throbber
Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`International Standard ISO/IEC 8802-11: 1999(E)
`ANSI/IEEE Std 802.11, 1999 Edition (R2003)
`
`Information technology—
`Telecommunications and information
` exchange between systems—
`Local and metropolitan area networks—
`Specific requirements—
`
`Part 11: Wireless LAN Medium Access
`Control (MAC) and Physical Layer
`(PHY) Specifications
`
`Sponsor
`LAN MAN Standards Committee
`of the
`IEEE Computer Society
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000001
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`ANSI/IEEE Std 802.11, 1999 Edition
`
`IEEE Standards documents are developed within the Technical Committees of the IEEE Societies and the
`Standards Coordinating Committees of the IEEE Standards Board. Members of the committees serve volun-
`tarily and without compensation. They are not necessarily members of the Institute. The standards developed
`within IEEE represent a consensus of the broad expertise on the subject within the Institute as well as those
`activities outside of IEEE that have expressed an interest in participating in the development of the standard.
`
`Use of an IEEE Standard is wholly voluntary. The existence of an IEEE Standard does not imply that there
`are no other ways to produce, test, measure, purchase, market, or provide other goods and services related to
`the scope of the IEEE Standard. Furthermore, the viewpoint expressed at the time a standard is approved and
`issued is subject to change brought about through developments in the state of the art and comments
`received from users of the standard. Every IEEE Standard is subjected to review at least every five years for
`revision or reaffirmation. When a document is more than five years old and has not been reaffirmed, it is rea-
`sonable to conclude that its contents, although still of some value, do not wholly reflect the present state of
`the art. Users are cautioned to check to determine that they have the latest edition of any IEEE Standard.
`
`Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership
`affiliation with IEEE. Suggestions for changes in documents should be in the form of a proposed change of
`text, together with appropriate supporting comments.
`
`Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they
`relate to specific applications. When the need for interpretations is brought to the attention of IEEE, the
`Institute will initiate action to prepare appropriate responses. Since IEEE Standards represent a consensus of
`all concerned interests, it is important to ensure that any interpretation has also received the concurrence of a
`balance of interests. For this reason IEEE and the members of its technical committees are not able to pro-
`vide an instant response to interpretation requests except in those cases where the matter has previously
`received formal consideration.
`
`Comments on standards and requests for interpretations should be addressed to:
`
`Secretary, IEEE Standards Board
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 08855-1331
`USA
`
`Note: Attention is called to the possibility that implementation of this standard may require use of sub-
`ject matter covered by patent rights. By publication of this standard, no position is taken with respect to
`the existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible
`for identifying all patents for which a license may be required by an IEEE standard or for conducting
`inquiries into the legal validity or scope of those patents that are brought to its attention.
`The patent holder has, however, filed a statement of assurance that it will grant a license under these
`rights without compensation or under reasonable rates and nondiscriminatory, reasonable terms and
`conditions to all applicants desiring to obtain such a license. The IEEE makes no representation as to
`the reasonableness of rates and/or terms and conditions of the license agreement offered by the patent
`holder. Contact information may be obtained from the IEEE Standards Department.
`
`Authorization to photocopy portions of any individual standard for internal or personal use is granted by the
`Institute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright
`Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Cus-
`tomer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; (978) 750-8400. Permission to photocopy
`portions of any individual standard for educational classroom use can also be obtained through the Copy-
`right Clearance Center.
`
`iv
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000002
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Introduction to ANSI/IEEE Std 802.11, 1999 Edition
`
`(This introduction is not a part of ANSI/IEEE Std 802.11, 1999 Edition or of ISO/IEC 8802-11: 1999, but is included for information
`purpose only.)
`
`This standard is part of a family of standards for local and metropolitan area networks. The relationship
`between the standard and other members of the family is shown below. (The numbers in the figure refer to
`IEEE standard numbers.)
