SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Fog Computing with VORTEX 
Angelo 
Corsaro, 
PhD 
Chief 
Technology 
Officer 
PrismTech 
OMG 
DDS 
Co-­‐Chair 
OMG 
Architectural 
Board 
angelo.corsaro@prismtech.com
50.1B-2020
Copyright PrismTech, 2014
Problem with Clouds?
Copyright PrismTech, 2014 
Cloud Computing Limitations 
Connectivity to the Cloud is a pre-requisite of cloud computing. 
- Some IoT systems need to be able to work even when 
connection is temporarily unavailable or under degraded 
connection 
Cloud computing assumes that there is enough bandwidth to 
collect the data 
- That can become an overly strong assumptions for Industrial 
Internet of Things applications 
Cloud computing centralises the analytics thus defining the 
lower bound reaction time of the system 
- Some IoT applications won’t be able to wait for the data to get 
to the cloud, be analysed and for insights to get back 
[source: http://on.wsj.com/1saV1xU]
Copyright PrismTech, 2014 
Not Always Connected 
Driver assistance applications can’t rely on a 
connection to the cloud to be always 
available 
Cloud computing is useful in offloading some 
computations, but other decisions that 
require short reaction time, or that have to be 
taken on a decentralised fashion can’t rely on 
the cloud
Copyright PrismTech, 2014 
Not Always Enough Bandwidth 
For some Industrial Internet of Things 
applications it is just not realistic to 
stream all data to a cloud
Fog Computing
Copyright PrismTech, 2014 
Why Fog? 
Whereas the cloud is "up there" in the sky somewhere, distant and remote and 
deliberately abstracted, the "fog" is close to the ground, right where things are 
getting done.
Copyright PrismTech, 2014 
What is Fog Computing 
Fog computing is about computing on 
the edge 
In Fog computing devices 
communicate peer-to-peer to 
efficiently share/store data and take 
local decisions 
Fog Computing
Copyright PrismTech, 2014 
Fog and Cloud Computing 
Fog and Cloud computing are 
synergistic, not exclusive 
IoT systems require both! 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
Fog & Cloud Computing 
with VORTEX
Copyright PrismTech, 2014 
Introducing Vortex 
VORTEX is a ubiquitous data sharing platform 
for the Internet of Things providing scalable 
end-to-end seamless, efficient, secure and 
timely data sharing for IoT supporting device, 
edge, gateways and cloud 
VORTEX platform coverage, performance and 
scalability make it the only viable choice from 
consumer to demanding business critical, 
industrial, real time, IoT applications 
VORTEX simplifies IT/OT integration, and is the 
only platform that holistically addresses IT and 
OT requirements 
Enterprise Systems 
Application Platform 
Edge Management/ 
Telemetry 
Connectivity/ 
Transport 
Sensors/ 
Things/ 
Devices 
Ubiquitous Data Sharing 
peer-to-peer, device-to-cloud, cloud-to-cloud
Copyright PrismTech, 2014 
The VORTEX Platform 
Specialised device implementations 
optimally addressing requirements of OT 
and IT platforms 
VORTEX can readily deal with data 
ingestion seamlessly integrating with 
other protocols, e.g. MQTT, CoAP, etc. 
VORTEX leverages the DDS standard for 
interoperability and uniquely extends it 
with support for Internet Scale systems, 
mobility and Web 2.0 applications 
Vortex Device 
Tools 
Integration 
MaaS 
Vortex Cloud
Copyright PrismTech, 2014 
VORTEX Device 
All VORTEX Device implementation, i.e. 
OpenSplice, Café, Lite and Web are Fog 
ready 
VORTEX Device implementations feature 
efficient peer-to-peer communication 
VORTEX Device implementations are also 
cloud-enabled, in the sense that they can 
also communicate via VORTEX Cloud 
Vortex Device
Copyright PrismTech, 2014 
VORTEX Architecture 
DTLS TLS 
VORTEX Web 
UDP TCP 
IP 
WebSocket 
DDSI Wire Protocol 
VORTEX Café 
VORTEX Cloud 
VORTEX Gateway 
VORTEX Lite VORTEX OpenSplice 
MQTT 
AMQP 
XMPP 
HTTP 
HBase 
DMBS 
TCP/IP, 
UDP/IP 
… 
VORTEX Café 
DDS API 
DDS Security
Copyright PrismTech, 2014 
Cloud and Fog/Edge Computing 
VORTEX supports both the 
Cloud and the Fog 
Computing Paradigm 
VORTEX natively supports: 
- Device-to-Device 
Communication 
- Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
VORTEX Abstractions
Copyright PrismTech, 2014 
Global Data Space 
VORTEX provides a Distributed Data 
Space abstraction where 
applications can autonomously and 
asynchronously read and write data 
Its built-in dynamic discovery 
isolates applications from network 
topology and connectivity details 
QoS 
QoS 
... 
QoS 
QoS 
DDS Global Data Space 
Data 
Writer 
Data 
Writer 
Data 
Writer 
Data 
Reader 
Data 
Reader 
Data 
Reader 
Data 
Reader 
Data 
Writer 
TopicA 
TopicB 
TopicC 
TopicD
Copyright PrismTech, 2014 
Topic 
A Topic defines a domain-wide information’s class 
A Topic is defined by means of a (name, type, qos) 
tuple, where 
• name: identifies the topic within the domain 
• type: is the programming language type 
associated with the topic. Types are 
extensible and evolvable 
• qos: is a collection of policies that express 
the non-functional properties of this topic, 
