ocol. It is designed to be run internal to a
single Autonomous System. Each OSPF router maintains an... outing information between routers belonging to a single Autonomous
System. The OSPF protocol is base... ong them. The cost of a route is
described by a single dimensionless metric.
OSPF allows sets of netwo... viated as IGP. Each Autonomous
System has a single IGP. Separate Autonomous Systems may be
run
bject
may have attached data and is bound to a single Job.
'ipp' URI: An IPP URI as defined in [RFC... ] and subsequent extensions.
Output Device: A single Logical or Physical Device.
Physical Device: ... HTTP request or
response and it MUST contain a single IPP operation request or IPP
operation respons... times. Each "attribute-group" field represents a single group
of attributes, such as an Operation Attr
NAL exchanges. In the common
case, there is a single IKE_SA_INIT exchange and a single IKE_AUTH
exchange (a total of four messages) to establish the IKE SA... occur in any order.
In some scenarios, only a single Child SA is needed between the IPsec
endpoints... l
commonly be used with no inner IP header. A single pair of addresses
will be negotiated for packe
15.3.7. 206 Partial Content
15.3.7.1. Single Part
15.3.7.2. Multiple Parts
... such changes be observable beyond the scope of a single response.
1.2. History and Evolution
HTTP h... ial
mechanism for low-latency requests, with a single method (GET) to
request transfer of a presumed... trations when they apply beyond the
scope of a single communication.
The verb "generate" is used in
by the Network
Information Center (NIC) in a single file (HOSTS.TXT) which
was FTPed by all host... be
generally useful, and not restricted to a single application.
We should be able to use names ... with a type, and queries
can be limited to a single type.
- Because we want the name space to be ... cal resolver.
The domain space consists of a single tree and the user can
request information fr
e of the following terminology:
Data item: A single piece of CBOR data. The structure of a data
... valent, using both map keys "0" and "0.0"
in a single map would be considered duplicates, even while en... ncoded item is decoded, that
encoding is not a single well-formed CBOR item. Depending on the
appli... e enclosed
data item (_tag content_) is the single encoded data item that
follows the head. S
also encompass multiple devices, or a subset of a single device, or
even a subset of multiple devices, ... t a context is always defined as
a subset of a single SNMP entity. Thus, in order to identify an
in... lue will normally
require only a single byte since, in practice,
the lef... lue will
normally require only a single byte since, in
practice, the lef
computers. In function,
they range from single-purpose hosts (such as terminal servers)
... le
physical network interfaces on a single host may share the
same link-layer ... source-routed), regardless of whether the host is single-
homed or multihomed. The host software MU... a datagram whose source address does not define a single
host -- e.g., a zero address, a loo
internet addresses to local net
addresses; a single physical host must be able to act as if it were
... es for the format of an option:
Case 1: A single octet of option-type.
Case 2: An option-t... signed by the local network, must allow for a
single physical host to act as several distinct internet... everal of them as if they were all addressed to a single host.
Address mappings between internet addr
mixes
these reconstructed audio streams into a single stream, translates
the audio encoding to a low... eed link. These packets
might be unicast to a single recipient or multicast on a different
address ... packet of the underlying protocol contains a single RTP packet,
but several RTP packets MAY be ... are sent together as a compound RTCP packet in a single
packet of the underlying protocol; this is
1.1. Content Key Distribution Methods
5.2. Single Recipient Encrypted
5.3. How to Encrypt and... C.1. Examples of Signed Messages
C.1.1. Single Signature
C.1.2. Multiple Signers
C.1.3. Signature with Criticality
C.2. Single Signer Examples
C.2.1. Single ECDSA Signature
C.3. Examples of Enveloped Messages
C.
NetBIOS
software interface to allow a single message to be gathered
from pieces in ... ithin a broadcast area. A
broadcast area is a single MAC-bridged "B-LAN". (See Appendix A for
a di... as a means to
extend a broadcast area beyond a single B-LAN.)
10.2. POINT-TO-POINT (P) NODES
Poin... ty, security, and
delay characteristics.
A single NBNS may be implemented as a distributed entity,
ch as the Internet, it is very
unlikely that a single routing protocol will used for the entire
netw... f which will, in general, be
administered by a single entity. Each AS will have its own routing
tec... As long as a message or datagram remains on a
single network or subnet, any forwarding problems are th... term "network" is used generically to
cover a single broadcast network (e.g., an Ethernet), a point to
ess robust one, as is
present in most single-machine message systems, would more
seve... ents enclosed in parentheses are treated as a single
element. Thus, "(elem (foo / bar) ele... LDS
Each header field can be viewed as a single, logical line of
ASCII characters, co... char may instead be
inserted. Thus, the single line
To: "Joe & J. Harvey" <ddd @Or
ty.
2.5. Signing Domain Identifier (SDID)
A single domain name that is the mandatory payload output ... 3.5.
2.6. Agent or User Identifier (AUID)
A single identifier that refers to the agent or user on be... e imported from [RFC2045]:
o "qp-section" (a single line of quoted-printable-encoded text)
Crocker... Tags with duplicate names MUST NOT occur within a single tag-list; if
a tag name does occur more than o