IEEE 802.11az-2022
$93.17
IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks–Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Positioning (Published)
Published By | Publication Date | Number of Pages |
IEEE | 2022 |
Amendment Standard – Active. This amendment defines modifications to both the IEEE 802.11 medium access control layer (MAC) and physical layers (PHY). Compared to IEEE Std 802.11-2020 it enables absolute and relative position estimation with higher accuracy, and reduces wireless medium utilization and power consumption, is scalable to dense deployments, and includes security features.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | Front Cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
12 | Introduction |
13 | Contents |
19 | Tables |
21 | Figures |
25 | 1. Overview 1.3 Supplementary information on purpose |
26 | 3. Definitions, acronyms, and abbreviations 3.2 Definitions specific to IEEE Std 802.11 |
27 | 3.4 Acronyms and abbreviations |
28 | 4. General description 4.3 Components of the IEEE 802.11 architecture 4.3.19 Wireless network management 4.3.19.19 Fine timing measurement (FTM) |
29 | 4.5 Overview of the services 4.5.4 Access control and data confidentiality services 4.5.4.2 Authentication |
30 | 6. Layer management 6.3 MLME SAP interface 6.3.5 Authenticate 6.3.5.2 MLME-AUTHENTICATE.request 6.3.5.2.2 Semantics of the service primitive 6.3.5.3 MLME-AUTHENTICATE.confirm 6.3.5.3.2 Semantics of the service primitive |
31 | 6.3.5.4 MLME-AUTHENTICATE.indication 6.3.5.4.2 Semantics of the service primitive |
32 | 6.3.5.5 MLME-AUTHENTICATE.response 6.3.5.5.2 Semantics of the service primitive |
33 | 6.3.56 Fine timing measurement (FTM) 6.3.56.1 General |
35 | 6.3.56.2 MLME-FINETIMINGMSMTRQ.request 6.3.56.2.2 Semantics of the service primitive |
36 | 6.3.56.3 MLME-FINETIMINGMSMTRQ.indication 6.3.56.3.2 Semantics of the service primitive 6.3.56.4 MLME-FINETIMINGMSMT.request 6.3.56.4.1 Function |
37 | 6.3.56.4.2 Semantics of the service primitive |
38 | 6.3.56.4.3 When generated 6.3.56.4.4 Effect of receipt |
39 | 6.3.56.5 MLME-FINETIMINGMSMT.confirm 6.3.56.5.1 Function 6.3.56.5.2 Semantics of the service primitive |
40 | 6.3.56.5.3 When generated 6.3.56.6 MLME-FINETIMINGMSMT.indication 6.3.56.6.2 Semantics of the service primitive |
41 | 8. PHY service specification 8.3 Detailed PHY service specifications 8.3.4 Basic service and options 8.3.4.2 PHY SAP inter-(sub)layer service primitives 8.3.4.3 PHY SAP service primitives parameters |
42 | 8.3.4.4 Vector descriptions 8.3.5 PHY SAP detailed service specification 8.3.5.14 PHY-RXEND.indication 8.3.5.14.2 Semantics of the service primitive 8.3.5.18 PHY-RXLTFSEQUENCE.request 8.3.5.18.1 Function 8.3.5.18.2 Semantics of the service primitive 8.3.5.18.3 When generated |
43 | 8.3.5.18.4 Effect of receipt 8.3.5.19 PHY-RXTRNSEQUENCE.request 8.3.5.19.1 Function 8.3.5.19.2 Semantics of the service primitive 8.3.5.19.3 When generated 8.3.5.19.4 Effect of receipt |
44 | 9. Frame formats 9.3 Format of individual frame types 9.3.1 Control frames 9.3.1.19 VHT/HE/Ranging NDP Announcement frame format |
48 | 9.3.1.22 Trigger frame format 9.3.1.22.1 General |
49 | 9.3.1.22.10 Ranging Trigger variant |
50 | 9.3.1.22a Subvariants of Ranging Trigger variant 9.3.1.22a.1 Poll subvariant |
51 | 9.3.1.22a.2 Sounding subvariant 9.3.1.22a.3 Secure sounding subvariant |
52 | 9.3.1.22a.4 Report subvariant 9.3.1.22a.5 Passive sounding subvariant 9.3.3 (PV0) Management frames 9.3.3.2 Beacon frame format |
53 | 9.3.3.11 Authentication frame format |
54 | 9.4 Management and Extension frame body components 9.4.1 Fields that are not elements 9.4.1.1 Authentication Algorithm Number field 9.4.1.9 Status Code field |
55 | 9.4.1.11 Action field |
56 | 9.4.2 Elements 9.4.2.1 General |
57 | 9.4.2.20 Measurement Request element 9.4.2.20.1 General 9.4.2.21 Measurement Report element 9.4.2.21.10 LCI report (Location configuration information report) |
60 | 9.4.2.24 RSNE 9.4.2.24.3 AKM suites 9.4.2.26 Extended Capabilities element |
61 | 9.4.2.36 Neighbor Report element |
62 | 9.4.2.118 MIC element 9.4.2.127 DMG Capabilities element 9.4.2.127.1 General 9.4.2.127.10 DMG Direction Measurement Capabilities field |
63 | 9.4.2.127.11 DMG Fine Timing and Range Measurement Capability Information field |
64 | 9.4.2.167 Fine Timing Measurement FTM Parameters element |
68 | 9.4.2.187 FILS Wrapped Data element |
69 | 9.4.2.241 RSN Extension element (RSNXE) |
70 | 9.4.2.265 EDMG Capabilities element 9.4.2.265.2 Beamforming Capability subelement |
71 | 9.4.2.296 ISTA Availability Window element 9.4.2.297 RSTA Availability Window element |
73 | 9.4.2.298 Ranging Parameters element |
80 | 9.4.2.299 Secure HE-LTF Parameters element |
81 | 9.4.2.300 Direction Measurement Results element |
82 | 9.4.2.301 Multiple Best AWV ID element |
83 | 9.4.2.302 Multiple AOD Feedback element |
84 | 9.4.2.303 PASN Parameters element |
85 | 9.4.2.304 ISTA Passive TB Ranging Measurement Report element |
87 | 9.4.2.305 RSTA Passive TB Ranging Measurement Report element |
88 | 9.4.2.306 Passive TB Ranging LCI Table element |
89 | 9.4.2.307 LOS Likelihood element |
90 | 9.6 Action frame format details 9.6.6 Radio Measurement action details 9.6.6.6 Neighbor Report Request frame format 9.6.7 Public Action details 9.6.7.1 Public Action frames |
91 | 9.6.7.32 Fine Timing Measurement FTM Request frame format |
92 | 9.6.7.33 Fine Timing Measurement (FTM) frame format |
95 | 9.6.7.49 Location Measurement Report (LMR) frame format |
97 | 9.6.7.50 ISTA Passive TB Ranging Measurement Report frame format 9.6.7.51 Primary RSTA Broadcast Passive TB Ranging Measurement Report frame format |
98 | 9.6.7.52 Secondary RSTA Broadcast Passive TB Ranging Measurement Report frame format |
99 | 9.6.34 Protected Fine Timing frame details 9.6.34.1 Protected Fine Timing Action field |
100 | 10. MAC sublayer functional description 10.3 DCF 10.3.2 Procedures common to the DCF and EDCAF 10.3.2.14 Duplicate detection and recovery 10.3.2.14.2 Transmitter requirements |
101 | 10.3.2.14.3 Receiver requirements 10.12 A-MPDU operation 10.12.3 Minimum MPDU start spacing rules 10.23 HCF 10.23.2 HCF contention based channel access (EDCA) 10.23.2.8 Multiple frame transmission in an EDCA TXOP |
102 | 10.42 DMG beamforming 10.42.10 EDMG beamforming 10.42.10.6 First path beamforming training |
104 | 11. MLME 11.3 STA authentication and association 11.3.1 State variables 11.3.2 State transition diagram for nonmesh STAs |
105 | 11.3.3 Frame filtering based on STA state |
106 | 11.3.4 Authentication and deauthentication 11.3.4.1 General 11.3.4.2 Authentication—originating STA 11.3.4.3 Authentication—destination STA |
107 | 11.3.4.4 Deauthentication—originating STA 11.3.4.5 Deauthentication—destination STA 11.3.5 Association, reassociation, and disassociation 11.3.5.1 General |
108 | 11.3.5.2 Non-AP and non-PCP STA association initiation procedures 11.3.5.3 AP or PCP association receipt procedures 11.3.5.4 Non-AP and non-PCP STA reassociation initiation procedures |
109 | 11.3.5.5 AP or PCP reassociation receipt procedures 11.3.5.6 Non-AP and non-PCP STA disassociation initiation procedures 11.3.5.8 AP or PCP disassociation initiation procedure 11.10 Radio measurement procedures 11.10.10 Usage of the neighbor report 11.10.10.2 Requesting a neighbor report 11.10.10.3 Responding to a neighbor report request |
110 | 11.13 SA Query procedures 11.21 Wireless network management procedures 11.21.6 Fine timing measurement (FTM) procedure 11.21.6.1 OverviewGeneral 11.21.6.1.1 EDCA based Ranging and TB ranging overview |
111 | 11.21.6.1.2 Non-TB ranging overview |
112 | 11.21.6.1.3 Passive TB ranging overview |
114 | 11.21.6.2 FTM capabilities |
116 | 11.21.6.3 Fine timing measurement FTM procedure negotiation 11.21.6.3.1 General |
117 | 11.21.6.3.2 Negotiation for EDCA based ranging measurement exchange |
119 | 11.21.6.3.3 Negotiation for TB and non-TB ranging measurement exchange |
123 | 11.21.6.3.4 Negotiation for secure HE-LTF in the TB and non-TB ranging measurement exchange |
125 | 11.21.6.3.5 Capability negotiation for EDCA based ranging with the Format And Bandwidth field set to value in range 31–43 |
126 | 11.21.6.3.6 Negotiation for secure EDMG TRN in EDCA based ranging measurement 11.21.6.3.7 Direction measurement negotiation for DMG STAs |
127 | 11.21.6.3.8 LOS assessment negotiation for EDMG STAs 11.21.6.3.9 Passive TB ranging measurement negotiation |
128 | 11.21.6.4 Measurement exchange 11.21.6.4.1 FTM measurement exchange overview 11.21.6.4.2 EDCA based ranging measurement exchange 11.21.6.4.2.1 Common behavior for EDCA based ranging measurement exchange |
134 | 11.21.6.4.2.2 DMG general measurement exchange |
135 | 11.21.6.4.2.3 DMG/EDMG AOA/AOD measurement exchange |
136 | 11.21.6.4.2.4 DMG AOD feedback exchange after an FTM exchange 11.21.6.4.2.5 DMG LOS assessment for EDCA based ranging measurement exchange |
137 | 11.21.6.4.2.6 DMG first path AWV for EDCA based ranging measurement exchange 11.21.6.4.2.7 DMG secure measurement exchange for EDMG STAs |
139 | 11.21.6.4.3 TB ranging measurement exchange 11.21.6.4.3.1 General |
141 | 11.21.6.4.3.2 Polling phase of TB ranging |
142 | 11.21.6.4.3.3 Measurement Sounding phase of TB ranging |
146 | 11.21.6.4.3.4 Reporting phase of TB ranging measurement |
148 | 11.21.6.4.4 Non-TB ranging measurement exchange 11.21.6.4.4.1 General 11.21.6.4.4.2 Measurement sounding phase of non-TB ranging |
151 | 11.21.6.4.4.3 Non-TB ranging measurement reporting phase |
153 | 11.21.6.4.5 Secure HE-LTF in the TB and non-TB ranging measurement exchange protocol 11.21.6.4.5.1 General 11.21.6.4.5.2 TB ranging measurement exchange with secure HE-LTF |
158 | 11.21.6.4.5.3 Non-TB ranging measurement exchange with secure HE-LTF |
162 | 11.21.6.4.5.4 Overview of secure HE-LTF octet stream generation |
163 | 11.21.6.4.5.5 Secure HE-LTF octet stream generation on an ISTA |
164 | 11.21.6.4.5.6 Secure HE-LTF input octet stream generation on an RSTA |
166 | 11.21.6.4.6 Transmission of a ranging NDP |
169 | 11.21.6.4.7 Time of arrival estimation using phase shift feedback |
170 | 11.21.6.4.8 Measurement exchange in passive TB ranging mode 11.21.6.4.8.1 General 11.21.6.4.8.2 Polling phase of passive TB ranging 11.21.6.4.8.3 Passive TB ranging measurement sounding phase |
173 | 11.21.6.4.8.4 Passive TB ranging Measurement Reporting phase |
176 | 11.21.6.4.9 Passive TB ranging differential time-of-flight calculations using phase shift TOA timestamps |
177 | 11.21.6.5 Fine timing measurement FTM parameter modification 11.21.6.5.1 Availability window parameter modification |
178 | 11.21.6.6 Fine timing measurement FTM session termination 11.21.6.6.1 EDCA based ranging session termination 11.21.6.6.2 TB ranging and non-TB ranging session termination |
179 | 11.21.6.7 LCI and Location Civic retrieval using FTM procedure |
180 | 11.24 Quality-of-service Management frame (QMF) 11.24.1 General 11.24.1.2 Default QMF policy |
181 | 12. Security 12.2 Framework 12.2.4 RSNA establishment 12.2.7 Requirements for management frame protection 12.2.11 EDMG secure ranging sequences |
182 | 12.5 RSNA confidentiality and integrity protocols 12.5.3 CTR with CBC-MAC protocol (CCMP) 12.5.3.2 CCMP MPDU format |
183 | 12.5.3.4 CCMP decapsulation 12.5.3.4.4 PN and replay detection |
184 | 12.5.5 GCM protocol (GCMP) 12.5.5.2 GCMP MPDU format 12.5.5.4 GCMP decapsulation 12.5.5.4.4 PN and replay detection |
185 | 12.6 RSNA security association management 12.6.1 Security associations 12.6.1.1 Security association definitions 12.6.1.1.1 General 12.6.1.1.6 PTKSA |
186 | 12.6.7 RSNA policy selection in an MBSS 12.6.10 RSNA authentication in an infrastructure BSS 12.6.10.1 General 12.6.19 Protection of robust Management frames |
187 | 12.7 Keys and key distribution 12.7.1 Key hierarchy 12.7.1.3 Pairwise key hierarchy |
189 | 12.7.1.6 FT key hierarchy 12.7.1.6.5 PTK 12.7.3 EAPOL-Key frame construction and processing |
190 | 12.11 Authentication for FILS 12.11.2 FILS authentication protocol 12.11.2.5 Key establishment with FILS authentication 12.11.2.5.3 PTKSA Key derivation with FILS authentication |
191 | 12.13 Preassociation security negotiation 12.13.1 General 12.13.2 Discovery of a PASN capable AP |
192 | 12.13.3 Key establishment with PASN authentication 12.13.3.1 Overview |
193 | 12.13.3.2 PASN frame construction and processing |
197 | 12.13.4 PASN authentication with FILS shared key |
198 | 12.13.5 PASN authentication with SAE |
199 | 12.13.6 PASN authentication with FT 12.13.7 PTKSA derivation with PASN authentication |
200 | 12.13.8 MIC computation with PASN authentication 12.13.8.1 MIC computation for PASN second frame 12.13.8.2 MIC computation for PASN third frame |
201 | 12.13.9 Comeback cookies |
202 | 26. High-efficiency (HE) MAC specification 26.5 MU operation 26.5.2 UL MU operation 26.5.2.2 Rules for soliciting UL MU frames 26.5.2.2.4 Allowed settings of the Trigger frame fields and TRS Control subfield 26.5.2.5 UL MU CS mechanism 26.12 HE PPDU post-FEC padding and packet extension |
203 | 26.15 PPDU format, BW, MCS, NSS, and DCM selection rules 26.15.2 PPDU format selection 26.17 HE BSS operation 26.17.2 HE BSS operation in the 6 GHz band 26.17.2.1 General |
204 | 27. High-efficiency (HE) PHY specification 27.1 Introduction 27.1.1 Introduction to the HE PHY |
205 | 27.2 HE PHY service interface 27.2.2 TXVECTOR and RXVECTOR parameters |
207 | 27.2.3a LTFVECTOR parameters |
208 | 27.3 HE PHY 27.3.4 HE PPDU formats 27.3.11 HE preamble 27.3.11.1 Introduction 27.3.18a HE Ranging NDP and HE TB Ranging NDP 27.3.18a.1 HE Ranging NDP |
211 | 27.3.18a.2 HE TB Ranging NDP |
212 | 27.3.18b HE-LTF field using secure HE-LTF 27.3.18b.1 Introduction |
213 | 27.3.18b.2 Generation of a randomized secure HE-LTF sequence 27.3.18b.2.1 Randomized LTF sequence for 20 MHz secure NDP |
214 | 27.3.18b.2.2 Randomized LTF sequence for 40 MHz secure NDP |
215 | 27.3.18b.2.3 Randomized LTF sequence for 80 MHz secure NDP |
217 | 27.3.18b.2.4 Randomized LTF sequence for the 160 MHz secure NDP and for the 80+80 MHz secure NDP |
219 | 27.3.18b.3 Pseudorandom and deterministic per spatial stream phase rotations |
220 | 27.3.18b.4 Frequency domain windowing in HE-LTF field using secure HE-LTF |
222 | 27.3.18b.5 Mathematical description of HE-LTF field using secure HE-LTF |
223 | 27.3.18b.6 Construction of secure HE-LTF symbols |
224 | 27.3.19 Transmit specification 27.3.19.5 Time of departure accuracy 27.3.21 HE transmit procedure |
225 | 27.3.22 HE receive procedure 27.4 HE PLME 27.4.3 TXTIME and PSDU_LENGTH calculation |
227 | 28. Enhanced directional multi-gigabit (EDMG) PHY specification 28.1 Introduction 28.1.1 Introduction to EDMG PHY 28.2 EDMG PHY service interface 28.2.2 TXVECTOR and RXVECTOR parameters |
228 | 28.3 Common parameters 28.3.2 EDMG PPDU format 28.3.2.1 General 28.3.3 EDMG preamble 28.3.3.3 EDMG portion of EDMG format preamble 28.3.3.3.2 EDMG-Header-A definition 28.3.3.3.2.3 Definition for EDMG SC mode and EDMG OFDM mode PPDUs |
229 | 28.5 EDMG and non-EDMG SC mode 28.5.9 Data field 28.5.9.2 Symbol blocking and guard insertion 28.5.9.2.2 SU PPDU transmission 28.5.9.2.2.2 SU PPDU transmission over a 2.16 GHz or a 2.16+2.16 GHz channel with NSTS = 1 28.9 EDMG beamforming 28.9.3 EDMG secure ranging PPDU 28.9.3.1 General 28.9.3.2 EDMG secure ranging PPDU structure 28.9.3.3 EDMG secure ranging PPDU header fields 28.9.3.4 EDMG secure ranging PPDU duration 28.9.3.5 TRN field definition with Secure TRN subfields |
230 | 28.9.3.5.1 TRN field structure with Secure TRN subfields 28.9.3.6 Secure TRN subfield definition for EDMG secure ranging PPDU |
231 | 28.9.3.7 Transmission of an EDMG secure ranging PPDU |
232 | Annex A (informative) Bibliography |
233 | Annex B (normative) Protocol Implementation Conformance Statement (PICS) proforma B.4 PICS proforma—IEEE Std 802.11-2020 B.4.3 IUT configuration B.4.4 MAC protocol |
235 | B.4.37 Enhanced positioning (Ranging) features |
238 | Annex C (normative) ASN.1 encoding of the MAC and PHY MIB C.3 MIB detail |
243 | Annex J (informative) RSNA reference implementations and test vectors J.12 PASN Test Vectors J.13 KDK Test Vectors when PASN authentication is not used |
244 | J.14 LTF Sequence Generation Test Vectors |
245 | Annex AD (informative) Phase shift feedback calculation |
246 | Annex AE (informative) SIR-based attack detection |
248 | Back Cover |