OPN_SNT state........................................................................................................ 230 11C.4.8 CNF_RCVD state .................................................................................................... 230 11C.4.9 OPN_RCVD state .................................................................................................... 231 11C.4.10 ESTAB state ............................................................................................................ 232 11C.4.11 HOLDING state....................................................................................................... 232 11C.5 Authenticated mesh peering exchange (AMPE)...................................................................... 232 11C.5.1 Overview.................................................................................................................. 232 11C.5.2 Security capabilities selection.................................................................................. 233 11C.5.2.1 Instance Pairwise Cipher Suite selection ............................................. 233 11C.5.2.2 Group cipher suite selection ................................................................ 233 11C.5.3 Construction and processing AES-SIV-protected Mesh Peering Management frames 234 11C.5.4 MGTK distribution .................................................................................................. 235 11C.5.5 Mesh Peering Management frames for AMPE........................................................ 235 11C.5.5.1 General................................................................................................. 235 11C.5.5.2 Mesh peering open for AMPE ............................................................. 235 11C.5.5.3 Mesh peering confirm for AMPE ........................................................ 236 11C.5.5.4 Mesh peering close for AMPE............................................................. 236 11C.5.6 AMPE finite state machine ...................................................................................... 237 11C.5.6.1 Overview.............................................................................................. 237 11C.5.6.2 Additional events and actions to MPM FSM....................................... 237 11C.5.6.3 State transitions.................................................................................... 238 11C.6 Mesh group key handshake...................................................................................................... 240 11C.6.1 General..................................................................................................................... 240 11C.6.2 Protection on mesh group key handshake frames.................................................... 241 11C.6.3 Mesh Group Key Inform frame construction and processing.................................. 242 11C.6.4 Mesh Group Key Acknowledge frame construction and processing ...................... 242 11C.6.5 Mesh group key implementation considerations ..................................................... 243 11C.7 Mesh path selection and metric framework............................................................................. 243 11C.7.1 General..................................................................................................................... 243 11C.7.2 Extensible path selection framework....................................................................... 244 11C.7.3 Link metric reporting ............................................................................................... 244 11C.8 Airtime link metric................................................................................................................... 244 11C.9 Hybrid wireless mesh protocol (HWMP) ................................................................................ 246 11C.9.1 General..................................................................................................................... 246 11C.9.2 Terminology............................................................................................................. 246 11C.9.3 On-demand path selection mode.............................................................................. 249 11C.9.4 Proactive tree building mode ................................................................................... 249 IEEE P802.11s/D12.0, May 2011 xiv Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 11C.9.4.1 General................................................................................................. 249 11C.9.4.2 Proactive PREQ mechanism................................................................ 249 11C.9.4.3 Proactive RANN mechanism............................................................... 250 11C.9.5 Collocated STAs ...................................................................................................... 250 11C.9.6 Parameters for extensible path selection framework ............................................... 250 11C.9.7 Addressing of HWMP Mesh Path Selection frame ................................................. 251 11C.9.8 General rules for processing HWMP elements........................................................ 252 11C.9.8.1 General................................................................................................. 252 11C.9.8.2 HWMP propagation............................................................................. 252 11C.9.8.3 HWMP sequence numbering ............................................................... 253 11C.9.8.4 Forwarding information....................................................................... 254 11C.9.8.5 Repeated attempts at path discovery.................................................... 254 11C.9.8.6 Limiting the rate of HWMP sequence number increments ................. 254 11C.9.9 Path request (PREQ)................................................................................................ 255 11C.9.9.1 General................................................................................................. 255 11C.9.9.2 Function ............................................................................................... 255 11C.9.9.3 Conditions for generating and sending a PREQ .................................. 256 11C.9.9.4 PREQ processing ................................................................................. 264 11C.9.10 Path reply (PREP).................................................................................................... 265 11C.9.10.1 General................................................................................................. 265 11C.9.10.2 Function ............................................................................................... 265 11C.9.10.3 Conditions for generating and sending a PREP................................... 266 11C.9.10.4 PREP processing.................................................................................. 269 11C.9.11 Path error (PERR).................................................................................................... 270 11C.9.11.1 General................................................................................................. 