自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (31)
  • 收藏
  • 关注

空空如也

wmm test plan

The goal of the Wi-Fi Alliance (WFA) is to ensure interoperability among Wi-Fi Multi-media (WMMTM) products from multiple manufacturers, and to promote this Quality of Service technology within both the business and consumer markets. To this end, the following interoperability test suite was developed. Working in conjunction with authorized test labs, these tests are executed on vendor products so as to grant products the Wi-Fi Interoperability Certificate upon successful completion of all the tests. Products that pass the following tests are granted the WMMTM entry in the “Multi-media Extensions” category on the Wi-Fi Interoperability Certificate to be used on both product materials and marketing materials. In this fashion, customers may look to the Wi-Fi Interoperability Certificate as a mark of multi-vendor interoperability. Note: This test plan was developed before the final name of WMMTM was selected. Occurrences of the term “WMM” shall refer to the WMM baseline functionality and the term “WSM” shall refer to the optional “Scheduled Access” capability to be defined and tested separately

2017-10-15

802.11k spec

Radio Resource Measurement is a key enabler to the next generation of Wireless LANs (WLANs). Radio Resource Measurement addresses some of the existing issues in using unlicensed radio environments to meet the requirements of emerging technologies. In addition, Radio Resource Measurement provides knowledge about the radio environment to improve performance and reliability. The existing WLAN measurements and information about them are inadequate to move ahead to the next generation of WLAN. The proposed Radio Resource Measurement approach is to add measurements that extend the capability, reliability, and maintainability of WLANs through measurements and provide that information to upper layers in the communications stack. In addition, there are new applications that require quantifiable radio environment measurements in order to attain the necessary performance. These applications include voice over Internet Protocol (VoIP), video over IP, location based applications, as well as applications requiring mitigation of harsh radio environments (multifamily dwellings, airplanes, factories, municipalities, etc.). WLAN Radio Resource Measurement addresses the MAC, the SME, the MLME primitives, the MIB, and the interface to upper layers. The Radio Resource Measurement scope is to define Radio Measurements and to provide mechanisms to higher layers for radio and network measurements. This amendment provides these mechanisms using request/response queries and an Object Identifier (OID) interface to upper layers in the MIB.

2017-10-15

《Git版本控制管理(第2版)》迷你书

Git 是一款免费、开源的分布式版本控制系统,最早由 LinilusTorvalds 创建,用于管理 Linux 内核开发, 现已成为分布式版本控制的主流工具。 本书是学习掌握 Git 的最佳教程,总共分为 21 章,其内容涵盖了如何在多种真实开发环境中使用 Git;洞 察 Git 的常用案例、初始任务和基本功能;如何在集中和分布式版本控制中使用 Git;使用 Git 管理合并、 冲突、补丁和差异;获得诸如重新定义变基( rebasing)、钩子( hook)以及处理子模块(子项目)等的 高级技巧; Git 如何与 SVN 版本库交互(包括 SVN 向 Git 的转换);通过 GitHub 导航、使用开源项目, 并对开源项目做贡献。 本书适合需要进行版本控制的开发团队成员阅读,对 Git 感兴趣的开发人员也可以从中获益。

2017-10-15

IEEE 1905 standard spec

This standard defines an abstraction layer for multiple home network technologies. The abstraction layer provides a common data and control service access point to the heterogeneous home network technologies described in the following specifications: IEEE Std 1901TM-2010, IEEE Std 802.11TM-2012, IEEE Std 802.3TM-2008, and MoCA® 1.1.1,2 This standard is extensible to work with other home network technologies. The abstraction layer supports a dynamic interface selection for transmission of packets arriving from any interface (upper protocol layers or underlying network technologies). End-to-end quality of service (QoS) is enabled in an IEEE 1905.1 network. Also specified are procedures, protocols, and guidelines to provide a simplified user experience to add devices to the network, to set up encryption keys, to extend the network coverage, and to provide network management features to address issues related to neighbor discovery, topology discovery, interface selection, QoS negotiation, and network control and management.

2017-10-15

802.11ac_SPEC

EEE Standard for Information technology— Telecommunications and information exchange between systems Local and metropolitan area networks— Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz

2017-04-01

802.11s原版协议规范

A STA’s membership in a BSS is dynamic (STAs turn on, turn off, come within range, and go out of range). To become a member of an infrastructure BSS or an IBSS, a STA joins the BSS using the synchronization procedure described in 11.1.3.4. To start a new mesh BSS or to become a member of a mesh BSS, a STA starts beaconing and the synchronization maintenance procedure described in 11C.12. To access all the services of an infrastructure BSS, a STA becomes “associated.” These associations are dynamic and involve the use of the distribution system service (DSS), which is described in 5.3.2. A mesh STA does not become associated as there is no central entity in a mesh BSS (MBSS). Instead, a mesh STA peers with other mesh STAs and thereby they form the MBSS.

2017-04-01

802.11原版规范

This clause presents the concepts and terminology used within this standard. Specific terms are defined in Clause 3. Illustrations convey key IEEE 802.11 concepts and the interrelationships of the architectural components. IEEE Std 802.11 uses an architecture to describe functional components of an IEEE 802.11 LAN. The architectural descriptions are not intended to represent any specific physical implementation of IEEE Std 802.11

2017-04-01

WMM规范 1.1

This document defines the specification for WMM, an 802.11 quality of service (QoS) implementation based on a subset of the draft 802.11e standard supplement [2]. It is motivated by the need to prevent market fragmentation caused by multiple, non-interoperable pre-standard subsets of the draft 802.11e standard that would otherwise occur. It is intended that WMM can be implemented, subjected to interoperability testing and deployed in the market before the availability of 802.11e. This is facilitated by selecting a subset of the features of 802.11e. In no way should WMM be taken to detract from 802.11e itself, which is viewed as the long term endpoint of WMM. Deployment of WMM will deliver useful QoS functionality for voice over 802.11, streaming media and also provide key lessons which will benefit eventual deployment of 802.11e.

2017-04-01

tftp dhcp server(经典工具

2016-08-18

WLL(wireless local loop)

Wireless local loop system description.

2016-03-22

self-service linux

Linux is the ultimate choice for home and business users. It is powerful, as stable as any commercial operating system, secure, and best of all, it is open source. One of the biggest deciding factors for whether to use Linux at home or for your business can be service and support. Because Linux is developed by thousands of volunteers from around the world, it is not always clear who to turn to when something goes wrong. In the true spirit of Linux, there is a slightly different approach to support than the commercial norm. After all, Linux represents an unparalleled community of experts, it includes industry leading problem determination tools, and of course, the product itself includes the source code. These resources are in addition to the professional Linux support services that are available from companies, such as IBM, and the various Linux vendors, such as Redhat and SUSE. Making the most of these additional resources is called "self-service" and is the main topic covered by this book. Self-service on Linux means different things to different people. For those who use Linux at home, it means a more enjoyable Linux experience. For those who use Linux at work, being able to quickly and effectively diagnose problems on Linux can increase their value as employees as well as their marketability. For corporate leaders deciding whether to adopt Linux as part of the corporate strategy, self-service for Linux means reduced operation costs and increased Return on Investment (ROI) for any Linux adoption strategy. Regardless of what type of Linux user you are, it is important to make the most of your Linux experience and investment.

2015-10-21

TR181 Amendment 8 协议

TR-181 Device Data Model for TR-069 Issue: 02 Amendment 8

2015-10-20

802.11r协议

原版spec 802.11r 會利用一種稱為「快速基本服務設定轉換」(Fast Basic Service Set Transition,FT)的功能,簡化驗證程序。FT 可以讓 AP 裝置更快與 AP 建立關聯。視您的 Wi-Fi 硬體廠商而定,FT 可以同時與預先分享密鑰(PSK)和 802.1X 驗證方法搭配使用。 搭配 802.11k 的快速辨識目標 AP 功能,FT 的加速關聯方法可以增強應用程式效能。

2015-10-20

802.11ac A Survival Guide(经典之作)

看这个名字大家都懂得,11n就是经典之作, 11ac出来了,自然不用怀疑,细节就不列了,英文原版。

2014-04-25

802.11n A Survival Guide

802.11n’s appeal can be summed up in one word—speed. In the stone ages of 1 Mbps and 2 Mbps wireless LANs, the most charitable thing that one could say about the technology was that it was faster than DSL. With the benefit of a decade of development, wireless LAN technology is mature and widely viewed as “the way you connect to a network,” just as Ethernet was in the mid-1990s. When I started working, visitors would often ask where the nearest Ethernet port could be found. Today, they ask for a password for the wireless LAN. The speed of 802.11n is a large part of the reason why so many devices don’t even have the option for Ethernet ports any more. Once 802.11n put wireless LANs on the same performance footing as wired LANs, wireless became the obvious choice.

2013-07-13

WMM Power Save Test Plan

The goal of the Wi-Fi Alliance (WFA) is to ensure interoperability among Wi-Fi Multi-media (WMMTM) Power Save products from multiple manufacturers, and to promote this Quality of Service technology within both the business and consumer markets. To this end, the following interoperability test suite was developed. Working in conjunction with authorized test labs, these tests are executed on vendor products so as to grant products the Wi-Fi Interoperability Certificate upon successful completion of all the tests. Products that pass the following tests are granted the WMMTM Power Save entry in the “Multi-media Extensions” category on the Wi-Fi Interoperability Certificate to be used on both product materials and marketing materials. In this fashion, customers may look to the Wi-Fi Interoperability Certificate as a mark of multi-vendor interoperability. Throughout this document and the WMM specification [5], the terms APSD, U-APSD and WMM-APSD are synonymous with WMM™ Power Save.

2013-07-13

draft 802.11ac

802.11ac spec Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

2013-07-13

TR098 Amendment2

This document describes the Internet Gateway Device data model for the CPE WAN Management Protocol (CWMP). TR-069 defines the generic requirements of the management protocol methods which can be applied to any TR-069 CPE. It is intended to support a variety of different functionalities to manage a collection of CPE, including the following primary capabilities: • Auto-configuration and dynamic service provisioning • Software/firmware image management • Status and performance monitoring • Diagnostics The ability to manage the home network remotely has a number of benefits including reducing the costs associated with activation and support of broadband ser

2013-07-13

tr157 原版

The architecture of TR-069 Amendment 2 [1] and TR-106 Amendment 1 [2] enables device management of CPE devices in the customer’s home, including the home gateway, and devices behind it. This Technical Report defines additional management objects for use in CWMP managed devices. The objects may exist at the top level of a hierarchy, or in some cases within an existing object. The objects are intended for use in all CWMP root objects (both Device and InternetGatewayDevice). The objects define varying functionality, diagnostics, etc., that are agnostic to the type of device

2013-07-13

tr143 原版

This document defines the CPE data model objects for Network Service Providers to initiate performance throughput tests and monitor data on the IP interface of a CPE using the Diagnostic mechanism defined in TR-069 Amendment 2 [1]. The Network Service Provider provides network infrastructure and services to its customers, such as Content Service Providers who source the information and end users who consume the information. In order to minimize the downtime of network services, the Network Service Provider needs tools to enable monitoring the performance of the network continuously and diagnose the problem when it occurs. The architecture of TR-069 Amendment 2 [1] enables device management with the CPE devices both at the customer’s gateway, and with devices within the customer’s home network. The diagnostic and monitoring objects provided with this document will assist the Network Service Provider in determining whether the problem occurs in the Network Service Provider’s network or the customer’s home network.

2013-07-13

TR069 Amendment2

This document describes the CPE WAN Management Protocol, intended for communication between a CPE and Auto-Configuration Server (ACS). The CPE WAN Management Protocol defines a mechanism that encompasses secure auto-configuration of a CPE, and also incorporates other CPE management functions into a common framework. This document specifies the generic requirements of the management protocol methods which can be applied to any TR-069 CPE. Other documents specify the managed objects, or data models, for specific types of devices or services.

2013-07-13

SIP协议分析

1.注册流程: ..........................................................................................3 2.注销流程: ..........................................................................................4 3. 基本呼叫建立过程: ........................................................................5 4. 会话更改流程: ................................................................................7 5. 正常呼叫释放过程: ........................................................................8 6. 被叫忙呼叫释放: ............................................................................9 7.被叫无应答流程一: ........................................................................10 8.被叫无应答流程二: ........................................................................11 9.遇忙呼叫前转: ................................................................................12 10.无应答呼叫前转流程: ..................................................................13 11.呼叫保持:.......................................................................................

