Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.

Similar presentations


Presentation on theme: "What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008."— Presentation transcript:

1 What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008

2 Cyberinfrastructure?  Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions  We need a common understanding of CI in order to build and operate it.

3 Cyberinfrastructure Vision at NSF NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERY http://www.nsf.gov/od/oci/ci-v7.pdf Other agencies have adopted Cyberinfrastructure as a priority

4 The Nature of Research Today  Discipline groups working on a common project.  The groups are made of researchers from multiple institutions.  They use the network in support of Virtual Organizations (VOs)

5 Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI

6 Control Instruments to Gather Data Instrumentation Control Researcher Control

7 Security and Access Control Instrumentation Security Control Management Security and Access Authentication Access Control Authorization Researcher Control Security

8 Data Transfer and Storage Instrumentation Security Control Data Generation Management Security and Access Authentication Access Control Authorization Researcher Control Security Data Sets Storage Security Input

9 Data Analysis Instrumentation Security Control Data Generation Computation Analysis Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Security Data Sets Storage Security Retrieval Input

10 Visualization Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input

11 Simulation and Viewing Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input

12 Sharing, Collaboration, Publishing and Outreach Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

13 Jane goes after new grant Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

14 Cyberinfrastructure Functions and Resources Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training

15 The Network is the Backplane for the Distributed CI Computer Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Network Training

16 Grid Orgs National Regional International Supercomputer Sites Computation Storage Software Development Discipline Support Campus IT Security ID Mang Network Data Center Researchers Staff Grad Students Faculty Network Providers National Regional International Security/ Access Coordinators National Regional International Cyberinfrastructure Players Collections Organizations Discipline Groups PublishersLibraries Policy/ Leadership/ Funding Federal Agencies Educational Organizations OGF Medicine Discipline Groups Biological Science. Physical Science Other Disciplines

17 Traditional Grid Computing  Built by Supercomputer Sites or in Researcher’s Labs  Support internal to discipline  Campus IT generally not involved  There have been problems with facilities in researcher’s labs (power, HVAC, network)

18 Moving into CI  Disciplines new to CI are doing their planning, but expect others to provide it.  Campus IT organizations starting to get more involved  Supporting organizations are figuring out how to work together.

19 CI is not just for Researchers CI was started with use by Researchers in mind. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool. Campuses are doing CI planning with use by research, arts and humanities, teaching and learning and administrative computing in the picture

20 CI Functions and Resources Student Security Control Assignments Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Instructor Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Course Materials Collections Grades Archive Teaching Tools Network Training

21 The Research and Educational Networks National Backbones Regional Network Campus Network Campus Network Regional Network International Networks Desktop/ Laptop Desktop/ Laptop

22 Computational Resources National Centers Shared Regional Clusters Shared Campus Clusters Desktop/ Laptop Private Campus Clusters Private Regional Clusters Shared Resource Scheduler Resource Scheduler

23 Storage Resources National Centers Discipline Repositories Libraries/ Collections Desktop/ Laptop Campus Storage Distributed Storage

24 Collaboration  Real Time  Video Conference  Session Management  Shared Whiteboards and Applications  Asynchronous  Email  IM  Web/Wiki  Course Management

25 Pulling it all together  Gateways  Common Software  Common Data Formats and Schema  Performance and Monitoring Tools … and a lot more!

26 CI Days Workshops TeraGrid, Open Science Grid, NLR, Internet2, and EDUCAUSE have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.

27 CI Days  Campus Based  Involve the whole campus. It’s local so they will come  Discover the needs and driving factors  Get everyone on the same page  Launch the campus CI planning and implementation  Regional Based  Serve as a way to scale CI Days  Representatives from campuses can go home and expand the experience for their campus environment

28 Other Activities  Presentations and Workshops  CI Days Web/Wiki  www.cidays.org  Collect Campus CI Plans  Let campuses share their plans with others on the CI Days Wiki

29 CI Direction Cyberinfrastructure is moving toward including all aspects of Information Technology as a coordinated system. The “coordinated” part still needs a lot of work. NSF has provided a vision. Next steps are needed to define an architecture and develop an implementation plan.

30 Russ’ CI Vision Set of tools and resources that allow:  Computation and Storage to easily allow transition from the desktop, to the campus resource, to the regional center, to national super centers using the same software.  Data repositories in formats and locations to allow ease of sharing among all interested disciplines (the real digital library!)  Tools to allow people to easily construct systems to analyze, visualize and simulate their research subjects.  Collaboration tools that allow people to work together like they are in the same room, even if they aren’t.

31 More Info Russ Hobby rdhobby@internet2.edu 530-863-0513


Download ppt "What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008."

Similar presentations


Ads by Google