throbber
reating & Administering Wireless Networks
`
`reles
`tworks
`
`e Definitive Guide
`
`Matthew S. Gast
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`SECOND EDITION
`
`802.11° Wireless Networks: The
`Definitive Guide
`
`Matthew Gast
`
`OREILLY®
`
`Beijing + Cambridge + Farnham - Koln - Sebastopol - Tokyo
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`
`802.11° Wireless Networks: The Definitive Guide, Second Edition
`by Matthew Gast
`
`Copyright © 2005 Mathhew Gast. All rights reserved.
`Printed in the United States of America.
`
`Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.
`
`O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions
`are also available for most titles (http:/fmy.safaribooksonline.com). For more information, contact our
`corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com.
`
`Editor: Mike Loukides Cover Designer: Karen Montgomery
`Production Editor: Colleen Toporek Interior Designer: David Futato
`: lHlustrator: Robert Romano
`
`April 2002: First Edition.
`April 2005: Second Edition.
`
`Revision History for the Second Edition:
`2008-10-20 Sixth release
`2010-04-12 Seventh release
`2010-08-30 Eighth release
`2011-02-18 Ninth release
`2013-04-05 Tenth release
`
`See hetp:toreilly.com/catalog/errata.csp?isbn=9780596100520 for release details,
`
`Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of
`O’Reilly Media, Inc. 802.11% Wireless Networks: The Definitive Guide, Second Edition, the image of a
`horseshoe bat, and related trade dress are trademarks of O’Reilly Media, Inc.
`
`802.11® and all 802.11-based trademarks and logos are trademarks or registered rrademarks of IEEE,
`Inc. in the United States and other countries. O’Reilly Media, Inc. is independent of IEEE.
`
`Many of the designations used by manufacturers and sellers to distinguish their prodticts are claimed as
`trademarks. Where those designations appear in this book, and O'Reilly Media, Inc., was aware of a
`trademark claim, the designations have been printed in caps or initial caps.
`
`While every precaution has been taken in the preparation of this book, the publisher and authors assume
`no responsibility for errors or omissions, or for damages resulting from the use of the information con-
`tained herein.
`
`ISBN: 978-0-596-10052-0
`LSy
`1365094995
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`MAC header
`bytes ’ 2 6
`T
`
`T T
`
`T T T T T T T T T
`Frame BSSID Transmitter Address
`
`Control
`I
`
`) ! ) L i
`
`bits 2 2 4 T — 1 1 1
`
`H T T T T =
`Protocol | Type =control| Subtype =PS - Poll FromDS | More | Retry | Pwr | More [Protected
`frag Mgmt | Data | frame
`
`ol 1,0 0ol 0|0 0 | 0
`
`0
`
`i
`
`Figure 4-19. PS-Poll frame
`
`Association ID (AID)
`Instead of a Duration field, the PS-Poll frame uses the third and fourth bytes in the
`MAC header for the association ID. This is a numeric value assigned by the access
`point to identify the association. Including this ID in the frame allows the access
`point to find any frames buffered for the now-awakened mobile station.
`
`Address 1: BSSID
`This field contains the BSSID of the BSS created by the access point that the sender
`is currently associated with.
`
`Address 2: Transmitter Address
`This is the address of the sender of the PS-Poll frame.
`
`The PS-Poll frame does not include duration information to update the NAV. However,
`all stations receiving a PS-Poll frame update the NAV by the short interframe space plus
`the amount of time required to transmit an ACK. The automatic NAV update allows
`the access point to transmit an ACK with a small probability of collision with a mobile
`station.
`
`Association ID (AID)
`
`In the PS-Poll frame, the Duration/ID field is an association ID rather than a value used
`by the virtual carrier-sensing function. When mobile stations associate with an access
`point, the access point assigns a value called the Association ID (AID) from the range
`1-2,007. The AID is used for a variety of purposes that appear throughout this book.
`
`Management Frames
`
`Management is a large component of the 802.11 specification. Several different types
`of management frames are used to provide services that are simple on a wired network.
`Establishing the identity of a network station is easy on a wired network because net-
`work connections require dragging wires from a central location to the new worksta-
`tion. In many cases, patch panels in the wiring closet are used to speed up installation,
`
`84 | Chapter4: 802.11Framing in Detail
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`2
`
`2
`
`MAC header
`
`Information
`
`elements and
`
`Al
`
`fixed fields
`0-2,312
`
`4
`T
`
`T
`
`Frame
`Control
`i
`
`T
`Duration
`
`Seg-
`o
`1
`
`Frame
`Body
`
`F(S
`
`H
`
`Figure 4-20. Generic management frame
`
`but the essential point remains: new network connections can be authenticated by a
`personal visit when the new connection is brought up.
`
`Wireless networks must create management features to provide similar functionality.
`802.11 breaks the procedure up into three components. Mobile stations in search of
`connectivity must first locate a compatible wireless network to use for access. With
`wired networks, this step typically involves finding the appropriate data jack on the
`wall. Next, the network must authenticate mobile stations to establish that the au-
`thenticated identity is allowed to connect to the network. The wired-network equiva-
`lentis provided by the network itself. If signals cannot leave the wire, obtaining physical
`access is at least something of an authentication process. Finally, mobile stations must
`associate with an access point to gain access to the wired backbone, a step equivalent
`to plugging the cable into a wired network.
`
`The Structure of Management Frames
`
`802.11 management frames share the structure shown in Figure 4-20. The MAC header
`is the same in all management frames; it does not depend on the frame subtype. Man-
`agement frames use information elements, little chunks of data with a numerical label,
`to communicate information to other systems.
`
`Address fields
`
`As with all other frames, the first address field is used for the frame’s destination ad-
`dress. Some management frames are used to maintain properties within a single BSS.
`To limit the effect of broadcast and multicast management frames, stations are required
`to inspect the BSSID after receiving a management frame, though not all implementa-
`tions perform BSSID filtering. Only broadcast and multicast frames from the BSSID
`that a station is currently associated with are passed to MAC management layers. The
`one exception to this rule is Beacon frames, which are used to announce the existence
`of an 802.11 network.
`
`BSSIDs are assigned in the familiar manner. Access points use the MAC address of the
`wireless network interface as the BSSID. Mobile stations adopt the BSSID of the access
`point they are currently associated with. Stations in an IBSS use the randomly generated
`BSSID from the BSS creation. One exception to the rule: frames sent by the mobile
`
`Management Frames | 85
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`
`station seeking a specific network may use the BSSID of the network they are seeking,
`or they may use the broadcast BSSID to find all networks in the vicinity.
`
`Duration calculations
`
`Management frames use the Duration field in the same manner that other frames do:
`
`1. Any frames transmitted in the contention-free period set the duration to 32,768.
`
`7. Frames transmitted during the contention-based access periods using only the DCF
`use the Duration field to block access to the medium to allow any atomic frame
`exchanges to complete.
`
`A 1f the frame is a broadcast or multicast (the destination address is a group
`address), the duration is 0. Broadcast and multicast frames are not acknowl-
`edged, so the NAV is not needed to block access to the medium.
`
`. If a nonfinal fragment is part of a multiframe exchange, the duration is set to
`the number of microseconds taken up by three SIFS intervals plus the next
`fragment and its acknowledgment.
`
`. Final fragments use a duration that is the time required for one acknowledg-
`ment plus one SIFS.
`
`Frame body
`
`Management frames are quite flexible. Most of the data contained in the frame body
`uses fixed-length fields called fixed fields and variable-length fields called information
`elements. Information elements are blobs of data of varying size. Each data blob is
`ragged with a type number and a size, and it is understood that an information element
`of a certain type has its data field interpreted in a certain way. New information elements
`can be defined by newer revisions to the 802.11 specification; implementations that
`predate the revisions can ignore newer elements. Old implementations depend on
`backward-compatible hardware and frequently can’t join networks based on the newer
`standards. Fortunately, new options usually can be easily turned off for compatibility.
`
`This section presents the fixed fields and information elements as building blocks and
`shows how the building blocks are assembled into management frames. 802.11 man-
`dates the order in which information elements appear, but not all elements are manda-
`tory. This book shows all the frame building blocks in the specified order, and the
`discussion of each subtype notes which elements are rare and which are mutually ex-
`clusive.
