2. Normative references

以下の参照文書は、この標準の適用に不可欠です(つまり、それらを理解して使用する必要があります。各参照文書は本文で引用され、この文書との関係が説明されています)。版数や発行年のある参照文書は、引用された版数のみ適用されます。版数のない参照文書は、その最新版(修正または正誤表を含む)が適用されます。

  • 3GPP TS 24.234, 3GPP System to Wireless Local Area Network (WLAN) interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3.(*1)
  • ETSI EN 301 893, Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Part 2:Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive.2 (*2)
  • FIPS PUB 180-3-2008, Secure Hash Standard.3 (*3)
  • FIPS PUB 197-2001, Advanced Encryption Standard (AES).
  • FIPS SP800-38B, “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, Dworkin, M.”
  • IANA EAP Method Type Numbers, http://www.iana.org/assignments/eap-numbers.
  • IEEE Std 754™-2008, IEEE Standard for Binary Floating-Point Arithmetic. (*4, *5)
  • IEEE Std 802®-2001, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture.
  • IEEE Std 802.1AS™, IEEE Standard for Local and Metropolitan Area Networks—Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks.
  • IEEE Std 802.1X™-2004, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control.
  • IEEE Std 802.21™-2008, IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services.
  • IEEE Std C95.1™, IEEE Standard Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz.
  • IETF RFC 791, Internet Protocol, Sept. 1981. (*6)
  • IETF RFC 925, Multi-LAN Address Resolution, J. Postel, Oct. 1984.
  • IETF RFC 1035, Domain Names — Implementation and Specification, P. Mockapetris, Nov. 1987.
  • IETF RFC 1042, A Standard for the Transmission of IP Datagrams over IEEE 802® Networks, J. Postel, J.Reynolds, Feb. 1988.
  • IETF RFC 1321, The MD5 Message-Digest Algorithm, Apr. 1992 (status: informational).
  • IETF RFC 2104, HMAC: Keyed-Hashing for Message Authentication, H. Krawczyk, M. Bellare,R. Canetti, Feb. 1997 (status: informational).
  • IETF RFC 2409, The Internet Key Exchange (IKE), D. Harkins, D. Carrel, Nov. 1998 (status: Standards Track).
  • IETF RFC 2460, Internet Protocol, Version 6 (IPv6), S. Deering, R. Hinden, Dec. 1998.
  • IETF RFC 3164, The BSD Syslog Protocol, Aug. 2001.
  • IETF RFC 3394, Advanced Encryption Standard (AES) Key Wrap Algorithm, J. Schaad, R. Housley,Sept. 2002 (status: informational).
  • IETF RFC 3610, Counter with CBC-MAC (CCM), D. Whiting, R. Housley, N. Ferguson, Sept. 2003 (status: informational).
  • IETF RFC 3629, UTF-8, a transformation format of ISO 10646, F. Yergeau, Nov. 2003.
  • IETF RFC 3748, Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, June 2004.
  • IETF RFC 3825, Dynamic Host Configuration Protocol Option for Coordinate-based Location Configuration Information, Polk, J., Schnizlein, J., Linsner, M., July 2004.
  • IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, Jan. 2005.
  • IETF RFC 4017, Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs, D.Stanley, J. Walker, B. Aboba, Mar. 2005 (status: informational).
  • IETF RFC 4282, The Network Access Identifier, Dec. 2005.
  • IETF RFC 4776, Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information, Nov. 2006.
  • IETF RFC 4861, Neighbor Discovery for IP version 6 (IPv6), T. Narten, E. Nordmark, W. Simpson, H.Soliman, Sept. 2007.
  • IETF RFC 5216, The EAP-TLS Authentication Protocol, D. Simon, B. Aboba, R. Hurst, March 2008.
  • IETF RFC 5297, Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES), D. Harkins, October 2008 (status: informational).
  • ISO/IEC 3166-1, Codes for the representation of names of countries and their subdivisions—Part 1: Country codes. (*7)
  • ISO/IEC 7498-1:1994, Information technology—Open Systems Interconnection—Basic Reference Model:The Basic Model.
  • ISO/IEC 8802-2:1998, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 2: Logical link control.
  • ISO/IEC 8824-1:1995, Information technology—Abstract Syntax Notation One (ASN.1): Specification of basic notation.
  • ISO/IEC 8824-2:1995, Information technology—Abstract Syntax Notation One (ASN.1): Information object specification.
  • ISO/IEC 8824-3:1995, Information technology—Abstract Syntax Notation One (ASN.1): Constraint specification.
  • ISO/IEC 8824-4:1995, Information technology—Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications.
  • ISO/IEC 8825-1:1995, Information technology—ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER).
  • ISO/IEC 8825-2:1996, Information technology—ASN.1 encoding rules: Specification of Packed Encoding Rules (PER).
  • ISO/IEC 11802-5:1997(E), Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Technical reports and guidelines—Part 5:Medium Access Control (MAC) Bridging of Ethernet V2.0 in Local Area Networks (previously known as IEEE Std 802.1H-1997 [B21] (*8)).
  • ISO/IEC 15802-1:1995, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 1: Medium Access Control (MAC) service definition.
  • ISO/IEC 15802-3, Information Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 3: Media Access Control(MAC) Bridges.
  • ITU-R Recommendation TF.460-4(2002), Standard-frequency and time-signal emissions. (*9)
  • ITU-T Recommendation Z.100 (03/93), CCITT specification and description language (SDL).
  • ITU-T Recommendation Z.105 (03/95), SDL combined with ASN.1 (SDL/ASN.1).
  • ITU-T Recommendation Z.120 (2004), Programming Languages—Formal Description Techniques (FDT)—Message Sequence Chart (MSC).
  • OASIS Emergency Management Technical Committee, “Emergency Data Exchange Language (EDXL) Distribution Element, v. 1.0.” OASIS Standard EDXL-DE v1.0, May 2006.

