162 | | |
163 | | |
| 162 | ''Demo Participants:" John Regehr, Rob Ricci [[BR]] |
| 163 | We will demonstrate the frontend GUI to ProtoGENI. This GUI will display the resources that are part of the ProtoGENI federation on a map. It will allow users to create slices, start up slivers on various component managers, and display those slices on the map. This GUI is available for all users of the ProtoGENI federation. [[BR]] |
| 164 | Affiliation(s): University of Utah, HP Labs, Internet2 |
| 165 | |
| 166 | == A Provisioning Service for Long-Term GENI Experiments == |
| 167 | |
| 168 | ''Demo Participants:" John Hartman, Scott Baker [[BR]] |
| 169 | We will demo the Raven tool suite for experiment management, including the Raven tool for publishing an experiment's software and configuration packages, the Tempest tool for installing those packages on the proper slices and slivers, and the Owl tool for monitoring the experiment's progress and results. [[BR]] |
| 170 | Affilation(s): University of Arizona |
| 171 | |
| 172 | == Scalable, Extensible, and Safe Monitoring of GENI == |
| 173 | |
| 174 | ''Demo Participants:" Sonia Fahmy, Puneet Sharma [[BR]] |
| 175 | This Demo with demonstrate the capabilities of Scalable and Safe Sensing Service for GENI Clusters. The demo will show deployment of S3Monitor components (the sensing pods and sensing information manager) on the ProtoGENI cluster. [[BR]] |
| 176 | Affiliation(s): Purdue University , HP Labs |
| 177 | |
| 178 | == A SCAFFOLD for GENI-based Distributed Services == |
| 179 | |
| 180 | ''Demo Participants:" Matvey Arye, Michale Freedman, Prem Gopalan, Erik Nordstrom, Jen Rexford, David Shue [[BR]] |
| 181 | SCAFFOLD is a network architecture designed to support the needs of replicated, dynamic Internet services, deployed within and across datacenters. SCAFFOLD provides flow-based anycast with (possibly moving) service instances, yet allows addresses to change over time as instances fail, recover, or move. This demo showcases our SCAFFOLD prototype -- which includes an end-host network stack (built as extensions to Linux and the BSD socket API) and a network infrastructure (built on top of OpenFlow and NOX) -- and how SCAFFOLD handles service dynamism among replicated services. [[BR]] |
| 182 | Affiliation(s): Princeton University |
| 183 | |
| 184 | == Exploiting Insecurity to Secure Software Update Systems == |
| 185 | |
| 186 | ''Demo Participants:" Justin Cappos, Geremy Condra [[BR]] |
| 187 | Every piece of GENI receives software updates, sometimes through multiple mechanisms. Unfortunately, insecure software updaters are prevalent today on GENI (and the Internet as a whole), making it easy for a malicious attacker to compromise systems. This project focuses on providing secure and timely software updates to GENI systems. [[BR]] |
| 188 | Affiliation(s): University of Washington |
| 189 | |
| 190 | == A Shad!owBox-based ProtoGENI Instrumentation and Measurement Infrastructure == |
| 191 | |
| 192 | ''Demo Participants:" James Griffioen, Zongming Fei, Jacobus van der Merwe [[BR]] |
| 193 | GENI ShadowNet? Demo - "Internet in a Slice". Experiments often want to emulate a wide-area network that consists of multiple ASes running realistic intra and inter domain routing protocols. We will demonstrate how the GENI ShadowNet? Juniper routers can be used to create a set of networks (ASes) that have all the essential components and protocols that make up the Internet. (We will be working with the Utah ProtoGENI group to create backbone connections across Internet 2 between the GENI ShadowNet? routers) [[BR]] |
| 194 | Affiliation(s): University of Kentucky, AT&T Research, Internet2 |
| 195 | |
| 196 | == Internet Scale Overlay Hosting == |
| 197 | |
| 198 | ''Demo Participants:" Jon Turner, Patrick Crowley, John DeHart [[BR]] |
| 199 | Demonstrate one or two new slices. [[BR]] |
| 200 | Affiliation(s): Washington University, St. Louis, MO |
| 201 | |
| 202 | == Virtual Machine Introspection and Development of a Model Federation Framework for GENI == |
| 203 | |
| 204 | ''Demo Participants:" Kara Nance, Brian Hay, Jon Genetti [[BR]] |
| 205 | We will demonstrate the current Virtual Machine Introspection (VMI) functionality running against cluster nodes. This allows the state (e.g., network state, packet counts, running processes, memory usage, ...) of the virtual machines to be determined from the virtualization layer (i.e., without the need to install instrumentation tools on the virtual machine). [[BR]] |
| 206 | Affiliation(s): University of Alaska Fairbanks |
| 207 | |
| 208 | |
| 209 | |