ci days: planning your campus cyberinfrastructure strategy russ hobby, internet2 internet2 member...

26
CI Days: CI Days: Planning Your Campus Planning Your Campus Cyberinfrastructure Cyberinfrastructure Strategy Strategy Russ Hobby, Russ Hobby, Internet2 Internet2 Internet2 Member Internet2 Member Meeting Meeting 9 October 2007 9 October 2007

Upload: dwayne-byrd

Post on 28-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

CI Days: CI Days: Planning Your Campus Planning Your Campus

Cyberinfrastructure Strategy Cyberinfrastructure Strategy

Russ Hobby, Internet2Russ Hobby, Internet2Internet2 Member MeetingInternet2 Member Meeting

9 October 20079 October 2007

Cyberinfrastructure?Cyberinfrastructure?

Ask any number of people “What is Ask any number of people “What is Cyberinfrastructure?” and you will Cyberinfrastructure?” and you will probably get an equal number of probably get an equal number of definitionsdefinitions

We need a common understanding of CI We need a common understanding of CI in order to build and operate it.in order to build and operate it.

Cyberinfrastructure Vision at Cyberinfrastructure Vision at NSFNSF

NSF’S CYBERINFRASTRUCTURE VISION NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERYFOR 21ST CENTURY DISCOVERY

http://www.nsf.gov/od/oci/ci-v7.pdfhttp://www.nsf.gov/od/oci/ci-v7.pdf

The Nature of Research TodayThe Nature of Research Today

Discipline groups working on a common Discipline groups working on a common project.project.

The groups are made of researchers from The groups are made of researchers from multiple institutions.multiple institutions.

They use the network in support of Virtual They use the network in support of Virtual Organizations (VOs)Organizations (VOs)

Example Researcher using CIExample Researcher using CI

Jane is an environmental researcher and Jane is an environmental researcher and is going to find a solution to Global is going to find a solution to Global Warming. To do this she needs to collect Warming. To do this she needs to collect and store data, do analysis of the data and and store data, do analysis of the data and run some simulation models to test her run some simulation models to test her hypothesis. She will share ideas, data and hypothesis. She will share ideas, data and results with her Discipline Group. Here are results with her Discipline Group. Here are her steps in using CIher steps in using CI

Control Instruments to Gather DataControl Instruments to Gather Data

Instrumentation ControlResearcher

Control

Security and Access ControlSecurity and Access Control

Instrumentation

Security

Control

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Data Transfer and StorageData Transfer and Storage

Instrumentation

Security

Control

DataGeneration

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

Control

Security

Data SetsStorage

Security

Input

Data AnalysisData Analysis

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

Security

Data SetsStorage

Security

RetrievalInput

VisualizationVisualization

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Simulation and ViewingSimulation and Viewing

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInputSearch

Data SetsStorage

Security

RetrievalInput

Sharing, Collaboration, Sharing, Collaboration, Publishing and OutreachPublishing and Outreach

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

Jane goes after new grantJane goes after new grant

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

CyberinfrastructureCyberinfrastructure Functions and Resources Functions and Resources

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Training

The Network is the Backplane for the The Network is the Backplane for the Distributed CI ComputerDistributed CI Computer

Instrumentation

Security

Control

DataGeneration

Computation

Analysis

Simulation

Program

Security

ManagementSecurity and

Access

AuthenticationAccessControl

Authorization

Researcher

ControlProgram

ViewingSecurity

3DImaging

Display andVisualization

.

DisplayTools Security

DataInput

CollabTools Publishing

HumanSupportHelp

Desk

Policy andFunding

ResourceProviders

FundingAgencies

Campuses

SearchData SetsStorage

Security

RetrievalInput

SchemaMetadata

DataDirectories

Ontologies

Archive

EducationAnd

Outreach

Network

Training

GridOrgs

National

RegionalInternational

SupercomputerSites

ComputationStorage

SoftwareDevelopment

DisciplineSupport

CampusIT Security

ID Mang

NetworkData

Center

Researchers

StaffGrad

Students

Faculty

NetworkProviders

National

RegionalInternational

Security/Access

Coordinators

National

RegionalInternational

Cyberinfrastructure Cyberinfrastructure PlayersPlayers

CollectionsOrganizations

DisciplineGroups

PublishersLibraries Policy/Leadership/

Funding

FederalAgencies

EducationalOrganizationsOGF

Medicine

DisciplineGroups

BiologicalScience.

