text stringlengths 31 999 | source stringclasses 5 values |
|---|---|
Hellpoint is a 2020 action role-playing game developed by Cradle Games and published by tinyBuild. It released for Windows, Linux, MacOS, PlayStation 4, and Xbox One on July 30. The player takes on the role of a nameless humanoid stranded on derelict space station Irid Novo, and must battle vicious creatures in order to solve the mystery behind the events that happened there | https://huggingface.co/datasets/fmars/wiki_stem |
HoloVista is an augmented reality exploration game developed and published by Aconite. It was released for iOS in September 2020.
Plot
Carmen is a young architect who is hired to take photographs of a mansion, only to discover there's more than it appears to be at first | https://huggingface.co/datasets/fmars/wiki_stem |
Jurassic World Aftermath is a 2020 virtual reality stealth game for the Oculus Quest and Oculus Quest 2. It is based on the Jurassic Park franchise. It was developed by Coatsink Software and published by Oculus Studios | https://huggingface.co/datasets/fmars/wiki_stem |
Kards is a free to play World War II themed online digital collectible card game developed and published by 1939 Games. It was released in early access on Steam on April 12, 2019, and was fully released on April 15, 2020. Mobile ports with crossplay capabilities between platforms have been released for both iOS and Android on June 6, 2023 | https://huggingface.co/datasets/fmars/wiki_stem |
Kentucky Route Zero is a point-and-click adventure interactive fiction game developed by Cardboard Computer and published by Annapurna Interactive. The game was first revealed in 2011 via the crowdfunding platform Kickstarter and is separated into five acts that were released sporadically throughout its development; the first releasing in January 2013 and the last releasing in January 2020. The game was developed for Linux, Windows, and macOS, with console ports for the Nintendo Switch, PlayStation 4, and Xbox One under the subtitle of "TV Edition", coinciding with the release of the final act | https://huggingface.co/datasets/fmars/wiki_stem |
League of Legends: Wild Rift (abbreviated LoL: WR or simply Wild Rift) is a multiplayer online battle arena mobile game developed and published by Riot Games for Android and iOS. The free-to-play game is a modified version of the PC game League of Legends.
As in League of Legends, players control a character ("champion") with unique abilities and battle against a team of players or AI-controlled units, with the goal of destroying the opposing team's "Nexus" | https://huggingface.co/datasets/fmars/wiki_stem |
Lockheart Indigo is a 2020 independent adventure game developed by Fangsoft (originally credited Harmless Games), using the RPG Maker MV engine. It follows Beatris Summers, a young private detective hired to solve the murder of the business owner, Evan Volkov. She must attempt to interrogate one of them, especially the Volkov Family and its workers, who commit the crime behind the wealthy robotics tycoon in the mansion | https://huggingface.co/datasets/fmars/wiki_stem |
The Longing is a 2020 point-and-click adventure game created by independent developer Studio Seufz. Set in an underground kingdom, the player controls the Shade, a creature tasked with watching over a sleeping king for 400 days. The Shade performs recreational activities, including reading and exploring, as it waits out the 400 days in real time | https://huggingface.co/datasets/fmars/wiki_stem |
The Lord of the Rings Online: War of Three Peaks is the eighth expansion for the MMORPG The Lord of the Rings Online, released on October 20, 2020. Announced as a "mini-expansion pack", it is smaller than other expansions in both scope and price, comparable to 2009's Siege of Mirkwood. Unlike all previous expansions, it did not raise the game's level cap | https://huggingface.co/datasets/fmars/wiki_stem |
Medal of Honor: Above and Beyond is a 2020 first-person shooter virtual reality game developed by Respawn Entertainment and published by Electronic Arts. The game was released on December 11, 2020. It is the first release in the Medal of Honor series since 2012's Medal of Honor: Warfighter | https://huggingface.co/datasets/fmars/wiki_stem |
Milk Inside a Bag of Milk Inside a Bag of Milk (stylized as Milk inside a bag of milk inside a bag of milk. . | https://huggingface.co/datasets/fmars/wiki_stem |
Mythgard is a digital collectible card game originally developed and published by Rhino Games, and developed by Monumental since October 2021.
Gameplay
Mythgard is a turn-based 2-player digital collectible card game based on the Magic: the Gathering template. During a turn, players:
Draw a card | https://huggingface.co/datasets/fmars/wiki_stem |
SMS hubbing is a new structure for the international flow of SMS between operators, reshaping the way that international mobile inter-operability works by implementing hubs to intermediate the SMS traffic and to offer a larger SMS coverage.
The GSM Association (GSMA) found in SMS Hubbing the solution to a problem that limits the continuing growth of international SMS, culminating to the development of the SMS Hubbing trials in 2006, part of the Open Connectivity project. This initiative created a new structure for international SMS interoperability, as well as developed standards and requirements that SMS hubs should follow | https://huggingface.co/datasets/fmars/wiki_stem |
Short Message Service (SMS) language, textism, or textese is the abbreviated language and slang commonly used in the late 1990s and early 2000s with mobile phone text messaging, and occasionally through Internet-based communication such as email and instant messaging. Features of early mobile phone messaging encouraged users to use abbreviations. 2G technology made text entry difficult, requiring multiple key presses on a small keypad to generate each letter, and messages were generally limited to 160 characters (or 1280 bits) | https://huggingface.co/datasets/fmars/wiki_stem |
Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of computer crime | https://huggingface.co/datasets/fmars/wiki_stem |
Texts From Last Night (TFLN) is a regularly updated blog that re-posts short text messages submitted by its users, originally formed as a sorority email chain by creator Lauren Leto. The site tends to post texts that are shocking or scandalous. The texts are sent in by people who wake in the morning "to find regrettable messages sent to or from their mobile phones" | https://huggingface.co/datasets/fmars/wiki_stem |
Twister is a decentralised, experimental peer-to-peer microblogging program. The system uses end-to-end encryption to safeguard communications. It is based on both BitTorrent- and Bitcoin-like protocols and has been likened to a distributed version of Twitter | https://huggingface.co/datasets/fmars/wiki_stem |
The mobile web refers to mobile browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, through a mobile or other wireless network.
History and development
Traditionally, the World Wide Web has been accessed via fixed-line services on laptops and desktop computers. However, the web is now more accessible by portable and wireless devices | https://huggingface.co/datasets/fmars/wiki_stem |
A flat fee, also referred to as a flat rate or a linear rate refers to a pricing structure that charges a single fixed fee for a service, regardless of usage. Less commonly, the term may refer to a rate that does not vary with usage or time of use.
Advantages
A business can develop a dependable stance in a market, as consumers have a well-rounded price before the service is undertaken | https://huggingface.co/datasets/fmars/wiki_stem |
Mobile 2. 0, refers to a perceived next generation of mobile internet services that leverage the social web, or what some call Web 2. 0 | https://huggingface.co/datasets/fmars/wiki_stem |
A mobile Internet device (MID) is a multimedia capable mobile device providing wireless Internet access. They are designed to provide entertainment, information and location-based services for personal or business use. They allow 2-way communication and real-time sharing | https://huggingface.co/datasets/fmars/wiki_stem |
Mobile web analytics studies the behaviour of mobile website users in a similar way to traditional web analytics. In a commercial context, mobile web analytics refers to the data collected from the users who access a website from a mobile phone. It helps to determine which aspects of the website work best for mobile traffic and which mobile marketing campaigns work best for the business, including mobile advertising, mobile search marketing, text campaigns, and desktop promotion of mobile sites and services | https://huggingface.co/datasets/fmars/wiki_stem |
A mobile broadband modem, also known as wireless modem or cellular modem, is a type of modem that allows a personal computer or a router to receive wireless Internet access via a mobile broadband connection instead of using telephone or cable television lines. A mobile Internet user can connect using a wireless modem to a wireless Internet Service Provider (ISP) to get Internet access.
History
1G and 2G
While some analogue mobile phones provided a standard RJ11 telephone socket into which a normal landline modem could be plugged, this only provided slow dial-up connections, usually 2 | https://huggingface.co/datasets/fmars/wiki_stem |
Palm. net was a wireless data communication service enabling limited wireless access of the World Wide Web, provided for certain Palm, Inc. Personal Digital Assistants | https://huggingface.co/datasets/fmars/wiki_stem |
QRpedia is a mobile Web-based system which uses QR codes to deliver Wikipedia articles to users, in their preferred language. A typical use is on museum labels, linking to Wikipedia articles about the exhibited object. QR codes can easily be generated to link directly to any Uniform Resource Identifier (URI), but the QRpedia system adds further functionality | https://huggingface.co/datasets/fmars/wiki_stem |
Responsive web design (RWD) or responsive design is an approach to web design that aims to make web pages render well on a variety of devices and window or screen sizes from minimum to maximum display size to ensure usability and satisfaction. A responsive design adapts the web-page layout to the viewing environment by using techniques such as fluid proportion-based grids, flexible images, and CSS3 media queries, an extension of the @media rule, in the following ways:
The fluid grid concept calls for page element sizing to be in relative units like percentages, rather than absolute units like pixels or points.
