Netramet Sample Clauses

Netramet. ‌ Netramet is an implementation of the Meter MIB [RFC2720] defined by the IETF Real-time Traffic Flow Measurement working group. This working group has completed this work, and is therefore no longer an active working group. A record of the output of this group is still available elsewhere [RT- FM]. The basic architecture of a RTFM traffic flow measurement system consists of three basic building blocks: • Meters gather data about packets and condense this data into ‘flow data’. • Meter Readers retrieve flow data from meters using the SNMP protocol. • Managers co-ordinate the activities of the meters and the meter readers. The basic operation of the system involves the creation of rulesets. Each rule in a ruleset defines the criteria that determine which packets belongs to which flow. Any information that is available in the IP packet header can be used for this, so rules can look at source IP address, destination IP address, source and destination port numbers, protocol identifiers (TCP, UDP, ICMP) and so on. A flow is de- fined in the NeTraMet manual as “a stream of packets exchanged between two network hosts, which we refer to as the flow's source and destination. Flows are bi-directional in that packets and bytes can be counted in the 'to' (source to destination) and 'from' (destination to source) directions” The rulesets can be descibed in the native format that NeTraMet uses, or they can be written in a higher level language called the Simple Rule Language [SRL] and then compiled into the native for- mat. The manager downloads the ruleset into the meter, and the process of matching packets against the ruleset and counting the packets in each individual flow begins. The network card is put into promis- cuous mode, so that every packet in the complete broadcast domain is examined by the NeTraMet software. Each arriving packet is matched against the rules in a rule set, and if it matches, it belongs to a flow. If a flow did not exist, a ‘record’ for it is created. As long as new packets arrive within the flow time-out value, the flow stays in existence, otherwise, it is closed. The meter readers gather the data from the meters at regular intervals for further processing. A sep- arate program called nifty is available that provides a near-Real-time graphical view on the measured flows in a ruleset. It is in the processing step in the meter reader that the actual SLA parameter verification has to take place.
AutoNDA by SimpleDocs

Related to Netramet

  • Licensee Licensee represents and warrants that:

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

  • LICENSOR any Person from whom a Grantor obtains the right to use any Intellectual Property. Lien: any Person’s interest in Property securing an obligation owed to, or a claim by, such Person, whether such interest is based on common law, statute or contract, including liens, security interests, pledges, hypothecations, statutory trusts, reservations, exceptions, encroachments, easements, rights-of-way, covenants, conditions, restrictions, leases, and other title exceptions and encumbrances affecting Property. Lien Waiver: an agreement, in form and substance satisfactory to Collateral Agent, by which (a) for any material Collateral located on leased premises, the lessor waives or subordinates any Lien it may have on the Collateral, and agrees to permit Collateral Agent to enter upon the premises and remove the Collateral or to use the premises to store or dispose of the Collateral; (b) for any Collateral held by a warehouseman, processor, shipper, customs broker or freight forwarder, such Person waives or subordinates any Lien it may have on the Collateral, agrees to hold any Documents in its possession relating to the Collateral as agent for Collateral Agent, and agrees to deliver the Collateral to Collateral Agent upon request; (c) for any Collateral held by a repairman, mechanic or bailee, such Person acknowledges Collateral Agent’s Lien, waives or subordinates any Lien it may have on the Collateral, and agrees to deliver the Collateral to Collateral Agent upon request; and (d) for any Collateral subject to a Licensor’s Intellectual Property rights, the Licensor grants to Collateral Agent the right, vis-à-vis such Licensor, to enforce Collateral Agent’s Liens with respect to the Collateral, including the right to dispose of it with the benefit of the Intellectual Property, whether or not a default exists under any applicable License.

  • License Key 2.5. The Application Software may include an embedded security system which if provided must be used together with a license key. The license key may limit the use of the Application Software to the applicable Use Level and prevent a single User from using more than one workstation at the same time and is valid for a certain period of time following which the license key must be renewed. Customer is solely responsible for any cost or loss arising out of Customer’s failure or delay to renew the license key.

  • License Keys The Software, when used in production, requires a License Key to install or access it. You are responsible for the use of any License Key(s) assigned to you and must not share the License Key(s) with any third party. If your License Key is stolen, or if you suspect any improper or illegal usage of your License Key, you should promptly notify Acumatica of such occurrence. A replacement License Key will be issued to you and the compromised License Key will be disabled.

  • WHMIS The Work-place Hazardous Materials Information System (WHMIS) is designed to classify hazardous materials that are used in the work place. The law requires all such products to be properly labelled and requires material safety data sheet(s) (MSDS) to be suitably attainable. Employees will receive training to inform them of such products and advise them of the hazards involved, and of the proper procedures for safe storage, handling, use and disposal of these materials. Employees will also be instructed about what to do should they be exposed to a hazardous material. The Company has WHMIS charts posted throughout the plant.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • MIDDLE SCHOOLS 1. Where there are no negotiated provisions concerning the implementation or operation of a middle school program, this article shall govern the implementation or operation of a middle school program in a school district.

  • By Licensor Licensor will indemnify, defend and hold harmless Licensee and its Affiliates, and their respective directors, officers and employees (“Licensee Indemnitees”) from and against any and all Third Party Claims and associated Liabilities to the extent arising directly or indirectly from any material breach by Licensor of the terms of this Agreement..

Time is Money Join Law Insider Premium to draft better contracts faster.