TITLE

Motorola Puts Security on Networking Chip

PUB. DATE
October 2003
SOURCE
Electronic News;10/6/2003, Vol. 49 Issue 40, pN.PAG
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the launch of MPC885 PowerQuicc I and MPC8272 PowerQuicc II security chip processors by Motorola in the U.S. in October 2003. Benefits of using on-chip security; Potential applications of the PowerQuicc chips; Factors which drive the pervasive use of Internet protocol security.
ACCESSION #
11099831

 

Related Articles

  • MOTOROLA ENHANCES CDMA IP RADIO ACCESS NETWORK PORTFOLIO.  // Networks Update;Oct2004, pN.PAG 

    This article focuses on the decision of Motorola Inc. to enhance its Code Division Multiple Access (CDMA) Internet Protocol Radio Access Network portfolio. Motorola has enhanced its CDMA IP Radio Access Network (IP-RAN) portfolio with an expanded packet base station product line and a next...

  • Active FTP.  // Network Dictionary;2007, p21 

    A definition of the term "active FTP" is presented. It refers to an alternative file transfer protocol (FTP) mode which was designed before firewalls. Under active FTP, the client connects from a random unprivileged port to the FTP server's command port, port 21, then the client starts listening...

  • SOCKS v5.  // Network Dictionary;2007, p451 

    An encyclopedia entry about "SOCKS v5" is presented. It is the latest version of the SOCKS protocol, which is designed to provide a framework for client-server applications in both the transmission control protocol (TCP) and User Datagram Protocol (UDP) domains to use the services of a network...

  • AEP Netilla Security Platform B-Class. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Oct2005, p68 

    Evaluates AEP Netilla Security Platform B-Class computer network security architecture from AEP Networks. Capabilities of the appliance; Features of the device; Pros and cons.

  • NECESSITY OF NEW LAYERED APPROACH TO NETWORK SECURITY. Kryukov, Dmitry // ICTE in Regional Development: 2006 Annual Proceedings;2006, p127 

    Security solutions for networks typically appear as single products or protocols that correspond to a single or few layers of the OSI network reference model (protocol stack). The result is a wide variety of protocols and products, which provide solutions to very specific problems and...

  • Will 'Kebab' skewer IPv6? Tolly, Kevin // Network World;2/2/2004, Vol. 21 Issue 5, p18 

    Features the IPv6 standard for electronic devices. Useful enhancements; Integrated security; Aim of expanding the IP address space beyond the four octets that IPv4 offers.

  • Tunnel.  // Network Dictionary;2007, p498 

    An encyclopedia entry for "Tunnel" is presented. It refers to a communication channel created in a computer network by encapsulating a communication protocol's data packets in a second protocol that normally would be carried above, or the same layer as, the first one. Most of the time, the...

  • What's Hiding In Your Datacenter? Robb, Drew // Business Communications Review;Feb2005, Vol. 35 Issue 2, p56 

    The article presents information on the computer network protocol DECnet. IP is far simpler to learn, easier to program and relatively easy to implement compared to DECnet. IP's power and ubiquity make it impossible to ignore, but that doesn't mean it is perfect. Commonly reported drawbacks,...

  • A Performance Comparison of MDS Authenticated Routing Traffic with EIGRP, RIPv2, and OSPF.  // International Arab Journal of Information Technology (IAJIT);Oct2010, Vol. 7 Issue 4, p380 

    No abstract available.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics