Architecture of the VCL Sample Clauses

Architecture of the VCL. The VCL is composed of one physical host and two virtualisation layers, as shown in Fig. 1. The host machine is the student’s computer, which runs an arbi- trary operating system, i.e., the host operating system. The first virtualisation layer creates the virtual host machine. It consists of virtualisation software such as VMware Player (freeware) or Oracle VM VirtualBox (open source), which runs on the host machine just like an ordinary application. Versions of this soft- ware are available for a large range of platforms. VirtualBox for instance runs on host machines with either Windows, Linux or Mac OS X. This first virtualisation layer therefore runs on nearly all student computers, regardless of the hardware and the host operating system. The virtual host machine runs the virtual host operating system. For the VCL we selected Linux, since it is open source and can be distributed to students without licensing costs. In fact, we selected Knoppix, a bootable live Linux system containing a collection of GNU/Linux applications and the KDE graphical desktop environment. The second virtualisation layer is a Linux application, called Netkit [17], that runs inside the virtual host machine. This second virtualisation layer allows to instantiate multiple virtual machines that all run Linux. Netkit applies virtu- alisation based upon User Mode Linux (UML) [33, 34] and allows to setup and configure UML virtual machines with virtual network interfaces, and to connect these into virtual networks. The hardware requirements for running the VCL are very modest. A few UML virtual machines can already be run smoothly on a PC with a Pentium- 4 processor and 256 MB memory. The VCL has been used successfully in our security courses by hundreds of students with only few minor problems.
AutoNDA by SimpleDocs

Related to Architecture of the VCL

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • SCOPE OF THE WORK The Contractor shall furnish all the materials, perform all of the Work, and do all things required by the Contract Documents.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Screening 3.13.1 Refuse containers located outside the building shall be fully screened from adjacent properties and from streets by means of opaque fencing or masonry walls with suitable landscaping.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Construction Phase Services 3.1.1 – Basic Construction Services

  • Contractor's care of the Works The Contractor shall bear full risk in, and take full responsibility for, the care of the Works, and of the Materials, goods and equipment for incorporation therein, from the Appointed Date until the date of Completion Certificate, save and except to the extent that any such loss or damage shall have arisen from any wilful default or gross neglect of the Authority.

  • Project Implementation 2. The Borrower shall:

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Building Commissioning Services The Owner may provide as a part of its testing services the Building Commissioning services involving the project’s HVAC and exhaust systems, temperature control systems, fire detection and alarm systems, emergency power and lighting system, fire suppression system, security locks and security locking control systems, food service equipment (if applicable), and laundry equipment (if applicable). In the event the Using Agency’s Program specifies additional commissioning services, the Owner shall procure such services as well. The Owner, through its Executive Administrator, may engage an independent Commissioning Authority. It is the intent of this Article that the Commissioning Authority enforce the requirements mentioned herein and certify that the systems and equipment listed all function properly prior to the initiation of each final inspection.

Time is Money Join Law Insider Premium to draft better contracts faster.