Community-Lab introduction

Diff
Login

Differences From Artifact [f9cea8dd3d]:

To Artifact [8dd7b92f2f]:


176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
   data and programs to setup slivers and run experiments.

   The researcher chooses two nodes and registers sliver descriptions for them
   in the previous slice.  Each one includes a public interface to the CN.

   This and all subsequent changes performed by the researcher are stored in
   the registry, which holds the config of all components in the testbed.
2. The researcher tells the server to instantiate the slice.

   Each of the previous nodes gets a sliver description for it.  If enough
   resources are available, a container is created by applying the sliver
   configuration over the selected template.
3. Once the researcher knows that slivers have been instantiated, the server
   can be commanded to activate the slice.

   When nodes get instructions to activate slivers they start containers.

   Containers execute the setup & run programs provided by the researcher.
4. Researchers interact straight with containers if needed (e.g. via SSH) and
   collect results from them.
5. When finished, the researcher tells the server to deactivate the slice.
6. And also to deinstantiate it.

   Nodes get instructions and they stop and remove containers, respectively.
7. If the researcher wants to, the slice itself can be removed.

This was a view of the testbed from a research perspective.  From the
community perspective, *##*








|




|
|

|




|
|







176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
   data and programs to setup slivers and run experiments.

   The researcher chooses two nodes and registers sliver descriptions for them
   in the previous slice.  Each one includes a public interface to the CN.

   This and all subsequent changes performed by the researcher are stored in
   the registry, which holds the config of all components in the testbed.
2. The researcher tells the server to deploy the slice.

   Each of the previous nodes gets a sliver description for it.  If enough
   resources are available, a container is created by applying the sliver
   configuration over the selected template.
3. Once the researcher knows that slivers have been deployed, the server can
   be commanded to start the slice.

   When nodes get instructions to start slivers they start containers.

   Containers execute the setup & run programs provided by the researcher.
4. Researchers interact straight with containers if needed (e.g. via SSH) and
   collect results from them.
5. When finished, the researcher tells the server to stop the slice.
6. And also to undeploy it.

   Nodes get instructions and they stop and remove containers, respectively.
7. If the researcher wants to, the slice itself can be removed.

This was a view of the testbed from a research perspective.  From the
community perspective, *##*