802.xx is a family of networking specifications developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). There are several specifications in the family. The following table identifies 802.xx specifications and provides links to individual definitions.


  • Family of specifications for wireless local area network (WLAN) use
  • Employs phase-shift keying
  • Provides a wireless alternative to wired Ethernet LANs
  • Several enhancements as defined below


  • Enhancement to 802.11 that applies to wireless ATM systems
  • Used in access hubs
  • Enhanced data speed
  • Frequency range 5.725 GHz to 5.850 GHz


  • Enhancement to 802.11 that employs complementary code keying (CCK)
  • High data speed
  • Low susceptibility to multipath-propagation interference
  • Frequency range 2.400 GHz to 2.4835 GHz


  • Enhancement to 802.11 that allows for global Roaming
  • Attributes similar to 802.11b
  • Particulars can be set at Media Access Control (MAC) layer


  • Enhancement to 802.11 that includes Quality of Service (QoS) features
  • Facilitates prioritization of data, voice, and video transmissions


  • Enhancement to 802.11 that offers wireless transmission over relatively short distances
  • Operates at up to 54 megabits per second (Mbps)


  • Enhancement to 802.11a that resolves interference issues
  • Dynamic frequency selection (DFS)
  • Transmit power control (TPC)


  • Enhancement to 802.11 that offers additional security for WLAN applications


  • Japanese regulatory extensions to 802.11a specification
  • Frequency range 4.9 GHz to 5.0 GHz


  • Radio resource measurements for networks using 802.11 family specifications


  • Maintenance of 802.11 family specifications
  • Corrections and amendments to existing documentation


  • Generic term for 802.11 family specifications under development
  • General term for all 802.11 family specifications


  • Originally created to ensure compatibility among 802.11b products
  • Can run under any 802.11 standard
  • Indicates interoperability certification by Wi-Fi Alliance


  • A communications specification for wireless personal area networks (WPANs)


  • A group of broadband wireless communications standards for metropolitan area networks (MANs)


  • Enhancement to 802.16 for non-line-of-sight extensions in the 2-11 GHz spectrum
  • Delivers up to 70 Mbps at distances up to 31 miles


  • Enhancement to 802.16 that enables connections for mobile devices


  • Designed to enhance the security of wireless local area networks (WLANs) that follow the IEEE 802.11 standard
  • Provides an authentication framework for wireless LANs
  • The algorithm that determines user authenticity is left open
  • Multiple algorithms are possible


  • A standard specification for Ethernet
  • Specifies the physical media and the working characteristics of the network













Wireless local are networks (LANs) have a broad range of standards, some of which are well established and interoperable, others of which are still emerging, and when it comes to security standards, interoperability may be a way off yet.

The most talked about standards are the communication standards, 802.11a, b and g. Today, 802.11b access points that operate in the 2.4Ghz frequency with 11 Mbps throughput dominate the market. But that may soon change.

A new standard likely to be ratified later this year is 802.11g, which offers both higher throughput and backward compatibility with 802.11b access points. These access points operate in the same frequency but have a throughput of 54Mbps. Because 802.11g works in the same 2.4 GHz frequency as 802.11b, the systems are compatible, said Gemma Paulo, a senior analyst with In-Stat/MDR, a Scottsdale, Ariz., based research firm.

Another standard, 802.11a, offers the same high throughput. But these systems operate in the 5 Ghz spectrum, which is both an advantage and a drawback. Since they use a different frequency, they are not backward-compatible with the dominant 802.11b standard. However, 802.11a has already been ratified so interoperability among vendors is not a problem. And, because it uses a different frequency, there is much less interference.

In New York city's high rises, wireless LAN are so prevalent and so close together that it can often be tough to get a clear signal, said Mark Van Pelt, a wireless LAN consultant with Manchester Wireless in East Brunswick, N.J. In addition, microwaves and cordless phones also operate at the 2.4 GHz spectrum. In that cluttered environment, 802.11a nodes may be the best solution, he said.

Security standards are much less cut and dried.

Basic wLAN security has a standard known as wireless encryption protocol (WEP), which is part of the 802.11b standard and is included in most enterprise-class wireless systems. But WEP is flawed and can be easily hacked into using tools readily available on the Internet.

In an attempt to address this weakness, manufacturers have come up with their own proprietary approaches. Manufacturers such as Holtsville, NY, wireless systems company, Symbol Technologies, Inc., and Cisco Systems, Inc. have developed enhancements to WEP that rotate the encryption key and require user authentication, both of which make it tougher for hackers to crack the code.

But these systems do not work in multi-vendor systems, said Al Potter, manager of the network security lab for the Herdon, VA, security certification company, ICSA Labs. Potter tests wireless security systems for interoperability and said that any enhancement beyond WEP causes problems when it is in a multi-vendor system.

The Wi-Fi Alliance is developing its own standard known as Wi-Fi Protective Access (WPA). Potter said this is a short-term fix and provides essentially a snapshot of the solutions currently on the market and a way to make them interoperable.

A more ambitious approach is being taken with the 802.1i and 802.1x standards. The 802.1i is focusing on a new encryption protocol that improves on WEP called temporal key integrity protocol. But that too is still on the horizon. Chris Kozup a senior research analyst with Stamford, Conn., research firm, the META Group said that testing of the protocol is not scheduled to begin until later this year.

User authentication is also working its way from proprietary approaches towards a standard. One of the most popular is known as LEAP -- lightweight extensible authentication protocol. LEAP was developed by Cisco systems, Inc. and is proprietary. However, to help grow the market, Cisco has been licensing LEAP for free to vendors to allow them to integrate LEAP into their clients and authentication servers.

But LEAP is facing a challenge from a standards-based approach called PEAP, protected extensible authentication protocol. PEAP was developed by Cisco and well as Microsoft and RSA Security, Inc., the Bedford, Mass. security systems vendor. PEAP uses a certificate approach to authentication where the user's identity is verified by a digital certificate.

While this approach is standards-based, it is not yet been ratified. So today there are still problems with interoperability and since PEAP is relatively new it only works with a Windows 2000 and Windows XP.

Today, most businesses are shying away from standards that have yet to be ratified, like 802.11g, or using proprietary solutions in security where it makes the most sense.