Virtual Infrastructures Clause Samples

Virtual Infrastructures. The Virtual Infrastructure information model describes the service for the provisioning and management of virtual network slices, which is implemented by the Virtual Infrastructure Manager component of the SDN controller (see Table 3). The information model specifies the entities composing a virtual network which can be handled as part of a cloud service offer. Depending on the request type, the level of detail in the request can specify topology constraints or even abstract optical capabilities (e.g. a WDM link with two wavelengths). In this case, the virtual infrastructure information model will be very similar to the DCN information model, but dealing with virtual resources rather than with physical ones. Moreover, the request may even specify virtual network functions to be traversed by some traffic flows described through classifiers. Otherwise, the request can describe a virtual network infrastructure using the higher level concepts which are currently in use in cloud services. For example, the Neutron component in OpenStack defines virtual resources like networks, subnets, ports, routers, interfaces, security groups and rule, metering labels. COSIGN offers a service to enable CRUD operations on this type of resources through the SDN application for Overlay-based network service virtualization (see Table 4). The REST APIs offered by this application at the SDN controller’s A-CPI are used for the interaction with the Neutron component of the cloud platform for the on-demand provisioning of overlay virtual networks.

Related to Virtual Infrastructures

  • Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Pipelines Developer shall have no interest in the pipeline gathering system, which gathering system shall remain the sole property of Operator or its Affiliates and shall be maintained at their sole cost and expense.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.