(also Institute of Electrical and Electronics Engineers)
IEEE 802 definition
IEEE 802 is a family of standards for local area networks (LANs) and metropolitan area networks (MANs). These standards define the specifications for the PHY and DLL of the OSI model and cover various network technology, including Ethernet, Wi-Fi, and Bluetooth.
Key IEEE 802 standards
- IEEE 802.3: Ethernet LANs
- IEEE 802.11: Wi-Fi wireless LANs
- IEEE 802.15: wireless personal area networks (WPANs)
- IEEE 802.16: wireless metropolitan area networks (WMANs)
- IEEE 802.22: wireless regional area networks (WRANs)
IEEE 802 standards pros
- Widely used and recognized in the networking industry.
- Easy integration with new devices and into existing networks.
- Promote interoperability between different networking devices.
- Reduce costs and increase efficiency.
- Encourage innovation and drive progress in the industry.
- Provide a common framework for networking technologies.
- Enable global compatibility.
IEEE 802 standards cons
- Can be complex and difficult to understand, particularly for non-technical users.
- Might be expensive for startups or SMBs.
- Can lead to fragmentation and the development of incompatible technologies.
- May not always keep up with advances in technology.
- Can be challenging and time-consuming to implement.
IEEE 802 security features
Network access control. IEEE 802 offers a built-in access control system with an authentication mechanism for devices that want to attach to a LAN. Because it is complex for hackers to guess the authentication credentials, users will immediately receive an alert for a potential data breach if attackers enter incorrect credentials.
Layer 2 security protocol. The Medium Access Control Security (MACSec) offers point-to-point security on the links between nodes, maintaining data confidentiality and integrity.
Wi-Fi-protected access. The WPA protocol is a temporary one that replaces WEP to detect all WEP vulnerabilities that hackers might exploit to cause data leaks and theft. It also utilizes an encryption scheme and an authentication layer, preventing attackers from accessing users’ data.