Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
What is Cyberinfrastructure?The Nature of Research Today
Russ Hobby, Internet2North Dakota State University
3 February 2011
2
The Nature of Research Today
Discipline groups working on a common
project.
The groups are made of researchers from
multiple institutions.
They use CI in support of these Virtual
Organizations (VOs)
3
A New CI Driver
NSF Proposal RequirementBeginning January 18, 2011
proposals submitted to NSF must include a
Data Management Plan in the form of a two-page supplementary document
http://www.nsf.gov/bfa/dias/policy/dmp.jsp
4
Teaching is Changing Too
Network Based Multimedia Resources
Real-time Communications with Class
Multiple Location Classes
Online Classes
Team Teaching
5
CI in Administration
New CI tools and resources are being
integrated into administrative Information
Technology
For example, Identity Management is
needed for administrative applications as
well as in research and teaching.
6
Example Researcher using CI
Jane is an environmental researcher and
is going to find a solution to Global
Warming. To do this she needs to collect
and store data, do analysis of the data and
run some simulation models to test her
hypothesis. She will share ideas, data and
results with her Discipline Group. Here are
her steps in using CI
7
Local Climate Data Collection
8
Global Climate Data Collection
9
Climate Data Visualization
10
Climate Modeling
11
Model Visualization
12
Collaboration
13
What is Under the CI Hood?
Someday you will tell a car where to go
and it will take you there
We aren’t there yet
You currently need to know that that a car
has an engine, brakes, fuel system, etc
Likewise with CI, you don’t have to know
all the details, but it is good to know about
the parts
Let’s look at what Jane uses
14
Control Instruments to Gather Data
Instrumentation ControlResearcher
Control
15
Security and Access Control
Instrumentation
Security
Control
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
Control
Security
16
Data Transfer and Storage
Instrumentation
Security
Control
Data
Generation
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
Control
Security
Data Sets
Storage
Security
Input
17
Data Analysis
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
Security
Data Sets
Storage
Security
RetrievalInput
18
Visualization
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
Display and
Visualization.
Display
Tools Security
Data
InputSearchData Sets
Storage
Security
RetrievalInput
19
Simulation and Viewing
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
InputSearchData Sets
Storage
Security
RetrievalInput
20
Sharing, Collaboration,
Publishing and Outreach
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
Input
Collab
Tools Publishing
Human
SupportHelp
Desk
SearchData Sets
Storage
Security
RetrievalInput
Schema
Metadata
Data
Directories
Ontologies
Archive
Education
And
Outreach
Training
21
Jane goes after new grant
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
Input
Collab
Tools Publishing
Human
SupportHelp
Desk
Policy and
Funding
Resource
Providers
Funding
Agencies
Campuses
SearchData Sets
Storage
Security
RetrievalInput
Schema
Metadata
Data
Directories
Ontologies
Archive
Education
And
Outreach
Training
22
Cyberinfrastructure
Functions and Resources
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
Input
Collab
Tools Publishing
Human
SupportHelp
Desk
Policy and
Funding
Resource
Providers
Funding
Agencies
Campuses
SearchData Sets
Storage
Security
RetrievalInput
Schema
Metadata
Data
Directories
Ontologies
Archive
Education
And
Outreach
Training
23
The Network is the Backplane for the
Distributed CI Computer
Instrumentation
Security
Control
Data
Generation
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Researcher
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
Input
Collab
Tools Publishing
Human
SupportHelp
Desk
Policy and
Funding
Resource
Providers
Funding
Agencies
Campuses
SearchData Sets
Storage
Security
RetrievalInput
Schema
Metadata
Data
Directories
Ontologies
Archive
Education
And
Outreach
Network
Training
24
Grid
Orgs
National
RegionalInternational
Supercomputer
Sites
Computation
Storage
Software
Development
Discipline
Support
Campus
IT Security
ID Mang
NetworkData
Center
Researchers
StaffGrad
Students
Faculty
Network
Providers
National
RegionalInternational
Security/
Access
Coordinators
National
RegionalInternational
Cyberinfrastructure
Players in Research
Collections
Organizations
Discipline
Groups
PublishersLibraries Policy/
Leadership/
Funding
Federal
AgenciesEducational
OrganizationsOGF
Medicine
Discipline
GroupsBiological
Science.
Physical
ScienceOther
Disciplines
25
Other Ways to Look at CI
Student
Security
Control
Assignments
Computation
Analysis
Simulation
Program
Security
Management
Security and
Access
Authentication
Access
Control
Authorization
Instructor
ControlProgram
ViewingSecurity
3D
Imaging
Display and
Visualization.
Display
Tools Security
Data
Input
Collab
Tools Publishing
Human
SupportHelp
Desk
Policy and
Funding
Resource
Providers
Funding
Agencies
Campuses
SearchData Sets
Storage
Security
RetrievalInput
Course
MaterialsCollections
Grades
Archive
Teaching
Tools
Network
Training
26
The Research and Educational
Networks
National
Backbones
Regional
Network
Campus
NetworkCampus
Network
Regional
Network
International
Networks
Desktop/
Laptop
Desktop/
Laptop
27
Computational
Resources
National
CentersShared
Regional
Clusters
Shared Campus
Clusters
Desktop/
Laptop
Private Campus
Clusters
Private
Regional
ClustersShared Resource
Scheduler
Resource
Scheduler
28
Storage
Resources
National
CentersDiscipline
Repositories
Libraries/
CollectionsDesktop/
Laptop
Campus
Storage
Distributed
Storage
29
Pulling it all together
Gateways
Common Software
Common Data Formats and Schema
Performance and Monitoring Tools
… and a lot more!
30
Researchers that use CI
There are those that have become CI
experts and create their own CI
environment
There are those that do not want to
become CI experts and want to focus on
their discipline
All researchers would like CI to be easier
31
Should you have to worry about the
Network?
Computers?
Storage?
Shouldn’t you just be able to use
the application?
Is Cyberinfrastructure Too Hard?
32
The “Cloud”
Really means “Someone else takes care of
the technology for you”
It can be provided by the commercial sector
or by the academic community.
Questions to ask about using the Cloud
Do you trust them? Can you rely on them?
Do you have an alternative if it doesn’t work out?
Can you easily transition to another service?
33
You have to learn a new user
interface for each application
Performance and Reliability is
inconsistent
Why is Advanced CI Not More
Widely Used?
http://campusbridging.iu-pti.org/node/23
34
Russ’ CI Vision
Set of tools and resources that allow:
Computation and Storage to easily allow transition
from the desktop, to the campus resource, to the
regional center, to national super centers using the
same software.
Data repositories in formats and locations to allow
ease of sharing among all interested disciplines (the
real digital library!)
Tools to allow people to easily construct systems to
analyze, visualize and simulate their research
subjects.
Collaboration tools that allow people to work together
like they are in the same room, even if they aren’t.