Hi Owen, all,
In previous versions I tried to make a shorter text and didn’t worked.
Let me try to explain each part:
This covers the case of a subcontractor with devices siting on the holders network may be for several years, and in this case they are “permanently” connected (during the duration of the contract), explained in my problem statement as:
One more case is when an end-user contracts a third-party to do some services in their own network and they need to deploy their own devices, even servers, network equipment, etc. For example, security surveillance services may require that the contractor provides their own cameras, recording system, even their own firewall and/or router for a dedicated VPN, etc. Of course, in many cases, this surveillance system may need to use the addressing space of the end-user.
Of course, the 2nd part of the sentence is for the point-to-point links, I think that’s very obvious.
This covers the other cases, BYOD (employee or guest of a corporation, student of a university, visitor in a hot-spot, etc.), which are more commonly for some hours or minutes, even days.
such as broadband services, is still considered a sub-assignment.”
We want to make sure that ISPs, typically offering broadband services, aren’t end-users, as they should be LIRs.
Aside from the question of examples or not examples, I offer the following suggestion… The wording is quite awkward and difficult to parse. So much so, I am not 100% certain of the intent.
I offer the following suggestion for a rewrite hoping that I have captured the intent accurately:
Providing IP number resources to third party devices, including addresses for point-to-point links or addresses provided on an impermanent basis, for use on a network managed and operated by the assignment holder shall not be considered a sub-assignment.
Providing IP number resources for permanent or semi-permanent connectivity, such as broadband services is still considered a sub-assignment.
IPv4 is over
Are you ready for the new Internet ?
The IPv6 Company
This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.