Home > SP7 > SP708TEN
SP708TEN Datasheet | Sipex Corporation
Part No. : SP708TEN
Description : +3.0V/+3.3V Low Power Microprocessor Supervisory Circuits
Download : SP708TEN Click to Download
Page Number : 18
Manufacturer : Sipex Corporation
File Size : 213 Kb

SP708TEN Article About

From the latest WLAN standards and the latest WLAN technology point of view, WLAN future for the campus, home, hotel and major enterprises to provide high-speed wireless access capabilities to meet the various users of voice, images and even multimedia communication needs. WLAN There are two major standards development organizations. One is the IEEE 802.11 Working Group, one of Europes ETSI RES10 Working Group. Concentrated in the antenna under any circumstances can only use the best sending and receiving antennas. MIMO can simultaneously transmit the same carrier frequency different data streams. The walls and ceiling reflections, the antennas transmitting antenna in the receiver to generate a number of different signal intensity and phase length. Through the training to understand a particular transmission channel activities, you can use the mathematical process the raw data, from a single antenna to receive the mixed signal to recover. Therefore, only generate enough reflection, MIMO to work. Improve the multiple transmitter and receiver technology costs will increase system cost. 802.11n standard is expected in 2005 or 2006 approved. The first 802.11 standard was completed in 1997, it has passed in the ISM band using spread spectrum modulation techniques, providing up to 2Mbit / s data transfer rate. September 1999, IEEE Standards Board has adopted two appendices to the original standards. The first standard 802.11b, extends the physical layer performance 2.4GHz maintained, so that its data transfer rate up to 11Mbit / s. The second standard 802.11a, 5GHz band dedicated to the physical layer to provide a new, higher data transfer rate.
Microsoft will be discussed at this meeting zero-day vulnerabilities and its measures to cope with such problems. Computer attacks, the use of zero-day vulnerabilities are increased substantially, criminals often use more PC security flaw hijack join their botnet. According to the agenda shows, in addition to botnet, the Trojan horse, a new type of denial of service attacks, spam, phishing attacks, security technology flaws will also be the subject of the meeting. Douglas plan to discuss trends in e-mail authentication technology called Sender ID to be used to launch denial of service attacks. Evans, Anti-Phishing Working Group plans to sum up years of phishing attack strategies, discuss new trends in data theft attacks, including the use of subdomains, changing attack patterns, targeting smaller banks and payment services. E-mail security vendor MessageLabs senior antivirus technologist Alex plans for businesses and individuals to discuss the Trojan horse problems. These targeted Trojan horse attacks are very dangerous because they can avoid traditional security technology for large-scale attacks.

All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781