802.11i MAC Functions ======================= .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What are MAC functions in IEEE 802.11i?** MAC functions in 802.11i handle secure frame delimiting, addressing, and error checking with enhanced security features. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does 802.11i enhance MAC layer security?** By implementing encryption (AES-CCMP), key management, and secure authentication within MAC frame processing. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What role does MAC play in key management in 802.11i?** MAC layer manages key distribution via the 4-way handshake and group key handshake protocols. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **Does 802.11i MAC support fragmentation?** Yes, the MAC layer supports fragmentation and reassembly of encrypted frames for efficient transmission. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does MAC handle authentication in 802.11i?** It processes secure authentication messages, including EAPOL frames during authentication and association. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What is the MAC layer’s role in encryption in 802.11i?** The MAC layer encrypts and decrypts data payloads using AES-CCMP to secure wireless frames. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How are management frames handled securely by MAC in 802.11i?** MAC supports Protected Management Frames (PMF) to safeguard management communications from attacks. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **Does 802.11i MAC support QoS features?** Yes, MAC integrates with QoS extensions like 802.11e to prioritize secure traffic. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does MAC coordinate with PHY for security in 802.11i?** MAC controls frame formatting and timing to ensure secure data is transmitted correctly at the PHY layer. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What mechanisms does MAC use to detect errors in 802.11i?** It uses CRC checks on encrypted frames to verify integrity and detect tampering. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does MAC handle retransmissions in 802.11i?** It manages retransmissions securely while maintaining data confidentiality and integrity. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **Are there MAC functions related to power management in 802.11i?** Yes, MAC coordinates power-saving modes while ensuring secure connection maintenance. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How is sequence control handled by MAC in 802.11i?** MAC uses sequence numbers to prevent replay attacks and maintain frame order. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **Does MAC layer control access to the medium in 802.11i?** Yes, MAC continues to use CSMA/CA with added security checks before transmission. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does MAC manage acknowledgments in 802.11i?** Secure acknowledgments confirm receipt of encrypted frames. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What changes did 802.11i introduce to MAC frame formats?** Added RSN information elements and fields to support security features. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **How does MAC ensure interoperability in 802.11i?** By standardizing security processes and frame formats across vendors. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **Does MAC handle encrypted multicast/broadcast frames in 802.11i?** Yes, group key handshakes and encryption protect multicast traffic. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow **What role does MAC play in intrusion prevention in 802.11i?** It helps detect frame anomalies and unauthorized access attempts via secure protocols. .. panels:: :container: container pb-4 :column: col-lg-12 p-2 :card: shadow Topics in this section, * :ref:`Reference links ` .. _mac_functions_i_step17: .. tab-set:: .. tab-item:: Reference links * Reference links