R.V. College of Engineering, Bengaluru (Autonomous Institution Affiliated To VTU) Department of Electronics and Communication Engineering
R.V. College of Engineering, Bengaluru (Autonomous Institution Affiliated To VTU) Department of Electronics and Communication Engineering
6th Semester
Self-Study Report on
Sub Topic: IEEE Standards for Communication
USN Name
Date: 27.03.2019
INTRODUCTION
Each year, the IEEE-SA conducts over 200 standards ballots, a process by which proposed standards
are voted upon for technical reliability and soundness. In 2017, IEEE had over 1100 active standards,
with over 600 standards under development.
One of the more notable are the IEEE 802 LAN/MAN group of standards, with the widely used
computer networking standards for both wired and wireless networks.
The IEEE standards development process can be broken down into seven basic steps:
MAC Sublayer
In Standard Ethernet, the MAC sublayer governs the operation of the access method. It also frames data
received from the upper layer and passes them to the physical layer.
Frame Length
Ethernet has imposed restrictions on both the minimum and maximum lengths of a frame. The minimum
length restriction is required for the correct operation of CSMA/CD as we will see shortly. An Ethernet frame
needs to have a minimum length of 512 bits or 64 bytes. The standard defines the maximum length of a frame
(without preamble and SFD field) as 1518 bytes. If we subtract the 18 bytes of header and trailer, the
maximum length of the payload is 1500 bytes.
A source address is always a unicast address-the frame comes from only one station. The destination address,
however, can be unicast, multicast, or broadcast. A unicast destination address defines only one recipient; the
relationship between the sender and the receiver is one-to-one. A multicast destination address defines a group
of addresses; the relationship between the sender and the receivers is one-to-many. The broadcast address is a
special case of the multicast address; the recipients are all the stations on the LAN. A broadcast destination
address is forty-eight.
Bridged Ethernet
Bridges have two effects on an Ethernet LAN: They raise the bandwidth and they separate collision
domains.
Switched Ethernet
A layer 2 switch is an N-port bridge with additional sophistication that allows faster handling of the packets.
Evolution from a bridged Ethernet to a switched Ethernet was a big step that opened the way to an even faster
Ethernet,
Full-Duplex Ethernet
One of the limitations of 10Base5 and lOBase2 is that communication is half-duplex (lOBase-T is always full-
duplex); a station can either send or receive, but may not do both at the same time. The next step in the
evolution was to move from switched Ethernet to full-duplex switched Ethernet.
IEEE 802.11a (Wi-Fi)
The IEEE 802.11a standard is the first standard in the IEEE 802.11 series. It defines a WiFi format for
providing wireless connectivity in the 5 GHz ISM band to give raw data speeds of up to 54Mbps.
Although, alphabetically it is the first standard in the 802.11 series, t was released at the same time as IEEE
802.11b which was aimed at connectivity using the 2.4 GHz ISM band.
Using the technology of the time, IEEE 802.11a was more costly and a little more difficult to implement as it
operated at 5 GHz rather than 2.4 GHz and as a result it was less widely used.
802.11a boasted an impressive level of performance. It was able to transfer data with raw data rates up to 54
Mbps and at the time it was thought to have a good range, although it could not provide the maximum data
rate at its extremes.
Transport layer
The Bluetooth transport layer is
roughly equivalent to the
traditional OSI PHY and MAC
layers. All Bluetooth devices are
required to implement this layer
in hardware. The transport layer
is composed from the radio,
baseband, and link manager
layers, which are described
below.
Middleware Layer
The middleware layer consists of several software components that are designed to encourage
interoperability among Bluetooth devices. Many of the components in this layer are optional; generally,
only high-powered devices (like PCs) will implement the entire stack. The components in the middleware
layer communicate with the transport layer using the standardized Host Controller Interface (HCI).
Bluetooth Security
Bluetooth uses a pairing process to establish encryption and authentication between two devices. The
pairing process is performed using a series of keys as an input to the SAFER+ block cipher. In the
interest of brevity, we will not discuss here the inner workings of SAFER+ or the key generation in
detail; the interested reader may consult for more information.
In the first stage of the pairing process, the devices generate a shared 128-bit initialization key using the
master’s 48-bit hardware address; a shared 128-bit random number; and a user-specified PIN of up to 128
bits. The former two values are exchanged in plaintext, and the latter is manually inputted by the user
into both devices. The devices then encrypt their link using this key, and negotiate a 128-bit link key. The
two devices then use the link key to perform a challenge/response protocol. If successful, then the two
devices store the link key and discard the initialization key. Any future communication between these
two devices is optionally encrypted using a 128-bit session key based on this stored link key.
In 2005, Sony announced that the PlayStation 3 video game console would use Bluetooth to
communicate with wireless gamepads and accessories. Sony has sold over 100 million each of its two
previous-generation PlayStation consoles since they were released in 1994 and 2000, respectively. If the
PlayStation 3 meets with similar success in the marketplace, it could have a significant impact on
consumer acceptance of Bluetooth devices beyond the mobile phone market.
IEEE 802.20 (Cellular Connectivity)
In March 2002, the Mobile Broadband Wireless Access (MBWA) Study Group was formed within the IEEE
802.16 committee to determine the interest and feasibility of a new broadband wireless standard. The study
concluded that 802.16 and MBWA addressed the interests of two different markets, and thus IEEE 802.20 as
an official working group was born.
The IEEE 802.20 MBWA, so-called Mobile-Fi, may change the direction of wireless networking, and sits
on existing cellular towers, promising the same coverage area as a mobile phone system with the speed
of a Wi-Fi connection. Mobile-Fi is for truly mobile, highspeed data, and truly mobile rates of 20 Mb/s
are possible.
PHY
The physical (PHY) layer
specification consists of two
different duplexing modes:
Time Division Duplexing
(TDD) and Frequency
Division Duplexing (FDD),
two different forward link
hopping modes: Symbol
Rate Hopping and Block-
Hopping), two different
synchronization modes:
Semi Synchronous and
Asynchronous, and two
different multicarrier modes:
Multi Carrier On and Multi
Carrier Off.
MAC
The MAC layer includes
session, convergence,
security, and lower MAC functions. The lower MAC sublayer controls operations of data channels: Forward
Traffic Channel and Reverse Traffic Channel [19]. It includes control channel MAC protocol, access channel
MAC protocol, shared signalling MAC protocol, forward traffic channel MAC protocol, reverse control
channel MAC protocol, and reverse traffic channel MAC
protocol.
• [IEEE802.15.1] IEEE, "IEEE 802.15 WPAN Task Group 1 (TG1)", IEEE Task Group.
• https://www.electronics-notes.com/articles/connectivity/wifi-ieee-802-11/802-11a.php
• https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-816553