Congestion detection Sample Clauses

Congestion detection. Since detection of congestion is now carried at switches, we move the detection logic to switches. Also, as now in BAHIA-2 we detect congestion rather than bursty traffic, we need a different detection mechanism. The new mechanism basically consists in measuring how long messages are queued at the switches waiting for winning an output port. If more than two messages wait longer than a determined threshold, then we assume the output port they request is congested. In that situation, a notification is triggered to the end nodes (possibly with a modified BNN or using the control network assumed in the OCRL mechanism). The mechanism to detect congestion relies on two counters per output port. One counter keeps track of the number of active requests to that output port (one request every time a message comes and is routed to that output port) and the second counter keeps track the time elapsed in cycles from the time two or more requests are pending. When the first counter reaches two for an output port (at least two messages are competing for the same output port) the second counter is reset and starts counting. Congestion is detected when the second counter reaches a threshold. When the first counter decreases to 1 or zero, the second counter is reset (congestion vanished) and a end-of-congestion notification is triggered to the end nodes.
AutoNDA by SimpleDocs

Related to Congestion detection

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Network Congestion Reduced Speed for Routing or Answering 911 Dialing Calls. There may be a greater possibility of network congestion and/or reduced speed in the routing of a 911 Dialing call made utilizing the Service as compared to traditional 911 dialing over traditional public telephone networks.

  • Tuberculosis Examination The examination shall consist of an approved intradermal tuberculosis test, which, if positive, shall be followed by an X-ray of the lungs. Nothing in Sections 5163 to 5163.2, inclusive, shall prevent the governing body of any city or county, upon recommendation of the local health officer, from establishing a rule requiring a more extensive or more frequent examination than required by Section 5163 and this section. § 5163.2. Technician taking X-ray film; Interpretation of X-ray The X-ray film may be taken by a competent and qualified X-ray technician if the X-ray film is subsequently interpreted by a licensed physician and surgeon.

  • Smoke Detector Tenant acknowledges that Premises is equipped with a smoke detector(s) that is in good working order and repair. Tenant agrees to be solely responsible to check the smoke detector every thirty (30) days and notify Landlord immediately if the smoke detector is not functioning properly.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • CURVE WIDENING The minimum widening placed on the inside of curves is:  6 feet for curves of 50 to 79 feet radius.  4 feet for curves of 80 to 100 feet radius.

  • Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.

  • Psychotherapist-Patient Privilege The information disclosed by Patient, as well as any records created, is subject to the psychotherapist-patient privilege. The psychotherapist-patient privilege results from the special relationship between Therapist and Patient in the eyes of the law. It is akin to the attorney-client privilege or the doctor-patient privilege. Typi- cally, the patient is the holder of the psychotherapist-patient privilege. If Therapist received a subpoena for records, deposition testimony, or testimony in a court of law, Therapist will assert the psychotherapist-patient privilege on Patient’s behalf until instructed, in writing, to do otherwise by Patient or Patient’s representative. Patient should be aware that he/she might be waiving the psychotherapist-patient privilege if he/she makes his/her mental or emotional state an issue in a legal proceeding. Patient should address any concerns he/she might have regarding the psychotherapist-patient privilege with his/her attorney. Fee and Fee Arrangements The usual and customary fee for service is $100.00 per 50-minute session. Sessions longer than 50-minutes are charged for the additional time pro rata. Therapist reserve the right to periodically adjust this fee. Patient will be notified of any fee adjustment in advance. In addition, this fee may be adjusted by contract with in- surance companies, managed care organizations, or other third-party payers, or by agreement with Therapist. From time-to-time, Therapist may engage in telephone contact with Patient for purposes other than sched- uling sessions. Patient is responsible for payment of the agreed upon fee (on a pro rata basis) for any tele- phone calls longer than ten minutes. In addition, from time-to-time, Therapist may engage in telephone con- tact with third parties at Patient’s request and with Patient’s advance written authorization. Patient is respon- sible for payment of the agreed upon fee (on a pro rata basis) for any telephone calls longer than ten minutes. Patients are expected to pay for services at the time services are rendered. Therapist accepts cash, or major credit cards.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.