Network Configuration Clause Samples
The Network Configuration clause defines the requirements and responsibilities for setting up and maintaining the technical network infrastructure necessary for the agreement. It typically outlines which party is responsible for configuring hardware, software, and connectivity, and may specify standards or protocols to be followed. This clause ensures that both parties have a clear understanding of how the network will be established and maintained, minimizing the risk of miscommunication or technical incompatibility.
Network Configuration. Each party shall provide six (6) months advance written notice to the other party of any network configuration that may affect any of the services or compensation contemplated under this Agreement, and the parties hereto agree to use reasonable efforts to avoid service EXHIBIT D interruptions during any such network change.
Network Configuration. This section briefly reviews ▇▇▇ et al.’s network configuration for the better understanding ▇▇▇▇▇ et al.’s scheme and the proposed scheme for WSNs [12]. Xue et al.’s network configuration provides five basic models but this paper only will consider a specific model that user only could access data on the sensor nodes via GWN but not directly from them. The model is consisted with three main parties as shown in Fig. 1, which are user, GWN, and sensor nodes over a WSN. GWN plays an important role in the network. In order to further reach the specific sensor node, remote user is required to reach GWN through Internet at first. Contrary, sensing data from the sensor nodes firstly gets to GWN and further reaches the end user. If the data in the WSN is made available to the remote user on demand, mutual authentication between them must be ensured before allowing the remote user to access. With the aid of GWN, impenetrability of lightweight mutual authentication is going to be possible. Since the sensor nodes are deployed in harsh environments, authentication of the GWN is necessary for the user and the sensor node. Three parties have the following functionalities User: To read data on the sensor nodes over the WSN, user needs to have rights to access them via GWN, which requires to be registered on the GWN. GWN: GWN works as an authentication server over the WSN and intervenes between user and the sensor nodes. Sensor node: To provide sensed data, it only communicates with the authenticated GWN not with the user.
Network Configuration. Basically all basic network infrastructure required; switches, routers, etc
Network Configuration. Customer shall assure that each device to be interfaced shall be connected to the network and accessible to DataCaptor™ in a manner which is supported by Eclipsys according to the Eclipsys Supported Device Listing.
Network Configuration. 1.1. Networks used to access Personal Data must be configured as follows:
1.1.1. The internal network that supports Personal Data Processing must be configured using RFC 1918 IP addresses.
1.1.2. A stateful firewall must be used to control access between the Internet and workstations used to Process Personal Data.
1.1.3. Inbound Internet access must be protected from malicious code intrusion (e.g., scanning at email gateways, blocking links, stripping executables, intrusion detection/prevention system).
1.1.4. Outbound Internet access must have controls to prevent leakage and misdirection of Personal Data (e.g., proxy server, content filtering, or other network control).
1.1.5. If wireless networking is used at any point along the data path, the wireless network must be secured using the WPA2 standard.
Network Configuration. The Integration Specialist will configure the ▇▇▇▇▇▇▇ Software servers IP addresses per Customer’s specifications provided in the Site Readiness Form. TTL will be set according to the number of hops indicated on the completed Site Readiness Form. The Integration Specialist will provide a sample configuration file for the DHCP server provided by Customer. Depending on the Customer network and STB to be used, the Multicast IP Addresses for iTVFusion Services will be set according to the completed Site Readiness Form. Customized Logos - Per Customer’s request, the Integration Specialist will help Customer install customized logo and boot screen graphic. Customer will provide the logo and boot screen graphics according to the iTVFusion Client Configuration Guide.
Network Configuration. Indoor Wi-Fi coverage : Appendix B depicts the conceptual network configuration of the indoor Wi-Fi network which is configured in a star topology. The selected Operator who is the Wi-Fi service provider will be responsible for the overall performance of the Wi-Fi network in terms of coverage, security, throughput and latency performance, etc. TraxComm will provide the E&M infrastructure in general and also acts as the appointed Contractor to install all the network components. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the indoor Wi-Fi network is detailed in Appendix C. In-train Wi-Fi coverage : Appendix D depicts two typical configuration of KTT Though Train. The fleet size ranges from 7 to 9 passenger cars depending on the traffic needs configured with one or two Premium Coaches. Under normal operation, the train fleet is made up of two Premium Coaches located in the middle of the fleet and where the 3G routers will be installed. The conceptual design of the in-train Wi-Fi network incorporates redundant 3G routers when two Premium Coaches are deployed for train services. When one of Premium Coaches is out of service for maintenance reason, the in-train Wi-Fi service will be supported by the 3G router(s) installed inside only one Premium Coach. Appendix E depicts the conceptual network schematic of the physical in-train Wi-Fi network which is subject to changes and to the approval by the MTR Corporation. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the in-train Wi-Fi network is detailed in Appendix F. General demarcation of roles and responsibilities for indoor as well as in-train Wi-Fi network service provision : Appendix C provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respective network components with reference to the conceptual network schematic provided in Appendix B for indoor Wi-Fi network service provision. Appendix F provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respective network components with reference to the conceptual network schematic provided in...
Network Configuration. Network attached device must contain a unique network identifier. If the network is using TCP/IP as a communication protocol, these identifiers are called IP addresses. The following series of screens will allow you to choose from two different methods of assigning the IP addresses.
3.2.1.1 Use the IP information supplied by DHCP
Network Configuration. Firewalls must allow access to Port 80 (https). • Test-takers must use a restricted account log on to the testing computers that limits rights to both the local system and the network (prevents access to other shared network drives or launch of any unauthorized software on the machine).
Network Configuration. Subject to the provisions of this Agreement, 360americas shall have full responsibility for determining any network and service configuration or designs, routing configurations, rearrangement or consolidation of channels or circuits and all related functions with regard to its use of the IRU Fibers.
