Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Introduction

The environment for the OOF PCI proof5G use case proofs-of-concept (PoCPoCs) is the Open Wireless Laboratory (OWL) at the Wireless Information Network Laboratory (WINLAB) at Rutgers University in New Jersey, USA.  The environment consists of interconnected servers and wireless network equipment.  One can gain access to the environment by requesting an account with WINLAB using these instructions.   There is also information at the ORBIT web page of WINLAB.  Once you are given an account, WINLAB requires the use of public key authentication to access their systems, and they provide instructions at this page.

Environment

The diagram (below) shows the current configuration.  The entry point is an Ubuntu machine console.sb10.orbit-lab.org on which you will have an account.  There are currently three Ubuntu 18.04 servers: node1-1, node2-1 and node2-2, which are managed by OpenStack (several other servers will be installed).  Node1-1 is the controller node, and node2-1 and node202 are compute nodes.  The console and three servers are connected by two networks: control (10.30.0.0/16) and data (10.31.0.0/16).  All of the physical wireless network equipment, shown in the far right of the diagram, will be connected to the data network.  The 10.50.30.0/16 network on the left provides access from the greater Internet, and the network 10.1.110.0/16 is internal and used for out-of-band interfaces to the machines.  These latter two networks are of less interest for the proof-of-concept.  All machines and VMs created in the servers have outbound access to the greater Internet via the sw-rt1-top machine shown on the bottom with a NAT and firewall.

...

This command opens a tunnel from one's local machine to the dashboard.

Code Block
ssh -A -t <username>@console.sb10.orbit-lab.org -L 8585:localhost:8585 \
ssh -A -t <username>@node1-1 -L 8585:localhost:80

The dashboard is listening on port 80, and this command creates a ssh tunnel that listens on port 8585, which is a random high number port, on one's local machine and relays through the console to appear at port 80 on node1-1.  Team members can then access the dashboard by opening a browser on their local machine and navigating to http://localhost:8585/horizon/auth/login.  Before executing the command, though, team members should install their public keys in each machine in the tunnel in the ~/.ssh/authorized_keys file.

...