Changes between Initial Version and Version 1 of Topic3


Ignore:
Timestamp:
11/17/10 12:08:43 (12 years ago)
Author:
hmussman@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Topic3

    v1 v1  
     1=== Topic 3  GENI I&M Resources ===
     2
     3Team members:
     4  Vic Thomas - BBN/GPO  (yes)[[BR]]
     5  Jim Griffioen* - Univ Kentucky (yes)[[BR]]
     6  Martin Swany - Univ Delaware (yes)[[BR]]
     7  Camilo Viecco - Indiana Univ (yes)[[BR]]     
     8  Brian Hay – Univ Alaska  (yes)[[BR]]
     9  Giridhar Manepalli - CNRI (yes)[[BR]]
     10 
     11  *agreed to organize first writing and discussion
     12
     13Significant question uncovered at workshop:[[BR]]
     14Jim on 6/25 via email:  We should involve Rob Ricci in the discussion.[[BR]]
     15
     16Consider these resources for I&M capabilities:[[BR]]
     17  1. Hosts, VMs, etc.
     18  2. Network connectivity
     19  3. Software, e.g., I&M software that can be included in an experiment
     20  4. I&M services
     21  5. I&M data flows and file transfers
     22  6. I&M data files stored in archives
     23 
     24For each item, consider how to:[[BR]]
     25  Create[[BR]]
     26  Name[[BR]]
     27  Register and discover[[BR]]
     28  Authorize and assign[[BR]]
     29 
     30Does each item have:[[BR]]
     31  Unique and persistent name?[[BR]]
     32  Unique and persistent identifier?[[BR]]
     33  Need to carefully consider this for all of GENI[[BR]]
     34 
     35For each item, consider:[[BR]]
     36  Ownership[[BR]]
     37  What sort of policies the owner may want to apply[[BR]]
     38 
     39How are each of these discovered, specified, authorized and assigned:
     40  Always by mechanisms provided by the CF?
     41  With CF plus additional mechanisms? 
     42
     43  Consider example of LS in perfSONAR  [[BR]]
     44  Consider example of data file stored in archive, owned by an experimenter
     45  Need to define and then compare these options[[BR]]
     46  Need to understand interop with CF for each option[[BR]]
     47  Does CF setup secondary authorization mechanisms in some cases?  If so, how?[[BR]]
     48
     49
     50
     51
     52
     53
     54