{"id":397242,"date":"2024-10-20T04:29:08","date_gmt":"2024-10-20T04:29:08","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-11r-2008-2\/"},"modified":"2024-10-26T08:16:41","modified_gmt":"2024-10-26T08:16:41","slug":"ieee-802-11r-2008-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-11r-2008-2\/","title":{"rendered":"IEEE 802.11r-2008"},"content":{"rendered":"

Amendment Standard – Superseded. This amendment specifies the extensions to IEEE Std 802.11-2007 for wireless local area networks (WLANs) providing mechanisms for fast basic service set (BSS) transition.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.11r-2008, Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle Page <\/td>\n<\/tr>\n
6<\/td>\nIntroduction <\/td>\n<\/tr>\n
7<\/td>\nNotice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Interpretations
Patents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
12<\/td>\nContents <\/td>\n<\/tr>\n
16<\/td>\nList of figures <\/td>\n<\/tr>\n
17<\/td>\nList of tables <\/td>\n<\/tr>\n
19<\/td>\nImportant Notice
2. Normative references <\/td>\n<\/tr>\n
20<\/td>\n3. Definitions <\/td>\n<\/tr>\n
21<\/td>\n4. Abbreviations and acronyms <\/td>\n<\/tr>\n
22<\/td>\n5. General description
5.2 Components of the IEEE 802.11 architecture
5.2.3 Distribution system (DS) concepts
5.2.3.2 Robust security network association (RSNA) <\/td>\n<\/tr>\n
23<\/td>\n5.4 Overview of the services
5.4.2 Services that support the distribution services
5.4.2.1 Mobility types
5.4.3 Access control and data confidentiality services
5.4.3.1 Authentication
5.4.3.4 Key management <\/td>\n<\/tr>\n
24<\/td>\n5.4.3.7 Fast BSS transition
5.8 IEEE Std 802.11 and IEEE Std 802.1X-2004
5.8.1 IEEE 802.11 usage of IEEE Std 802.1X-2004
5.8.2 Infrastructure functional model overview
5.8.2.1 Authentication and key management (AKM) operations with Authentication Server (AS)
6. Medium access control (MAC) service definition
6.1 Overview of MAC services
6.1.2 Security services <\/td>\n<\/tr>\n
25<\/td>\n7. Frame formats
7.2 Format of individual frame types
7.2.3 Management frames
7.2.3.1 Beacon frame format
7.2.3.4 Association Request frame format
7.2.3.5 Association Response frame format <\/td>\n<\/tr>\n
26<\/td>\n7.2.3.6 Reassociation Request frame format
7.2.3.7 Reassociation Response frame format <\/td>\n<\/tr>\n
27<\/td>\n7.2.3.9 Probe Response frame format
7.2.3.10 Authentication frame format <\/td>\n<\/tr>\n
28<\/td>\n7.3 Management frame body components
7.3.1 Fields that are not information elements
7.3.1.1 Authentication Algorithm Number field <\/td>\n<\/tr>\n
29<\/td>\n7.3.1.9 Status Code field
7.3.1.11 Action field
7.3.2 Information elements <\/td>\n<\/tr>\n
30<\/td>\n7.3.2.25 RSN information element (RSNIE)
7.3.2.25.2 AKM suites
7.3.2.25.4 PMKID <\/td>\n<\/tr>\n
31<\/td>\n7.3.2.37 Neighbor Report element
7.3.2.47 Mobility domain information element (MDIE) <\/td>\n<\/tr>\n
32<\/td>\n7.3.2.48 Fast BSS transition information element (FTIE) <\/td>\n<\/tr>\n
34<\/td>\n7.3.2.49 Timeout Interval information element (TIE) <\/td>\n<\/tr>\n
35<\/td>\n7.3.2.50 RIC Data information element (RDIE)
7.3.2.51 RIC Descriptor information element <\/td>\n<\/tr>\n
36<\/td>\n7.4 Action frame format details
7.4.8 FT Action frame details
7.4.8.1 FT Request frame <\/td>\n<\/tr>\n
37<\/td>\n7.4.8.2 FT Response frame <\/td>\n<\/tr>\n
38<\/td>\n7.4.8.3 FT Confirm frame
7.4.8.4 FT Ack frame <\/td>\n<\/tr>\n
39<\/td>\n8. Security
8.4 RSNA Security association management
8.4.1 Security associations
8.4.1.1 Security association definitions <\/td>\n<\/tr>\n
40<\/td>\n8.4.1.1.1a PMK-R0 security association
8.4.1.1.1b PMK-R1 security association <\/td>\n<\/tr>\n
41<\/td>\n8.4.1.1.2 PTKSA
8.4.6 RSNA authentication in an ESS
8.4.6.1 Preauthentication and RSNA key management
8.4.10 RSNA security association termination <\/td>\n<\/tr>\n
42<\/td>\n8.5 Keys and key distribution
8.5.1 Key hierarchy
8.5.1.5 FT key hierarchy
8.5.1.5.1 Overview <\/td>\n<\/tr>\n
43<\/td>\n8.5.1.5.2 Key derivation function (KDF) <\/td>\n<\/tr>\n
44<\/td>\n8.5.1.5.3 PMK-R0 <\/td>\n<\/tr>\n
45<\/td>\n8.5.1.5.4 PMK-R1
8.5.1.5.5 PTK <\/td>\n<\/tr>\n
46<\/td>\n8.5.2 EAPOL-Key frames <\/td>\n<\/tr>\n
47<\/td>\n8.5.2.1 EAPOL-Key frame notation <\/td>\n<\/tr>\n
48<\/td>\n8.5.3 4-Way Handshake
8.5.3.1 4-Way Handshake Message 1
8.5.3.2 4-Way Handshake Message 2
8.5.3.3 4-Way Handshake Message 3
8.5.3.4 4-Way Handshake Message 4 <\/td>\n<\/tr>\n
49<\/td>\n8.5.4 Group Key Handshake
8.5.4.1 Group Key Handshake Message 1
8.5.4.2 Group Key Handshake Message 2
8.5.8 PeerKey Handshake
8.5.8.1 SMK Handshake
8.5.8.1.1 SMK Handshake Message 1
8.5.8.1.2 SMK Handshake Message 2 <\/td>\n<\/tr>\n
50<\/td>\n8.5.8.1.3 SMK Handshake Message 3
8.5.8.1.4 SMK Handshake Message 4
8.5.8.1.5 SMK Handshake Message 5
8.5.8.3 STKSA rekeying
8.5.8.4 Error reporting <\/td>\n<\/tr>\n
51<\/td>\n10. Layer management
10.3 MLME SAP interface
10.3.4 Authenticate
10.3.4.1 MLME-AUTHENTICATE.request
10.3.4.1.2 Semantics of the service primitive
10.3.4.2 MLME-AUTHENTICATE.confirm
10.3.4.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
52<\/td>\n10.3.4.3 MLME-AUTHENTICATE.indication
10.3.4.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n
53<\/td>\n10.3.4.4 MLME-AUTHENTICATE.response
10.3.4.4.2 Semantics of the service primitive
10.3.6 Associate
10.3.6.1 MLME-ASSOCIATE.request
10.3.6.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
54<\/td>\n10.3.6.2 MLME-ASSOCIATE.confirm
10.3.6.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
55<\/td>\n10.3.6.3 MLME-ASSOCIATE.indication
10.3.6.3.2 Semantics of the service primitive
10.3.6.4 MLME-ASSOCIATE.response
10.3.6.4.2 Semantics of the service primitive <\/td>\n<\/tr>\n
56<\/td>\n10.3.7 Reassociate
10.3.7.1 MLME-REASSOCIATE.request
10.3.7.1.2 Semantics of the service primitive
10.3.7.2 MLME-REASSOCIATE.confirm
10.3.7.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
57<\/td>\n10.3.7.3 MLME-REASSOCIATE.indication
10.3.7.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n
58<\/td>\n10.3.7.4 MLME-REASSOCIATE.response
10.3.7.4.2 Semantics of the service primitive
10.3.33 MLME SAP interface for resource request
10.3.33.1 MLME-RESOURCE_REQUEST.request
10.3.33.1.1 Function
10.3.33.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
59<\/td>\n10.3.33.1.3 When generated
10.3.33.1.4 Effect of receipt
10.3.33.2 MLME-RESOURCE_REQUEST.indication
10.3.33.2.1 Function
10.3.33.2.2 Semantics of the service primitive
10.3.33.2.3 When generated <\/td>\n<\/tr>\n
60<\/td>\n10.3.33.2.4 Effect of receipt
10.3.33.3 MLME-RESOURCE_REQUEST.response
10.3.33.3.1 Function
10.3.33.3.2 Semantics of the service primitive
10.3.33.3.3 When generated
10.3.33.3.4 Effect of receipt
10.3.33.4 MLME-RESOURCE_REQUEST.confirm
10.3.33.4.1 Function
10.3.33.4.2 Semantics of the service primitive <\/td>\n<\/tr>\n
61<\/td>\n10.3.33.4.3 When generated
10.3.33.4.4 Effect of receipt
10.3.33.5 MLME-RESOURCE_REQUEST_LOCAL.request
10.3.33.5.1 Function
10.3.33.5.2 Semantics of the service primitive <\/td>\n<\/tr>\n
62<\/td>\n10.3.33.5.3 When generated
10.3.33.5.4 Effect of receipt
10.3.33.6 MLME-RESOURCE_REQUEST_LOCAL.confirm
10.3.33.6.1 Function
10.3.33.6.2 Semantics of the service primitive
10.3.33.6.3 When generated
10.3.33.6.4 Effect of receipt <\/td>\n<\/tr>\n
63<\/td>\n10.3.34 MLME SAP interface for remote requests
10.3.34.1 MLME-REMOTE_REQUEST.request
10.3.34.1.1 Function
10.3.34.1.2 Semantics of the service primitive
10.3.34.1.3 When generated
10.3.34.1.4 Effect of receipt
10.3.34.2 MLME-REMOTE_REQUEST.indication
10.3.34.2.1 Function
10.3.34.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
64<\/td>\n10.3.34.2.3 When generated
10.3.34.2.4 Effect of receipt
10.3.34.3 MLME-REMOTE_REQUEST.confirm
10.3.34.3.1 Function
10.3.34.3.2 Semantics of the service primitive
10.3.34.3.3 When generated
10.3.34.3.4 Effect of receipt <\/td>\n<\/tr>\n
65<\/td>\n11. MLME
11.3 STA authentication and association
11.3.1 Authentication and deauthentication
11.3.1.1 Authentication-originating STA
11.3.1.2 Authentication-destination STA <\/td>\n<\/tr>\n
66<\/td>\n11.3.2 Association, reassociation, and disassociation
11.3.2.3 STA reassociation procedures
11.3.2.4 AP reassociation procedures
11.4 Traffic stream (TS) operation
11.4.1 Introduction
11.4.3 TS lifecycle <\/td>\n<\/tr>\n
67<\/td>\n11.4.4a TS setup by resource request during a fast BSS transition <\/td>\n<\/tr>\n
68<\/td>\n11A. Fast BSS transition
11A.1 Overview <\/td>\n<\/tr>\n
69<\/td>\n11A.2 Key holders
11A.2.1 Introduction
11A.2.2 Authenticator key holders <\/td>\n<\/tr>\n
70<\/td>\n11A.2.3 Supplicant key holders <\/td>\n<\/tr>\n
71<\/td>\n11A.3 Capability and policy advertisement
11A.4 FT initial mobility domain association
11A.4.1 Overview
11A.4.2 FT initial mobility domain association in an RSN <\/td>\n<\/tr>\n
74<\/td>\n11A.4.3 FT initial mobility domain association in a non-RSN <\/td>\n<\/tr>\n
75<\/td>\n11A.5 FT Protocol
11A.5.1 Overview
11A.5.2 Over-the-air FT Protocol authentication in an RSN <\/td>\n<\/tr>\n
77<\/td>\n11A.5.3 Over-the-DS FT Protocol authentication in an RSN <\/td>\n<\/tr>\n
79<\/td>\n11A.5.4 Over-the-air FT Protocol authentication in a non-RSN <\/td>\n<\/tr>\n
80<\/td>\n11A.5.5 Over-the-DS FT Protocol authentication in a non-RSN <\/td>\n<\/tr>\n
81<\/td>\n11A.6 FT Resource Request Protocol
11A.6.1 Overview
11A.6.2 Over-the-air fast BSS transition with resource request <\/td>\n<\/tr>\n
84<\/td>\n11A.6.3 Over-the-DS fast BSS transition with resource request <\/td>\n<\/tr>\n
86<\/td>\n11A.7 FT reassociation
11A.7.1 FT reassociation in an RSN <\/td>\n<\/tr>\n
87<\/td>\n11A.7.2 FT reassociation in a non-RSN <\/td>\n<\/tr>\n
88<\/td>\n11A.8 FT authentication sequence
11A.8.1 Overview <\/td>\n<\/tr>\n
90<\/td>\n11A.8.2 FT authentication sequence: contents of first message
11A.8.3 FT authentication sequence: contents of second message <\/td>\n<\/tr>\n
91<\/td>\n11A.8.4 FT authentication sequence: contents of third message
11A.8.5 FT authentication sequence: contents of fourth message <\/td>\n<\/tr>\n
93<\/td>\n11A.9 FT security architecture state machines
11A.9.1 Introduction
11A.9.2 R0KH state machine <\/td>\n<\/tr>\n
94<\/td>\n11A.9.2.1 R0KH state machine states <\/td>\n<\/tr>\n
95<\/td>\n11A.9.2.2 R0KH state machine variables
11A.9.2.3 R0KH state machine procedures
11A.9.3 R1KH state machine <\/td>\n<\/tr>\n
97<\/td>\n11A.9.3.1 R1KH state machine states <\/td>\n<\/tr>\n
98<\/td>\n11A.9.3.2 R1KH state machine variables <\/td>\n<\/tr>\n
99<\/td>\n11A.9.3.3 R1KH state machine procedures
11A.9.4 S0KH state machine
11A.9.4.1 S0KH state machine states <\/td>\n<\/tr>\n
100<\/td>\n11A.9.4.2 S0KH state machine variables
11A.9.4.3 S0KH state machine procedures
11A.9.5 S1KH state machine
11A.9.5.1 S1KH state machine states <\/td>\n<\/tr>\n
103<\/td>\n11A.9.5.2 S1KH state machine variables <\/td>\n<\/tr>\n
104<\/td>\n11A.9.5.3 S1KH state machine procedures
11A.10 Remote request broker (RRB) communication
11A.10.1 Overview
11A.10.2 Remote request broker (RRB) <\/td>\n<\/tr>\n
105<\/td>\n11A.10.3 Remote Request\/Response frame definition <\/td>\n<\/tr>\n
106<\/td>\n11A.11 Resource request procedures
11A.11.1 General <\/td>\n<\/tr>\n
107<\/td>\n11A.11.2 Resource information container (RIC) <\/td>\n<\/tr>\n
109<\/td>\n11A.11.3 Creation and handling of a resource request
11A.11.3.1 STA procedures <\/td>\n<\/tr>\n
110<\/td>\n11A.11.3.2 AP procedures <\/td>\n<\/tr>\n
113<\/td>\nAnnex A (normative) Protocol Implementation Conformance Statement (PICS) proforma <\/td>\n<\/tr>\n
115<\/td>\nAnnex D (normative) ASN.1 encoding of the MAC and PHY MIB <\/td>\n<\/tr>\n
126<\/td>\nAnnex Q (normative) ASN.1 encoding of the RRM MIB <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Fast Basic Service Set (BSS) Transition<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2008<\/td>\n126<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":397250,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-397242","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/397242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/397250"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=397242"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=397242"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=397242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}