Download presentation
Presentation is loading. Please wait.
Published byCandace Stokes Modified over 9 years ago
1
Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2
2
2 Cyberinfrastructure? Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions We need a common understanding of CI in order to build and operate it.
3
3 Cyberinfrastructure --- some definitions The term "cyberinfrastructure" was used by a United States National Science Foundation (NSF) blue-ribbon committee in 2003 in response to the question: how can NSF, as the nation's premier agency funding basic research, remove existing barriers to the rapid evolution of high performance computing, making it truly usable by all the nation's scientists, engineers, scholars, and citizens?United States National Science Foundation 2003 The term describes the new research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services over the Internet
4
4 Cyberinfrastructure: More Than High-End Computing and Connectivity Focused on sharing and making greater capabilities available across the science and engineering research communities Allows applications to interoperate across institutions and disciplines Ensures that data and software acquired at great expense are preserved and easily available to all Empowers enhanced collaboration over distance and across disciplines. Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure
5
5 Cyberinfrastructure Vision at NSF NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERY http://www.nsf.gov/od/oci/ci-v7.pdf
6
6 Nature of Today’s Research Research by Discipline Groups Researchers at Multiple Organizations They use technology to work as a team There is often more connection within the Discipline Group than to researchers institution
7
7 Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI
8
8 Control Instruments to Gather Data Instrumentation Control Researcher Control
9
9 Security and Access Control Instrumentation Security Control Data Generation Management Security and Access Authentication Access Control Authorization Researcher Control Security
10
10 Data Transfer and Storage Instrumentation Security Control Data Generation Management Security and Access Authentication Access Control Authorization Researcher Control Security Data Sets Storage Security Input
11
11 Data Analysis Instrumentation Security Control Data Generation Computation Analysis Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Security Data Sets Storage Security Retrieval Input
12
12 Visualization Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input
13
13 Simulation and Viewing Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Search Data Sets Storage Security Retrieval Input
14
14 Sharing and Collaboration Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Education And Training Human Support Help Desk Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive
15
15 Jane goes after new grant Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Education And Training Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive
16
16 CI Functions and Interactions Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Education And Training Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive
17
17 CI Functions and Interactions Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Education And Training Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive NETWORK
18
18 Performance CI is a System. Individual components may perform well but the overall performance depends on the components working well together. Work is needed so that users can determine the best combination of components and how to determine the problem when there are performance is lacking
19
19 LHC Discipline Groups NEON. eVLBI Grid Orgs TeraGrid CalIT2 OGFOSG NYSGrid Supercomputer Sites PSC NCSA SDSC Campus IT Security Network Data Center Researchers Staff Grad Students Faculty Network Providers National Regional International Security/ Access Coordinators National Regional International CI Players Collections Organizations Discipline Groups Publishers Libraries
20
20 Evolution of CI Users First Grid Builders Built their own clusters Use resources at supercomputer sites Infrastructure for just their discipline They provided their own technology support
21
21 Evolution of CI Users Second Wave Grid Builders Infrastructure still for their own community They create their own IT support organization Their IT organization runs the infrastructure
22
22 Evolution of CI Users Upcoming Disciplines Currently planning their CI needs Looking primarily at their requirements for CI Are assuming that CI can be obtained from others
23
23 CI is not just for Researchers The current focus on CI is its use by Researchers. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool.
24
24 CI Days Workshops TeraGrid, Open Science Grid, Internet2 and EDUCAUSE have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is the “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.
25
25 More Info Russ Hobby rdhobby@internet2.edu 530-863-0513
26
26
27
27 CI Functions and Interactions Instrumentation Security Control Data Generation Computation Analysis Simulation Program Security Management Security and Access Authentication Access Control Authorization Researcher Control Program Viewing Security 3D Imaging Display and Visualization. Display Tools Security Data Input Collab Tools Education And Training Human Support Help Desk Policy and Funding Resource Providers Funding Agencies Campuses Search Data Sets Storage Security Retrieval Input Schema Metadata Data Directories Ontologies Archive
28
28 LHC Discipline Groups NEON. eVLBI Grid Orgs TeraGrid CalIT2 OGFOSG NYSGrid Supercomputer Sites PSC NCSA SDSC Campus IT Security Network Data Center Researchers Staff Grad Students Faculty Network Providers National Regional International Security/ Access Coordinators National Regional International CI Players Collections Organizations Discipline Groups Publishers Libraries
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.