| http://www.w3.org/ns/prov#value | - For example, the tunneling device 110 may be configured in such a manner as to a identify any initial request 130 (e.g., packets, messages, etc.) received that has a particular source address (e.g., IP address, etc.) as being designated to become tunneling requests 140.
|