Escolar Documentos
Profissional Documentos
Cultura Documentos
Vijayaruban IEEE Standards
Vijayaruban IEEE Standards
IEEE STANDARDS
IEEE 802.1 Higher layer LAN protocols IEEE 802.2 Logical link control IEEE 802.3 Ethernet IEEE 802.4 Token bus (disbanded) IEEE 802.5 Token Ring IEEE 802.6 Metropolitan Area Networks (disbanded) IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded)
Cont
IEEE 802.8 Fiber Optic TAG (disbanded) IEEE 802.9 Integrated Services LAN (disbanded) IEEE 802.10 Interoperable LAN Security (disbanded) IEEE 802.11 Wireless LAN (Wi-Fi certification) IEEE 802.12 demand priority IEEE 802.13 (not used) IEEE 802.14 Cable modems (disbanded) IEEE 802.15 Wireless PAN IEEE 802.15.1 (Bluetooth certification) IEEE 802.15.4 (Zig Bee certification)
Cont
IEEE 802.16 Broadband Wireless Access (Wi MAX certification) IEEE 802.16e (Mobile) Broadband Wireless Access IEEE 802.17 Resilient packet ring IEEE 802.18 Radio Regulatory TAG IEEE 802.19 Coexistence TAG IEEE 802.20 Mobile Broadband Wireless Access IEEE 802.21 Media Independent Handoff IEEE 802.22 Wireless Regional Area Network IEEE 802.23 Emergency Services Working Group
Cont..
The LLC layer performs these functions:
Managing the data-link communication Link Addressing Defining Service Access Points (SAPs) Sequencing The LLC provides a way for the upper layers to deal with any type of MAC layer (ex. Ethernet - IEEE 802.3 CSMA/CD or Token Ring IEEE 802.5 Token Passing).
Copyright - Fore Brain Technologies Pvt. Ltd.,
Cont..
IEEE 802.5 Token Ring Cabling is generally IBM "Type-1" shielded twisted pair, with unique hermaphroditic connectors. Each station passes or repeats the special token frame around the ring to its nearest downstream neighbor. This token-passing process is used to arbitrate access to the shared ring media. Stations that have data frames to transmit must first acquire the token before they can transmit them. Token ring LAN speeds of 4Mbit/s, 16Mbit/s, 100Mbit/s and 1Gbit/s have been standardized by the IEEE 802.5 working group
Cont..
It consists of two unconnected unidirectional buses. DQDB is rated for a maximum of 160 km before significant signal degradation over fiber optic cable with an optical wavelength of 1310 nm. Most MAN snow use Synchronous Optical Network(SONET) or Asynchronous Transfer Mode(ATM) network designs, with recent designs using native Ethernet.
Copyright - Fore Brain Technologies Pvt. Ltd.,
FDDI
FDDI uses optical fiber as the primary transmission medium, but it also can run over copper cabling. As mentioned earlier, FDDI over copper is referred to as Copper-Distributed Data Interface (CDDI). FDDI defines two types of optical fiber : single-mode and multimode. A mode is a ray of light that enters the fiber at a particular angle. Multimode fiber uses LED as the light-generating device, while single-mode fiber generally uses lasers.
Cont..
It was originally developed to provide data and voice/video over the same wire without degradation by fixing the amount of bandwidth assigned to the Ethernet and Bchannel sides. There was some vendor support for iso Ethernet, but it lost in the marketplace to the rapid adoption of Fast Ethernet and the working group was disbanded
Copyright - Fore Brain Technologies Pvt. Ltd.,
IEEE 802.10
IEEE 802.10 is a former standard for security functions that could be used in both local area networks and metropolitan area networks based on IEEE 802protocols. 802.10 specifies security association management and key management, as well as access control, data confidentiality and data integrity.
Cont..
The IEEE 802.10 standards were withdrawn in January 2004 and this working group of the IEEE 802 is not currently active. Security for wireless networks is being developed in 802.11i. The Cisco Inter-Switch Link(ISL) protocol for supporting VLAN son Ethernet and similar LAN technologies was based on IEEE 802.10; in this application 802.10 has largely been replaced by IEEE 802.1Q.
Copyright - Fore Brain Technologies Pvt. Ltd.,
IEEE 802.12
Three recent LAN technologies look set to satisfy the ever-increasing demand for LAN bandwidth. Two of these technologies are 100Mb/s shared medium LANs: 100Base-T (aka IEEE 802.3 Fast Ethernet) and IEEE 802.12 (aka 100VG-AnyLAN or 100VG). The third technology is packet switching, which is really an extension of existing LAN bridge technology, but which offers excellent performance gains at very low cost.
Copyright - Fore Brain Technologies Pvt. Ltd.,
Cont
The proposed Higher speed IEEE 802.12 LAN standard is well developed. Many of its key features have been proposed and verified. G Baud shared or switch networks are based on multimode or single mode optical fibre physical layers. FC-0 and FC-1 are highly leveraged to support an IEEE 802.12 MAC or switch port at 1062.5 M Baud in a cost effective manner. A new UTP category 5 physical layer will support desk top connections of up to 100m length at a baud rate of 531 M Baud.
Copyright - Fore Brain Technologies Pvt. Ltd.,
Cont..
