Trunk Group Type Design Blocking Objective Sample Clauses

Trunk Group Type Design Blocking Objective. Local Direct End Office (Primary High) as mutually agreed upon Local Direct End Office (Final) .01%
AutoNDA by SimpleDocs
Trunk Group Type Design Blocking Objective. Local Tandem 1% Local Direct End Office (Primary High) ECCS* Local Direct End Office (Final) 1% IntraLATA 1% Local/IntraLATA 1% InterLATA (Meet Point) Tandem 0.5% 911 1% Operator Services (DA/DACC) 1% Operator Services (0+, 0-) 1% Busy Line Verification-Inward Only 1% *During implementation the Parties will mutually agree on an ECCS or some other means for the sizing of this trunk group.
Trunk Group Type Design Blocking Objective. Type 2A 1% Type 2A Equal Access (IXC) 0.5% Type 2B (Direct Final) 2% Type 2B (Primary High) ECCS* Type 2C (911) 1% Type 2D (Operator Services (DA/DACC)) 1% Type 1 (Operator Services (0+, 0-)) 1% *During implementation the Parties will mutually agree on an Economic Centum Call Seconds (ECCS) or some other means for the sizing of this Trunk Group.
Trunk Group Type Design Blocking Objective. Local Direct End Office (Primary High) as mutually agreed upon Local Direct End Office (Final) .01% 58.37. Trunk Servicing 58.38. 58.7.1 Orders between the Parties to establish, add, change or disconnect trunks shall be processed by using an Access Service Request (ASR). CenturyLink QCC will have administrative control for the purpose of issuing ASR’s on two-way trunk groups. Where one- way trunks are used (as discussed in this Article), CenturyLink will issue ASRs for trunk groups for traffic that originates from CenturyLink and terminates to CenturyLink QCC. The Parties agree that neither Party shall alter trunk sizing without first conferring with the other Party.
Trunk Group Type Design Blocking Objective. Type 2A 1% Type 2A Equal Access (IXC) 0.5% Type 2B (Final) 2% Type 2C (911) 1% Type 2D (Operator Services (DA/DACC)) 1% Type 1 (Operator Services (0+, 0-)) 1%

Related to Trunk Group Type Design Blocking Objective

  • Technical Specifications The Technical Specifications furnished on the CD are intended to establish the standards for quality, performance and technical requirements for all labor, workmanship, material, methods and equipment necessary to complete the Work. When specifications and drawings are provided or referenced by the County, these are to be considered part of the Scope of Work, and to be specifically documented in the Detailed Scope of Work. For convenience, the County supplied specifications, if any, and the Technical Specifications furnished on the CD.

  • Service Levels All service level requirements will be set forth in Exhibit A (“XXXX.xxx Referral Service Level Requirements”). Recipient Xxxxxx agrees to adhere, and encourage Recipient Agent’s adherence, with the version of the XXXX.xxx Referral Service Level Requirements in effect at the time XXXX.xxx identifies the Referral to Recipient Broker/Agent.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.