`
`802.2 LOGICAL LINK CONTROL
`
`802.1 BRIDGING
`
`DATA
`LINK
`LAYER
`
`802.3
`MEDIUM
`ACCESS
`
`802.4
`MEDIUM
`ACCESS
`
`802.5
`MEDIUM
`ACCESS
`
`802.6
`MEDIUM
`ACCESS
`
`802.9
`MEDIUM
`ACCESS
`
`802.11
`MEDIUM
`ACCESS
`
`802.12
`MEDIUM
`ACCESS
`
`802.3
`PHYSICAL
`
`802.4
`PHYSICAL
`
`802.5
`PHYSICAL
`
`802.6
`PHYSICAL
`
`802.9
`PHYSICAL
`
`802.11
`PHYSICAL
`
`802.12
`PHYSICAL
`
`PHYSICAL
`LAYER
`
`802.1 MANAGEMENT
`
`802 OVERVIEW & ARCHITECTURE*
`
`802.10 SECURITY
`
`* Formerly IEEE Std 802.1A.
`
`This family of standards deals with the Physical and Data Link layers as defined by the International Organiza-
`tion for Standardization (ISO) Open Systems Interconnection (OSI) Basic Reference Model (ISO/IEC 7498-
`1: 1994). The access standards define seven types of medium access technologies and associated physical
`media, each appropriate for particular applications or system objectives. Other types are under investigation.
`
`The standards defining the access technologies are as follows:
`
`•
`
`IEEE Std 802
`
`Overview and Architecture. This standard provides an overview to the family
`
`
`of IEEE 802 Standards.
`
`• ANSI/IEEE Std 802.1B
`and 802.1k
`[ISO/IEC 15802-2]
`
`LAN/MAN Management. Defines an OSI management-compatible architec-
`
`ture, and services and protocol elements for use in a LAN/MAN environment
`for performing remote management.
`
`• ANSI/IEEE Std 802.1D
`[ISO/IEC 15802-3]
`
`Media Access Control (MAC) Bridges. Specifies an architecture and protocol
`
`
`
`for the interconnection of IEEE 802 LANs below the MAC service boundary.
`
`• ANSI/IEEE Std 802.1E
`[ISO/IEC 15802-4]
`
`System Load Protocol. Specifies a set of services and protocol for those
`
`aspects of management concerned with the loading of systems on IEEE 802
`LANs.
`
`•
`
`IEEE Std 802.1F
`
`Common Definitions and Procedures for IEEE 802 Management Information
`
`• ANSI/IEEE Std 802.1G
`[ISO/IEC 15802-5]
`
`Remote Media Access Control (MAC) Bridging. Specifies extensions for the
`
`
`
`interconnection, using non-LAN communication technologies, of geographi-
`cally separated IEEE 802 LANs below the level of the logical link control
`protocol.
`
`• ANSI/IEEE Std 802.2
`[ISO/IEC 8802-2]
`
`Logical Link Control
`
`Copyright © 1999 IEEE. All rights reserved.
`
`v
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000003
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`• ANSI/IEEE Std 802.3
`[ISO/IEC 8802-3]
`
`• ANSI/IEEE Std 802.4
`[ISO/IEC 8802-4]
`
`• ANSI/IEEE Std 802.5
`[ISO/IEC 8802-5]
`
`CSMA/CD Access Method and Physical Layer Specifications
`
`Token Passing Bus Access Method and Physical Layer Specifications
`
`Token Ring Access Method and Physical Layer Specifications
`
`• ANSI/IEEE Std 802.6
`[ISO/IEC 8802-6]
`
`Distributed Queue Dual Bus Access Method and Physical Layer Specifica-
`tions
`
`• ANSI/IEEE Std 802.9
`[ISO/IEC 8802-9]
`
`Integrated Services (IS) LAN Interface at the Medium Access Control (MAC)
`and Physical (PHY) Layers
`
`• ANSI/IEEE Std 802.10
`
`Interoperable LAN/MAN Security
`
`•
`
`IEEE Std 802.11
`[ISO/IEC DIS 8802-11]
`
`Wireless LAN Medium Access Control (MAC) and Physical Layer Specifi-
`cations
`
`• ANSI/IEEE Std 802.12
`[ISO/IEC DIS 8802-12]
`
`Demand Priority Access Method, Physical Layer and Repeater Specifica-
`tions
`
`In addition to the family of standards, the following is a recommended practice for a common Physical
`Layer technology:
`
`•
`
`IEEE Std 802.7
`
`IEEE Recommended Practice for Broadband Local Area Networks
`
`The following additional working group has authorized standards projects under development:
`
` • IEEE 802.14
`
`Standard Protocol for Cable-TV Based Broadband Communication Network
`
`Conformance test methodology
`
`An additional standards series, identified by the number 1802, has been established to identify the
`conformance test methodology documents for the 802 family of standards. Thus the conformance test
`documents for 802.3 are numbered 1802.3.
