Relay Nodes Sample Clauses

Relay Nodes. Wireless backhaul connects relay nodes to the rest of the net- work when there are air interface resources available [39]. Designated for both indoor and outdoor scenarios, relay nodes transmit power levels are limited accordingly. Transmission power regulations limit relay nodes to a maximum of 100 mW for indoor and between 250 mW - 2 W for outdoor communica- tions. Directional and omni-directional antennas are employed for backhaul and access link connectivity, respectively. There are two modes of relay node deployment strategies based on their resource utilisation pattern. As the main 3GPP focus, In-Band relays use the same radio frequency resources in both uplink and downlink for the wireless backhaul communication. Out-of-Band relays however, use different resources requiring dedicated spectrum. Both Full-Duplex (FD) and Half-Duplex (HD) communications are further defined for In-Band relay nodes. Simultaneous transmission and reception is facili- xxxxx for FD in which the same frequency band is used on the relay to base station and user to relay radio links as opposed to a Time Division Multiple Access (TDMA) type communication in HD. Relay nodes have the same MME connection interface as pico and macro cells.
AutoNDA by SimpleDocs

Related to Relay Nodes

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Local Switching Interfaces 4.2.13.1 Newcomm shall order ports and associated interfaces compatible with the services it wishes to provide as listed in Exhibit A. BellSouth shall provide the following local switching interfaces:

  • Net Metering If you generate electricity from a renewable generating facility to offset your electricity consumption and/or use net metering at any time during the term of this Agreement, you must notify Starion.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Network Resource Interconnection Service (check if selected)

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.