Network Configuration Sample Clauses

Network Configuration. Each party shall provide six (6) months advance written notice to the other party of any network configuration that may affect any of the services or compensation contemplated under this Agreement, and the parties hereto agree to use reasonable efforts to avoid service EXHIBIT D interruptions during any such network change.
AutoNDA by SimpleDocs
Network Configuration. The Integration Specialist will configure the Xxxxxxx Software servers IP addresses per Customer’s specifications provided in the Site Readiness Form. TTL will be set according to the number of hops indicated on the completed Site Readiness Form. The Integration Specialist will provide a sample configuration file for the DHCP server provided by Customer. Depending on the Customer network and STB to be used, the Multicast IP Addresses for iTVFusion Services will be set according to the completed Site Readiness Form. Customization & Integration Customized Logos - Per Customer’s request, the Integration Specialist will help Customer install customized logo and boot screen graphic. Customer will provide the logo and boot screen graphics according to the iTVFusion Client Configuration Guide.
Network Configuration. Customer shall assure that each device to be interfaced shall be connected to the network and accessible to DataCaptor™ in a manner which is supported by Eclipsys according to the Eclipsys Supported Device Listing.
Network Configuration. (TBD) Basically all basic network infrastructure required; switches, routers, etc
Network Configuration. This section briefly reviews Xxx et al.’s network configuration for the better understanding Xxxxx et al.’s scheme and the proposed scheme for WSNs [12]. Xue et al.’s network configuration provides five basic models but this paper only will consider a specific model that user only could access data on the sensor nodes via GWN but not directly from them. The model is consisted with three main parties as shown in Fig. 1, which are user, GWN, and sensor nodes over a WSN. User GWN Sensor node Figure 1. WSN Network Configuration GWN plays an important role in the network. In order to further reach the specific sensor node, remote user is required to reach GWN through Internet at first. Contrary, sensing data from the sensor nodes firstly gets to GWN and further reaches the end user. If the data in the WSN is made available to the remote user on demand, mutual authentication between them must be ensured before allowing the remote user to access. With the aid of GWN, impenetrability of lightweight mutual authentication is going to be possible. Since the sensor nodes are deployed in harsh environments, authentication of the GWN is necessary for the user and the sensor node. Three parties have the following functionalities User: To read data on the sensor nodes over the WSN, user needs to have rights to access them via GWN, which requires to be registered on the GWN. GWN: GWN works as an authentication server over the WSN and intervenes between user and the sensor nodes. Sensor node: To provide sensed data, it only communicates with the authenticated GWN not with the user.
Network Configuration. 1.1. Networks used to access Personal Data must be configured as follows:
Network Configuration. Indoor Wi-Fi coverage : Appendix B depicts the conceptual network configuration of the indoor Wi-Fi network which is configured in a star topology. The selected Operator who is the Wi-Fi service provider will be responsible for the overall performance of the Wi-Fi network in terms of coverage, security, throughput and latency performance, etc. TraxComm will provide the E&M infrastructure in general and also acts as the appointed Contractor to install all the network components. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the indoor Wi-Fi network is detailed in Appendix C. In-train Wi-Fi coverage : Appendix D depicts two typical configuration of KTT Though Train. The fleet size ranges from 7 to 9 passenger cars depending on the traffic needs configured with one or two Premium Coaches. Under normal operation, the train fleet is made up of two Premium Coaches located in the middle of the fleet and where the 3G routers will be installed. The conceptual design of the in-train Wi-Fi network incorporates redundant 3G routers when two Premium Coaches are deployed for train services. When one of Premium Coaches is out of service for maintenance reason, the in-train Wi-Fi service will be supported by the 3G router(s) installed inside only one Premium Coach. Appendix E depicts the conceptual network schematic of the physical in-train Wi-Fi network which is subject to changes and to the approval by the MTR Corporation. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the in-train Wi-Fi network is detailed in Appendix F. Demarcation of Roles and Responsibilities between TraxComm and the selected Operator General demarcation of roles and responsibilities for indoor as well as in-train Wi-Fi network service provision : Appendix C provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respective network components with reference to the conceptual network schematic provided in Appendix B for indoor Wi-Fi network service provision. Appendix F provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respect...
AutoNDA by SimpleDocs
Network Configuration. 3.1 Indoor Wi-Fi coverage :
Network Configuration. The network configuration of the authenticated key agreement scheme, which is target of this paper, is shown in Figure 1. There are three main participants in the network, which are a user, a client with smart card, and a server. It is assumed that the user should issue his (or her) smart card from the server. The client has to get the possibility access to the smart card of the user and needs to communicate with the remote server via Internet, which is unsecure. Furthermore, it is assumed that all the computations related with the security are performed in the smart card. User Client Internet Remote Smart
Network Configuration. Network attached device must contain a unique network identifier. If the network is using TCP/IP as a communication protocol, these identifiers are called IP addresses. The following series of screens will allow you to choose from two different methods of assigning the IP addresses.
Time is Money Join Law Insider Premium to draft better contracts faster.