`
`Fixed-Length Management Frame Components
`
`10 fixed-length fields may appear in management frames. Fixed-length fields are often
`referred to simply as fields to distinguish them from the variable-length information
`elements. Fields do not have a header to distinguish them from other parts of the frame
`
`86 | Chapter4: 802.11Framingin Detail
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`T T T T T T T T T T T T T T
`
`o 1 2 3 4 s & 7 8 9 w0 N o B W B
`
`Authentication algorithm number
`Least significant <& » Most significant
`
`Figure 4-21. Authentication Algorithm Number field
`
`bits
`T B T T R T T T T T T T T T T
`0 1 2 3 4 5 6 7 8 9 10 n 12 13 14 15
`Authentication transaction sequence number
`Least significant & P Most significant
`
`Figure 4-22. Authentication Transaction Sequence Number field
`
`body. Because they have a fixed length and appear in a known order, fields can be
`delimited without using a field header.
`
`Authentication Algorithm Number
`
`Two bytes are used for the Authentication Algorithm Number field, which are shown
`in Figure 4-21. This field identifies the type of authentication used in the initial 802.11-
`level authentication process before association occurs. 802.1X authentication occurs
`after association, and is not assigned an algorithm number. (The authentication process
`is discussed more thoroughly in Chapter 8.) The values permitted for this field are
`shown in Table 4-3. Only two values are currently defined. Other values are reserved
`for future standardization work.
`
`Table 4-3. Values of the Authentication Algorithm Number field
`
`Value Meaning
`0 Open System authentication (typically used with 802.1X authentication)
`1 Shared Key authentication (deprecated by 802.11i)
`
`2-65,535 Reserved
`
`Authentication Transaction Sequence Number
`
`Authentication is a multistep process that consists of a challenge from the access point
`and a response from the mobile station attempting to associate. The Authentication
`Transaction Sequence Number, shown in Figure 4-22, is a two-byte field used to track
`progress through the authentication exchange. It takes values from 1 to 65,535; it is
`never set to 0. Use of this field is discussed in Chapter 8.
`
`Management Frames | 87
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`
`T T T T 1 T
`
`T T
`7 8 9 10 1 12 13
`
`Beacon interval
`Least significant & P Most significant
`
`Figure 4-23. Beacon Interval field
`
`bits 0 1 2 3 4 5 6 7 g§ 9 10 11 12 13 14 15
`Short Channel ‘ Short I < ‘
`
`Bss | 1BSS |, 55 | P piay L preamble | o POC f Tagity | Reserved | stot | Reserved D555 Reserved
`Pollable | request (802.11b) (802.11h) (802178 time OFDM
`
`1 | 1
`
`Figure 4-24. Capability Information field
`Beacon interval
`
`Beacon transmissions announce the existence of an 802.11 network at regular intervals.
`Beacon frames carry information about the BSS parameters and the frames buffered by
`access points, so mobile stations must listen to Beacons. The Beacon Interval, shown
`in Figure 4-23, is a 16-bit field set to the number of time units between Beacon trans-
`missions. One time unit, which is often abbreviated TU, is 1,024 microseconds (ms),
`which is about 1 millisecond.3 Time units may also be called kilo-microseconds in
`various documentation (Kms or kms). It is common for the Beacon interval to be set
`to 100 time units, which corresponds to an interval between Beacon transmissions of
`approximately 100 milliseconds or 0.1 seconds.
`
`Capability Information
`The 16-bit Capability Information field (Figure 4-24) is used in Beacon transmissions
`
`to advertise the network’s capabilities. Capability Information is also used in Probe
`Request and Probe Response frames. In this field, each bit is used as a flag to advertise
`a particular function of the network. Stations use the capability advertisement to de-
`termine whether they can support all the features in the BSS. Stations that do not im-
`plement all the features in the capability advertisement are not allowed to join.
`
`ESS/IBSS
`These two bits are mutually exclusive. Access points set the ESS field to 1 and the
`IBSS field to O to indicate that the access point is part of an infrastructure network.
`Stations in an IBSS set the ESS field to 0 and the IBSS field to 1.
`
`3. Kilo-microseconds are an odd blend of the powers-of-2 used in computing for the kilo, and the more
`common 1/1,000 for micro. Presumably, the International Bureau of Weights and Measures would protest
`the mangling of the traditional form of the prefixes.
