SlideShare a Scribd company logo
1 of 55
Download to read offline
DDS	
  -­‐	
  The	
  Proven	
  Data	
  Connec1vity	
  Standard	
  for	
  
the	
  Industrial	
  IoT	
  (IIoT)	
  
Gerardo	
  Pardo-­‐Castellote,	
  Ph.D.	
  	
  RTI	
  CTO	
  
Co-­‐chair	
  OMG	
  DDS	
  SIG	
   September	
  2016	
  
The	
  Industrial	
  IoT	
  is	
  Smart	
  Machine	
  Infrastructure	
  
Industrial	
  Internet	
  of	
  Things	
  (IIoT)	
  Consumer	
  Internet	
  of	
  Things	
  (CIoT)	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Industrial	
  IoT	
  Key	
  System	
  Characteris1cs	
  
3	
  
•  Reliability	
  
•  Scalability	
  
•  Safety	
  
•  Security	
  
•  Resiliency	
  
Large	
  scale,	
  heterogeneous,	
  built	
  with	
  mul1-­‐vendor	
  components,	
  oOen	
  broadly	
  distributed	
  and	
  evolving	
  
Increased	
  Technical	
  Challenges	
  
•  Rapid	
  evolu1on	
  
•  Heterogeneous	
  systems	
  	
  
•  Complex	
  dataflows	
  
•  Robustness,	
  Availability	
  
•  Scalability	
  
•  Security,	
  Safety,	
  and	
  Cer1fica1on	
  
•  SoOware	
  dominates	
  a	
  (formerly)	
  mechanical	
  world	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
The	
  Industry	
  is	
  facing	
  disrup1on	
  
©	
  2014	
  RTI	
  
If you don't like change, you're going to like irrelevance even less.”
- General Eric Shinseki, Chief of Staff, US Army
IIoT	
  Transforma1ons	
  
What	
  Drives	
  IIoT	
  Systems	
  across	
  Industries?	
  
The	
  IIoT	
  Disrup1on	
  
The real value is a common architecture that
connects sensor to cloud, interoperates
between vendors, and spans industries
Common	
  technology	
  that	
  spans	
  
industries	
  brings	
  bold	
  new	
  approaches	
  
and	
  enables	
  fast	
  change	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
240+  companies  strong  
Goal:	
  build	
  and	
  prove	
  a	
  common	
  
architecture	
  that	
  spans	
  sensor	
  to	
  
cloud,	
  interoperates	
  between	
  vendors,	
  
and	
  works	
  across	
  industries	
  
Industrial	
  Internet	
  Consor1um	
  (IIC)	
  
Testbeds	
  
Innova:on	
  to	
  drive	
  new	
  products,	
  
processes,	
  services	
  
Technology	
  &	
  Security	
  
Architectural	
  frameworks,	
  standards	
  
requirements,	
  	
  
interoperability,	
  use	
  cases,	
  privacy	
  &	
  
security	
  of	
  Big	
  Data	
  
Community	
  
Companies	
  joining	
  together	
  to	
  advance	
  innova:on,	
  
ideas,	
  best	
  prac:ces,	
  thought	
  leadership	
  and	
  
insights	
  
	
  
The	
  goal	
  of	
  the	
  IIC	
  is	
  to	
  drive	
  innova1on	
  through	
  beYer	
  integra1on	
  of	
  
the	
  physical	
  and	
  digital	
  worlds.	
  
Source:	
  hYp://iiconsor1um.org/tx-­‐14/presenta1ons/Soley_Opening_Keynote-­‐9-­‐15-­‐14.pdf	
  
240+  Companies,  25  Countries
The	
  IIC	
  Created	
  the	
  Industrial	
  Internet	
  Market	
  
As	
  of	
  April	
  2016	
  
©	
  2014	
  RTI	
  
Copyright © 2013 Appinions. All rights reserved.
The Internet Of Things - An Industry Influence Study | July 2014 Copyright © 2014 Appinions Inc. All rights reserved.
0 100 200 300 400 500 600 700 800
The 10 Most Influential Internet of Things Companies
Samsung announced the launch of
Samsung Smart Home … Home
automation with a single app.
- Source: Yahoo News 04/02/2014
Apple announced partners for its
HomeKit developer platform: Texas
Instruments, Philips, Haier,
Netatmo, Withings, Honeywell,
Marvell, Osram and Broadcom.
- Source: The Guardian 06/02/2014
[Google] paid $3.2bn for
Nest Labs, maker of "smart
home" appliances.
- Source: Bdlive 04/02/2014
Vodafone announced plans to Cobra
Automotive Technologies [strengthening]
its hand in the M2M and connected cars.
- Source: Mobile Money Live 06/16/2014
RANK
 NIS
1
 757
 Apple
2
 549
 Nest
3
 243
 Google
4
 162
 Intel
5
 129
 Microsoft
6
 100
 Cisco
7
 94
 Samsung
8
 89
 Vodafone
9
 50
 MediaTek
10
 47
 SecureRF
Semiconductor manufacturer MediaTek today announced their latest
processor platform [LinkIt] targeted at wearables and Internet of Things.
- Source: Mobile Geeks 06/03/2014
7
RTI	
  Named	
  Most	
  Influen1al	
  IIoT	
  Company	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
RTI’s	
  Experience	
  
•  ~1000	
  Projects	
  
–  Healthcare	
  
–  Transporta1on	
  
–  Communica1ons	
  
–  Energy	
  
–  Industrial	
  
–  Defense	
  
•  15+	
  Standards	
  &	
  Consor1a	
  Efforts	
  
–  Interoperability	
  
–  Mul1-­‐vendor	
  ecosystems	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
IIC	
  Organiza1on	
  
User	
  
Experience	
  
Framework	
  
Safety	
  Team	
  
Architecture	
  
Team	
  
Distr	
  Data	
  Mgmt	
  
&	
  Interoperabilty	
  
Use	
  Cases	
  
Team	
  
IIC	
  Steering	
  CommiFee	
   IIC	
  Staff	
  
Legal	
  
Working	
  Group	
  
Marke:ng	
  
Working	
  Group	
  
Membership	
  
Working	
  Group	
  
Security	
  
Working	
  Group	
  
Technology	
  
Working	
  Group	
  
Testbeds	
  
Working	
  Group	
  
Liaisons	
  Team	
  
IIRA	
  “Core	
  Connec1vity	
  Standard”	
  Approach	
  
•  “Core	
  connec1vity	
  
standards”	
  that	
  link	
  with	
  
“gateways”	
  
–  Delivers	
  performance	
  with	
  
flexibility	
  
–  Scales	
  linearly	
  (only	
  have	
  to	
  
map	
  each	
  “other”	
  to	
  one	
  
“core”)	
  
–  Supports	
  natural	
  security	
  
•  Choose	
  the	
  core	
  standard	
  
that	
  matches	
  system	
  needs	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
IIC	
  Security	
  Framework	
  being	
  released	
  
Being	
  voted.	
  Should	
  be	
  released	
  at	
  the	
  next	
  IIC	
  mee1ng!	
  
