| 1 | === Topic 3 GENI I&M Resources === |
| 2 | |
| 3 | Team members: |
| 4 | Vic Thomas - BBN/GPO (yes)[[BR]] |
| 5 | Jim Griffioen* - Univ Kentucky (yes)[[BR]] |
| 6 | Martin Swany - Univ Delaware (yes)[[BR]] |
| 7 | Camilo Viecco - Indiana Univ (yes)[[BR]] |
| 8 | Brian Hay – Univ Alaska (yes)[[BR]] |
| 9 | Giridhar Manepalli - CNRI (yes)[[BR]] |
| 10 | |
| 11 | *agreed to organize first writing and discussion |
| 12 | |
| 13 | Significant question uncovered at workshop:[[BR]] |
| 14 | Jim on 6/25 via email: We should involve Rob Ricci in the discussion.[[BR]] |
| 15 | |
| 16 | Consider these resources for I&M capabilities:[[BR]] |
| 17 | 1. Hosts, VMs, etc. |
| 18 | 2. Network connectivity |
| 19 | 3. Software, e.g., I&M software that can be included in an experiment |
| 20 | 4. I&M services |
| 21 | 5. I&M data flows and file transfers |
| 22 | 6. I&M data files stored in archives |
| 23 | |
| 24 | For each item, consider how to:[[BR]] |
| 25 | Create[[BR]] |
| 26 | Name[[BR]] |
| 27 | Register and discover[[BR]] |
| 28 | Authorize and assign[[BR]] |
| 29 | |
| 30 | Does each item have:[[BR]] |
| 31 | Unique and persistent name?[[BR]] |
| 32 | Unique and persistent identifier?[[BR]] |
| 33 | Need to carefully consider this for all of GENI[[BR]] |
| 34 | |
| 35 | For each item, consider:[[BR]] |
| 36 | Ownership[[BR]] |
| 37 | What sort of policies the owner may want to apply[[BR]] |
| 38 | |
| 39 | How are each of these discovered, specified, authorized and assigned: |
| 40 | Always by mechanisms provided by the CF? |
| 41 | With CF plus additional mechanisms? |
| 42 | |
| 43 | Consider example of LS in perfSONAR [[BR]] |
| 44 | Consider example of data file stored in archive, owned by an experimenter |
| 45 | Need to define and then compare these options[[BR]] |
| 46 | Need to understand interop with CF for each option[[BR]] |
| 47 | Does CF setup secondary authorization mechanisms in some cases? If so, how?[[BR]] |
| 48 | |
| 49 | |
| 50 | |
| 51 | |
| 52 | |
| 53 | |
| 54 | |