SlideShare a Scribd company logo
1 of 36
Download to read offline
Fog Computing with VORTEX 
Angelo 
Corsaro, 
PhD 
Chief 
Technology 
Officer 
PrismTech 
OMG 
DDS 
Co-­‐Chair 
OMG 
Architectural 
Board 
angelo.corsaro@prismtech.com
50.1B-2020
Copyright PrismTech, 2014
Problem with Clouds?
Copyright PrismTech, 2014 
Cloud Computing Limitations 
Connectivity to the Cloud is a pre-requisite of cloud computing. 
- Some IoT systems need to be able to work even when 
connection is temporarily unavailable or under degraded 
connection 
Cloud computing assumes that there is enough bandwidth to 
collect the data 
- That can become an overly strong assumptions for Industrial 
Internet of Things applications 
Cloud computing centralises the analytics thus defining the 
lower bound reaction time of the system 
- Some IoT applications won’t be able to wait for the data to get 
to the cloud, be analysed and for insights to get back 
[source: http://on.wsj.com/1saV1xU]
Copyright PrismTech, 2014 
Not Always Connected 
Driver assistance applications can’t rely on a 
connection to the cloud to be always 
available 
Cloud computing is useful in offloading some 
computations, but other decisions that 
require short reaction time, or that have to be 
taken on a decentralised fashion can’t rely on 
the cloud
Copyright PrismTech, 2014 
Not Always Enough Bandwidth 
For some Industrial Internet of Things 
applications it is just not realistic to 
stream all data to a cloud
Fog Computing
Copyright PrismTech, 2014 
Why Fog? 
Whereas the cloud is "up there" in the sky somewhere, distant and remote and 
deliberately abstracted, the "fog" is close to the ground, right where things are 
getting done.
Copyright PrismTech, 2014 
What is Fog Computing 
Fog computing is about computing on 
the edge 
In Fog computing devices 
communicate peer-to-peer to 
efficiently share/store data and take 
local decisions 
Fog Computing
Copyright PrismTech, 2014 
Fog and Cloud Computing 
Fog and Cloud computing are 
synergistic, not exclusive 
IoT systems require both! 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
Fog & Cloud Computing 
with VORTEX
Copyright PrismTech, 2014 
Introducing Vortex 
VORTEX is a ubiquitous data sharing platform 
for the Internet of Things providing scalable 
end-to-end seamless, efficient, secure and 
timely data sharing for IoT supporting device, 
edge, gateways and cloud 
VORTEX platform coverage, performance and 
scalability make it the only viable choice from 
consumer to demanding business critical, 
industrial, real time, IoT applications 
VORTEX simplifies IT/OT integration, and is the 
only platform that holistically addresses IT and 
OT requirements 
Enterprise Systems 
Application Platform 
Edge Management/ 
Telemetry 
Connectivity/ 
Transport 
Sensors/ 
Things/ 
Devices 
Ubiquitous Data Sharing 
peer-to-peer, device-to-cloud, cloud-to-cloud
Copyright PrismTech, 2014 
The VORTEX Platform 
Specialised device implementations 
optimally addressing requirements of OT 
and IT platforms 
VORTEX can readily deal with data 
ingestion seamlessly integrating with 
other protocols, e.g. MQTT, CoAP, etc. 
VORTEX leverages the DDS standard for 
interoperability and uniquely extends it 
with support for Internet Scale systems, 
mobility and Web 2.0 applications 
Vortex Device 
Tools 
Integration 
MaaS 
Vortex Cloud
Copyright PrismTech, 2014 
VORTEX Device 
All VORTEX Device implementation, i.e. 
OpenSplice, Café, Lite and Web are Fog 
ready 
VORTEX Device implementations feature 
efficient peer-to-peer communication 
VORTEX Device implementations are also 
cloud-enabled, in the sense that they can 
also communicate via VORTEX Cloud 
Vortex Device
Copyright PrismTech, 2014 
VORTEX Architecture 
DTLS TLS 
VORTEX Web 
UDP TCP 
IP 
WebSocket 
DDSI Wire Protocol 
VORTEX Café 
VORTEX Cloud 
VORTEX Gateway 
VORTEX Lite VORTEX OpenSplice 
MQTT 
AMQP 
XMPP 
HTTP 
HBase 
DMBS 
TCP/IP, 
UDP/IP 
… 
VORTEX Café 
DDS API 
DDS Security
Copyright PrismTech, 2014 
Cloud and Fog/Edge Computing 
VORTEX supports both the 
Cloud and the Fog 
Computing Paradigm 
VORTEX natively supports: 
- Device-to-Device 
Communication 
- Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
VORTEX Abstractions
Copyright PrismTech, 2014 
Global Data Space 
VORTEX provides a Distributed Data 
Space abstraction where 
applications can autonomously and 
asynchronously read and write data 
Its built-in dynamic discovery 
isolates applications from network 
topology and connectivity details 
QoS 
QoS 
... 
QoS 
QoS 
DDS Global Data Space 
Data 
Writer 
Data 
Writer 
Data 
Writer 
Data 
Reader 
Data 
Reader 
Data 
Reader 
Data 
Reader 
Data 
Writer 
TopicA 
TopicB 
TopicC 
TopicD
Copyright PrismTech, 2014 
Topic 
A Topic defines a domain-wide information’s class 
A Topic is defined by means of a (name, type, qos) 
tuple, where 
• name: identifies the topic within the domain 
• type: is the programming language type 
associated with the topic. Types are 
extensible and evolvable 
• qos: is a collection of policies that express 
the non-functional properties of this topic, 
e.g. reliability, persistence, etc. 
QoS 
QoS 
QoS 
QoS 
Name 
QoS 
Topic 
Type 
... 
TopicA 
TopicB 
TopicC 
TopicD
Copyright PrismTech, 2014 
Support for fine grained 
access control 
Support for Symmetric and 
Asymmetric Authentication 
Standard Authentication, 
Access Control, Crypto, and 
Logging plug-in API 
Security 
Arthur Dent 
Arthur Dent 
Ford Prerfect 
Zaphod Beeblebrox 
Trillian 
Marvin 
A(r,w), B(r) 
A(r,w), B(r,w), X(r) 
*(r,w) 
A(r,w), B(r,w), C(r,w) 
*(r) 
Ford Prerfect 
Zaphod Beeblebrox 
Trillian 
Marvin 
A 
B 
A,B 
X 
* 
* 
A,B,C 
Identity Access Rights 
Sessions are authenticated 
and communication is 
encrypted 
Only the Topic included as 
part of the access rights are 
visible and accessible
Copyright PrismTech, 2014 
DDS Entities 
Domain (e.g. Domain 123) 
Domain 
Participant 
Topic 
Publisher 
DataWrter 
Subscriber 
DataReader 
Partition (e.g. “Telemetry”, “Shapes”, ) 
T1 
T1 T3 
Topic Instances/Samples 
Ta 
Tb 
Tc 
Tx 
Ty 
DomainParticipant: Provides access to a data cloud -- called a domain in DDS 
Topic: Domain-wide definition of a kind of Information 
Publisher/Subscriber: Provide scope to data sharing through the concept of partitions 
DataReader/DataWriter: Allow to read/write data for a given topic in the partitions their Subscriber/Publisher are associated with.
Copyright PrismTech, 2014 
Chatting in Scala 
import dds._ 
import dds.prelude._ 
import dds.config.DefaultEntities._ 
object Chatter { 
def main(args: Array[String]): Unit = { 
val topic = Topic[Post]("Post") 
val dw = DataWriter[Post](topic) 
dw.write(new Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); 
} 
}
Copyright PrismTech, 2014 
Chatting in Scala 
import dds._ 
import dds.prelude._ 
import dds.config.DefaultEntities._ 
object ChatLog { 
def main(args: Array[String]): Unit = { 