`
`88 | Chapter4: 802.11Framing in Detail
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`MAC header
`[
`
`byres‘ 2 2 6 6 2 1 Variable 4
`T T T T T T T T T 1 T T T T T T T T i T T
`frame {Duration DA SA BSSID Seq- Frame S
`Control ctl Body
`L R R B o L L - - bl
`bytes 82— 27" Variable 7 2 8 4 Variable
`T T T H o1 T 1 1 1 T T ¢ 1 1 17 T T T
`Timestamp Beacon [Capability| SSID FH 0§ CF 18SS TIM
`Interval{ Info ParametesSet Pa"g':f""' ParameterSet |Parameter Set
`b b L L F RS TS B I S | i SN T U S S H I3 1
`‘ Mandatory | Optional >
`Variable 3 6 8 4 3 Variable Variable
`L T 1 1 1 1 T ¢ U 17 1 171 1T L
`Country Power Channel Quiet TPC ERP Extended Robust
`Info Contest Switch Report rates Security network
`) F I A T S | S T S R S S l‘ 1
`| Optional (continued) /
`
`Figure 4-51. Beacon frame
`Types of Management Frames
`
`The fixed fields and information elements are used in the body of management frames
`to convey information. Several types of management frames exist and are used for
`various link-layer maintenance functions.
`
`Beacon
`
`Beacon frames announce the existence of a network and are an important part of many
`network maintenance tasks. They are transmitted at regular intervals to allow mobile
`stations to find and identify a network, as well as match parameters for joining the
`network. In an infrastructure network, the access point is responsible for transmitting
`Beacon frames. The area in which Beacon frames appear defines the basic service area.
`All communication in an infrastructure network is done through an access point, so
`stations on the network must be close enough to hear the Beacons.
`
`Figure 4-51 shows most the fields that can be used in a Beacon frame in the order in
`which they appear. Not all of the elements are present in all Beacons. Optional fields
`are present only when there is a reason for them to be used. The FH and DS Parameter
`Sets are used only when the underlying physical layer is based on frequency hopping
`or direct-sequence techniques. Only one physical layer can be in use at any point, so
`the FH and DS Parameter Sets are mutually exclusive.
`
`The CF Parameter Set is used only in frames generated by access points that support
`the PCF, which is optional. The TIM element is used only in Beacons generated by
`access points, because only access points perform frame buffering. If the Country-spe-
`cific frequency hopping extensions were to be present, they would follow the Country
`information element. Frequency hopping networks are much less common now,
`
`Management Frames | 109
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`
`[————-———————— MAC header Frame hody
`bytes 1 2 2 6 6 2 | Variable Variable } 4
`T
`
`T T TTTTTY TTTTT Extended
`Frame [Duration DA SA Seq- | SSID Supported Supported £CS
`Control a Rates Rates <
`
`|
`
`1 F Y T 1
`
`Figure 4-52. Probe Request frame
`
`though, so I omit the frequency hopping extensions for simplicity. Likewise, the IBSS
`DEFS element occur between the Quiet and TPC Report elements, were it to appear.
`
`Probe Request
`
`Mobile stations use Probe Request frames to scan an area for existing 802.11 networks.
`The format of the Probe Request frame is shown in Figure 4-52. All fields are mandatory.
`
`A Probe Request frame contains two fields: the SSID and the rates supported by the
`mobile station. Stations that receive Probe Requests use the information to determine
`whether the mobile station can join the network. To make a happy union, the mobile
`station must support all the data rates required by the network and must want to join
`the network identified by the SSID. This may be set to the SSID of a specific network
`or set to join any compatible network. Drivers that allow cards to join any network use
`the broadcast SSID in Probe Requests.
`
`Probe Response
`
`If a Probe Request encounters a network with compatible parameters, the network
`sends a Probe Response frame. The station that sent the last Beacon is responsible for
`responding to incoming probes. In infrastructure networks, this station is the access
`point. In an IBSS, responsibility for Beacon transmission is distributed. After a station
`
`transmits a Beacon, it assumes responsibility for sending Probe Response frames for
`the next Beacon interval. The format of the Probe Response frame is shown in Fig-
`ure 4-53. Some of the fields in the frame are mutually exclusive; the same rules apply
`to Probe Response frames as to Beacon frames.
`
`The Probe Response frame carries all the parameters in a Beacon frame, which enables
`mobile stations to match parameters and join the network. Probe Response frames can
`safely leave out the TIM element because stations sending probes are not yet associated
`and thus would not need to know which associations have buffered frames waiting at
`the access point.
`
`IBSS announcement traffic indication map (ATIM)
`
`IBSSs have no access points and therefore cannot rely on access points for buffering.
`When a station in an IBSS has buffered frames for a receiver in low-power mode, it
`sends an ATIM frame during the delivery period to notify the recipient it has buffered
`data. See Figure 4-54.
`
`110 | Chapter4: 802.11 Framing in Detail
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`Roaming is sometimes given yet another meaning, referring to the process of moving
`a network session from one network (say, an 802.11 wireless LAN) to another disparate
`network (say, a 3G mobile telephone network). The IEEE has started another working
`group to define roaming operations to move network sessions and state between dif-
`ferent types of IEEE 802 networks.
`
`Power Conservation
`
`The major advantage of wireless networks is that network access does not require nodes
`to be in any particular location. To take full advantage of mobility, nothing can con-
`strain the location of a node, including the availability of electrical power. Mobility
`therefore implies that most mobile devices can run on batteries. But battery power is a
`scarce resource; batteries can run only so long before they need to be recharged. Re-
`quiring mobile users to return frequently to commercial power is inconvenient, to say
`the least. Many wireless applications require long battery life without sacrificing net-
`work connectivity.
`
`As with any other network interface, powering down the transceiver can lead to great
`power savings in wireless networks. When the transceiver is off, it is said to be sleep-
`ing, dozing, or in powersaving mode (PS). When the transceiver is on, it is said to be
`awake, active, or simply on. Power conservation in 802.11 is achieved by minimizing
`the time spent in the latter stage and maximizing the time in the former. 802.11 ac-
`complishes this without sacrificing connectivity.
`
`Power Management in Infrastructure Networks
`
`Power management can achieve the greatest savings in infrastructure networks. All
`traffic for mobile stations must go through access points, so they are an ideal location
`to buffer traffic. Most traffic can be buffered. The standard forbids buffering frames
`that require in-order delivery and have Order bit set because buffer implementations
`could possibly re-order frames. There is no need to work on a distributed buffer system
`that must be implemented on every station; the bulk of the work is left to the access
`point. By definition, access points are aware of the location of mobile stations, and a
`mobile station can communicate its power management state to its access point. Fur-
`thermore, access points must remain active at all times; it is assumed that they have
`access to continuous power. Combining these two facts allows access points to play a
`key role in power management on infrastructure networks.
`
`Access points have two power management-related tasks. First, because an access point
`knows the power management state of every station that has associated with it, it can
`determine whether a frame should be delivered to the wireless network because the
`station is active or buffered because the station is asleep. But buffering frames alone
`does not enable mobile stations to pick up the data waiting for them. An access point’s
`second task is to announce periodically which stations have frames waiting for them.
`
`Power Conservation | 193
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`The periodic announcement of buffer status also helps to contribute to the power sav-
`ings in infrastructure networks. Powering up a receiver to listen to the buffer status
`requires far less power than periodically transmitting polling frames. Stations only need
`to power up the transmitter to transmit polling frames after being informed that there
`is a reason to expend the energy.
`
`Power management is designed around the needs of the battery-powered mobile sta-
`tions. Mobile stations can sleep for extended periods to avoid using the wireless net-
`work interface. Part of the association request is the Listen Interval parameter, the
`number of Beacon periods for which the mobile station may choose to sleep. Longer
`listen intervals require more buffer space on the access point; therefore, the Listen
`Interval is one of the key parameters used in estimating the resources required to sup-
`port an association. The Listen Interval is a contract with the access point. In agreeing
`to buffer any frames while the mobile station is sleeping, the access point agrees to wait
`for at least the listen interval before discarding frames. If a mobile station fails to check
`for waiting frames after each listen interval, they may be discarded without notification.
`
`Unicast frame buffering and delivery using the Traffic Indication Map (TIM)
`
`When frames are buffered, the destination node’s Association ID (AID) provides the
`logical link between the frame and its destination. Each AID is logically connected to
`frames buffered for the mobile station that is assigned that AID. Multicast and broad-
`cast frames are buffered and linked to an AID of zero. Delivery of buffered multicast
`and broadcast frames is treated in the next section.