2013-03-30

IGMP Snooping

This Application Note explains how a feature called IGMP snooping can significantly reduce traffic from streaming media and other bandwidth-intensive IP multicast applications. This document introduces the IGMP protocol and provides step-by-step instructions for configuring Dell PowerConnect 33xx switches to use IGMP snooping.

2013-03-30

Linux的高级路由和流量控制HOWTO(QoS)

经典介绍QoS原理和TC用法的书籍中文版 目录太长,截取部分 9.6. 使用过滤器对数据包进行分类 55 9.6.1. 过滤器的一些简单范例 56 9.6.2. 常用到的过滤命令一览 57 9.7. IMQ(INTERMEDIATE QUEUEING DEVICE,中介队列设备) 58 9.7.1. 配置范例 58 第10章多网卡的负载均衡 60 10.1. 告诫61 10.2. 其它可能性 61 第11章 NETFILTER和IPROUTE——给数据包作标记 62 第12章对包进行分类的高级过滤器 64 12.1. U32分类器65 12.1.1. U32选择器 65 12.1.2. 普通选择器 66 12.1.3. 特殊选择器 67 12.2. 路由分类器 67 12.3. 管制分类器 68 12.3.1. 管制的方式 68 12.3.2. 越限动作 69 12.3.3. 范例70 12.4. 当过滤器很多时如何使用散列表 70 第13章内核网络参数 72 13.1. 反向路径过滤 72 13.2. 深层设置73 13.2.1. ipv4一般设置 73 13.2.2. 网卡的分别设置 78 13.2.3. 邻居策略 79 13.2.4. 路由设置 80

2013-03-30

WPS2.0 test plan

WIFI certification test plan,过了这个就可以拿到最新的WPS2.0的logo

2012-09-16

Wi-Fi_Simple_Configuration_Technical_Specification_v2

This document contains a proposal for easy, secure setup and introduction of devices into WPA-enabled 802.11 networks. It is intended to meet the requirements determined by the Wi-Fi Protected Setup working group in the Wi-Fi Alliance. Version: 2.0

