Skip to content
Snippets Groups Projects
Select Git revision
  • acts_v4
  • master default protected
  • 24-optimize-barrel-em-calo-geometry
  • 18-make-ecal-blue
  • new_runner
  • geo_test
  • view_test
  • bigger_solenoid
  • vertex_tracker_radius
  • move_rich
  • rp_overlap
  • rich_optimize
  • tracker2
  • beampipe_overlap
  • rich_test
  • no_rich_hcal
  • dawnfix
  • ecal_radius
  • v0.0.2
  • v0.0.1
20 results

topside

  • Clone with SSH
  • Clone with HTTPS
  • TOPSiDE Detector concept

    Overview

    Quick start

    ./scripts/run_topside.py  -i ../test_data/eic_upsilon.hepmc   -o derp.root -n 100 

    Latest

    Browse latest




    Views of the Geometry

    Dawn generated views

    There are a number of "view" directories in scripts which generate a view using dawn and dawn cut

    https://twiki.cern.ch/twiki/bin/view/CLIC/DawnVisualization

    • view1 : side view of detector
    • view2 : z slices of detector at different z locations
    • view3 : ...
    • view6 : z slices for each layer of the silicon tracker endcaps
    • view7 : z slices for the silicon vertex tracker

    Generate the .prim file

    The following runs the simulation with a macro that produces a dawn prim file.

    ./scripts/run_topside.py                    \
             -i ../test_data/eic_upsilon.hepmc  \
             -o derp.root -n 1 --ui tcsh --vis  \ 
             -m macro/dawn_picture.mac 

    The output file takes the form g4_0001.prim if there is already a g4_0000.prim, and so on.

    DAWN is configured with the .DAWN_1.default which is unique to a directory. Because of this per directory configuration, there is a separate view for each generated image -- at least for now.

    Tips and Tricks

    Tunnel browser via SSH socks proxy

    This will use chromium web browser and a socks proxy to tunnel web traffic from a remote host. This makes it seem like you are running a web browser on the remote host. Note this requires the chromium web browser.

    From your laptop we will use the chromium-proxy script:

    ./bin/chromium-proxy -h
    USAGE: ./bin/chromium-proxy [-p <PROXY_PORT>] [-n <PROFILE_NAME>] [-s SSH_HOST]
      OPTIONS:
           -s,--host      ssh host. Default: sodium
           -p,--port      Proxy port number. Default: 8020
           -n,--profile   Profile name to use. Sets profile directory to ~/.proxy-profiles/PROFILE_NAME
    
      EXAMPLE:
        ./bin/chromium-proxy -p 8020 -n sodium sodium

    Here are the steps:

    1. In an ssh session on the remote machine, run the dd_web_display server. In this case we use sodium with IP address of 10.10.241.20.
    dd_web_display -p 9999 -H 10.10.241.20 topside.xml

    Note that the IP address is needed and not the hostname. Just type ip a if you need the IP address.

    1. In a local terminal Open the tunnel and browser with the helper script:
    ./bin/chromium-proxy -p 8920 sodium
    1. In the browser window, navigate to 10.10.241.20:8920 .

    Done.

    Looking at the detector

    https://ma.ttias.be/socks-proxy-linux-ssh-bypass-content-filters/

    TOPSiDE views