Mobility Management Sample Clauses

Mobility Management. The agreement on employment management in Europe, the first part of the social charter, referred to the importance that the BNP Paribas Group and representatives of European staff attach to the development of internal mobility. This development can only continue if it rests on the principle of excluding any discrimination by gender. The titles and terms used in internal job vacancies must be chosen with care in order to permit, without differentiation, applications from both women and men. Under no circumstances must they mention the gender of the candidate searched, be it directly or indirectly. In order to encourage a wider range of candidates in certain positions, it could in some cases be mentioned that these positions can be exercised part-time. Selection is based on skills and is carried out in complete compliance with all regulations and principles relating to equality of opportunity. It is also planned that during the selection process, Human Resources staff and managers will ensure as far as possible that the short list of successful candidates includes at least one woman (or at least one man, respectively).
AutoNDA by SimpleDocs
Mobility Management. The Board shall review and comment annually on Mobility Management efforts.
Mobility Management. Handover framework is the basic mobility management from the RAN point of view. Inter-5G handover takes place when D2D UEs move across different 5G RANs and AIVs, as shown in Figure 6-2. Intra-5G handover happens when D2D UEs move within the same 5G RAN. 5G RAN can switch D2D communications to small cells or other AIVs within the coverage of 5G RAN. A general handover procedure includes (1) signal quality measurement, (2) coordination between the source and target BSs, (3) resource allocation of the target BS, and (4) packet switch from the source BS to the target BS. Thus, signal quality measurement is the first step in terms of the RAN-level mobility management. The D2D UEs measure link quality of ongoing communication link and possibly of nearby AIVs as indicated by RAN. To satisfy 5G RAN lean design and to reduce the “always on” system access, the measurement targets info can be carried and announced by “on-demand” SIB or dedicated signaling. “On-demand” SIB announces the common candidates of measurement targets. The dedicated signaling informs the specific configuration and candidates of measurement targets. The D2D UEs measure D2D signal and Uu signal when needed and being informed using “on-demand” SIB and/or dedicated signaling to save network power consumption. Thus, the timing as well as target of measurement can be decided by 5G RAN using the “on-demand” approach. Optionally, UE may proactively send such reports. Figure 6-2: Inter-5G D2D communications 5G RAN may also communicate with RAN of other AIVs, other intra-PLMN 5G RAN and other inter-PLMN 5G RAN. Enhancements to X2* interfaces are required to support this in order to achieve inter-RAT D2D compatibility and service continuity, in terms of the second step for RAN- level mobility management, as mentioned above in the second paragraph. As such, 5G RAN requires multi-AIV signal measurement and D2D link measurement. Furthermore, in order to ensure service continuity across different RANs/AIVs, 5G RAN design can employ unified and global D2D ID for each corresponding D2D UE that enables the coordination and UE identification among different RANs/AIVs. In such cases where D2D UE has unique global ID, 5G RAN is able to uniquely identify all D2D UEs within a D2D group. With proper multi-AIV signal measurement and D2D signal measurement, handover decisions can be smartly made to enhance D2D service continuity. D2D signal measurement is done using layer reference signal e.g. similar to those used i...
Mobility Management. [*] CERTAIN MATERIAL (INDICATED BY AN ASTERISK) HAS BEEN OMITTED FROM THIS DOCUMENT PURSUANT TO A REQUEST FOR CONFIDENTIAL TREATMENT. THE OMITTED MATERIAL HAS BEEN FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION.
Mobility Management. Handover management: Specifically, in the MHN, a fast handover mechanism is required even in high-speed movements keeping user data rate for application service. To this end, designated handover scheme using policy-based SDN technologies is exploited and used for PoC of the mobility management. In the future functional decomposition & distribution for global service management will span multiple PoP(Point of Presence)s over the network. Anchoring and mobility management tailored to a network slicing instance will be determined at the central node. Composition functions and resource will be orchestrated for dynamic mobility management. Distributed Mobility Management technology is to distribute and place IP anchoring functions over the network to address issues stemming from conventional centralized single anchoring architecture such as Mobile IP (MIP), Proxy Mobile IP (PMIP). There are 5 DMM architectural models applicable to mobile core networks of 5GCHAMPION.
Mobility Management. A. Purpose
Mobility Management 
AutoNDA by SimpleDocs

Related to Mobility Management

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • Quality Management Grantee will:

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Construction Management Landlord or its Affiliate or agent shall supervise the Work, make disbursements required to be made to the contractor, and act as a liaison between the contractor and Tenant and coordinate the relationship between the Work, the Building and the Building’s Systems. In consideration for Landlord’s construction supervision services, Tenant shall pay to Landlord a construction supervision fee equal to three percent (3%) of Tenant’s Costs specified in Section 7.

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

  • Construction Management Services a. A-E may be required to review and recommend approval of submittals, shop drawings, Request for Information (RFI) and/or calculations for temporary structures such as trench shoring, false work and other temporary structural forms.

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.