1 / 43

Cyberinfrastructure and Internet2

Cyberinfrastructure and Internet2. Eric Boyd Deputy Technology Officer Internet2. What is Cyberinfrastructure (CI)?. A strategic orientation supported by NSF Calls for large-scale public investment to encourage the evolution of widely distributed computing via the telecommunications network

Download Presentation

Cyberinfrastructure and Internet2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberinfrastructure and Internet2 Eric BoydDeputy Technology Officer Internet2

  2. What is Cyberinfrastructure (CI)? • A strategic orientation supported by NSF • Calls for large-scale public investment to encourage the evolution of widely distributed computing via the telecommunications network • Goal is to deploy the combined capacity of multiple sites to support the advance of current research, initially in science and engineering

  3. General Session Thursday: Cyberinfrastructure: The Way Forward • Francine Berman, San Diego Supercomputer Center, Moderator • Paul Avery, University of Florida • Thomas Knab, Case Western Reserve University • Alan Whitney, MIT Haystack Observatory • Eric Boyd, Internet2

  4. The Distributed CI Computer Instrumentation Control Researcher Management Security and Access Policy and Funding Data Generation Security Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Authorization Campuses Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation Data Sets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Human Support Training Help Desk Education And Outreach Collab Tools Publishing Network

  5. The Network is the Backplane for the Distributed CI Computer Instrumentation Control Researcher Management Security and Access Policy and Funding Data Generation Security Viewing Security Access Control Funding Agencies Program Control Resource Providers Authentication Authorization Campuses Security 3D Imaging Analysis Security Display Tools Security Input Retrieval Display and Visualization Computation DataSets Storage Simulation . Data Input Search Archive Schema Metadata Data Directories Program Ontologies Human Support Training Help Desk Education And Outreach Collab Tools Publishing Network

  6. Challenge and Opportunity • Challenge: • The R&E community thinks of CI primarily in terms of building distributed computing clusters • Opportunity: • The network is a key component of CI • Internet2 is leading the development of solutions for the network component of CI

  7. CI Requirements Data storage Robust campus infrastructure Security and Authorization IT support for local and remote resources Network performance monitoring tools Network resources to meet demand spikes 7

  8. LHC epitomizes the CI Challenge

  9. Current Situation Large Hadron Collider (LHC) at CERN will go operational in 2008 Over 68 U.S. Universities and National Laboratories are poised to receive data More than 1500 scientists are waiting for this data Are campus, regional, and national networks ready for the task? 9

  10. CERN Tier 0 Raw Data 10

  11. US Tier 4 (1500 US scientists) Scientists Analyze Data US Tier 3 (68 orgs) Scientists Request Data Atlas (6-7) CMS (7) US Tier 2(15 orgs) Provides Data to Tier 3 Tier 1(12 orgs) FNAL BNL Shared Data Storage and Reduction CERN Tier 0 Raw Data 11

  12. Local Infrastructure US Tier 4 (1500 US scientists) Scientists Analyze Data US Tier 3 (68 orgs) Scientists Request Data Internet2/Connectors Internet2/Connectors Atlas (6-7) CMS (7) US Tier 2(15 orgs) Provides Data to Tier 3 GEANT-ESNet-Internet2 Tier 1(12 orgs) FNAL BNL Shared Data Storage and Reduction LHCOPN CERN Tier 0 Raw Data 12

  13. Peak Flow Network Requirements Local Infrastructure Tier 1 or 2 to Tier 3: Estimate: Requires 1.6 Gbps per transfer (2 TB's in 3 hours) Internet2/Connectors Internet2/Connectors Tier 1 to Tier 2: Requires 10-20 Gbps GEANT-ESNet-Internet2 Tier 0 to Tier1: Requires 10-40 Gbps LHCOPN CERN 13

