` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`International Standard ISO/IEC 8802-11: 1999(E)
`ANSI/IEEE Std 802.11, 1999 Edition (R2003)
`
`Information technology—
`Telecommunications and information
` exchange between systems—
`Local and metropolitan area networks—
`Specific requirements—
`
`Part 11: Wireless LAN Medium Access
`Control (MAC) and Physical Layer
`(PHY) Specifications
`
`Sponsor
`LAN MAN Standards Committee
`of the
`IEEE Computer Society
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000001
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`ANSI/IEEE Std 802.11, 1999 Edition
`
`IEEE Standards documents are developed within the Technical Committees of the IEEE Societies and the
`Standards Coordinating Committees of the IEEE Standards Board. Members of the committees serve volun-
`tarily and without compensation. They are not necessarily members of the Institute. The standards developed
`within IEEE represent a consensus of the broad expertise on the subject within the Institute as well as those
`activities outside of IEEE that have expressed an interest in participating in the development of the standard.
`
`Use of an IEEE Standard is wholly voluntary. The existence of an IEEE Standard does not imply that there
`are no other ways to produce, test, measure, purchase, market, or provide other goods and services related to
`the scope of the IEEE Standard. Furthermore, the viewpoint expressed at the time a standard is approved and
`issued is subject to change brought about through developments in the state of the art and comments
`received from users of the standard. Every IEEE Standard is subjected to review at least every five years for
`revision or reaffirmation. When a document is more than five years old and has not been reaffirmed, it is rea-
`sonable to conclude that its contents, although still of some value, do not wholly reflect the present state of
`the art. Users are cautioned to check to determine that they have the latest edition of any IEEE Standard.
`
`Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership
`affiliation with IEEE. Suggestions for changes in documents should be in the form of a proposed change of
`text, together with appropriate supporting comments.
`
`Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they
`relate to specific applications. When the need for interpretations is brought to the attention of IEEE, the
`Institute will initiate action to prepare appropriate responses. Since IEEE Standards represent a consensus of
`all concerned interests, it is important to ensure that any interpretation has also received the concurrence of a
`balance of interests. For this reason IEEE and the members of its technical committees are not able to pro-
`vide an instant response to interpretation requests except in those cases where the matter has previously
`received formal consideration.
`
`Comments on standards and requests for interpretations should be addressed to:
`
`Secretary, IEEE Standards Board
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 08855-1331
`USA
`
`Note: Attention is called to the possibility that implementation of this standard may require use of sub-
`ject matter covered by patent rights. By publication of this standard, no position is taken with respect to
`the existence or validity of any patent rights in connection therewith. The IEEE shall not be responsible
`for identifying all patents for which a license may be required by an IEEE standard or for conducting
`inquiries into the legal validity or scope of those patents that are brought to its attention.
`The patent holder has, however, filed a statement of assurance that it will grant a license under these
`rights without compensation or under reasonable rates and nondiscriminatory, reasonable terms and
`conditions to all applicants desiring to obtain such a license. The IEEE makes no representation as to
`the reasonableness of rates and/or terms and conditions of the license agreement offered by the patent
`holder. Contact information may be obtained from the IEEE Standards Department.
`
`Authorization to photocopy portions of any individual standard for internal or personal use is granted by the
`Institute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright
`Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Cus-
`tomer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; (978) 750-8400. Permission to photocopy
`portions of any individual standard for educational classroom use can also be obtained through the Copy-
`right Clearance Center.
`
`iv
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000002
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Introduction to ANSI/IEEE Std 802.11, 1999 Edition
`
`(This introduction is not a part of ANSI/IEEE Std 802.11, 1999 Edition or of ISO/IEC 8802-11: 1999, but is included for information
`purpose only.)
`
`This standard is part of a family of standards for local and metropolitan area networks. The relationship
`between the standard and other members of the family is shown below. (The numbers in the figure refer to
`IEEE standard numbers.)
`
`802.2 LOGICAL LINK CONTROL
`
`802.1 BRIDGING
`
`DATA
`LINK
`LAYER
`
`802.3
`MEDIUM
`ACCESS
`
`802.4
`MEDIUM
`ACCESS
`
`802.5
`MEDIUM
`ACCESS
`
`802.6
`MEDIUM
`ACCESS
`
`802.9
`MEDIUM
`ACCESS
`
`802.11
`MEDIUM
`ACCESS
`
`802.12
`MEDIUM
`ACCESS
`
`802.3
`PHYSICAL
`
`802.4
`PHYSICAL
`
`802.5
`PHYSICAL
`
`802.6
`PHYSICAL
`
`802.9
`PHYSICAL
`
`802.11
`PHYSICAL
`
`802.12
`PHYSICAL
`
`PHYSICAL
`LAYER
`
`802.1 MANAGEMENT
`
`802 OVERVIEW & ARCHITECTURE*
`
`802.10 SECURITY
`
`* Formerly IEEE Std 802.1A.
`
`This family of standards deals with the Physical and Data Link layers as defined by the International Organiza-
`tion for Standardization (ISO) Open Systems Interconnection (OSI) Basic Reference Model (ISO/IEC 7498-
`1: 1994). The access standards define seven types of medium access technologies and associated physical
`media, each appropriate for particular applications or system objectives. Other types are under investigation.
`
`The standards defining the access technologies are as follows:
`
`•
`
`IEEE Std 802
`
`Overview and Architecture. This standard provides an overview to the family
`
`
`of IEEE 802 Standards.
`
`• ANSI/IEEE Std 802.1B
`and 802.1k
`[ISO/IEC 15802-2]
`
`LAN/MAN Management. Defines an OSI management-compatible architec-
`
`ture, and services and protocol elements for use in a LAN/MAN environment
`for performing remote management.
`
`• ANSI/IEEE Std 802.1D
`[ISO/IEC 15802-3]
`
`Media Access Control (MAC) Bridges. Specifies an architecture and protocol
`
`
`
`for the interconnection of IEEE 802 LANs below the MAC service boundary.
`
`• ANSI/IEEE Std 802.1E
`[ISO/IEC 15802-4]
`
`System Load Protocol. Specifies a set of services and protocol for those
`
`aspects of management concerned with the loading of systems on IEEE 802
`LANs.
`
`•
`
`IEEE Std 802.1F
`
`Common Definitions and Procedures for IEEE 802 Management Information
`
`• ANSI/IEEE Std 802.1G
`[ISO/IEC 15802-5]
`
`Remote Media Access Control (MAC) Bridging. Specifies extensions for the
`
`
`
`interconnection, using non-LAN communication technologies, of geographi-
`cally separated IEEE 802 LANs below the level of the logical link control
`protocol.
`
`• ANSI/IEEE Std 802.2
`[ISO/IEC 8802-2]
`
`Logical Link Control
`
`Copyright © 1999 IEEE. All rights reserved.
`
`v
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000003
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`• ANSI/IEEE Std 802.3
`[ISO/IEC 8802-3]
`
`• ANSI/IEEE Std 802.4
`[ISO/IEC 8802-4]
`
`• ANSI/IEEE Std 802.5
`[ISO/IEC 8802-5]
`
`CSMA/CD Access Method and Physical Layer Specifications
`
`Token Passing Bus Access Method and Physical Layer Specifications
`
`Token Ring Access Method and Physical Layer Specifications
`
`• ANSI/IEEE Std 802.6
`[ISO/IEC 8802-6]
`
`Distributed Queue Dual Bus Access Method and Physical Layer Specifica-
`tions
`
`• ANSI/IEEE Std 802.9
`[ISO/IEC 8802-9]
`
`Integrated Services (IS) LAN Interface at the Medium Access Control (MAC)
`and Physical (PHY) Layers
`
`• ANSI/IEEE Std 802.10
`
`Interoperable LAN/MAN Security
`
`•
`
`IEEE Std 802.11
`[ISO/IEC DIS 8802-11]
`
`Wireless LAN Medium Access Control (MAC) and Physical Layer Specifi-
`cations
`
`• ANSI/IEEE Std 802.12
`[ISO/IEC DIS 8802-12]
`
`Demand Priority Access Method, Physical Layer and Repeater Specifica-
`tions
`
`In addition to the family of standards, the following is a recommended practice for a common Physical
`Layer technology:
`
`•
`
`IEEE Std 802.7
`
`IEEE Recommended Practice for Broadband Local Area Networks
`
`The following additional working group has authorized standards projects under development:
`
` • IEEE 802.14
`
`Standard Protocol for Cable-TV Based Broadband Communication Network
`
`Conformance test methodology
`
`An additional standards series, identified by the number 1802, has been established to identify the
`conformance test methodology documents for the 802 family of standards. Thus the conformance test
`documents for 802.3 are numbered 1802.3.
`
`ANSI/IEEE Std 802.11, 1999 Edition [ISO/IEC 8802-11: 1999]
`
`This standard is a revision of IEEE Std 802.11-1997. The Management Information Base according to OSI
`rules has been removed, many redundant management items have been removed, and Annex D has been
`completed with the Management Information Base according to SNMP. Minor changes have been made
`throughout the document.
`
`This standard defines the protocol and compatible interconnection of data communication equipment via the
`“air”, radio or infrared, in a local area network (LAN) using the carrier sense multiple access protocol with
`collision avoidance (CSMA/CA) medium sharing mechanism. The medium access control (MAC) supports
`operation under control of an access point as well as between independent stations. The protocol includes
`authentication, association, and reassociation services, an optional encryption/decryption procedure, power
`management to reduce power consumption in mobile stations, and a point coordination function for time-
`bounded transfer of data. The standard includes the definition of the management information base (MIB)
`using Abstract Syntax Notation 1 (ASN.1) and specifies the MAC protocol in a formal way, using the Speci-
`
`vi
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000004
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`fication and Description Language (SDL). Both ASN.1 and SDL source code have been added on a floppy
`diskette.
`
`The infrared implementation of the PHY supports 1 Mbit/s data rate with an optional 2 Mbit/s extension.
`The radio implementations of the PHY specify either a frequency-hopping spread spectrum (FHSS)
`supporting 1 Mbit/s and an optional 2 Mbit/s data rate or a direct sequence spread spectrum (DSSS)
`supporting both 1 and 2 Mbit/s data rates.
`
`This standard contains state-of-the-art material. The area covered by this standard is undergoing evolution.
`Revisions are anticipated to this standard within the next few years to clarify existing material, to correct
`possible errors, and to incorporate new related material. Information on the current revision state of this and
`other IEEE 802 standards may be obtained from
`
`Secretary, IEEE Standards Board
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 08855-1331 USA
`
`Participants
`
`At the time the draft of the 1999 version of this standard was sent to sponsor ballot, the IEEE 802.11
`working group had the following voting members:
`
`Victor Hayes, Chair
`
`
`
`Bob O’Hara,
`
`
`Stuart J. Kerry and
`
`802.11rev Task Group Chair and Technical Editor
`
`George Fishel,
`Secretary
`
`
`
` Al Petrick, Vice Chairs
`
`
`
`
`David Bagby, Mac Group Chair
`Jan Boer,
` Direct Sequence Chair
`
`
`
`
`Michael Fischer and Allen Heberling,
`State Diagram Editors
`
`Dean Kawaguchi,
`
`PHY Group and FH Chair
`
`
`
`Naftali Chayat, Task Group a Chair
`
`
`John Fakatselis, Task Group b Chair
`
`
`Victoria M. Poncini, Task Group c Chair
`
`
`
`Jeff Abramowitz
`Keith B. Amundsen
`Carl F. Andren
`Kazuhiro Aoyagi
`Phil Belanger
`John Biddick
`Simon Black
`Ronald Brockmann
`Wesley Brodsky
`John H. Cafarella
`Ken Clements
`Wim Diepstraten
`Darrol Draper
`Peter Ecclesine
`Darwin Engwer
`Jeff Fischer
`Matthew Fischer
`Michael Fischer
`John Fisher
`Motohiro Gochi
`Tim Godfrey
`Jan Haagh
`
`Karl Hannestad
`Robert Heile
`Maarten Hoeben
`Duane Hurne
`Masayuki Ikeda
`Richard Jai
`Donald C. Johnson
`Nobuo Karaki
`Isao Masaki
`Jim McDonald
`Gene Miller
`Akira Miura
`Masaharu Mori
`Masahiro Morikura
`Ravi P. Nalamati
`Colin Nayler
`Richard van Nee
`Tomoki Ohsawa
`Kazuhiro Okanoue
`Richard H. Paine
`Bob Pham
`Stanley A. Reible
`
`William Roberts
`Kent G. Rollins
`Oren Rosenfeld
`Michael Rothenberg
`Clemens C. W. Ruppel
`Chandos Rypinski
`Anil K. Sanwalka
`Roy Sebring
`Mike Shiba
`Thomas Siep
`Donald I. Sloan
`Hitoshi Takanashi
`Satoru Toguchi
`Cherry Tom
`Mike Trompower
`Tom Tsoulogiannis
`Sarosh N. Vesuna
`Nien C. Wei
`Harry Worstell
`Timothy M. Zimmerman
`Jonathan M. Zweig
`Jim Zyren
`
`Copyright © 1999 IEEE. All rights reserved.
`
`vii
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000005
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Major contributions to the 1999 edition were received from the following individuals:
`Richard Ozer
`Henri Moelard
`
`Arnoud Zwemmer
`
`The following members of the balloting committee voted on the 1999 version of this standard:
`A. Kamerman
`Ronald C. Petersen
`Kit Athul
`Dean M. Kawaguchi
`John R. Pickens
`Thomas W. Bailey
`Edward R. Kelly
`Alberto Profumo
`Peter K. Campbell
`Gary C. Kessler
`Vikram Punj
`James T. Carlo
`Yongbum Kim
`James A. Renfro
`David E. Carlson
`Stephen Barton Kruger
`Gary S. Robinson
`Brian J. Casey
`Joseph Kubler
`Edouard Y. Rocher
`Naftali Chayat
`Lanse M. Leach
`James W. Romlein
`Robert S. Crowder
`Jai Yong Lee
`Floyd E. Ross
`Wim Diepstraten
`Randolph S. Little
`Michael Rothenberg
`Thomas J. Dineen
`Ronald Mahany
`Christoph Ruland
`Christos Douligeris
`Peter Martini
`Anil K. Sanwalka
`Paul S. Eastman
`Richard McBride
`James E. Schuessler
`Philip H. Enslow
`Bennett Meyer
`Rich Seifert
`Changxin Fan
`Gene E. Milligan
`Leo Sintonen
`John W. Fendrich
`David S. Millman
`Patricia Thaler
`Michael A. Fischer
`Hiroshi Miyano
`Mike Trompower
`George R. Fishel
`Warren Monroe
`Mark-Rene Uchida
`Harvey A. Freeman
`John E. Montague
`Emmanuel Van Lil
`Robert J. Gagliano
`Wayne D. Moyers
`Sarosh N. Vesuna
`Patrick S. Gonia
`Shimon Muller
`James Vorhies
`Julio Gonzalez-Sanz
`Ken Naganuma
`Barry M. Vornbrock
`Chris G. Guy
`Paul Nikolich
`Qian-li Yang
`Victor Hayes
`Robert O’Hara
`Oren Yuen
`Donald N. Heirman
`Donal O’Mahony
`Chris Zegelin
`Henry Hoyt
`Roger Pandanda
`Jonathan M. Zweig
`Raj Jain
`
`At the time the draft of the 1997 version of this standard was sent to sponsor ballot, the IEEE 802.11 work-
`ing group had the following voting members:
`
`
`
`
`Victor Hayes, Chair
`
`
`
`Greg Ennis, Chief Technical Editors
`Bob O’Hara and
`
`
`
`
`George Fishel and Carolyn L. Heide,
`Secretaries
`
`
`
`Stuart J. Kerry and Chris Zegelin, Vice Chairs
`
`C. Thomas Baumgartner,
`
`David Bagby,
`
`Infrared Chair and Editor
`MAC Group Chair
`
`Michael Fischer,
`Jan Boer,
`
`State Diagram Editor
`Direct Sequence Chair
`
`Dean M. Kawaguchi,
`
`Mike Trompower,
`PHY Group and FH Chair
`Direct Sequence Editor
`
`Jeff Abramowitz
`Keith B. Amundsen
`Phil Belanger
`Manuel J. Betancor*
`John Biddick
`Simon Black
`Alessandro M. Bolea
`Pablo Brenner
`Peter E. Chadwick
`Naftali Chayat
`Jonathon Y. Cheah
`Hae Wook Choi
`Wim Diepstraten
`
`Robert J. Egan
`Darwin Engwer
`John Fakatselis
`Matthew Fischer
`Keith S. Furuya
`Rich Gardner
`Ian Gifford
`Howard J. Hall
`Bill Huhn
`Donald C. Johnson
`Mikio Kiyono
`Joseph J. Kubler
`Arthur Lashbrook
`
`F. J. Lopez-Hernandez
`Ronald Mahany
`Bob Marshall
`Jim McDonald
`Akira Miura
`Wayne D. Moyers
`Ravi P. Nalamati
`Mitsuji Okada
`Al Petrick
`Miri Ratner
`James A. Renfro
`William Roberts
`Jon Walter Rosdahl
`
`viii
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000006
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`Michael Rothenberg
`Chandos A. Rypinski
`Anil K. Sanwalka
`Roy Sebring
`Glen Sherwood
`Thomas Siep
`Nathan Silberman
`
`Don Sloan
`Greg Smith
`Marvin L. Sojka
`Dave Strohschein
`Bert Sullam
`Mack Sullivan
`
`Tom Tsoulogiannis
`Jeanine Valadez
`Sarosh Vesuna
`Richard E. White
`Donna A. Woznicki
`Timothy M. Zimmerman
`Johnny Zweig
`
`Major contributions to the 1997 version were received from the following individuals:
`
`Robert Achatz
`Ken Biba
`Paul Eastman
`Ed Geiger
`Larry van der Jagt
`
`*Deceased
`
`Richard Lee
`Kerry Lynn
`Michael Masleid
`John McKown
`K. S. Natarajan
`Jim Neally
`
`Richard Ozer
`Thomas Phinney
`Leon S. Scaldeferri*
`Jim Schuessler
`François Y. Simon
`
`The following persons were on the balloting committee for the 1997 version of this standard:
`
`Bernhard Albert
`Jon M. Allingham
`Jack S. Andresen
`Kit Athul
`Anthony L. Barnes
`Robert T. Bell
`Manuel J. Betancor
`Simon Black
`Alan L. Bridges
`Graham Campbell
`James T. Carlo
`David E. Carlson
`Peter E. Chadwick
`Naftali Chayat
`Alan J. Chwick
`Ken Clements
`Robert S. Crowder
`Rifaat Dayem
`Wim Diepstraten
`Edward A. Dunlop
`Sourav K. Dutta
`Paul S. Eastman
`Peter Ecclesine
`Gregory Elkmann
`John E. Emrich
`Philip H. Enslow
`Changxin Fan
`Michael A. Fischer
`Harvey A. Freeman
`Robert J. Gagliano
`Patrick S. Gonia
`N. Douglas Grant
`Govert M. Griffioen
`Joseph L. Hammond
`Victor Hayes
`Kenneth C. Heck
`Jan Hoogendoorn
`Russell D. Housley
`Walter K. Hurwitz
`
`Richard J. Iliff
`Tomoaki Ishifuji
`Carlos Islas-Perez
`Raj Jain
`A. Kamerman
`Peter M. Kelly
`Yongbum Kim
`Mikio Kiyono
`Thaddeus Kobylarz
`Stephen B. Kruger
`Joseph J. Kubler
`David J. Law
`Jai Yong Lee
`Jungtae Lee
`Daniel E. Lewis
`Randolph S. Little
`Ming T. Liu
`Joseph C. J. Loo
`Donald C. Loughry
`Robert D. Love
`Ronald Mahany
`Jim L. Mangin
`Peter Martini
`P. Takis Mathiopoulos
`Steve Messenger
`Bennett Meyer
`Ann Miller
`David S. Millman
`Hiroshi Miyano
`Stig Frode Mjolsnes
`W. Melody Moh
`John E. Montague
`Wayne D. Moyers
`Paul Nikolich
`Ellis S. Nolley
`Robert O’Hara
`Donal O’Mahony
`Roger Pandanda
`Lalit Mohan Patnaik
`Lucy W. Person
`
`Thomas L. Phinney
`Vikram Prabhu
`Alberto Profumo
`David L. Propp
`Vikram Punj
`Andris Putnins
`Fernando Ramos
`James W. Romlein
`Floyd E. Ross
`Michael Rothenberg
`Christoph Ruland
`Chandos A. Rypinski
`Anil K. Sanwalka
`Gregory D. Schumacher
`Rich Seifert
`Lee A. Sendelbach
`Michael Serrone
`Adarshpal S. Sethi
`Donald A. Sheppard
`Nathan Silberman
`Joseph S. Skorupa
`Michael A. Smith
`Marvin L. Sojka
`Efstathios D. Sykas
`Geoffrey O. Thompson
`Robert C. Tripi
`Mike Trompower
`David B. Turner
`Mark-Rene Uchida
`James Vorhies
`Yun-Che Wang
`Raymond P. Wenig
`Earl J. Whitaker
`David W. Wilson
`Jerry A. Wyatt
`Qian-Li Yang
`Iwen Yao
`Oren Yuen
`Jonathan M. Zweig
`
`Copyright © 1999 IEEE. All rights reserved.