Confiden1al	
  -­‐	
  ©2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Security Framework 9: Protecting Communications and Connectivity
Figure 9-7: Protecting Legacy Endpoints and Communication Links Using Gateways
9.3 SECURITY MODEL AND POLICIES FOR PROTECTING COMMUNICATION2525
Various system components in IIoT systems may be owned and deployed by one entity, but
managed, maintained, or used by other entities. For example, a maintenance company must have
access to the control and instrumentation and monitoring channels of the jet engine to do
predictive maintenance. In some situations, this access takes place when the equipment is in
operation, and the operation must not be affected by such access. Once proper security policies2530
are in place, protection of transactions across software and hardware boundaries can be
enforced using technologies such as SAML, OAuth, OpenID.
Security policies are often captured formally or semi-formally using security models. A security
model specifies allowed and prohibited relationships between subjects and objects and therefore
can define security policies more concretely. For example, the security model for Linux file system2535
A	
  security	
  model	
  specifies	
  allowed	
  and	
  prohibited	
  rela1onships	
  between	
  subjects	
  and	
  objects	
  and	
  therefore	
  can	
  define	
  security	
  policies	
  more	
  
concretely.	
  For	
  example,	
  the	
  security	
  model	
  for	
  Linux	
  file	
  system	
  specifies	
  what	
  subjects	
  (i.e.	
  processes)	
  can	
  perform	
  what	
  opera1ons	
  (e.g.	
  read,	
  
write,	
  execute)	
  on	
  what	
  objects	
  (e.g.	
  files).	
  Similar	
  security	
  models	
  exist	
  for	
  IIoT	
  communica:ons	
  and	
  connec:vity	
  protocols	
  such	
  as	
  DDS.	
  
Security Framework 9: Protecting Communications and Connectivity
Figure 9-3: Example of IIoT core Communication & Connectivity Standards
9.1.4 CRYPTOGRAPHIC PROTECTION FOR DIFFERENT COMMUNICATIONS AND CONNECTIVITY PARADIGMS
Different information exchange patterns have different security requirements. Widely used
patterns in IIoT systems include request-response pattern and publish-subscribe pattern.2215
The request-response pattern can be used at any layer of the stack. Protocols using this pattern
include Java Remote Method Invocation (Java RMI), Web Services/SOAP, Remote Procedure Call
over Data Distribution Service (RPC-over-DDS), Open Platform Communication (OPC), Global
Platform Secure Channel Protocol and Modbus. They vary in their support for security; For
example, Modbus can’t suppress broadcast messages, doesn’t provide message checksums and2220
lacks support of authentication and encryption.
The primary types of threats for publish-subscribe communication pattern are unauthorized
subscription, unauthorized publication, tampering and replay and unauthorized access to
exchanged data. Some implementations of this pattern (e.g., classic MQTT and AMQP) rely on
intermediary message brokers store-and-forward messages, but the message broker could be a2225
single point of failure. An alternative approach is broker-free, peer-to-peer implementations such
as the DDS standard.
The	
  primary	
  types	
  of	
  threats	
  for	
  publish-­‐subscribe	
  communica8on	
  pa9ern	
  are	
  unauthorized	
  subscrip1on,	
  unauthorized	
  publica1on,	
  tampering	
  
and	
  replay	
  and	
  unauthorized	
  access	
  to	
  exchanged	
  data.	
  Some	
  implementa1ons	
  of	
  this	
  paYern	
  (e.g.,	
  classic	
  MQTT	
  and	
  AMQP)	
  rely	
  on	
  
intermediary	
  message	
  brokers	
  store-­‐and-­‐forward	
  messages,	
  but	
  the	
  message	
  broker	
  could	
  be	
  a	
  single	
  point	
  of	
  failure.	
  An	
  alterna:ve	
  approach	
  
is	
  broker-­‐free,	
  peer-­‐to-­‐peer	
  implementa:ons	
  such	
  as	
  the	
  DDS	
  standard.	
  
In	
  another	
  example,	
  a	
  Data	
  Distribu:on	
  
Service	
  (DDS)	
  gateway	
  oOen	
  translates	
  
informa1on	
  streams	
  at	
  an	
  applica1on/
middleware	
  level,	
  while	
  also	
  enabling	
  
secure	
  persistence,	
  secure	
  distributed	
  
logging	
  and	
  secure	
  data	
  transforma1on.	
  
How	
  does	
  a	
  common	
  
Connec1vity	
  Plaoorm	
  Work?	
  
Technology	
  
Data-­‐Distribu1on	
  Service	
  (DDS)	
  	
  
Data-­‐Centric	
  (Layered	
  Databus)	
  model	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Broadcast	
  
Publish/Subscribe	
  
Fieldbus,	
  CANbus	
  
Data-­‐Centric	
  
Publish-­‐Subscribe	
  
Data-­‐Centric,	
  DDS	
  
Layered	
  Databus	
  
Brokered	
  	
  
Publish/Subscribe	
  
Queuing	
  
Brokered	
  
ESB	
  Daemon	
  
Point-­‐to-­‐Point	
  
Client/Server	
  
TCP,	
  REST,	
  	
  WS*,	
  OPC	
  
Shared	
  Data	
  Model	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  DataBus	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
MQTT,	
  	
  XMPP,	
  AMQP	
  
Systems	
  Are	
  About	
  the	
  Data	
  
Data	
  centricity	
  enables	
  interopera1on,	
  scale,	
  integra1on	
  
	
  
	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Unstructured	
  files	
  
Database	
  
Data	
  Centricity	
   Data	
  at	
  Rest	
  
Messaging	
  middleware	
  
DataBus	
  
Data	
  Centricity	
   Data	
  in	
  Mo1on	
  
Virtual	
  Global	
  Data	
  Space	
  
Topic	
  A	
  
QoS	
  
Topic	
  C	
  
QoS	
  
Topic	
  D	
  
QoS	
  
DDS	
  DOMAIN	
  
Persistence	
  
Service	
  
Recording	
  
Service	
  
CRUD	
  opera1ons	
  
Topic	
  B	
  :	
  “Turbine	
  State”	
  
Source (Key) Speed Power Phase
WPT1 37.4 122.0 -12.20
WPT2 10.7 74.0 -12.23
WPTN 50.2 150.07 -11.98
QoS	
  
Data-­‐Centric	
  Communica1ons	
  Model	
  
•  Par:cipants	
  scope	
  the	
  global	
  data	
  space	
  (domain)	
  
•  Topics	
  define	
  the	
  data-­‐objects	
  (collec1ons	
  of	
  subjects)	
  
•  DataWriters	
  publish	
  data	
  on	
  Topics	
  
•  DataReaders	
  subscribe	
  to	
  data	
  on	
  Topics	
  
•  QoS	
  Policies	
  are	
  used	
  configure	
  the	
  system	
  
•  Listeners	
  are	
  used	
  to	
  no1fy	
  the	
  applica1on	
  of	
  events	
  
Reader	
  
“Alarm”	
  
Domain	
  
Par:cipant	
  Writer	
  
“Alarm”	
  
Domain	
  
Par:cipant	
  
Listener	
  
Offered
QoS Listener	
  
Got new
data
Requested
QoS
New
subscriber!
“Alarm”	
  Topic	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  	
  Confiden1al.	
  
Topic2	
  
Topic2	
  
Request	
  <=	
  Offered	
  
QoS	
  compa1bility	
  
checking	
  and	
  run-­‐1me	
  
monitoring	
  
Type	
  Evolu1on	
  is	
  Supported	
  (XTYPES)	
  
struct	
  Posi:on_v1	
  {	
  
	
  	
  	
  	
  double	
  la1tude;	
  
	
  	
  	
  	
  double	
  longitude;	
  
};	
  
struct	
  VehicleData_v1	
  {	
  
	
  	
  	
  	
  @key	
  long	
  vehicleID;	
  
	
  	
  	
  	
  Posi1on	
  posi1on;	
  
};	
  
struct	
  Vehicle_v2	
  {	
  
	
  	
  	
  	
  @key	
  long	
  vehicleID;	
  
	
  	
  	
  	
  string	
  model;	
  
	
  	
  	
  	
  Posi1on	
  posi1on;	
  
	
  	
  	
  	
  double	
  speed;	
  
};	
  
	
  
VehicleData_v1	
  	
  
VehicleData_v1	
  	
  
VehicleData_v2	
  	
  
Posi:on_v1	
  
Posi:on_v1	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  	
  Confiden1al.	
  
