Network Configuration Sample Clauses

Network Configuration. Each party shall provide six (6) months advance written notice to the other party of any network configuration that may affect any of the services or compensation contemplated under this Agreement, and the parties hereto agree to use reasonable efforts to avoid service EXHIBIT D interruptions during any such network change.
AutoNDA by SimpleDocs
Network Configuration. 1.1. Networks used to access Personal Data must be configured as follows: 1.1.1. The internal network that supports Personal Data Processing must be configured using RFC 1918 IP addresses. 1.1.2. A stateful firewall must be used to control access between the Internet and workstations used to Process Personal Data. 1.1.3. Inbound Internet access must be protected from malicious code intrusion (e.g., scanning at email gateways, blocking links, stripping executables, intrusion detection/prevention system). 1.1.4. Outbound Internet access must have controls to prevent leakage and misdirection of Personal Data (e.g., proxy server, content filtering, or other network control). 1.1.5. If wireless networking is used at any point along the data path, the wireless network must be secured using the WPA2 standard.
Network Configuration. Basically all basic network infrastructure required; switches, routers, etc
Network Configuration. Customer shall assure that each device to be interfaced shall be connected to the network and accessible to DataCaptor™ in a manner which is supported by Eclipsys according to the Eclipsys Supported Device Listing.
Network Configuration. The Integration Specialist will configure the Xxxxxxx Software servers IP addresses per Customer’s specifications provided in the Site Readiness Form. TTL will be set according to the number of hops indicated on the completed Site Readiness Form. The Integration Specialist will provide a sample configuration file for the DHCP server provided by Customer. Depending on the Customer network and STB to be used, the Multicast IP Addresses for iTVFusion Services will be set according to the completed Site Readiness Form. Customized Logos - Per Customer’s request, the Integration Specialist will help Customer install customized logo and boot screen graphic. Customer will provide the logo and boot screen graphics according to the iTVFusion Client Configuration Guide.
Network Configuration. This section briefly reviews Xxx et al.’s network configuration for the better understanding Xxxxx et al.’s scheme and the proposed scheme for WSNs [12]. Xue et al.’s network configuration provides five basic models but this paper only will consider a specific model that user only could access data on the sensor nodes via GWN but not directly from them. The model is consisted with three main parties as shown in Fig. 1, which are user, GWN, and sensor nodes over a WSN. GWN plays an important role in the network. In order to further reach the specific sensor node, remote user is required to reach GWN through Internet at first. Contrary, sensing data from the sensor nodes firstly gets to GWN and further reaches the end user. If the data in the WSN is made available to the remote user on demand, mutual authentication between them must be ensured before allowing the remote user to access. With the aid of GWN, impenetrability of lightweight mutual authentication is going to be possible. Since the sensor nodes are deployed in harsh environments, authentication of the GWN is necessary for the user and the sensor node. Three parties have the following functionalities User: To read data on the sensor nodes over the WSN, user needs to have rights to access them via GWN, which requires to be registered on the GWN. GWN: GWN works as an authentication server over the WSN and intervenes between user and the sensor nodes. Sensor node: To provide sensed data, it only communicates with the authenticated GWN not with the user.
Network Configuration. Indoor Wi-Fi coverage : Appendix B depicts the conceptual network configuration of the indoor Wi-Fi network which is configured in a star topology. The selected Operator who is the Wi-Fi service provider will be responsible for the overall performance of the Wi-Fi network in terms of coverage, security, throughput and latency performance, etc. TraxComm will provide the E&M infrastructure in general and also acts as the appointed Contractor to install all the network components. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the indoor Wi-Fi network is detailed in Appendix C. In-train Wi-Fi coverage : Appendix D depicts two typical configuration of KTT Though Train. The fleet size ranges from 7 to 9 passenger cars depending on the traffic needs configured with one or two Premium Coaches. Under normal operation, the train fleet is made up of two Premium Coaches located in the middle of the fleet and where the 3G routers will be installed. The conceptual design of the in-train Wi-Fi network incorporates redundant 3G routers when two Premium Coaches are deployed for train services. When one of Premium Coaches is out of service for maintenance reason, the in-train Wi-Fi service will be supported by the 3G router(s) installed inside only one Premium Coach. Appendix E depicts the conceptual network schematic of the physical in-train Wi-Fi network which is subject to changes and to the approval by the MTR Corporation. Demarcation of responsibilities between TraxComm and the selected Operator with respect to the supply (which implies ownership in general), installation, and maintenance responsibilities of respective network components for the in-train Wi-Fi network is detailed in Appendix F. General demarcation of roles and responsibilities for indoor as well as in-train Wi-Fi network service provision : Appendix C provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respective network components with reference to the conceptual network schematic provided in Appendix B for indoor Wi-Fi network service provision. Appendix F provides details of the demarcation of design, supply (ownership), installation and scope of maintenance service for respective network components with reference to the conceptual network schematic provided in...
AutoNDA by SimpleDocs
Network Configuration. 6.1 NOVA and NOVA merchants will access VITAL's system utilizing data communication protocols, transaction formulas and devices certified by VITAL. 6.2 NOVA and/or NOVA merchants will be responsible for the installation, servicing and maintenance of equipment at NOVA or it's merchant's facilities, and will be responsible for the connection of those devices to the network in compliance with VITAL's requirements. 6.3 VITAL reserves the right to change all or part of the protocols and the network configuration used by VITAL in providing the Merchant Services, provided that if any change in the network configuration would require NOVA or its merchants to change data communication protocols or communication networks, VITAL will provide NOVA with one hundred eighty (180) days written notice.
Network Configuration. APS shall configure its network of MHSA Providers as required by applicable law. Upon request by an HMO Subsidiary, APS shall provide each HMO Subsidiary with current directories of MHSA Providers in that HMO Subsidiary's
Network Configuration. Firewalls must allow access to Port 80 (https). • Test-takers must use a restricted account log on to the testing computers that limits rights to both the local system and the network (prevents access to other shared network drives or launch of any unauthorized software on the machine).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!