Download presentation
Presentation is loading. Please wait.
Published byBlaze McLaughlin Modified over 9 years ago
1
Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010
2
Overview The nature of much research today: Russ Some applications of R&E nets: Dan
3
The Nature of Research Today Discipline groups working on a common project. The groups are made of researchers from multiple institutions. They use the network in support of Virtual Organizations (VOs)
4
Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI
5
Local Climate Data CollectionLocal Climate Data Collection
6
Global Climate Data CollectionGlobal Climate Data Collection
7
Climate Data Visualization
8
Climate Modeling
9
Model Visualization
10
Collaboration
11
What is Under the CI Hood? Someday you will tell a car where to go and it will take you there We aren’t there yet You currently need to know that that a car has an engine, brakes, fuel system, etc Likewise with CI, you don’t have to know all the details, but it is good to know about the parts Let’s look at what Jane uses
12
Control Instruments to Gather Data Instrumentation Control Researcher Control
13
Security and Access Control Instrumentation Security Control Management Security and Access Authentication Access Control Authorization Researcher Control Security
14
Data Transfer and Storage Instrumentation Security Control Data Generation Management Security and Access Authentication Access Control Authorization Researcher Control Security Data Sets Storage Security Input
15
Data Analysis Instrumentation Security Control Data Generation Computation Analysis Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Security Data Sets Storage Security Retrieval Input
16
Visualization Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input
17
Simulation and Viewing Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input
18
Sharing, Collaboration, Publishing and Outreach Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training
19
Jane goes after new grant Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training
20
Cyberinfrastructure Functions and Resources Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Training
21
The Network is the Backplane for the Distributed CI Computer Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive Education And Outreach Network Training
22
Grid Orgs National Regional International Supercomputer Sites Computation Storage Software Development Discipline Support Campus IT Security ID Mang Network Data Center Researchers Staff Grad Students Faculty Network Providers National Regional International Security/ Access Coordinators National Regional International Cyberinfrastructure Players Collections Organizations Discipline Groups PublishersLibraries Policy/ Leadership/ Funding Federal Agencies Educational Organizations OGF Medicine Discipline Groups Biological Science. Physical Science Other Disciplines
23
CI Functions and Resources Student Security Control Assignments Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Instructor Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Publishing Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Course Materials Collections Grades Archive Teaching Tools Network Training
24
The Research and Educational Networks National Backbones Regional Network Campus Network Campus Network Regional Network International Networks Desktop/ Laptop Desktop/ Laptop
25
Computational Resources National Centers Shared Regional Clusters Shared Campus Clusters Desktop/ Laptop Private Campus Clusters Private Regional Clusters Shared Resource Scheduler Resource Scheduler
26
Storage Resources National Centers Discipline Repositories Libraries/ Collections Desktop/ Laptop Campus Storage Distributed Storage
27
Pulling it all together Gateways Common Software Common Data Formats and Schema Performance and Monitoring Tools … and a lot more!
28
Diverse Applications
29
Remote Instrumentation
30
Advanced Vizualization
31
Performing Arts
32
Medical Applications
33
Int’l Collaboration (LHC)
34
Telepresence
35
K-16 Outreach
36
More Info Russ Hobby rdhobby@internet2.edu 530-863-0513 Dan Updegrove Updegrove@gmail.com 512-331-5098
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.