e.g. reliability, persistence, etc. 
QoS 
QoS 
QoS 
QoS 
Name 
QoS 
Topic 
Type 
... 
TopicA 
TopicB 
TopicC 
TopicD
Copyright PrismTech, 2014 
Support for fine grained 
access control 
Support for Symmetric and 
Asymmetric Authentication 
Standard Authentication, 
Access Control, Crypto, and 
Logging plug-in API 
Security 
Arthur Dent 
Arthur Dent 
Ford Prerfect 
Zaphod Beeblebrox 
Trillian 
Marvin 
A(r,w), B(r) 
A(r,w), B(r,w), X(r) 
*(r,w) 
A(r,w), B(r,w), C(r,w) 
*(r) 
Ford Prerfect 
Zaphod Beeblebrox 
Trillian 
Marvin 
A 
B 
A,B 
X 
* 
* 
A,B,C 
Identity Access Rights 
Sessions are authenticated 
and communication is 
encrypted 
Only the Topic included as 
part of the access rights are 
visible and accessible
Copyright PrismTech, 2014 
DDS Entities 
Domain (e.g. Domain 123) 
Domain 
Participant 
Topic 
Publisher 
DataWrter 
Subscriber 
DataReader 
Partition (e.g. “Telemetry”, “Shapes”, ) 
T1 
T1 T3 
Topic Instances/Samples 
Ta 
Tb 
Tc 
Tx 
Ty 
DomainParticipant: Provides access to a data cloud -- called a domain in DDS 
Topic: Domain-wide definition of a kind of Information 
Publisher/Subscriber: Provide scope to data sharing through the concept of partitions 
DataReader/DataWriter: Allow to read/write data for a given topic in the partitions their Subscriber/Publisher are associated with.
Copyright PrismTech, 2014 
Chatting in Scala 
import dds._ 
import dds.prelude._ 
import dds.config.DefaultEntities._ 
object Chatter { 
def main(args: Array[String]): Unit = { 
val topic = Topic[Post]("Post") 
val dw = DataWriter[Post](topic) 
dw.write(new Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); 
} 
}
Copyright PrismTech, 2014 
Chatting in Scala 
import dds._ 
import dds.prelude._ 
import dds.config.DefaultEntities._ 
object ChatLog { 
def main(args: Array[String]): Unit = { 
val topic = Topic[Post]("Post") 
val dr = DataReader[Post](topic) 
dr listen { 
case DataAvailable(_) => dr.read.foreach(println) 
} 
} 
}
Copyright PrismTech, 2014 
Chatting in C++ 
#include <dds.hpp> 
int main(int, char**) { 
DomainParticipant dp(0); 
Topic<Post> topic(“Post”); 
Publisher pub(dp); 
DataWriter<Post> dw(dp, topic); 
dw.write(Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); 
dw << Post(“kydos”,”Using operator << to post!”); 
return 0; 
}
Copyright PrismTech, 2014 
Chatting in C++ 
#include <dds.hpp> 
int main(int, char**) { 
DomainParticipant dp(0); 
Topic<Post> topic(“Post”); 
Subscriber sub(dp); 
DataReader<Post> dr(dp, topic); 
LambdaDataReaderListener<DataReader<Post>> lst; 
lst.data_available = [](DataReader<Post>& dr) { 
auto samples = data.read(); 
std::for_each(samples.begin(), samples.end(), [](Sample<Post>& sample) { 
std::cout << sample.data() << std::endl; 
} 
} 
dr.listener(lst); 
return 0; 
}
Deployment Models
Copyright PrismTech, 2014 
Fog + Cloud 
Fog Computing Fog Computing 
Fog Computing 
Device-to-Cloud 
Communication 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Device communicate peer-to- 
peer within a fog-domain 
and through Cloud 
across fog-domains 
Some device concurrently 
communicate with peers 
and the cloud
Copyright PrismTech, 2014 
Fog + Cloud-Link + Cloud 
Device communicate peer-to- 
peer within a fog-domain 
A Cloud-Link controls 
which data is exchanged 
with the could 
Fog Computing Fog Computing 
Fog Computing 
Device-to-Cloud 
Communication 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Cloud-Link Cloud-Link
Copyright PrismTech, 2014 
Federated Fog 
Fog Computing Fog Computing 
Fog Computing 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Cloud-Link 
Cloud-Link 
Fog domain are federated 
by Cloud-Link instances 
A Cloud-Link controls 
which data is exchanged 
with the could
Fog Computing 
Use Cases
Copyright PrismTech, 2014 
Smart Vehicles 
Enabling Vehicle to Vehicle and Vehicle-to-Cloud 
communication to improve driver safety 
Vehicle-to-Vehicle communication used to 
prevent accident 
Vehicle-to-Cloud communication used to 
perform complex analysis on video
Copyright PrismTech, 2014 
European Air Traffic Control 
Connected With Vortex 
The Single European Sky Initiative (SESAR) 
has adopted DDS as the pan-European ATM 
data sharing standard. Thus far, Italy and 
France have adopted Vortex. 
Flight Data Plans are shared in real-time 
across Europe using VORTEX. 
PENS: Pan European Network Service 
FDP: Flight Data Processor 
CWP: Controller Working Position 
PENS 
IPv6 network 
SSM support 
VORTEX is currently used by several nations 
within and across Air Traffic Control Centers. 
ITALY 
FDP FDP 
CWP 
TOWER 
DEVICE 
FDP FDP 
CWP 
TOWER 
DEVICE 
FRANCE 
FDP FDP 
CWP 
TOWER 
DEVICE 
ITALY 
GERMANY 
FDP FDP 
CWP 
TOWER 
DEVICE
Copyright PrismTech, 2014 
City of Nice’s Connected Boulevard 
https://www.youtube.com/watch?v=neVyOTXB4eI 
http://bit.ly/connected-boulevard
Copyright PrismTech, 2014 
Concluding Remarks 
VORTEX seamlessly support 
Fog and Cloud Computing 
Architectures 
VORTEX data sharing 
abstraction allows 
application to be completely 
abstracted from the 
connectivity details! 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
Copyright PrismTech, 2014

