Definition
IEEE 802 refers to a group of standards for metropolitan area networks (MANs) and local area networks (LANs). These standards outline the specifications for the OSI model’s PHY and DLL and encompass several network technologies, such as Bluetooth, Wi-Fi, and Ethernet.
Key IEEE 802 Standards
- IEEE 802.22: wireless regional area networks (WRANs)
- IEEE 802.16: wireless metropolitan area networks (WMANs)
- IEEE 802.15: wireless personal area networks (WPANs)
- IEEE 802.11: Wi-Fi wireless LANs
- IEEE 802.3: Ethernet LANs
Pros and Cons of IEEE 802 Standards
Pros
- Extensively used and recognized in the field of networking.
- Easily compatible with modern devices and existing networks.
- Supports interoperability among various networking systems.
- Lowers costs and increases effectiveness.
- Facilitates innovation and steers progress in the industry.
- Offers a universal framework for networking technologies.
- Allows global compatibility.
Cons
- It may be complex and difficult to comprehend, especially for non-technical users.
- It can be expensive for small and medium-sized businesses (SMBs) or startups.
- This might cause the disintegration and improvement of incompatible technologies.
- It may not always cope with the technological advancements.
- Implementation may be challenging and time-consuming.
IEEE 802 Security Features
- Network access control: IEEE 802 provides an integrated access control system with a verification mechanism for devices that want to connect to a LAN. Since it is difficult for cybercriminals to guess the validation credentials, users instantly get a notification for possible data breaches if the attackers enter the wrong logins.
- Layer 2 security protocol: The MACSec (Medium Access Control security) provides point-to-point security on the connection between nodes, upholding data integrity and confidentiality.
- Wi-Fi protected access (WPA): The WPA protocol substitutes WEP to identify all WEP weaknesses that cybercriminals may exploit to cause data breaches and theft. Moreover, it incorporates an authentication layer and an encryption scheme to prevent hackers from accessing user data.