ViPXis are complex objects that have lifetime (composition, reservation, activation, migration, pause, store, and reactivate operations). For example, users need to define the virtual private execution infrastructures they request according to the applications’ requirements. To facilitate the specification and the manipulation of these objects we propose a simple open language.A descriptive language dedicated to virtual infrastructures description must be abstract enough and more adaptive than conventional resource description languages. In particular, it needs to combine the space and temporal aspects of virtual infrastructures. During the specification process, new challenges coming from virtualization techniques have to complement the management, configuration and execution features of classical infrastructure description languages. We identify some desirable aspects that must be integrated in such language:
• Each resource must be characterized using an extensible list of descriptive parameters to represent the necessary configuration (e.g., memory, CPU speed, and storage capability); Some system will not be able to process these parameter while others would be;
• Each component (individually or in-group) should be characterized by its elementary function, for example to describe a set of computing node
s or storage nodes; this would be exploited by system able to propose equivalent services;
• Recursive representation of individual resources and groups are necessary;
• Software (e.g., operating systems) and tools (e.g., communication and programming tools) that must be deployed and configured in each component have to be specified. This increases the automation level;
• The virtual network topology has to be expressed, with the detail of each virtual link. On the other hand, parameters should enable an abstract description, for example, informing a virtual link description that must be used to interconnect a group of resources;
• The executing timeline of the infrastructure (this parameter should help in resources reservation and co scheduling);
• Security attributes for each resource element (access control, confidentiality level);
• Commercial attributes for each resource element (maximum cost);
• Identification of critical components, which requires fault tolerance protection;
• Temporal attributes for each resource element (time window for provisioning).