PhysicalScience

OtherDisciplines

Traditional Grid ComputingTraditional Grid Computing

Built by Supercomputer Sites or in Built by Supercomputer Sites or in Researcher’s LabsResearcher’s Labs

Support internal to disciplineSupport internal to discipline Campus IT generally not involvedCampus IT generally not involved There have been problems with facilities in There have been problems with facilities in

researcher’s labs researcher’s labs (power, HVAC, network)(power, HVAC, network)

Moving into CIMoving into CI

Disciplines new to CI are doing their Disciplines new to CI are doing their planning, but expect others to provide it.planning, but expect others to provide it.

Campus IT organizations starting to get Campus IT organizations starting to get more involvedmore involved

Supporting organizations are figuring out Supporting organizations are figuring out how to work together.how to work together.

Who Worries about the Who Worries about the Network?Network?

Generally not the ResearchersGenerally not the Researchers Those that provide services to the Those that provide services to the

researchersresearchers The discipline IT support groupThe discipline IT support group Campus IT organizationsCampus IT organizations Supercomputer sitesSupercomputer sites Grid OrganizationsGrid Organizations

CI is not just for ResearchersCI is not just for Researchers

The current focus on CI is its use by The current focus on CI is its use by Researchers. However this is an Researchers. However this is an emerging technology that will be used by emerging technology that will be used by all, just as the individual computer and the all, just as the individual computer and the Internet has become a regular work tool.Internet has become a regular work tool.

CI Days WorkshopsCI Days WorkshopsTeraGrid, Open Science Grid, TeraGrid, Open Science Grid, NLR, NLR, Internet2, Internet2, EDUCAUSE, and the IRNC have come together EDUCAUSE, and the IRNC have come together to try to help better understand the CI picture, to try to help better understand the CI picture, and to better coordinate functions and roles in and to better coordinate functions and roles in the creation of this infrastructure. the creation of this infrastructure. One activity started by this group is “CI Days” One activity started by this group is “CI Days” held for campuses to assist in their CI planning. held for campuses to assist in their CI planning. This workshop brings together players from the This workshop brings together players from the campus, region and nation to share information campus, region and nation to share information and plan how to provide CI functions for the and plan how to provide CI functions for the campus. The national and regional groups will campus. The national and regional groups will also learn the campus needs to help better also learn the campus needs to help better direct the evolution of the services.direct the evolution of the services.

UC Davis CI DaysUC Davis CI Days

Focused on Research use of CIFocused on Research use of CI Co-hosted by the CIO and Vice Provost for Co-hosted by the CIO and Vice Provost for

ResearchResearch Presentations from National and Regional Presentations from National and Regional

Organizations, Campus Colleges and IT.Organizations, Campus Colleges and IT. Breakout Group discussions with reports to Breakout Group discussions with reports to

start the planning processstart the planning process http://vpiet.ucdavis.edu/cyberinfrastructure.cfmhttp://vpiet.ucdavis.edu/cyberinfrastructure.cfm

Regional CI DaysRegional CI Days Serve as a way to scale CI DaysServe as a way to scale CI Days Representatives from campuses can go Representatives from campuses can go

home and expand the experience for their home and expand the experience for their campus environmentcampus environment

What format?What format? Use host campus as a case study?Use host campus as a case study? Just cover methodology for CI Days?Just cover methodology for CI Days?

In the queueIn the queue NYSGridNYSGrid New MexicoNew Mexico

Other ActivitiesOther Activities

Presentations and WorkshopsPresentations and Workshops CI Days Web/WikiCI Days Web/Wiki Collect Campus CI PlansCollect Campus CI Plans

Let campuses share their plans with others on Let campuses share their plans with others on the CI Days Wikithe CI Days Wiki

Russ’ CI VisionRuss’ CI VisionSet of tools and resources that allow:Set of tools and resources that allow:

Computation and Storage to easily allow transition Computation and Storage to easily allow transition from the desktop, to the campus resource, to the from the desktop, to the campus resource, to the regional center, to national super centers using the regional center, to national super centers using the same software.same software.

Data repositories in formats and locations to allow Data repositories in formats and locations to allow ease of sharing among all interested disciplines (the ease of sharing among all interested disciplines (the real digital library!)real digital library!)

Tools to allow people to easily construct systems to Tools to allow people to easily construct systems to analyze, visualize and simulate their research analyze, visualize and simulate their research subjects.subjects.

Collaboration tools that allow people to work together Collaboration tools that allow people to work together like they are in the same room, even if they aren’t.like they are in the same room, even if they aren’t.

More Info More Info

Russ HobbyRuss [email protected]@internet2.edu530-863-0513 530-863-0513