`
`Buffering is only half the battle. If stations never pick up their buffered frames, saving
`the frames is a rather pointless exercise. To inform stations that frames are buffered,
`access points periodically assemble a traffic indication map (TIM) and transmit it in
`Beacon frames. The TIM is a virtual bitmap composed of 2,008 bits; offsets are used
`so that the access point needs to transmit only a small portion of the virtual bitmap.
`This conserves network capacity when only a few stations have buffered data. Each bit
`in the TIM corresponds to a particular AID; setting the bit indicates that the access
`point has buffered unicast frames for the station with the AID corresponding to the bit
`position.
`
`Mobile stations must wake up and enter the active mode to listen for Beacon frames to
`receive the TIM. By examining the TIM, a station can determine if the access point has
`buffered traffic on its behalf. To retrieve buffered frames, mobile stations use PS-Poll
`Control frames. When multiple stations have buffered frames, all stations with buffered
`data must use the random backoff algorithm before transmitting the PS-Poll.
`
`Each PS-Poll frame is used to retrieve one buffered frame. That frame must be positively
`acknowledged before it is removed from the buffer. Positive acknowledgment is re-
`quired to keep a second, retried PS-Poll from acting as an implicit acknowledgment.
`Figure 8-12 illustrates the process.
`
`194 | Chapter8: Management Operations
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`rime (9 ps-Poll’
`
`ALK
`
`AP
`
`PSPl
`
`ACK
`PS-Poll
`e
`
`ALK
`
`1f multiple frames are buffered for a mobile station, then the More Data bit in the Frame
`Control field is set to 1. Mobile stations can then issue additional PS-Poll requests to
`the access point until the More Data bit is set to 0, though no time constraintis imposed
`by the standard.
`
`Figure 8-12. PS-Poll frame retrieval
`
`After transmitting the PS-Poll, a mobile station must remain awake until either the
`polling transaction has concluded or the bit corresponding to its AID is no longer set
`‘1 the TIM. The reason for the first case is obvious: the mobile station has successfully
`polled the access point; part of that transaction was a notification that the mobile sta-
`tion will be returning to a sleeping mode. The second case allows the mobile station to
`return to a power Conservation mode if the access point discards the buffered frame.
`Once all the traffic buffered for a station s delivered or discarded, the station can resume
`sleeping.
`
`The buffering and delivery process is illustrated in Figure 8-13, which shows the me-
`dium as it appears to an access point and two associated powersaving stations. The
`hash marks on the timeline represent the beacon interval. Every beacon interval, the
`access point transmits a Beacon frame with a TIM information element. (This figure is
`somewhat simplified. A special kind of TIM is used to deliver multicast traffic; it will
`be described in the next section.) Station 1 has a listen interval of 2, so it must wake up
`to receive every other TIM, while station 2 has a listen interval of 3, so it wakes up to
`process every third TIM. The lines above the station base lines indicate the ramp-up
`process of the receiver to listen for the TIM.
`
`At the first beacon interval, there are frames buffered for station 1. No frames are buf-
`
`fered for station 2, though, so it can immediately return to sleep. At the second beacon
`interval, the TIM indicates that there are buffered frames for stations 1 and 2, although
`
`Powet Conservation | 195
`
`SCT Exhibit 2024
`IPR2025-01183
`
`
`
`
`
`
`
`
`
`Beacon
`
`i interval ' 1 [ | '
`
`TIM: Framefor1 TIM: Framesfor TIM: Framefor2 TIM: Framesfor TIM: No frames TIM: No frames
`1and2
`
`[©) Time
`
`| ’
`
`Station 1 | - >
`1
`@ Time
`
`Station 2 —& }
`
`& fime
`
`Figure 8-13. Buffered frame retrieval process
`
`only station 1 woke up to listen to the TIM. Station 1 issues a PS-Poll and receives the
`frame in response. At the conclusion of the exchange, station 1 returns to sleep. Both
`stations are asleep during the third beacon. At the fourth beacon, both wake up to listen
`to the TIM, which indicates that there are frames buffered for both.