Flexible images are also sized in relative units, so as to prevent them from displaying outside their containing element | https://huggingface.co/datasets/fmars/wiki_stem |
Wapworld was the first commercial mobile internet service to launch in the UK. Conceived and developed by Jingo Communications founder Mark Gibbons, Wapworld provided the first mobile gateway for open internet access to users with WAP-enabled handsets in the UK in 1998.
In December 1999 Jingo took its gateway technology and content portal into a joint venture with The Carphone Warehouse and Bob Geldof to support the UK release of the Nokia 7110 handset | https://huggingface.co/datasets/fmars/wiki_stem |
The 3rd Generation Partnership Project (3GPP) is an umbrella term for a number of standards organizations which develop protocols for mobile telecommunications. Its best known work is the development and maintenance of:
GSM and related 2G and 2. 5G standards, including GPRS and EDGE
UMTS and related 3G standards, including HSPA and HSPA+
LTE and related 4G standards, including LTE Advanced and LTE Advanced Pro
5G NR and related 5G standards, including 5G-Advanced
An evolved IP Multimedia Subsystem (IMS) developed in an access independent manner3GPP is a consortium with seven national or regional telecommunication standards organizations as primary members ("organizational partners") and a variety of other organizations as associate members ("market representation partners") | https://huggingface.co/datasets/fmars/wiki_stem |
A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of several implementations of the A5 security protocol. It was initially kept secret, but became public knowledge through leaks and reverse engineering | https://huggingface.co/datasets/fmars/wiki_stem |
An Access Point Name (APN) is the name of a gateway between a mobile network (GSM, GPRS, 3G, 4G and 5G) and another computer network, frequently the public Internet. A mobile device making a data connection must be configured with an APN to present to the carrier. The carrier will then examine this identifier to determine what type of network connection should be created, for example: which IP addresses should be assigned to the wireless device, which security methods should be used, and how, or if, it should be connected to some private customer network | https://huggingface.co/datasets/fmars/wiki_stem |
Backhaul Adaptation Protocol (BAP) is a layer 2 Routing protocol used in 5G for Integrated Access and Backhaul (IAB)
. This protocol is specified by 3GPP in TS 38. 340 | https://huggingface.co/datasets/fmars/wiki_stem |
BSSGP is a protocol used in the GPRS mobile packet data system. It denotes Base Station System GPRS Protocol. It transfers information between two GPRS entities SGSN and BSS over a BSSGP Virtual Connection (BVC) | https://huggingface.co/datasets/fmars/wiki_stem |
Cell Broadcast (CB) is a method of sending messages to multiple mobile telephone users in a defined area at the same time. It is defined by the ETSI’s GSM committee and 3GPP and is part of the 2G, 3G, 4G LTE (telecommunication) and 5G standards. It is also known as Short Message Service-Cell Broadcast (SMS-CB) or CB SMS | https://huggingface.co/datasets/fmars/wiki_stem |
For mobile telecommunications, the Charging Data Record (CDR) is, in 3GPP parlance, a formatted collection of information about a chargeable telecommunication event (making a phone call, using the Internet from your mobile device).
CDRs are used for user billing: a telecom provider transfers them from time to time in order to send bills to their users. CDRs are sent in GTP' messages, or saved in files and fetched with FTP protocol | https://huggingface.co/datasets/fmars/wiki_stem |
A closed subscriber group (CSG) is a limited set of users with connectivity access to a femtocell. When a femtocell is configured in CSG mode, only those users included in the femtocell's access control list are allowed to use the femtocell resources.
On the other hand, a femtocell can be also configured in Open Access mode, in which any user is allowed access to the femtocell | https://huggingface.co/datasets/fmars/wiki_stem |
In radio, cooperative multiple-input multiple-output (cooperative MIMO, CO-MIMO) is a technology that can effectively exploit the spatial domain of mobile fading channels to bring significant performance improvements to wireless communication systems. It is also called network MIMO, distributed MIMO, virtual MIMO, and virtual antenna arrays.
Conventional MIMO systems, known as point-to-point MIMO or collocated MIMO, require both the transmitter and receiver of a communication link to be equipped with multiple antennas | https://huggingface.co/datasets/fmars/wiki_stem |
Enhanced Cell ID, E-CellID, or E-CID is a positioning feature introduced in rel9 E-UTRA (LTE radio). The UE reports to the network (ESMLC) the serving cell ID, the timing advance (difference between its transmit and receive time) and the IDs, estimated timing and power of the detected neighbor cells. The enodeB may report extra information to the ESMLC like the angle of arrival | https://huggingface.co/datasets/fmars/wiki_stem |
Evolved High Speed Packet Access, HSPA+, HSPA (Plus) or HSPAP, is a technical standard for wireless broadband telecommunication. It is the second phase of HSPA which has been introduced in 3GPP release 7 and being further improved in later 3GPP releases. HSPA+ can achieve data rates of up to 42 | https://huggingface.co/datasets/fmars/wiki_stem |
Flat IP architecture provides a way to identify devices using symbolic names, unlike the hierarchical architecture such as that used in "normal" IP addresses. This form of system is of more interest to mobile broadband network operators.
Flat IP architecture
To meet customer demand for real-time data applications delivered over mobile broadband networks, wireless operators are turning to flat IP network architectures | https://huggingface.co/datasets/fmars/wiki_stem |
General Packet Radio Service (GPRS) is a packet oriented mobile data standard on the 2G cellular communication network's global system for mobile communications (GSM). GPRS was established by European Telecommunications Standards Institute (ETSI) in response to the earlier CDPD and i-mode packet-switched cellular technologies. It is now maintained by the 3rd Generation Partnership Project (3GPP) | https://huggingface.co/datasets/fmars/wiki_stem |
Generic Authentication Architecture (GAA) is a standard made by 3GPP defined in TR 33. 919. Taken from the document:
"This Technical Report aims to give an overview of the different mechanisms that mobile applications can rely upon for authentication between server and client (i | https://huggingface.co/datasets/fmars/wiki_stem |
A GPRS roaming exchange (GRX) acts as a hub for General Packet Radio Service (GPRS) connections from roaming users, removing the need for a dedicated link between each GPRS service provider. It was developed to facilitate a more efficient way for operators to interconnect networks, and played a large part in the transition to third-generation systems.
Development
Initially GPRS roaming was based on complicated relationships between individual operators with each operator requiring a dedicated link to each different partner so that
N
(
N
−
1
)
2
{\displaystyle {\tfrac {N(N-1)}{2}}}
, whereby
N
{\displaystyle N}
is the number of global operators that would require a dedicated link | https://huggingface.co/datasets/fmars/wiki_stem |
GSM procedures are sets of steps performed by the GSM network and devices on it in order for the network to function. GSM (Global System for Mobile Communications) is a set of standards for cell phone networks established by the European Telecommunications Standards Institute and first used in 1991. Its procedures refers to the steps a GSM network takes to communicate with cell phones and other mobile devices on the network | https://huggingface.co/datasets/fmars/wiki_stem |
GTP' (GTP prime) is an IP based protocol used within GSM and UMTS networks. It can be used with UDP or TCP. GTP' uses the same message structure as GTP (GTP-C, GTP-U), but it is largely a separate protocol | https://huggingface.co/datasets/fmars/wiki_stem |
High Speed Packet Access (HSPA) is an amalgamation of two mobile protocols—High Speed Downlink Packet Access (HSDPA) and High Speed Uplink Packet Access (HSUPA)—that extends and improves the performance of existing 3G mobile telecommunication networks using the WCDMA protocols. A further-improved 3GPP standard called Evolved High Speed Packet Access (also known as HSPA+) was released late in 2008, with subsequent worldwide adoption beginning in 2010. The newer standard allows bit rates to reach as high as 337 Mbit/s in the downlink and 34 Mbit/s in the uplink; however, these speeds are rarely achieved in practice | https://huggingface.co/datasets/fmars/wiki_stem |
A Home eNodeB, or HeNB, is the 3GPP's term for an LTE femtocell or Small Cell.
An eNodeB is an element of an LTE Radio Access Network, or E-UTRAN. A HeNB performs the same function of an eNodeB, but is optimized for deployment for smaller coverage than macro eNodeB, such as indoor premises and public hotspots | https://huggingface.co/datasets/fmars/wiki_stem |
Insert Subscriber Data is a Subscriber Data Handling procedure in LTE services. This procedure is used to manage the subscription data of subscriber in MME and SGSN over S6a/S6d interface. IDR is invoked by Home Subscriber Server for subscription data handling | https://huggingface.co/datasets/fmars/wiki_stem |
The international mobile subscriber identity (IMSI) is a number that uniquely identifies every user of a cellular network. It is stored as a 64-bit field and is sent by the mobile device to the network. It is also used for acquiring other details of the mobile in the home location register (HLR) or as locally copied in the visitor location register | https://huggingface.co/datasets/fmars/wiki_stem |
An IP Multimedia Services Identity Module (ISIM) is an application residing on the UICC, an IC card specified in TS 31. 101. This module could be on a UMTS 3G or IMS VoLTE network | https://huggingface.co/datasets/fmars/wiki_stem |
The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is a standardised architectural framework for delivering IP multimedia services. Historically, mobile phones have provided voice call services over a circuit-switched-style network, rather than strictly over an IP packet-switched network. Alternative methods of delivering voice (VoIP) or other multimedia services have become available on smartphones, but they have not become standardized across the industry | https://huggingface.co/datasets/fmars/wiki_stem |
KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.
In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1 and UIA1, respectively.
In GSM, KASUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator | https://huggingface.co/datasets/fmars/wiki_stem |
The MMS Architecture is the set of standards used by the Multimedia Messaging Service in mobile networks. The standards are prepared by 3GPP.
Overview
The standard consists of a number of interfaces between components found in the mobile network:
MM1: the interface between MMS User Agent and MMS Center (MMSC, the combination of the MMS Relay & Server) | https://huggingface.co/datasets/fmars/wiki_stem |
A mobile station (MS) comprises all user equipment and software needed for communication with a mobile network.
The term refers to the global system connected to the mobile network, i. e | https://huggingface.co/datasets/fmars/wiki_stem |
Multimedia Broadcast multicast service Single Frequency Network (MBSFN) is a communication channel defined in the fourth-generation cellular networking standard called Long-Term Evolution (LTE). The transmission mode is intended as a further improvement of the efficiency of the enhanced Multimedia Broadcast Multicast Service (eMBMS) service, which can deliver services such as mobile TV using the LTE infrastructure, and is expected to compete with dedicated mobile/handheld TV broadcast systems such as DVB-H and DVB-SH. This enables network operators to offer mobile TV without the need for additional expensive licensed spectrum and without requiring new infrastructure and end-user devices | https://huggingface.co/datasets/fmars/wiki_stem |
Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network. Users and providers may refer to such a message as a PXT, a picture message, or a multimedia message. The MMS standard extends the core SMS (Short Message Service) capability, allowing the exchange of text messages greater than 160 characters in length | https://huggingface.co/datasets/fmars/wiki_stem |
A Network (Layer) Service Access Point Identifier (NSAPI), is an identifier used in GPRS (cellular data) networks.
It is used to identify a Packet Data Protocol (PDP) context (a unique data session) in the Mobile Station (MS) and in the Serving GPRS Support Node (SGSN). It is dynamically selected by the MS (however, the MS should ensure that the selected NSAPI is not currently being used by another session management entity in the MS) | https://huggingface.co/datasets/fmars/wiki_stem |
5G NR (New Radio) is a new radio access technology (RAT) developed by 3GPP for the 5G (fifth generation) mobile network. It was designed to be the global standard for the air interface of 5G networks. As with 4G (LTE), it is based on OFDM | https://huggingface.co/datasets/fmars/wiki_stem |
Online charging system (OCS) is a system allowing a communications service provider to charge their customers, in real time, based on service usage.
Architecture
Event based charging
An event-based charging function (EBCF) is used to charge events based on their occurrence rather than their duration or volume used in the event. Typical events are SMS, MMS, purchase of content (application, game, music, video on demand, etc | https://huggingface.co/datasets/fmars/wiki_stem |
Opportunity-Driven Multiple Access (ODMA) is a UMTS communications relaying protocol standard first introduced by the European Telecommunication Standards Institute (ETSI) in 1996. ODMA has been adopted by the 3rd-Generation Partnership Project, 3GPP to improve the efficiency of UMTS networks using the TDD mode. One of the objectives of ODMA is to enhance the capacity and the coverage of radio transmissions towards the boundaries of the cell | https://huggingface.co/datasets/fmars/wiki_stem |
Packet Data Convergence Protocol (PDCP) is specified by 3GPP in TS 25. 323 for UMTS, TS 36. 323 for LTE and TS 38 | https://huggingface.co/datasets/fmars/wiki_stem |
Packet Forwarding Control Protocol (PFCP) is a 3GPP protocol used on the Sx/N4 interface between the control plane and the user plane function, specified in TS 29. 244. It is one of the main protocols introduced in the 5G Next Generation Mobile Core Network (aka 5GC), but also used in the 4G/LTE EPC to implement the Control and User Plane Separation (CUPS) | https://huggingface.co/datasets/fmars/wiki_stem |
A personal unblocking key (PUK), sometimes called personal unblocking code (PUC), is used in SIM cards to reset a personal identification number (PIN) that has been lost or forgotten.
Most mobile phones offer the feature of PIN protection. After switching on the phone, if the PIN security function is active, the user is required to enter a 4-8 digit PIN to unlock the SIM card and connect to the mobile network | https://huggingface.co/datasets/fmars/wiki_stem |
Radio link control (RLC) is a layer 2 Radio Link Protocol used in UMTS, LTE and 5G on the Air interface. This protocol is specified by 3GPP in TS 25. 322 for UMTS, TS 36 | https://huggingface.co/datasets/fmars/wiki_stem |
The Radio Network Controller (RNC) is a governing element in the UMTS radio access network (UTRAN) and is responsible for controlling the Node Bs that are connected to it. The RNC carries out radio resource management, some of the mobility management functions and is the point where encryption is done before user data is sent to and from the mobile. The RNC connects to the Circuit Switched Core Network through Media Gateway (MGW) and to the SGSN (Serving GPRS Support Node) in the Packet Switched Core Network | https://huggingface.co/datasets/fmars/wiki_stem |
The Radio Resource Control (RRC) protocol is used in UMTS, LTE and 5G on the Air interface. It is a layer 3 (Network Layer) protocol used between UE and Base Station. This protocol is specified by 3GPP in TS 25 | https://huggingface.co/datasets/fmars/wiki_stem |
In telecommunications networks, RANAP (Radio Access Network Application Part) is a protocol specified by 3GPP in TS 25. 413
and used in UMTS for signaling between the Core Network, which can be a MSC or SGSN, and the UTRAN. RANAP is carried over Iu-interface | https://huggingface.co/datasets/fmars/wiki_stem |
In the UMTS cellular communication system, received signal code power (RSCP) denotes the power measured by a receiver on a particular physical communication channel. It is used as an indication of signal strength, as a handover criterion, in downlink power control, and to calculate path loss. In CDMA systems, a physical channel corresponds to a particular spreading code, hence the name (Received signal code power) | https://huggingface.co/datasets/fmars/wiki_stem |
In cellular communications technology, self-optimization is a process in which the system’s settings are autonomously and continuously adapted to the traffic profile and the network environment in terms of topology, propagation and interference. Together with self-planning and self-healing, self-optimization is one of the key pillars of the self-organizing networks (SON) management paradigm proposed by the Next Generation Mobile Networks Alliance. The autonomous trait of self-optimization involves no human intervention at all during the aforementioned optimization process | https://huggingface.co/datasets/fmars/wiki_stem |
A number of tools exist to generate computer network diagrams. Broadly, there are four types of tools that help create network maps and diagrams:
Hybrid tools
Network Mapping tools
Network Monitoring tools
Drawing toolsNetwork mapping and drawing software support IT systems managers to understand the hardware and software services on a network and how they are interconnected. Network maps and diagrams are a component of network documentation | https://huggingface.co/datasets/fmars/wiki_stem |
A network domain is an administrative grouping of multiple private computer networks or local hosts within the same infrastructure. Domains can be identified using a domain name; domains which need to be accessible from the public Internet can be assigned a globally unique name within the Domain Name System (DNS).
