Feeds

802.11n Wi-Fi spec nailed down, at last

Broadcom already sampling compatible chips

Securing Web Applications Made Simple and Scalable

Broadcom has begun sampling the first wireless chipsets that support the 802.11n draft specification that was finally approved yesterday for submission to the IEEE for ratification as a standard.

The chip maker claimed its Intensi-Fi WLAN chipset family supports the specification agreed by the IEEE Task Group, but is software-upgradeable to ensure they remain compatible with the standard should it change while it's gaining IEEE approval.

The finalisation of the 802.11n draft specification ends months of fighting between groups of companies touting their own visions of how the technology should work and what features the standard should deliver.

In August 2005, the three main rivals agreed to merge their respective suggestions into a combined Joint Proposal to the Task Group. In October, however, Intel and a number of other companies launched a fourth group, the Enhanced Wireless Consortium (EWC), in a bid to make the 802.11n proposal more suitable for consumer electronics and mobile applications.

Last week, the JP team and the EWC agreed to align their specifications and to work to combine them ahead of yesterday's Task Group meeting. Clearly they were successful.

The specification must now be formally submitted to the IEEE's 802.11 Working Group. Its engineers will vet the specification, tweaking it if necessary. Each modification must be put to the vote and win the support of 75 per cent of voters to be set in stone.

The final Working Group specification will then be submitted to the broader IEEE for ratification as a standard. That could happen late 2006 / early 2007. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.