`
`Both station 1 and station 2 prepare to transmit PS-Poll frames after the expiration of
`a contention window countdown, as described in Chapter 3. Station 1 wins because
`its random delay was shorter. Station 1 issues a PS-Poll and receives its buffered frame
`in response. During the transmission, station 2 defers. If, at the end of that frame
`transmission, a third station, which is not illustrated, seizes the medium for transmis-
`sion, station 2 must continue to stay awake until the next TIM. If the access point has
`run out of buffer space and has discarded the buffered frame for station 2, the TIM at
`the fifth beacon indicates that no frames are buffered, and station 2 can finally return
`to a low-power mode.
`
`Stations may switch from a power conservation mode to active mode at any time. It is
`common for laptop computers to operate with full power to all peripherals when con-
`nected to AC power and conserve power only when using the battery. If a mobile station
`switches to the active mode from a sleeping mode, frames can be transmitted without
`waiting for a PS-Poll. PS-Poll frames indicate that a powersaving mobile station has
`temporarily switched to an active mode and is ready to receive a buffered frame. By
`definition, active stations have transceivers operating continuously. After a switch to
`active mode, the access point can assume that the receiver is operational, even without
`receiving explicit notification to that effect.
`
`Access points must retain frames long enough for mobile stations to pick them up, but
`buffer memory is a finite resource. 802.11 mandates that access points use an aging
`function to determine when buffered frames are old enough to be discarded. The stan-
`dard leaves a great deal to the discretion of the developer because it specifies only one
`
`196 | Chapter8: Management Operations
`
`SCT Exhibit 2024
`[PR2025-01183
`
`
`
`
`
`
`
`
`
`constraint. Mobile stations depend on access points to buffer traffic for at least the
`listen interval specified with the association, and the standard forbids the aging function
`from discarding frames before the listen interval has elapsed. Beyond that, however,
`there is a great deal of latitude for vendors to develop different buffer management
`routines.
`
`Delivering multicast and broadcast frames: the Delivery TIM (DTIM)
`
`Frames with a group address cannot be delivered using a polling algorithm because
`they are, by definition, addressed to a group. Therefore, 802.11 incorporates a mech-
`anism for buffering and delivering broadcast and multicast frames. Buffering is identical
`to the unicast case, except that frames are buffered whenever any station associated
`with the access point is sleeping. Buffered broadcast and multicast frames are saved
`using AID 0. Access points indicate whether any broadcast or multicast frames are
`buffered by setting the first bit in the TIM; this bit corresponds to AID 0.
`
`Each BSS has a parameter called the DTIM Period. TIMs are transmitted with every
`Beacon. At a fixed number of Beacon intervals, a special type of TIM, a Delivery Traffic
`Indication Map (DTIM), is sent. The TIM element in Beacon frames contains a counter
`that counts down to the next DTIM; this counter is zero in a DTIM frame. Buffered
`broadcast and multicast traffic is transmitted after a DTIM Beacon. Multiple buffered
`frames are transmitted in sequence; the More Data bit in the Frame Control field in-
`dicates that more frames must be transmitted. Normal channel acquisition rules apply
`to the transmission of buffered frames. The access point may choose to defer the pro-
`cessing of incoming PS-Poll frames until the frames in the broadcast and multicast
`transmission buffers have been transmitted.
`
`Figure 8-14 shows an access point and one associated station. The DTIM interval of
`the access point is set to 3, so every third TIM is a DTIM. Station 1 is operating in a
`sleep mode with a listen interval of 3. It will wake up on every third beacon to receive
`buffered broadcast and multicast frames. After a DTIM frame is transmitted, the buf-
`fered broadcast and multicast frames are transmitted, followed by any PS-Poll ex-
`changes with associated stations. At the second beacon interval, only broadcast and
`multicast frames are present in the buffer, and they are transmitted to the BSS. At the
`fifth beacon interval, a frame has also been buffered for station 1. It can monitor the
`map in the DTIM and send a PS-Poll after the transmission of buffered broadcast and
`multicast frames has concluded.
`
`To receive broadcast and multicast frames, a mobile station must be awake for DTIM
`transmissions. Nothing in the specification, however, keeps powersaving stations in
`infrastructure networks from waking up to listen to DTIM frames. Some products that
`implement powersaving modes will attempt to align their awakenings with DTIM
`transmissions. If the system administrator determines that battery life is more impor-
`tant than receiving broadcast and mult

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket