Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
|“||[are] primarily local portions of the network that connect end users to the core networks or directly to each other and enable them to use services such as local and long distance phone calling and various Internet-based services.||”|
|“||include commercial cellular providers and Wi-Fi networks. These networks provide wireless network access to mobile device users that allow them to connect to the Internet and to D/A enterprise services. Mobile devices are designed to natively take advantage of any wireless network connectivity available. These wireless networks may be trusted (secure enterprise wireless network), untrusted (public Wi-Fi), or hostile (foreign telecom provider's network).||”|
"These services are provided by various technologies such as satellites, including fixed and portable systems; wireless, including cellular base stations; cable, including video, data, and voice systems, and cable system end offices; and wireline, including voice and data systems and end offices. Communications traffic between two locations may originate and terminate within an access network without connecting to core networks (e.g., local phone calling within the wireline network). Communications traffic between different types of access networks (e.g., between the wireline and wireless networks) may use core networks to facilitate the transmission of traffic. Individual and enterprise users connect to access networks through various devices (e.g., wired phones, cell phones, and computers)."
- ↑ The Broadband Availability Gap, OBI Technical Paper No 1, Glossary, at 130 (full-text).
- ↑ Communications Networks: Outcome-Based Measures Would Assist DHS in Assessing Effectiveness of Cybersecurity Efforts, at 2 n.2.
- ↑ Government Mobile and Wireless Security Baseline, at 2.
- ↑ Id. at 4.