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Fog computing
Fog computingFog computing
Fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Edge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to YouEdge Computing: Bringing the Internet Closer to You
Edge Computing: Bringing the Internet Closer to You
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Introduction to Fog Computing
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
EDGE SEMINAR.pptx
EDGE SEMINAR.pptxEDGE SEMINAR.pptx
EDGE SEMINAR.pptx
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
PRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTINGPRESENTATION ON CLOUD COMPUTING
PRESENTATION ON CLOUD COMPUTING
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 

Andere mochten auch

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Andere mochten auch (17)

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Ähnlich wie Fog Computing with VORTEX

Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with VortexAngelo Corsaro
 
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...ADLINK Technology IoT
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsAngelo Corsaro
 
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeDesktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeADLINK Technology IoT
 
Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféAngelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeAngelo Corsaro
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam mayNguyen Duong
 
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricEclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricToby McClean
 
Cloud computing
Cloud computingCloud computing
Cloud computingMIDAUTEL
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatioChetan Sontakke
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeDavid Martin
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 

Ähnlich wie Fog Computing with VORTEX (20)

Vortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud MessagingVortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud Messaging
 
Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with Vortex
 
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
 
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeDesktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
 
Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex Café
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam may
 
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricEclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data Europe
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 

Mehr von Angelo Corsaro

zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 

Mehr von Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Fog Computing with VORTEX

