OI: 10.17487/RFC0417)
0418 Server File Transfer Under TSS/360 At NASA-Ames Research Center. W.
Hat... KNOWN) (DOI: 10.17487/RFC0910)
0911 EGP Gateway under Berkeley UNIX 4.2. P. Kirton. August 1984.
(...
3349 A Transient Prefix for Identifying Profiles under Development by the
Working Groups of the Int...
6924 Registration of Second-Level URN Namespaces under "ietf". B. Leiba.
April 2013. (Format: TXT,
| | Hathaway, W., "Server File Transfer Under TSS/360 At NASA-Ames Research Center", RFC 418, D... >.
RFC0911 | | Kirton, P., "EGP Gateway under Berkeley UNIX 4.2", RFC 911, DOI 10.17487/RFC0911... M., "A Transient Prefix for Identifying Profiles under Development by the Working Groups of the Internet... B., "Registration of Second-Level URN Namespaces under "ietf"", RFC 6924, DOI 10.17487/RFC6924, April 20
s IANA
considerations for assignment of points under the IANA
Organizationally Unique Identifier (O... Is and CIDs
2.1.3. 48-Bit MAC Assignments under the IANA OUI
2.1.4. 48-Bit MAC Documentat... arameters
3.1. Ethernet Protocol Assignment under the IANA OUI
3.2. Documentation Protocol Nu... considerations for the assignment of code points under
that IANA OUI, including MAC addresses and pro
CANN-RA]
that provide access to sensitive data under some permissible purposes
and in accordance wi... on MUST only be accessible to authorized
users under a lawful basis.
Since reverse search requests... or is always legitimized to submit their requests under
a lawful basis. Additionally, they can be
CE3
Figure 7: Example Hub and Spoke under Customer Control
A.4. Layer 3 VPN
Layer 3 V... may utilize
different technologies and may be under separate administrative
control.
... networks may be of different
technologies and under separate administrative control, the networks
... is partially supported by the European Commission under
Horizon 2020 grant agreement number 101015857
etwork or where a path traverses multiple domains under the
control of a single process), end-to-en... A network domain context that defines the scope under
consideration and, in particular, the situ...
the individual resource level as "micro-TE." Under certain
circumstances, the system-level perfor... ancing.
4.3. Centralized versus Distributed
Under centralized control, there is a central authority
ibes the setup and teardown of PCE-initiated LSPs under the
active stateful PCE model, without the nee... C in order for a PCE to initiate GMPLS LSPs
under the active stateful PCE model, i.e., Explicit Lab... GMPLS-controlled networks
should be considered under the same security as for MPLS networks, as
not