Home > NE5 > NE5532ADR
NE5532ADR Datasheet | Texas Instruments
Part No. : NE5532ADR
Download : NE5532ADR Click to Download
Page Number : 10
Manufacturer : Texas Instruments
File Size : 238 Kb

NE5532ADR Article About

With the new IPSec standards have been gradually accepted by all the agencies in the formation of secure virtual private networks will have a more consistent measure. In a distributed computer network environment, the emergence of virtual private networks for network administrators with a good solution. Within each site in the enterprise, workstations, servers and databases by one or more LAN connections together. The local area network under the control of managers, and can be set up and deployment. Internet and other public network can interconnect these sites do so more economical than using private networks, while the ISP is responsible for administrative tasks. Remote workers and mobile employees can log on to the remote site where the bodies of the network. However, network administrators are facing a fundamental problem is that network security. Agencies will use the public network information is easily stolen the equivalent of an unauthorized user who set up a "portal." To solve this problem, network administrators will choose the various forms of encryption and authentication. If you take a special encryption and authentication, it provides security level is relatively low. And no network managers and security compatible with the willingness to limit the workstations, servers, routers, firewall options.
Microsoft pointed out in the application form, the existing PC business model there is a problem, which is that it requires consumers to use their brains more or less purchasing PC, PC in accordance with pay-per-use model that allows users to purchase one when facing elimination maximize investments and bother Zanji pain. Envisaged in the blueprint for Microsoft, the user can have more choice of hardware and software, allowing users according to actual demand rather than by the use of computers to investment cycles. For example, if a user just need to browse the Web, so they can choose the general performance of a computer network to play computer games, if, if, then they can choose the configuration of high-end performance, so that different users can find what they need the computer is configured.

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781