Ethernet User Traffic Sample Clauses

Ethernet User Traffic. Network to User In Figure tfrro! Use a guia Início para aplicar Heading 1 ao texto que xxxxxx aparecer aqui.-22 the rectangles illustrate the data flow for Ethernet user traffic from a network port to a user port. The rounded rectangles indicate the features that need to be configured, numbered according to the order of configuration. Table -11 shows the configuration steps corresponding to the numbers. Figure Erro! Use a guia Início para aplicar Heading 1 ao texto que xxxxxx aparecer aqui.-22. tfthernet User Traffic Data Flow – Network to User Table -11. tfthernet User Traffic Configuration – Network to User Sequence Step Commands Comments 1 Defining Classifier Profiles classifier-profile match The classifier profile defines the criteria for the network-to-user flow 2 Marking Profiles marking-profile mark Necessary only if a profile is needed for non-default mapping of p-bit, IP precedence, DSCP, or CoS classifications to egress priority tags for the network-to-user flow 3 Queue Mapping Profiles queue-map-profile map Necessary only if a profile is needed for non-default mapping of user priorities to queues for the network-to-user flow 4 Configuring Policer Profiles policer-profile bandwidth compensation Necessary only if you need to define non-default bandwidth limits or overhead compensation for the incoming traffic of the network-to-user flow Sequence Step Commands Comments 5 Configuring Queue Block Profile Parameters queue-block-profile queue scheduling depth Necessary only if you need to define non-default queue configuration for the network-to-user flow 6 WRtfD Profiles wred-profile color Necessary only if you need to define non-default WRED configuration for the queue blocks
AutoNDA by SimpleDocs

Related to Ethernet User Traffic

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • Dark Fiber Transport Dark Fiber Transport is defined as Dedicated Transport that consists of unactivated optical interoffice transmission facilities without attached signal regeneration, multiplexing, aggregation or other electronics. Except as set forth in Section 6.9.1 below, BellSouth shall not be required to provide access to Dark Fiber Transport Entrance Facilities pursuant to this Agreement.

  • Transit Traffic The following rates will apply:

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Customer Service Support During the Term of this Agreement, VNDS will provide reasonable telephone and e-mail customer service support to Registrar, not Registered Name Holder or prospective customers of Registrar, for nontechnical issues solely relating to the System and its operation. VNDS will provide Registrar with a telephone number and e-mail address for such support during implementation of the Supported Protocol, APIs and Software. First-level telephone support will be available on a 7-day/24-hour basis. VNDS will provide a web-based customer service capability in the future and such web-based support will become the primary method of customer service support to Registrar at such time.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!