You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

First Week

NSF has a new requirement that all students (undergraduate, graduate, and postdoctoral) must have had training in Responsible Conduct in Research (RCR) *before* being supported (i.e., paid) by NSF. 

Furthermore, an on-line RCR certification system has been set up for this purpose.  It is found here:

Please note the following requirements as they apply to all VSoE students:

#      all currently NSF-supported students (undergraduate, graduate, and postdoctoral) *must* complete the on-line course this spring, as per the Provost's memo;

#      all new incoming PhD students and postdocs *must* complete the on-line course before being set up on payroll;

#      all undergraduates being put on an NSF support *must* complete the on-line course before being set up on payroll;

#      PIs who have or hope to have NSF funding are urged to have all their PhD students and postdocs complete the on-line course in any case, to avoid possible future delays in student payroll if students/postdocs are moved from one grant to another.

Before the students start reading any papers, especially the Globus paper Gaurang or Karan spend 45 minutes with the students

  • giving a high level overview of the Grids.
  • explaining the various globus components
  • terminology of grid sites / grid site layout / submit hosts etc
  • security in grid. certificates etc

Workflow Papers to Read

Globus and Condor Papers to Read

Second Week

Papers to Read

Setting up of credentials

  • Help the students set up their ssh keys so that they can log on to ISI machines from their laptops/ home computers

    Setting up of SSH Keys on ISI Linux boxes

  • log on to your linux box using action provided username and password
  • cd bin
  • Create the following symbolic links
    • ln -s /usr/bin/scp scp
    • ln -s /usr/bin/ssh-add ssh-add
    • ln -s /usr/bin/ssh-agent ssh-agent
    • ln -s /usr/bin/ssh-keygen ssh-keygen
    • ln -s /usr/bin/ssh-keyscan ssh-keyscan
  • Create your private keys
    • mkdir ~/.ssh
    • ssh-keygen -t dsa -C "user isi key" -b 2048 -f ~/.ssh/isi_dsa_2048
      Enter passphrase (empty for no passphrase):
      Enter same passphrase again:
      Your identification has been saved in /nfs/asd2/username/.ssh/id_dsa_2048.
      Your public key has been saved in /nfs/asd2/username/.ssh/
      The key fingerprint is:
      14:f9:31:1a:2d:e0:11:86:cd:3a:3d:9f:35:73:24:8c user isi key
      93.340u 0.070s 4:55.37 31.6%    0+0k 0+0io 363pf+0w
      Make sure that you enter a passphrase
  • Now you have a private key/public key pair generated.
  • Setup of account to use the generated ssh key to log on to other isi machines from your linux box
    • Machines running SSH Secure Server
      • cd ~/.ssh
      • ln -s id_dsa_2048 id_dsa
      • cat > authorized_keys2
      • ssh
      • It should ask for your passphrase key
    • Machines running Open SSH Server
      • mkdir ~/.ssh2
      • cd ~/.ssh2
      • ssh-keygen -e -f ~/.ssh/ >
      • create a text file named authorization with following content (use emacs or vi )
      • ssh
      • It should ask for your passphrase key

Help students to get grid certificates

Pegasus Tutorial

  • Gaurang or Karan spend half day with the new student to do a hands on pegasus tutorial
  • No labels