Presentation is loading. Please wait.

Presentation is loading. Please wait.

Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010.

Similar presentations


Presentation on theme: "Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010."— Presentation transcript:

1 Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010

2 Overview  The nature of much research today: Russ  Some applications of R&E nets: Dan

3 The Nature of Research Today  Discipline groups working on a common project.  The groups are made of researchers from multiple institutions.  They use the network in support of Virtual Organizations (VOs)

4 Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI

5 Local Climate Data CollectionLocal Climate Data Collection

6 Global Climate Data CollectionGlobal Climate Data Collection

7 Climate Data Visualization

8 Climate Modeling

9 Model Visualization

10 Collaboration

11 What is Under the CI Hood?  Someday you will tell a car where to go and it will take you there  We aren’t there yet  You currently need to know that that a car has an engine, brakes, fuel system, etc  Likewise with CI, you don’t have to know all the details, but it is good to know about the parts  Let’s look at what Jane uses

12 Control Instruments to Gather Data Instrumentation Control Researcher Control

13 Security and Access Control Instrumentation Security Control Management Security and Access Authentication Access Control Authorization Researcher Control Security

14 Data Transfer and Storage Instrumentation Security Control Data Generation Management Security and Access Authentication Access Control Authorization Researcher Control Security Data Sets Storage Security Input

15 Data Analysis Instrumentation Security Control Data Generation Computation Analysis Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Security Data Sets Storage Security Retrieval Input

16 Visualization Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input

17 Simulation and Viewing Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input

18 Sharing, Collaboration, Publishing and Outreach Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

19 Jane goes after new grant Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

20 Cyberinfrastructure Functions and Resources Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

21 The Network is the Backplane for the Distributed CI Computer Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Network Training

22 Grid Orgs National Regional International Supercomputer Sites Computation Storage Software Development Discipline Support Campus IT Security ID Mang Network Data Center Researchers Staff Grad Students Faculty Network Providers National Regional International Security/ Access Coordinators National Regional International Cyberinfrastructure Players Collections Organizations Discipline Groups PublishersLibraries Policy/ Leadership/ Funding Federal Agencies Educational Organizations OGF Medicine Discipline Groups Biological Science. Physical Science Other Disciplines

23 CI Functions and Resources Student Security Control Assignments Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Instructor Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Course Materials Collections Grades Archive Teaching Tools Network Training

24 The Research and Educational Networks National Backbones Regional Network Campus Network Campus Network Regional Network International Networks Desktop/ Laptop Desktop/ Laptop

25 Computational Resources National Centers Shared Regional Clusters Shared Campus Clusters Desktop/ Laptop Private Campus Clusters Private Regional Clusters Shared Resource Scheduler Resource Scheduler

26 Storage Resources National Centers Discipline Repositories Libraries/ Collections Desktop/ Laptop Campus Storage Distributed Storage

27 Pulling it all together  Gateways  Common Software  Common Data Formats and Schema  Performance and Monitoring Tools … and a lot more!

28 Diverse Applications

29 Remote Instrumentation

30 Advanced Vizualization

31 Performing Arts

32 Medical Applications

33 Int’l Collaboration (LHC)

34 Telepresence

35 K-16 Outreach

36 More Info Russ Hobby rdhobby@internet2.edu 530-863-0513 Dan Updegrove Updegrove@gmail.com 512-331-5098


Download ppt "Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010."

Similar presentations


Ads by Google