A domain controller is a server that automates the logins, user groups, and architecture of a domain, rather than manually coding this information on each host in the domain | https://huggingface.co/datasets/fmars/wiki_stem |
Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This network attack typically happens under the usage of unsecured networks, such as public wifi connections or shared electronic devices | https://huggingface.co/datasets/fmars/wiki_stem |
Network equipment providers (NEPs) – sometimes called telecommunications equipment manufacturers (TEMs) – sell products and services to communication service providers such as fixed or mobile operators as well as to enterprise customers. NEP technology allows for calls on mobile phones, Internet surfing, joining a conference calls, or watching video on demand through IPTV (internet protocol TV). The history of the NEPs goes back to the mid-19th century when the first telegraph networks were set up | https://huggingface.co/datasets/fmars/wiki_stem |
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation | https://huggingface.co/datasets/fmars/wiki_stem |
A network information system (NIS) is an information system for managing networks, such as electricity network, water supply network, gas supply network, telecommunications network. , or street light networkNIS may manage all data relevant to the network, e. g | https://huggingface.co/datasets/fmars/wiki_stem |
A network on a chip or network-on-chip (NoC en-oh-SEE or knock) is a network-based communications subsystem on an integrated circuit ("microchip"), most typically between modules in a system on a chip (SoC). The modules on the IC are typically semiconductor IP cores schematizing various functions of the computer system, and are designed to be modular in the sense of network science. The network on chip is a router-based packet switching network between SoC modules | https://huggingface.co/datasets/fmars/wiki_stem |
In computer network research, network simulation is a technique whereby a software program replicates the behavior of a real network. This is achieved by calculating the interactions between the different network entities such as routers, switches, nodes, access points, links, etc. Most simulators use discrete event simulation in which the modeling of systems in which state variables change at discrete points in time | https://huggingface.co/datasets/fmars/wiki_stem |
A network virtualization platform decouples the hardware plane from the software plane such that the host hardware plane can be administratively programmed to assign its resources to the software plane. This allows for the virtualization of CPU, memory, disk and most importantly network IO. Upon such virtualization of hardware resources, the platform can accommodate multiple virtual network applications such as firewalls, routers, Web filters, and intrusion prevention systems, all functioning much like standalone hardware appliances, but contained within a single hardware appliance | https://huggingface.co/datasets/fmars/wiki_stem |
The Network-Integrated Multimedia Middleware (NMM) is a flow graph based multimedia framework. NMM allows creating distributed multimedia applications: local and remote multimedia devices or software components can be controlled transparently and integrated into a common multimedia processing flow graph. NMM is implemented in C++, a programming language, and NMM-IDL, an interface description language (IDL) | https://huggingface.co/datasets/fmars/wiki_stem |
A network-neutral data center (or carrier-neutral data center) is a data center (or carrier hotel) which allows interconnection between multiple telecommunication carriers and/or colocation providers. Network-neutral data centers exist all over the world and vary in size and power.
While some data centers are owned and operated by a telecommunications or Internet service provider, the majority of network-neutral data centers are operated by a third party who has little or no part in providing Internet service to the end-user | https://huggingface.co/datasets/fmars/wiki_stem |
A networked music performance or network musical performance is a real-time interaction over a computer network that enables musicians in different locations to perform as if they were in the same room. These interactions can include performances, rehearsals, improvisation or jamming sessions, and situations for learning such as master classes. Participants may be connected by "high fidelity multichannel audio and video links" as well as MIDI data connections and specialized collaborative software tools | https://huggingface.co/datasets/fmars/wiki_stem |
Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts, end systems or data terminal equipment | https://huggingface.co/datasets/fmars/wiki_stem |
NO CARRIER (capitalized) is a text message transmitted from a modem to its attached device (typically a computer), indicating the modem is not (or no longer) connected to a remote system.
NO CARRIER is a response message that is defined in the Hayes command set. Due to the popularity of Hayes modems during the heyday of dial-up connectivity, most other modem manufacturers supported the Hayes command set | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking and computer architecture, a northbound interface of a component is an interface that allows the component to communicate with a higher level component, using the latter component's southbound interface. The northbound interface conceptualizes the lower level details (e. g | https://huggingface.co/datasets/fmars/wiki_stem |
The NPL network, or NPL Data Communications Network, was a local area computer network operated by a team from the National Physical Laboratory in London that pioneered the concept of packet switching.
Based on designs first conceived by Donald Davies in 1965, development work began in 1968. Elements of the first version of the network, the Mark I, became operational during 1969 then fully operational in January 1970, and the Mark II version operated from 1973 until 1986 | https://huggingface.co/datasets/fmars/wiki_stem |
ns (from network simulator) is a name for a series of discrete event network simulators, specifically ns-1, ns-2, and ns-3. All are discrete-event computer network simulators, primarily used in research and teaching.
History
ns-1
The first version of ns, known as ns-1, was developed at Lawrence Berkeley National Laboratory (LBNL) in the 1995-97 timeframe by Steve McCanne, Sally Floyd, Kevin Fall, and other contributors | https://huggingface.co/datasets/fmars/wiki_stem |
OMNeT++ (Objective Modular Network Testbed in C++) is a modular, component-based C++ simulation library and framework, primarily for building network simulators. OMNeT++ can be used for free for non-commercial simulations like at academic institutions and for teaching. OMNEST is an extended version of OMNeT++ for commercial use | https://huggingface.co/datasets/fmars/wiki_stem |
ONAP (Open Network Automation Platform), is an open-source, orchestration and automation framework. It is hosted by The Linux Foundation.
History
On February 23, 2017, ONAP was announced as a result of a merger of the OpenECOMP and Open-Orchestrator (Open-O) projects | https://huggingface.co/datasets/fmars/wiki_stem |
The ONOS (Open Network Operating System) project is an open source community hosted by The Linux Foundation. The goal of the project is to create a software-defined networking (SDN) operating system for communications service providers that is designed for scalability, high performance and high availability.
History
On December 5, 2014, the Open Networking Lab (ON | https://huggingface.co/datasets/fmars/wiki_stem |
The OpenDaylight Project is a collaborative open-source project hosted by the Linux Foundation. The project serves as a platform for software-defined networking (SDN) for customizing, automating and monitoring computer networks of any size and scale.
History
On April 8, 2013, The Linux Foundation announced the founding of the OpenDaylight Project | https://huggingface.co/datasets/fmars/wiki_stem |
Operating system Wi-Fi support is the support in the operating system for Wi-Fi and usually consists of two pieces: driver level support, and configuration and management support. Driver support is usually provided by multiple manufacturers of the chip set hardware or end manufacturers. Also available are Unix clones such as Linux, sometimes through open source projects | https://huggingface.co/datasets/fmars/wiki_stem |
In computing, an organizational unit (OU) provides a way of classifying objects located in directories, or names in a digital certificate hierarchy, typically used either to differentiate between objects with the same name (John Doe in OU "marketing" versus John Doe in OU "customer service"), or to parcel out authority to create and manage objects (for example: to give rights for user-creation to local technicians instead of having to manage all accounts from a single central group). Organizational units most commonly appear in X. 500 directories, X | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networking, out-of-band data is the data transferred through a stream that is independent from the main in-band data stream. An out-of-band data mechanism provides a conceptually independent channel, which allows any data sent via that mechanism to be kept separate from in-band data. The out-of-band data mechanism should be provided as an inherent characteristic of the data channel and transmission protocol, rather than requiring a separate channel and endpoints to be established | https://huggingface.co/datasets/fmars/wiki_stem |
An overlay network is a computer network that is layered on top of another network.
Structure
Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. For example, distributed systems such as peer-to-peer networks and client–server applications are overlay networks because their nodes run on top of the Internet | https://huggingface.co/datasets/fmars/wiki_stem |
P4 is a programming language for controlling packet forwarding planes in networking devices, such as routers and switches. In contrast to a general purpose language such as C or Python, P4 is a domain-specific language with a number of constructs optimized for network data forwarding. P4 is distributed as open-source, permissively licensed code, and is maintained by the P4 Project (formerly the P4 Language Consortium), a not-for-profit organization hosted by the Open Networking Foundation | https://huggingface.co/datasets/fmars/wiki_stem |
In digital communications networks, packet processing refers to the wide variety of algorithms that are applied to a packet of data or information as it moves through the various network elements of a communications network. With the increased performance of network interfaces, there is a corresponding need for faster packet processing. There are two broad classes of packet processing algorithms that align with the standardized network subdivision of control plane and data plane | https://huggingface.co/datasets/fmars/wiki_stem |
In telecommunications, packet switching is a method of grouping data into packets that are transmitted over a digital network. Packets are made of a header and a payload. Data in the header is used by networking hardware to direct the packet to its destination, where the payload is extracted and used by an operating system, application software, or higher layer protocols | https://huggingface.co/datasets/fmars/wiki_stem |
In computer networks, a path computation element (PCE) is a system component, application, or network node that is capable of determining and finding a suitable route for conveying data between a source and a destination.
Description
Routing can be subject to a set of constraints, such as quality of service (QoS), policy, or price. Constraint-based path computation is a strategic component of traffic engineering in MPLS, GMPLS and Segment Routing networks | https://huggingface.co/datasets/fmars/wiki_stem |
Pharos is a hierarchical and decentralized network coordinate system. With the help of a simple two-level architecture, it achieves much better prediction accuracy then the representative Vivaldi coordinates, and it is incrementally deployable.
Overview
Network coordinate (NC) systems are an efficient mechanism for Internet latency prediction with scalable measurements | https://huggingface.co/datasets/fmars/wiki_stem |
Phoenix is a decentralized network coordinate system based on the matrix factorization model.
Background
Network coordinate (NC) systems are an efficient mechanism for internet distance (round-trip latency) prediction with scalable measurements. For a network with N hosts, by performing O(N) measurements, all N*N distances can be predicted | https://huggingface.co/datasets/fmars/wiki_stem |
Physical media refers to the physical materials that are used to store or transmit information in data communications. These physical media are generally physical objects made of materials such as copper or glass. They can be touched and felt, and have physical properties such as weight and color | https://huggingface.co/datasets/fmars/wiki_stem |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.