1 / 28

Understanding Cyberinfrastructure: Enabling Collaboration and Discoveries

Learn the diverse definitions of cyberinfrastructure and its importance in supporting advanced data acquisition, storage, management, and collaboration across disciplines. Explore how researchers utilize cyberinfrastructure to enhance their work and make scientific discoveries.

arnoldbowen
Download Presentation

Understanding Cyberinfrastructure: Enabling Collaboration and Discoveries

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2

  2. Cyberinfrastructure? • Ask any number of people “What is Cyberinfrastructure?” and you will probably get an equal number of definitions • We need a common understanding of CI in order to build and operate it.

  3. Cyberinfrastructure --- some definitions • The term "cyberinfrastructure" was used by a United StatesNational Science Foundation (NSF) blue-ribbon committee in 2003 in response to the question: how can NSF, as the nation's premier agency funding basic research, remove existing barriers to the rapid evolution of high performance computing, making it truly usable by all the nation's scientists, engineers, scholars, and citizens? • The term describes the new research environments that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services over the Internet

  4. Cyberinfrastructure:More Than High-End Computing and Connectivity • Focused on sharing and making greater capabilities available across the science and engineering research communities • Allows applications to interoperate across institutions and disciplines • Ensures that data and software acquired at great expense are preserved and easily available to all • Empowers enhanced collaboration over distance and across disciplines. Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure

  5. Cyberinfrastructure Vision at NSF NSF’S CYBERINFRASTRUCTURE VISION FOR 21ST CENTURY DISCOVERY http://www.nsf.gov/od/oci/ci-v7.pdf

  6. Nature of Today’s Research • Research by Discipline Groups • Researchers at Multiple Organizations • They use technology to work as a team • There is often more connection within the Discipline Group than to researchers institution

  7. Example Researcher using CI Jane is an environmental researcher and is going to find a solution to Global Warming. To do this she needs to collect and store data, do analysis of the data and run some simulation models to test her hypothesis. She will share ideas, data and results with her Discipline Group. Here are her steps in using CI

  8. Control Instruments to Gather Data Instrumentation Researcher Control Control

  9. Security and Access Control Instrumentation Researcher Control Security Data Generation Security Control Management Security and Access Access Control Authentication Authorization

  10. Data Transfer and Storage Instrumentation Researcher Control Security Data Generation Security Control Management Security and Access Access Control Authentication Authorization Security Input Data Sets Storage

  11. Data Analysis Instrumentation Researcher Control Security Data Generation Security Program Control Management Security and Access Access Control Authentication Authorization Security Security Analysis Input Retrieval Data Sets Storage Computation Program

  12. Instrumentation Control Researcher Management Security and Access Data Generation Security Viewing Security Access Control Program Control Authentication Authorization Security Analysis Computation Simulation Program Visualization Security Display Tools Security Input Retrieval Display and Visualization Data Sets Storage . Data Input Search

  13. Instrumentation Control Researcher Management Security and Access Data Generation Security Viewing Security Access Control Program Control Authentication Authorization Security 3D Imaging Analysis Display Tools Security Display and Visualization Computation Simulation . Data Input Program Simulation and Viewing Security Input Retrieval Data Sets Storage Search

  14. Human Support Instrumentation Control Help Desk Researcher Management Security and Access Data Generation Security Collab Tools Education And Training Viewing Security Access Control Program Control Authentication Authorization Security 3D Imaging Analysis Display Tools Security Display and Visualization Computation Simulation . Data Input Program Sharing and Collaboration Security Input Retrieval Data Sets Storage Search Archive Schema Metadata Data Directories Ontologies

  15. Human Support Instrumentation Control Help Desk Researcher Policy and Funding Management Security and Access Data Generation Security Collab Tools Education And Training Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Jane goes after new grant

  16. Human Support Instrumentation Control Help Desk Researcher Policy and Funding Management Security and Access Data Generation Security Collab Tools Education And Training Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies CI Functions and Interactions

  17. Human Support Instrumentation Control Help Desk Researcher Policy and Funding Management Security and Access Data Generation Security Collab Tools Education And Training Viewing Security Access Control Funding Agencies Program Control Authentication Resource Providers Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies CI Functions and Interactions NETWORK

  18. Performance CI is a System. Individual components may perform well but the overall performance depends on the components working well together. Work is needed so that users can determine the best combination of components and how to determine the problem when there are performance is lacking

  19. Campus IT Discipline Groups National National Network Security Libraries International Publishers Regional International Regional Data Center Collections Organizations Security/ Access Coordinators Network Providers LHC eVLBI Discipline Groups NEON. Researchers CI Players Grad Students Staff Faculty SDSC PSC TeraGrid OSG OGF Supercomputer Sites NCSA Grid Orgs NYSGrid CalIT2

  20. Evolution of CI Users • First Grid Builders • Built their own clusters • Use resources at supercomputer sites • Infrastructure for just their discipline • They provided their own technology support

  21. Evolution of CI Users Second Wave Grid Builders • Infrastructure still for their own community • They create their own IT support organization • Their IT organization runs the infrastructure

  22. Evolution of CI Users Upcoming Disciplines • Currently planning their CI needs • Looking primarily at their requirements for CI • Are assuming that CI can be obtained from others

  23. CI is not just for Researchers The current focus on CI is its use by Researchers. However this is an emerging technology that will be used by all, just as the individual computer and the Internet has become a regular work tool.

  24. CI Days Workshops TeraGrid, Open Science Grid, Internet2 and EDUCAUSE have come together to try to help better understand the CI picture, and to better coordinate functions and roles in the creation of this infrastructure. One activity started by this group is the “CI Days” held for campuses to assist in their CI planning. This workshop brings together players from the campus, region and nation to share information and plan how to provide CI functions for the campus. The national and regional groups will also learn the campus needs to help better direct the evolution of the services.

  25. More Info Russ Hobbyrdhobby@internet2.edu530-863-0513

  26. Human Support Instrumentation Control Help Desk Researcher Policy and Funding Management Security and Access Data Generation Security Collab Tools Education And Training Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Campuses Authorization Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies CI Functions and Interactions

  27. Campus IT Discipline Groups National National Network Security Libraries International Publishers Regional International Regional Data Center Collections Organizations Security/ Access Coordinators Network Providers LHC eVLBI Discipline Groups NEON. Researchers CI Players Grad Students Staff Faculty SDSC PSC TeraGrid OSG OGF Supercomputer Sites NCSA Grid Orgs NYSGrid CalIT2

More Related