`
`ANSI/IEEE Std 802.11, 1999 Edition [ISO/IEC 8802-11: 1999]
`
`This standard is a revision of IEEE Std 802.11-1997. The Management Information Base according to OSI
`rules has been removed, many redundant management items have been removed, and Annex D has been
`completed with the Management Information Base according to SNMP. Minor changes have been made
`throughout the document.
`
`This standard defines the protocol and compatible interconnection of data communication equipment via the
`“air”, radio or infrared, in a local area network (LAN) using the carrier sense multiple access protocol with
`collision avoidance (CSMA/CA) medium sharing mechanism. The medium access control (MAC) supports
`operation under control of an access point as well as between independent stations. The protocol includes
`authentication, association, and reassociation services, an optional encryption/decryption procedure, power
`management to reduce power consumption in mobile stations, and a point coordination function for time-
`bounded transfer of data. The standard includes the definition of the management information base (MIB)
`using Abstract Syntax Notation 1 (ASN.1) and specifies the MAC protocol in a formal way, using the Speci-
`
`vi
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000004
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`fication and Description Language (SDL). Both ASN.1 and SDL source code have been added on a floppy
`diskette.
`
`The infrared implementation of the PHY supports 1 Mbit/s data rate with an optional 2 Mbit/s extension.
`The radio implementations of the PHY specify either a frequency-hopping spread spectrum (FHSS)
`supporting 1 Mbit/s and an optional 2 Mbit/s data rate or a direct sequence spread spectrum (DSSS)
`supporting both 1 and 2 Mbit/s data rates.
`
`This standard contains state-of-the-art material. The area covered by this standard is undergoing evolution.
`Revisions are anticipated to this standard within the next few years to clarify existing material, to correct
`possible errors, and to incorporate new related material. Information on the current revision state of this and
`other IEEE 802 standards may be obtained from
`
`Secretary, IEEE Standards Board
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 08855-1331 USA
`
`Participants
`
`At the time the draft of the 1999 version of this standard was sent to sponsor ballot, the IEEE 802.11
`working group had the following voting members:
`
`Victor Hayes, Chair
`
`
`
`Bob O’Hara,
`
`
`Stuart J. Kerry and
`
`802.11rev Task Group Chair and Technical Editor
`
`George Fishel,
`Secretary
`
`
`
` Al Petrick, Vice Chairs
`
`
`
`
`David Bagby, Mac Group Chair
`Jan Boer,
` Direct Sequence Chair
`
`
`
`
`Michael Fischer and Allen Heberling,
`State Diagram Editors
`
`Dean Kawaguchi,
`
`PHY Group and FH Chair
`
`
`
`Naftali Chayat, Task Group a Chair
`
`
`John Fakatselis, Task Group b Chair
`
`
`Victoria M. Poncini, Task Group c Chair
`
`
`
`Jeff Abramowitz
`Keith B. Amundsen
`Carl F. Andren
`Kazuhiro Aoyagi
`Phil Belanger
`John Biddick
`Simon Black
`Ronald Brockmann
`Wesley Brodsky
`John H. Cafarella
`Ken Clements
`Wim Diepstraten
`Darrol Draper
`Peter Ecclesine
`Darwin Engwer
`Jeff Fischer
`Matthew Fischer
`Michael Fischer
`John Fisher
`Motohiro Gochi
`Tim Godfrey
`Jan Haagh
`
`Karl Hannestad
`Robert Heile
`Maarten Hoeben
`Duane Hurne
`Masayuki Ikeda
`Richard Jai
`Donald C. Johnson
`Nobuo Karaki
`Isao Masaki
`Jim McDonald
`Gene Miller
`Akira Miura
`Masaharu Mori
`Masahiro Morikura
`Ravi P. Nalamati
`Colin Nayler
`Richard van Nee
`Tomoki Ohsawa
`Kazuhiro Okanoue
`Richard H. Paine
`Bob Pham
`Stanley A. Reible
`
`William Roberts
`Kent G. Rollins
`Oren Rosenfeld
`Michael Rothenberg
`Clemens C. W. Ruppel
`Chandos Rypinski
`Anil K. Sanwalka
`Roy Sebring
`Mike Shiba
`Thomas Siep
`Donald I. Sloan
`Hitoshi Takanashi
`Satoru Toguchi
`Cherry Tom
`Mike Trompower
`Tom Tsoulogiannis
`Sarosh N. Vesuna
`Nien C. Wei
`Harry Worstell
`Timothy M. Zimmerman
`Jonathan M. Zweig
`Jim Zyren
`
`Copyright © 1999 IEEE. All rights reserved.
`
`vii
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000005
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Major contributions to the 1999 edition were received from the following individuals:
`Richard Ozer
`Henri Moelard
`
`Arnoud Zwemmer
`
`The following members of the balloting committee voted on the 1999 version of this standard:
`A. Kamerman
`Ronald C. Petersen
`Kit Athul
`Dean M. Kawaguchi
`John R. Pickens
`Thomas W. Bailey
`Edward R. Kelly
`Alberto Profumo
`Peter K. Campbell
`Gary C. Kessler
`Vikram Punj
`James T. Carlo
`Yongbum Kim
`James A. Renfro
`David E. Carlson
`Stephen Barton Kruger
`Gary S. Robinson
`Brian J. Casey
`Joseph Kubler
`Edouard Y. Rocher
`Naftali Chayat
`Lanse M. Leach
`James W. Romlein
`Robert S. Crowder
`Jai Yong Lee
`Floyd E. Ross
`Wim Diepstraten
`Randolph S. Little
`Michael Rothenberg
`Thomas J. Dineen
`Ronald Mahany
`Christoph Ruland
`Christos Douligeris
`Peter Martini
`Anil K. Sanwalka
`Paul S. Eastman
`Richard McBride
`James E. Schuessler
`Philip H. Enslow
`Bennett Meyer
`Rich Seifert
`Changxin Fan
`Gene E. Milligan
`Leo Sintonen
`John W. Fendrich
`David S. Millman
`Patricia Thaler
`Michael A. Fischer
`Hiroshi Miyano
`Mike Trompower
`George R. Fishel
`Warren Monroe
`Mark-Rene Uchida
`Harvey A. Freeman
`John E. Montague
`Emmanuel Van Lil
`Robert J. Gagliano
`Wayne D. Moyers
`Sarosh N. Vesuna
`Patrick S. Gonia
`Shimon Muller
`James Vorhies
`Julio Gonzalez-Sanz
`Ken Naganuma
`Barry M. Vornbrock
`Chris G. Guy
`Paul Nikolich
`Qian-li Yang
`Victor Hayes
`Robert O’Hara
`Oren Yuen
`Donald N. Heirman
`Donal O’Mahony
`Chris Zegelin
`Henry Hoyt
`Roger Pandanda
`Jonathan M. Zweig
`Raj Jain
`
`At the time the draft of the 1997 version of this standard was sent to sponsor ballot, the IEEE 802.11 work-
`ing group had the following voting members:
`
`
`
`
`Victor Hayes, Chair
`
`
`
`Greg Ennis, Chief Technical Editors
`Bob O’Hara and
`
`
`
`
`George Fishel and Carolyn L. Heide,
`Secretaries
`
`
`
`Stuart J. Kerry and Chris Zegelin, Vice Chairs
`
`C. Thomas Baumgartner,
`
`David Bagby,
`
`Infrared Chair and Editor
`MAC Group Chair
`
`Michael Fischer,
`Jan Boer,
`
`State Diagram Editor
`Direct Sequence Chair
`
`Dean M. Kawaguchi,
`
`Mike Trompower,
`PHY Group and FH Chair
`Direct Sequence Editor
`
`Jeff Abramowitz
`Keith B. Amundsen
`Phil Belanger
`Manuel J. Betancor*
`John Biddick
`Simon Black
`Alessandro M. Bolea
`Pablo Brenner
`Peter E. Chadwick
`Naftali Chayat
`Jonathon Y. Cheah
`Hae Wook Choi
`Wim Diepstraten
`
`Robert J. Egan
`Darwin Engwer
`John Fakatselis
`Matthew Fischer
`Keith S. Furuya
`Rich Gardner
`Ian Gifford
`Howard J. Hall
`Bill Huhn
`Donald C. Johnson
`Mikio Kiyono
`Joseph J. Kubler
`Arthur Lashbrook
`
`F. J. Lopez-Hernandez
`Ronald Mahany
`Bob Marshall
`Jim McDonald
`Akira Miura
`Wayne D. Moyers
`Ravi P. Nalamati
`Mitsuji Okada
`Al Petrick
`Miri Ratner
`James A. Renfro
`William Roberts
`Jon Walter Rosdahl
`
`viii
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000006
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`Michael Rothenberg
`Chandos A. Rypinski
`Anil K. Sanwalka
`Roy Sebring
`Glen Sherwood
`Thomas Siep
`Nathan Silberman
`
`Don Sloan
`Greg Smith
`Marvin L. Sojka
`Dave Strohschein
`Bert Sullam
`Mack Sullivan
`
`Tom Tsoulogiannis
`Jeanine Valadez
`Sarosh Vesuna
`Richard E. White
`Donna A. Woznicki
`Timothy M. Zimmerman
`Johnny Zweig
`
`Major contributions to the 1997 version were received from the following individuals:
`
`Robert Achatz
`Ken Biba
`Paul Eastman
`Ed Geiger
`Larry van der Jagt
`
`*Deceased
`
`Richard Lee
`Kerry Lynn
`Michael Masleid
`John McKown
`K. S. Natarajan
`Jim Neally
`
`Richard Ozer
`Thomas Phinney
`Leon S. Scaldeferri*
`Jim Schuessler
`François Y. Simon
`
`The following persons were on the balloting committee for the 1997 version of this standard:
`
`Bernhard Albert
`Jon M. Allingham
`Jack S. Andresen
`Kit Athul
`Anthony L. Barnes
`Robert T. Bell
`Manuel J. Betancor
`Simon Black
`Alan L. Bridges
`Graham Campbell
`James T. Carlo
`David E. Carlson
`Peter E. Chadwick
`Naftali Chayat
`Alan J. Chwick
`Ken Clements
`Robert S. Crowder
`Rifaat Dayem
`Wim Diepstraten
`Edward A. Dunlop
`Sourav K. Dutta
`Paul S. Eastman
`Peter Ecclesine
`Gregory Elkmann
`John E. Emrich
`Philip H. Enslow
`Changxin Fan
`Michael A. Fischer
`Harvey A. Freeman
`Robert J. Gagliano
`Patrick S. Gonia
`N. Douglas Grant
`Govert M. Griffioen
`Joseph L. Hammond
`Victor Hayes
`Kenneth C. Heck
`Jan Hoogendoorn
`Russell D. Housley
`Walter K. Hurwitz
`
`Richard J. Iliff
`Tomoaki Ishifuji
`Carlos Islas-Perez
`Raj Jain
`A. Kamerman
`Peter M. Kelly
`Yongbum Kim
`Mikio Kiyono
`Thaddeus Kobylarz
`Stephen B. Kruger
`Joseph J. Kubler
`David J. Law
`Jai Yong Lee
`Jungtae Lee
`Daniel E. Lewis
`Randolph S. Little
`Ming T. Liu
`Joseph C. J. Loo
`Donald C. Loughry
`Robert D. Love
`Ronald Mahany
`Jim L. Mangin
`Peter Martini
`P. Takis Mathiopoulos
`Steve Messenger
`Bennett Meyer
`Ann Miller
`David S. Millman
`Hiroshi Miyano
`Stig Frode Mjolsnes
`W. Melody Moh
`John E. Montague
`Wayne D. Moyers
`Paul Nikolich
`Ellis S. Nolley
`Robert O’Hara
`Donal O’Mahony
`Roger Pandanda
`Lalit Mohan Patnaik
`Lucy W. Person
`
`Thomas L. Phinney
`Vikram Prabhu
`Alberto Profumo
`David L. Propp
`Vikram Punj
`Andris Putnins
`Fernando Ramos
`James W. Romlein
`Floyd E. Ross
`Michael Rothenberg
`Christoph Ruland
`Chandos A. Rypinski
`Anil K. Sanwalka
`Gregory D. Schumacher
`Rich Seifert
`Lee A. Sendelbach
`Michael Serrone
`Adarshpal S. Sethi
`Donald A. Sheppard
`Nathan Silberman
`Joseph S. Skorupa
`Michael A. Smith
`Marvin L. Sojka
`Efstathios D. Sykas
`Geoffrey O. Thompson
`Robert C. Tripi
`Mike Trompower
`David B. Turner
`Mark-Rene Uchida
`James Vorhies
`Yun-Che Wang
`Raymond P. Wenig
`Earl J. Whitaker
`David W. Wilson
`Jerry A. Wyatt
`Qian-Li Yang
`Iwen Yao
`Oren Yuen
`Jonathan M. Zweig
`
`Copyright © 1999 IEEE. All rights reserved.
`
`ix
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000007
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`When the IEEE-SA Standards Board approved this standard on 18 March 1999, it had the following
`membership:
`
`
`
`Richard J. Holleman, Chair
`
`
`
`Judith Gorman,
`
`
`
`Donald N. Heirman, Vice Chair
`
`
`Secretary
`
`Satish K. Aggarwal
`Dennis Bodson
`Mark D. Bowman
`James T. Carlo
`Gary R. Engmann
`Harold E. Epstein
`Jay Forster*
`Ruben D. Garzon
`
`*Member Emeritus
`
`James H. Gurney
`Lowell G. Johnson
`Robert J. Kennelly
`E. G. “Al” Kiener
`Joseph L. Koepfinger*
`L. Bruce McClung
`Daleep C. Mohla
`Robert F. Munzner
`
`Louis-François Pau
`Ronald C. Petersen
`Gerald H. Peterson
`John B. Posey
`Gary S. Robinson
`Akio Tojo
`Hans E. Weinrich
`Donald W. Zipse
`
`Also included is the following nonvoting IEEE-SA Standards Board liaison:
`
`Robert E. Hebner
`
`Valerie E. Zelenty
`IEEE Standards Project Editor
`
`x
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000008
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`Contents
`
`1.
`
`Overview.............................................................................................................................................. 1
`
`1.1 Scope............................................................................................................................................ 1
`1.2 Purpose......................................................................................................................................... 1
`
`2.
`
`3.
`
`4.
`
`5.
`
`Normative references ........................................................................................................................... 2
`
`Definitions............................................................................................................................................ 3
`
`Abbreviations and acronyms................................................................................................................ 6
`
`General description .............................................................................................................................. 9
`
`5.1 General description of the architecture ........................................................................................ 9
`5.1.1 How wireless LAN systems are different ........................................................................... 9
`5.2 Components of the IEEE 802.11 architecture............................................................................ 10
`5.2.1 The independent BSS as an ad hoc network..................................................................... 10
`5.2.2 Distribution system concepts ............................................................................................ 11
`5.2.3 Area concepts.................................................................................................................... 12
`5.2.4 Integration with wired LANs ............................................................................................ 14
`5.3 Logical service interfaces .......................................................................................................... 14
`5.3.1 Station service (SS)........................................................................................................... 15
`5.3.2 Distribution system service (DSS).................................................................................... 15
`5.3.3 Multiple logical address spaces ........................................................................................ 16
`5.4 Overview of the services............................................................................................................ 17
`5.4.1 Distribution of messages within a DS............................................................................... 17
`5.4.2 Services that support the distribution service ................................................................... 18
`5.4.3 Access and confidentiality control services...................................................................... 19
`5.5 Relationships between services.................................................................................................. 21
`5.6 Differences between ESS and IBSS LANs................................................................................ 23
`5.7 Message information contents that support the services............................................................ 24
`5.7.1 Data ................................................................................................................................... 25
`5.7.2 Association........................................................................................................................ 25
`5.7.3 Reassociation .................................................................................................................... 25
`5.7.4 Disassociation ................................................................................................................... 26
`5.7.5 Privacy .............................................................................................................................. 26
`5.7.6 Authentication................................................................................................................... 26
`5.7.7 Deauthentication ............................................................................................................... 27
`5.8 Reference model ........................................................................................................................ 27
`
`6. MAC service definition...................................................................................................................... 29
`
`6.1 Overview of MAC services ....................................................................................................... 29
`6.1.1 Asynchronous data service ............................................................................................... 29
`6.1.2 Security services ............................................................................................................... 29
`6.1.3 MSDU ordering ................................................................................................................ 29
`6.2 Detailed service specification .................................................................................................... 30
`6.2.1 MAC data services............................................................................................................ 30
`
`7.
`
`Frame formats .................................................................................................................................... 34
`
`7.1 MAC frame formats................................................................................................................... 34
`
`Copyright © 1999 IEEE. All rights reserved.
`
`xi
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000009
`
`

`

`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`7.1.1 Conventions ...................................................................................................................... 34
`7.1.2 General frame format........................................................................................................ 34
`7.1.3 Frame fields ...................................................................................................................... 35
`7.2 Format of individual frame types............................................................................................... 41
`7.2.1 Control frames .................................................................................................................. 41
`7.2.2 Data frames ....................................................................................................................... 43
`7.2.3 Management frames.......................................................................................................... 45
`7.3 Management frame body components ....................................................................................... 50
`7.3.1 Fixed fields........................................................................................................................ 50
`7.3.2 Information elements ........................................................................................................ 55
`
`8.
`
`Authentication and privacy ................................................................................................................ 59
`
`8.1 Authentication services.............................................................................................................. 59
`8.1.1 Open System authentication ............................................................................................. 59
`8.1.2 Shared Key authentication ................................................................................................ 60
`8.2 The Wired Equivalent Privacy (WEP) algorithm ...................................................................... 61
`8.2.1 Introduction....................................................................................................................... 61
`8.2.2 Properties of the WEP algorithm ...................................................................................... 62
`8.2.3 WEP theory of operation .................................................................................................. 62
`8.2.4 WEP algorithm specification ............................................................................................ 64
`8.2.5 WEP Frame Body expansion ............................................................................................ 64
`8.3 Security-Related MIB attributes ................................................................................................ 65
`8.3.1 Authentication-Related MIB attributes............................................................................. 65
`8.3.2 Privacy-Related MIB attributes ........................................................................................ 65
`
`9. MAC sublayer functional description................................................................................................ 70
`
`9.1 MAC architecture....................................................................................................................... 70
`9.1.1 Distributed coordination function (DCF).......................................................................... 70
`9.1.2 Point coordination function (PCF).................................................................................... 70
`9.1.3 Coexistence of DCF and PCF ........................................................................................... 71
`9.1.4 Fragmentation/defragmentation overview ........................................................................ 71
`9.1.5 MAC data service ............................................................................................................. 72
`9.2 DCF............................................................................................................................................ 72
`9.2.1 Carrier-sense mechanism .................................................................................................. 73
`9.2.2 MAC-Level acknowledgments ......................................................................................... 73
`9.2.3 Interframe space (IFS) ...................................................................................................... 74
`9.2.4 Random backoff time........................................................................................................ 75
`9.2.5 DCF access procedure....................................................................................................... 76
`9.2.6 Directed MPDU transfer procedure .................................................................................. 82
`9.2.7 Broadcast and multicast MPDU transfer procedure ......................................................... 83
`9.2.8 ACK procedure ................................................................................................................. 83
`9.2.9 Duplicate detection and recovery...................................................................................... 83
`9.2.10 DCF timing relations....................................................................................................... 84
`9.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket