Command frames Sample Clauses

Command frames. Default MAC Header settings for command frames are shown in Table 55. Table 55 — Default MAC Header field values for command frames Header field Value Protocol Version 0 Secure As defined in 7.2.1.2 ACK Policy 0 (No-ACK) or 1 (Imm-ACK) Frame Type 2 (command frame) Frame Subtype Value from Table 56 Retry As defined in 7.2.1.6 DestAddr DevAddr of the recipient SrcAddr DevAddr of the transmitter Sequence Control As defined in 7.2.4 Duration As described in 7.2.5.1 and 8.1.9.1 More Frames As defined in 7.2.5.2 Access Method As defined in 7.2.5.3 Table 56 contains a list of valid values for the Frame Subtype field for command frames. Table 56 — Frame Subtype field encoding for Command frames Value Command frame subtype Description 0 DRP Reservation Request Used to request creation or modification of a DRP reservation 2 Probe Used to request for, or respond with, information elements 3 Pair-wise Temporal Key (PTK) Used to derive a PTK via a 4-way handshake between two devices
AutoNDA by SimpleDocs

Related to Command frames

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Links and Frames Links to other sites may be provided on the portion of the Site through which the Service is offered for your convenience. By providing these links, we are not endorsing, sponsoring or recommending such sites or the materials disseminated by or services provided by them, and are not responsible for the materials, services or other situations at or related to or from any other site, and make no representations concerning the content of sites listed in any of the Service web pages. Consequently, we cannot be held responsible for the accuracy, relevancy, copyright compliance, legality or decency of material contained in sites listed in any search results or otherwise linked to the Site. For example, if you "click" on a banner advertisement or a search result, your "click" may take you off the Site. This may include links from advertisers, sponsors, and content partners that may use our logo(s) as part of a co-branding agreement. These other sites may send their own cookies to users, collect data, solicit personal information, or contain information that you may find inappropriate or offensive. In addition, advertisers on the Site may send cookies to users that we do not control. You may link to the home page of our Site. However, you may not link to other pages of our Site without our express written permission. You also may not "frame" material on our Site without our express written permission. We reserve the right to disable links from any third party sites to the Site.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Quality Management System Supplier hereby undertakes, warrants and confirms, and will ensue same for its subcontractors, to remain certified in accordance with ISO 9001 standard or equivalent. At any time during the term of this Agreement, the Supplier shall, if so instructed by ISR, provide evidence of such certifications. In any event, Supplier must notify ISR, in writing, in the event said certification is suspended and/or canceled and/or not continued.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

Time is Money Join Law Insider Premium to draft better contracts faster.