0230 Toward reliable operation of minicomputer-based terminals on a TIP.
T. Pyke. September 1971.... UNKNOWN) (DOI: 10.17487/RFC0312)
0313 Computer based instruction. T.C. O'Sullivan. March 1972. (Format... /RFC0706)
0707 High-level framework for network-based resource sharing. J.E. White.
December 1975.... 7487/RFC0755)
0756 NIC name server - a datagram-based information utility. J.R.
Pickens, E.J. Fein
e, T., "Toward reliable operation of minicomputer-based terminals on a TIP", RFC 230, DOI 10.17487/RFC023... .
RFC0313 | | O'Sullivan, T., "Computer based instruction", RFC 313, DOI 10.17487/RFC0313, Marc... | White, J., "High-level framework for network-based resource sharing", RFC 707, DOI 10.17487/RFC0707,... E., and J. Mathis, "NIC name server - a datagram-based information utility", RFC 756, DOI 10.17487/RFC07
criptive versus Descriptive
4.5.1. Intent-Based Networking
4.6. Open-Loop versus Closed-Loo... urvivability
6.6.1. Survivability in MPLS-Based Networks
6.6.2. Protection Options
6... tic methods, simulation, and
empirical methods based on measurements.
Traffic engineering comes in... for the selection of paths (including next hops) based
on information beyond basic reachability. Ear
5.1.3. Public Key Encryption
5.2. Hash-Based Identifiers
5.3. Credentials
5.3.1. ... Evolution of Parent Hashes
Appendix C. Array-Based Trees
Appendix D. Link-Based Trees
Contributors
Authors' Addresses
1. Introduction
A gro... oup.
In this document, we describe a protocol based on tree structures
that enables asynchronous g
ocumentation Protocol Number
4. Other OUI/CID-Based Parameters
4.1. LLDP IETF Organizationally ... Identifier Block Template
A.2. IANA OUI/CID-Based Protocol Number Template
A.3. Other IANA OUI/CID-Based Parameter Template
Appendix B. EtherTypes
... and other
organizationally unique code points based on that OUI. This document
specifies IANA con
e
5.2. Use Case of Bluetooth LE: Smartphone-Based Interaction
5.3. Use Case of DECT-ULE: Smar... A typical
usage of Bluetooth LE is smartphone-based interaction with
constrained devices. Bluetoo... ty and preserves
packet order, but delivery is based on best effort.
The current DECT-ULE MAC laye... mation networks.
An MS/TP device is typically based on a low-cost microcontroller with
limited pro
The ClientHello message is unencrypted for TCP-based TLS. When using
QUIC, the ClientHello message... results in the use of ESNI in the face of
SNI-based filtering [Chai-2019] in some countries.
Doma... ble
their provision in countries employing SNI-based filtering. These
services used the cover prov... ead the SNI. Improper
configuration of an SNI-based block can result in significant over-
blocking
Similarly, when considering host-tracking attacks based on IPv6
Interface Identifiers, we consider an ... nique to perform TCP data injection
attacks based on predictable IPv4 Identification values, which
... 13:
A patch to incorporate support for IPv6-based idle scans in nmap
is submitted [Morbitzer2... ation values.
February 2016:
[RFC7739] (based on [draft-ietf-6man-predictable-fragment-id-10])
. . . . . . . . 18
4.4.2. Certificate Based Systems. . . . . . . . . . . 18
4.5. Provi... same data
that the sender has sent. In paper-based systems, some data
integrity comes automatical... seful way of organizing attacks is to divide them based on
the capabilities required to mount the atta... ith the recent and growing popularity of wireless-based
LANs, such as those using 802.11. Since the d
tents
1. Introduction
1.1. Certificate-Based Identification
1.2. Selection of Certificat... ypes in certificates. We consider
certificate-based identification and certificate selection.
1.1. Certificate-Based Identification
The need for human recognition... cious contact with the
result of a certificate-based identification process, then human
recognition
24
Flush Mechanism for Customer MAC Addresses Based on Service Instance
Identifier (I-SID) in Pro... n Requirements
3. EVPN BGP Encoding for I-SID-Based C-MAC Flush
4. Solution Description
4.1. I-SID-Based C-MAC Flush Activation Procedures
4.2. C-MA... --+
Figure 1: PBB-EVPN and Non-ES-Based Redundancy
In the example in Figure 1, CE1, C
that encapsulate
and decapsulate data packets based on the content of those mappings.
Ingress Tun... ts Map-Cache entry for the EID-Prefix
(if any) based on this Map-Notify. This message is specifically... cipate on the PubSub
deployment. DDoS attacks based on replayed messages by unknown nodes
are avoi... F., and B. Venkatachalapathy, "Ground-Based LISP for the
Aeronautical Telecommu
nd provider may agree to police or shape traffic, based on the
specific IETF Network Slice Service ... rlay network, and its realization may be selected based upon
multiple considerations, including its se...
engineering decision for the service provider based on capabilities
of the network and operational... managed in a way that is similar to
a port-based VPN: each port (AC) or virtual port (e.g., VLAN t
ithout disclosing the
password. This password-based key exchange protocol is compatible
with any g... over P-256 that uses
SHA-256, along with HMAC-based Key Derivation Function (HKDF)
[RFC5869] and H...
[RFC5869] Krawczyk, H. and P. Eronen, "HMAC-based Extract-and-Expand
Key Derivation F... Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)", RFC 6234,
DOI 10.1
This is currently not the case for the Signature-based
Handling of Asserted information using toKENs ... the ACME client MUST identify the Token Authority based
on locally configured information or local pol... he requesting party is authorized to represent
based on their pre-established, verified, and secure re... er (OCN) or service provider identifier (SPID)). Based
on number allocations, that provider is also g