Community-Lab introduction

Check-in [1e2a1f4994]
Login
Overview
Comment:Mention link info and management data collection for experiments and external services.
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:1e2a1f4994e3784f193cb9c264e92a1a78a24585
User & Date: ivan on 2012-09-19 11:02:39
Other Links: manifest | tags
Context
2012-09-19
12:12
Stress cooperation between CN members and Community-Lab. check-in: ba19604b2a user: ivan tags: trunk
11:02
Mention link info and management data collection for experiments and external services. check-in: 1e2a1f4994 user: ivan tags: trunk
10:36
Restructure experiment examples to clarify possibilities and usage. check-in: d6b27da7d8 user: ivan tags: trunk
Changes
Hide Diffs Side-by-Side Diffs Ignore Whitespace Patch

Modified script.txt from [09af443dbe] to [d327a8d36a].

   147    147   - Routing: an isolated interface using a VLAN on top of a direct interface.
   148    148     All traffic is allowed, but it can only reach other slivers of the same
   149    149     slice with isolated interfaces on the same physical link.
   150    150   - Low-level testing (not implemented): the sliver is given raw access to the
   151    151     interface.  For privacy, isolation and stability reasons this should only be
   152    152     allowed in exceptional occasions.
   153    153   
          154  +Besides low level access, RDs also offer link quality and bandwidth usage
          155  +measurements for all their interfaces through DLEP (available soon).
          156  +
          157  +Finally, the server and nodes publish management information through an API
          158  +that can be used to study the testbed itself or to implement external services
          159  +(like node monitoring and selection).
          160  +
   154    161   ** An example experiment
   155    162   # Event diagram, hover over components explained.
   156    163   To show how the testbed works: two slivers, one of them (source sliver) pings
   157    164   the other one (target sliver).
   158    165   
   159    166   1. The researcher first contacts the server and creates a slice description
   160    167      which specifies a template for slivers (e.g. Debian Squeeze i386).
................................................................................
   177    184      programs query sliver properties to decide their behaviour.
   178    185   8. Researchers interact straight with containers if needed (e.g. via SSH) and
   179    186      collect results from them.
   180    187   9. When finished, the researcher tells the server to deactivate and
   181    188      deinstantiate the slice.
   182    189   10. Nodes get the instructions and they stop and remove containers.
   183    190   
   184         -At all times there can be external services interacting with researchers,
   185         -server, nodes and slivers, e.g. to help choosing nodes, monitor nodes or
   186         -collect results.
   187         -
   188    191   * Community-Lab integration in existing community networks
   189    192   # CN diagram (buildings and cloud).
   190    193   A typical CN looks like this, with most nodes linked using cheap and
   191    194   ubiquitous WiFi technology (and less frequently Ethernet, optical fiber or
   192    195   others).  The CONFINE project follows three strategies taking into account
   193    196   that CNs are production networks with distributed ownership:
   194    197