(*1) 3GPP™ documents are available from the 3rd Generation Partnership Project Web site (http://www.3gpp.org).
(*2) ETSI documents are available from the European Telecommunications Standards Institute (http://www.etsi.org).
(*3) IPS publications are available from the National Technical Information Service (NTIS) (http://www.ntis.org/).
(*4) The IEEE standards or products referred to in this clause are trademarks owned by The Institute of Electrical and Electronics Engineers, Inc.
(*5) IEEE publications are available from The Institute of Electrical and Electronics Engineers (http://standards.ieee.org/).
(*6) IETF documents (i.e., RFCs) are available for download at http://www.rfc-archive.org/.
(*7) 7ISO/IEC publications are available from the ISO Central Secretariat (http://www.iso.ch/). ISO/IEC publications are also available in the United States from the American National Standards Institute (http://www.ansi.org/).
(*8) 8The numbers in brackets correspond to the numbers of the bibliography in Annex A.
(*9) ITU publications are available from the International Telecommunications Union (http://www.itu.int/).
(*10) The IEEE Standards Dictionary: Glossary of Terms & Definitions is available at http://shop.ieee.org/.


The following referenced documents are indispensable for the application of this standard (i.e., they must be understood and used; therefore, each referenced document is cited in the text and its relationship to this document is explained). For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies.

  • 3GPP TS 24.234, 3GPP System to Wireless Local Area Network (WLAN) interworking; WLAN User
    Equipment (WLAN UE) to network protocols; Stage 3.
  • ETSI EN 301 893, Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Part 2:Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive.2
  • FIPS PUB 180-3-2008, Secure Hash Standard.3
  • FIPS PUB 197-2001, Advanced Encryption Standard (AES).
  • FIPS SP800-38B, “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, Dworkin, M.”
  • IANA EAP Method Type Numbers, http://www.iana.org/assignments/eap-numbers.
  • IEEE Std 754™-2008, IEEE Standard for Binary Floating-Point Arithmetic.4
  • IEEE Std 802®-2001, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture.
  • IEEE Std 802.1AS™, IEEE Standard for Local and Metropolitan Area Networks—Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks.
  • IEEE Std 802.1X™-2004, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control.
  • IEEE Std 802.21™-2008, IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services.
  • IEEE Std C95.1™, IEEE Standard Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz.
  • IETF RFC 791, Internet Protocol, Sept. 1981.
  • IETF RFC 925, Multi-LAN Address Resolution, J. Postel, Oct. 1984.
  • IETF RFC 1035, Domain Names — Implementation and Specification, P. Mockapetris, Nov. 1987.
  • IETF RFC 1042, A Standard for the Transmission of IP Datagrams over IEEE 802® Networks, J. Postel, J.Reynolds, Feb. 1988.
  • IETF RFC 1321, The MD5 Message-Digest Algorithm, Apr. 1992 (status: informational).
  • IETF RFC 2104, HMAC: Keyed-Hashing for Message Authentication, H. Krawczyk, M. Bellare,R. Canetti, Feb. 1997 (status: informational).
  • IETF RFC 2409, The Internet Key Exchange (IKE), D. Harkins, D. Carrel, Nov. 1998 (status: Standards Track).
  • IETF RFC 2460, Internet Protocol, Version 6 (IPv6), S. Deering, R. Hinden, Dec. 1998.
  • IETF RFC 3164, The BSD Syslog Protocol, Aug. 2001.
  • IETF RFC 3394, Advanced Encryption Standard (AES) Key Wrap Algorithm, J. Schaad, R. Housley,Sept. 2002 (status: informational).
  • IETF RFC 3610, Counter with CBC-MAC (CCM), D. Whiting, R. Housley, N. Ferguson, Sept. 2003 (status: informational).
  • IETF RFC 3629, UTF-8, a transformation format of ISO 10646, F. Yergeau, Nov. 2003.
  • IETF RFC 3748, Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, June 2004.
  • IETF RFC 3825, Dynamic Host Configuration Protocol Option for Coordinate-based Location Configuration Information, Polk, J., Schnizlein, J., Linsner, M., July 2004.
  • IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, Jan. 2005.
  • IETF RFC 4017, Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs, D.Stanley, J. Walker, B. Aboba, Mar. 2005 (status: informational).
  • IETF RFC 4282, The Network Access Identifier, Dec. 2005.
  • IETF RFC 4776, Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information, Nov. 2006.
  • IETF RFC 4861, Neighbor Discovery for IP version 6 (IPv6), T. Narten, E. Nordmark, W. Simpson, H.Soliman, Sept. 2007.
  • IETF RFC 5216, The EAP-TLS Authentication Protocol, D. Simon, B. Aboba, R. Hurst, March 2008.
  • IETF RFC 5297, Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES), D. Harkins, October 2008 (status: informational).
  • ISO/IEC 3166-1, Codes for the representation of names of countries and their subdivisions—Part 1: Country codes.7
  • ISO/IEC 7498-1:1994, Information technology—Open Systems Interconnection—Basic Reference Model:The Basic Model.
  • ISO/IEC 8802-2:1998, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 2: Logical link control.
  • ISO/IEC 8824-1:1995, Information technology—Abstract Syntax Notation One (ASN.1): Specification of basic notation.
  • ISO/IEC 8824-2:1995, Information technology—Abstract Syntax Notation One (ASN.1): Information object specification.
  • ISO/IEC 8824-3:1995, Information technology—Abstract Syntax Notation One (ASN.1): Constraint specification.
  • ISO/IEC 8824-4:1995, Information technology—Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications.
  • ISO/IEC 8825-1:1995, Information technology—ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER).
  • ISO/IEC 8825-2:1996, Information technology—ASN.1 encoding rules: Specification of Packed Encoding Rules (PER).
  • ISO/IEC 11802-5:1997(E), Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Technical reports and guidelines—Part 5:Medium Access Control (MAC) Bridging of Ethernet V2.0 in Local Area Networks (previously known as IEEE Std 802.1H-1997 [B21]8).
  • ISO/IEC 15802-1:1995, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 1: Medium Access Control (MAC) service definition.
  • ISO/IEC 15802-3, Information Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 3: Media Access Control(MAC) Bridges.
  • ITU-R Recommendation TF.460-4(2002), Standard-frequency and time-signal emissions.9
  • ITU-T Recommendation Z.100 (03/93), CCITT specification and description language (SDL).
  • ITU-T Recommendation Z.105 (03/95), SDL combined with ASN.1 (SDL/ASN.1).
  • ITU-T Recommendation Z.120 (2004), Programming Languages—Formal Description Techniques (FDT)—Message Sequence Chart (MSC).
  • OASIS Emergency Management Technical Committee, “Emergency Data Exchange Language (EDXL) Distribution Element, v. 1.0.” OASIS Standard EDXL-DE v1.0, May 2006.

(*1) 3GPP™ documents are available from the 3rd Generation Partnership Project Web site (http://www.3gpp.org).
(*2) ETSI documents are available from the European Telecommunications Standards Institute (http://www.etsi.org).
(*3) IPS publications are available from the National Technical Information Service (NTIS) (http://www.ntis.org/).
(*4) The IEEE standards or products referred to in this clause are trademarks owned by The Institute of Electrical and Electronics Engineers, Inc.
(*5) IEEE publications are available from The Institute of Electrical and Electronics Engineers (http://standards.ieee.org/).
(*6) IETF documents (i.e., RFCs) are available for download at http://www.rfc-archive.org/.
(*7) 7ISO/IEC publications are available from the ISO Central Secretariat (http://www.iso.ch/). ISO/IEC publications are also available in the United States from the American National Standards Institute (http://www.ansi.org/).
(*8) 8The numbers in brackets correspond to the numbers of the bibliography in Annex A.
(*9) ITU publications are available from the International Telecommunications Union (http://www.itu.int/).
(*10) The IEEE Standards Dictionary: Glossary of Terms & Definitions is available at http://shop.ieee.org/.

1.4 Word Usage

この文書では、SHALLは必須要件を示すために使用されます。SHOULDは推奨事項を示すために使用されます。MAYは許容されるアクションを示すために使用されます。 CANは可能性と能力の表明に使用されます。


In this document, the word shall is used to indicate a mandatory requirement. The word should is used to indicate a recommendation. The word may is used to indicate a permissible action. The word can is used for statements of possibility and capability.

1.3 Supplementary information on purpose

具体的には、この標準は

  • 独立したインフラストラクチャネットワーク内でIEEE 802.11™ に準拠した機器が動作するために必要な機能とサービス、並びにそれらのネットワーク内でSTAが移動することを可能とする要件について説明します。
  • IEEE 802.11に準拠した機器が、独立したインフラストラクチャネットワークの外部にある他の同種の危機と直接通信できるようにする機能とサービスについて説明します。
  • MACサービスデータユニット(MSDU)の配信サービスをサポートするメディアアクセス制御の手順を定義します。
  • IEEE 802.11 のMAC副層によって制御されるいくつかのPHYシグナリング技術とインターフェイス機能を定義します。
  • IEEE 802.11に準拠したデバイスが複数のIEEE 802.11 無線LANが共存するワイヤレスローカルエリアネットワーク(WLAN)内で動作できるようにします。
  • 無線通信でやり取りされるユーザー情報とMAC管理情報のデータ機密性と、IEEE 802.11に準拠した機器の認証を提供するための要件と手順を説明します。
  • 任意の周波数帯で電波運用に関する規制要件を満たすために使用する動的周波数選択(DFS, Dynamic Frequency Selection)および送信電力制御(TPC, Transmit Power Control)のメカニズムを定義します。
  • 音声、オーディオ並びにビデオのトランスポートを含めた、QoS(Quality of Service)を要するローカルエリアネットワーク用アプリケーションをサポートするメディアアクセス制御手順を定義します。
  • BSS移行管理、チャネルの使用と共存、干渉レポート、診断、マルチキャスト診断およびイベントレポート、柔軟なマルチキャスト、効率的なビーコンメカニズム、プロキシARPアドバタイズメント、ロケーション、タイミング計測、管理されたマルチキャスト、拡張スリープモード、トラフィックフィルタリング、および管理通知を含む、STAのワイヤレスネットワーク管理メカニズムとサービスを定義します。
  • STAによるネットワークの検出と選択、QoSマッピングを使用した外部ネットワークからの情報転送、および緊急サービスの提供のための一般的なメカニズムを支援する機能と手順を定義します。
  • ワイヤレスLANメッシュトポロジをサポートするためのワイヤレスマルチホップ通信に必要なメディアアクセス制御の手順を定義します。

Specifically, this standard

  • Describes the functions and services required by an IEEE 802.11™-compliant device to operate within independent and infrastructure networks as well as the aspects of STA mobility (transition) within those networks.
  • Describes the functions and services that allow an IEEE 802.11-compliant device to communicate directly with another such device outside of an independent or infrastructure network.
  • Defines the MAC procedures to support the MAC service data unit (MSDU) delivery services.
  • Defines several PHY signaling techniques and interface functions that are controlled by the IEEE 802.11 MAC.
  • Permits the operation of an IEEE 802.11-conformant device within a wireless local area network (WLAN) that may coexist with multiple overlapping IEEE 802.11 WLANs.
  • Describes the requirements and procedures to provide data confidentiality of user information and MAC management information being transferred over the wireless medium (WM) and authentication of IEEE 802.11-conformant devices.
  • Defines mechanisms for dynamic frequency selection (DFS) and transmit power control (TPC) that may be used to satisfy regulatory requirements for operation in any band.
  • Defines the MAC procedures to support local area network (LAN) applications with quality-of-service (QoS) requirements, including the transport of voice, audio, and video.
  • Defines mechanisms and services for wireless network management of STAs that include BSS transition management, channel usage and coexistence, collocated interference reporting, diagnostic, multicast diagnostic and event reporting, flexible multicast, efficient beacon mechanisms, proxy ARP advertisement, location, timing measurement, directed multicast, extended sleep modes, traffic filtering, and management notification.
  • Defines functions and procedures aiding network discovery and selection by STAs, information transfer from external networks using QoS mapping, and a general mechanism for the provision of emergency services.
  • Defines the MAC procedures that are necessary for wireless multi-hop communication to support wireless LAN mesh topologies.

1.2 Purpose

この標準の目的は、ローカルエリア内の固定局、携帯局、移動局に無線接続を提供することです。この標準はまた、(電波行政の)監督官庁へ、1つまたはより多くの周波数帯域をローカルエリア通信に割り当てるための標準化された方法を提供します。


The purpose of this standard is to provide wireless connectivity for fixed, portable, and moving stations within a local area. This standard also offers regulatory bodies a means of standardizing access to one or more frequency bands for the purpose of local area communication.