  14. Science Network Requirements Aggregation Summary(slide courtesy of ESNet)

  15. Science Network Requirements Aggregation Summary(slide courtesy of ESNet)

  16. CI Components Bulk Transport 2-Way Interactive Video Applications Real-Time Communications …. Applications call on Network Cyberinfrastructure Phoebus …. …. …. Network Cyberinfrastructure Performance Infrastructure / Tools Middleware Control Plane Measurement Nodes Network Control Plane Nodes

  17. Internet2 Network CI Software • Dynamic Circuit Control Infrastructure • DRAGON (with ISI, MAX) • Oscars (with ESnet) • Middleware (Federated trust Infrastructure) • Shibboleth • Signet • Grouper • Comanage • Performance Monitoring Infrastructure • perfSONAR (with ESnet, GEANT2 JRA1, RNP, many others) • BWCTL, NDT, OWAMP, Thrulay • Distributed System Infrastructure • Topology Service (with University of Delaware) • Distributed Lookup Service (with University of Delaware, PSNC)

  18. Internet2 Network CI Standardization • Dynamic Circuit Control Protocol (IDC) • DICE-Control, GLIF • Measurement Schema / Protocol • OGF NMWG • IETF IPPM • perfSONAR Consortium • Middleware Arena • Liberty Alliance • OASIS • Possible emerging corporate consortium • Topology Schema / Protocol • OGF NML-WG • perfSONAR Consortium • DICE-Control

  19. Internet2’s CI Vision • Internet2’s CI vision: • Be a networking cyber-service provider • Be a trust cyber-service provider • Be a CI technology developer.

  20. Internet2’s CI Position • Internet2’s position: • Backbone network provider • Federated trust infrastructure provider • Forum for collaboration by members of the R&E community • Gives Internet2 a unique vision and strategy for Cyberinfrastructure.

  21. Internet2’s CI Definition • Components • Supercomputing / Cycles / Computational • Supercomputing / Storage (Non-volatile) • Analysis / Visualization • Interconnecting Networks (Campuses, Regionals, Backbones) • Network Cyberinfrastructure Software

  22. Internet2’s CI Audience • Application Software • Instrumentation / Remote Instruments / Sensors • Data Sets

  23. Internet2’s CI Constituencies • Collaborators • University Members • Regional Networks • Regional CI Organizations • High Performance Computing Centers • Federal Partners • International Partners • CI Integrators

  24. Early Thoughts: Internet2’s CI Strategy (1) • Requirements • Informed by our membership • Agenda set by our governance mechanisms • Offer, and in some cases develop, services and technology that are key components of a coherent CI software suite. • For CI to work, it has to be a workable end-to-end system; Internet2 is emphasizing a systems approach towards CI. • Internet2 is offering new services such as the Internet2 Network, InCommon, and the VO Service Center. • Internet2 is developing and offering new technologies such as GridShib and perfSONAR. • Internet2 may do systems integration work assembling open source communication tools into a common veneer.

  25. Early Thoughts: Internet2’s CI Strategy (2) • Play the role of community CI coordinator, convening community conversations. • Partner with other community coordinators (e.g. Teragrid, EDUCAUSE). • Play a convening function in order to facilitate the development, use, and dissemination of CI (e.g. Bridging the Gap workshop). • Take a lead in international outreach efforts at several different layers of CI. • Work with campuses to build valuable CI. • Facilitate conversations among various federal agencies (e.g. DOE, NSF, NIH), each of which is developing its own CI, and present a consistent vision back to the campuses.

  26. Internet2’s CI Tactics • Target campus, national, and international audiences • Integrate campus CI into regional national/international CI • Target Application-community CI (quasi-national) • Enable effective use of authorized resources, regardless of where they exist • Enable integration of new resources as they become available • Facilitate interoperability of multiple, autonomous CI providers • Take a “toolkit” approach • Make sure it still looks like a wall jack to end user • Push for best practices for campuses • What to do • How to do it • Community learns as a whole / avoid reinventing the wheel • Contribute to the support structure for use of CI • Open source CI software • Centers of Excellence for various kinds of things • Training)

  27. Questions? • Eric Boyd • eboyd@internet2.edu

More Related