Access Circuit Sample Clauses

Access Circuit. The circuit between the Site and the Supplier’s point of presence (PoP”). UNI-C/SAP UNI-N EVPN Sw I-NNI EVPN Sw I-NNI UNI-N Access Circuits EVC Access Circuits I-NNI I-NNI UNI-C/SAP UNI-N EVPN Sw EVPN Sw UNI-N UNI-C/SAP UNI-C/SAP NTU NTU NTU NTU NTU = Network Terminating Unit EVPN Sw = Ethernet VPN Switch ntl: Telewest business Ethernet VPN As illustrated in the above diagram, all sites have single SAP with an Access Circuit within which a contracted bandwidth may be defined. Contracted bandwidth represents a bandwidth profile configured on the Ethernet VPN ingress switch port. A single broadcast or multicast ingress frame at a given SAP will be replicated in the Ethernet VPN and a single copy delivered to each of the other SAPs in the EVC. This kind of delivery would also typically apply to a service frame for which the Ethernet VPN has not yet learned an association of the destination MAC address with an EVC/SAP pair. This is an “E-LAN” service as defined by the MEF. Unicast traffic will be point-to-point based on MAC address. The Access Circuit will always be specified as 10, 100 or 1000Mbit/s dependent on the requested EVC data speed across the Ethernet VPN. Capacity across the Ethernet VPN will be between 2 and 1000Mbit/s. The Service comprises one NTU at each Customer Site providing connection to the Supplier Network. The NTUs will be located on the Customer Sites (at the end locations specified in the Order) and the Customer will be presented with either RJ45 copper interface for 10/100Mbit/s service or options of SM or MM on LC fibre connectors, or 1000BaseTx RJ45 copper interface for 1000Mbit/s. The Service demarcation point is the Customer-facing ports of the Customer-sited NTUs. This Service Definition covers Ethernet VPN Circuits at the following speeds: Access Circuit speeds at 10, to 100, to 1000Mbit/s, via Supplier fibre or Short Haul Data Service. EVC bandwidth options are: 2, 4, 6, 8, 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 200, 300, 400, 500, 600, 700, 800, 900 and 1000Mbit/s increments (to the limit of the tail capacity and connection speed). The key technical characteristics of the Ethernet VPN circuit are shown below:
AutoNDA by SimpleDocs
Access Circuit. 6.1. HUGE or the network operator supplies, configures and tests the Access Circuit.
Access Circuit. The circuit between the Site and the Supplier’s point of presence (PoP”). As illustrated in the above diagram, all sites have single SAP with an Access Circuit within which a contracted bandwidth may be defined. Contracted bandwidth represents a bandwidth profile configured on the Ethernet VPN ingress switch port. A single broadcast or multicast ingress frame at a given SAP will be replicated in the Ethernet VPN and a single copy delivered to each of the other SAPs in the EVC. This kind of delivery would also typically apply to a service frame for which the Ethernet VPN has not yet learned an association of the destination MAC address with an EVC/SAP pair. This is an “E-LAN” service as defined by the MEF. Unicast traffic will be point-to-point based on MAC address. The Access Circuit will always be specified as 10, 100 or 1000Mbit/s dependent on the requested EVC data speed across the Ethernet VPN. Capacity across the Ethernet VPN will be between 2 and 1000Mbit/s. The Service comprises one NTU at each Customer Site providing connection to the Supplier Network. The NTUs will be located on the Customer Sites (at the end locations specified in the Order) and the Customer will be presented with either RJ45 copper interface for 10/100Mbit/s service or options of SM or MM on LC fibre connectors, or 1000BaseTx RJ45 copper interface for 1000Mbit/s. The Service demarcation point is the Customer-facing ports of the Customer-sited NTUs. This Service Definition covers Ethernet VPN Circuits at the following speeds: Access Circuit speeds at 10, to 100, to 1000Mbit/s, via Supplier fibre or Short Haul Data Service. EVC bandwidth options are: 2, 4, 6, 8, 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 200, 300, 400, 500, 600, 700, 800, 900 and 1000Mbit/s increments (to the limit of the tail capacity and connection speed). The key technical characteristics of the Ethernet VPN circuit are shown below:
Access Circuit. 5.2.1 Verizon orders, configures and tests the Access Circuit.

Related to Access Circuit

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Configuration The configuration for the Purchase Right Aircraft will be the Detail Specification for Model 767-3S2F aircraft at the revision level in effect at the time of the Supplemental Agreement. Such Detail Specification will be revised to include (i) changes required to obtain required regulatory certificates and (ii) other changes as mutually agreed upon by Boeing and Customer.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Network Interface Device (NID) 2.7.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the end user’s customer-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the end user each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.