Browse Definitions :
Definition

carrier network

Contributor(s): Stan Gibilisco

A carrier network is the proprietary network infrastructure belonging to a telecommunications service provider such as Verizon, AT&T or Sprint. Telecom carriers are authorized by regulatory agencies to operate telecommunications systems. Carrier networks are made up of large, complex configurations of hardware, interconnected to provide communications services to people spread over large geographic areas.

Specific device types served by a carrier network include telephony equipment, CATV (community access television) receivers, satellite television receivers, mobile computing devices, PCs (personal computers), and certain specialized items such as medical and surveillance equipment.

Carrier networks distribute massive quantities of data over great distances. The long-distance signal-conveying medium in a carrier network is sometimes called the backbone. Most of the backbone is built around fiber optics, although some portions of some networks still employ "copper" (cable). Internet service to individual end users can take place through fiber optics (in the best-case scenario) although cable, wireless, and satellite Internet modes are more common. In rural areas, some end users rely on twisted pair telephone lines for their Internet access.

This was last updated in August 2012

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Thanks for absolutely answering even the simple questions! You are needed and appreciated.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close