HOME





TR-069
Technical Report 069 (TR-069) is a document by the Broadband Forum that specifies the CPE WAN Management Protocol (CWMP). CWMP is a SOAP-based protocol for communication between an internet service provider auto configuration server (ACS) and customer-premises equipment (CPE). Features include auto-configuration, firmware image management, status and performance monitoring, and diagnostics. Examples of CPE types include modems, routers, gateways, set-top boxes, and VoIP-phones. TR-069 was first published in May 2004, with amendments in 2006, 2007, 2010, July 2011 (version 1.3), and November 2013 (version 1.4 am5) The Home Gateway Initiative (HGI), Digital Video Broadcasting Project (DVB) and WiMAX Forum have endorsed CWMP. As of 2020, CWMP is deployed in nearly a billion devices. Features * Service activation and reconfiguration ** Initial configuration of the service as part of zero-touch or one-touch configuration process ** Service re-establishment (ex. after dev ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Broadband Forum
The Broadband Forum is a non-profit industry consortium dedicated to developing broadband network specifications. Members include telecommunications networking and service provider companies, broadband device and equipment vendors, consultants and independent testing labs (ITLs). Service provider members are primarily wire-line service providers (non-mobile) telephone company, telephone companies. History The DSL Forum was founded in 1994 with about 200 member companies in different divisions of the telecommunication and information technology sector. It is used as a platform for companies that operate in the broadband market. Its initial main purpose was the establishment of new standards around digital subscriber line communication products such as provisioning (telecommunications), provisioning. This cooperation has brought different standardizations for ADSL, SHDSL, VDSL, ADSL2+ and VDSL2. The group was established in November 1994 as the ADSL Forum and was renamed to DSL ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


University Of New Hampshire InterOperability Laboratory
The University of New Hampshire InterOperability Laboratory (UNH-IOL) is an independent test organization that provides interoperability and standards conformance testing for networking, telecommunications, data storage, and consumer technology products. Founded in 1988, it employs approximately 25 full-time staff members and over 100 part-time undergraduate and graduate students, and counts over 150 companies as members. History The UNH-IOL began as a project of the University's Research Computing Center (RCC). In 1988 the RCC was testing Fiber Distributed Data Interface (FDDI) equipment with the intention of deploying it in its network. The RCC found that equipment from two vendors did not work together and contacted the vendors to find a solution. The two vendors cooperated with the RCC to solve the problem which was caused by differences between the draft and final FDDI specification. During this same time period the RCC was testing 10BASE-T Ethernet interfaces for another p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Customer-premises Equipment
In telecommunications, a customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc"). The demarc is a point established in a building or complex to separate customer equipment from the equipment located in either the distribution infrastructure or central office of the communications service provider. CPE generally refers to devices such as telephones, routers, network switches, residential gateways (RG), set-top boxes, fixed mobile convergence products, home networking adapters and Internet access gateways that enable consumers to access providers' communication services and distribute them in a residence or enterprise with a local area network (LAN). A CPE can be an active equipment, as the ones mentioned above, or passive equipment such as analog telephone adapters (ATA) or xDSL-splitters. This i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Digital Video Broadcasting
Digital Video Broadcasting (DVB) is a set of international open standards for digital television. DVB standards are maintained by the DVB Project, an international industry consortium, and are published by a Joint Technical Committee (JTC) of the European Telecommunications Standards Institute (ETSI), European Committee for Electrotechnical Standardization (CENELEC) and European Broadcasting Union (EBU). Transmission DVB systems distribute data using a variety of approaches, including: * Satellite: DVB-S, DVB-DSNG, DVB-S2, DVB-S2X and DVB-SH ** DVB-SMATV for distribution via SMATV * Cable: DVB-C, DVB-C2 * Terrestrial television: DVB-T, DVB-T2 ** Digital terrestrial television for handhelds: DVB-H, DVB-SH * Microwave: using DTT ( DVB-MT), the MMDS ( DVB-MC), and/or MVDS standards ( DVB-MS) These standards define the physical layer and data link layer of the distribution system. Devices interact with the physical layer via a synchronous parallel interface ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Positive Technologies
Positive Technologies is a Russian information security research company and a global leader in cybersecurity. They are the organizer of Positive Hack Days (PHDays). The Company was founded in 2002 by Yury Maksimov, Dmitry Maksimov and Eugene Kireev. In 2021, Positive Technologies listed on Moscow Exchange The Moscow Exchange (MOEX; , ) is the largest exchange in Russia, operating trading markets in equities, bonds, derivatives, the foreign exchange market, money markets, and precious metals. The Moscow Exchange also operates Russia's central secur ... through direct offering, becoming Russia's first public cybersecurity company. In 2022, the Company ranked 14th among Russia's most valued IT-corporations. References External links * Russian companies established in 2002 {{Russia-company-stub ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Botnet
A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a portmanteau of the words "robot" and "Computer network, network". The term is usually used with a negative or malicious connotation. Overview A botnet is a logical collection of Internet-connected devices, such as computers, smartphones or Internet of things (IoT) devices whose Computer security, security have been breached and control ceded to a third party. Each compromised device, known as a "bot," is created when a device is penetrated by software from a ''malware'' (malicious software) distribution. The controller of a botnet is able to direct the activities of these comp ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mirai (malware)
Mirai (from the Japanese word for "future", 未来) is malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' website, an attack on French web host OVH, and the October 2016 DDoS attacks on Dyn. According to a chat log between Anna-senpai (the malware's original author) and Robert Coelho, Mirai was named after the 2011 TV anime series '' Mirai Nikki''. The software was initially used by the creators to DDoS ''Minecraft'' servers and companies offering DDoS protection to ''Minecraft'' servers, with the author ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Service Provider
A service provider (SP) is an organization that provides services, such as consulting, legal, real estate, communications, storage, and processing services, to other organizations. Although a service provider can be a sub-unit of the organization that it serves, it is usually a third-party or outsourced supplier. Examples include telecommunications service providers (TSPs), application service providers (ASPs), storage service providers (SSPs), and internet service providers (ISPs). A more traditional term is service bureau. IT professionals sometimes differentiate between service providers by categorizing them as type I, II, or III. The three service types are recognized by the IT industry although specifically defined by ITIL and the U.S. Telecommunications Act of 1996. *Type I: internal service provider *Type II: shared service provider *Type III: external service provider Type III SPs provide IT services to external customers and subsequently can be referred to as external ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

XMPP
Extensible Messaging and Presence Protocol (abbreviation XMPP, originally named Jabber) is an Open standard, open communication protocol designed for instant messaging (IM), presence information, and contact list maintenance. Based on XML (Extensible Markup Language), it enables the near-real-time exchange of structured data between two or more network entities. Designed to be Extensibility, extensible, the protocol offers a multitude of applications beyond traditional IM in the broader realm of message-oriented middleware, including signalling for Voice over IP, VoIP, video, file transfer, Game, gaming and other uses. Unlike most commercial instant messaging protocols, XMPP is defined in an open standard in the application layer. The architecture of the XMPP network is similar to email; anyone can run their own XMPP server and there is no central master server. This Federation (information technology), federated open system (computing), open system approach allows users to int ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




User Datagram Protocol
In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in Network packet, packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths. UDP is a connectionless protocol, meaning that messages are sent without negotiating a connection and that UDP does not keep track of what it has sent. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. It has no Handshake (computing), handshaking dialogues and thus exposes the user's program to any Reliability (computer networking), unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an applica ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


STUN
STUN (Session Traversal Utilities for NAT; originally Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) is a standardized set of methods, including a network protocol, for traversal of network address translator (NAT) gateways in applications of real-time voice, video, messaging, and other interactive communications. STUN is a tool used by other protocols, such as Interactive Connectivity Establishment (ICE), the Session Initiation Protocol (SIP), and WebRTC. It provides a tool for hosts to discover the presence of a network address translator, and to discover the mapped, usually public, Internet Protocol (IP) address and port number that the NAT has allocated for the application's User Datagram Protocol (UDP) flows to remote hosts. The protocol requires assistance from a third-party network server (STUN server) located on the opposing (public) side of the NAT, usually the public Internet. STUN was first announced in RFC 3489; the title was ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Set-top Box
A set-top box (STB), also known as a cable converter box, cable box, receiver, or simply box, and historically television decoder or a converter, is an information appliance device that generally contains a Tuner (radio)#Television, TV tuner input and displays output to a television set, turning the source signal into media (communications), content in a form that can then be displayed on the television screen or other display device. It is designed to be placed alongside or "on top" (hence the name) of a television set. Set-top boxes are used in cable television, satellite television, terrestrial television and Internet Protocol television systems, as well as other uses such as digital media players ("streaming boxes"). Alternatives to set-top boxes are the smaller dongles, and television sets with built-in TV tuners. TV signal sources The signal source might be an Ethernet cable, a satellite dish, a coaxial cable (see cable television), a telephone line (including Digital subs ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]