Changes between Version 17 and Version 18 of 2ndInstMeasWork


Ignore:
Timestamp:
07/07/10 11:10:50 (15 years ago)
Author:
hmussman@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • 2ndInstMeasWork

    v17 v18  
    9999  *agreed to organize first writing and discussion
    100100
    101 Summarize current view[[BR]]
     101Summarize current view of:[[BR]]
    102102  Measurement Orchestration (MO) Service        [[BR]]
    103103  Measurement Point (MP) Service        [[BR]]
     
    133133
    134134Significant question uncovered at workshop:[[BR]]
    135 Jim on 6/25 via email:  We should involve Rob Ricci in the discussion.
    136 
    137 What are resources:
     135Jim on 6/25 via email:  We should involve Rob Ricci in the discussion.[[BR]]
     136
     137Consider these resources for I&M capabilities:[[BR]]
    138138  1. Hosts, VMs, etc.
    139139  2. Network connectivity
     
    142142  5. I&M data flows and file transfers
    143143  6. I&M data files stored in archives
    144 
    145 How are each of these discovered, specified, authorized and assigned:
    146   a. Always by mechanisms provided by the CF?
    147   b. With CF plus additional mechanisms? 
    148   Consider example of LS in perfSONAR  [[BR]]
    149   Consider example of data file stored in archive, owned by an experimenter
    150 
    151 Goals:[[BR]]
    152   Need to define and then compare these options[[BR]]
    153   Need to understand interop with CF for each option[[BR]]
    154   Does CF setup secondary authorization mechanisms in some cases?  If so, how?[[BR]]
    155 
    156 Does each item have:[[BR]]
    157   Unique and persistent name?[[BR]]
    158   Unique and persistent identifier?[[BR]]
    159   Need to carefully consider this for all of GENI[[BR]]
    160 
     144 
    161145For each item, consider how to:[[BR]]
    162146  Create[[BR]]
     
    164148  Register and discover[[BR]]
    165149  Authorize and assign[[BR]]
    166 
     150 
     151Does each item have:[[BR]]
     152  Unique and persistent name?[[BR]]
     153  Unique and persistent identifier?[[BR]]
     154  Need to carefully consider this for all of GENI[[BR]]
     155 
    167156For each item, consider:[[BR]]
    168157  Ownership[[BR]]
    169158  What sort of policies the owner may want to apply[[BR]]
     159 
     160How are each of these discovered, specified, authorized and assigned:
     161  a. Always by mechanisms provided by the CF?
     162  b. With CF plus additional mechanisms? 
     163
     164  Consider example of LS in perfSONAR  [[BR]]
     165  Consider example of data file stored in archive, owned by an experimenter
     166  Need to define and then compare these options[[BR]]
     167  Need to understand interop with CF for each option[[BR]]
     168  Does CF setup secondary authorization mechanisms in some cases?  If so, how?[[BR]]
     169
     170
     171
     172
     173
     174
     175
    170176
    171177