View
219
Download
1
Category
Tags:
Preview:
Citation preview
Cyberinfrastructure Cyberinfrastructure Overview Overview
Russ Hobby, Internet2Russ Hobby, Internet2ECSU CI DaysECSU CI Days
4 January 20084 January 2008
Cyberinfrastructure?Cyberinfrastructure?
Ask any number of people “What is Ask any number of people “What is Cyberinfrastructure?” and you will Cyberinfrastructure?” and you will probably get an equal number of probably get an equal number of definitionsdefinitions
We need a common understanding of CI We need a common understanding of CI in order to build and operate it.in order to build and operate it.
Cyberinfrastructure Vision at Cyberinfrastructure Vision at NSFNSF
NSF’S CYBERINFRASTRUCTURE VISION NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERYFOR 21ST CENTURY DISCOVERY
http://www.nsf.gov/od/oci/ci-v7.pdfhttp://www.nsf.gov/od/oci/ci-v7.pdf
The Nature of Research TodayThe Nature of Research Today
Discipline groups working on a common Discipline groups working on a common project.project.
The groups are made of researchers from The groups are made of researchers from multiple institutions.multiple institutions.
They use the network in support of Virtual They use the network in support of Virtual Organizations (VOs)Organizations (VOs)
Example Researcher using CIExample Researcher using CI
Jane is an environmental researcher and Jane is an environmental researcher and is going to find a solution to Global is going to find a solution to Global Warming. To do this she needs to collect Warming. To do this she needs to collect and store data, do analysis of the data and and store data, do analysis of the data and run some simulation models to test her run some simulation models to test her hypothesis. She will share ideas, data and hypothesis. She will share ideas, data and results with her Discipline Group. Here are results with her Discipline Group. Here are her steps in using CIher steps in using CI
Control Instruments to Gather DataControl Instruments to Gather Data
Instrumentation ControlResearcher
Control
Security and Access ControlSecurity and Access Control
Instrumentation
Security
Control
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
Control
Security
Data Transfer and StorageData Transfer and Storage
Instrumentation
Security
Control
DataGeneration
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
Control
Security
Data SetsStorage
Security
Input
Data AnalysisData Analysis
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
Security
Data SetsStorage
Security
RetrievalInput
VisualizationVisualization
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
Display andVisualization
.
DisplayTools Security
DataInputSearch
Data SetsStorage
Security
RetrievalInput
Simulation and ViewingSimulation and Viewing
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInputSearch
Data SetsStorage
Security
RetrievalInput
Sharing, Collaboration, Sharing, Collaboration, Publishing and OutreachPublishing and Outreach
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools Publishing
HumanSupportHelp
Desk
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
EducationAnd
Outreach
Training
Jane goes after new grantJane goes after new grant
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools Publishing
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
EducationAnd
Outreach
Training
CyberinfrastructureCyberinfrastructure Functions and Resources Functions and Resources
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools Publishing
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
EducationAnd
Outreach
Training
The Network is the Backplane for the The Network is the Backplane for the Distributed CI ComputerDistributed CI Computer
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools Publishing
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
EducationAnd
Outreach
Network
Training
GridOrgs
National
RegionalInternational
SupercomputerSites
ComputationStorage
SoftwareDevelopment
DisciplineSupport
CampusIT Security
ID Mang
NetworkData
Center
Researchers
StaffGrad
Students
Faculty
NetworkProviders
National
RegionalInternational
Security/Access
Coordinators
National
RegionalInternational
Cyberinfrastructure Cyberinfrastructure PlayersPlayers
CollectionsOrganizations
DisciplineGroups
PublishersLibraries Policy/Leadership/
Funding
FederalAgencies
EducationalOrganizationsOGF
Medicine
DisciplineGroups
BiologicalScience.
PhysicalScience
OtherDisciplines
Traditional Grid ComputingTraditional Grid Computing
Built by Supercomputer Sites or in Built by Supercomputer Sites or in Researcher’s LabsResearcher’s Labs
Support internal to disciplineSupport internal to discipline Campus IT generally not involvedCampus IT generally not involved There have been problems with facilities in There have been problems with facilities in
researcher’s labs researcher’s labs (power, HVAC, network)(power, HVAC, network)
Moving into CIMoving into CI
Disciplines new to CI are doing their Disciplines new to CI are doing their planning, but expect others to provide it.planning, but expect others to provide it.
Campus IT organizations starting to get Campus IT organizations starting to get more involvedmore involved
Supporting organizations are figuring out Supporting organizations are figuring out how to work together.how to work together.
CI is not just for ResearchersCI is not just for Researchers
The current focus on CI is its use by The current focus on CI is its use by Researchers. However this is an Researchers. However this is an emerging technology that will be used by emerging technology that will be used by all, just as the individual computer and the all, just as the individual computer and the Internet has become a regular work tool.Internet has become a regular work tool.
CI Functions and ResourcesCI Functions and Resources
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools Publishing
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
EducationAnd
Outreach
Network
Training
CI DirectionCI DirectionCyberinfrastructure is moving toward Cyberinfrastructure is moving toward including all aspects of Information including all aspects of Information Technology as a coordinated system. The Technology as a coordinated system. The “coordinated” part still needs a lot of work. “coordinated” part still needs a lot of work.
NSF has provided a vision. Next steps are NSF has provided a vision. Next steps are needed to define an architecture and needed to define an architecture and develop an implementation plan.develop an implementation plan.
Users need to define the “what”. IT staff Users need to define the “what”. IT staff need to define the “how”.need to define the “how”.
CI Days WorkshopsCI Days WorkshopsTeraGrid, Open Science Grid, NLRTeraGrid, Open Science Grid, NLR, , Internet2, Internet2, and EDUCAUSE have come together to try to and EDUCAUSE have come together to try to help better understand the CI picture, and to help better understand the CI picture, and to better coordinate functions and roles in the better coordinate functions and roles in the creation of this infrastructure. creation of this infrastructure. One activity started by this group is “CI Days” One activity started by this group is “CI Days” held for campuses to assist in their CI planning. held for campuses to assist in their CI planning. This workshop brings together players from the This workshop brings together players from the campus, region and nation to share information campus, region and nation to share information and plan how to provide CI functions for the and plan how to provide CI functions for the campus. The national and regional groups will campus. The national and regional groups will also learn the campus needs to help better also learn the campus needs to help better direct the evolution of the services.direct the evolution of the services.
CI DaysCI Days Campus BasedCampus Based
Involve the whole campus. It’s local so they will Involve the whole campus. It’s local so they will comecome
Discover the needs and driving factors Discover the needs and driving factors Get everyone on the same pageGet everyone on the same page Launch the campus CI planning and Launch the campus CI planning and
implementationimplementation Regional BasedRegional Based
Serve as a way to scale CI DaysServe as a way to scale CI Days Representatives from campuses can go home Representatives from campuses can go home
and expand the experience for their campus and expand the experience for their campus environmentenvironment
Other ActivitiesOther Activities
Presentations and WorkshopsPresentations and Workshops CI Days Web/WikiCI Days Web/Wiki
www.cidays.orgwww.cidays.org
Collect Campus CI PlansCollect Campus CI Plans Let campuses share their plans with others on Let campuses share their plans with others on
the CI Days Wikithe CI Days Wiki
Russ’ CI VisionRuss’ CI VisionSet of tools and resources that allow:Set of tools and resources that allow:
Computation and Storage to easily allow transition Computation and Storage to easily allow transition from the desktop, to the campus resource, to the from the desktop, to the campus resource, to the regional center, to national super centers using the regional center, to national super centers using the same software.same software.
Data repositories in formats and locations to allow Data repositories in formats and locations to allow ease of sharing among all interested disciplines (the ease of sharing among all interested disciplines (the real digital library!)real digital library!)
Tools to allow people to easily construct systems to Tools to allow people to easily construct systems to analyze, visualize and simulate their research analyze, visualize and simulate their research subjects.subjects.
Collaboration tools that allow people to work together Collaboration tools that allow people to work together like they are in the same room, even if they aren’t.like they are in the same room, even if they aren’t.
More Info More Info
Russ HobbyRuss Hobbyrdhobby@internet2.edurdhobby@internet2.edu530-863-0513 530-863-0513
Recommended