`
`ix
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000007
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`When the IEEE-SA Standards Board approved this standard on 18 March 1999, it had the following
`membership:
`
`
`
`Richard J. Holleman, Chair
`
`
`
`Judith Gorman,
`
`
`
`Donald N. Heirman, Vice Chair
`
`
`Secretary
`
`Satish K. Aggarwal
`Dennis Bodson
`Mark D. Bowman
`James T. Carlo
`Gary R. Engmann
`Harold E. Epstein
`Jay Forster*
`Ruben D. Garzon
`
`*Member Emeritus
`
`James H. Gurney
`Lowell G. Johnson
`Robert J. Kennelly
`E. G. “Al” Kiener
`Joseph L. Koepfinger*
`L. Bruce McClung
`Daleep C. Mohla
`Robert F. Munzner
`
`Louis-François Pau
`Ronald C. Petersen
`Gerald H. Peterson
`John B. Posey
`Gary S. Robinson
`Akio Tojo
`Hans E. Weinrich
`Donald W. Zipse
`
`Also included is the following nonvoting IEEE-SA Standards Board liaison:
`
`Robert E. Hebner
`
`Valerie E. Zelenty
`IEEE Standards Project Editor
`
`x
`
`Copyright © 1999 IEEE. All rights reserved.
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000008
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`
`Contents
`
`1.
`
`Overview.............................................................................................................................................. 1
`
`1.1 Scope............................................................................................................................................ 1
`1.2 Purpose......................................................................................................................................... 1
`
`2.
`
`3.
`
`4.
`
`5.
`
`Normative references ........................................................................................................................... 2
`
`Definitions............................................................................................................................................ 3
`
`Abbreviations and acronyms................................................................................................................ 6
`
`General description .............................................................................................................................. 9
`
`5.1 General description of the architecture ........................................................................................ 9
`5.1.1 How wireless LAN systems are different ........................................................................... 9
`5.2 Components of the IEEE 802.11 architecture............................................................................ 10
`5.2.1 The independent BSS as an ad hoc network..................................................................... 10
`5.2.2 Distribution system concepts ............................................................................................ 11
`5.2.3 Area concepts.................................................................................................................... 12
`5.2.4 Integration with wired LANs ............................................................................................ 14
`5.3 Logical service interfaces .......................................................................................................... 14
`5.3.1 Station service (SS)........................................................................................................... 15
`5.3.2 Distribution system service (DSS).................................................................................... 15
`5.3.3 Multiple logical address spaces ........................................................................................ 16
`5.4 Overview of the services............................................................................................................ 17
`5.4.1 Distribution of messages within a DS............................................................................... 17
`5.4.2 Services that support the distribution service ................................................................... 18
`5.4.3 Access and confidentiality control services...................................................................... 19
`5.5 Relationships between services.................................................................................................. 21
`5.6 Differences between ESS and IBSS LANs................................................................................ 23
`5.7 Message information contents that support the services............................................................ 24
`5.7.1 Data ................................................................................................................................... 25
`5.7.2 Association........................................................................................................................ 25
`5.7.3 Reassociation .................................................................................................................... 25
`5.7.4 Disassociation ................................................................................................................... 26
`5.7.5 Privacy .............................................................................................................................. 26
`5.7.6 Authentication................................................................................................................... 26
`5.7.7 Deauthentication ............................................................................................................... 27
`5.8 Reference model ........................................................................................................................ 27
`
`6. MAC service definition...................................................................................................................... 29
`
`6.1 Overview of MAC services ....................................................................................................... 29
`6.1.1 Asynchronous data service ............................................................................................... 29
`6.1.2 Security services ............................................................................................................... 29
`6.1.3 MSDU ordering ................................................................................................................ 29
`6.2 Detailed service specification .................................................................................................... 30
`6.2.1 MAC data services............................................................................................................ 30
`
`7.
`
`Frame formats .................................................................................................................................... 34
`
`7.1 MAC frame formats................................................................................................................... 34
`
`Copyright © 1999 IEEE. All rights reserved.
`
`xi
`
`Exhibit 1009
`Hewlett Packard Enterprise Company v. Sovereign Peak Ventures, LLC
`Page 000009
`
`
`
`Copyrighted material licensed to Charles Dougherty on 2013-07-25 for licensee's use only.
` Copyrighted and Authorized by IEEE. Restrictions Apply.
`
`
`
`
`
`
`7.1.1 Conventions ...................................................................................................................... 34
`7.1.2 General frame format........................................................................................................ 34
`7.1.3 Frame fields ...................................................................................................................... 35
`7.2 Format of individual frame types............................................................................................... 41
`7.2.1 Control frames .................................................................................................................. 41
`7.2.2 Data frames ....................................................................................................................... 43
`7.2.3 Management frames.......................................................................................................... 45
`7.3 Management frame body components ....................................................................................... 50
`7.3.1 Fixed fields........................................................................................................................ 50
`7.3.2 Information elements ........................................................................................................ 55
`
`8.
`
`Authentication and privacy ................................................................................................................ 59
`
`8.1 Authentication services.............................................................................................................. 59
`8.1.1 Open System authentication ............................................................................................. 59
`8.1.2 Shared Key authentication ................................................................................................ 60
`8.2 The Wired Equivalent Privacy (WEP) algorithm ...................................................................... 61
`8.2.1 Introduction....................................................................................................................... 61
`8.2.2 Properties of the WEP algorithm ...................................................................................... 62
`8.2.3 WEP theory of operation .................................................................................................. 62
`8.2.4 WEP algorithm specification ............................................................................................ 64
`8.2.5 WEP Frame Body expansion ............................................................................................ 64
`8.3 Security-Related MIB attributes ................................................................................................ 65
`8.3.1 Authentication-Related MIB attributes............................................................................. 65
`8.3.2 Privacy-Related MIB attributes ........................................................................................ 65
`
`9. MAC sublayer functional description................................................................................................ 70
`
`9.1 MAC architecture....................................................................................................................... 70
`9.1.1 Distributed coordination function (DCF).......................................................................... 70
`9.1.2 Point coordination function (PCF).................................................................................... 70
`9.1.3 Coexistence of DCF and PCF ........................................................................................... 71
`9.1.4 Fragmentation/defragmentation overview ........................................................................ 71
`9.1.5 MAC data service ............................................................................................................. 72
`9.2 DCF............................................................................................................................................ 72
`9.2.1 Carrier-sense mechanism .................................................................................................. 73
`9.2.2 MAC-Level acknowledgments ......................................................................................... 73
`9.2.3 Interframe space (IFS) ...................................................................................................... 74
`9.2.4 Random backoff time........................................................................................................ 75
`9.2.5 DCF access procedure....................................................................................................... 76
`9.2.6 Directed MPDU transfer procedure .................................................................................. 82
`9.2.7 Broadcast and multicast MPDU transfer procedure ......................................................... 83
`9.2.8 ACK procedure ................................................................................................................. 83
`9.2.9 Duplicate detection and recovery...................................................................................... 83
`9.2.10 DCF timing relations....................................................................................................... 84
`9.