Correct internal behaviour per method Sample Clauses

Correct internal behaviour per method. In this paragraph, we summarise the internal workflow per method from an high-level point of view. It is impor- tant to note that the (M)RO has a strong relationship with the other components in terms of the exchanged mes- sages. All these messages are printed in the log-file of the process (i.e. modules/resource/orchestrator/log/resource- orchestrator.log) in a pretty XML format. In the GetVersion method, the (M)RO fills the XML-RPC structure with the proper values. In the ListResources method, the (M)RO first verifies the user credentials and then reads from the MongoDB [8] database the information on the nodes and links for the C, SDN, SE and TN resources. At the end, the adver- tisement RSpec is composed and returned to the client. In the Describe method, the (M)RO verifies the user credentials and retrieves the information of the slice composition from the database. Then, it sends the describe command to each involved RMs or ROs. When the responses are correctly received, it creates the manifest RSpec and the list of slivers merging the output of the corresponding message. This information is then returned to the client. The Renew, Status and PerformOperationalAction methods are quite similar and we use the same template for the implementation. In these methods, the (M)RO starts verifying the user credentials and reading the slice composition from the database. AGer that, it sends the proper command (i.e. Renew, Status or PerformOpera- tionalAction) and, when it receives the responses, only the list of slivers is produced and returned to the caller. The Allocate method is the most complex implementation we currently have in the code. AGer the verification of the user credentials and the validation of the incoming request RSpec, the (M)RO tries to extend the request adding the Stitching Entity information. Here, we use a dedicated pathFinder module that simply lookup the database in order to fetch the missing resources description. When the request is completely reformatted, the (M)RO analyses the schema extracting the C, SDN, SE, TN sections. Each section is then introduced in the allocate command to the proper RM or RO. At the end, the (M)RO composes the manifest RSpec as sum of the received responses and fills the list of slivers structure. The Provision and Delete methods are also used to update the Monitoring System with the information related to the slice. As usual, the user credentials are verified and the slice composition retrieved from the database. ...
AutoNDA by SimpleDocs
Correct internal behaviour per method. We have massively used the log file to validate the correct behaviour per each method of the interface. Using the OMNI tool, each method of the API was called and the log file deeply analysed. In case of errors, the problem was reported to the development team. In order to facilitate this procedure, the colorlog module has been introduced, producing different colours for the different levels, e.g green for debug, blue for info, red for error, etc. Moreover, we have added the timestamps and a proper handler for the dumping of the messages. As result, we have no errors in the normal test conditions.
Correct internal behaviour per method. The second item seeks to verify the correctness of the internal workflow of requests. That is done by testing incoming requests that arrive to the manager and traverse all way down until arriving at the driver. It also takes into account the returned information coming from the manager and going down to the driver. For that matter, tests have been automated to ensure a proper internal workflow. Unit tests for the involved methods can be found in the XXXXX repository, located under the corresponding folder [10] within the ocf branch. Looking into detail, the unit tests in CRM look for a proper behaviour/output on the following: • Management of unique identifiers (URN, HRN) for resources: ensure correct retrieval of the identifiers, appropriate parsing of authority, slice and sliver entities, and correct translation of URNs into HRNs and vice-versa. • Management of reservations: validate that reservations are assigned the default expiration time (1 hour) and ensure proper type handling during the management of the projects and slices. • Advertising resources: return (un)available servers, return slivers per slice, etc. • Management of slivers: correctly starting, stopping, rebooting, deleting and renewing resources. • Internal management: ensure credentials are verified correctly, handlers are set up as expected, and re- source specifications are accurately translated into an internal representation (model) used within internal components. The previous tests cover pretty much the full experimenter life cycle, yet further manual tests have been performed during the integration phase with the Resource Orchestrator (RO). These manual tests have been carried out both manually (using a third-party client, such as jFed or OMNI) and also by using the RO to proxy requests to its managed RMs.
Correct internal behaviour per method. During the tests the log file had been used to validate the correct behaviour per each method of the interface. Using the OMNI tool, each method of the API was called and the log file deeply analysed. In case of errors, the problem was fixed by the SERM developers. The correctness of the VLAN translation rules installation on the switching device had been confirmed by using the Ryu REST API and the method that displays all the OpenFlow rules. In first phase of the tests the soGware Open VSwitch has been used as a Stitching Entity. In the next phase the proper VLAN translations on the Juniper MX80 with the OpenFlow support was also tested. As result, no errors in the normal test conditions occurred.

Related to Correct internal behaviour per method

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only) The wind generation facility shall, at a minimum, be required to provide the Transmission Provider with site-specific meteorological data including: • Temperature (degrees Fahrenheit) • Wind speed (meters/second) • Wind direction (degrees from True North) • Atmosphere pressure (hectopascals) • Forced outage data (wind turbine and MW unavailability)

  • Required Coverages For Generation Resources Of 20 Megawatts Or Less Each Constructing Entity shall maintain the types of insurance as described in section 11.1 paragraphs (a) through (e) above in an amount sufficient to insure against all reasonably foreseeable direct liabilities given the size and nature of the generating equipment being interconnected, the interconnection itself, and the characteristics of the system to which the interconnection is made. Additional insurance may be required by the Interconnection Customer, as a function of owning and operating a Generating Facility. All insurance shall be procured from insurance companies rated “A-,” VII or better by AM Best and authorized to do business in a state or states in which the Interconnection Facilities are located. Failure to maintain required insurance shall be a Breach of the Interconnection Construction Service Agreement.

  • DISADVANTAGED BUSINESS ENTERPRISE OR HISTORICALLY UNDERUTILIZED BUSINESS REQUIREMENTS The Engineer agrees to comply with the requirements set forth in Attachment H, Disadvantaged Business Enterprise or Historically Underutilized Business Subcontracting Plan Requirements with an assigned goal or a zero goal, as determined by the State.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Reasonable Suspicion Testing The Employer may, but does not have a legal duty to, request or require an employee to undergo drug and alcohol testing if the Employer or any supervisor of the employee has a reasonable suspicion (a belief based on specific facts and rational inferences drawn from those facts) related to the performance of the job that the employee:

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • FLORIDA CONVICTED/SUSPENDED/DISCRIMINATORY COMPLAINTS By submission of an offer, the respondent affirms that it is not currently listed in the Florida Department of Management Services Convicted/Suspended/Discriminatory Complaint Vendor List.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • Historically Underutilized Businesses Subcontract Reports a) Vendor shall electronically provide each Customer with Vendor’s relevant Historically Underutilized Business Subcontracting Report, pursuant to the Contract, as required by Chapter 2161, Texas Government Code. Reports shall also be submitted to DIR.

Time is Money Join Law Insider Premium to draft better contracts faster.