val topic = Topic[Post]("Post") 
val dr = DataReader[Post](topic) 
dr listen { 
case DataAvailable(_) => dr.read.foreach(println) 
} 
} 
}
Copyright PrismTech, 2014 
Chatting in C++ 
#include <dds.hpp> 
int main(int, char**) { 
DomainParticipant dp(0); 
Topic<Post> topic(“Post”); 
Publisher pub(dp); 
DataWriter<Post> dw(dp, topic); 
dw.write(Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); 
dw << Post(“kydos”,”Using operator << to post!”); 
return 0; 
}
Copyright PrismTech, 2014 
Chatting in C++ 
#include <dds.hpp> 
int main(int, char**) { 
DomainParticipant dp(0); 
Topic<Post> topic(“Post”); 
Subscriber sub(dp); 
DataReader<Post> dr(dp, topic); 
LambdaDataReaderListener<DataReader<Post>> lst; 
lst.data_available = [](DataReader<Post>& dr) { 
auto samples = data.read(); 
std::for_each(samples.begin(), samples.end(), [](Sample<Post>& sample) { 
std::cout << sample.data() << std::endl; 
} 
} 
dr.listener(lst); 
return 0; 
}
Deployment Models
Copyright PrismTech, 2014 
Fog + Cloud 
Fog Computing Fog Computing 
Fog Computing 
Device-to-Cloud 
Communication 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Device communicate peer-to- 
peer within a fog-domain 
and through Cloud 
across fog-domains 
Some device concurrently 
communicate with peers 
and the cloud
Copyright PrismTech, 2014 
Fog + Cloud-Link + Cloud 
Device communicate peer-to- 
peer within a fog-domain 
A Cloud-Link controls 
which data is exchanged 
with the could 
Fog Computing Fog Computing 
Fog Computing 
Device-to-Cloud 
Communication 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Cloud-Link Cloud-Link
Copyright PrismTech, 2014 
Federated Fog 
Fog Computing Fog Computing 
Fog Computing 
Peer-to-Peer 
(Brokerless) 
Device-to-Device 
Communication 
Cloud-Link 
Cloud-Link 
Fog domain are federated 
by Cloud-Link instances 
A Cloud-Link controls 
which data is exchanged 
with the could
Fog Computing 
Use Cases
Copyright PrismTech, 2014 
Smart Vehicles 
Enabling Vehicle to Vehicle and Vehicle-to-Cloud 
communication to improve driver safety 
Vehicle-to-Vehicle communication used to 
prevent accident 
Vehicle-to-Cloud communication used to 
perform complex analysis on video
Copyright PrismTech, 2014 
European Air Traffic Control 
Connected With Vortex 
The Single European Sky Initiative (SESAR) 
has adopted DDS as the pan-European ATM 
data sharing standard. Thus far, Italy and 
France have adopted Vortex. 
Flight Data Plans are shared in real-time 
across Europe using VORTEX. 
PENS: Pan European Network Service 
FDP: Flight Data Processor 
CWP: Controller Working Position 
PENS 
IPv6 network 
SSM support 
VORTEX is currently used by several nations 
within and across Air Traffic Control Centers. 
ITALY 
FDP FDP 
CWP 
TOWER 
DEVICE 
FDP FDP 
CWP 
TOWER 
DEVICE 
FRANCE 
FDP FDP 
CWP 
TOWER 
DEVICE 
ITALY 
GERMANY 
FDP FDP 
CWP 
TOWER 
DEVICE
Copyright PrismTech, 2014 
City of Nice’s Connected Boulevard 
https://www.youtube.com/watch?v=neVyOTXB4eI 
http://bit.ly/connected-boulevard
Copyright PrismTech, 2014 
Concluding Remarks 
VORTEX seamlessly support 
Fog and Cloud Computing 
Architectures 
VORTEX data sharing 
abstraction allows 
application to be completely 
abstracted from the 
connectivity details! 
Device-to-Device 
Communication 
Fog Computing 
Cloud Computing 
Fog Computing 
Cloud-to-Cloud 
Communication 
Fog Computing 
Device-to-Cloud 
Communication 
Device-to-Device 
Communication 
Fog-to-Cloud 
Communication
Copyright PrismTech, 2014

