Multi-Technology Optical Resource Virtualization Sample Clauses

Multi-Technology Optical Resource Virtualization. The optical resource virtualization is an internal service of the COSIGN DCN Control Plane, which constitute the basic building block to enable all the functions and services that needs to operate the COSIGN DCN physical infrastructure. The objective of this first level of virtualization is to provide a complete set of functions to manipulate and monitor the multi-technology optical resources through a more abstract interface. This approach allows the internal components of the SDN controller to deal with the multi-technology DCN in an efficient and uniform way, managing virtual optical resources characterized by a common set of parameters instead of the physical resource variety. The relationship between physical and virtual resources may follow the 1:N model. A physical node or link is split in multiple virtual nodes or links, each of them with a disjoint subset of the original capabilities that characterized the corresponding physical resource. Another approach is to aggregate and abstract more physical devices in a single virtual resource. However, it should be noted that single optical resources are managed only at the DC provider level, i.e. internally at the SDN controller or through management APIs, but they are not exposed as single, configurable entities to the DC provider’s customers. This approach creates a sort of screen between the DCN infrastructure and the DC customers, preventing any data plane misconfigurations and guaranteeing the required level of isolation. Indeed, the final objective of the COSIGN control plane is to use the COSIGN optical data plane, enriched by multiple network technologies, to compose converged virtual optical network slices. These slices are the orchestrated entities that can be exposed to the different tenants, depending on the specific use case. At the resource virtualization level, the different optical technologies of the COSIGN data plane are abstracted with their key features and attributes defined in the information model and exposed to the control plane through an abstraction layer. The key challenge is the definition of an information model (i.e. resource characteristics and allowed operations) powerful enough to exploit all the unique features offered by the optical data plane, while maintaining an acceptable and manageable level of complexity. The granularities of different technologies will be abstracted in order to compose a virtual slice with end-to-end granularity matching to accommodate the service...
AutoNDA by SimpleDocs
Multi-Technology Optical Resource Virtualization. The optical resource virtualization is an internal service of the COSIGN DCN Control Plane, which constitute the basic building block to enable all the functions and services that needs to operate the COSIGN DCN physical infrastructure. The objective of this first level of virtualization is to provide a complete set of functions to manipulate and monitor the multi-technology optical resources through a more abstract interface. This approach allows the internal components of the SDN controller to deal with the multi-technology DCN in an efficient and uniform way, managing virtual optical resources characterized by a common set of parameters instead of the physical resource variety. The relationship between physical and virtual resources may follow the 1:N model. A physical node or link is split in multiple virtual nodes or links, each of them with a disjoint subset of the original capabilities that characterized the corresponding physical resource. Another approach is to aggregate and abstract more physical devices in a single virtual resource. However, it should be noted that single optical resources are managed only at the DC provider level,

Related to Multi-Technology Optical Resource Virtualization

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Project Management Plan 1 3.4.1 Developer is responsible for all quality assurance and quality control 2 activities necessary to manage the Work, including the Utility Adjustment Work.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.