  • 1. Fog Computing with VORTEX Angelo Corsaro, PhD Chief Technology Officer PrismTech OMG DDS Co-­‐Chair OMG Architectural Board angelo.corsaro@prismtech.com
  • 5. Copyright PrismTech, 2014 Cloud Computing Limitations Connectivity to the Cloud is a pre-requisite of cloud computing. - Some IoT systems need to be able to work even when connection is temporarily unavailable or under degraded connection Cloud computing assumes that there is enough bandwidth to collect the data - That can become an overly strong assumptions for Industrial Internet of Things applications Cloud computing centralises the analytics thus defining the lower bound reaction time of the system - Some IoT applications won’t be able to wait for the data to get to the cloud, be analysed and for insights to get back [source: http://on.wsj.com/1saV1xU]
  • 6. Copyright PrismTech, 2014 Not Always Connected Driver assistance applications can’t rely on a connection to the cloud to be always available Cloud computing is useful in offloading some computations, but other decisions that require short reaction time, or that have to be taken on a decentralised fashion can’t rely on the cloud
  • 7. Copyright PrismTech, 2014 Not Always Enough Bandwidth For some Industrial Internet of Things applications it is just not realistic to stream all data to a cloud
  • 9. Copyright PrismTech, 2014 Why Fog? Whereas the cloud is "up there" in the sky somewhere, distant and remote and deliberately abstracted, the "fog" is close to the ground, right where things are getting done.
  • 10. Copyright PrismTech, 2014 What is Fog Computing Fog computing is about computing on the edge In Fog computing devices communicate peer-to-peer to efficiently share/store data and take local decisions Fog Computing
  • 11. Copyright PrismTech, 2014 Fog and Cloud Computing Fog and Cloud computing are synergistic, not exclusive IoT systems require both! Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication
  • 12. Fog & Cloud Computing with VORTEX
  • 13. Copyright PrismTech, 2014 Introducing Vortex VORTEX is a ubiquitous data sharing platform for the Internet of Things providing scalable end-to-end seamless, efficient, secure and timely data sharing for IoT supporting device, edge, gateways and cloud VORTEX platform coverage, performance and scalability make it the only viable choice from consumer to demanding business critical, industrial, real time, IoT applications VORTEX simplifies IT/OT integration, and is the only platform that holistically addresses IT and OT requirements Enterprise Systems Application Platform Edge Management/ Telemetry Connectivity/ Transport Sensors/ Things/ Devices Ubiquitous Data Sharing peer-to-peer, device-to-cloud, cloud-to-cloud
  • 14. Copyright PrismTech, 2014 The VORTEX Platform Specialised device implementations optimally addressing requirements of OT and IT platforms VORTEX can readily deal with data ingestion seamlessly integrating with other protocols, e.g. MQTT, CoAP, etc. VORTEX leverages the DDS standard for interoperability and uniquely extends it with support for Internet Scale systems, mobility and Web 2.0 applications Vortex Device Tools Integration MaaS Vortex Cloud
  • 15. Copyright PrismTech, 2014 VORTEX Device All VORTEX Device implementation, i.e. OpenSplice, Café, Lite and Web are Fog ready VORTEX Device implementations feature efficient peer-to-peer communication VORTEX Device implementations are also cloud-enabled, in the sense that they can also communicate via VORTEX Cloud Vortex Device
  • 16. Copyright PrismTech, 2014 VORTEX Architecture DTLS TLS VORTEX Web UDP TCP IP WebSocket DDSI Wire Protocol VORTEX Café VORTEX Cloud VORTEX Gateway VORTEX Lite VORTEX OpenSplice MQTT AMQP XMPP HTTP HBase DMBS TCP/IP, UDP/IP … VORTEX Café DDS API DDS Security
  • 17. Copyright PrismTech, 2014 Cloud and Fog/Edge Computing VORTEX supports both the Cloud and the Fog Computing Paradigm VORTEX natively supports: - Device-to-Device Communication - Device-to-Cloud Communication Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication
  • 19. Copyright PrismTech, 2014 Global Data Space VORTEX provides a Distributed Data Space abstraction where applications can autonomously and asynchronously read and write data Its built-in dynamic discovery isolates applications from network topology and connectivity details QoS QoS ... QoS QoS DDS Global Data Space Data Writer Data Writer Data Writer Data Reader Data Reader Data Reader Data Reader Data Writer TopicA TopicB TopicC TopicD
  • 20. Copyright PrismTech, 2014 Topic A Topic defines a domain-wide information’s class A Topic is defined by means of a (name, type, qos) tuple, where • name: identifies the topic within the domain • type: is the programming language type associated with the topic. Types are extensible and evolvable • qos: is a collection of policies that express the non-functional properties of this topic, e.g. reliability, persistence, etc. QoS QoS QoS QoS Name QoS Topic Type ... TopicA TopicB TopicC TopicD
