Due to a ransomware attack, the wiki was reverted to a July 2022 version. . We apologize for the lack of a more recent valid backup.
...
The figure below (Fig.7) shows how a cluster (cluster 2) is able to communicate with other clusters exploiting, at the same time, different southbound mechanisms.
Fig.7
Functionalities
Topology Management
...