Build	
  Security	
  In	
  from	
  the	
  Start	
  with	
  DDS	
  
•  Dataflow-­‐Level	
  Security	
  
–  Control	
  r,w	
  access	
  to	
  each	
  data	
  item	
  for	
  
each	
  func1on	
  
–  Ensures	
  proper	
  dataflow	
  opera1on	
  
•  Complete	
  Protec1on	
  
–  Discovery	
  authen1ca1on	
  
–  Data-­‐centric	
  access	
  control	
  
–  Cryptography	
  
–  Tagging	
  &	
  logging	
  
–  Non-­‐repudia1on	
  
–  Secure	
  mul1cast	
  
•  No	
  code	
  changes!	
  
•  Plugin	
  architecture	
  for	
  advanced	
  uses	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  	
  
CBM	
  Analysis	
  PMU	
   Control	
   Operator	
  
State	
   Alarms	
   SetPoint	
  
Topic	
  Security	
  model:	
  
•  PMU:	
  State(w)	
  
•  CBM:	
  State(r);	
  Alarms(w)	
  
•  Control:	
  State(r),	
  SetPoint(w)	
  
•  Operator:	
  *(r),	
  Setpoint(w)	
  
Wire	
  Protocol	
  Op1mized	
  for	
  IIOT	
  
•  Peer	
  to	
  peer	
  no	
  brokers	
  or	
  servers	
  
•  Adaptable	
  QoS,	
  including	
  priori1za1on	
  
•  Reliable	
  even	
  over	
  mul1cast!	
  
•  Any	
  size	
  data	
  automa1c	
  fragmenta1on	
  
•  Automa1c	
  Discovery	
  and	
  Presence	
  without	
  
configura1on	
  
•  Decoupled	
  execu1on	
  start/stop	
  apps	
  in	
  any	
  order	
  
•  Redundant	
  sources,	
  sinks,	
  paths,	
  networks	
  
•  Efficient	
  data	
  encapsula1on	
  
•  High	
  performance	
  near-­‐na1ve	
  “wire”	
  speeds	
  
•  Scalable	
  no	
  N2	
  network	
  connec1ons	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  	
  Confiden1al.	
  
RTPS	
  
Approved	
  DDS	
  Standards	
  
	
  	
  	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  DDS	
  v	
  1.4	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  RTPS	
  v2.2	
  
DDS-­‐SECURITY	
  
DDS-­‐RPC	
  
DDS-­‐XTYPES	
  
Applica1on	
  
UDP	
   TCP*	
   DTLS**	
   TLS**	
  
DDS-­‐C++	
   DDS-­‐JAVA	
   DDS-­‐IDL-­‐C	
   DDS-­‐IDL-­‐C#	
  
SHARED-­‐	
  
	
  	
  	
  	
  	
  MEMORY**	
  
IP	
  
DDS-­‐WEB	
  
HTTP/s	
  
IDL	
  4.0	
  
How	
  is	
  IIoT	
  changing	
  Medical	
  
systems?	
  
The	
  Internet	
  Didn’t	
  Change	
  Most	
  Industries	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
1991	
   2015	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
IT	
  integra1on	
  
OT	
  device	
  
network	
  
Pervasive	
  data	
  
availability	
  
Cloud-­‐based	
  
analy1cs	
  
Core	
  
connec1vity	
  
standard	
  (DDS)	
  
Industry	
  Terminology	
  
DataBus
Disrup1on:	
  Distributed	
  Architecture	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Private	
  cloud	
  
Public	
  cloud	
  
Raw	
  
Image	
  
Secure	
  
Common	
  Plaoorms	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Revolu1on®	
  
"GE	
  Healthcare	
  chose	
  the	
  DDS	
  
standard	
  because	
  it	
  can	
  handle	
  
many	
  classes	
  of	
  intelligent	
  
machines.	
  	
  	
  
DDS	
  sa1sfies	
  the	
  demanding	
  
requirements	
  of	
  our	
  devices	
  and	
  
supports	
  standardiza1on	
  on	
  a	
  single	
  
communica1ons	
  plaoorm	
  across	
  
product	
  lines."	
  
	
  
-­‐-­‐	
  J	
  Gustavo	
  Perez,	
  General	
  Manager	
  for	
  
MI&CT	
  Engineering	
  
Disrup1on:	
  Cross-­‐Vendor	
  Interoperability	
  
•  Hospital	
  error	
  is	
  the	
  3rd	
  	
  
leading	
  cause	
  of	
  death	
  
•  The	
  Integrated	
  Clinical	
  
Environment	
  (ICE)	
  
standard	
  specifies	
  
interoperability	
  for	
  
medical	
  devices	
  
•  RTI	
  Connext	
  DDS	
  1es	
  
together	
  devices,	
  
services,	
  and	
  displays	
  
in	
  real	
  1me	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
“…	
  the	
  anesthesiologist	
  forgot	
  to	
  resume	
  ven1la1on	
  aOer	
  
separa1on	
  from	
  cardiopulmonary	
  bypass…	
  
Every	
  surgical	
  team	
  surveyed	
  has	
  experienced	
  this	
  error!	
  
How	
  is	
  IIoT	
  changing	
  	
  
Energy	
  and	
  SCADA	
  systems?	
  
Cri1cal	
  Distributed	
  Reliability	
  
•  DDS	
  controls	
  the	
  6.8	
  GW	
  GC	
  Dam	
  
–  Largest	
  power	
  plant	
  in	
  North	
  America	
  
–  Fastest-­‐responding	
  major	
  power	
  source	
  on	
  
the	
  Western	
  Grid	
  
–  Requires	
  24x7	
  opera1on	
  
•  Connext	
  DDS	
  met	
  the	
  challenges	
  
–  Extreme	
  availability	
  
–  Wide	
  area	
  communica1ons	
  
–  Mul1-­‐level	
  rou1ng	
  
–  High	
  security	
  
–  300k	
  data	
  values	
  
•  RTI	
  system	
  live	
  since	
  Jan	
  2014	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Example:	
  GDC	
  Ultra	
  Available	
  Plant	
  Control	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  	
  Confiden1al.	
  
Radar	
  
Radar	
  
Displays	
  
Migra1on	
  
Server	
  
Logging	
  
Exis1ng	
  SCADA	
  
(to	
  be	
  replaced)	
  
Alarming	
  
Monitor	
  
Interested	
  in	
  
many	
  quan11es	
  
IPC	
  
IPC	
  
IPC	
  
Segment	
  Bus	
  
Redundant	
  
Rou1ng	
  
IPC	
  
IPC	
  
IPC	
  
Segment	
  Bus	
  
IPC	
  
IPC	
  
IPC	
  
Segment	
  Bus	
  
VPN/Firewall	
  
Local	
  quan1ty	
  
interest	
  
TCP	
  (WAN)	
  
VPN/Firewall	
  VPN/Firewall	
  
Control	
  Room	
  Bus	
  
Control	
  	
  
Room	
  
Selec1ve	
  Data	
  Availability	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
•  Wind	
  turbine	
  farms	
  can	
  include	
  500	
  
turbines,	
  100m	
  blades	
  
•  Gust	
  control	
  across	
  the	
  array	
  
requires	
  fast	
  communica1ons	
  with	
  
dynamic,	
  selec1ve	
  filtering	
  
•  DDS	
  enables	
  large,	
  distributed	
  
intelligent	
  machines	
  
Large-­‐Scale	
  SCADA	
  
•  The	
  NASA	
  KSC	
  launch	
  
control	
  is	
  the	
  world’s	
  
largest	
  single-­‐system	
  
SCADA	
  
•  It	
  combines	
  300k	
  points,	
  
at	
  400k	
  msgs/sec	
  
•  RTI	
  Connext	
  DDS	
  powers	
  
launch	
  control,	
  in-­‐flight	
  
monitoring,	
  UAV	
  reentry-­‐
tracking	
  ground	
  sta1on,	
  
and	
  the	
  recovery	
  ship	
  
	
  
	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Large-­‐Scale	
  SCADA	
  
•  Sensor	
  data	
  captured	
  to	
  both	
  Recording	
  
Services	
  (for	
  forensic	
  use)	
  and	
  
Persistence	
  Service	
  (for	
  durability)	
  
•  Mul1cast	
  batching	
  from	
  1000s	
  of	
  
sensors	
  with	
  many	
  small	
  samples;	
  keeps	
  
interrupt	
  load	
  down	
  
•  Sensor	
  data	
  viewable	
  in	
  real-­‐1me	
  (aOer	
  
1me-­‐based	
  filtering)	
  on	
  the	
  HMIs	
  
•  RS-­‐RS	
  bridge	
  used	
  for	
  encrypted	
  data	
  in	
  
mo1on,	
  between	
  the	
  event	
  plaoorm	
  
and	
  control	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Real-­‐Time	
  Monitoring	
  Domain	
  
DTLS	
  Encrypted	
  Bridge	
  
Rou1ng	
  Service	
  
Recording	
  Services	
  
(across	
  mul1ple	
  nodes)	
  
HMI	
  
HMI	
  
HMI	
  
Event	
  Domain	
  (unencrypted)	
  
Recording	
  Services	
  
Sensor(s)	
  
Persistence	
  
Service	
  	
  
Persistence	
  Service	
  	
  
Event	
  Domain	
  
Event	
  Domain	
  
Event	
  Domain	
  
Event	
  Domain	
  
©	
  2014	
  RTI	
  
Prac1cal	
  Connec1vity	
  Requires	
  Normaliza1on	
  
DDS	
  
How	
  is	
  IIoT	
  changing	
  
Transporta1on	
  systems?	
  
Disrup1on:	
  Autonomy	
  
•  Autonomous	
  vehicles	
  
span	
  land,	
  sea,	
  and	
  air	
  
•  Safety	
  cer1fica1on	
  
will	
  allow	
  UAS	
  in	
  
class-­‐A	
  Na1onal	
  Air	
  
Space	
  in	
  2016	
  
•  DDS	
  enables	
  
advanced	
  reac1ve	
  
systems	
  in	
  
transporta1on	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
   Status	
  Feb	
  2016	
  
Integrate	
  Intelligence	
  
•  ADAS	
  (level	
  2)	
  
–  The	
  VW	
  Driver	
  Assistance	
  and	
  
Integrated	
  Safety	
  system	
  
combines	
  radars,	
  proximity	
  
sensors,	
  and	
  video	
  to	
  assist	
  
safe	
  opera1on	
  
–  It	
  helps	
  avoid	
  obstacles,	
  
detect	
  lane	
  departures,	
  track	
  
eye	
  ac1vity,	
  and	
  safely	
  
nego1ate	
  bends	
  
•  Autonomy	
  (level	
  4)	
  
–  The	
  V-­‐Charge	
  program	
  
demoed	
  an	
  auto-­‐charging	
  
and	
  parking	
  vehicle	
  in	
  2014	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
hYp://www.youtube.com/watch?v=7xQfKTAtyNU	
  
Plug-­‐n-­‐Play	
  Across	
  Vendors	
  
•  Audi’s	
  hardware-­‐in-­‐the-­‐loop	
  simula1on	
  feeds	
  realis1c	
  
data	
  to	
  components	
  to	
  test	
  hundreds	
  of	
  ECUs	
  
•  The	
  system	
  offers	
  plug-­‐n-­‐play	
  between	
  mul1ple	
  
vendor	
  solu1ons	
  
•  RTI	
  DDS	
  enables	
  a	
  modular	
  environment	
  that	
  scales	
  
to	
  test	
  en1re	
  vehicles	
  and	
  complex	
  scenarios	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Cloud	
  Services	
  
DDS	
  Integrates	
  All	
  Components	
  
©2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Sensing	
  
Planning	
  
Radar,	
  LIDAR	
   Vehicle	
  Plaoorm	
   Naviga1on	
  
Error	
  	
  
Management	
  
Visualiza1on	
  
Situa1on	
  Analysis	
  
Situa1on	
  Awareness	
  
Vision	
   Fusion	
  
Cameras,	
  LIDAR,	
  
Radar	
  	
  
…	
  
Data	
  Fusion	
  
Logging	
  Vehicle	
  Control	
  
Localiza1on	
  
DDS	
  Bus	
  
Traffic	
   Maps	
  
DDS	
  Bus	
  
Vehicle/Cloud/Infrastructure	
  Systems	
  
Physio-­‐Control	
  supplies	
  
emergency	
  response	
  medical	
  
equipment	
  	
  to	
  60%	
  of	
  the	
  
world’s	
  emergency	
  vehicles	
  
	
  
"Physio-­‐Control	
  is	
  u8lizing	
  
RTI	
  Connext	
  DDS	
  to	
  exchange	
  
cri8cal	
  pa8ent	
  care	
  
informa8on	
  throughout	
  the	
  
system	
  of	
  care.“	
  
	
  
-­‐-­‐	
  Dale	
  Pearson,	
  VP	
  Data	
  Solu1ons	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
We	
  envision	
  a	
  society	
  in	
  which	
  
no	
  person	
  dies	
  from	
  acute,	
  
treatable	
  medical	
  events	
  
Wide-­‐Area	
  Coordinated	
  Opera1ons	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
DDS	
  is	
  in	
  opera1on	
  at	
  Shanghai	
  PVG	
  ground	
  control	
  since	
  2015.	
  
Expanding	
  to	
  air	
  opera1ons	
  and	
  between	
  PuDong	
  and	
  Hongqiao.	
  
Future	
  expansion	
  to	
  en1re	
  South	
  East	
  China	
  region.	
  
Enable	
  UAS	
  Flight	
  in	
  Na1onal	
  Air	
  Space	
  
•  The	
  Ground	
  Based	
  Sense	
  and	
  
Avoid	
  system	
  allows	
  
autonomous	
  planes	
  in	
  US	
  
Na1onal	
  Air	
  Space	
  
–  Reposi1oning	
  
–  Training	
  &	
  tes1ng	
  
–  Disaster	
  relief	
  
–  Forest	
  monitoring	
  and	
  fire	
  
suppression	
  
•  DO178C	
  safety	
  cer1fied	
  
•  Opera1onal	
  with	
  RTI	
  Connext	
  
DDS	
  in	
  2016	
  
©	
  2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Management:	
  US	
  Army	
  UAS	
  Project	
  Office	
  
System	
  integrator:	
  SRC,	
  Inc.	
  
How	
  is	
  IIoT	
  changing	
  	
  
Ship	
  systems?	
  
Modernize	
  Ship	
  Architecture	
  
Ulstein	
  Next-­‐Gen	
  Bridge:	
  
• 360	
  degree	
  sensing	
  
• Modern	
  bridge	
  controls	
  
• Advanced	
  HMI	
  
• Redundant	
  networking	
  
• Assisted	
  maneuvering	
  
Use	
  of	
  DDS	
  Standard	
  in	
  Ship	
  control	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Real-­‐Time	
  
Analy1cs	
  &	
  
Control	
  
Operator	
  HMI	
  
Sensors	
   Actuators	
  
Comms	
  /	
  Cloud	
  
Integra1on	
  
The	
  Data	
  Distribu1on	
  Service	
  (DDS)	
  is	
  the	
  Proven	
  
Data	
  Connec1vity	
  Standard	
  for	
  the	
  IoT	
  
Any	
  language,	
  OS	
  
Extensive	
  QoS	
  
Security	
  
Peer-­‐to-­‐peer	
  
Reliable	
  
Mul1cast	
  
System	
  Scalability	
  &	
  Evolu1on	
  
•  Raytheon	
  uses	
  RTI	
  Connext	
  DDS	
  to	
  
control	
  the	
  new	
  Zumwalt	
  DDG	
  1000	
  
destroyer	
  
•  DDS	
  coordinates	
  and	
  manages	
  complex,	
  
diverse	
  onboard	
  hardware	
  and	
  soOware	
  
systems	
  
•  The	
  system	
  connects	
  hundreds	
  of	
  
computers,	
  1500	
  teams	
  building	
  
thousands	
  of	
  applica1ons,	
  and	
  more	
  
than	
  10m	
  publish-­‐subscribe	
  pairs	
  
•  Data	
  centric	
  middleware	
  extends	
  real-­‐
1me	
  scalability	
  
©	
  2016	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Summary	
  
•  The	
  IIoT	
  will	
  the	
  most	
  disrup1ve	
  
technology	
  in	
  the	
  history	
  of	
  mankind	
  
–  Huge	
  opportuni1es	
  and	
  challenges	
  
•  Real	
  value	
  is	
  a	
  common	
  architecture	
  
that	
  connects	
  sensor	
  to	
  fog	
  to	
  cloud	
  
•  The	
  IIC	
  leads	
  	
  this	
  technical	
  revolu1on	
  
•  Watch	
  for	
  IIC	
  Reference	
  Architecture,	
  
Core	
  Connec1vity	
  and	
  Security	
  
Standards	
  
©2015	
  Real-­‐Time	
  Innova1ons,	
  Inc.	
  
Find	
  out	
  more…	
  
www.r1.com	
  
community.r1.com	
  
blogs.r1.com	
  
	
  
dds.omg.org	
  
www.omg.org	
  
Thank	
  You!	
  

More Related Content

What's hot

The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...Real-Time Innovations (RTI)
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureReal-Time Innovations (RTI)
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Real-Time Innovations (RTI)
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Richard Hudson
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsReal-Time Innovations (RTI)
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)Dania Rashid
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatinabati
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 

What's hot (20)

The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The Architecture
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 

Viewers also liked

DDS Interoperability Demo 2013 (Washington DC)
DDS Interoperability Demo 2013 (Washington DC)DDS Interoperability Demo 2013 (Washington DC)
DDS Interoperability Demo 2013 (Washington DC)Gerardo Pardo-Castellote
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 
Integrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachIntegrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachRemedy IT
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Gerardo Pardo-Castellote
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryReal-Time Innovations (RTI)
 
Modernizing SCA through new Object Management Group (OMG) standards
Modernizing SCA through new Object Management Group (OMG) standardsModernizing SCA through new Object Management Group (OMG) standards
Modernizing SCA through new Object Management Group (OMG) standardsRemedy IT
 
Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsRaghu Nandy
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
Application of DDS on modular Hardware-in-the-loop test benches at Audi
Application of DDS on modular Hardware-in-the-loop test benches at AudiApplication of DDS on modular Hardware-in-the-loop test benches at Audi
Application of DDS on modular Hardware-in-the-loop test benches at AudiReal-Time Innovations (RTI)
 
Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Inductive Automation
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part IAngelo Corsaro
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability DemoAngelo Corsaro
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Ian Beckett
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingJaime Martin Losa
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robotsJaime Martin Losa
 

Viewers also liked (20)

DDS Interoperability Demo 2013 (Washington DC)
DDS Interoperability Demo 2013 (Washington DC)DDS Interoperability Demo 2013 (Washington DC)
DDS Interoperability Demo 2013 (Washington DC)
 
OMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised SubmissionOMG DDS Security. 4th Revised Submission
OMG DDS Security. 4th Revised Submission
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
Integrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachIntegrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approach
 
Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)Introduction to OMG DDS (1 hour, 45 slides)
Introduction to OMG DDS (1 hour, 45 slides)
 
OMG Data-Distribution Service Security
OMG Data-Distribution Service SecurityOMG Data-Distribution Service Security
OMG Data-Distribution Service Security
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic Surgery
 
Modernizing SCA through new Object Management Group (OMG) standards
Modernizing SCA through new Object Management Group (OMG) standardsModernizing SCA through new Object Management Group (OMG) standards
Modernizing SCA through new Object Management Group (OMG) standards
 
Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and Communications
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
Application of DDS on modular Hardware-in-the-loop test benches at Audi
Application of DDS on modular Hardware-in-the-loop test benches at AudiApplication of DDS on modular Hardware-in-the-loop test benches at Audi
Application of DDS on modular Hardware-in-the-loop test benches at Audi
 
Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
 
The DDS Tutorial - Part I
The DDS Tutorial - Part IThe DDS Tutorial - Part I
The DDS Tutorial - Part I
 
DDS Interoperability Demo
DDS Interoperability DemoDDS Interoperability Demo
DDS Interoperability Demo
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
 

Similar to DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...IRJET Journal
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 

Similar to DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT) (20)

Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 

More from Gerardo Pardo-Castellote

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed SoftwareGerardo Pardo-Castellote
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018Gerardo Pardo-Castellote
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkGerardo Pardo-Castellote
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationGerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017Gerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017Gerardo Pardo-Castellote
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Gerardo Pardo-Castellote
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Gerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsGerardo Pardo-Castellote
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)Gerardo Pardo-Castellote
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)Gerardo Pardo-Castellote
 
Web Enabled DDS - London Connext DDS Conference
Web Enabled DDS - London Connext DDS ConferenceWeb Enabled DDS - London Connext DDS Conference
Web Enabled DDS - London Connext DDS ConferenceGerardo Pardo-Castellote
 

More from Gerardo Pardo-Castellote (20)

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed Software
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
 
Overview of the DDS-XRCE specification
Overview of the DDS-XRCE specificationOverview of the DDS-XRCE specification
Overview of the DDS-XRCE specification
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
OPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 BetaOPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 Beta
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 Beta
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2
 
DDS-Security version 1.1
DDS-Security version 1.1DDS-Security version 1.1
DDS-Security version 1.1
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2
 
DDS Security Specification version 1.0
DDS Security Specification version 1.0DDS Security Specification version 1.0
DDS Security Specification version 1.0
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained Environments
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
 
Web Enabled DDS - London Connext DDS Conference
Web Enabled DDS - London Connext DDS ConferenceWeb Enabled DDS - London Connext DDS Conference
Web Enabled DDS - London Connext DDS Conference
 

Recently uploaded

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 

Recently uploaded (20)

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 

DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)

