Changes between Version 17 and Version 18 of 2ndInstMeasWork
- Timestamp:
- 07/07/10 11:10:50 (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
2ndInstMeasWork
v17 v18 99 99 *agreed to organize first writing and discussion 100 100 101 Summarize current view [[BR]]101 Summarize current view of:[[BR]] 102 102 Measurement Orchestration (MO) Service [[BR]] 103 103 Measurement Point (MP) Service [[BR]] … … 133 133 134 134 Significant question uncovered at workshop:[[BR]] 135 Jim on 6/25 via email: We should involve Rob Ricci in the discussion. 136 137 What are resources: 135 Jim on 6/25 via email: We should involve Rob Ricci in the discussion.[[BR]] 136 137 Consider these resources for I&M capabilities:[[BR]] 138 138 1. Hosts, VMs, etc. 139 139 2. Network connectivity … … 142 142 5. I&M data flows and file transfers 143 143 6. I&M data files stored in archives 144 145 How are each of these discovered, specified, authorized and assigned: 146 a. Always by mechanisms provided by the CF? 147 b. With CF plus additional mechanisms? 148 Consider example of LS in perfSONAR [[BR]] 149 Consider example of data file stored in archive, owned by an experimenter 150 151 Goals:[[BR]] 152 Need to define and then compare these options[[BR]] 153 Need to understand interop with CF for each option[[BR]] 154 Does CF setup secondary authorization mechanisms in some cases? If so, how?[[BR]] 155 156 Does each item have:[[BR]] 157 Unique and persistent name?[[BR]] 158 Unique and persistent identifier?[[BR]] 159 Need to carefully consider this for all of GENI[[BR]] 160 144 161 145 For each item, consider how to:[[BR]] 162 146 Create[[BR]] … … 164 148 Register and discover[[BR]] 165 149 Authorize and assign[[BR]] 166 150 151 Does each item have:[[BR]] 152 Unique and persistent name?[[BR]] 153 Unique and persistent identifier?[[BR]] 154 Need to carefully consider this for all of GENI[[BR]] 155 167 156 For each item, consider:[[BR]] 168 157 Ownership[[BR]] 169 158 What sort of policies the owner may want to apply[[BR]] 159 160 How are each of these discovered, specified, authorized and assigned: 161 a. Always by mechanisms provided by the CF? 162 b. With CF plus additional mechanisms? 163 164 Consider example of LS in perfSONAR [[BR]] 165 Consider example of data file stored in archive, owned by an experimenter 166 Need to define and then compare these options[[BR]] 167 Need to understand interop with CF for each option[[BR]] 168 Does CF setup secondary authorization mechanisms in some cases? If so, how?[[BR]] 169 170 171 172 173 174 175 170 176 171 177