Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR...

Preview:

Citation preview

Research and Educational Research and Educational Networking and Networking and

CyberinfrastructureCyberinfrastructure

Russ Hobby, Internet2Russ Hobby, Internet2Dan Updegrove, NLRDan Updegrove, NLRUniversity of Kentucky CI DaysUniversity of Kentucky CI Days22 February 201022 February 2010

OverviewOverview

The nature of much research today: RussThe nature of much research today: Russ Some applications of R&E nets: DanSome applications of R&E nets: Dan

The Nature of Research TodayThe Nature of Research Today

Discipline groups working on a common Discipline groups working on a common project.project.

The groups are made of researchers from The groups are made of researchers from multiple institutions.multiple institutions.

They use the network in support of Virtual They use the network in support of Virtual Organizations (VOs)Organizations (VOs)

Example Researcher using CIExample Researcher using CI

Jane is an environmental researcher and Jane is an environmental researcher and is going to find a solution to Global is going to find a solution to Global Warming. To do this she needs to collect Warming. To do this she needs to collect and store data, do analysis of the data and and store data, do analysis of the data and run some simulation models to test her run some simulation models to test her hypothesis. She will share ideas, data and hypothesis. She will share ideas, data and results with her Discipline Group. Here are results with her Discipline Group. Here are her steps in using CIher steps in using CI

Local Climate Data CollectionLocal Climate Data Collection

Global Climate Data CollectionGlobal Climate Data Collection

Climate Data VisualizationClimate Data Visualization

Climate ModelingClimate Modeling

Model VisualizationModel Visualization

CollaborationCollaboration

What is Under the CI Hood?What is Under the CI Hood?

Someday you will tell a car where to go and it Someday you will tell a car where to go and it will take you therewill take you there

We aren’t there yetWe aren’t there yet You currently need to know that that a car You currently need to know that that a car

has an engine, brakes, fuel system, etchas an engine, brakes, fuel system, etc Likewise with CI, you don’t have to know all Likewise with CI, you don’t have to know all

the details, but it is good to know about the the details, but it is good to know about the partsparts

Let’s look at what Jane usesLet’s look at what Jane uses

Control Instruments to Gather DataControl Instruments to Gather Data

Instrumentation ControlResearcher

Control

Security and Access ControlSecurity and Access Control

Instrumentation

Security

Control

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Data Transfer and StorageData Transfer and Storage

Instrumentation

Security

Control

DataGeneration

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Data SetsStorage

Security

Input

Data AnalysisData Analysis

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

Security

Data SetsStorage

Security

RetrievalInput

VisualizationVisualization

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Simulation and ViewingSimulation and Viewing

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Sharing, Collaboration, Sharing, Collaboration, Publishing and OutreachPublishing and Outreach

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

Jane goes after new grantJane goes after new grant

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

CyberinfrastructureCyberinfrastructure Functions and Resources Functions and Resources

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

The Network is the Backplane for the The Network is the Backplane for the Distributed CI ComputerDistributed CI Computer

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Network

Training

GridOrgs

National

RegionalInternational

SupercomputerSites

ComputationStorage

SoftwareDevelopment

DisciplineSupport

CampusIT Security

ID Mang

NetworkData

Center

Researchers

StaffGrad

Students

Faculty

NetworkProviders

National

RegionalInternational

Security/Access

Coordinators

National

RegionalInternational

Cyberinfrastructure Cyberinfrastructure PlayersPlayers

CollectionsOrganizations

DisciplineGroups

PublishersLibraries Policy/Leadership/

Funding

FederalAgencies

EducationalOrganizationsOGF

Medicine

DisciplineGroups

BiologicalScience.

PhysicalScience

OtherDisciplines

CI Functions and ResourcesCI Functions and Resources

Student

Security

Control

Assignments

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Instructor

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

CourseMaterials

Collections

Grades

Archive

TeachingTools

Network

Training

The Research and Educational The Research and Educational NetworksNetworks

NationalBackbones

RegionalNetwork

CampusNetwork

CampusNetwork

RegionalNetwork

InternationalNetworks

Desktop/Laptop

Desktop/Laptop

ComputationalComputationalResourcesResources

NationalCenters

SharedRegionalClusters

Shared CampusClusters

Desktop/Laptop

Private CampusClusters

PrivateRegionalClustersShared Resource

Scheduler

ResourceScheduler

StorageStorageResourcesResources

NationalCenters

DisciplineRepositories

Libraries/CollectionsDesktop/

Laptop

CampusStorage

DistributedStorage

Pulling it all togetherPulling it all together

GatewaysGateways Common SoftwareCommon Software Common Data Formats and SchemaCommon Data Formats and Schema Performance and Monitoring ToolsPerformance and Monitoring Tools

… … and a lot more!and a lot more!

Diverse ApplicationsDiverse Applications

Remote InstrumentationRemote Instrumentation

Advanced VizualizationAdvanced Vizualization

Performing ArtsPerforming Arts

Medical ApplicationsMedical Applications

Int’l Collaboration (LHC)Int’l Collaboration (LHC)

TelepresenceTelepresence

K-16 OutreachK-16 Outreach

More Info More Info

Russ HobbyRuss Hobbyrdhobby@internet2.edurdhobby@internet2.edu530-863-0513 530-863-0513

Dan UpdegroveDan UpdegroveUpdegrove@gmail.com512-331-5098512-331-5098

Recommended