Changes between Version 16 and Version 17 of GEC9DemoSummary

10/28/10 14:07:57 (9 years ago)



  • GEC9DemoSummary

    v16 v17  
    160160== ProtoGENI ==
     162''Demo Participants:" John Regehr, Rob Ricci [[BR]]
     163We will demonstrate the frontend GUI to ProtoGENI. This GUI will display the resources that are part of the ProtoGENI federation on a map. It will allow users to create slices, start up slivers on various component managers, and display those slices on the map. This GUI is available for all users of the ProtoGENI federation. [[BR]]
     164Affiliation(s): University of Utah, HP Labs, Internet2
     166== A Provisioning Service for Long-Term GENI Experiments ==
     168''Demo Participants:" John Hartman, Scott Baker [[BR]]
     169We will demo the Raven tool suite for experiment management, including the Raven tool for publishing an experiment's software and configuration packages, the Tempest tool for installing those packages on the proper slices and slivers, and the Owl tool for monitoring the experiment's progress and results. [[BR]]
     170Affilation(s): University of Arizona
     172== Scalable, Extensible, and Safe Monitoring of GENI ==
     174''Demo Participants:" Sonia Fahmy, Puneet Sharma [[BR]]
     175This Demo with demonstrate the capabilities of Scalable and Safe Sensing Service for GENI Clusters. The demo will show deployment of S3Monitor components (the sensing pods and sensing information manager) on the ProtoGENI cluster. [[BR]]
     176Affiliation(s): Purdue University , HP Labs
     178== A SCAFFOLD for GENI-based Distributed Services ==
     180''Demo Participants:" Matvey Arye, Michale Freedman, Prem Gopalan, Erik Nordstrom, Jen Rexford, David Shue  [[BR]]
     181SCAFFOLD is a network architecture designed to support the needs of replicated, dynamic Internet services, deployed within and across datacenters. SCAFFOLD provides flow-based anycast with (possibly moving) service instances, yet allows addresses to change over time as instances fail, recover, or move. This demo showcases our SCAFFOLD prototype -- which includes an end-host network stack (built as extensions to Linux and the BSD socket API) and a network infrastructure (built on top of OpenFlow and NOX) -- and how SCAFFOLD handles service dynamism among replicated services. [[BR]]
     182Affiliation(s): Princeton University
     184== Exploiting Insecurity to Secure Software Update Systems ==
     186''Demo Participants:" Justin Cappos, Geremy Condra [[BR]]
     187Every piece of GENI receives software updates, sometimes through multiple mechanisms. Unfortunately, insecure software updaters are prevalent today on GENI (and the Internet as a whole), making it easy for a malicious attacker to compromise systems. This project focuses on providing secure and timely software updates to GENI systems. [[BR]]
     188Affiliation(s): University of Washington
     190== A Shad!owBox-based ProtoGENI Instrumentation and Measurement Infrastructure ==
     192''Demo Participants:" James Griffioen, Zongming Fei, Jacobus van der Merwe [[BR]]     
     193GENI ShadowNet? Demo - "Internet in a Slice".  Experiments often want to emulate a wide-area network that consists of multiple ASes running realistic intra and inter domain routing protocols. We will demonstrate how the GENI ShadowNet? Juniper routers can be used to create a set of networks (ASes) that have all the essential components and protocols that make up the Internet.  (We will be working with the Utah ProtoGENI group to create backbone connections across Internet 2 between the GENI ShadowNet? routers) [[BR]]
     194Affiliation(s): University of Kentucky, AT&T Research, Internet2
     196== Internet Scale Overlay Hosting ==
     198''Demo Participants:" Jon Turner, Patrick Crowley, John DeHart [[BR]]
     199Demonstrate one or two new slices. [[BR]]
     200Affiliation(s): Washington University, St. Louis, MO
     202== Virtual Machine Introspection and Development of a Model Federation Framework for GENI ==
     204''Demo Participants:" Kara Nance, Brian Hay, Jon Genetti [[BR]]
     205We will demonstrate the current Virtual Machine Introspection (VMI) functionality running against cluster nodes. This allows the state (e.g., network state, packet counts, running processes, memory usage, ...) of the virtual machines to be determined from the virtualization layer (i.e., without the need to install instrumentation tools on the virtual machine).  [[BR]]
     206Affiliation(s): University of Alaska Fairbanks