The large majority of commercial IoT platforms target consumer applications and fall short in addressing the requirements characteristic of Industrial IoT. Vortex has always focused on addressing the challenges characteristic of Industrial IoT systems and with 2.0 release sets a the a new standard!
This presentation will (1) introduce the new features introduced in with Vortex 2.0, (2) explain how Vortex 2.0 addresses the requirements of Industrial Internet of Things application better than any other existing platform, and (3)showcase how innovative companies are using Vortex for building leading edge Industrial Internet of Things applications.
2. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiarynews
3. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
acquires
4. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
As part of ADLINK will have the the
resources and scale to exploit the full
potential of the Vortex in Industrial IoT
(IIoT) markets.
You will see PrismTech becoming
stronger, larger and able to better
compete globally.Â
You will also start to see, later in 2016, new
leading-edge IIoT system products
emerging from the combination of
PrismTechâs software and ADLINKâs
hardware technologies.
5. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This acquisition reinforces the traction and
relevance of the DDS Standard in IIoT.Â
The combination of ADLINKâs and
PrismTechâs strengths oïŹers a
tremendous opportunity to combine
software and hardware into system-level
solutions embracing the edge, mobile,
network and data center.
6. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0
7. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex is a standard technology for
eïŹicient, ubiquitous, interoperable,
secure and platform independent data
sharing across network connected
devices
in151
Characters
8. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Plenty of Vortex Devices
goodies, including new
APIs, new features and
improved performances
9. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
More Integration with
analytics, IoT and Web
technologies
10. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Extended and Improved
Tooling for monitoring,
management, testing,
record and playback
11. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Fog Computing Support
12. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
at a Glance
2.0
Data-Centric Security
13. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device
14. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Updated ISO-C++ with increased usability
and support for C++11 lambdas
Google Protocol BuïŹer support for topic
type declaration
Full support for coherent-updates
Improved performance and transparent
compression for durable data
6.6.0
15. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed
using diïŹerent syntaxes,
including IDL and ProtoBuf
Google
Protocol Buffers
message ShapeType {
option (.omg.dds.type) =
{name: "ShapeType"};
required string color = 0
[(.omg.dds.member).key = true];
required long x = 1;
required long y = 2;
required long shapesize = 3; }
struct ShapeType {
string color;
long x;
long y;
long shapesize; };
#pragma keylist ShapeType color
IDL
ProtoBuf
16. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.0.0
Support for 40+ platforms including
Windows, Linux, MacOS, ElinOS,
VxWorks, and QNX
Updated ISO-C++ with increased usability
and support for C++11 lambdas
Full Durability support including Transient
and Persistent Data
17. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.2.0
Support for Python Scripting (via Jython)
Extended support for X.509 certiïŹcates
and CA hierarchies
Extended Unicast-only discovery to
facilitate conïŹguration in non-multicast
enabled environments
Improved throughput
18. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration
19. Native Integration with the
hottest real-time analytics
platforms and CEP Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
20. Integration with the popular
Node-RED framework
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
23. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
24. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Fog Computing
Vortex naturally ïŹts with the fog
computing paradigm and is the
only fog-ready data-sharing
infrastructure
25. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Transparently and dynamically integrates
a Fog subsystems while mediating
transport protocols and isolating
application from dynamics exposed by
diïŹerent networks
Controls the topic exposed by a Fog
subsystem
DeïŹnes a security boundary
26. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Data leaves a Fog subsystem only if
remote interest is discovered â
through dynamic discovery.
Applications within a Fog cannot tell if
they are communicating with local or
remote applications. These applications
believe that they always communicate
âlocallyâ
27. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
28. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
location
transparency
Cloud Computing
Fog Computing
Device-to-Cloud
Communication
Device-to-Device
Communication
Fog-to-Cloud
Communication
Cloud-to-Cloud
Communication
Device-to-Device
Communication
Collect | Store | Analyse | Share
Collect | Store | Analyse | Share
Fog Computing
Fog Computing
30. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog is used to
transparently (for in car apps)
decouple and control the data
sharing within and across the
car
Vortex Fog also helps deïŹning
security boundaries and
policies
31. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog eïŹiciently and
securely deals with car to car
communication
Vortex Fog allows to
decouple the transport used
for in-car communication
and that used for car-to-car
communication
32. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog eïŹiciently and
securely deals with cloud
connectivity adapting traïŹic
ïŹows and protocols
Device-to-Cloud
Communication
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
33. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Cloud eïŹiciently
and securely makes data
available to any device at
an Internet Scale
Cloud Analytics
Fog Analytics
Fog Analytics
Fog Analytics
Device-to-Cloud
Communication
34. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security
35. Secure
Data-Level security with
Pluggable Authentication
Access Control and Crypto
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
36. Default Plug-ins
X.509 Public Key
Infrastructure (PKI) based
authentication
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
37. Default Plug-ins
Access Control List
available at a trusted/
authenticated URI
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
38. Default Plug-ins
Crypto based on TLS
Cipher Suite
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infrastructuresdk
39. Secure
Data-Security as opposed
to simply Transport-Level
security
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,B
X
*
*
A,B,C
Identity Access Rights
Sessions are authenticated
and communication is
encrypted
Only the Topic included as
part of the access rights are
visible and accessible
40. Secure
Fine-grained access control
over Partition/Topic regular
expressions
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,B
X
*
*
A,B,C
Identity Access Rights
Sessions are authenticated
and communication is
encrypted
Only the Topic included as
part of the access rights are
visible and accessible
41. Boundary Security
Boundary security support is
enabled by Vortex-Fog
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Access
Control
42. Boundary Security
Separates security concerns at
diïŹerent scales and controls
what information is exposed
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Access
Control
43. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Data-Centric Security
Management
&Configuration
44. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate
Management
CertiïŹcate Authority (CA)
hierarchies are supported
to facilitate certiïŹcate
management
45. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate/Key
Management
Tool
Eases the creation of
CertiïŹcate Authorities
hierarchies as well as
service and device
certiïŹcates
46. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Applications belonging to
the same Fog subsystem
share the same identity and
the same access rights
Access
Control
Fog
Access Control
47. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud
Communication
Peer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
So long as the Fog CA is
trusted the Fog instance
will be trusted to join the
Vortex infrastructure.
Access
Control
Fog
Access Control
48. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Access control for an
entire Fog can be easily
controlled by deïŹning
rules for either a âCluster
Subject Nameâ or a
âCluster Idâ
Fog
Access Control
49. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
Each device can have its own
identity or identities can be
shared per âsecurity-levelâ
Access
Control
Device-to-Cloud
Communication
Device
Access Control
50. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer
(Broker-less)
Device-to-Device
Communication
Fog Computing Fog Computing
Fog Computing
TLS
TLS
So long as the deviceâs CA is
trusted the device will be
trusted.
Access
Control
Device-to-Cloud
Communication
Device
Access Control
51. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Devices access control can
be deïŹned using a
speciïŹc certiïŹcate name or
a regular expression on
the subject name
Device
Access Control
52. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryDemo
53. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
54. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
at a Glance
2.0
Vortex 2.0 is the most advanced data-
sharing infrastructure for IoT and IIoT
applications available on the market
It has oïŹ-the-shelf support for Fog
Computing, Data-Level Security,
integration with Analytics, and
extremely high performance
55. This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary