Service set (802.11 network)
In IEEE 802.11 wireless local area networking standards (including Wi‑Fi), a service set is a group of wireless network devices which share a service set identifier (SSID)—typically the natural language label that users see as a network name. (For example, all of the devices that together form and use a Wi‑Fi network called "Foo" are a service set.) A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.
A service set is either a basic service set (BSS) or an extended service set (ESS).
A basic service set is a subgroup, within a service set, of devices that share physical-layer medium access characteristics (e.g. radio frequency, modulation scheme, security settings) such that they are wirelessly networked. The basic service set is defined by a basic service set identifier (BSSID) shared by all devices within it. The BSSID is a 48-bit label that conforms to MAC-48 conventions. While a device may have multiple BSSIDs, usually each BSSID is associated with at most one basic service set at a time.[1]
A basic service set should not be confused with the coverage area of an access point, known as the basic service area (BSA).[2]
Basic service set types
Infrastructure
An infrastructure BSS is created by an infrastructure device called an access point (AP) for other devices to join. (Note that the term IBSS is not used for this type of BSS but refers to the independent type discussed below.) The operating parameters of the infrastructure BSS are defined by the AP.[3] The Wi‑Fi segments of common home and business networks are examples of this type.
Each basic service set has a unique identifier, a BSSID, which is a 48-bit number that follows MAC address conventions.[4] An infrastructure BSSID is usually non-configurable, in which case it is either preset during manufacture or mathematically derived from a preset value such as a serial number or a MAC address of another network interface. As with the MAC addresses used for Ethernet devices, an infrastructure BSSID is a combination of a 24-bit organizationally unique identifier (OUI, the manufacturer's identity) and a 24-bit serial number. A BSSID with a value of all 1s is used to indicate the wildcard BSSID, usable only during probe requests or for communications that take place outside the context of a BSS.[5]
Independent
An independent BSS (IBSS), or ad hoc network, is created by peer devices among themselves without network infrastructure.[6] A temporary network created by a cellular telephone to share its Internet access with other devices is a common example. In contrast to the stations in an infrastructure-mode network, the stations in a wireless ad hoc network communicate directly with one another, i.e. without a dependence on a distribution point to relay traffic between them.[7] In this form of peer-to-peer wireless networking, the peers form an independent basic service set (IBSS).[8] Some of the responsibilities of a distribution point—such as defining network parameters and other "beaconing" functions—are established by the first station in an ad-hoc network. However, that station does not relay traffic between the other stations; instead, the peers communicate directly with one another. Like an infrastructure BSS, an independent BSS also has a 48-bit MAC-address-like identifier. But unlike infrastructure BSS identifiers, independent BSS identifiers are not necessarily unique: the individual/group bit of the address is always set to 0 (individual), the universal/local bit of the address is always set to 1 (local), and the remaining 46 bits are randomly generated.[5]
Mesh
A mesh basic service set (MBSS) is a self-contained network of mesh stations that share a mesh profile, defined in 802.11s.[9] Each node may also be an access point hosting its own basic service set, for example using the mesh BSS to provide Internet access for local users. In such a system, the BSS created by the access point is distinct from the mesh network, and a wireless client of that BSS is not part of the MBSS. The formation of the mesh BSS, as well as wireless traffic management (including path selection and forwarding) is negotiated between the nodes of the mesh infrastructure. The mesh BSS is distinct from the networks (which may also be wireless) used by a mesh's redistribution points to communicate with one another.
Service set identifier
The service set identifier (SSID) defines or extends a service set. Normally it is broadcast in the clear by stations in beacon packets to announce the presence of a network and seen by users as a wireless network name.
Unlike basic service set identifiers, SSIDs are usually customizable.[10] These SSIDs can be zero to 32 octets long,[11] and are, for convenience, usually in a natural language, such as English. The 802.11 standards prior to the 2012 edition did not define any particular encoding or representation for SSIDs, which were expected to be treated and handled as an arbitrary sequence of 0–32 octets that are not limited to printable characters. IEEE Std 802.11-2012 defines a flag to express that the SSID is UTF-8-encoded and could contain any Unicode text.[12] Wireless network stacks must still be prepared to handle all possible values in the SSID field.
Since the contents of an SSID field are arbitrary, the 802.11 standard permits devices to advertise the presence of a wireless network with beacon packets in which the SSID field is set to null.[13][n 1] A null SSID (the SSID element's length
field is set to zero[11]) is called a wildcard SSID in IEEE 802.11 standards documents,[14] and as a no broadcast SSID or hidden SSID in the context of beacon announcements,[13][15] and can be used, for example, in enterprise and mesh networks to steer a client to a particular (e.g. less utilized) access point.[13] A station may also likewise transmit packets in which the SSID field is set to null; this prompts an associated access point to send the station a list of supported SSIDs.[16] Once a device has associated with a basic service set, for efficiency, the SSID is not sent within packet headers; only BSSIDs are used for addressing.
Apple's location services interpret the SSID of a Wi‑Fi access point ending in _nomap as an opt-out from being included in Apple's crowdsourced location databases.[17]
Extended service set
An extended service set (ESS) is a wireless network, created by multiple access points, which appears to users as a single, seamless network, such as a network covering a home or office that is too large for reliable coverage by a single access point. It is a set of one or more infrastructure basic service sets on a common logical network segment (i.e. same IP subnet and VLAN).[18] Key to the concept is that the participating basic service sets appear as a single network to the logical link control layer by using the same SSID.[18][19] Thus, from the perspective of the logical link control layer, stations within an ESS may communicate with one another, and mobile stations may move transparently from one participating basic service set to another (within the same ESS).[19] Extended service sets make possible distribution services such as centralized authentication. From the perspective of the link layer, all stations within an ESS are all on the same link, and transfer from one BSS to another is transparent to logical link control.[20]
The basic service sets formed in wireless ad hoc networks are, by definition, independent from other BSSs, and an independent BSS cannot therefore be part of an extended infrastructure.[21] In that formal sense an independent BSS has no extended service set. However, the network packets of both independent BSSs and infrastructure BSSs have a logical network service set identifier, and the logical link control does not distinguish between the use of that field to name an ESS network, and the use of that field to name a peer-to-peer ad hoc network. The two are effectively indistinguishable at the logical link control layer level.[20]
Notes
- ^ To associate with a wireless network, a station must know the network's SSID. This information is either obtained from beacons broadcast by an access point (in which case a client can passively infer whether it is in range of that network), or—if no base station is advertising the SSID—a station must know the SSID beforehand by other means (e.g. from a previous configuration). When a client wishes to associate with a network, it sends the SSID in a probe request. An access point replies with a probe response if the SSID in a probe request is the wildcard SSID (SSID is zero-length) or matches an SSID that the access point supports;[14] otherwise the access point does not respond to the probe request.
References
- ^ "Understanding the Network Terms SSID, BSSID, and ESSID – Technical Documentation – Support – Juniper Networks". www.juniper.net.
- ^ IEEE Std 802.11-2007, § 3.15, p. 5.
- ^ IEEE Std 802.11-2012, § 4.10.3, pp. 84–88.
- ^ IEEE Std 802.11-2007, § 7.1.3.3, p. 6.
- ^ a b IEEE Std 802.11-2007, § 7.1.3.3.3, p. 65.
- ^ IEEE Std 802.11-2012, § 4.10.4, pp. 88–90.
- ^ IEEE Std 802.11-2007, § 5.6, p. 41.
- ^ IEEE Std 802.11-2007, § 5.21, p. 25.
- ^ IEEE Std 802.11-2012, § 3.1, p. 14.
- ^ Vasseur & Dunkels 2010, p. 432.
- ^ a b IEEE Std 802.11-2007, § 7.3.2.1, p. 101.
- ^ IEEE (2012). "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Sponsored by the LAN/MAN Standards Committee". IEEE 802.11-2012: 562.
- ^ a b c Murty, et al 2008, p. 75.
- ^ a b IEEE Std 802.11-2007, § 11.1.3.2.1, p. 422.
- ^ Dornseif, et al 2002, p. 2.
- ^ Lindqvist, et al 2009, pp. 123f.
- ^ "About privacy and Location Services in iOS, iPadOS, and watchOS". Apple Support. March 27, 2024. Retrieved 21 May 2024.
The owner of a Wi‑Fi access point can opt it out of Apple's Location Services — which prevents its location from being sent to Apple to include in Apple's crowd-sourced location database — by changing the access point's SSID (name) to end with "_nomap."
- ^ a b IEEE Std 802.11-2007, § 3.54, p. 8.
- ^ a b IEEE Std 802.11-2007, § 5.2.3.1, p. 26.
- ^ a b Edney 2004, p. 8.
- ^ IEEE Std 802.11-2007, § 5.6, p. 40.
Works cited
- Dornseif, Maximillian; Schumann, Kay H.; Klein, Christian (2002), "Tatsächliche und rechtliche Risiken drahtloser Computernetzwerke" (PDF), Datenschutz und Datensicherheit, 22 (4): 1–5.
- Edney, Jon (2004), "What is an ESS?", IEEE 802 LAN/MAN Standards Committee Meeting, July 2004, Piscataway, NJ: Institute of Electrical and Electronics Engineers.
- Lindqvist, Janne; Aura, Tuomas; Danezis, George; Koponen, Teemu; Myllyniemi, Annu; Mäki, Jussi; Roe, Michael (2009), "Privacy-preserving 802.11 Access-point Discovery", Proceedings of the Second ACM Conference on Wireless Network Security, WiSec '09, New York: ACM, pp. 123–130, CiteSeerX 10.1.1.206.4148, doi:10.1145/1514274.1514293, ISBN 978-1-60558-460-7, S2CID 8509913.
- Murty, Rohan; Padhye, Jitendra; Chandra, Ranveer; Wolman, Alec; Zill, Brian (2008), "Designing High Performance Enterprise Wi-Fi Networks" (PDF), in Crowcroft, Jon; Dahlin, Mike; et al. (eds.), Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI '08, Berkeley, CA: USENIX Association, pp. 73–88.
- Stacey, Robert; Ecclesine, Peter; et al., eds. (2010), "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6 (IEEE Std 802.11p-2010)" (PDF), Local and Metropolitan Area Networks, Specific Requirements, IEEE Standard for Information technology — Telecommunications and information exchange between systems, Piscataway, NJ: Institute of Electrical and Electronics Engineers, ISBN 978-0-7381-6324-6.
- Stephens, Adrian P.; Ecclesine, Peter, eds. (2012), "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (IEEE Std 802.11-2012)", Local and Metropolitan Area Networks, Specific Requirements, IEEE Standard for Information technology—Telecommunications and information exchange between systems, New York, NY: The Institute of Electrical and Electronics Engineers, Inc, ISBN 978-0-7381-7245-3.
- Cole, Terry L.; Barber, Simon, eds. (2007), "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (IEEE Std 802.11-2007)" (PDF), Local and Metropolitan Area Networks, Specific Requirements, IEEE Standard for Information technology— Telecommunications and information exchange between systems, Piscataway, NJ: Institute of Electrical and Electronics Engineers, ISBN 978-0-7381-5656-9.
- Vasseur, Jean-Philippe; Dunkels, Adam (2010), Interconnecting Smart Objects with IP: The Next Internet, Burlington, MA: Morgan Kaufmann, ISBN 978-0-12-375166-9.