+ All Categories
Home > Documents > Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

Date post: 19-Jan-2016
Category:
Upload: candace-stokes
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
28
Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2
Transcript
Page 1: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

Cyberinfrastructure: Many Things to Many People

Russ HobbyProgram ManagerInternet2

Page 2: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

2

Cyberinfrastructure?

• Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions

• We need a common understanding of CI in order to build and operate it.

Page 3: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

3

Cyberinfrastructure --- some definitions

• The term "cyberinfrastructure" was used by a United States National Science Foundation (NSF) blue-ribbon committee in 2003 in response to the question: how can NSF, as the nation's premier agency funding basic research, remove existing barriers to the rapid evolution of high performance computing, making it truly usable by all the nation's scientists, engineers, scholars, and citizens?

• The term describes the new research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services over the Internet

Page 4: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

4

Cyberinfrastructure:More Than High-End Computing and Connectivity

• Focused on sharing and making greater capabilities available across the science and engineering research communities

• Allows applications to interoperate across institutions and disciplines

• Ensures that data and software acquired at great expense are preserved and easily available to all

• Empowers enhanced collaboration over distance and across disciplines.

Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure

Page 5: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

5

Cyberinfrastructure Vision at NSF

NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY

DISCOVERY

http://www.nsf.gov/od/oci/ci-v7.pdf

Page 6: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

6

Nature of Today’s Research

• Research by Discipline Groups

• Researchers at Multiple Organizations

• They use technology to work as a team

• There is often more connection within the Discipline Group than to researchers institution

Page 7: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

7

Example Researcher using CI

Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI

Page 8: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

8

Control Instruments to Gather Data

Instrumentation Control

Researcher

Control

Page 9: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

9

Security and Access Control

Instrumentation

Security

Control

DataGeneration

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Page 10: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

10

Data Transfer and Storage

Instrumentation

Security

Control

DataGeneration

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Data SetsStorage

Security

Input

Page 11: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

11

Data Analysis

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

Security

Data SetsStorage

Security

RetrievalInput

Page 12: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

12

Visualization

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Page 13: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

13

Simulation and Viewing

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Page 14: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

14

Sharing and Collaboration

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools

EducationAnd

Training

HumanSupportHelp

Desk

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

Page 15: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

15

Jane goes after new grant

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools

EducationAnd

Training

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

Page 16: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

16

CI Functions and Interactions

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools

EducationAnd

Training

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

Page 17: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

17

CI Functions and Interactions

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools

EducationAnd

Training

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

NETWORK

Page 18: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

18

Performance

CI is a System. Individual components may perform well but the overall performance depends on the components working well together.

Work is needed so that users can determine the best combination of components and how to determine the problem when there are performance is lacking

Page 19: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

19

LHC

DisciplineGroups

NEON.

eVLBI

GridOrgs

TeraGrid

CalIT2

OGFOSG

NYSGrid

SupercomputerSites

PSC

NCSA

SDSC

CampusIT

SecurityNetwork

DataCenter

Researchers

StaffGrad

Students

Faculty

NetworkProviders

National

RegionalInternational

Security/Access

Coordinators

National

RegionalInternational

CI Players

CollectionsOrganizations

DisciplineGroups

PublishersLibraries

Page 20: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

20

Evolution of CI Users

• First Grid Builders•Built their own clusters•Use resources at supercomputer sites•Infrastructure for just their discipline•They provided their own technology support

Page 21: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

21

Evolution of CI Users

Second Wave Grid Builders•Infrastructure still for their own community•They create their own IT support organization•Their IT organization runs the infrastructure

Page 22: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

22

Evolution of CI Users

Upcoming Disciplines•Currently planning their CI needs•Looking primarily at their requirements for CI•Are assuming that CI can be obtained from

others

Page 23: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

23

CI is not just for Researchers

The current focus on CI is its use by Researchers. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool.

Page 24: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

24

CI Days Workshops

TeraGrid, Open Science Grid, Internet2 and EDUCAUSE have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is the “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.

Page 25: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

25

More Info

Russ [email protected]

Page 26: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

26

Page 27: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

27

CI Functions and Interactions

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools

EducationAnd

Training

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

Page 28: Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.

28

LHC

DisciplineGroups

NEON.

eVLBI

GridOrgs

TeraGrid

CalIT2

OGFOSG

NYSGrid

SupercomputerSites

PSC

NCSA

SDSC

CampusIT

SecurityNetwork

DataCenter

Researchers

StaffGrad

Students

Faculty

NetworkProviders

National

RegionalInternational

Security/Access

Coordinators

National

RegionalInternational

CI Players

CollectionsOrganizations

DisciplineGroups

PublishersLibraries


Recommended