1 |
Prototype implementation on ASC prototyping system
|
2 | Utilize Kerberos and SecurID for security |
3 | Utilize minimal flat file implementation for information services (possibly include RIB) |
4 | Use current ASC allocation structure |
5 |
Demonstrate single CTA PSE for CCM
|