HOME





Dumb Network
A dumb pipe or dumb network, in relation to a mobile network operator (MNO), is a simple network that has high enough bandwidth to transfer bytes between the customer's device and the Internet without the need to prioritize content. This means it can afford to be completely neutral with regard to the services and applications the customer accesses. This is in contrast to a smart pipe where the operator affects the customer's accessibility of the Internet by either limiting the available services or applications to its own proprietary portal (like a walled garden) or offer additional capabilities and services beyond simple connectivity. A dumb pipe primarily provides simple bandwidth and network capacity which is greater than the maximum network loads expected thus avoiding the need to discriminate between packet types. Among the commonly understood operational models for an MNO are dumb pipes, smart pipes, and the walled gardens. Description A dumb network is marked by using ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mobile Network Operator
A mobile network operator (MNO), also known as a mobile network provider, mobile network carrier, mobile , wireless service provider, wireless carrier, wireless operator, wireless telco, or cellular company, is a telecommunications provider of services that sells, delivers and maintains mobile telephony services to an end user. Overview A key defining characteristic of a mobile network operator is that it must own or control access to a radio spectrum license from a regulatory or government entity, and also that it must own or control the elements of the cellular network infrastructure necessary to provide services to subscribers over the licensed radio spectrum. In addition the operator would also contain other elements like the back haul infrastructure and provisioning computer systems. A mobile network operator typically also has the necessary provisioning, billing, and customer care computer systems, and the marketing, customer care, and engineering organizations need ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks that consists of Private network, private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, Wireless network, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and Web application, applications of the World Wide Web (WWW), email, electronic mail, internet telephony, streaming media and file sharing. The origins of the Internet date back to research that enabled the time-sharing of computer resources, the development of packet switching in the 1960s and the design of computer networks for data communication. The set of rules (communication protocols) to enable i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Smart Pipe
Smart pipe, related to a mobile network operator (MNO or ''operator''), refers to an operator’s network which leverages existing or unique service abilities, and the operator’s customer relationships, to provide value beyond that of data connectivity only. The use of the term “smart” refers to the operator’s ability to add value for added, and often unique, types of services and content beyond bandwidth and network speed only. Among the commonly understood operational models for a MNO are smart pipes, walled garden (technology), walled gardens, and dumb pipes. Examples While there is no real technical standard, industry standard definition of a smart pipe, there are several operators, bloggers, and researchers who have described aspects of a smart pipe which are generally accepted. Network operator Hutchison 3G, 3 led the way with the release of its X-Series (mobile broadband), X-Series line of devices in 2006. The X-Series platform bundles a set of services, several of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Closed Platform
A closed platform, walled garden, or closed ecosystem is a software system wherein the carrier or service provider has control over applications, content, and/or media, and restricts convenient access to non-approved applicants or content. This is in contrast to an open platform, wherein consumers generally have unrestricted access to applications and content. Overview For example, in telecommunications, the services and applications accessible on a cell phone on any given wireless device were formerly tightly controlled by the mobile operators. The operators limited the applications and developers that were available on users' home portals and home pages. Thus, a service provider might restrict user access to users whose account exhausted the pre-paid money on their account. This has long been a central issue constraining the telecommunications sector, as developers face huge hurdles in making their applications available to end-users. In a more extreme example, the regulated ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

End-to-end Principle
The end-to-end principle is a design principle in computer networking that requires application-specific features (such as reliability and security) to be implemented in the communicating end nodes of the network, instead of in the network itself. Intermediary nodes (such as gateways and routers) that exist to establish the network may still implement these features to improve efficiency but do not guarantee end-to-end functionality. The essence of what would later be called the end-to-end principle was contained in the work of Donald Davies on packet-switched networks in the 1960s. Louis Pouzin Louis Pouzin (born 20 April 1931) is a French computer scientist and Internet pioneer. He directed the development of the CYCLADES computer network in France the early 1970s, which implemented a novel design for packet communication. He was the ... pioneered the use of the end-to-end strategy in the CYCLADES network in the 1970s. The principle was first articulated explicitly in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Quality Of Service
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priorities to different applications, users, or data Traffic flow (computer networking), flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particula ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to cause disruption to a computer, server (computing), server, Client (computing), client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, Computer worm, worms, Trojan horse (computing), Trojan horses, logic bombs, ransomware, spyware, adware, rogue software, Wiper (malware), wipers and keyloggers). Malware poses serious problems to individuals and businesses on the Internet. According to NortonLifeLock, Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 66 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have bugs that can be exploited by attackers. Although it is impossible or impractical to create a perfectly secure system, there are many defense mechanisms that can make a system more difficult to attack, making information security a field of rapidly increasing importance in the world today. Perpetrators of a cyberattack can be criminals, hacktivists, or states. They attempt to find weaknesses in a system, exploit them and create malware to carry out their goals, and deliver it to the targeted system. Once installed, the malware can have a variety of effects depending on its purpose. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Quality Of Service
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priorities to different applications, users, or data Traffic flow (computer networking), flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particula ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Series Of Tubes
"A series of tubes" is a phrase used originally as an analogy by then-United States Senator Ted Stevens ( R-Alaska) to describe the Internet in the context of opposing net neutrality. On June 28, 2006, he used this metaphor to criticize a proposed amendment to a committee bill. The amendment would have prohibited Internet service providers such as AT&T, Comcast, Time Warner Cable and Verizon Communications from charging fees to give some companies' data a higher priority in relation to other traffic. The metaphor was widely ridiculed, because Stevens was perceived to have displayed an extremely limited understanding of the Internet, despite his leading the Senate committee responsible for regulating it. Partial text of Stevens's comments Media commentary On June 28, 2006, Public Knowledge government affairs manager Alex Curtis wrote a brief blog entry introducing the senator's speech and posted an MP3 recording. The next day, the ''Wired'' magazine blog ''27B Stroke 6'' fe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Smart Pipe
Smart pipe, related to a mobile network operator (MNO or ''operator''), refers to an operator’s network which leverages existing or unique service abilities, and the operator’s customer relationships, to provide value beyond that of data connectivity only. The use of the term “smart” refers to the operator’s ability to add value for added, and often unique, types of services and content beyond bandwidth and network speed only. Among the commonly understood operational models for a MNO are smart pipes, walled garden (technology), walled gardens, and dumb pipes. Examples While there is no real technical standard, industry standard definition of a smart pipe, there are several operators, bloggers, and researchers who have described aspects of a smart pipe which are generally accepted. Network operator Hutchison 3G, 3 led the way with the release of its X-Series (mobile broadband), X-Series line of devices in 2006. The X-Series platform bundles a set of services, several of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Mobile Technology
Mobile technology is the technology used for Cellular network, cellular communication. Mobile technology has evolved rapidly over the past few years. Since the start of this millennium, a standard mobile device has gone from being no more than a simple two-way pager to being a mobile phone, GPS navigation device, an embedded web browser and instant messaging client, and a handheld gaming console. Many experts believe that the future of computer technology rests in mobile computing with wireless networking. Mobile computing by way of tablet computers is becoming more popular. Tablets are available on the 3G and 4G networks. Mobile communication convergence Source: Nikola Tesla laid the theoretical foundation for wireless communication in 1890. Guglielmo Marconi, known as the father of radio, first transmitted wireless signals two miles away in 1894. Mobile technology gave human society great change. The use of mobile technology in government departments can also be traced back to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]