Overview
Comment: | Mention link info and management data collection for experiments and external services. |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
1e2a1f4994e3784f193cb9c264e92a1a |
User & Date: | ivan on 2012-09-19 11:02:39 |
Other Links: | manifest | tags |
Context
2012-09-19
| ||
12:12 | Stress cooperation between CN members and Community-Lab. check-in: ba19604b2a user: ivan tags: trunk | |
11:02 | Mention link info and management data collection for experiments and external services. check-in: 1e2a1f4994 user: ivan tags: trunk | |
10:36 | Restructure experiment examples to clarify possibilities and usage. check-in: d6b27da7d8 user: ivan tags: trunk | |
Changes
Modified script.txt from [09af443dbe] to [d327a8d36a].
147
148
149
150
151
152
153
154
155
156
157
158
159
160
...
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
|
- Routing: an isolated interface using a VLAN on top of a direct interface. All traffic is allowed, but it can only reach other slivers of the same slice with isolated interfaces on the same physical link. - Low-level testing (not implemented): the sliver is given raw access to the interface. For privacy, isolation and stability reasons this should only be allowed in exceptional occasions. ** An example experiment # Event diagram, hover over components explained. To show how the testbed works: two slivers, one of them (source sliver) pings the other one (target sliver). 1. The researcher first contacts the server and creates a slice description which specifies a template for slivers (e.g. Debian Squeeze i386). ................................................................................ programs query sliver properties to decide their behaviour. 8. Researchers interact straight with containers if needed (e.g. via SSH) and collect results from them. 9. When finished, the researcher tells the server to deactivate and deinstantiate the slice. 10. Nodes get the instructions and they stop and remove containers. At all times there can be external services interacting with researchers, server, nodes and slivers, e.g. to help choosing nodes, monitor nodes or collect results. * Community-Lab integration in existing community networks # CN diagram (buildings and cloud). A typical CN looks like this, with most nodes linked using cheap and ubiquitous WiFi technology (and less frequently Ethernet, optical fiber or others). The CONFINE project follows three strategies taking into account that CNs are production networks with distributed ownership: |
>
>
>
>
>
>
>
<
<
<
<
|
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
...
184
185
186
187
188
189
190
191
192
193
194
195
196
197
|
- Routing: an isolated interface using a VLAN on top of a direct interface. All traffic is allowed, but it can only reach other slivers of the same slice with isolated interfaces on the same physical link. - Low-level testing (not implemented): the sliver is given raw access to the interface. For privacy, isolation and stability reasons this should only be allowed in exceptional occasions. Besides low level access, RDs also offer link quality and bandwidth usage measurements for all their interfaces through DLEP (available soon). Finally, the server and nodes publish management information through an API that can be used to study the testbed itself or to implement external services (like node monitoring and selection). ** An example experiment # Event diagram, hover over components explained. To show how the testbed works: two slivers, one of them (source sliver) pings the other one (target sliver). 1. The researcher first contacts the server and creates a slice description which specifies a template for slivers (e.g. Debian Squeeze i386). ................................................................................ programs query sliver properties to decide their behaviour. 8. Researchers interact straight with containers if needed (e.g. via SSH) and collect results from them. 9. When finished, the researcher tells the server to deactivate and deinstantiate the slice. 10. Nodes get the instructions and they stop and remove containers. * Community-Lab integration in existing community networks # CN diagram (buildings and cloud). A typical CN looks like this, with most nodes linked using cheap and ubiquitous WiFi technology (and less frequently Ethernet, optical fiber or others). The CONFINE project follows three strategies taking into account that CNs are production networks with distributed ownership: |