802 Standards. IEEE 802.2, 802.3, 802.5, 802
802 Standards. IEEE 802.2, 802.3, 802.5, 802
802 Standards. IEEE 802.2, 802.3, 802.5, 802
11 | Networks & Communications
Networks & Communications
http://networkcommunications.blogspot.com/ Network and Communication Technologies
Sunday, June 5, 2011 Labels
802 Standards. IEEE 802.2, 802.3, 802.5, 802.11 A | A + | A ++ Communications (3)
Computers (1)
Databases (2)
Internet (8)
Local Networks (3)
Mobile Telecommunications (8)
Multimedia Systems (6)
Network Communications (2)
Network Security (6)
Networks (9)
Optical Communication (2)
Programming (2)
Technical Informatics (3)
Wireless Technologies (5)
? ?
Most popular
802 Standards. IEEE 802.2, 802.3, 802.5, 802.11 802 Standards. IEEE 802.2, 802.3, 802.5, 802.11
Network Topology Star, Bus, Mesh, Ring Topologies
The Institute of Electrical and Electronics Engineers is a standards setting body. Each of their Use of networks
standards is numbered and a subset of the number is the actual standard. The 802 family of Security in Mobile Networks. Faulttolerance
standards is ones developed for computer networking. Introduction to HTML. Basic HTML tags
2G Second generation network GSM
In this section, you will learn:
Network Security Threats
Address Resolution Protocol (ARP)
What the 802.2, 802.3, 802.5, 802.11 standards encompass;
Virtual Local Area Networks (VLANs)
Features, topology, and network cabling for each of these standars. Domain Name System (DNS)
First, let's discuss 802. IEEE, or Institute of Electrical and Electronics Engineers, is a
Archive
standards setting body. They create standards for things like networking so products can be
compatible with one another. You may have heard of IEEE 802.11b this is the standard that 1G 1st Generation mobile communications
IEEE has set (in this example, wirelessb networking). VoIP VoiceOverInternet Protocol
Neural Networks
In this section, we will look at several networking technologies: 802.2, 802.3, 802.5, 802.11, Network Adapter
and FDDI. Each of these is just a standard set of technologies, each with its own
Cable standards in networking
characteristics.
History of computers
802.2 Logical Link Control Computer Viruses
802 Standards. IEEE 802.2, 802.3, 802.5, 802.11
The technical definition for 802.2 is "the standard for the upper Data Link Layer sublayer also Network Topology Star, Bus, Mesh, Ring Topologies
known as the Logical Link Control layer. It is used with the 802.3, 802.4, and 802.5 standards Use of networks
(lower DL sublayers)."
802.2 "specifies the general interface between the network layer (IP, IPX, etc) and the data 1 2 3 4 5 6
link layer (Ethernet, Token Ring, etc).
Basically, think of the 802.2 as the "translator" for the Data Link Layer. 802.2 is concerned
with managing traffic over the physical network. It is responsible for flow and error control.
The Data Link Layer wants to send some data over the network, 802.2 Logical Link Control
helps make this possible. It also helps by identifying the line protocol, like NetBIOS, or
Netware.
The LLC acts like a software bus allowing multiple higher layer protocols to access one or
more lower layer networks. For example, if you have a server with multiple network
interface cards, the LLC will forward packers from those upper layer protocols to the
appropriate network interface. This allows the upper layer protocols to not need specific
knowledge of the lower layer networks in use.
802.3 Ethernet
Now that we have an overview of the OSI model, we can continue on these topics. I hope you
have a clearer picture of the network model and where things fit on it.
802.3 is the standard which Ethernet operates by. It is the standard for CSMA/CD (Carrier
Sense Multiple Access with Collision Detection). This standard encompasses both the MAC and
Physical Layer standards.
CSMA/CD is what Ethernet uses to control access to the network medium (network cable). If
there is no data, any node may attempt to transmit, if the nodes detect a collision, both stop
transmitting and wait a random amount of time before retransmitting the data.
The original 802.3 standard is 10 Mbps (Megabits per second). 802.3u defined the 100 Mbps
(Fast Ethernet) standard, 802.3z/802.3ab defined 1000 Mbps Gigabit Ethernet, and 802.3ae
define 10 Gigabit Ethernet.
Commonly, Ethernet networks transmit data in packets, or small bits of information. A packet
can be a minimum size of 72 bytes or a maximum of 1518 bytes.
http://networkcommunications.blogspot.in/2011/06/802standardsieee80228023802580211.html 1/3
5/10/2017 802 Standards. IEEE 802.2, 802.3, 802.5, 802.11 | Networks & Communications
The most common topology for Ethernet is the star topology.
802.5 Token Ring
As we mentioned earlier when discussing the ring topology, Token Ring was developed
primarily by IBM. Token ring is designed to use the ring topology and utilizes a token to
control the transmission of data on the network.
The token is a special frame which is designed to travel from node to node around the ring.
When it does not have any data attached to it, a node on the network can modify the frame,
attach its data and transmit. Each node on the network checks the token as it passes to see if
the data is intended for that node, if it is; it accepts the data and transmits a new token. If it
is not intended for that node, it retransmits the token on to the next node.
The token ring network is designed in such a way that each node on the network is
guaranteed access to the token at some point. This equalizes the data transfer on the
network. This is different from an Ethernet network where each workstation has equal access
to grab the available bandwidth, with the possible of a node using more bandwidth than other
nodes.
Originally, token ring operated at a speed of about 4 Mbps and 16 Mbps. 802.5t allows for
100 Mbps speeds and 802.5v provides for 1 Gbps over fibber.
Token ring can be run over a star topology as well as the ring topology.
There are three major cable types for token ring: Unshielded twisted pair (UTP), Shielded
twisted pair (STP), and fibber.
Token ring utilizes a Multistation Access Unit (MAU) as a central wiring hub. This is also
sometimes called a MSAU when referring to token ring networks.
802.11 Wireless Network Standards
802.11 is the collection of standards setup for wireless networking. You are probably familiar
with the three popular standards: 802.11a, 802.11b, 802.11g and latest one is 802.11n. Each
standard uses a frequency to connect to the network and has a defined upper limit for data
transfer speeds.
802.11a was one of the first wireless standards. 802.11a operates in the 5Ghz radio band and
can achieve a maximum of 54Mbps. Wasn't as popular as the 802.11b standard due to higher
prices and lower range.
802.11b operates in the 2.4Ghz band and supports up to 11 Mbps. Range of up to several
hundred feet in theory. The first real consumer option for wireless and very popular.
802.11g is a standard in the 2.4Ghz band operating at 54Mbps. Since it operates in the same
band as 802.11b, 802.11g is compatible with 802.11b equipment. 802.11a is not directly
compatible with 802.11b or 802.11g since it operates in a different band.
Wireless LANs primarily use CSMA/CA Carrier Sense Multiple Access/Collision Avoidance. It
has a "listen before talk" method of minimizing collisions on the wireless network. This
results in less need for retransmitting data.
Wireless standards operate within a wireless topology.
Introduction to Networking
By: Azhar Qureshi
September 2010
Peetabeck Academy, Fort Albany, Ontario
Like 31 people like this. Be the first of your friends.
Comments:
http://networkcommunications.blogspot.in/2011/06/802standardsieee80228023802580211.html 2/3