policies.html 4.08 KB
Newer Older
Leigh Stoller's avatar
Leigh Stoller committed
1 2
<!--
   EMULAB-COPYRIGHT
3
   Copyright (c) 2000-2003 University of Utah and the Flux Group.
Leigh Stoller's avatar
Leigh Stoller committed
4 5
   All rights reserved.
  -->
6
<center>
Jay Lepreau's avatar
Jay Lepreau committed
7
<h1>Administrative Policies</h1>
8
</center>
Chad Barb's avatar
Chad Barb committed
9
<p>
10 11
Most any legitimate research/experimental use is allowed, including
use by companies.  Of course, when demand exceeds supply we will have
12 13 14 15
to assign priorities to projects, but the hardware base will be
expanding.  Due to limited resources and other issues, we currently
allow only research use of the wide-area nodes; educational and
development use are not permitted.
Chad Barb's avatar
Chad Barb committed
16
</p>
17

Jay Lepreau's avatar
Jay Lepreau committed
18
<h2>Acceptable Use, Allocation Priority, Reporting, Governance, Disclaimer</h2>
Chad Barb's avatar
Chad Barb committed
19
<p>
Jay Lepreau's avatar
Jay Lepreau committed
20 21 22
Our current and anticipated policies follow.  We expect these to
evolve as experience demands, and we are open to constructive
suggestions concerning them.
Chad Barb's avatar
Chad Barb committed
23
</p>
24

Jay Lepreau's avatar
Jay Lepreau committed
25
<h3>Acceptable Use</h3>
Chad Barb's avatar
Chad Barb committed
26
<p>
Jay Lepreau's avatar
Jay Lepreau committed
27 28
In principle, almost any research or experimental use of the testbed
by experimenters that have a need for it is appropriate.
Chad Barb's avatar
Chad Barb committed
29
</p>
Jay Lepreau's avatar
Jay Lepreau committed
30 31 32 33
<p>
"Abuse" of the facility or its other users, in any form, will of course
result in termination of access.  Abuse includes using the facility
for other than a project's stated purpose.
Chad Barb's avatar
Chad Barb committed
34
</p>
35

Jay Lepreau's avatar
Jay Lepreau committed
36
<h3>Allocation Priority</h3>
Chad Barb's avatar
Chad Barb committed
37
<p>
Jay Lepreau's avatar
Jay Lepreau committed
38 39 40 41 42 43 44 45 46 47 48 49 50 51
When the testbed become oversubscribed we will be allocating its
resources based on some function-- currently vague but in roughly
this order-- of
perceived research value and broader impact,
the testbed's uniqueness as a suitable platform for the research,
novelty as a testbed application,
resources required (typically: number of nodes),
experimenters' contribution to testbed software development,
experimenters' lack of access to other appropriate facilities,
sponsorship by our primary sponsors (currently NSF and Cisco),
educational value,
affiliation with an academic institution,
whether the project is funded/peer-reviewed,
and for commercial users, their willingness to help defray costs, i.e., pay.
Chad Barb's avatar
Chad Barb committed
52
</p>
Jay Lepreau's avatar
Jay Lepreau committed
53 54
<p>
Many development-oriented commercial experiments and evaluations will
Chad Barb's avatar
Chad Barb committed
55 56
be allowed, but with lower priority.
</p>
Jay Lepreau's avatar
Jay Lepreau committed
57 58

<h3>Reporting</h3>
Chad Barb's avatar
Chad Barb committed
59
<p>
Jay Lepreau's avatar
Jay Lepreau committed
60 61 62
In order to assess the testbed's impact and report to our sponsors, we
simply require notice of all publications or patents to which the testbed
contributed.  Formal acknowledgement in such publications is required
63
as well, by citing the following paper:
64
<blockquote>
65 66 67 68 69 70 71
  <cite><a href="http://www.cs.utah.edu/flux/papers/netbed-osdi02-base.html">
	   An Integrated Experimental Environment for Distributed
	   Systems and Networks</a></cite>, 
	   by White, Lepreau, Stoller, Ricci, Guruprasad, Newbold,
	   Hibler, Barb, and Joglekar, appeared at
	   <a href = "http://www.usenix.org/events/osdi02/">OSDI 2002</a>,
	   December 2002.<br>
72
</blockquote>
73 74 75 76 77

You can use this
<b><a href="http://www.cs.utah.edu/flux/papers/netbed-osdi02.bib">
BibTex entry</b></a> to cite Netbed/Emulab. Finally, we will be
soliciting feedback and suggestions from our users.
Chad Barb's avatar
Chad Barb committed
78
</p>
Jay Lepreau's avatar
Jay Lepreau committed
79 80

<h3>Governance</h3>
Chad Barb's avatar
Chad Barb committed
81
<p>
Jay Lepreau's avatar
Jay Lepreau committed
82 83 84 85 86
An administrative board, including representatives from our major
sponsors, will be involved in setting broad policy and have review
authority.  Typically, a small executive committee composed of members
from the University of Utah Flux research group will decide most
resource allocation issues.
Chad Barb's avatar
Chad Barb committed
87
</p>
Jay Lepreau's avatar
Jay Lepreau committed
88 89 90
<p>
A Technical Advisory Board is also being formed, containing distinguished
members of the network and distributed systems research communities.
Chad Barb's avatar
Chad Barb committed
91
</p>
92

Jay Lepreau's avatar
Jay Lepreau committed
93
<h3>Disclaimer</h3>
Chad Barb's avatar
Chad Barb committed
94
<p>
Jay Lepreau's avatar
Jay Lepreau committed
95
We are providing broad access to the testbed in the hopes that it will
Chad Barb's avatar
Chad Barb committed
96
be useful, but we do so <b>WITHOUT ANY WARRANTY</b>; without even the implied
Jay Lepreau's avatar
Jay Lepreau committed
97
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Chad Barb's avatar
Chad Barb committed
98
</p>
Jay Lepreau's avatar
Jay Lepreau committed
99
<p>
Chad Barb's avatar
Chad Barb committed
100
<b>WE DISCLAIM ALL LIABILITY</b> from errors in results or security breaches
Jay Lepreau's avatar
Jay Lepreau committed
101 102
resulting from emulab's use.  The system has been in production use for
over a year, but is constantly undergoing rapid development, so
Jay Lepreau's avatar
Jay Lepreau committed
103
significant amounts of code are always new.
Jay Lepreau's avatar
Jay Lepreau committed
104
We make an effort to provide inter-project security, but users
Jay Lepreau's avatar
Jay Lepreau committed
105
must realize that high security is unlikely in i) such a new and rapidly
106 107 108
evolving system, ii) where users have such complete control over
hardware and software resources, and iii) in such a public facility
that will attract attack.
Chad Barb's avatar
Chad Barb committed
109
</p>