Library

Video Player is loading.
 
Current Time 0:00
Duration 10:41
Loaded: 0%
 

x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    TR-069 is a Broadband Forum technical specification entitled CPE WAN Management Protocol.
    TR-069 is a Broadband Forum technical specification entitled CPE WAN Management Protocol.

  • 00:07

    It defines an application layer protocol for remote management of end-user devices.
    It defines an application layer protocol for remote management of end-user devices.

  • 00:13

    As a bidirectional SOAP/HTTP-based protocol, it provides the communication between customer-premises
    As a bidirectional SOAP/HTTP-based protocol, it provides the communication between customer-premises

  • 00:19

    equipment and Auto Configuration Servers.
    equipment and Auto Configuration Servers.

  • 00:23

    It includes both a safe auto configuration and the control of other CPE management functions
    It includes both a safe auto configuration and the control of other CPE management functions

  • 00:28

    within an integrated framework.
    within an integrated framework.

  • 00:31

    The protocol addressed the growing number of different Internet access devices such
    The protocol addressed the growing number of different Internet access devices such

  • 00:35

    as modems, routers, gateways, set-top boxes, and VoIP-phones for the end-users.
    as modems, routers, gateways, set-top boxes, and VoIP-phones for the end-users.

  • 00:42

    The TR-069 standard was developed for automatic configuration of these devices with Auto Configuration
    The TR-069 standard was developed for automatic configuration of these devices with Auto Configuration

  • 00:49

    Servers.
    Servers.

  • 00:50

    The technical specifications are managed and published by the Broadband Forum.
    The technical specifications are managed and published by the Broadband Forum.

  • 00:55

    TR-069 was first published in May 2004, with amendments in 2006, 2007, 2010, July 2011
    TR-069 was first published in May 2004, with amendments in 2006, 2007, 2010, July 2011

  • 01:03

    to version 1.3. and November 2013 to version 1.4
    to version 1.3. and November 2013 to version 1.4

  • 01:10

    Other forums, such as the Home Gateway Initiative, Digital Video Broadcasting and WiMAX Forum
    Other forums, such as the Home Gateway Initiative, Digital Video Broadcasting and WiMAX Forum

  • 01:16

    endorsed CWMP as the protocol for remote management of home network devices and terminals.
    endorsed CWMP as the protocol for remote management of home network devices and terminals.

  • 01:23

    There is a growing trend to add TR-069 management functionality to home networking devices behind
    There is a growing trend to add TR-069 management functionality to home networking devices behind

  • 01:29

    the gateway, as well as many other access devices like M2M, FTTH CPE/ONTs, WIMAX CPE
    the gateway, as well as many other access devices like M2M, FTTH CPE/ONTs, WIMAX CPE

  • 01:36

    and other carrier access equipment.
    and other carrier access equipment.

  • 01:40

    Communication between the device and ACS Transport details
    Communication between the device and ACS Transport details

  • 01:44

    CWMP is a text based protocol.
    CWMP is a text based protocol.

  • 01:48

    Orders sent between the device and auto configuration server are transported over HTTP.
    Orders sent between the device and auto configuration server are transported over HTTP.

  • 01:54

    At this level CPE is behaving in the role of client and ACS in the role of HTTP server.
    At this level CPE is behaving in the role of client and ACS in the role of HTTP server.

  • 02:01

    This essentially means that control over the flow of the provisioning session is the sole
    This essentially means that control over the flow of the provisioning session is the sole

  • 02:05

    responsibility of the device.
    responsibility of the device.

  • 02:08

    Provisioning session All communications and operations are performed
    Provisioning session All communications and operations are performed

  • 02:11

    in the scope of the provisioning session.
    in the scope of the provisioning session.

  • 02:14

    The session is always started by the device(CPE) and begins with the transmission of an Inform
    The session is always started by the device(CPE) and begins with the transmission of an Inform

  • 02:20

    message.
    message.

  • 02:21

    Its reception and readiness of the server for the session is indicated by an InformResponse
    Its reception and readiness of the server for the session is indicated by an InformResponse

  • 02:27

    message.
    message.

  • 02:28

    That concludes the session initialization stage.
    That concludes the session initialization stage.

