Overview of Emerging IEEE 802.11 Protocols
Overview of Emerging IEEE 802.11 Protocols
Overview of Emerging IEEE 802.11 Protocols
Sunghyun Choi
IEEE 802.11 Protocols for Seoul National
University
MAC and Above
C O N T E N T S
I. INTRODUCTION 105
PROTOCOL (IAPP)
ENHANCEMENT [9]
STANDARDIZATIONS
REFERENCES 126
Overview of Emerging IEEE 802.11
Protocols for MAC and Above
Sunghyun Choi
During the last few years, the IEEE 802.11 Wireless LAN (WLAN) has become a dominant technology for the
(indoor) broadband wireless networking. Along with its success, there have been demands to enhance the
performance of the 802.11. To meet such needs, the IEEE 802.11 Working Group (WG) has been developing new
protocols to amend the existing protocols. In this paper, we overview the emerging protocols of the IEEE 802.11
WLAN for the medium access control (MAC) layers and above. These include 802.11e for quality-of-service (QoS),
802.11f for Inter-Access Point Protocol (IAPP), 802.11h for spectrum management at 5GHz, 802.11i for security
enhancement, 802.11k for radio resource measurement, and finally 802.11m for higher throughput.
networking. The state-of-the-art 802.11 devices provide •802.11a PHY specified in [3] supporting up to 54
the Ethernet-like best-effort service with the Mbps transmission rate at 5GHz, and/or
transmission rate up to 54 Mbps at 2.4GHz and 5GHz •802.11b PHY specified in [4] supporting up to 11
the medium access control (MAC) sub-layer and Mbps transmission rate at 2.4GHz; 802.11g is a super
physical (PHY) layer. The IEEE 802.11 Working set of 802.11b PHY.
Group (WG) [1] started its standardization activities in
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 104 105
Telecommunications Review 2003•특집부록
Existing
.11g OFDM
@2.4 GHz Emerging
As found in the reference, all the specifications other some specifications like 802.11h (and 802.11n, not
than IEEE 802.11-1999 in [2] are amendments of the shown in the figure) involve both MAC and PHY
original specification. amendments. The figure represents the status of the
During the last few years, the 802.11 WG has been 802.11 standard families as of late year 2003 or as late
working on the standardization of new specifications to as early 2004; the standardization activities for 802.11f,
enhance the performance of the 802.11 WLAN. Out of 802.11g, and 802.11h have been finalized already, and
new and emerging specifications, the followings are the activities for 802.11e and 802.11i are expected to be
related to the layers of the MAC and above: finished by the end of 2003 or early 2004. The 802.11k
and 802.11n are not shown since the standardization of
•802.11e for Quality-of-Service (QoS) support [5] these two protocols has recently started.
•802.11f for Inter-Access Point Protocol (IAPP) [6] In this paper, we overview the characteristics of
•802.11h for spectrum and transmit power these emerging specifications of the 802.11 related to
management [8] the MAC and above. The rest of the paper is organized
•802.11i for security enhancement [9] as follows. We first briefly review the current MAC of
•802.11k for radio resource measurement the 802.11 in Section II. Then, Sections III, IV, V, and
enhancement [10] VI present the 802.11e for QoS, 802.11f for IAPP,
•802.11n for higher throughput [1] 802.11h for spectrum and transmit power management,
and 802.11i for security enhancement, respectively.
Figure 1 illustrates the relationship among the After briefing the 802.11k and 802.11n in Section VII,
existing and emerging specifications, where the we conclude this paper in Section VIII.
direction of each arrow specifies the original and
amended standards. For example, the 802.11e MAC is
an amendment of the 802.11-1999 MAC. Note that
II. LEGACY 802.11 MAC [2] assessment of the channel status, i.e., whether the
channel is busy (i.e., somebody transmitting a frame) or
The IEEE 802.11 legacy MAC [2] is based on the idle (i.e., no transmission). Basically, the CSMA/CA of
logical functions, called the coordination functions, the DCF works as follows:
which determine when a station (STA) operating within When a frame arrives at the head of the transmission
a Basic Service Set (BSS) is permitted to transmit and queue, if the channel is busy, the MAC waits until the
may be able to receive frames via the wireless medium. medium becomes idle, then defers for an extra time
There are two types of BSSs. An infrastructure BSS is interval, called the DCF Interframe Space (DIFS). If
composed of an access point (AP) and multiple STAs the channel stays idle during the DIFS deference, the
associated with the AP, where the AP works as a bridge MAC then starts the backoff process by selecting a
between the wireless and wired domains, and an random backoff count. For each slot time interval,
independent BSS (IBSS) is composed of multiple during which the medium stays idle, the random
STAs. Within an infrastructure BSS, a STA should be backoff counter (or BC) is decremented. When the
associated with an AP in order to perform a normal data counter reaches zero, the frame is transmitted. On the
transfer. A frame arriving from the higher layer to the other hand, when a frame arrives at the head of the
MAC is referred to as MAC Service Data Unit queue, if the MAC is in either the DIFS deference or the
(MSDU), and the frame, which carries the MSDU or its random backoff process2), the processes described
fragment along with the MAC header and Frame Check above are applied again. That is, the frame is
Sequence (FCS) based on CRC-32, is referred to as transmitted only when the random backoff has finished
MAC Protocol Data Unit (MPDU). The MPDU is the successfully. When a frame arrives at an empty queue
frame which is being transferred between STAs in the and the medium has been idle longer than the DIFS
MAC's perspective. time interval, the frame is transmitted immediately.
Two coordination functions are defined, namely, the Each STA maintains a contention window (CW),
mandatory distributed coordination function (DCF), for which is used to select the random backoff count. The
a distributed, contention-based channel access, based on backoff count is determined as a pseudo-random integer
carrier-sense multiple access with collision avoidance drawn from a uniform distribution over the interval
(CSMA/CA), and the optional point coordination [0,CW]. How to determine the CW value is further
function (PCF), for a centralized, contention-free detailed below. If the channel becomes busy during a
channel access, based on poll-and-response mechanism. backoff process, the backoff is suspended. When the
Most of today's 802.11 devices operate in the DCF channel becomes idle again, and stays idle for an extra
mode only. DIFS time interval, the backoff process resumes with
the latest backoff counter value. The timing of DCF
1. Distributed Coordination Function (DCF) channel access is illustrated in Figure 2.
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 106 107
Telecommunications Review 2003•특집부록
DIFS
Immediate access when
medium is idle >=DIFS Contention Window
PIFS
DIFS
SIFS Backoff
Busy Next
Medium Window Frame
Slot Time
For each successful reception of a frame, the deference and a random backoff even if there is no other
receiving STA immediately acknowledges the frame pending frame in the queue. This is often referred to as
reception by sending an acknowledgement (ACK) ''post'' backoff, as this backoff is done after, not before,
frame. The ACK frame is transmitted after a short IFS a transmission. This post backoff ensures there is at
(SIFS), which is shorter than the DIFS. Other STAs least one backoff interval between two consecutive
resume the backoff process after the DIFS idle time. MSDU transmissions.
Thanks to the SIFS interval between the data and ACK In the WLAN environments, there may be hidden
frames, the ACK frame transmission is protected from STAs. Two STAs, which can transmit to and receive
other STAs' contention. If an ACK frame is not from a common STA while they cannot see each other,
received after the data transmission, the frame is are hidden STAs each other. Since the DCF operates
retransmitted after another random backoff. based on the carrier sensing, the existence of such
The CW size is initially assigned CWmin, and hidden STAs can degrade the network performance
increases when a transmission fails, i.e., the transmitted severely. To reduce the hidden STA problem, the
data frame has not been acknowledged. After any 802.11 defines a Request-to-Send/Clear-to-Send
unsuccessful transmission attempt, another backoff is (RTS/CTS) mechanism. That is, if the transmitting
performed using a new CW value updated by STA opts to use the RTS/CTS mechanisms, before
transmitting a data frame, the STA transmits a short
RTS frame, followed by a CTS frame transmitted by the
CW:=2(CW+1)-1, receiving STA. The RTS and CTS frames include the
information of how long it does take to transmit the
subsequent data frame and the corresponding ACK
with an upper bound of CWmax. This reduces the response. Thus, other STAs hearing the transmitting
collision probability in case there are multiple STAs STA and hidden STAs close to the receiving STA will
attempting to access the channel. After each successful not start any transmissions; their timer called Network
transmission, the CW value is reset to CWmin, and the Allocation Vector (NAV) is set, and as long as the NAV
transmission-completing STA performs the DIFS value is non-zero, a STA does not contend for the
DIFS
DIFS
NAV
medium. Between two consecutive frames in the Function (PCF) to let STAs have contention-free access
sequence of RTS, CTS, data, and ACK frames, a SIFS to the wireless medium, coordinated by a Point
is used. Figure 3 shows the timing diagram involved Coordinator (PC), which is co-located within the AP.
with an RTS/CTS frame exchange. The PCF has higher priority than the DCF, because the
All of the MAC parameters including SIFS, DIFS, period during which the PCF is used is protected from
Slot Time, CWmin, and CWmax are dependent on the the DCF contention via the NAV set. Under the PCF,
underlying physical layer (PHY). Irrespective of the time axis is divided into repeated periods, called
PHY, DIFS is determined by SIFS+2・SlotTime, and superframes, where each superframe is composed of a
another important IFS, called PCF IFS (PIFS), is Contention Free Period (CFP) and a subsequent
determined by SIFS+SlotTime. Contention Period (CP). During a CFP, the PCF is used
for accessing the medium, while the DCF is used during
2. Point Coordination Function (PCF) a CP. It is mandatory that a superframe includes a CP of
a minimum length that allows at least one MSDU
To support time-bounded services, the IEEE 802.11 delivery under the DCF at the lowest PHY rate. See
standard also optionally defines the Point Coordination Figure 4 for the CFP and CP co-existence.
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 108 109
Telecommunications Review 2003•특집부록
IV
Initialization
Vector(IV) Seed Key Sequence
WEP
PRNG
Secret Key
Cliphertext
Plaintext
Integrity Algorithm
Encapsulation Decapsulation
Encrypted
keys [2]. Figure 5 presents the block diagram of the Function (TSF) timer value, and all the associated STA
WEP encapsulation. A 64-bit seed is actually generated updates their local TSF timer upon the beacon
by combining 40-bit secret key (which should be known reception. In the IBSS, STAs transmit beacon frames in
to both the transmitter and the receiver off-line) and a a contentious manner.
24-bit Initialization Vector (IV) chosen by the Second, the power management allows a STA to
transmitting STA. On the other hand, an integrity stays in the doze state, in which the power consumption
algorithm, based on CRC-32, is applied to the plaintext, is minimal, and wakes up periodically without losing
i.e., non-encrypted original data payload, to generate an the traffic addressed to it. In the infrastructure BSS, the
Integrity Check Value (ICV). The ICV is intended for AP buffers all the frames addressed to a STA in the
the receiver to check the integrity of the received frame. doze state, and announces the existence of the buffered
Then, the key sequence generated using the RC4 frames via beacon frames. STAs wake up periodically
algorithm is XOR'ed with the plaintext and the ICV to in order to receive beacon frames, and if the buffered
generate a ciphertext. The ciphertext along with the IV frames exist, the STA requests the delivery of its
value is transmitted in the 802.11 data frame body as buffered frames by transmitting a special control frame
shown in Figure 6. The receiving STA performs the called Power Save (PS)-Poll.
reverse operation by decrypting the received frame Third, in an infrastructure BSS, a STA first
body and checking if the decrypted frame is in tact. associates with an AP before starting any normal data
transfer by exchanging associate request and response
4. MAC Management frames. As described in Section II.C, the authentication
procedure should be preceded before the association
There are basically three different MAC procedure. When a STA moves out of the coverage of
management functions: (1) synchronization; (2) power its associated AP, the STA performs the handoff
management; (3) association and reassociation; and (4) procedures by finding new AP(s) and reassociating with
management information base (MIB) definitions. the best AP. The detection of APs can be done via
First, the synchronization in the 802.11 WLAN is scanning processes (either passive or active scanning).
basically achieved via beacon frames. In the The difference between the association and
infrastructure BSS, the AP periodically transmits beacon reassociation is basically the fact that a reassocaite
frames, which include the Time Synchronization request frame is used instead of an associate request
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 110 111
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록
802.11e HCF
DCF
frame in the case of the reassociation, and the referred to as the enhanced distributed channel access
reassociate request frame includes the MAC address of (EDCA), and (2) a controlled channel access referred to
the old AP. The new AP can utilize the old AP 's MAC as the HCF controlled channel access (HCCA). Figure
address in order to communicate with the old AP as 7 shows the logical relationship between the 802.11e
described in Section IV. HCF and the 802.11 DCF/PCF. As shown in the figure,
Finally, the MIB comprises the managed objects, the HCF sits on top of the DCF in the sense that the
attributes, actions, and notifications required to manage HCF utilizes and honors the CSMA/CA operation of
a station. These MIB values can be used for the the DCF.
network management purpose by external entities, e.g., One distinctive feature of the 802.11e HCF is the
using Simple Network Management Protocol (SNMP) concept of transmission opportunity (TXOP), which is
[28]. an interval of time when a particular STA has the right
to initiate transmissions. During a TXOP, there can be a
set of multiple frame exchange sequences, separated by
III. 802.11E MAC FOR QoS SIFS, initiated by a single STA. A TXOP can be
SUPPORT [5] obtained either by a successful EDCA contention or by
receiving a QoS CF-poll frame from the AP. It is called
In this section, we present the 802.11e MAC for an EDCA TXOP for the former case while it is called a
QoS provisioning. The IEEE 802.11e defines a single polled TXOP for the latter case. The new concept with
coordination function, called the hybrid coordination TXOP is limiting the time interval during which a STA
function (HCF). The HCF combines functions from the can transmit its frames. The limit of a the TXOP
DCF and PCF with some enhanced QoS-specific duration is determined by the AP, and is announced to
mechanisms and QoS data frames in order to allow a STAs via the beacons (in case of EDCA TXOP) and the
uniform set of frame exchange sequences to be used for corresponding QoS CF-poll frame (in case of polled
QoS data transfers during both the CP and CFP. Note TXOP). On the other hand, the multiple consecutive
that the 802.11e MAC is backward compatible with the frame transmissions during a TXOP can enhance the
legacy MAC, and hence it is a superset of the legacy communication efficiency.
MAC. The HCF is composed of two channel access The readers, who are interested in the performance
mechanisms: (1) a contention-based channel access of the 802.11e WLAN, are referred to [13]~[15]. Even
Immediate access when AIFS[AC]
medium is idle>=AIFS[AC] Contention Window
from[0,CW[AC]]
PIFS
SlotTime
though most of the existing 802.11e papers are based on Table 1. User priofity to access category mappings
Access
some old versions of the draft, and hence the exact User Priority Designation
Category
Priority (UP) (Informative)
numbers may not be true, the general tendencies are still (AC)
Lowest 1 AC_BK Background
valid. The problems of the legacy 802.11 MAC and
2 AC_BK Background
how the emerging 802.11e fixes those problems are
・ 0 AC_BE Best Effort
discussed in [14],[15]. We briefly explain how the ・ 3 AC_VI Video
802.11e HCF works below. ・ 4 AC_VI Video
5 AC_VI Video
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 112 113
Telecommunications Review
Telecommunications Review 2003•특집부록
2002•특집부록
Transmission
Attempt
QoS QoS
ACK ACK
Data(UP) Data(UP)
and EDCA in terms of the backoff countdown rule is as highest priority frame among the colliding frames is
follows: the first countdown occurs at the end of the chosen and transmitted, and the others perform a
AIFS[AC] interval. Moreover, at the end of each idle backoff with increased CW values.
slot interval, either a backoff countdown or a frame The values of AIFS [AC], CWmin [AC], and
transmission occurs, but not both. Note that according CWmax [AC], which are referred to as the EDCA
to the legacy DCF, a STA countdown a backoff parameters, are announced by the AP via beacon frames.
counter, and if the counter becomes zero, it transmits a The AP can adapt these parameters dynamically
frame at that moment. depending on network conditions even though frequent
Figure 9 shows the 802.11e MAC with four channel adaptation is not desired due to the network stability.
access functions, where each functions behaves as a Basically, the smaller AIFS [AC] and CWmin [AC], the
single enhanced DCF contending entity, where each shorter the channel access delay for user priority UP,
queue has its own AIFS and maintains its own backoff and hence the more bandwidth share for a given traffic
counter. When there is more than one channel access condition. These parameters can be used in order to
function finishing the backoff at the same time, the differentiate the channel access among different user
collision is handled in a virtual manner. That is, the priority (or AC more accurately speaking) traffic.
Slot
SIFS
Time
HC or
QoS CF-Poll TXOP granted by Qos CF-Poll
AP
ACK1 ACK2
As mentioned above, the IEEE 802.11e defines a QSTA(s). Before commencing the transfer of any
TXOP as the interval of time when a particular STA has frame requiring the parameterized QoS, a virtual
the right to initiate transmissions. Along with the connection, called traffic stream, is established first. A
EDCA parameters of AIFS [AC], CWmin [AC], and traffic stream could be either uplink, or downlink, or
CWmax [AP], the AP also determines and announces directlink, which are QSTA-to-AP, and AP-to-QSTA,
the limit of an EDCA TXOP interval for each AC, i.e., and QSTA-to-QSTA, respectively. In order to set up a
TXOPLimit [AC], in beacon frames. During an EDCA traffic stream, a set of traffic characteristics (such as
TXOP, a STA is allowed to transmit multiple MSDUs nominal MSDU size, mean data rate, and maximum
of the same AC with a SIFS time gap between an ACK burst size) and QoS requirement parameters (such as
and the subsequent frame transmission. delay bound) are exchanged and negotiated between the
Figure 10 shows the transmission of two QoS data AP and the corresponding QSTA(s), and the traffic
frames of user priority UP during an EDCA TXOP, stream should be admitted by the AP. Accordingly, the
where the whole transmission time for two data and AP should implement an admission control algorithm to
ACK frames is less than the EDCA TXOP limit determine whether to admit a specific traffic stream into
determined by the AP. As multiple MSDU transmission its BSS or not.
honors the TXOP limit, the worst-case delay Once a traffic stream is set up, the hybrid
performance is not be affected by allowing the EDCA coordinator (HC) co-located within the AP endeavors to
TXOP operation. provide the contracted QoS by allocating the required
bandwidth to the traffic stream using the HCCA. Under
2. HCF Controlled Channel Access (HCCA) the HCCA, the HC has the full control over the medium
during a CFP, and during a CP it can also grab the
If the EDCA is for the prioritized QoS, which medium after a PIFS idle time whenever it wants. The
supports differentiated channel accesses to 8 different channel grabbing is done by initiating its downlink
user priority traffic, the HCCA is mainly for the frame transfer or by transmitting a polling frame, i.e.,
parameterized QoS, which provides the QoS based on QoS CF-poll frame, in order to grant a polled TXOP to
the contract between the AP and the corresponding a QSTA.
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 114 115
Telecommunications Review
Telecommunications Review 2003•특집부록
2002•특집부록
By receiving a QoS CF-poll, the polled STA, called overheads due to the immediate ACK transmissions.
a TXOP holder, assumes the control over the medium The newly-introduced Block Ack allows the selective-
up to the TXOP limit specified in the QoS CF-poll repeat ARQ, and can enhance the system efficiency
frame, and transmits multiple MSDUs during the significantly.
limited time, where the transmitted frames and their The other one is the Direct Link Protocol (DLP).
transmission order are determined by the TXOP holder The legacy MAC does not allow STAs within the same
according to its scheduling algorithm. All the other infrastructure BSS to transmit frames to each other
STAs, which receive the QoS CF-poll, set the NAV directly, and instead the AP should relay the frames
with the TXOP limit plus an extra slot time such that always. For certain applications, e.g., the bandwidth-
they will not contend for the medium during that time intensive video streaming within a home, this limitation
period. The timing diagram of a polled TXOP result in using the precious wireless bandwidth twice,
operation is shown in Figure 11. and hence the 802.11e defines the mechanism to
As is clear from the above explanation, in order to support the direct QSTA-to-QSTA transfer. Basically,
meet the contracted QoS requirements, the HC needs to before commencing any direct frame transfer, a direct
schedule its downlink frame transmissions as well as the link is set up between two QSTAs via the DLP, which
QoS CF-poll frame transmissions properly. Since the involves the exchange of management frames between
wireless medium involves the time-varying and two QSTAs through the AP.
location-dependent channel conditions, developing a
good scheduling algorithm is a challenging problem.
Note that an intelligent scheduling algorithm can result IV. IEEE 802.11F FOR INTER-ACCESS
in better system performance, e.g., not violating the QoS POINT PROTOCOL (IAPP)
contract, while admitting more traffic streams.
As explained in Section II, within an infrastructure
3. Other Features of 802.11e MAC BSS, a STA is associated with an AP, and this STA
communicates with any other nodes through this AP. A
There are some more features defined as part of the WLAN can be composed of multiple APs. In the
802.11e MAC. They are not directly related to the QoS 802.11 terms, the system, which connects the multiple
provisioning, but can increase the efficiency of the APs, is called a distribution system (DS), and a set of
802.11 WLAN. We just briefly summarize a couple of BSSs and the DS connecting these BSSs is called
such new features here. extended service set (ESS). In today's WLANs, the DS
The first one is the block acknowledgement is typically constructed with the Ethernet. One can
(BlockAck) mechanism, which allows a group of QoS easily imagine that this kind of WLAN structure is
data frames to be transmitted, each separated by a SIFS similar to that of the wide-area cellular systems, where
period, and then a single BlockAck frame acknowledges multiple base STAs are connected via the wired links,
the group of QoS data frames. The legacy MAC is and each base station serves an area called a cell.
based on a stop-and-wait automatic retransmission A key function in this multi- AP WLAN is the
request (ARQ) scheme, which involves a lot of handoff or roaming, i.e., a STA can switch from an AP
APME
IAPP SAP
IAPP
RADIUS Cllent
UDP/TCP
ESP
IP
802.2
DS Services
WM
DSM MAC MLME
MAC
WM
DSM PHY PLME
PHY
to another as it moves. The handoff involves the specifies the information to be exchanged between APs
communication between the APs, which relies on the amongst themselves and higher layer management
DS. While the 802.11 defines the concept of the DS, it entities to support the 802.11 DS functions. According
does not define how to implement the DS. The reasons to the IEEE standards terms, the recommended practice
behind include (1) the DS involves the protocols is defined as a document, in which procedures and
belonging to the above MAC, which is out of scope of positions preferred by the IEEE are presented. On the
the 802.11, dealing with the MAC and PHY only, and other hand, the standards like 802.11-1999 are defined
(2) it could be desirable to have the flexibility for the as documents with mandatory requirements.3) It should
DS construction. Note that the DS can be constructed be noted that the 802.11f does not define anything
with any network link, e.g., even with the WLAN link, related to the STA operation for the handoff. The
which is referred to as wireless distribution system 802.11 MAC management defines the AP scanning of
(WDS). the STAs and reassociation procedures for the basic
However, the lack of the standardized DS handoff support as discussed in Section II.D. The
construction caused APs from different vendors not to readers, who are interested in the 802.11 handoff issues,
interoperate, especially, in the context of the handoff are referred to other literature in [18]~[21].
support. In the 802.11 WLAN (or more specifically,
ESS), a STA should have only a single association, i.e.,
the association with a single AP. However, the
enforcement of this restriction is unlikely to be achieved
due to the lack of the communication among the APs
3) Within a standard specification document, both mandatory
within the ESS. requirements and recommended practice can exist. Mandatory
requirements are generally characterized by use of the verb ''shall,''
The 802.11f is a recommended practice, which whereas recommended practices normally use the word ''should.''
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 116 117
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 118 119
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록
and radar systems [31]. For example, the WLAN detected in the measured channel, namely, another
devices are required to switch its operational frequency BSS, a non-802.11 OFDM signal, an unidentified
channel to another channel once a radar signal is signal, and a radar signal;
detected in the operational frequency channel. On the •Clear channel assessment (CCA) type measures the
other hand, when a satellite signal is detected, the fractional duration of the channel busy periods during
WLAN devices are allowed to use the transmit power the total measurement interval; and
up to the regulatory maximum level minus 3dB while • Received power indication (RPI) histogram type
normally they can transmit at up to the regulatory measures the histogram of the quantized measures of
maximum. Even though the 802.11h has been the received energy power levels as seen at the
developed for the European regulation, it can be antenna connector during the measurement interval.
apparently used in any other countries for multiple
purposes. Based on its own measurement as well as the reports
Note that both DFS and TPC involve implementation- from the associated STAs, the AP continues to monitor
dependent algorithms. For example, a TPC algorithm is the channel status so that the channel switch can be
needed in order to determine the transmit power level of conducted in a proper instance.
a frame transfer. Basically, the 802.11h defines the The channel switch occurs immediately before a
mechanisms/protocols to enable a right decision of the TBTT, which the AP has specified, so that a normal
power level, not the implementation itself. We briefly communication operation can be conducted beginning
review the mechanisms/protocols defined by the the following beacon interval at the new operational
802.11h below. It should be noted that there is virtually frequency channel. Note that the beacon frames are
no change in terms of the channel access functions. That transmitted periodically. 5) The channel quieting
is, the 802.11 DCF and/or PCF are used to transmit the operation is also defined since the European regulation
new management frames as part of the 802.11h. requires the STA to become silent (or not transmitting
any) once a radar system is detected in the operational
1. Dynamic Frequency Selection (DFS) frequency channel.
Finally, it should be noted that a separate protocol is
In the infrastructure BSS, it is the AP, which defined for the DFS operation in the independent BSS,
determines when and which channel to switch to. For where no AP exists. Basically, in such a network, the
this purpose, the AP should monitor the status of the STA, which initiated the BSS, is called the DFS owner,
current and other frequency channels. For this purpose, and takes the responsibility of the channel status
the AP is allowed to request other STAs to measure the collection as well as the channel switch decision. How
current and other channels. After the channel status
measurement, the requested STA can reports the
measurement results. There are basically three different
measurement types:
5) The beacon transmission can be delayed due to the contention from
the stations under the DCF rule. However, the target beacon
• Basic type includes whether the followings were transmission times at least repeat periodically.
to elect a new DFS owner when the old DFS owner VI. IEEE 802.11I FOR SECURITY
disappears (due to the switch off or so) is also handled. ENHANCEMENT [9]
2. Transmit Power Control (TPC) It turned out that the existing security mechanisms
of the 802.11, i.e., authentication and WEP, are
Basically, there are two main functions defined. basically useless. The basic problems include:
First, the AP specifies the regulatory and local
maximum power level as part of the beacon, where the •Cryptographic weakness of RC4
local maximum specifies the actual maximum power •BSS-wide security key usage, i.e., all STAs in a BSS
level used within its BSS. The local maximum power can use the same key
should be smaller than or equal to the regulatory •One-way authentication, i.e., STA is authenticated by
maximum. The STAs in the BSS can use the transmit an AP, but not the other way around
power smaller than or equal to the local maximum •Reuse of the IV by multiple frames
Second, in order to determine the proper (or best) frames, i.e., ICV based on CRC-32 is currently used.
transmit power level for a given frame, the transmitting
STA needs to know the link condition between the The security flaws of the current 802.11 are
receiving STA and itself. The 802.11h defines a discussed in detail in [22]~[24]. The emerging 802.11i
mechanism to achieve it. A STA can transmit a is intended to address these security holes.
management frame called TPC request frame to another The IEEE 802.11i defines the Robust Security
STA when it desires. Upon receiving the TPC request Network Associations (RSNA), which is established
frame, the receiving STA determines the link margin between two STAs, i.e., a STA and an AP in an
between the transmitting STA and itself, then responds infrastructure BSS or a pair of STAs in an IBSS, via the
with a TPC response frame, which includes the link authentication/association using the 4-Way Handshake.
margin as well as the transmit power level of the A RSNA depends on IEEE 802.1X [12] to transport its
response frame. The link margin is defined by the ratio authentication services and to deliver key management
of the received signal power to the minimum desired by services. Therefore, all STAs and APs in an RSNA
the receiving STA. The transmitting STA can utilize contain an 802.1X entity that handles these services, and
the received link margin and power level information in the 802.11i defines how an RSNA utilizes the 802.1X to
order to determine the best transmit power level in the access these services.
future. The beacon from the AP also includes the The RSNA defines a number of security features on
transmit power level used for the beacon transmission, top of the WEP and IEEE 802.11 authentication
which can be used by the associated STAs to monitor including:
the channel condition between the AP and hemselves.
•Enhanced mutual authentication mechanisms for both
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 120 121
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록
Uncontrolled port
Supplicant
(STA)
Controlled port
•Cryptographic key establishment where the port determines when to allow general data
•An enhanced data encapsulation mechanism, called traffic across an IEEE 802.11 link. That is, general data
Counter mode with CBC-MAC6) Protocol (CCMP) traffic between a STA and its AP is blocked by the
and, optionally, Temporal Key Integrity Protocol controlled port until the 802.1 X authentication
(TKIP) procedures complete successfully. RSNA depends
We consider the ESS security in this section even upon the use of an Extensible Authentication Protocol
though the 802.11i addresses the security mechanism in (EAP) method that supports mutual authentication
IBSSs as well since the ESSs are practically more between the AS and the STA, not just authentication of
important than the IBSSs. the STA to an AP. The EAP authentication frames are
transmitted in IEEE 802.11 data frames, rather than the
1. RSNA and IEEE 802.1X 802.11 management frames, and passed via the
uncontrolled port of the 802.1X authenticator, i.e., the
An RSNA relies on IEEE 802.1X [12] to provide AP.
authentication and key management services, where the
802.1X architecture is shown in. In the 802.1X terms, 2. RSNA Establishment
non-AP STA is the supplicant, and the AP is the
authenticator. The Authentication Server (AS) is an In an ESS, a STA establishes an RSNA using either
entity residing in the wired infrastructure (or possibly IEEE 802.1X authentication and key management or
the AP itself), which participates in the authentication using a pre-shared key (PSK). When the 802.1X is
(See Figure 13). used, the STA establishes an RSNA via the following
An 802.1X port is present on any STA in an RSNA, procedures:
Accept/EAP-Success/Key Material
Encapsulation Decapsulation
Encrypted
2) It uses Open System Authentication (see Section PMK is sent from the AS to the authenticator (i.e., the
II.C) AP) via a secure channel. When the PSK is used
3) It negotiates cipher suites (e.g., either TKIP or instead of the 802.1X, the step 4) above is skipped, and
CCMP) during association the PSK is used as the PMK.
4) It uses IEEE 802.1X to authenticate Now, to establish temporal keys to be used for the
5) It establishes temporal keys by executing a key frame encryption, the AP initiates a 4 -Way Handshake
exchange algorithm utilizing EAP over LANs (EAPOL)-Key messages.
6) It uses the agreed upon temporal keys and cipher Basically, four messages are exchanged between the
suites to protect the link STA and the AP in order to establish both pairwise
transient key (PTK) for the unicast frame encryption and
Note that the Shared Key Authentication is group transient key (GTK) for the broadcast/multicast
deprecated as part of the 802.11i since the 802.11i relies frame encryption. The PTK is derived from the PMK.
on the 802.1X for the authentication after the Upon completion of the 4 -Way Handshake, the AP
association. Figure 14 illustrates the IEEE 802.1X EAP changes the state of the IEEE 802.1X access port,
authentication procedure corresponding to step 4) opening the controlled port to permit general data traffic
above. The STA and AS authenticate each other (e.g., to pass onto the DS. When the AP changes the GTK
EAP-TLS [26]) and generates a pairwise master key later, it sends the new GTK to the STA using the Group
(PMK) to seed the exchange in step 5) above. The Key Handshake.
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 122 123
Telecommunications Review
Telecommunications Review 2003•특집부록
2002•특집부록
Encapsulation Decapsulation
Encrypted
received signal power, noise, hidden nodes and Recently, the IEEE 802.11 WLAN has become very
neighboring APs successful in the market as the prevailing technology for
the (indoor) broadband wireless networking. Along
Various types of radio measurements are expected with its success, the demand on the evolution of the
to be used to enhance the WLAN performance. For technology became evident. During the last few years,
example, the neighboring AP list measurement and remarkable efforts to enhance the current 802.11 have
announcement by the AP can aid in reducing the been made.
handoff delay. In this paper, we have overviewed the emerging
protocols of the 802.11 WLAN for the MAC and
2. IEEE 802.11n for Higher Throughput above, namely, 802.11e for QoS, 802.11f for IAPP,
802.11h for spectrum management, and 802.11i for
Task Group N (TGn) was established in mid 2003 security enhancement. We also briefly discussed
within the 802.11 WG in order to achieve a higher newly-initiated standardization efforts for the 802.11k
throughput by revising both the PHY and MAC of the for radio resource measurements and 802.11n for
802.11. The group is basically targeting at a throughput enhancements for higher throughput. It is our belief that
of at least 100Mbps measured at the MAC SAP. Since the usage of the 802.11 WLANs will be growing faster
the 802.11a and 802.11g WLANs achieve about 25 and more widely in the future.
Mbps maximum throughput in practice, this represents
at least 4 times faster WLAN.
It is too early to predict how the 802.11n will look
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 124 125
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록
Overview of Emerging IEEE 802.11 Protocols for MAC and Above 126 127
Telecommunications
Telecommunications Review
Review 2003•특집부록
2002•특집부록