163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
|
that can be used to study the testbed itself, or to implement external
services like node monitoring and selection.
** An example experiment
# Event diagram, hover over components explained.
To show how the testbed works: two slivers which ping each other.
1. The researcher first contacts the server and creates a slice description
which specifies a template for slivers (e.g. Debian Squeeze) and includes
data and programs to setup slivers and run experiments.
2. This and all subsequent changes performed by the researcher are stored in
the registry, which holds the config of all components in the testbed.
3. The researcher chooses two nodes and adds sliver descriptions for them in
the previous slice. Each one includes a public interface to the CN.
4. Each of the previous nodes gets a sliver description for it. If enough
resources are available, a container is created by applying the sliver
configuration over the selected template.
5. Once the researcher knows that slivers have been instantiated, the server
can be commanded to activate the slice.
6. When nodes get instructions to activate slivers they start the containers.
7. Containers execute the setup and run programs provided by the researcher.
|
|
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
|
that can be used to study the testbed itself, or to implement external
services like node monitoring and selection.
** An example experiment
# Event diagram, hover over components explained.
To show how the testbed works: two slivers which ping each other.
1. The researcher first contacts the server and registers a slice description
which specifies a template for slivers (e.g. Debian Squeeze) and includes
data and programs to setup slivers and run experiments.
2. This and all subsequent changes performed by the researcher are stored in
the registry, which holds the config of all components in the testbed.
3. The researcher chooses two nodes and registers sliver descriptions for them
in the previous slice. Each one includes a public interface to the CN.
The researcher tells the server to instantiate the slice.
4. Each of the previous nodes gets a sliver description for it. If enough
resources are available, a container is created by applying the sliver
configuration over the selected template.
5. Once the researcher knows that slivers have been instantiated, the server
can be commanded to activate the slice.
6. When nodes get instructions to activate slivers they start the containers.
7. Containers execute the setup and run programs provided by the researcher.
|