270 11C.9.11.2 Function ............................................................................................... 270 11C.9.11.3 Conditions for generating and sending a PERR .................................. 270 11C.9.11.4 PERR processing ................................................................................. 273 11C.9.12 Root announcement (RANN) .................................................................................. 274 11C.9.12.1 General................................................................................................. 274 11C.9.12.2 Function ............................................................................................... 274 11C.9.12.3 Conditions for generating and sending a RANN ................................. 275 11C.9.12.4 RANN reception .................................................................................. 276 11C.9.13 Considerations for support of STAs without mesh functionality ............................ 277 11C.10 Interworking with the DS ........................................................................................................ 277 11C.10.1 Overview of interworking between a mesh BSS and a DS ..................................... 277 11C.10.2 Gate announcement protocol ................................................................................... 278 11C.10.2.1 General................................................................................................. 278 11C.10.2.2 Function ............................................................................................... 278 11C.10.2.3 Conditions for generating and sending a GANN................................. 278 11C.10.2.4 GANN processing................................................................................ 279 11C.10.3 Data forwarding at proxy mesh gates ...................................................................... 280 11C.10.3.1 General................................................................................................. 280 11C.10.3.2 Forwarding of MSDUs from the MBSS to the DS.............................. 280 11C.10.3.3 Forwarding of MSDUs from the DS to the MBSS.............................. 280 11C.10.4 Proxy information and proxy update ....................................................................... 282 11C.10.4.1 General................................................................................................. 282 11C.10.4.2 Proxy information ................................................................................ 282 11C.10.4.3 Proxy update (PXU)............................................................................. 283 11C.10.4.4 Proxy Update Confirmation (PXUC) .................................................. 285 11C.10.5 Mesh STA collocation ............................................................................................. 285 11C.11 Intra-mesh congestion control ................................................................................................. 286 11C.11.1 General..................................................................................................................... 286 11C.11.2 Congestion control signaling protocol..................................................................... 286 IEEE P802.11s/D12.0, May 2011 xv Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 11C.12 Synchronization and beaconing in MBSSs.............................................................................. 287 11C.12.1 TSF for MBSSs........................................................................................................ 287 11C.12.2 Extensible synchronization framework ................................................................... 287 11C.12.2.1 General................................................................................................. 287 11C.12.2.2 Neighbor offset synchronization method............................................. 288 11C.12.3 Beaconing ................................................................................................................ 290 11C.12.3.1 Beacon generation in MBSSs .............................................................. 290 11C.12.3.2 Beacon reception for mesh STA.......................................................... 290 11C.12.4 Mesh beacon collision avoidance (MBCA)............................................................. 290 11C.12.4.1 Overview.............................................................................................. 290 11C.12.4.2 Beacon timing advertisement............................................................... 291 11C.12.4.3 TBTT selection .................................................................................... 294 11C.12.4.4 TBTT adjustment................................................................................. 295 11C.12.4.5 Frame transmission across reported TBTT.......................................... 296 11C.12.4.6 Delayed beacon transmissions ............................................................. 296 11C.13 Power save in a mesh BSS....................................................................................................... 297 11C.13.1 General..................................................................................................................... 297 11C.13.2 Mesh power modes .................................................................................................. 297 11C.13.2.1 General................................................................................................. 297 11C.13.2.2 Peer-specific mesh power modes......................................................... 297 11C.13.2.3 Non-peer mesh power modes .............................................................. 298 11C.13.3 Mesh power mode indications and transitions......................................................... 299 11C.13.3.1 General................................................................................................. 299 11C.13.3.2 Transition to a higher activity level ..................................................... 299 11C.13.3.3 Transition to a lower activity level ...................................................... 300 11C.13.4 TIM transmissions in an MBSS............................................................................... 300 11C.13.5 TIM types................................................................................................................. 300 11C.13.6 Mesh awake window ............................................................................................... 300 11C.13.7 Power save support .................................................................................................. 301 11C.13.8 Operation in peer-specific and non-peer mesh power modes.................................. 301 11C.13.8.1 General................................................................................................. 301 11C.13.8.2 Operation in active mode..................................................................... 302 11C.13.8.3 Operation in deep sleep mode for non-peer mesh STAs ..................... 302 11C.13.8.4 Operation in light sleep mode for a mesh peering ............................... 303 11C.13.8.5 Operation in deep sleep mode for a mesh peering............................... 303 11C.13.8.6 Conditions for Doze state .................................................................... 303 11C.13.9 Mesh peer service periods........................................................................................ 303 11C.13.9.1 General................................................................................................. 303 11C.13.9.2 Initiation of a mesh peer service period............................................... 304 11C.13.9.3 Operation during a mesh peer service period ...................................... 305 11C.13.9.4 Termination of a mesh peer service period.......................................... 305 11C.13.10MCCA use by power saving mesh STA ................................................................. 305 Annex A ...................................................................................................................................................... 307 A.2 Abbreviations and special symbols.......................................................................................... 307 A.2.2 General abbreviations for Item and Supported columns ......................................... 307 A.4 PICS proforma—IEEE Std 802.11-2007................................................................................. 308 A.4.3 IUT configuration .................................................................................................... 308 A.4.4 MAC protocol .......................................................................................................... 308 A.4.4.1 MAC protocol capabilities................................................................... 308 A.4.4.4 MAC addressing functions .................................................................. 308 A.4.14 QoS base functionality............................................................................................. 309 A.4.15 QoS enhanced distributed channel access (EDCA)................................................. 310 IEEE P802.11s/D12.0, May 2011 xvi Copyright © 2011 IEEE. All rights reserved. This is an unapproved IEEE Standards Draft, subject to change. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 A.4.16 QoS hybrid coordination function (HCF) controlled channel access (HCCA) ....... 310 A.4.23 Mesh protocol capabilities ....................................................................................... 310 A.4.23.1 General mesh support .......................................................................... 311 A.4.23.2 HWMP path selection protocol capabilities ........................................ 316 Annex H ...................................................................................................................................................... 345 H.10 SAE test vector ........................................................................................................................ 345 Annex P ....................................................................................................................................................... 347 P.1 General..................................................................................................................................... 347 Annex S ....................................................................................................................................................... 348 S.2 Basic sequences ....................................................................................................................... 348 S.3 EDCA and HCCA sequences .................................................................................................. 348 Annex X ...................................................................................................................................................... 349 X.4 Interworking with external networks and emergency call support.......................................... 349 X.4.4 Access to emergency services in an RSN................................................................ 349 Annex Y ...................................................................................................................................................... 350 Y.1 Clarification of Mesh Data frame format ................................................................................ 350 Y.2 Operational considerations for interworking ........................................................................... 350 Y.2.1 Formation and maintenance of the IEEE 802.1D spanning tree.............................. 350 Y.3 Power save parameters selection ............................................................................................. 350 Y.3.1 General..................................................................................................................... 350 Y.3.2 Selecting the mesh power mode based on traffic load............................................. 351 Y.3.3 Scanning of mesh BSSs ........................................................................................... 351 Y.3.4 Default parameters................................................................................................... 351 Y.3.5 MSDU forwarding in an MBSS containing mesh STAs in light or deep sleep mode... 352 Y.3.6 Synchronization maintenance of mesh STAs in deep sleep mode .......................... 352 Y.4 SIV key wrapping test vector................................................................................................... 352 Y.5 Airtime link metric usage example.......................................................................................... 354 Y.6 Generation of proactive PREPs in proactive PREQ mechanism of HWMP ........................... 354 Y.6.1 General..................................................................................................................... 354 Y.6.2 Additions to forwarding information....................................................................... 354 Y.6.3 Actions when sending data frames as source mesh STA......................................... 355 Y.6.4 Actions on receipt of proactive PREQ..................................................................... 355 Y.6.5 Generation of proactive PREPs ............................................................................... 355 Y.7 Generation of PREQs in proactive RANN mechanism of HWMP ......................................... 355 Y.7.1 General..................................................................................................................... 355 Y.7.2 Additions to forwarding information....................................................................... 356 Y.7.3 Actions when sending data frames as source mesh STA......................................... 356 Y.7.4 Actions on receipt of proactive RANN.................................................................... 356 Y.7.5 Actions on receipt of PREP ..................................................................................... 356 Y.8 Informative references ............................................................................................................. 357
标签:
相关软件
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论