  • 02:31

    The order of the next two stages depends on the value of the flag HoldRequests.
    The order of the next two stages depends on the value of the flag HoldRequests.

  • 02:36

    If the value is false the initialization stage is followed by the transmission of device
    If the value is false the initialization stage is followed by the transmission of device

  • 02:41

    requests, otherwise ACS orders are transmitted first.
    requests, otherwise ACS orders are transmitted first.

  • 02:45

    The following description assumes the value is false.
    The following description assumes the value is false.

  • 02:49

    In the second stage, orders are transmitted from the device to the ACS.
    In the second stage, orders are transmitted from the device to the ACS.

  • 02:54

    Even though the protocol defines multiple methods that may be invoked by the device
    Even though the protocol defines multiple methods that may be invoked by the device

  • 02:58

    on the ACS, only one is commonly found - TransferComplete which is used to inform the ACS of the completion
    on the ACS, only one is commonly found - TransferComplete which is used to inform the ACS of the completion

  • 03:05

    of a file transfer previously issued Download or Upload request.
    of a file transfer previously issued Download or Upload request.

  • 03:10

    This stage is finalized by transmission of empty HTTP-request to the ACS.
    This stage is finalized by transmission of empty HTTP-request to the ACS.

  • 03:16

    In the third stage the roles change on the CWMP level.
    In the third stage the roles change on the CWMP level.

  • 03:20

    The HTTP-response for the empty HTTP-request by the device will contain a CWMP-request
    The HTTP-response for the empty HTTP-request by the device will contain a CWMP-request

  • 03:27

    from the ACS.
    from the ACS.

  • 03:29

    This will subsequently be followed by an HTTP-request containing a CWMP-response for the previous
    This will subsequently be followed by an HTTP-request containing a CWMP-response for the previous

  • 03:36

    CWMP-request.
    CWMP-request.

  • 03:39

    Multiple orders may be transmitted one-by-one.
    Multiple orders may be transmitted one-by-one.

  • 03:42

    This stage is terminated by an empty HTTP-response from the ACS indicating that no more orders
    This stage is terminated by an empty HTTP-response from the ACS indicating that no more orders

  • 03:48

    are pending.
    are pending.

  • 03:50

    Security and authentication As vital data may be transmitted to CPE via
    Security and authentication As vital data may be transmitted to CPE via

  • 03:55

    CWMP, it is essential to provide secure transport channel and always authenticate the CPE against
    CWMP, it is essential to provide secure transport channel and always authenticate the CPE against

  • 04:01

    the ACS.
    the ACS.

  • 04:03

    Secure transport and authentication of the ACS identity can easily be provided by usage
    Secure transport and authentication of the ACS identity can easily be provided by usage

  • 04:08

    of HTTPS and verification of ACS certificate.
    of HTTPS and verification of ACS certificate.

  • 04:14

    Authentication of the CPE is more problematic.
    Authentication of the CPE is more problematic.

  • 04:17

    The identity of the device is verified based on a shared secret at the HTTP level.
    The identity of the device is verified based on a shared secret at the HTTP level.

  • 04:22

    Passwords may be negotiated between the parties at every provisioning session.
    Passwords may be negotiated between the parties at every provisioning session.

  • 04:28

    When the device contacts the ACS for the first time default passwords are used.
    When the device contacts the ACS for the first time default passwords are used.

  • 04:33

    In large networks it is the responsibility of the procurement to ensure each device is
    In large networks it is the responsibility of the procurement to ensure each device is

  • 04:38

    using unique credentials, their list is delivered with the devices themselves and secured.
    using unique credentials, their list is delivered with the devices themselves and secured.

  • 04:44

    Connection request Because initialization and control of the
    Connection request Because initialization and control of the

  • 04:47

    provisioning session flow is the sole responsibility of the device, it is necessary for the ACS
    provisioning session flow is the sole responsibility of the device, it is necessary for the ACS

  • 04:53

    to be able to request a session start from the device.
    to be able to request a session start from the device.

  • 04:57

    The connection request mechanism is also based on HTTP.
    The connection request mechanism is also based on HTTP.

  • 05:01

    In this case the device is put in the role of HTTP-server.
    In this case the device is put in the role of HTTP-server.

  • 05:06

    The ACS requests a connection from the device by visiting a negotiated URL and performing
    The ACS requests a connection from the device by visiting a negotiated URL and performing

  • 05:11

    HTTP Authentication.
    HTTP Authentication.

  • 05:13

    A shared secret is also negotiated with the device in advance to prevent the usage of
    A shared secret is also negotiated with the device in advance to prevent the usage of

  • 05:19

    CPEs for DDoS attacks on the provisioning server.
    CPEs for DDoS attacks on the provisioning server.

  • 05:23

    After confirmation is sent by the device the provisioning session should be started as
    After confirmation is sent by the device the provisioning session should be started as

  • 05:27

    soon as possible and not later than 30 seconds after confirmation is transmitted.
    soon as possible and not later than 30 seconds after confirmation is transmitted.

  • 05:32

    CR over NAT The CWMP protocol also defines a mechanism
    CR over NAT The CWMP protocol also defines a mechanism

  • 05:37

    for reaching the devices that are connected behind NAT.
    for reaching the devices that are connected behind NAT.

  • 05:41

    This mechanism, based on STUN and UDP NAT traversal, is defined in document TR-069 Annex
    This mechanism, based on STUN and UDP NAT traversal, is defined in document TR-069 Annex

  • 05:48

    G. Amendment 5 of the protocol introduces alternative
    G. Amendment 5 of the protocol introduces alternative

  • 05:51

    method of executing Connection Request via NAT based on XMPP.
    method of executing Connection Request via NAT based on XMPP.

  • 05:57

    Data model Most of the configuration and diagnostics
    Data model Most of the configuration and diagnostics

  • 06:00

    is performed through setting and retrieving the value of the device parameters.
    is performed through setting and retrieving the value of the device parameters.

  • 06:05

    These are organized in a well defined hierarchical structure that is more or less common to all
    These are organized in a well defined hierarchical structure that is more or less common to all

  • 06:09

    device models and manufacturers.
    device models and manufacturers.

  • 06:12

    Broadband Forum publishes its data model standards in two formats - XML files containing a detailed
    Broadband Forum publishes its data model standards in two formats - XML files containing a detailed

  • 06:19

    specification of each subsequent data model and all of the changes between their versions
    specification of each subsequent data model and all of the changes between their versions

  • 06:23

    and PDF files containing human-readable details.
    and PDF files containing human-readable details.

  • 06:28

    Supported standards and extensions should be clearly marked in the device data model.
    Supported standards and extensions should be clearly marked in the device data model.

  • 06:33

    This should be in the field Device.DeviceSummary or InternetGatewayDevice.DeviceSummary which
    This should be in the field Device.DeviceSummary or InternetGatewayDevice.DeviceSummary which

  • 06:38

    is required starting from Device:1.0 and InternetGatewayDevice:1.1 respectively.
    is required starting from Device:1.0 and InternetGatewayDevice:1.1 respectively.

  • 06:44

    If the field is not found InternetGatewayDevice:1.0 is implied.
    If the field is not found InternetGatewayDevice:1.0 is implied.

  • 06:52

    As of Device:1.4 and InternetGatewayDevice:1.6 new field for supported standard specification
    As of Device:1.4 and InternetGatewayDevice:1.6 new field for supported standard specification

  • 07:00

    was introduced.
    was introduced.

  • 07:01

    The model is always rooted in the single key named Device or InternetGatewayDevice depending
    The model is always rooted in the single key named Device or InternetGatewayDevice depending

  • 07:07

    on the manufacturer's choice.
    on the manufacturer's choice.

  • 07:09

    At each level of the structure objects and parameters are allowed.
    At each level of the structure objects and parameters are allowed.

  • 07:13

    Keys are constructed by concatenating the names of objects and parameter using '.'(dot)
    Keys are constructed by concatenating the names of objects and parameter using '.'(dot)

  • 07:19

    as a separator, e.g. InternetGatewayDevice.Time.NTPServer1 .
    as a separator, e.g. InternetGatewayDevice.Time.NTPServer1 .

  • 07:25

    Each of the parameters may be marked as writable or non-writable.
    Each of the parameters may be marked as writable or non-writable.

  • 07:29

    This is reported by the device in GetParameterNamesResponse message.
    This is reported by the device in GetParameterNamesResponse message.

  • 07:34

    The device should not permit the change of any parameter marked as read-only.
    The device should not permit the change of any parameter marked as read-only.

  • 07:39

    Data model specifications and extensions clearly mark required status of most of the parameters.
    Data model specifications and extensions clearly mark required status of most of the parameters.

  • 07:45

    Values applicable for the parameter, their type and meaning are also precisely defined
    Values applicable for the parameter, their type and meaning are also precisely defined

  • 07:50

    by the standard.
    by the standard.

  • 07:52

    Multi-instance objects Some parts of the data model require the existence
    Multi-instance objects Some parts of the data model require the existence

  • 07:56

    of multiple copies of the subtree.
    of multiple copies of the subtree.

  • 07:59

    The best examples are those describing tables, e.g. Port Forwarding Table.
    The best examples are those describing tables, e.g. Port Forwarding Table.

  • 08:05

    An object representing an array will only have instance numbers or alias names as its
    An object representing an array will only have instance numbers or alias names as its

  • 08:09

    children.
    children.

  • 08:10

    A multi-instance object may be writable or read-only depending on the data represented.
    A multi-instance object may be writable or read-only depending on the data represented.

  • 08:16

    If for example the object represents four physical ports on a switch it should not be
    If for example the object represents four physical ports on a switch it should not be

  • 08:20

    possible to add or remove them from the data model.
    possible to add or remove them from the data model.

  • 08:24

    If an instance is added to an object an identifier is assigned.
    If an instance is added to an object an identifier is assigned.

  • 08:29

    After being assigned, identifiers may not change during the life-cycle of the device
    After being assigned, identifiers may not change during the life-cycle of the device

  • 08:33

    except for factory-reset.
    except for factory-reset.

  • 08:36

    Common problems Even though the list of the parameters and
    Common problems Even though the list of the parameters and

  • 08:39

    their attributes is well defined most of the devices do not follow standards completely.
    their attributes is well defined most of the devices do not follow standards completely.

  • 08:44

    Most common problems include missing parameters, omitted instance identifiers, wrong parameter
    Most common problems include missing parameters, omitted instance identifiers, wrong parameter

  • 08:50

    access level and correctly using only defined valid values.
    access level and correctly using only defined valid values.

  • 08:54

    For example, for the field that indicates supported standard of WLAN protocols, the
    For example, for the field that indicates supported standard of WLAN protocols, the

  • 09:00

    value 'g' should indicate support of 802.11b and 802.11g, and 'g-only' support only of
    value 'g' should indicate support of 802.11b and 802.11g, and 'g-only' support only of

  • 09:07

    802.11g.
    802.11g.

  • 09:10

    Even though values such as 'bg' or 'b/g' are not legal according to the Broadband Forum
    Even though values such as 'bg' or 'b/g' are not legal according to the Broadband Forum

  • 09:15

    standards, they are very commonly found in device data models.
    standards, they are very commonly found in device data models.

  • 09:20

    Common operations The whole provisioning is built on top of
    Common operations The whole provisioning is built on top of

  • 09:23

    a defined set of simple operations.
    a defined set of simple operations.

  • 09:26

    Each order is considered atomic, though there is no support of transactions.
    Each order is considered atomic, though there is no support of transactions.

  • 09:31

    If the device cannot fulfil the order a proper error needs to be returned to the ACS - the
    If the device cannot fulfil the order a proper error needs to be returned to the ACS - the

  • 09:36

    device should never break the provisioning session.
    device should never break the provisioning session.

  • 09:39

    High-level operations possible through Technical Report-069
    High-level operations possible through Technical Report-069

  • 09:44

    Service activation and reconfiguration Initial configuration of the service as part
    Service activation and reconfiguration Initial configuration of the service as part

  • 09:48

    of zero-touch or one-touch configuration process Service re-establishment
    of zero-touch or one-touch configuration process Service re-establishment

  • 09:54

    Remote Subscriber Support Verification of the device status and functionality
    Remote Subscriber Support Verification of the device status and functionality

  • 09:59

    Manual reconfiguration
    Manual reconfiguration

  • 10:01

    Firmware and Configuration Management Firmware upgrade/downgrade
    Firmware and Configuration Management Firmware upgrade/downgrade

  • 10:07

    Configuration backup/restore
    Configuration backup/restore

  • 10:09

    Diagnostics and monitoring Throughput and connectivity diagnostics
    Diagnostics and monitoring Throughput and connectivity diagnostics

  • 10:13

    Parameter value retrieval Log file retrieval
    Parameter value retrieval Log file retrieval

  • 10:16

    See also Wireless router
    See also Wireless router

  • 10:18

    References
    References

  • 10:20

    External links TR-069 Issue 1 Amendment 5 CPE WAN Management
    External links TR-069 Issue 1 Amendment 5 CPE WAN Management

  • 10:26

    Protocol v1.4 CPE WAN Management Protocol CWMP XML Schemas
    Protocol v1.4 CPE WAN Management Protocol CWMP XML Schemas

  • 10:32

    and Data Model Definitions Marketing Report TR-069 Deployment Scenarios,
    and Data Model Definitions Marketing Report TR-069 Deployment Scenarios,

  • 10:36

    Issue: 1, August 2010
    Issue: 1, August 2010

All noun
specification
/ˌspesəfəˈkāSH(ə)n/

word

Description of the design to make something

TR-069

18,410 views

Video Language:

  • English

Caption Language:

  • English (en)

Accent:

  • English (US)

Speech Time:

99%
  • 10:37 / 10:41

Speech Rate:

  • 131 wpm - Conversational

Category:

  • Education

Tags :

Intro:

TR-069 is a Broadband Forum technical specification entitled CPE WAN Management Protocol.
It defines an application layer protocol for remote management of end-user devices.
As a bidirectional SOAP/HTTP-based protocol, it provides the communication between customer-premises
equipment and Auto Configuration Servers.. It includes both a safe auto configuration and the control of other CPE management functions
within an integrated framework.. The protocol addressed the growing number of different Internet access devices such
as modems, routers, gateways, set-top boxes, and VoIP-phones for the end-users.
The TR-069 standard was developed for automatic configuration of these devices with Auto Configuration
Servers.. The technical specifications are managed and published by the Broadband Forum.
TR-069 was first published in May 2004, with amendments in 2006, 2007, 2010, July 2011
to version 1.3. and November 2013 to version 1.4. Other forums, such as the Home Gateway Initiative, Digital Video Broadcasting and WiMAX Forum
endorsed CWMP as the protocol for remote management of home network devices and terminals.
There is a growing trend to add TR-069 management functionality to home networking devices behind
the gateway, as well as many other access devices like M2M, FTTH CPE/ONTs, WIMAX CPE
and other carrier access equipment.. Communication between the device and ACS Transport details
CWMP is a text based protocol..

Video Vocabulary

/ˈnetˌwərk/

noun verb

Group of computers connected to each other. To exchange information with colleagues, contacts.

/bəˈhāv/

verb

To act correctly.

/əˈkwipmənt/

noun

necessary items.

/ˈmanij/

verb

To run or operate a business by directing others.

/rəˌspänsəˈbilədē/

noun

Job, task or thing you are expected to look after.

/ˈprōdəˌkôl/

noun

Written agreement between countries.

/prəˈvīd/

verb

To make certain something will happen or be done.

/ˈbrôdˌband/

noun

Computer connection allowing fast internet access.

/ˌapləˈkāSH(ə)n/

noun

Software program, e.g. for smart phone.

noun verb

Very strong uncontrollable emotion, e.g. delight. To carry things from one place to another.

/ˈin(t)əˌɡrādəd/

adjective verb

desegregated. To combine together; make into one thing.

/ˌôdəˈmadik/

adjective noun

Done without conscious thought. Car that is able to change gears by itself.

/inˈklo͞od/

verb

comprise or contain as part of whole.

/ˈstandərd/

adjective noun

Being the accepted normal level of quality. Official unit of measuring something.

/ˈpəbliSHt/

adjective verb

(of book etc.) prepared and issued for public sale. To release information to the general public.