Xxxxxxxx Capabilities Sample Clauses

Xxxxxxxx Capabilities. As presented in D3.1, the standard design for the SCs is defined in figure 2.1-1. This corresponds to the final design since the internal structure of the Network Service (NS) is maintained from the previous deliverable. Summarising the SC architecture: the NS encompasses the Security Element Manager (SEM) and the Container and Virtual Network Function (xNF), being the SEM the input/output point with respect to the xNF internally deployed. The SEM exposes two external interfaces to interact with the xNF: (i) the VeNf-Vnfm and (ii) the Message Broker (here, Xxxxx [1]). The former allows the SO to apply day0, day1 and day2 actions, which reconfigure the xNF lifecycle. The latter implements the collection of internal data generated in such xNF. Besides, the SC has another interface with the Network Function Virtualisation Infrastructure (NFVI) component, which exposes some relevant information for the SC deployment and lifecycle.
AutoNDA by SimpleDocs
Xxxxxxxx Capabilities. This section presents the implementation details of the SCs identified in the PALANTIR context, as well as the main changes since D3.1. As commented in section 2.1.1, the IDS SC (combining IDS and DPI SCs), the FW SC, the NDS SC (introduced as NNS SC in D3.1), and the WTA SC are types of SCs still being delivered. However, four new types of SCs have been developed: SIEM and VPN, SCR and vTAP SCs, whose specific development and deployment details are explained below.
Xxxxxxxx Capabilities. Regarding the SCs, the consortium settled on a standardised structure aligned with the requirements in section 3.1, and finally partially implemented in section 4.1. The standard design or internal structure for the SCs is introduced first. This aligns with the requirements and implementation details defined in the upcoming sections. Each SC features two main modules: the Security Element Manager (SEM) and the Virtual Network Function (VNF). The former provides well-defined and standard interoperability interfaces to enable the dynamic deployment and configuration of the latter. Apart from the two main modules, which will be described thoroughly later on in this section, Figure 1 presents the general architecture of any SC, including inter-component communications and interfaces, internal networking, functionalities to be offered, and level of designated security policy to be used. Figure 1: SC detailed architecture. The rest of this section is organised to cover the multiple aspects included in Figure 1.

Related to Xxxxxxxx Capabilities

  • Packet Switching Capability 4.5.1 The packet switching capability network element is defined as the function of routing or forwarding packets, frames, cells or other data units based on address or other routing information contained in the packets, frames, cells or other data units.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Testing Capabilities 7.2.2.10.2.1 LIS Acceptance Testing is provided where equipment is available, with the following test lines: seven-digit access to balance (100 type), milliwatt (102 type), nonsynchronous or synchronous, automatic transmission measuring (105 type), data transmission (107 type), loop-around, short circuit, open circuit, and non-inverting digital loop-back (108 type), and such other acceptance testing that may be needed to ensure that the service is operational and meets the applicable technical parameters.

  • Personnel Capabilities The Applicant should list down personnel of minimum qualification as specified in the Qualification Criteria

  • Capabilities A. The Parties agree that the DRE must possess the legal, technical, and financial capacity to:

  • FREQUENCY AND CAPACITY LEVELS No restriction on frequency, capacity and aircraft type

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Working Xxxxxxx An employee who is in charge of a crew not more than five men including himself, engaged in line clearance work. (In the application of Article X, the Company need not consider the application for promotion to this classification from any employee having less than one year of experience in the Climber classification.)

  • Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp. The origin of the angles of geometric visibility is the perimeter of the projection of the illuminating surface on a transverse plane tangent to the foremost part of the lens of the headlamp.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!