doc.: IEEE 11-13/0938r0 802.1AC

August 2013
doc.: IEEE 11-13/0938r0
Service mapping between the ISS and 802.11
Date: 2013-08-01
Authors:
Name
Affiliations
Address
Phone
email
Norman Finn
Cisco Systems
170 W Tasman Dr.
San José CA 95134 USA
+1.408.526.4495
[email protected]
Submission
Slide 1
Norman Finn, Cisco Systems
August 2013
doc.: IEEE 11-13/0938r0
Abstract
The ISS services required by IEEE 802.1Q Bridges can
be mapped to the services offered by either the
infrastructure or non-AP station interfaces of
P802.11ak. This can be accomplished by defining a
new interface between P802.11ak and 802.1AC
consisting of a single instance of the ISS with an
associated port vector.
Submission
Slide 2
Norman Finn, Cisco Systems
A MAC Relay Entity that interconnects the Bridge’s Ports;
At least two Ports;
Higher layer entities, including at least a Spanning Tree Protocol Entity.
a)
b)
c)
doc.: IEEE 11-13/0938r0
The Virtual Bridge Architecture
The VLAN-aware Bridge architecture is illustrated in Figure 8-2. The MAC Relay Entity handles the media
access method independent functions of relaying frames among Bridge Ports, filtering frames, and learning
filtering information. It uses the Enhanced Internal Sublayer Service (EISS) (6.8, 6.9) provided by each
Bridge Port.
Bridge Port
Bridge Port
Higher Layer Entities
MS
MS
MAC Relay Entity
SS
EI
SS
EI
ISS
Media Access
Method
Independent
Functions (6.9)
ISS
Media Access
Method
Dependent
Convergence
Functions (6.7)
Media Access Method
Specific Functions
(IEEE Std 802.n)
LAN
LAN
NOTE—The notation “IEEE Std 802.n” in this figure indicates that the specifications for these functions can be
found in the relevant standard for the media access method concerned; for example, n would be 3 (IEEE Std 802.3)
in the case of Ethernet.
Figure 8-2—VLAN-aware Bridge architecture
IEEE Std 802.1Q-2011
Each Bridge Port also functions as an end station providing one or more instances of the MAC Service. Each
instance of the MAC Service is provided to a distinct LLC Entity that supports protocol identification,
multiplexing, and demultiplexing, for PDU transmission and reception by one or more higher layer entities.
Submission
NOTE 1—In most cases, each Port provides a single instance of the MAC Service, to an LLC Entity that supports all
A MAC Relay Entity that interconnects the Bridge’s Ports;
At least two Ports;
Higher layer entities, including at least a Spanning Tree Protocol Entity.
a)
b)
c)
doc.: IEEE 11-13/0938r0
The Virtual Bridge Architecture
The VLAN-aware Bridge architecture is illustrated in Figure 8-2. The MAC Relay Entity handles the media
access method independent functions of relaying frames among Bridge Ports, filtering frames, and learning
filtering information. It uses the Enhanced Internal Sublayer Service (EISS) (6.8, 6.9) provided by each
Bridge Port.
Bridge Port
Bridge Port
Higher Layer Entities
MS
MS
MAC Relay Entity
SS
EI
SS
EI
ISS
Media Access
Method
Independent
Functions (6.9)
ISS
Let’s zoom
in on this
Media Access
Method
Dependent
Convergence
Functions (6.7)
Media Access Method
Specific Functions
(IEEE Std 802.n)
LAN
LAN
NOTE—The notation “IEEE Std 802.n” in this figure indicates that the specifications for these functions can be
found in the relevant standard for the media access method concerned; for example, n would be 3 (IEEE Std 802.3)
in the case of Ethernet.
Figure 8-2—VLAN-aware Bridge architecture
IEEE Std 802.1Q-2011
Each Bridge Port also functions as an end station providing one or more instances of the MAC Service. Each
instance of the MAC Service is provided to a distinct LLC Entity that supports protocol identification,
multiplexing, and demultiplexing, for PDU transmission and reception by one or more higher layer entities.
Submission
NOTE 1—In most cases, each Port provides a single instance of the MAC Service, to an LLC Entity that supports all
Three methods for
doc.: IEEE 11-13/0938r0
connecting a Bridge to 802.11 media
Enhancements to Bridging of 802.11 Media
IEEE P802.1Qbz/D1.2
July 31, 2013
1
2
The Forwarding Process (8.6)
3
4
5
Support of
Support of Support of Support of
Support of
EISS
EISS
EISS
EISS
EISS
6
(6.9)
(6.9)
(6.9)
(6.9)
(6.9)
7
8
802.1AC TBD
IEEE 802.1AC Clause 12.1.2
802.1AC Clause TBD
non-AP
station
9
Infrastructure convergence
802.11 Portal convergence
convergence
10
11
IEEE Std 802.11ak
IEEE Std 802.11
IEEE Std 802.11ak
Non-AP
12
Portal and distribution system
Infrastructure access
station access
13
14
802.11
802.11
IEEE 802.11
IEEE Std 802.11
15
access point
access point
access point
non-AP station
16
17
18
802.11
802.11
802.11
802.11
19
medium
medium
medium
medium
20
Portal (G.4.1)
Infrastructure (G.4.2)
Non-AP station (G.4.3)
21
22
Figure G-2—Methods for Bridge access to IEEE 802.11 media
23
24
25
26
G.4.2 Infrastructure convergence
27
28
The infrastructure convergence function defined in IEEE 802.1AC Clause TBD provides a set of virtual
29
point-to-point instances of the 802.1AE MAC Security sublayer and the ISS, one to each station to which an
30 Submission
IEEE Std 802.11 access point is attached. The convergence function maps this set of ISS instances to a
1
DONE
2
3
NEW
NEW
P802.1Qbz Draft 1.2 (still in early Task Group balloting stage)
August 2013
doc.: IEEE 11-13/0938r0
INFRASTRUCTURE SIDE
Submission
Slide 6
Norman Finn, Cisco Systems
Convergence Functions for 2:doc.: IEEE 11-13/0938r0
802.11 infrastructure access
• For most media (e.g. 802.3, FDDI, MOST,
or the 802.11 Portal interface) it is a
relatively simple chore to map the ISS
parameters to the particular medium’s
parameters.
• For P802.1Qbz / P802.11ak, convergence
is more complex.
•
•
•
The security layer is necessarily down in
802.11, not above the ISS, because 802.11
secures fragments of frames.
There is one physical interface that can
send a multicast, theoretically sent on
multiple ports, with a single transmission.
This multiplexing involves the cooperation
of the AP and the non-AP station; the nonAP station must decode the port selection
encoded in the frame by the AP.
Submission
controlled
uncontrolled
(ISS)
controlled
uncontrolled
(ISS)
(ISS)
(ISS)
802.1AE
SecY
802.1AE
SecY
(ISS)
(ISS)
Media Access Method
Dependent Convergence
Functions
(802.11)
(Not strictly 802.1AE SecY,
but equivalent in terms of
usage and effect.)
802.1Q + 802.1AC
doc.: IEEE 11-13/0938r0
Convergence + 802.11ak infrastructure
C
(ISS)
UC
(ISS)
C
(ISS)
UC
(ISS)
SecY 1
SecY 2
(ISS)
(ISS)
C: controlled
UC: uncontrolled
C
(ISS)
UC
(ISS)
SecY m
…
(ISS)
802.1AC Media Access Method Dependent Convergence Functions
Many ISS  Infrastructure SAP + vector of ports
(Infrastructure SAP with port vector)
802.1ak Infrastructure access
Vector of ports  N frames with third MAC address and subset encoding
(802.11)
Submission
802.1Q + 802.1AC
doc.: IEEE 11-13/0938r0
Convergence + 802.11ak infrastructure
Eliminate the SecY. Attach both controlled and uncontrolled ports to the
convergence function. (This trick goes in 802.1Qbz.)
C
(ISS)
UC
(ISS)
1
C
(ISS)
UC
(ISS)
…
2
C
(ISS)
UC
(ISS)
m
802.1AC Media Access Method Dependent Convergence Functions
Many ISS  Infrastructure SAP + vector of ports
(Infrastructure SAP with port vector)
802.1ak Infrastructure access
Vector of ports  N frames with third MAC address and subset encoding
(802.11)
Submission
Infrastructure
802.1AC Convergence
C
(ISS)
UC
(ISS)
1
C
(ISS)
2
UC
(ISS)
doc.: IEEE 11-13/0938r0
…
C
(ISS)
m
UC
(ISS)
• All of the ports associated with a given AP (or BSS, in the
sense of a logical function) go through a single instance of the
convergence function.
• For .requests: The convergence function turns some number
of .requests presented “simultaneously” on some number of
its upper SAPs into a single .request and a vector indicating
on which SAPs it was presented.
• For .indications: The convergence function presents the
frame on the SAP(s) indicated by the vector. (It so happens
that this is always just one port.)
• (Infrastructure SAP with port vector)
Submission
Infrastructure
802.1AC Convergence
C
(ISS)
UC
(ISS)
1
C
(ISS)
2
UC
(ISS)
doc.: IEEE 11-13/0938r0
…
C
(ISS)
m
UC
(ISS)
• The creation and deletion of upper SAPs are handled by the
AP and its security layer. The signaling of these events is a
matter not visible outside the system, so may or may not be
standardized, at the choice of 802.11 TGak.
• Of course, the 802.1AC convergence function also performs
any minor mapping required between the ISS and 802.11
service definitions.
(Infrastructure SAP with port vector)
Submission
doc.: IEEE 11-13/0938r0
P802.11ak infrastructure access
(Infrastructure SAP with port vector)
• (Feel free to suggest better names for this function.)
• For .requests: The frame has only Destination and Source
addresses. Every frame has a Source and Transmitter
address both the AP’s MAC address. Using the port vector,
the infrastructure access function selects a
Destination/Receiver address (either a unicast to a non-AP
station or a broadcast to all) and encodes the station list
appropriately in the A-MSDU.
• For .indications: The Transmitter address and whether the
frame was encrypted determine the single-bit vector passed
up with the frame.
(802.11)
Submission
doc.: IEEE 11-13/0938r0
What about VLAN tag variances?
• As will be made clear in P802.1Qbz (and in P802.11ak, if TGak so
desires), the purpose of the architecture is to specify outcomes, not
internal processes.
• So, whether variances in VLAN tagging, VID mapping, or priority
mapping cause a frame to be replicated above 802.1AC
convergence function, or below the 802.11 infrastructure access
function, is irrelevant to IEEE Std 802.1Q or to IEEE Std 802.1AC.
• If TGak chooses to add such mapping functions to the A-MSDU
encoding, it will be documented in IEEE Std 802.11ak.
Submission
August 2013
doc.: IEEE 11-13/0938r0
NON-AP STATION SIDE
Submission
Slide 14
Norman Finn, Cisco Systems
802.1Q + 802.1AC
doc.: IEEE 11-13/0938r0
Convergence + 802.11ak Non-AP station
C
(ISS)
UC
(ISS)
(only two ports, controlled and uncontrolled)
802.1AC Media Access Method Dependent Convergence Functions
Many ISS  Infrastructure SAP + vector of ports
(Non-AP station SAP with port vector)
802.1ak Non-AP station
Vector of ports  1 frame with third MAC address and subset encoding
(802.11)
Submission
Non-AP station
802.1AC Convergence
C
(ISS)
doc.: IEEE 11-13/0938r0
UC
(ISS)
• The creation and deletion of upper SAPs are handled by the
station and its security layer. The signaling of these events is
a matter not visible outside the system, so may or may not be
standardized, at the choice of 802.11 TGak.
• Of course, the 802.1AC convergence function also performs
any minor mapping required between the ISS and 802.11
service definitions.
(Non-AP station SAP with port vector)
Submission
doc.: IEEE 11-13/0938r0
P802.11ak Non-AP station access
(Non-AP station SAP with port vector)
• For .requests: The frame has only Destination and Source
addresses. The port vector simply indicates whether the
frame is or is not encrypted. The outer Destination and
Receiver addresses are the AP, the Source/Transmitter
address the non-AP station. The A-MSDU does not carry any
subset encoding.
• For .indications: Whether or not the frame was encrypted
determines the single-bit vector passed up with the frame.
(802.11)
Submission
August 2013
doc.: IEEE 11-13/0938r0
A FINAL OPTION
Submission
Slide 18
Norman Finn, Cisco Systems
doc.: IEEE 11-13/0938r0
A final option
If preferred by TGak, it would be just as easy to make
separate controlled and uncontrolled ports at the 802.11
interface:
C
C
C
UC
UC
UC
…
…
(ISS)
(ISS)
(ISS)
(ISS)
(ISS)
(ISS)
1
2
m
1
2
m
Controlled 802.1AC
convergence function
Uncontrolled 802.1AC
convergence function
(Infrastruct. SAP w/ port vector)
(Infrastruct. SAP w/ port vector)
Controlled 802.1ak
infrastructure access
Uncontrolled 802.1ak
infrastructure access
C
(802.11)
UC
(802.11)
Submission
doc.: IEEE 11-13/0938r0
A final option
• Note that, because the non-AP station has only one SAP for the AP,
this effectively reduces the 802.1AC non-AP station convergence
function to be exactly the same as the current Portal convergence
function.
• Of course, the anti-reflection part of the subset solution is still
required.
Submission