More Related Content

What's hot

fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topicsAce Beau
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Internet Of Things (IoT)
Internet Of Things (IoT) Internet Of Things (IoT)
Internet Of Things (IoT) kiran kumar
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionSathvik N Prasad
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.Balvant Biradar
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 

What's hot (20)

Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topics
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Internet Of Things (IoT)
Internet Of Things (IoT) Internet Of Things (IoT)
Internet Of Things (IoT)
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 
Edge computing
Edge computingEdge computing
Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Cluster Computing Seminar.
Cluster Computing Seminar.Cluster Computing Seminar.
Cluster Computing Seminar.
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 

Viewers also liked

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (16)

Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Fog Computing with VORTEX

Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with VortexAngelo Corsaro
 
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...ADLINK Technology IoT
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsAngelo Corsaro
 
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeDesktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeADLINK Technology IoT
 
Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféAngelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity StandardAngelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeAngelo Corsaro
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam mayNguyen Duong
 
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricEclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricToby McClean
 
Cloud computing
Cloud computingCloud computing
Cloud computingMIDAUTEL
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatioChetan Sontakke
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeDavid Martin
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 

Similar to Fog Computing with VORTEX (20)

Vortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud MessagingVortex Cloud Beyond Cloud Messaging
Vortex Cloud Beyond Cloud Messaging
 
Architecting IoT Systems with Vortex
Architecting IoT Systems with VortexArchitecting IoT Systems with Vortex
Architecting IoT Systems with Vortex
 
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
Introduction to PrismTech's Vortex Intelligent Data Sharing Platform for the ...
 
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of ThingsVortex: The Intelligent Data Sharing Platform for the Internet of Things
Vortex: The Intelligent Data Sharing Platform for the Internet of Things
 
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex CafeDesktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
Desktop, Embedded and Mobile Apps with PrismTech Vortex Cafe
 
Desktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex CaféDesktop, Embedded and Mobile Apps with Vortex Café
Desktop, Embedded and Mobile Apps with Vortex Café
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam may
 
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-CentricEclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
 
Cloud Computing Neccesity
Cloud Computing  NeccesityCloud Computing  Neccesity
Cloud Computing Neccesity
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
Cloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data EuropeCloud Computing | Dimension Data Europe
Cloud Computing | Dimension Data Europe
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 

More from Angelo Corsaro

zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Fog Computing with VORTEX

  • 1. Fog Computing with VORTEX Angelo Corsaro, PhD Chief Technology Officer PrismTech OMG DDS Co-­‐Chair OMG Architectural Board angelo.corsaro@prismtech.com
  • 5. Copyright PrismTech, 2014 Cloud Computing Limitations Connectivity to the Cloud is a pre-requisite of cloud computing. - Some IoT systems need to be able to work even when connection is temporarily unavailable or under degraded connection Cloud computing assumes that there is enough bandwidth to collect the data - That can become an overly strong assumptions for Industrial Internet of Things applications Cloud computing centralises the analytics thus defining the lower bound reaction time of the system - Some IoT applications won’t be able to wait for the data to get to the cloud, be analysed and for insights to get back [source: http://on.wsj.com/1saV1xU]
  • 6. Copyright PrismTech, 2014 Not Always Connected Driver assistance applications can’t rely on a connection to the cloud to be always available Cloud computing is useful in offloading some computations, but other decisions that require short reaction time, or that have to be taken on a decentralised fashion can’t rely on the cloud
  • 7. Copyright PrismTech, 2014 Not Always Enough Bandwidth For some Industrial Internet of Things applications it is just not realistic to stream all data to a cloud
  • 9. Copyright PrismTech, 2014 Why Fog? Whereas the cloud is "up there" in the sky somewhere, distant and remote and deliberately abstracted, the "fog" is close to the ground, right where things are getting done.
  • 10. Copyright PrismTech, 2014 What is Fog Computing Fog computing is about computing on the edge In Fog computing devices communicate peer-to-peer to efficiently share/store data and take local decisions Fog Computing
  • 11. Copyright PrismTech, 2014 Fog and Cloud Computing Fog and Cloud computing are synergistic, not exclusive IoT systems require both! Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication
  • 12. Fog & Cloud Computing with VORTEX
  • 13. Copyright PrismTech, 2014 Introducing Vortex VORTEX is a ubiquitous data sharing platform for the Internet of Things providing scalable end-to-end seamless, efficient, secure and timely data sharing for IoT supporting device, edge, gateways and cloud VORTEX platform coverage, performance and scalability make it the only viable choice from consumer to demanding business critical, industrial, real time, IoT applications VORTEX simplifies IT/OT integration, and is the only platform that holistically addresses IT and OT requirements Enterprise Systems Application Platform Edge Management/ Telemetry Connectivity/ Transport Sensors/ Things/ Devices Ubiquitous Data Sharing peer-to-peer, device-to-cloud, cloud-to-cloud
  • 14. Copyright PrismTech, 2014 The VORTEX Platform Specialised device implementations optimally addressing requirements of OT and IT platforms VORTEX can readily deal with data ingestion seamlessly integrating with other protocols, e.g. MQTT, CoAP, etc. VORTEX leverages the DDS standard for interoperability and uniquely extends it with support for Internet Scale systems, mobility and Web 2.0 applications Vortex Device Tools Integration MaaS Vortex Cloud
  • 15. Copyright PrismTech, 2014 VORTEX Device All VORTEX Device implementation, i.e. OpenSplice, Café, Lite and Web are Fog ready VORTEX Device implementations feature efficient peer-to-peer communication VORTEX Device implementations are also cloud-enabled, in the sense that they can also communicate via VORTEX Cloud Vortex Device
  • 16. Copyright PrismTech, 2014 VORTEX Architecture DTLS TLS VORTEX Web UDP TCP IP WebSocket DDSI Wire Protocol VORTEX Café VORTEX Cloud VORTEX Gateway VORTEX Lite VORTEX OpenSplice MQTT AMQP XMPP HTTP HBase DMBS TCP/IP, UDP/IP … VORTEX Café DDS API DDS Security
  • 17. Copyright PrismTech, 2014 Cloud and Fog/Edge Computing VORTEX supports both the Cloud and the Fog Computing Paradigm VORTEX natively supports: - Device-to-Device Communication - Device-to-Cloud Communication Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication
  • 19. Copyright PrismTech, 2014 Global Data Space VORTEX provides a Distributed Data Space abstraction where applications can autonomously and asynchronously read and write data Its built-in dynamic discovery isolates applications from network topology and connectivity details QoS QoS ... QoS QoS DDS Global Data Space Data Writer Data Writer Data Writer Data Reader Data Reader Data Reader Data Reader Data Writer TopicA TopicB TopicC TopicD
  • 20. Copyright PrismTech, 2014 Topic A Topic defines a domain-wide information’s class A Topic is defined by means of a (name, type, qos) tuple, where • name: identifies the topic within the domain • type: is the programming language type associated with the topic. Types are extensible and evolvable • qos: is a collection of policies that express the non-functional properties of this topic, e.g. reliability, persistence, etc. QoS QoS QoS QoS Name QoS Topic Type ... TopicA TopicB TopicC TopicD
  • 21. Copyright PrismTech, 2014 Support for fine grained access control Support for Symmetric and Asymmetric Authentication Standard Authentication, Access Control, Crypto, and Logging plug-in API Security Arthur Dent Arthur Dent Ford Prerfect Zaphod Beeblebrox Trillian Marvin A(r,w), B(r) A(r,w), B(r,w), X(r) *(r,w) A(r,w), B(r,w), C(r,w) *(r) Ford Prerfect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  • 22. Copyright PrismTech, 2014 DDS Entities Domain (e.g. Domain 123) Domain Participant Topic Publisher DataWrter Subscriber DataReader Partition (e.g. “Telemetry”, “Shapes”, ) T1 T1 T3 Topic Instances/Samples Ta Tb Tc Tx Ty DomainParticipant: Provides access to a data cloud -- called a domain in DDS Topic: Domain-wide definition of a kind of Information Publisher/Subscriber: Provide scope to data sharing through the concept of partitions DataReader/DataWriter: Allow to read/write data for a given topic in the partitions their Subscriber/Publisher are associated with.
  • 23. Copyright PrismTech, 2014 Chatting in Scala import dds._ import dds.prelude._ import dds.config.DefaultEntities._ object Chatter { def main(args: Array[String]): Unit = { val topic = Topic[Post]("Post") val dw = DataWriter[Post](topic) dw.write(new Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); } }
  • 24. Copyright PrismTech, 2014 Chatting in Scala import dds._ import dds.prelude._ import dds.config.DefaultEntities._ object ChatLog { def main(args: Array[String]): Unit = { val topic = Topic[Post]("Post") val dr = DataReader[Post](topic) dr listen { case DataAvailable(_) => dr.read.foreach(println) } } }
  • 25. Copyright PrismTech, 2014 Chatting in C++ #include <dds.hpp> int main(int, char**) { DomainParticipant dp(0); Topic<Post> topic(“Post”); Publisher pub(dp); DataWriter<Post> dw(dp, topic); dw.write(Post(“kydos”,”Using VORTEX.. It's pretty cool!”)); dw << Post(“kydos”,”Using operator << to post!”); return 0; }
  • 26. Copyright PrismTech, 2014 Chatting in C++ #include <dds.hpp> int main(int, char**) { DomainParticipant dp(0); Topic<Post> topic(“Post”); Subscriber sub(dp); DataReader<Post> dr(dp, topic); LambdaDataReaderListener<DataReader<Post>> lst; lst.data_available = [](DataReader<Post>& dr) { auto samples = data.read(); std::for_each(samples.begin(), samples.end(), [](Sample<Post>& sample) { std::cout << sample.data() << std::endl; } } dr.listener(lst); return 0; }
  • 28. Copyright PrismTech, 2014 Fog + Cloud Fog Computing Fog Computing Fog Computing Device-to-Cloud Communication Peer-to-Peer (Brokerless) Device-to-Device Communication Device communicate peer-to- peer within a fog-domain and through Cloud across fog-domains Some device concurrently communicate with peers and the cloud
  • 29. Copyright PrismTech, 2014 Fog + Cloud-Link + Cloud Device communicate peer-to- peer within a fog-domain A Cloud-Link controls which data is exchanged with the could Fog Computing Fog Computing Fog Computing Device-to-Cloud Communication Peer-to-Peer (Brokerless) Device-to-Device Communication Cloud-Link Cloud-Link
  • 30. Copyright PrismTech, 2014 Federated Fog Fog Computing Fog Computing Fog Computing Peer-to-Peer (Brokerless) Device-to-Device Communication Cloud-Link Cloud-Link Fog domain are federated by Cloud-Link instances A Cloud-Link controls which data is exchanged with the could
  • 32. Copyright PrismTech, 2014 Smart Vehicles Enabling Vehicle to Vehicle and Vehicle-to-Cloud communication to improve driver safety Vehicle-to-Vehicle communication used to prevent accident Vehicle-to-Cloud communication used to perform complex analysis on video
  • 33. Copyright PrismTech, 2014 European Air Traffic Control Connected With Vortex The Single European Sky Initiative (SESAR) has adopted DDS as the pan-European ATM data sharing standard. Thus far, Italy and France have adopted Vortex. Flight Data Plans are shared in real-time across Europe using VORTEX. PENS: Pan European Network Service FDP: Flight Data Processor CWP: Controller Working Position PENS IPv6 network SSM support VORTEX is currently used by several nations within and across Air Traffic Control Centers. ITALY FDP FDP CWP TOWER DEVICE FDP FDP CWP TOWER DEVICE FRANCE FDP FDP CWP TOWER DEVICE ITALY GERMANY FDP FDP CWP TOWER DEVICE
  • 34. Copyright PrismTech, 2014 City of Nice’s Connected Boulevard https://www.youtube.com/watch?v=neVyOTXB4eI http://bit.ly/connected-boulevard
  • 35. Copyright PrismTech, 2014 Concluding Remarks VORTEX seamlessly support Fog and Cloud Computing Architectures VORTEX data sharing abstraction allows application to be completely abstracted from the connectivity details! Device-to-Device Communication Fog Computing Cloud Computing Fog Computing Cloud-to-Cloud Communication Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication