vortex 2.0 -- the industrial internet of things platform

55
Angelo Corsaro, PhD Chief Technology Officer [email protected] 2.0 The Industrial Internet of Things Platform

Upload: angelo-corsaro

Post on 14-Jan-2017

867 views

Category:

Technology


3 download

TRANSCRIPT

AngeloCorsaro,PhDChiefTechnologyOfficer

[email protected]

2.0The Industrial Internet of Things Platform

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiarynews

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryacquires

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

As part of ADLINK will have the the resources and scale to exploit the full potential of the Vortex in Industrial IoT (IIoT) markets.

You will see PrismTech becoming stronger, larger and able to better compete globally. 

You will also start to see, later in 2016, new leading-edge IIoT system products emerging from the combination of PrismTech’s software and ADLINK’s hardware technologies.

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This acquisition reinforces the traction and relevance of the DDS Standard in IIoT. 

The combination of ADLINK’s and PrismTech’s strengths offers a tremendous opportunity to combine software and hardware into system-level solutions embracing the edge, mobile, network and data center.

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices

in151 Characters

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

at a Glance2.0

Plenty of Vortex Devices goodies, including new APIs, new features and

improved performances

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

at a Glance2.0

More Integration with analytics, IoT and Web

technologies

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

at a Glance2.0

Extended and Improved Tooling for monitoring, management, testing,

record and playback

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

at a Glance2.0

Fog Computing Support

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

at a Glance2.0

Data-Centric Security

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Updated ISO-C++ with increased usability and support for C++11 lambdas

Google Protocol Buffer support for topic type declaration

Full support for coherent-updates

Improved performance and transparent compression for durable data

6.6.0

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed using different syntaxes,

including IDL and ProtoBuf

Google Protocol Buffers

message ShapeType { option (.omg.dds.type) = {name: "ShapeType"}; required string color = 0 [(.omg.dds.member).key = true]; required long x = 1; required long y = 2; required long shapesize = 3; }

struct ShapeType { string color; long x; long y; long shapesize; }; #pragma keylist ShapeType color

IDL

ProtoBuf

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

2.0.0

Support for 40+ platforms including Windows, Linux, MacOS, ElinOS, VxWorks, and QNX

Updated ISO-C++ with increased usability and support for C++11 lambdas

Full Durability support including Transient and Persistent Data

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

2.2.0

Support for Python Scripting (via Jython)

Extended support for X.509 certificates and CA hierarchies

Extended Unicast-only discovery to facilitate configuration in non-multicast enabled environments

Improved throughput

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration

Native Integration with the hottest real-time analytics

platforms and CEP Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

Integration with the popular Node-RED framework

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

Integration with mainstream Dashboard Technologies

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryFog Computing

Vortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

1.3.1

Transparently and dynamically integrates a Fog subsystems while mediating transport protocols and isolating application from dynamics exposed by different networks

Controls the topic exposed by a Fog subsystem

Defines a security boundary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

1.3.1

Data leaves a Fog subsystem only if remote interest is discovered — through dynamic discovery.

Applications within a Fog cannot tell if they are communicating with local or remote applications. These applications believe that they always communicate “locally”

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

location transparency

Cloud Computing

Fog Computing

Device-to-Cloud Communication

Device-to-Device Communication

Fog-to-Cloud Communication

Cloud-to-Cloud Communication

Device-to-Device Communication

Collect | Store | Analyse | Share

Collect | Store | Analyse | Share

Fog Computing

Fog Computing

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car

Café and Web are typically used Android / HTML5 based infotainment

Lite in typically used in ECU, sensors and onboard analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car

Vortex Fog also helps defining security boundaries and policies

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog efficiently and securely deals with car to car communication

Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols

Device-to-Cloud Communication

Cloud Analytics

Fog AnalyticsFog Analytics

Fog Analytics

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale

Cloud Analytics

Fog AnalyticsFog Analytics

Fog Analytics

Device-to-Cloud Communication

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security

SecureData-Level security with Pluggable Authentication Access Control and Crypto

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

Default Plug-insX.509 Public Key

Infrastructure (PKI) based authentication

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

Default Plug-insAccess Control List

available at a trusted/authenticated URI

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

Default Plug-ins

Crypto based on TLS Cipher Suite

Device-2-DeviceDevice-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

infra

stru

ctur

esd

k

SecureData-Security as opposed to simply Transport-Level

security

Arthur Dent

Arthur Dent

Ford Prefect

Zaphod Beeblebrox

Marvin

Trillian

left/A(r,w), left/B(r)

left/A(r,w), left/B(r,w), left/X(r)

left/*(r,w)

left/*(r), right/(w)

left/A(r,w), left/B(r,w), right/C(r,w)

Ford Prefect

Zaphod Beeblebrox

Trillian

Marvin

A

B

A,BX

*

*

A,B,C

Identity Access RightsSessions are authenticated and communication is encrypted

Only the Topic included as part of the access rights are visible and accessible

SecureFine-grained access control over Partition/Topic regular

expressions

Arthur Dent

Arthur Dent

Ford Prefect

Zaphod Beeblebrox

Marvin

Trillian

left/A(r,w), left/B(r)

left/A(r,w), left/B(r,w), left/X(r)

left/*(r,w)

left/*(r), right/(w)

left/A(r,w), left/B(r,w), right/C(r,w)

Ford Prefect

Zaphod Beeblebrox

Trillian

Marvin

A

B

A,BX

*

*

A,B,C

Identity Access RightsSessions are authenticated and communication is encrypted

Only the Topic included as part of the access rights are visible and accessible

Boundary SecurityBoundary security support is

enabled by Vortex-Fog

Device-to-Cloud Communication

Peer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

Access Control

Boundary SecuritySeparates security concerns at

different scales and controls what information is exposed

Device-to-Cloud Communication

Peer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Data-Centric Security Management

&Configuration

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Certificate Management

Certificate Authority (CA) hierarchies are supported

to facilitate certificate management

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Certificate/Key Management

ToolEases the creation of Certificate Authorities hierarchies as well as

service and device certificates

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-to-Cloud Communication

Peer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

Applications belonging to the same Fog subsystem

share the same identity and the same access rights

Access Control

Fog Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Device-to-Cloud Communication

Peer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

So long as the Fog CA is trusted the Fog instance will be trusted to join the

Vortex infrastructure.

Access Control

Fog Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

Access control for an entire Fog can be easily

controlled by defining rules for either a “Cluster

Subject Name” or a “Cluster Id”

Fog Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

Each device can have its own identity or identities can be shared per “security-level”

Access Control

Device-to-Cloud CommunicationDevice

Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less)

Device-to-Device Communication

Fog Computing Fog ComputingFog Computing

TLS

TLS

So long as the device’s CA is trusted the device will be

trusted.

Access Control

Device-to-Cloud CommunicationDevice

Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryDevices access control can

be defined using a specific certificate name or

a regular expression on the subject name

Device Access Control

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiaryDemo

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary

at a Glance2.0

Vortex 2.0 is the most advanced data-sharing infrastructure for IoT and IIoT applications available on the market

It has off-the-shelf support for Fog Computing, Data-Level Security, integration with Analytics, and extremely high performance

This slides have been crafted by Angelo Corsaro

Any use of these slides that does include me as Author/Co-Author is plagiary