Home > AM7 > AM7968-175JC
AM7968-175JC Datasheet | Advanced Micro Devices
Part No. : AM7968-175JC
Description : TAXIchip Integrated Circuits(Transparent Asynchronous Xmitter-Receiver Interface)
Download : AM7968-175JC Click to Download
Page Number : 128
Manufacturer : Advanced Micro Devices
File Size : 730 Kb

AM7968-175JC Article About

Anchiva parallel multi-core technology uses data packets control the dynamic equilibrium distribution deal with mechanisms to achieve traffic load balancing between the multi-core, greatly enhance the operational efficiency of the system. And the general control by multi-core CPU to complete one of the nuclear balance traffic distribution, and Anchiva to take full advantage of hardware resources to achieve optimal performance, not CPU-core to complete a balanced distribution of traffic, but by control technology specifically developed by the chip card in the completion of flow in a balanced distribution between the different CPU, so that the same multi-core CPUs processing power further play. Also implemented on the application of multi-core processing is also important scheduling, application scheduling in parallel and serial processing are generally two modes. Clearly, in order to achieve the full resources of multi-core mining and use of parallel application scheduling approach is necessary, specially prepared for this Anchiva their parallel application processing engine in order to fully utilize multi-core resources.
Since each radio station has a unique physical address card, it can be maintained manually in the AP group allows access to the MAC address list, to achieve physical address filtering. This program requires the MAC address of AP in the list must be updated, scalability is poor, the machine can not be achieved roaming between different AP; and MAC addresses can be forged, in theory, so this is a lower-level certification authority. In the link layer using RC4 symmetric encryption technology, the users encryption key with the AP, must be allowed the same access to key network resources, thus preventing non-authorized users access to monitor and illegal users. WEP provides 40-bit and 128-bit key length mechanism, but it still has many defects, such as a service area, all users share the same key, a user is lost or leaked key will allow the entire network secure. And because WEP encryption was found to have security flaws that can be cracked within a few hours. Detailed analysis, see below.

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781