2012-03-27

Wi-Fi_Simple_Configuration_Technical_Specification_v2-0

1 Introduction ........................................................................................................................... 11 1.1 Purpose .................................................................................................................. 11 1.2 Scope ..................................................................................................................... 11 1.3 Supported Usage Models ...................................................................................... 11 1.3.1 Primary Usage Models .......................................................................................... 11 1.3.2 Secondary Usage Models ...................................................................................... 12 1.4 Mental Model ........................................................................................................ 12 1.5 Design Approach .................................................................................................. 12 1.6 Solution Flexibility ............................................................................................... 12 1.7 User Experience .................................................................................................... 13 1.7.1 In-band Setup ........................................................................................................ 13 1.7.2 Out-of-Band Setup ................................................................................................ 14 2 References ............................................................................................................................. 15 3 Definitions............................................................................................................................. 16 4 Core Architecture .................................................................................................................. 17 4.1 Components and Interfaces ................................................................................... 17 4.1.1 Architectural Overview ......................................................................................... 17 4.1.2 Interface E ............................................................................................................. 18 4.1.3 Interface M ............................................................................................................ 19 4.1.4 Interface A ............................................................................................................ 20 4.2 Registration Protocol ............................................................................................ 20 4.3 Security Overview ................................................................................................ 22 4.3.1 In-band Configuration ........................................................................................... 23 4.3.2 Guidelines and Requirements for PIN values ....................................................... 25 4.3.3 Out-of-Band Configuration ................................................................................... 26 5 Initial WLAN Setup .............................................................................................................. 27 5.1 Standalone AP ....................................................................................................... 27 5.2 AP With an External Registrar ............................................................................. 28 5.2.1 EAP-based Setup of External Registrar ................................................................ 30 5.2.2 Ethernet-based Setup of External Registrar .......................................................... 32 6 Adding Member Devices ...................................................................................................... 33 Wi-Fi Simple Configuration Technical Specification v2.0.2 © 2011 Wi-Fi Alliance. All Rights Reserved. Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. Page 4 of 154 6.1 In-band Setup Using a Standalone AP/Registrar .................................................. 34 6.2 In-band Setup Using an External Registrar .......................................................... 35 6.2.1 PIN based setup - External Registrar trigger first ................................................. 35 6.2.2 PBC based setup – External Registrar trigger first ............................................... 37 6.2.3 PIN based setup – Enrollee trigger first ................................................................ 38 6.2.4 PBC based setup – Enrollee trigger first ............................................................... 40 6.3 In-band Setup Using Multiple External Registrars ............................................... 41 6.4 Secure Setup with Legacy Enrollee ...................................................................... 44 6.4.1 Mental model mapping ......................................................................................... 44 7 Registration Protocol Definition ........................................................................................... 45 7.1 Registration Protocol Initiation ............................................................................. 45 7.2 Registration Protocol Messages ............................................................................ 47 7.2.1 Optional Parameters .............................................................................................. 49 7.2.2 Validation of Configuration Data ......................................................................... 49 7.3 Key Derivation ...................................................................................................... 50 7.4 Proof-of-possession of Device Password.............................................................. 52 7.4.1 PIN Checksums ..................................................................................................... 53 7.4.2 Device Password Splitting .................................................................................... 54 7.4.3 Device Password Usage in M1 and M2 ................................................................ 54 7.5 Key Wrap Algorithm ............................................................................................ 55 7.6 Key Summary and Classification .......................................................................... 56 7.7 EAP Transport of Registration Protocol ............................................................... 57 7.7.1 EAP Message Framing ......................................................................................... 58 7.7.2 EAP Messages ...................................................................................................... 60 7.7.3 EAP State Machine for Enrollee Registration ...................................................... 61 7.7.4 EAP State Machine for Adding an External Registrar ......................................... 62 7.8 UPnP Transport of Registration Protocol ............................................................. 63 7.9 Version Negotiation .............................................................................................. 64 8 Message Encoding ................................................................................................................ 65 8.1 Wi-Fi Simple Configuration TLV Data Format ................................................... 65 8.2 802.11 Management Frames ................................................................................. 66 8.2.1 Beacon Frame (C) ................................................................................................. 67 8.2.2 Association Request and Reassociation Request .................................................. 68 Wi-Fi Simple Configuration Technical Specification v2.0.2 © 2011 Wi-Fi Alliance. All Rights Reserved. Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. Page 5 of 154 8.2.3 Association Response and Reassociation Response ............................................. 69 8.2.4 Probe Request (D-E or D-R) ................................................................................. 69 8.2.5 Probe Response (D-AP/Registrar) ........................................................................ 70 8.3 Registration Protocol Message Definitions .......................................................... 71 8.3.1 Message M1 .......................................................................................................... 72 8.3.2 Message M2 .......................................................................................................... 73 8.3.3 Message M2D ....................................................................................................... 74 8.3.4 Message M3 .......................................................................................................... 75 8.3.5 Message M4 .......................................................................................................... 75 8.3.6 Message M5 .......................................................................................................... 76 8.3.7 Message M6 .......................................................................................................... 76 8.3.8 Message M7 .......................................................................................................... 77 8.3.9 Message M8 .......................................................................................................... 78 8.3.10 WSC_ACK Message ............................................................................................ 80 8.3.11 WSC_NACK Message.......................................................................................... 80 8.3.12 WSC_Done Message ............................................................................................ 80 8.4 AP Settings Message Definitions.......................................................................... 81 8.4.1 SetSelectedRegistrar Message .............................................................................. 81 9 Security Configuration Requirements ................................................................................... 83 10 NFC Out-of-Band Interface Specification ............................................................................ 84 10.1 Overview ............................................................................................................... 84 10.2 NFC Usage Models ............................................................................................... 84 10.2.1 Password Token .................................................................................................... 85 10.2.2 Configuration Token ............................................................................................. 85 10.2.3 Connection Handover ........................................................................................... 86 10.3 Requirements for NFC Out-of-Band Support ....................................................... 89 10.3.1 Enrollee Requirements .......................................................................................... 89 10.3.2 Registrar Requirements ......................................................................................... 89 10.4 Informative: NFC Forum Specifications .............................................................. 89 10.4.1 NFC Data Exchange Format (NDEF) Specification ............................................. 89 10.4.2 NFC Forum Tag Operation Specifications ........................................................... 89 10.4.3 Logical Link Control Protocol (LLCP) Specification .......................................... 90 10.4.4 Connection Handover Specification ..................................................................... 90 Wi-Fi Simple Configuration Technical Specification v2.0.2 © 2011 Wi-Fi Alliance. All Rights Reserved. Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. Page 6 of 154 11 Push Button Configuration ................................................................................................... 91 11.1 Introduction ........................................................................................................... 91 11.2 User Experience .................................................................................................... 91 11.3 PBC Technical Description ................................................................................... 93 11.4 PBC Security Considerations ................................................................................ 96 12 Data Element Definitions ...................................................................................................... 98 13 Protocol Implementation Conformance Specification (PICS) ........................................... 130 Annex A - Out-of-Band Channel Considerations ................................................................. 134 Annex B - Security Analysis of Registration Protocol ......................................................... 136 Out-Of-Band Channels ........................................................................................................... 136 Out-of-band Channel Characteristics ...................................................................................... 137 Annex C - Out-of-band Setup Using a Standalone AP/Registrar ......................................... 138 Setup steps .............................................................................................................................. 138 Annex D - Out-of-band Setup Using an External Registrar ................................................. 139 Annex E - Secondary Usage Models .................................................................................... 140 Removing Members from the WLAN .................................................................................... 140 Guest access ............................................................................................................................ 140 Re-keying credentials ............................................................................................................. 140 Expanding the network - Adding additional AP or Router .................................................... 140 Changing Network Name (SSID), radio channels, etc. .......................................................... 140 Rekeying ................................................................................................................................. 141 Annex F - Management Interface Message Definitions ...................................................... 142 GetAPSettings Input Message ................................................................................................ 142 GetAPSettings Output Message .............................................................................................. 143 SetAPSettings Message .......................................................................................................... 144 DelAPSettings Message .......................................................................................................... 145 ResetAP and RebootAP Messages ......................................................................................... 146 STA Settings Message Definitions ......................................................................................... 146 GetSTASettings Input Message .............................................................................................. 146 GetSTASettings Output Message ........................................................................................... 147 SetSTASettings Message ........................................................................................................ 148 DelSTASettings Message ....................................................................................................... 149 ResetSTA and RebootSTA Messages ..................................................................................... 150 Annex G - USBA (USB Host) Out-of-Band Interface Specification ................................... 151 Wi-Fi Simple Configuration Technical Specification v2.0.2 © 2011 Wi-Fi Alliance. All Rights Reserved. Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. Page 7 of 154 Requirements for USB Flash Drives (UFD) ........................................................................... 151 Enrollee Requirements for USBA out-of-band Interfaces ...................................................... 151 Firmware and Software Requirements ................................................................................... 152 Encrypted Settings File (xxxxxxxx.WSC) .............................................................................. 152 Unencrypted Settings File (00000000.WSC) ......................................................................... 153 Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ................................................. 153

2012-03-27

Wi-Fi Protected Setup Specification 1.0

1. Introduction ........................................................................................................................7 1.1. Purpose .............................................................................................................................................. 7 1.2. Scope................................................................................................................................................... 7 1.3. Related Documents .......................................................................................................................... 7 1.4. Supported Usage Models................................................................................................................. 7 Primary Usage Models................................................................................................................................. 7 Secondary Usage Models ............................................................................................................................. 7 1.5. Mental Model .................................................................................................................................... 8 1.6. Design Approach .............................................................................................................................. 8 1.7. Solution Flexibility ........................................................................................................................... 8 1.8. User Experience................................................................................................................................ 9 1.8.1. In-band Setup ............................................................................................................................... 9 1.8.2. Out-of-band Setup ....................................................................................................................... 9 2. Core Architecture..............................................................................................................11 2.1. Definitions........................................................................................................................................ 11 2.2. Components and Interfaces .......................................................................................................... 12 2.2.1. Architectural Overview .......................................................................................................................... 12 2.2.2. Interface E ............................................................................................................................................... 12 2.2.3. Interface M.............................................................................................................................................. 13 2.2.4. Interface A............................................................................................................................................... 14 2.3. Registration Protocol ..................................................................................................................... 15 2.4. Security Overview.......................................................................................................................... 16 2.4.1. In-band Configuration .............................................................................................................. 16 2.4.2. Guidelines and Requirements for PIN values ....................................................................... 18 2.4.3. Out-of-band Configuration ...................................................................................................... 18 3. Initial WLAN Setup ..........................................................................................................19 3.1. Standalone AP ................................................................................................................................ 19 3.2. Legacy AP........................................................................................................................................ 19 3.3. AP With an External Registrar ................................................................................................... 20 3.3.1. EAP-based Setup of External Registrar................................................................................. 21 3.3.2. Ethernet-based Setup of External Registrar ......................................................................... 23 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 3 of 110 Version: 1.0h 4. Adding Member Devices ...................................................................................................25 4.1. In-band Setup Using a Standalone AP/Registrar ..................................................................... 25 4.2. Out-of-band Setup Using a Standalone AP/Registrar.............................................................. 27 4.3. Out-of-band Setup Using an External Registrar ...................................................................... 28 4.4. Secure Setup with Legacy AP ...................................................................................................... 29 4.5. Secure Setup with Legacy Enrollee ............................................................................................. 29 4.5.1. Mental model mapping ............................................................................................................. 29 4.6. No-Security Out-of-band Setup Using a Standalone AP ......................................................... 29 4.6.1. Mental model mapping ............................................................................................................. 30 5. Secondary Usage Models ..................................................................................................31 5.1. Removing Members from the WLAN......................................................................................... 31 5.2. Guest access..................................................................................................................................... 31 5.3. Re-keying credentials .................................................................................................................... 31 5.4. Expanding the network - Adding additional AP or Router .................................................... 31 5.5. Changing Network Name (SSID), radio channels, etc. ............................................................ 31 6. Registration Protocol Definition .......................................................................................33 6.1. Registration Protocol Initiation ................................................................................................... 33 6.2. Registration Protocol Messages ................................................................................................... 34 6.2.1. Optional Parameters................................................................................................................................ 35 6.3. Key Derivation................................................................................................................................ 36 6.4. Proof-of-possession of Device Password ..................................................................................... 38 6.4.1. PIN Checksums .......................................................................................................................... 38 6.4.2. Device Password Splitting......................................................................................................... 39 6.4.3. Device Password Usage ............................................................................................................. 39 6.5. Key Wrap Algorithm..................................................................................................................... 40 6.6. Rekeying .......................................................................................................................................... 41 6.7. Key Summary and Classification ................................................................................................ 41 6.8. Security Analysis ............................................................................................................................ 42 6.9. Out-Of-Band Channels ................................................................................................................. 43 6.9.1. Out-of-band Channel Characteristics .................................................................................................... 43 6.10. EAP Transport of Registration Protocol................................................................................ 43 6.10.1. EAP Message Framing ........................................................................................................................... 44 6.10.2. EAP Messages......................................................................................................................................... 45 6.10.3. EAP State Machine for Enrollee Registration ...................................................................................... 47 6.10.4. EAP State Machine for Adding an External Registrar ......................................................................... 48 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 4 of 110 Version: 1.0h 6.11. UPnP Transport of Registration Protocol ............................................................................. 49 7. Message Encoding ............................................................................................................50 7.1. Wi-Fi Protected Setup TLV Data Format.................................................................................. 50 7.2. 802.11 Management Frames......................................................................................................... 50 7.2.1. Beacon Frame (C) ...................................................................................................................... 52 7.2.2. Association Request and Reassociation Request................................................................... 52 7.2.3. Association Response and Reassociation Response .............................................................. 52 7.2.4. Probe Request (D-E or D-R) .................................................................................................... 53 7.2.5. Probe Response (D-AP/Registrar)........................................................................................... 53 7.3. Registration Protocol Message Definitions ................................................................................ 54 7.3.1. Message M1................................................................................................................................. 54 7.3.2. Message M2................................................................................................................................. 55 7.3.3. Message M2D.............................................................................................................................. 56 7.3.4. Message M3................................................................................................................................. 56 7.3.5. Message M4................................................................................................................................. 56 7.3.6. Message M5................................................................................................................................. 57 7.3.7. Message M6................................................................................................................................. 57 7.3.8. Message M7................................................................................................................................. 58 7.3.9. Message M8................................................................................................................................. 59 7.3.10. WSC_ACK Message .................................................................................................................. 60 7.3.11. WSC_NACK Message ............................................................................................................... 60 7.3.12. WSC_Done Message .................................................................................................................. 60 7.4. AP Settings Message Definitions.................................................................................................. 61 7.4.1. GetAPSettings Input Message.................................................................................................. 61 7.4.2. GetAPSettings Output Message............................................................................................... 62 7.4.3. SetAPSettings Message.............................................................................................................. 63 7.4.4. DelAPSettings Message ............................................................................................................. 63 7.4.5. SetSelectedRegistrar Message.................................................................................................. 64 7.4.6. ResetAP and RebootAP Messages........................................................................................... 64 7.5. STA Settings Message Definitions ............................................................................................... 65 7.5.1. GetSTASettings Input Message ............................................................................................... 65 7.5.2. GetSTASettings Output Message ............................................................................................ 65 7.5.3. SetSTASettings Message ........................................................................................................... 66 7.5.4. DelSTASettings Message .......................................................................................................... 67 7.5.5. ResetSTA and RebootSTA Messages...................................................................................... 67 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 5 of 110 Version: 1.0h 8. USBA (USB Host) Out-of-Band Interface Specification ..................................................68 8.1. Requirements for USB Flash Drives (UFD)............................................................................... 68 8.2. Enrollee Requirements for USBA OOB Interfaces .................................................................. 68 8.3. Firmware and Software Requirements ...................................................................................... 69 8.3.1. Encrypted Settings File (xxxxxxxx.WSC) .............................................................................. 69 8.3.2. Unencrypted Settings File (00000000.WSC).......................................................................... 69 8.3.3. Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ............................................... 70 9. NFC Out-of-Band Interface Specification........................................................................71 9.1. Disclaimer........................................................................................................................................ 71 9.2. Overview.......................................................................................................................................... 71 9.3. NFC Use Cases................................................................................................................................ 72 9.3.1. NFC Password Token................................................................................................................ 72 9.3.2. Touching Devices ....................................................................................................................... 72 9.3.3. NFC Configuration Token........................................................................................................ 73 9.4. Generic Requirements for NFC OOB Support ......................................................................... 73 9.4.1. New Devices (Enrollee or AP) Requirements ........................................................................ 73 9.4.2. Registrar Requirements ............................................................................................................ 74 9.5. Hardware Requirements............................................................................................................... 74 9.5.1. Requirements for NFC Tokens................................................................................................ 74 9.5.2. Requirements for an NFC Device............................................................................................ 74 9.6. Firmware and Software Requirements ...................................................................................... 74 9.6.1. NFC Password Token................................................................................................................ 74 9.6.2. NFC Configuration Token........................................................................................................ 75 9.6.3. NFC Device ................................................................................................................................. 75 9.7. Informative: NFC Forum specifications..................................................................................... 75 9.7.1. NFC Data Exchange Format (NDEF)..................................................................................... 75 9.7.2. NDEF mapping documents ...................................................................................................... 76 10. PushButton Configuration............................................................................................77 10.1. Introduction ................................................................................................................................ 77 10.2. User Experience.......................................................................................................................... 77 10.3. PBC Technical Description ...................................................................................................... 78 10.4. User Feedback ............................................................................................................................ 81 10.5. PBC Security Considerations................................................................................................... 82 11. Data Element Definitions ..............................................................................................84 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 6 of 110 Version: 1.0h 12. Conclusion...................................................................................................................105 13. Appendix: Additional Setup Scenarios .......................................................................107 14. Appendix: Out-of-Band Channel Considerations ......................................................109

2012-03-27

ipv6协议详解

第一部分IP基础知识 第二部分IPv6细节 IPv6寻址 IPv6扩展头 IPv6选路 IPv6身份验证和安全性 ...

2012-03-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除