Higher speed IEEE 802.12 will support both shared media access networks and switched based networks . Repeater based networks offer simple low cost implementations. The higher speed repeaters could be used to connect IEEE 802.12 repeaters, switches or end nodes in a cascaded topology. However, the bandwidth of shared repeater based LANs must be distributed between all end nodes.
Copyright - Fore Brain Technologies Pvt. Ltd.,
Cont..
Switches can offer higher network capacity and full link rate bandwidth to each end node. However, the implementation cost is higher and system management more complex compared to a shared network. IEEE 802.3 and IEEE 802.12 have both initiated projects to develop gigabit per second LANs initially as higher speed backbones for the 100 Mb/s systems. This paper will describe the status of the IEEE 802.12 gigabit per second LAN.
Copyright - Fore Brain Technologies Pvt. Ltd.,
The IEEE 802.14 Cable TV Protocol working group was formed to develop standards for the PHY and MAC network layers, a necessity for cable modem interoperability.
IEEE 802.16
Provide high-speed Internett access to home and business subscribers, without wires. Base stations (BS) can handle thousands of subscriber stations (SS) Access control prevents collisions. Supports
Legacy voice systems Voice over IP TCP/IP Applications with different QoS requirements.
Cont..
802.16 standards
802.16.1 (10-66 GHz, line-of-sight, up to 134Mbit/s) 802.16.2 (minimizing interference between coexisting WMANs.) 802.16a (2-11 Ghz, Mesh, non-line-ofsigth) 802.16b (5-6 Ghz) 802.16c (detailed system profiles) P802.16e (Mobile Wireless MAN)
IEEE 802.17
IEEE 802.17 Resilient packet ring (RPR) access method and physical layer specifications IEEE 802.17a: Bridging of IEEE Std 802.17 IEEE 802.17b: Spatially Aware Sublayer IEEE 802.17c: Protected Inter-Ring Connection
Overview
Dual counter-rotating ringlets Concurrent transmission,Bandwidth reuse Three traffic classes Real Time, GIR Low Delay/Jitter, CIR+EIR Best Effort Fairness Reuse of unused bandwidth Weighted allocation to EIR, best effort Plug-and-play Automatic topology discovery Robustness Sub 50 ms fault detection & restoration Fault tolerant No single point of failure
IEEE 802.18
The IEEE 802.18 Radio Regulatory Technical Advisory Group (RR-TAG) supports the wireless Working Groups in the IEEE 802 community by interfacing with regulatory agencies and industry groups working on regulatory issues. Administrations constantly upgrade their radio rules and regulations, providing brief opportunities for public comment. The RR-TAG monitors those with potential impact on IEEE 802 wireless standards groups and creates appropriate comment documents. The RR-TAG is also the liaison to other standards bodies on radio regulatory matters of mutual interest.
IEEE 802.19
The IEEE 802.19 Coexistence Technical Advisory Group (C-TAG) develops and maintains policies defining the responsibilities of IEEE 802 standards developers to address issues of coexistence with existing standards and those under development. As required, it offers assessments to the Sponsor Executive Committee (SEC) on how well standards developers have conformed to these conventions. It also may develop coexistence documentation for the technical community outside of IEEE 802.
IEEE 802.20
The 802.20 standard is being developed by the IEEE for highly efficient Mobile Broadband Wireless Access (MBWA) Spectral efficiencies, sustained user data rates and numbers of active users that are significantly higher than other emerging mobile systems Efficient packet based air interface optimized for IP-data transport, including real time services
Cont
Technology developed to target worldwide deployment of affordable, ubiquitous, always-on networks To meet the needs of business and residential end user markets 802.20 provides a specification for physical and medium access control layers for interoperable mobile wireless access systems Operations for licensed bands below 3.5 GHz Supports mobility classes up to 250 Km/h
IEEE 802.21
Goals
-To enable handover between heterogeneous technologies -Service continuity during and after handover
Cont..
Reduce power consumption by avoiding unnecessary scanning and using information. 802.16 module is turned on only if 802.16 is available. Reduce power consumption by using backend (core) network Reduce handover time by passing security/QoS information to next point of service Allow service providers to enforce their policies and roaming agreements
Cont..
MAC Provides compensation for long round trip delays Unique features introduced for Cognitive Radio based operation: spectrum sensing, spectrum management, intra-system co-existence, geo-location and security. Mobility and Portability IEEE 802.22 allows portability (nomadic use). In case the rules do change, IEEE 802.22 PHY is designed to support mobility of up to 114 km/hr (no hand-off is included in the current version).
Cont..
Internet Protocol: The principal communications protocol used for relaying datagrams (packets) across an internetwork (i.e. network of networks) using the Internet Protocol Suite. Responsible for routing packets across network boundaries (i.e. routers), it is the primary protocol that establishes the Internet. For the purposes of this standard, the term is limited to Internet Protocol version 4 (Ipv4, IETF RFC 791) and/or Internet Protocol version 6 (Ipv6, IETF RFC 2460) Layer 1/Layer 2: Within Layer 1 and/or Layer 2 relative to the ISO 7 Layer model as adapted by IEEE Std 802.
Cont..
Unauthorized service: Voice (or other ES applicable) service where the EUT does not have access to network services (L1/L2, and higher level IP services) needed to support an ES call. This may involve lack of security access to the L1/L2 network or lack of access for whatever reason (other than bandwidth) to an interconnected voice service at the higher layers.