Carrier Ethernet Access Switches Clause Samples

The 'Carrier Ethernet Access Switches' clause defines the requirements and specifications for network switches used to provide Ethernet services at the access layer in a carrier or service provider environment. This clause typically outlines technical standards such as port speeds, redundancy features, management capabilities, and compliance with industry protocols. By establishing clear criteria for these switches, the clause ensures reliable, scalable, and interoperable network access, addressing the need for consistent service quality and network performance in carrier-grade deployments.
Carrier Ethernet Access Switches. A carrier Ethernet access switch can connect directly to the
Carrier Ethernet Access Switches. A carrier Ethernet access switch can connect directly to the customer or be utilized as a network interface on the service side to provide layer 2 services. • Hot-swappable and field-replaceable integrated power supply and fan tray • AC or DC power supply with minimum DC input ranging from 18V to 32 VDC and 36V to 72 VDC • Ethernet and console port for manageability • SD flash card slot for additional external storage • Stratum 3 network clock • Line-rate performance with a minimum of 62-million packets per second (MPPS) forwarding rate • Support for dying gasp on loss of power • Support for a variety of small form factor pluggable transceiver (SFP and SFP+) with support for Device Object Model (DOM) • Timing services for a converged access network to support mobile solutions, including Radio Access Network (RAN) applications • Support for Synchronous Ethernet (SyncE) services • Supports Hierarchical Quality of Service (H-QoS) to provide granular traffic-shaping policies • Supports Resilient Ethernet Protocol REP/G.8032 for rapid layer-two convergence

Related to Carrier Ethernet Access Switches

  • Internet Access Hotels and Airports Employees who travel may need to access their e-mail at night. Many hotels provide free high speed internet access and Tyler employees are encouraged to use such hotels whenever possible. If an employee’s hotel charges for internet access it is reimbursable up to $10.00 per day. Charges for internet access at airports are not reimbursable.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring per-circuit local loop charges ranging from $152 to $1,504 and non-recurring charges ranging from $200 to $1,000 for DS-1 and DS-3 Access Service at 4 CLLI codes mutually agreed upon by the Customer and the Company.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.