Shopping Cart

No products in the cart.

IEEE 802.11r-2008

$109.42

IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Fast Basic Service Set (BSS) Transition

Published By Publication Date Number of Pages
IEEE 2008 126
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Amendment Standard – Superseded. This amendment specifies the extensions to IEEE Std 802.11-2007 for wireless local area networks (WLANs) providing mechanisms for fast basic service set (BSS) transition.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.11r-2008, Front Cover
3 Title Page
6 Introduction
7 Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Interpretations
Patents
8 Participants
12 Contents
16 List of figures
17 List of tables
19 Important Notice
2. Normative references
20 3. Definitions
21 4. Abbreviations and acronyms
22 5. General description
5.2 Components of the IEEE 802.11 architecture
5.2.3 Distribution system (DS) concepts
5.2.3.2 Robust security network association (RSNA)
23 5.4 Overview of the services
5.4.2 Services that support the distribution services
5.4.2.1 Mobility types
5.4.3 Access control and data confidentiality services
5.4.3.1 Authentication
5.4.3.4 Key management
24 5.4.3.7 Fast BSS transition
5.8 IEEE Std 802.11 and IEEE Std 802.1X-2004
5.8.1 IEEE 802.11 usage of IEEE Std 802.1X-2004
5.8.2 Infrastructure functional model overview
5.8.2.1 Authentication and key management (AKM) operations with Authentication Server (AS)
6. Medium access control (MAC) service definition
6.1 Overview of MAC services
6.1.2 Security services
25 7. Frame formats
7.2 Format of individual frame types
7.2.3 Management frames
7.2.3.1 Beacon frame format
7.2.3.4 Association Request frame format
7.2.3.5 Association Response frame format
26 7.2.3.6 Reassociation Request frame format
7.2.3.7 Reassociation Response frame format
27 7.2.3.9 Probe Response frame format
7.2.3.10 Authentication frame format
28 7.3 Management frame body components
7.3.1 Fields that are not information elements
7.3.1.1 Authentication Algorithm Number field
29 7.3.1.9 Status Code field
7.3.1.11 Action field
7.3.2 Information elements
30 7.3.2.25 RSN information element (RSNIE)
7.3.2.25.2 AKM suites
7.3.2.25.4 PMKID
31 7.3.2.37 Neighbor Report element
7.3.2.47 Mobility domain information element (MDIE)
32 7.3.2.48 Fast BSS transition information element (FTIE)
34 7.3.2.49 Timeout Interval information element (TIE)
35 7.3.2.50 RIC Data information element (RDIE)
7.3.2.51 RIC Descriptor information element
36 7.4 Action frame format details
7.4.8 FT Action frame details
7.4.8.1 FT Request frame
37 7.4.8.2 FT Response frame
38 7.4.8.3 FT Confirm frame
7.4.8.4 FT Ack frame
39 8. Security
8.4 RSNA Security association management
8.4.1 Security associations
8.4.1.1 Security association definitions
40 8.4.1.1.1a PMK-R0 security association
8.4.1.1.1b PMK-R1 security association
41 8.4.1.1.2 PTKSA
8.4.6 RSNA authentication in an ESS
8.4.6.1 Preauthentication and RSNA key management
8.4.10 RSNA security association termination
42 8.5 Keys and key distribution
8.5.1 Key hierarchy
8.5.1.5 FT key hierarchy
8.5.1.5.1 Overview
43 8.5.1.5.2 Key derivation function (KDF)
44 8.5.1.5.3 PMK-R0
45 8.5.1.5.4 PMK-R1
8.5.1.5.5 PTK
46 8.5.2 EAPOL-Key frames
47 8.5.2.1 EAPOL-Key frame notation
48 8.5.3 4-Way Handshake
8.5.3.1 4-Way Handshake Message 1
8.5.3.2 4-Way Handshake Message 2
8.5.3.3 4-Way Handshake Message 3
8.5.3.4 4-Way Handshake Message 4
49 8.5.4 Group Key Handshake
8.5.4.1 Group Key Handshake Message 1
8.5.4.2 Group Key Handshake Message 2
8.5.8 PeerKey Handshake
8.5.8.1 SMK Handshake
8.5.8.1.1 SMK Handshake Message 1
8.5.8.1.2 SMK Handshake Message 2
50 8.5.8.1.3 SMK Handshake Message 3
8.5.8.1.4 SMK Handshake Message 4
8.5.8.1.5 SMK Handshake Message 5
8.5.8.3 STKSA rekeying
8.5.8.4 Error reporting
51 10. Layer management
10.3 MLME SAP interface
10.3.4 Authenticate
10.3.4.1 MLME-AUTHENTICATE.request
10.3.4.1.2 Semantics of the service primitive
10.3.4.2 MLME-AUTHENTICATE.confirm
10.3.4.2.2 Semantics of the service primitive
52 10.3.4.3 MLME-AUTHENTICATE.indication
10.3.4.3.2 Semantics of the service primitive
53 10.3.4.4 MLME-AUTHENTICATE.response
10.3.4.4.2 Semantics of the service primitive
10.3.6 Associate
10.3.6.1 MLME-ASSOCIATE.request
10.3.6.1.2 Semantics of the service primitive
54 10.3.6.2 MLME-ASSOCIATE.confirm
10.3.6.2.2 Semantics of the service primitive
55 10.3.6.3 MLME-ASSOCIATE.indication
10.3.6.3.2 Semantics of the service primitive
10.3.6.4 MLME-ASSOCIATE.response
10.3.6.4.2 Semantics of the service primitive
56 10.3.7 Reassociate
10.3.7.1 MLME-REASSOCIATE.request
10.3.7.1.2 Semantics of the service primitive
10.3.7.2 MLME-REASSOCIATE.confirm
10.3.7.2.2 Semantics of the service primitive
57 10.3.7.3 MLME-REASSOCIATE.indication
10.3.7.3.2 Semantics of the service primitive
58 10.3.7.4 MLME-REASSOCIATE.response
10.3.7.4.2 Semantics of the service primitive
10.3.33 MLME SAP interface for resource request
10.3.33.1 MLME-RESOURCE_REQUEST.request
10.3.33.1.1 Function
10.3.33.1.2 Semantics of the service primitive
59 10.3.33.1.3 When generated
10.3.33.1.4 Effect of receipt
10.3.33.2 MLME-RESOURCE_REQUEST.indication
10.3.33.2.1 Function
10.3.33.2.2 Semantics of the service primitive
10.3.33.2.3 When generated
60 10.3.33.2.4 Effect of receipt
10.3.33.3 MLME-RESOURCE_REQUEST.response
10.3.33.3.1 Function
10.3.33.3.2 Semantics of the service primitive
10.3.33.3.3 When generated
10.3.33.3.4 Effect of receipt
10.3.33.4 MLME-RESOURCE_REQUEST.confirm
10.3.33.4.1 Function
10.3.33.4.2 Semantics of the service primitive
61 10.3.33.4.3 When generated
10.3.33.4.4 Effect of receipt
10.3.33.5 MLME-RESOURCE_REQUEST_LOCAL.request
10.3.33.5.1 Function
10.3.33.5.2 Semantics of the service primitive
62 10.3.33.5.3 When generated
10.3.33.5.4 Effect of receipt
10.3.33.6 MLME-RESOURCE_REQUEST_LOCAL.confirm
10.3.33.6.1 Function
10.3.33.6.2 Semantics of the service primitive
10.3.33.6.3 When generated
10.3.33.6.4 Effect of receipt
63 10.3.34 MLME SAP interface for remote requests
10.3.34.1 MLME-REMOTE_REQUEST.request
10.3.34.1.1 Function
10.3.34.1.2 Semantics of the service primitive
10.3.34.1.3 When generated
10.3.34.1.4 Effect of receipt
10.3.34.2 MLME-REMOTE_REQUEST.indication
10.3.34.2.1 Function
10.3.34.2.2 Semantics of the service primitive
64 10.3.34.2.3 When generated
10.3.34.2.4 Effect of receipt
10.3.34.3 MLME-REMOTE_REQUEST.confirm
10.3.34.3.1 Function
10.3.34.3.2 Semantics of the service primitive
10.3.34.3.3 When generated
10.3.34.3.4 Effect of receipt
65 11. MLME
11.3 STA authentication and association
11.3.1 Authentication and deauthentication
11.3.1.1 Authentication-originating STA
11.3.1.2 Authentication-destination STA
66 11.3.2 Association, reassociation, and disassociation
11.3.2.3 STA reassociation procedures
11.3.2.4 AP reassociation procedures
11.4 Traffic stream (TS) operation
11.4.1 Introduction
11.4.3 TS lifecycle
67 11.4.4a TS setup by resource request during a fast BSS transition
68 11A. Fast BSS transition
11A.1 Overview
69 11A.2 Key holders
11A.2.1 Introduction
11A.2.2 Authenticator key holders
70 11A.2.3 Supplicant key holders
71 11A.3 Capability and policy advertisement
11A.4 FT initial mobility domain association
11A.4.1 Overview
11A.4.2 FT initial mobility domain association in an RSN
74 11A.4.3 FT initial mobility domain association in a non-RSN
75 11A.5 FT Protocol
11A.5.1 Overview
11A.5.2 Over-the-air FT Protocol authentication in an RSN
77 11A.5.3 Over-the-DS FT Protocol authentication in an RSN
79 11A.5.4 Over-the-air FT Protocol authentication in a non-RSN
80 11A.5.5 Over-the-DS FT Protocol authentication in a non-RSN
81 11A.6 FT Resource Request Protocol
11A.6.1 Overview
11A.6.2 Over-the-air fast BSS transition with resource request
84 11A.6.3 Over-the-DS fast BSS transition with resource request
86 11A.7 FT reassociation
11A.7.1 FT reassociation in an RSN
87 11A.7.2 FT reassociation in a non-RSN
88 11A.8 FT authentication sequence
11A.8.1 Overview
90 11A.8.2 FT authentication sequence: contents of first message
11A.8.3 FT authentication sequence: contents of second message
91 11A.8.4 FT authentication sequence: contents of third message
11A.8.5 FT authentication sequence: contents of fourth message
93 11A.9 FT security architecture state machines
11A.9.1 Introduction
11A.9.2 R0KH state machine
94 11A.9.2.1 R0KH state machine states
95 11A.9.2.2 R0KH state machine variables
11A.9.2.3 R0KH state machine procedures
11A.9.3 R1KH state machine
97 11A.9.3.1 R1KH state machine states
98 11A.9.3.2 R1KH state machine variables
99 11A.9.3.3 R1KH state machine procedures
11A.9.4 S0KH state machine
11A.9.4.1 S0KH state machine states
100 11A.9.4.2 S0KH state machine variables
11A.9.4.3 S0KH state machine procedures
11A.9.5 S1KH state machine
11A.9.5.1 S1KH state machine states
103 11A.9.5.2 S1KH state machine variables
104 11A.9.5.3 S1KH state machine procedures
11A.10 Remote request broker (RRB) communication
11A.10.1 Overview
11A.10.2 Remote request broker (RRB)
105 11A.10.3 Remote Request/Response frame definition
106 11A.11 Resource request procedures
11A.11.1 General
107 11A.11.2 Resource information container (RIC)
109 11A.11.3 Creation and handling of a resource request
11A.11.3.1 STA procedures
110 11A.11.3.2 AP procedures
113 Annex A (normative) Protocol Implementation Conformance Statement (PICS) proforma
115 Annex D (normative) ASN.1 encoding of the MAC and PHY MIB
126 Annex Q (normative) ASN.1 encoding of the RRM MIB
IEEE 802.11r-2008
$109.42