  • 1. DDS  -­‐  The  Proven  Data  Connec1vity  Standard  for   the  Industrial  IoT  (IIoT)   Gerardo  Pardo-­‐Castellote,  Ph.D.    RTI  CTO   Co-­‐chair  OMG  DDS  SIG   September  2016  
  • 2. The  Industrial  IoT  is  Smart  Machine  Infrastructure   Industrial  Internet  of  Things  (IIoT)  Consumer  Internet  of  Things  (CIoT)   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 3. Industrial  IoT  Key  System  Characteris1cs   3   •  Reliability   •  Scalability   •  Safety   •  Security   •  Resiliency   Large  scale,  heterogeneous,  built  with  mul1-­‐vendor  components,  oOen  broadly  distributed  and  evolving  
  • 4. Increased  Technical  Challenges   •  Rapid  evolu1on   •  Heterogeneous  systems     •  Complex  dataflows   •  Robustness,  Availability   •  Scalability   •  Security,  Safety,  and  Cer1fica1on   •  SoOware  dominates  a  (formerly)  mechanical  world   ©2015  Real-­‐Time  Innova1ons,  Inc.  
  • 5. The  Industry  is  facing  disrup1on   ©  2014  RTI   If you don't like change, you're going to like irrelevance even less.” - General Eric Shinseki, Chief of Staff, US Army
  • 6. IIoT  Transforma1ons   What  Drives  IIoT  Systems  across  Industries?  
  • 7. The  IIoT  Disrup1on   The real value is a common architecture that connects sensor to cloud, interoperates between vendors, and spans industries Common  technology  that  spans   industries  brings  bold  new  approaches   and  enables  fast  change   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 8. 240+  companies  strong   Goal:  build  and  prove  a  common   architecture  that  spans  sensor  to   cloud,  interoperates  between  vendors,   and  works  across  industries  
  • 9. Industrial  Internet  Consor1um  (IIC)   Testbeds   Innova:on  to  drive  new  products,   processes,  services   Technology  &  Security   Architectural  frameworks,  standards   requirements,     interoperability,  use  cases,  privacy  &   security  of  Big  Data   Community   Companies  joining  together  to  advance  innova:on,   ideas,  best  prac:ces,  thought  leadership  and   insights     The  goal  of  the  IIC  is  to  drive  innova1on  through  beYer  integra1on  of   the  physical  and  digital  worlds.   Source:  hYp://iiconsor1um.org/tx-­‐14/presenta1ons/Soley_Opening_Keynote-­‐9-­‐15-­‐14.pdf  
  • 10. 240+  Companies,  25  Countries The  IIC  Created  the  Industrial  Internet  Market   As  of  April  2016  
  • 11. ©  2014  RTI   Copyright © 2013 Appinions. All rights reserved. The Internet Of Things - An Industry Influence Study | July 2014 Copyright © 2014 Appinions Inc. All rights reserved. 0 100 200 300 400 500 600 700 800 The 10 Most Influential Internet of Things Companies Samsung announced the launch of Samsung Smart Home … Home automation with a single app. - Source: Yahoo News 04/02/2014 Apple announced partners for its HomeKit developer platform: Texas Instruments, Philips, Haier, Netatmo, Withings, Honeywell, Marvell, Osram and Broadcom. - Source: The Guardian 06/02/2014 [Google] paid $3.2bn for Nest Labs, maker of "smart home" appliances. - Source: Bdlive 04/02/2014 Vodafone announced plans to Cobra Automotive Technologies [strengthening] its hand in the M2M and connected cars. - Source: Mobile Money Live 06/16/2014 RANK NIS 1 757 Apple 2 549 Nest 3 243 Google 4 162 Intel 5 129 Microsoft 6 100 Cisco 7 94 Samsung 8 89 Vodafone 9 50 MediaTek 10 47 SecureRF Semiconductor manufacturer MediaTek today announced their latest processor platform [LinkIt] targeted at wearables and Internet of Things. - Source: Mobile Geeks 06/03/2014 7
  • 12. RTI  Named  Most  Influen1al  IIoT  Company   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 13. RTI’s  Experience   •  ~1000  Projects   –  Healthcare   –  Transporta1on   –  Communica1ons   –  Energy   –  Industrial   –  Defense   •  15+  Standards  &  Consor1a  Efforts   –  Interoperability   –  Mul1-­‐vendor  ecosystems   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 14. IIC  Organiza1on   User   Experience   Framework   Safety  Team   Architecture   Team   Distr  Data  Mgmt   &  Interoperabilty   Use  Cases   Team   IIC  Steering  CommiFee   IIC  Staff   Legal   Working  Group   Marke:ng   Working  Group   Membership   Working  Group   Security   Working  Group   Technology   Working  Group   Testbeds   Working  Group   Liaisons  Team  
  • 15. IIRA  “Core  Connec1vity  Standard”  Approach   •  “Core  connec1vity   standards”  that  link  with   “gateways”   –  Delivers  performance  with   flexibility   –  Scales  linearly  (only  have  to   map  each  “other”  to  one   “core”)   –  Supports  natural  security   •  Choose  the  core  standard   that  matches  system  needs   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 16. IIC  Security  Framework  being  released   Being  voted.  Should  be  released  at  the  next  IIC  mee1ng!   Confiden1al  -­‐  ©2016  Real-­‐Time  Innova1ons,  Inc.   Security Framework 9: Protecting Communications and Connectivity Figure 9-7: Protecting Legacy Endpoints and Communication Links Using Gateways 9.3 SECURITY MODEL AND POLICIES FOR PROTECTING COMMUNICATION2525 Various system components in IIoT systems may be owned and deployed by one entity, but managed, maintained, or used by other entities. For example, a maintenance company must have access to the control and instrumentation and monitoring channels of the jet engine to do predictive maintenance. In some situations, this access takes place when the equipment is in operation, and the operation must not be affected by such access. Once proper security policies2530 are in place, protection of transactions across software and hardware boundaries can be enforced using technologies such as SAML, OAuth, OpenID. Security policies are often captured formally or semi-formally using security models. A security model specifies allowed and prohibited relationships between subjects and objects and therefore can define security policies more concretely. For example, the security model for Linux file system2535 A  security  model  specifies  allowed  and  prohibited  rela1onships  between  subjects  and  objects  and  therefore  can  define  security  policies  more   concretely.  For  example,  the  security  model  for  Linux  file  system  specifies  what  subjects  (i.e.  processes)  can  perform  what  opera1ons  (e.g.  read,   write,  execute)  on  what  objects  (e.g.  files).  Similar  security  models  exist  for  IIoT  communica:ons  and  connec:vity  protocols  such  as  DDS.   Security Framework 9: Protecting Communications and Connectivity Figure 9-3: Example of IIoT core Communication & Connectivity Standards 9.1.4 CRYPTOGRAPHIC PROTECTION FOR DIFFERENT COMMUNICATIONS AND CONNECTIVITY PARADIGMS Different information exchange patterns have different security requirements. Widely used patterns in IIoT systems include request-response pattern and publish-subscribe pattern.2215 The request-response pattern can be used at any layer of the stack. Protocols using this pattern include Java Remote Method Invocation (Java RMI), Web Services/SOAP, Remote Procedure Call over Data Distribution Service (RPC-over-DDS), Open Platform Communication (OPC), Global Platform Secure Channel Protocol and Modbus. They vary in their support for security; For example, Modbus can’t suppress broadcast messages, doesn’t provide message checksums and2220 lacks support of authentication and encryption. The primary types of threats for publish-subscribe communication pattern are unauthorized subscription, unauthorized publication, tampering and replay and unauthorized access to exchanged data. Some implementations of this pattern (e.g., classic MQTT and AMQP) rely on intermediary message brokers store-and-forward messages, but the message broker could be a2225 single point of failure. An alternative approach is broker-free, peer-to-peer implementations such as the DDS standard. The  primary  types  of  threats  for  publish-­‐subscribe  communica8on  pa9ern  are  unauthorized  subscrip1on,  unauthorized  publica1on,  tampering   and  replay  and  unauthorized  access  to  exchanged  data.  Some  implementa1ons  of  this  paYern  (e.g.,  classic  MQTT  and  AMQP)  rely  on   intermediary  message  brokers  store-­‐and-­‐forward  messages,  but  the  message  broker  could  be  a  single  point  of  failure.  An  alterna:ve  approach   is  broker-­‐free,  peer-­‐to-­‐peer  implementa:ons  such  as  the  DDS  standard.   In  another  example,  a  Data  Distribu:on   Service  (DDS)  gateway  oOen  translates   informa1on  streams  at  an  applica1on/ middleware  level,  while  also  enabling   secure  persistence,  secure  distributed   logging  and  secure  data  transforma1on.  
  • 17. How  does  a  common   Connec1vity  Plaoorm  Work?   Technology  
  • 18. Data-­‐Distribu1on  Service  (DDS)     Data-­‐Centric  (Layered  Databus)  model   ©  2016  Real-­‐Time  Innova1ons,  Inc.   Broadcast   Publish/Subscribe   Fieldbus,  CANbus   Data-­‐Centric   Publish-­‐Subscribe   Data-­‐Centric,  DDS   Layered  Databus   Brokered     Publish/Subscribe   Queuing   Brokered   ESB  Daemon   Point-­‐to-­‐Point   Client/Server   TCP,  REST,    WS*,  OPC   Shared  Data  Model                    DataBus                       MQTT,    XMPP,  AMQP  
  • 19. Systems  Are  About  the  Data   Data  centricity  enables  interopera1on,  scale,  integra1on       ©  2016  Real-­‐Time  Innova1ons,  Inc.   Unstructured  files   Database   Data  Centricity   Data  at  Rest   Messaging  middleware   DataBus   Data  Centricity   Data  in  Mo1on  
  • 20. Virtual  Global  Data  Space   Topic  A   QoS   Topic  C   QoS   Topic  D   QoS   DDS  DOMAIN   Persistence   Service   Recording   Service   CRUD  opera1ons   Topic  B  :  “Turbine  State”   Source (Key) Speed Power Phase WPT1 37.4 122.0 -12.20 WPT2 10.7 74.0 -12.23 WPTN 50.2 150.07 -11.98 QoS  
  • 21. Data-­‐Centric  Communica1ons  Model   •  Par:cipants  scope  the  global  data  space  (domain)   •  Topics  define  the  data-­‐objects  (collec1ons  of  subjects)   •  DataWriters  publish  data  on  Topics   •  DataReaders  subscribe  to  data  on  Topics   •  QoS  Policies  are  used  configure  the  system   •  Listeners  are  used  to  no1fy  the  applica1on  of  events   Reader   “Alarm”   Domain   Par:cipant  Writer   “Alarm”   Domain   Par:cipant   Listener   Offered QoS Listener   Got new data Requested QoS New subscriber! “Alarm”  Topic   ©2015  Real-­‐Time  Innova1ons,  Inc.    Confiden1al.   Topic2   Topic2   Request  <=  Offered   QoS  compa1bility   checking  and  run-­‐1me   monitoring  
  • 22. Type  Evolu1on  is  Supported  (XTYPES)   struct  Posi:on_v1  {          double  la1tude;          double  longitude;   };   struct  VehicleData_v1  {          @key  long  vehicleID;          Posi1on  posi1on;   };   struct  Vehicle_v2  {          @key  long  vehicleID;          string  model;          Posi1on  posi1on;          double  speed;   };     VehicleData_v1     VehicleData_v1     VehicleData_v2     Posi:on_v1   Posi:on_v1   ©2015  Real-­‐Time  Innova1ons,  Inc.    Confiden1al.  
  • 23. Build  Security  In  from  the  Start  with  DDS   •  Dataflow-­‐Level  Security   –  Control  r,w  access  to  each  data  item  for   each  func1on   –  Ensures  proper  dataflow  opera1on   •  Complete  Protec1on   –  Discovery  authen1ca1on   –  Data-­‐centric  access  control   –  Cryptography   –  Tagging  &  logging   –  Non-­‐repudia1on   –  Secure  mul1cast   •  No  code  changes!   •  Plugin  architecture  for  advanced  uses   ©2015  Real-­‐Time  Innova1ons,  Inc.     CBM  Analysis  PMU   Control   Operator   State   Alarms   SetPoint   Topic  Security  model:   •  PMU:  State(w)   •  CBM:  State(r);  Alarms(w)   •  Control:  State(r),  SetPoint(w)   •  Operator:  *(r),  Setpoint(w)  
  • 24. Wire  Protocol  Op1mized  for  IIOT   •  Peer  to  peer  no  brokers  or  servers   •  Adaptable  QoS,  including  priori1za1on   •  Reliable  even  over  mul1cast!   •  Any  size  data  automa1c  fragmenta1on   •  Automa1c  Discovery  and  Presence  without   configura1on   •  Decoupled  execu1on  start/stop  apps  in  any  order   •  Redundant  sources,  sinks,  paths,  networks   •  Efficient  data  encapsula1on   •  High  performance  near-­‐na1ve  “wire”  speeds   •  Scalable  no  N2  network  connec1ons   ©2015  Real-­‐Time  Innova1ons,  Inc.    Confiden1al.   RTPS  
  • 25. Approved  DDS  Standards                                                                        DDS  v  1.4                                                              RTPS  v2.2   DDS-­‐SECURITY   DDS-­‐RPC   DDS-­‐XTYPES   Applica1on   UDP   TCP*   DTLS**   TLS**   DDS-­‐C++   DDS-­‐JAVA   DDS-­‐IDL-­‐C   DDS-­‐IDL-­‐C#   SHARED-­‐            MEMORY**   IP   DDS-­‐WEB   HTTP/s   IDL  4.0  
  • 26. How  is  IIoT  changing  Medical   systems?  
  • 27. The  Internet  Didn’t  Change  Most  Industries   ©  2016  Real-­‐Time  Innova1ons,  Inc.   1991   2015  
  • 28. ©  2016  Real-­‐Time  Innova1ons,  Inc.   IT  integra1on   OT  device   network   Pervasive  data   availability   Cloud-­‐based   analy1cs   Core   connec1vity   standard  (DDS)   Industry  Terminology  
  • 29. DataBus Disrup1on:  Distributed  Architecture   ©  2016  Real-­‐Time  Innova1ons,  Inc.   Private  cloud   Public  cloud   Raw   Image   Secure  
  • 30. Common  Plaoorms   ©  2016  Real-­‐Time  Innova1ons,  Inc.   Revolu1on®   "GE  Healthcare  chose  the  DDS   standard  because  it  can  handle   many  classes  of  intelligent   machines.       DDS  sa1sfies  the  demanding   requirements  of  our  devices  and   supports  standardiza1on  on  a  single   communica1ons  plaoorm  across   product  lines."     -­‐-­‐  J  Gustavo  Perez,  General  Manager  for   MI&CT  Engineering  
  • 31. Disrup1on:  Cross-­‐Vendor  Interoperability   •  Hospital  error  is  the  3rd     leading  cause  of  death   •  The  Integrated  Clinical   Environment  (ICE)   standard  specifies   interoperability  for   medical  devices   •  RTI  Connext  DDS  1es   together  devices,   services,  and  displays   in  real  1me   ©2015  Real-­‐Time  Innova1ons,  Inc.   “…  the  anesthesiologist  forgot  to  resume  ven1la1on  aOer   separa1on  from  cardiopulmonary  bypass…   Every  surgical  team  surveyed  has  experienced  this  error!  
  • 32. How  is  IIoT  changing     Energy  and  SCADA  systems?  
  • 33. Cri1cal  Distributed  Reliability   •  DDS  controls  the  6.8  GW  GC  Dam   –  Largest  power  plant  in  North  America   –  Fastest-­‐responding  major  power  source  on   the  Western  Grid   –  Requires  24x7  opera1on   •  Connext  DDS  met  the  challenges   –  Extreme  availability   –  Wide  area  communica1ons   –  Mul1-­‐level  rou1ng   –  High  security   –  300k  data  values   •  RTI  system  live  since  Jan  2014   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 34. Example:  GDC  Ultra  Available  Plant  Control   ©2015  Real-­‐Time  Innova1ons,  Inc.    Confiden1al.   Radar   Radar   Displays   Migra1on   Server   Logging   Exis1ng  SCADA   (to  be  replaced)   Alarming   Monitor   Interested  in   many  quan11es   IPC   IPC   IPC   Segment  Bus   Redundant   Rou1ng   IPC   IPC   IPC   Segment  Bus   IPC   IPC   IPC   Segment  Bus   VPN/Firewall   Local  quan1ty   interest   TCP  (WAN)   VPN/Firewall  VPN/Firewall   Control  Room  Bus   Control     Room  
  • 35. Selec1ve  Data  Availability   ©  2016  Real-­‐Time  Innova1ons,  Inc.   •  Wind  turbine  farms  can  include  500   turbines,  100m  blades   •  Gust  control  across  the  array   requires  fast  communica1ons  with   dynamic,  selec1ve  filtering   •  DDS  enables  large,  distributed   intelligent  machines  
  • 36. Large-­‐Scale  SCADA   •  The  NASA  KSC  launch   control  is  the  world’s   largest  single-­‐system   SCADA   •  It  combines  300k  points,   at  400k  msgs/sec   •  RTI  Connext  DDS  powers   launch  control,  in-­‐flight   monitoring,  UAV  reentry-­‐ tracking  ground  sta1on,   and  the  recovery  ship       ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 37. Large-­‐Scale  SCADA   •  Sensor  data  captured  to  both  Recording   Services  (for  forensic  use)  and   Persistence  Service  (for  durability)   •  Mul1cast  batching  from  1000s  of   sensors  with  many  small  samples;  keeps   interrupt  load  down   •  Sensor  data  viewable  in  real-­‐1me  (aOer   1me-­‐based  filtering)  on  the  HMIs   •  RS-­‐RS  bridge  used  for  encrypted  data  in   mo1on,  between  the  event  plaoorm   and  control   ©  2016  Real-­‐Time  Innova1ons,  Inc.   Real-­‐Time  Monitoring  Domain   DTLS  Encrypted  Bridge   Rou1ng  Service   Recording  Services   (across  mul1ple  nodes)   HMI   HMI   HMI   Event  Domain  (unencrypted)   Recording  Services   Sensor(s)   Persistence   Service     Persistence  Service     Event  Domain   Event  Domain   Event  Domain   Event  Domain  
  • 39. Prac1cal  Connec1vity  Requires  Normaliza1on   DDS  
  • 40. How  is  IIoT  changing   Transporta1on  systems?  
  • 41. Disrup1on:  Autonomy   •  Autonomous  vehicles   span  land,  sea,  and  air   •  Safety  cer1fica1on   will  allow  UAS  in   class-­‐A  Na1onal  Air   Space  in  2016   •  DDS  enables   advanced  reac1ve   systems  in   transporta1on   ©2015  Real-­‐Time  Innova1ons,  Inc.  
  • 42. ©2015  Real-­‐Time  Innova1ons,  Inc.   Status  Feb  2016  
  • 43. Integrate  Intelligence   •  ADAS  (level  2)   –  The  VW  Driver  Assistance  and   Integrated  Safety  system   combines  radars,  proximity   sensors,  and  video  to  assist   safe  opera1on   –  It  helps  avoid  obstacles,   detect  lane  departures,  track   eye  ac1vity,  and  safely   nego1ate  bends   •  Autonomy  (level  4)   –  The  V-­‐Charge  program   demoed  an  auto-­‐charging   and  parking  vehicle  in  2014   ©2015  Real-­‐Time  Innova1ons,  Inc.   hYp://www.youtube.com/watch?v=7xQfKTAtyNU  
  • 44. Plug-­‐n-­‐Play  Across  Vendors   •  Audi’s  hardware-­‐in-­‐the-­‐loop  simula1on  feeds  realis1c   data  to  components  to  test  hundreds  of  ECUs   •  The  system  offers  plug-­‐n-­‐play  between  mul1ple   vendor  solu1ons   •  RTI  DDS  enables  a  modular  environment  that  scales   to  test  en1re  vehicles  and  complex  scenarios   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 45. Cloud  Services   DDS  Integrates  All  Components   ©2016  Real-­‐Time  Innova1ons,  Inc.   Sensing   Planning   Radar,  LIDAR   Vehicle  Plaoorm   Naviga1on   Error     Management   Visualiza1on   Situa1on  Analysis   Situa1on  Awareness   Vision   Fusion   Cameras,  LIDAR,   Radar     …   Data  Fusion   Logging  Vehicle  Control   Localiza1on   DDS  Bus   Traffic   Maps   DDS  Bus  
  • 46. Vehicle/Cloud/Infrastructure  Systems   Physio-­‐Control  supplies   emergency  response  medical   equipment    to  60%  of  the   world’s  emergency  vehicles     "Physio-­‐Control  is  u8lizing   RTI  Connext  DDS  to  exchange   cri8cal  pa8ent  care   informa8on  throughout  the   system  of  care.“     -­‐-­‐  Dale  Pearson,  VP  Data  Solu1ons   ©  2016  Real-­‐Time  Innova1ons,  Inc.   We  envision  a  society  in  which   no  person  dies  from  acute,   treatable  medical  events  
  • 47. Wide-­‐Area  Coordinated  Opera1ons   ©  2016  Real-­‐Time  Innova1ons,  Inc.   DDS  is  in  opera1on  at  Shanghai  PVG  ground  control  since  2015.   Expanding  to  air  opera1ons  and  between  PuDong  and  Hongqiao.   Future  expansion  to  en1re  South  East  China  region.  
  • 48. Enable  UAS  Flight  in  Na1onal  Air  Space   •  The  Ground  Based  Sense  and   Avoid  system  allows   autonomous  planes  in  US   Na1onal  Air  Space   –  Reposi1oning   –  Training  &  tes1ng   –  Disaster  relief   –  Forest  monitoring  and  fire   suppression   •  DO178C  safety  cer1fied   •  Opera1onal  with  RTI  Connext   DDS  in  2016   ©  2015  Real-­‐Time  Innova1ons,  Inc.   Management:  US  Army  UAS  Project  Office   System  integrator:  SRC,  Inc.  
  • 49. How  is  IIoT  changing     Ship  systems?  
  • 50. Modernize  Ship  Architecture   Ulstein  Next-­‐Gen  Bridge:   • 360  degree  sensing   • Modern  bridge  controls   • Advanced  HMI   • Redundant  networking   • Assisted  maneuvering  
  • 51. Use  of  DDS  Standard  in  Ship  control   ©  2016  Real-­‐Time  Innova1ons,  Inc.   Real-­‐Time   Analy1cs  &   Control   Operator  HMI   Sensors   Actuators   Comms  /  Cloud   Integra1on   The  Data  Distribu1on  Service  (DDS)  is  the  Proven   Data  Connec1vity  Standard  for  the  IoT   Any  language,  OS   Extensive  QoS   Security   Peer-­‐to-­‐peer   Reliable   Mul1cast  
  • 52. System  Scalability  &  Evolu1on   •  Raytheon  uses  RTI  Connext  DDS  to   control  the  new  Zumwalt  DDG  1000   destroyer   •  DDS  coordinates  and  manages  complex,   diverse  onboard  hardware  and  soOware   systems   •  The  system  connects  hundreds  of   computers,  1500  teams  building   thousands  of  applica1ons,  and  more   than  10m  publish-­‐subscribe  pairs   •  Data  centric  middleware  extends  real-­‐ 1me  scalability   ©  2016  Real-­‐Time  Innova1ons,  Inc.  
  • 53. Summary   •  The  IIoT  will  the  most  disrup1ve   technology  in  the  history  of  mankind   –  Huge  opportuni1es  and  challenges   •  Real  value  is  a  common  architecture   that  connects  sensor  to  fog  to  cloud   •  The  IIC  leads    this  technical  revolu1on   •  Watch  for  IIC  Reference  Architecture,   Core  Connec1vity  and  Security   Standards   ©2015  Real-­‐Time  Innova1ons,  Inc.  
  • 54. Find  out  more…   www.r1.com   community.r1.com   blogs.r1.com     dds.omg.org   www.omg.org