180 likes | 370 Vues
2. Outline. LBNL approach to IT service provisionCollaboration OpportunitiesMiscellaneousComputingNetworkingStorageCollaboration ToolsCyber Security. 3. LBNL Approach to IT in support of Science 1 of 2. Every dollar spent on IT is a dollar away from scienceWe provide services only when we can do it better or cheaperStandardize and centralize where it is clearly usefulMonopoly where that is necessarye.g. phone system, LBLnet to desktop, e-mail w/exceptionMandate central services thr1143
E N D
1. 1 UC Research Cyberinfrastructure for the Future
Deb Agarwal
Sandy Merola
Tammy Welcome
October 10-11, 2005
2. 2
3. 3 LBNL Approach to ITin support of Science 1 of 2 Every dollar spent on IT is a dollar away from science
We provide services only when we can do it better or cheaper
Standardize and centralize where it is clearly useful
Monopoly where that is necessary
e.g. phone system, LBLnet to desktop, e-mail w/exception
Mandate central services throughout LBNL support
e.g. Workstation Standardization/Centralization, IT support
Render central services attractively to scientist
recognize their need to have freedom of choice
e.g Workstations, Scientific Cluster Support
Strive for efficiencies, right level of service, right cost models
4. 4 LBNL Approach to ITin support of Science 2 of 2 Integrate IT research, development, implementation efforts to
Ensure competent staff
Advance IT infrastructure
IT Division is $56M, 50% of program including ESnet
Computing Sciences: another $52M in NERSC and Computational Research
Recognize that advanced IT infrastructure is motivated by both
Scientific requirements
e.g. Cluster support
IT opportunities
e.g. Video conferencing, Agnode
e.g. LBLnet, wireless
5. 5 Gaps: Miscellaneous UC-wide or shared between campuses/labs
Business continuity planning
Technology expertise, training, best practices
Technology standardization and acquisition
Library issues
Journal pricing, publishing model
Computer room space
E-mail
Calendaring
Dial-tone, voice mail
Portal, business and administrative applications
6. 6 Scientific Cluster Support
7. 7 Scientific Computing Today Science project purchase their own Linux clusters
IT provides full cluster support
Pre-purchase and procurement assistance
Cluster integration
Ongoing systems administration and cyber security
Computer room space with networking and cooling
Adopt approach scalable from one cluster to several clusters
Achieve balance between choice and standardization
10 (now 11) research projects representing the breadth of LBNL science
5 clusters on recharge, 4 more coming
Vary from 175 to 1800 Gflops
8. 8 Scientific Computing Gaps Institutional Computing, Collaboration?
Share best practices (in progress)
Provide parallel programming end-user assistance
Capability (parallel) computing to do science of scale
GRID Computing?, Collaboration?
Next logical step after cluster computing
UC GRID plus infrastructure/tools that scientists can use to connect their systems
10. Wide Area Networking GAPS addressed 2007/2008
11. 11
12. 12 Storage Gaps Large scale scientific storage
Expandable
Search and management tools
Range of client operating systems
Types of storage
Short term storage inexpensive, not backed up
Long term storage highly reliable, backed up, relatively inexpensive
Document management
Store, search, and retrieve documents
Understand and Meet regulatory requirements for tracking and retention
Transparent backup and restore
Need large enough user base to achieve economy of scale
UC collaboration Opportunity?
13. 13 Collaboration Services and Tools - GAPS Source code repository hosting
Each collaborator frequently owns their own piece and out-of-sync conditions occur
Provide revision control for software development projects
Currently in pilot with Physics Division (supernova project)
Comparable to the e-room paradigm
Going into production at LBNL
Open Source Software
Distributed project management
Track project workflow with outside collaborators
Currently in pilot with Physics Division
Open Source Software
UC collaboration opportunity?
14. 14 Ubiquitous Human Presence Ubiquitous and interoperable
Room systems
Desktop
High bandwidth connections
Wireless
VoIP
Sharing Capability
Access Grid
Immersive
Look and feel, everyone is in the same room
Quality audio
Life size video
15. 15 Threats, a sampler Viruses
Worms
Malicious software downloads
Spyware
Phishing and Stolen credentials
Insider Threat
Denial of service
Root kits
Session hijacking
Audits / Policy / Compliance
Including HSPD-12
16. 16 Distributed Science Reality Collaborations include 1000s of scientists, world-wide
Many never visit the site
Managed by virtual organization
high-performance distributed science infrastructure including cyber security
Administrative policies, risk models, cybersecurity models, protection authorities and technologies need to address this distributed risk
UC is an ideal test bed
and this applies to all other opportunities in this talk!
17. 17 Cybersecurity R&D: Gap Funders should be motivated to improve cybersecurity in the
distributed software environment
Distributed authentication, authorization, and encryption
Improve detection and communication of attacks
Recognize insider attacks
Handling of encrypted sessions
Reducing hijacking and credential theft opportunities
Address day zero-1 vulnerabilities
Improve data collection, forensics, prediction, recovery
Improve policy, risk-based cybersecurity decisions
Thus, a UC proposed program of R&D and Infrastructure in support of
protecting distributed science, necessary for computation,
experimentation, collaborations
18. 18 Conclusion In support of the distributed computing, experimentation
and collaboration environment that IT must create and
support, there exist UC opportunities to motivate
funding and/or collaborate for:
Computing
Networking
Storage
Collaboration Tools
Cyber Security