  • 21. Copyright PrismTech, 2014 Support for fine grained access control Support for Symmetric and Asymmetric Authentication Standard Authentication, Access Control, Crypto, and Logging plug-in API Security Arthur Dent Arthur Dent Ford Prerfect Zaphod Beeblebrox Trillian Marvin A(r,w), B(r) A(r,w), B(r,w), X(r) *(r,w) A(r,w), B(r,w), C(r,w) *(r) Ford Prerfect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  • 22. Copyright PrismTech, 2014 DDS Entities Domain (e.g. Domain 123) Domain Participant Topic Publisher DataWrter Subscriber DataReader Partition (e.g. “Telemetry”, “Shapes”, ) T1 T1 T3 Topic Instances/Samples Ta Tb Tc Tx Ty DomainParticipant: Provides access to a data cloud -- called a domain in DDS Topic: Domain-wide definition of a kind of Information Publisher/Subscriber: Provide scope to data sharing through the concept of partitions DataReader/DataWriter: Allow to read/write data for a given topic in the partitions their Subscriber/Publisher are associated with.
  • 23. Copyright PrismTech, 2014 Chatting in Scala import dds._ import dds.prelude._ import dds.config.DefaultEntities._ object Chatter { def main(args: Array[String]): Unit = { val topic = Topic[Post]("Post") val dw = DataWriter[Post](topic) dw.write(new Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); } }
  • 24. Copyright PrismTech, 2014 Chatting in Scala import dds._ import dds.prelude._ import dds.config.DefaultEntities._ object ChatLog { def main(args: Array[String]): Unit = { val topic = Topic[Post]("Post") val dr = DataReader[Post](topic) dr listen { case DataAvailable(_) => dr.read.foreach(println) } } }
  • 25. Copyright PrismTech, 2014 Chatting in C++ #include <dds.hpp> int main(int, char**) { DomainParticipant dp(0); Topic<Post> topic(“Post”); Publisher pub(dp); DataWriter<Post> dw(dp, topic); dw.write(Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); dw << Post(“kydos”,”Using operator << to post!”); return 0; }
  • 26. Copyright PrismTech, 2014 Chatting in C++ #include <dds.hpp> int main(int, char**) { DomainParticipant dp(0); Topic<Post> topic(“Post”); Subscriber sub(dp); DataReader<Post> dr(dp, topic); LambdaDataReaderListener<DataReader<Post>> lst; lst.data_available = [](DataReader<Post>& dr) { auto samples = data.read(); std::for_each(samples.begin(), samples.end(), [](Sample<Post>& sample) { std::cout << sample.data() << std::endl; } } dr.listener(lst); return 0; }
  • 28. Copyright PrismTech, 2014 Fog + Cloud Fog Computing Fog Computing Fog Computing Device-to-Cloud Communication Peer-to-Peer (Brokerless) Device-to-Device Communication Device communicate peer-to- peer within a fog-domain and through Cloud across fog-domains Some device concurrently communicate with peers and the cloud
  • 29. Copyright PrismTech, 2014 Fog + Cloud-Link + Cloud Device communicate peer-to- peer within a fog-domain A Cloud-Link controls which data is exchanged with the could Fog Computing Fog Computing Fog Computing Device-to-Cloud Communication Peer-to-Peer (Brokerless) Device-to-Device Communication Cloud-Link Cloud-Link
  • 30. Copyright PrismTech, 2014 Federated Fog Fog Computing Fog Computing Fog Computing Peer-to-Peer (Brokerless) Device-to-Device Communication Cloud-Link Cloud-Link Fog domain are federated by Cloud-Link instances A Cloud-Link controls which data is exchanged with the could
  • 32. Copyright PrismTech, 2014 Smart Vehicles Enabling Vehicle to Vehicle and Vehicle-to-Cloud communication to improve driver safety Vehicle-to-Vehicle communication used to prevent accident Vehicle-to-Cloud communication used to perform complex analysis on video
  • 33. Copyright PrismTech, 2014 European Air Traffic Control Connected With Vortex The Single European Sky Initiative (SESAR) has adopted DDS as the pan-European ATM data sharing standard. Thus far, Italy and France have adopted Vortex. Flight Data Plans are shared in real-time across Europe using VORTEX. PENS: Pan European Network Service FDP: Flight Data Processor CWP: Controller Working Position PENS IPv6 network SSM support VORTEX is currently used by several nations within and across Air Traffic Control Centers. ITALY FDP FDP CWP TOWER DEVICE FDP FDP CWP TOWER DEVICE FRANCE FDP FDP CWP TOWER DEVICE ITALY GERMANY FDP FDP CWP TOWER DEVICE
  • 34. Copyright PrismTech, 2014 City of Nice’s Connected Boulevard https://www.youtube.com/watch?v=neVyOTXB4eI http://bit.ly/connected-boulevard
  • 35. Copyright PrismTech, 2014 Concluding Remarks VORTEX seamlessly support Fog and Cloud Computing Architectures VORTEX data sharing abstraction allows application to be completely abstracted from the connectivity details! Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication