Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.
-
Upload
candace-stokes -
Category
Documents
-
view
218 -
download
0
Transcript of Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.
Cyberinfrastructure: Many Things to Many People
Russ HobbyProgram ManagerInternet2
2
Cyberinfrastructure?
• Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions
• We need a common understanding of CI in order to build and operate it.
3
Cyberinfrastructure --- some definitions
• The term "cyberinfrastructure" was used by a United States National Science Foundation (NSF) blue-ribbon committee in 2003 in response to the question: how can NSF, as the nation's premier agency funding basic research, remove existing barriers to the rapid evolution of high performance computing, making it truly usable by all the nation's scientists, engineers, scholars, and citizens?
• The term describes the new research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services over the Internet
4
Cyberinfrastructure:More Than High-End Computing and Connectivity
• Focused on sharing and making greater capabilities available across the science and engineering research communities
• Allows applications to interoperate across institutions and disciplines
• Ensures that data and software acquired at great expense are preserved and easily available to all
• Empowers enhanced collaboration over distance and across disciplines.
Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure
5
Cyberinfrastructure Vision at NSF
NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY
DISCOVERY
http://www.nsf.gov/od/oci/ci-v7.pdf
6
Nature of Today’s Research
• Research by Discipline Groups
• Researchers at Multiple Organizations
• They use technology to work as a team
• There is often more connection within the Discipline Group than to researchers institution
7
Example Researcher using CI
Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI
8
Control Instruments to Gather Data
Instrumentation Control
Researcher
Control
9
Security and Access Control
Instrumentation
Security
Control
DataGeneration
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
Control
Security
10
Data Transfer and Storage
Instrumentation
Security
Control
DataGeneration
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
Control
Security
Data SetsStorage
Security
Input
11
Data Analysis
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
Security
Data SetsStorage
Security
RetrievalInput
12
Visualization
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
Display andVisualization
.
DisplayTools Security
DataInputSearch
Data SetsStorage
Security
RetrievalInput
13
Simulation and Viewing
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInputSearch
Data SetsStorage
Security
RetrievalInput
14
Sharing and Collaboration
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools
EducationAnd
Training
HumanSupportHelp
Desk
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
15
Jane goes after new grant
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools
EducationAnd
Training
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
16
CI Functions and Interactions
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools
EducationAnd
Training
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
17
CI Functions and Interactions
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools
EducationAnd
Training
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
NETWORK
18
Performance
CI is a System. Individual components may perform well but the overall performance depends on the components working well together.
Work is needed so that users can determine the best combination of components and how to determine the problem when there are performance is lacking
19
LHC
DisciplineGroups
NEON.
eVLBI
GridOrgs
TeraGrid
CalIT2
OGFOSG
NYSGrid
SupercomputerSites
PSC
NCSA
SDSC
CampusIT
SecurityNetwork
DataCenter
Researchers
StaffGrad
Students
Faculty
NetworkProviders
National
RegionalInternational
Security/Access
Coordinators
National
RegionalInternational
CI Players
CollectionsOrganizations
DisciplineGroups
PublishersLibraries
20
Evolution of CI Users
• First Grid Builders•Built their own clusters•Use resources at supercomputer sites•Infrastructure for just their discipline•They provided their own technology support
21
Evolution of CI Users
Second Wave Grid Builders•Infrastructure still for their own community•They create their own IT support organization•Their IT organization runs the infrastructure
22
Evolution of CI Users
Upcoming Disciplines•Currently planning their CI needs•Looking primarily at their requirements for CI•Are assuming that CI can be obtained from
others
23
CI is not just for Researchers
The current focus on CI is its use by Researchers. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool.
24
CI Days Workshops
TeraGrid, Open Science Grid, Internet2 and EDUCAUSE have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is the “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.
26
27
CI Functions and Interactions
Instrumentation
Security
Control
DataGeneration
Computation
Analysis
Simulation
Program
Security
ManagementSecurity and
Access
AuthenticationAccessControl
Authorization
Researcher
ControlProgram
ViewingSecurity
3DImaging
Display andVisualization
.
DisplayTools Security
DataInput
CollabTools
EducationAnd
Training
HumanSupportHelp
Desk
Policy andFunding
ResourceProviders
FundingAgencies
Campuses
SearchData SetsStorage
Security
RetrievalInput
SchemaMetadata
DataDirectories
Ontologies
Archive
28
LHC
DisciplineGroups
NEON.
eVLBI
GridOrgs
TeraGrid
CalIT2
OGFOSG
NYSGrid
SupercomputerSites
PSC
NCSA
SDSC
CampusIT
SecurityNetwork
DataCenter
Researchers
StaffGrad
Students
Faculty
NetworkProviders
National
RegionalInternational
Security/Access
Coordinators
National
RegionalInternational
CI Players
CollectionsOrganizations
DisciplineGroups
PublishersLibraries