1 / 26

CI Days: Planning Your Campus Cyberinfrastructure Strategy

CI Days: Planning Your Campus Cyberinfrastructure Strategy. Russ Hobby, Internet2 Internet2 Member Meeting 9 October 2007. Cyberinfrastructure?. Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions

apray
Télécharger la présentation

CI Days: Planning Your Campus Cyberinfrastructure Strategy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CI Days: Planning Your Campus Cyberinfrastructure Strategy Russ Hobby, Internet2 Internet2 Member Meeting 9 October 2007

  2. Cyberinfrastructure? • Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions • We need a common understanding of CI in order to build and operate it.

  3. Cyberinfrastructure Vision at NSF NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERY http://www.nsf.gov/od/oci/ci-v7.pdf

  4. The Nature of Research Today • Discipline groups working on a common project. • The groups are made of researchers from multiple institutions. • They use the network in support of Virtual Organizations (VOs)

  5. Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI

  6. Control Instruments to Gather Data Instrumentation Researcher Control Control

  7. Management Security and Access Access Control Authentication Authorization Security and Access Control Instrumentation Researcher Control Security Control Security

  8. Instrumentation Control Management Security and Access Data Generation Security Access Control Authentication Authorization Data Transfer and Storage Researcher Security Control Security Input Data Sets Storage

  9. Data Analysis Instrumentation Researcher Control Security Data Generation Security Program Control Management Security and Access Access Control Authentication Authorization Security Security Analysis Input Retrieval Data Sets Storage Computation Program

  10. Instrumentation Control Researcher Management Security and Access Data Generation Security Viewing Security Access Control Program Control Authentication Authorization Security Analysis Computation Simulation Program Visualization Security Display Tools Security Input Retrieval Display and Visualization Data Sets Storage . Data Input Search

  11. Instrumentation Control Researcher Management Security and Access Data Generation Security Viewing Security Access Control Program Control Authentication Authorization Security 3D Imaging Analysis Display Tools Security Display and Visualization Computation Simulation . Data Input Program Simulation and Viewing Security Input Retrieval Data Sets Storage Search

  12. Instrumentation Control Researcher Management Security and Access Data Generation Security Viewing Security Access Control Program Control Authentication Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Sharing, Collaboration, Publishing and Outreach Human Support Training Help Desk Education And Outreach Collab Tools Publishing

  13. Instrumentation Control Researcher Policy and Funding Management Security and Access Data Generation Security Viewing Security Access Control Funding Agencies Program Control Authentication Resource Providers Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Jane goes after new grant Human Support Training Help Desk Education And Outreach Collab Tools Publishing

  14. Instrumentation Control Researcher Policy and Funding Management Security and Access Data Generation Security Viewing Security Access Control Funding Agencies Program Control Authentication Resource Providers Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Cyberinfrastructure Functions and Resources Human Support Training Help Desk Education And Outreach Collab Tools Publishing

  15. Instrumentation Control Researcher Management Security and Access Policy and Funding Data Generation Security Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies The Network is the Backplane for the Distributed CI Computer Human Support Training Help Desk Education And Outreach Collab Tools Publishing Network

  16. Federal Agencies National Discipline Groups National OGF International Libraries Regional Educational Organizations Publishers International Regional Collections Organizations Policy/ Leadership/ Funding Security/ Access Coordinators Network Providers Discipline Support Computation Storage Medicine Physical Science Other Disciplines Supercomputer Sites Software Development Discipline Groups Biological Science. Campus IT Researchers Cyberinfrastructure Players Security ID Mang Faculty Data Center Network Grad Students Staff National International Regional Grid Orgs

  17. Traditional Grid Computing • Built by Supercomputer Sites or in Researcher’s Labs • Support internal to discipline • Campus IT generally not involved • There have been problems with facilities in researcher’s labs (power, HVAC, network)

  18. Moving into CI • Disciplines new to CI are doing their planning, but expect others to provide it. • Campus IT organizations starting to get more involved • Supporting organizations are figuring out how to work together.

  19. Who Worries about the Network? • Generally not the Researchers • Those that provide services to the researchers • The discipline IT support group • Campus IT organizations • Supercomputer sites • Grid Organizations

  20. CI is not just for Researchers The current focus on CI is its use by Researchers. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool.

  21. CI Days Workshops TeraGrid, Open Science Grid, NLR, Internet2, EDUCAUSE, and the IRNC have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.

  22. UC Davis CI Days • Focused on Research use of CI • Co-hosted by the CIO and Vice Provost for Research • Presentations from National and Regional Organizations, Campus Colleges and IT. • Breakout Group discussions with reports to start the planning process • http://vpiet.ucdavis.edu/cyberinfrastructure.cfm

  23. Regional CI Days • Serve as a way to scale CI Days • Representatives from campuses can go home and expand the experience for their campus environment • What format? • Use host campus as a case study? • Just cover methodology for CI Days? • In the queue • NYSGrid • New Mexico

  24. Other Activities • Presentations and Workshops • CI Days Web/Wiki • Collect Campus CI Plans • Let campuses share their plans with others on the CI Days Wiki

  25. Russ’ CI Vision Set of tools and resources that allow: • Computation and Storage to easily allow transition from the desktop, to the campus resource, to the regional center, to national super centers using the same software. • Data repositories in formats and locations to allow ease of sharing among all interested disciplines (the real digital library!) • Tools to allow people to easily construct systems to analyze, visualize and simulate their research subjects. • Collaboration tools that allow people to work together like they are in the same room, even if they aren’t.

  26. More Info Russ Hobbyrdhobby@internet2.edu530-863-0513

More Related