ers to the Group
13. Extensibility
13.1. Additional Cipher Suites
13.2. Proposals
13.3. C... 10. Authentication Service Compromise
16.11. Additional Policy Enforcement
16.12. Group Fragmentatio... s. In addition to the base syntax, we
add two additional features: the ability for fields to be optional
... s a bare assertion of an identity, without any
additional information. The format of the encoded identity
ongestion management scheme
that provisions additional network resources to address existing
and/o... e current
state of the network, which provides additional information on
variations in actual traffic (i... lizing a centralized approach to network control, additional
network benefits are also available, including... ic flow is satisfied. The Intserv model includes additional
components beyond those used in the best-effor
an expired Internet-Draft that
| provides additional historic information on [IEEE802]
| regist... ssigned by the IEEE Registration Authority
and additional bits assigned by the prefix owner. As of 2024, t... resses. This prefix is followed by a sequence of additional
octets so as to add up to the total MAC addres... tem can be enclosed by a CBOR tag to give it some additional
semantics identified by that tag. CBOR-tagged
the syntax in [RFC1035]", but possibly with additional rules such
as "and are, or will be, resolva... n this
section. This section also includes an additional RCODE and a
general definition. The official ... y contain RRs that provide addresses in
the Additional section. The AA bit is clear.
In the case... y contain RRs that provide addresses in the
Additional section. The AA bit is set because the first nam
splayed when the
user disables the fetching of additional logotypes.
A client MAY, subject to local pol... ny profile [SVGT] MUST be
followed, with these additional restrictions:
* The SVG image MUST NOT conta... c6170>.
[RFC6268] Schaad, J. and S. Turner, "Additional New ASN.1 Modules
for the Cryptogra... a separate
Privacy Considerations section. Additional topics are covered in
both sections.
*
are proportional to the benefits, and
agree to additional limitations or safeguards against bad behavior by... UEHLEWIND], the relay is a
mechanism that uses additional levels of encryption to separate two
important... instead of manipulating existing
information, additional information is sent using a so-called sidecar
... For example, sidecar information can contain
additional acknowledgments to enable in-network local retran
nce the
original RSVP-TE use case was defined, additional applications such
as Segment Routing (SR) Poli... result in a setup
failure for the path.
An additional issue arises in cases where both applications are... ize link
attributes may grow in the future, an additional requirement is that
the extensions defined allow the association of additional
applications to link attributes without alteri
a censor in an
indisputable way -- with the additional feature that an ISP can
identify the region... ntent providers to
exhibit self-censorship, an additional advantage for censors (see
Section 6.2). The ... entification technologies because it can leverage additional packet
and flow characteristics, e.g., packet ... attractive for censors to
deploy, as it offers additional guarantees about censorship: even if
someone e
ub-TLVs: Used to advertise sub-TLVs that provide additional
attributes for the given SRv6 Locator and S... ub-TLVs: Used to advertise sub-TLVs that provide additional
attributes for the given SRv6 SID.
9. Adv... ub-TLVs: Used to advertise sub-TLVs that provide additional
attributes for the given SRv6 End.X SID.
9... ub-TLVs: Used to advertise sub-TLVs that provide additional
attributes for the given SRv6 SID.
10. SR
C-MAC flush. This
specification provides some additional procedures when I-SID-based
C-MAC flush is ena... document.
In addition, this document suggests additional procedures that can be
activated on a per I-SID basis and generate additional EVPN MAC/IP
Advertisement routes in the network. The format of these additional
EVPN MAC/IP Advertisement routes is backwards
ifying
two P2P connectivity constructs. An additional SLE may specify
fate-sharing in this case.
... rk
Slice Service needs to be supplemented with additional senders or
receivers within the network that are not customer sites. An
additional sender could be, for example, an IPTV or DNS serv... me.
5.1.1.2. Other Service Level Objectives
Additional SLOs may be defined to provide additional descrip
1.2. Requirements Language
2. CDNI Metadata Additional Footprint Types
2.1. CDNI Metadata "subdivi... ll
capitals, as shown here.
2. CDNI Metadata Additional Footprint Types
Section 5 of [RFC8008] descri... n 4.2.2.2
of [RFC8006]. This document defines additional footprint types,
beyond those mentioned in [RF... rotocol" registry.
This document registers an additional ALTO Entity Domain Type within
that subregistr
the terms defined in [RFC8499]. The
following additional terms are used:
Authentication Domain Name (A... ons are self-
contained and do not require any additional DNS queries. The reader
may refer to [RFC7969... issue DNS queries).
In contexts where putting additional complexity on requesting hosts
is acceptable, ... encoded as per Section 10 of [RFC8415].
* If additional data is supplied:
- The service parameter