Committed to connecting the world

  •  
Submarine cables

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : F.VGP-REQ     
  ITU-T A.5 justification information for referenced document IEEE 802.11-2012 in draft F.VGP-REQ
1. Clear description of the referenced document:
Name: IEEE 802.11-2012
Title: IEEE Standard for Information technology—Telecommunications and information exchange between systems Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
2. Status of approval:
Approved by IEEE
3. Justification for the specific reference:
This Recommendation uses the wireless access in vehicular environments defined in IEEE 802.11 that allows an IEEE 802.11-compliant devices to communicate directly with another such device.
4. Current information, if any, about IPR issues:
No known issues.
5. Other useful information describing the "Quality" of the document:
The document is in existence, in previous versions, from 1999. WiFi standard defined by IEEE 802.11 is very widely used technology.
6. The degree of stability or maturity of the document:
It is an approved IEEE standard. The 2012 revision was published on March 2012. IEEE802.11 is a standard approved by IEEE SA in February 2012.
7. Relationship with other existing or emerging documents:
None
8. Any explicit references within that referenced document should also be listed:
3GPP TS 24.234, 3GPP System to Wireless Local Area Network (WLAN) interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3.1/
ETSI EN 301 893, Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Part 2: Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive.2/
FIPS PUB 180-3-2008, Secure Hash Standard.3/
FIPS PUB 197-2001, Advanced Encryption Standard (AES)./
FIPS SP800-38B, “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, Dworkin, M.”/
IANA EAP Method Type Numbers, http://www.iana.org/assignments/eap-numbers./
IEEE Std 754™-2008, IEEE Standard for Binary Floating-Point Arithmetic.4,5/
IEEE Std 802®-2001, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture./
IEEE Std 802.1AS™, IEEE Standard for Local and Metropolitan Area Networks—Timing and Synchronization for Time-Sensitive Applications in Bridged Local Area Networks./
IEEE Std 802.1X™-2004, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control./
IEEE Std 802.21™-2008, IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services./
IEEE Std C95.1™, IEEE Standard Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz./
IETF RFC 791, Internet Protocol, Sept. 1981.6/
IETF RFC 925, Multi-LAN Address Resolution, J. Postel, Oct. 1984./
IETF RFC 1035, Domain Names — Implementation and Specification, P. Mockapetris, Nov. 1987./
IETF RFC 1042, A Standard for the Transmission of IP Datagrams over IEEE 802® Networks, J. Postel, J. Reynolds, Feb. 1988./
IETF RFC 1321, The MD5 Message-Digest Algorithm, Apr. 1992 (status: informational)./
IETF RFC 2104, HMAC: Keyed-Hashing for Message Authentication, H. Krawczyk, M. Bellare, R. Canetti, Feb. 1997 (status: informational)./
IETF RFC 2409, The Internet Key Exchange (IKE), D. Harkins, D. Carrel, Nov. 1998 (status: Standards Track)./
IETF RFC 2460, Internet Protocol, Version 6 (IPv6), S. Deering, R. Hinden, Dec. 1998./
IETF RFC 3164, The BSD Syslog Protocol, Aug. 2001./
IETF RFC 3394, Advanced Encryption Standard (AES) Key Wrap Algorithm, J. Schaad, R. Housley, Sept. 2002 (status: informational)./
IETF RFC 3610, Counter with CBC-MAC (CCM), D. Whiting, R. Housley, N. Ferguson, Sept. 2003 (status: informational)./
IETF RFC 3629, UTF-8, a transformation format of ISO 10646, F. Yergeau, Nov. 2003./
IETF RFC 3748, Extensible Authentication Protocol (EAP), B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, June 2004./
IETF RFC 3825, Dynamic Host Configuration Protocol Option for Coordinate-based Location Configuration Information, Polk, J., Schnizlein, J., Linsner, M., July 2004./
IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, Jan. 2005./
IETF RFC 4017, Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs, D. Stanley, J. Walker, B. Aboba, Mar. 2005 (status: informational)./
IETF RFC 4282, The Network Access Identifier, Dec. 2005./
IETF RFC 4776, Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information, Nov. 2006./
IETF RFC 4861, Neighbor Discovery for IP version 6 (IPv6), T. Narten, E. Nordmark, W. Simpson, H. Soliman, Sept. 2007./
IETF RFC 5216, The EAP-TLS Authentication Protocol, D. Simon, B. Aboba, R. Hurst, March 2008./
IETF RFC 5297, Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES), D. Harkins, October 2008 (status: informational)./
ISO/IEC 3166-1, Codes for the representation of names of countries and their subdivisions—Part 1: Country codes.7/
ISO/IEC 7498-1:1994, Information technology—Open Systems Interconnection—Basic Reference Model: The Basic Model./
ISO/IEC 8802-2:1998, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 2: Logical link control./
ISO/IEC 8824-1:1995, Information technology—Abstract Syntax Notation One (ASN.1): Specification of basic notation./
ISO/IEC 8824-2:1995, Information technology—Abstract Syntax Notation One (ASN.1): Information object specification./
ISO/IEC 8824-3:1995, Information technology—Abstract Syntax Notation One (ASN.1): Constraint specification./
ISO/IEC 8824-4:1995, Information technology—Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications./
ISO/IEC 8825-1:1995, Information technology—ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)./
ISO/IEC 8825-2:1996, Information technology—ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)./
ISO/IEC 11802-5:1997(E), Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Technical reports and guidelines—Part 5:/
Medium Access Control (MAC) Bridging of Ethernet V2.0 in Local Area Networks (previously known as IEEE Std 802.1H-1997 [B21]8)./
ISO/IEC 15802-1:1995, Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 1: Medium Access Control (MAC) service definition./
ISO/IEC 15802-3, Information Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Common specifications—Part 3: Media Access Control (MAC) Bridges./
ITU-R Recommendation TF.460-4(2002), Standard-frequency and time-signal emissions.9/
ITU-T Recommendation Z.100 (03/93), CCITT specification and description language (SDL)./
ITU-T Recommendation Z.105 (03/95), SDL combined with ASN.1 (SDL/ASN.1)./
ITU-T Recommendation Z.120 (2004), Programming Languages—Formal Description Techniques (FDT)—Message Sequence Chart (MSC)./
OASIS Emergency Management Technical Committee, “Emergency Data Exchange Language (EDXL) Distribution Element, v. 1.0.” OASIS Standard EDXL-DE v1.0, May 2006./
9. Qualification of IEEE:
The IEEE was recognized under the provisions of ITU-T Recommendation A.5 on 1 November 1999. Qualifying information is on file with TSB.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5