TR-069 Parameters Deep Dive

The remote provisioning and management of CPEs offers service providers a number of advantages by simplifying and speeding up device operations while reducing support costs. However, for providers new to TR-069 — the protocol that makes this all possible — there can be a lot of learn, particularly when it comes to defining TR-069 parameters.

This document outlines how TR-069 parameters are used within the Incognito TR-069 solution, Incognito Auto Configuration Server.

Continue Reading
  • Share:

Understanding Messaging: Part Two — RabbitMQ

The first half of this two-part article, Understanding Messaging: Part One — The Basics, outlined the importance of efficient messaging in software solutions. This second article aims to increase your understanding further by explaining each component of a message and how these work in RabbitMQ, the AMQP messaging system used in Incognito Auto Configuration Server

Continue Reading
  • Share:

Understanding Messaging: Part One — The Basics

This two-part article aims to familiarize you with the concepts of messaging, the benefits of messaging, and the particularities of using RabbitMQ as a messaging system. This system  is used in Incognito Auto Configuration Server and can also be used to allow third-party applications effectively communicate and integrate with Incognito products.

Part one will introduce to the concepts of messaging and the benefits of using an asynchronous messaging system. Part two will go into further detail about the various components of a message and how RabbitMQ works to efficiently enable communication.

Continue Reading
  • Share:

How to Provision a Device in 15 Minutes

The Broadband Forum’s TR-069 suite of protocols is revolutionizing the broadband industry by
giving wireline and cable operators the ability to offer new services, reduce operational costs, and
gain visibility into devices within the subscriber’s home. This technical specification has become
the protocol of choice for service providers and offers rich management capabilities for a wide
range of devices in a variety of network settings.

Continue Reading
  • Share:

Enhance Network Security with DHCP Access Control

Device and subscriber security can be a serious concern for broadband service providers. In the provisioning space, DHCP relay is a potential entry point for security threats. For instance, if there is no authentication or authorization during an exchange between a DHCP server and DHCP client, the server cannot determine whether the client requesting the address is legitimate. Rogue clients and servers can create a number of problems, including denial of service, installation of unauthorized software, exposure of sensitive information, and hijacking of DNS servers. It’s therefore essential to include DHCP access control in your network security considerations.

Continue Reading
  • Share: