prismtech vortex 2.0 the industrial internet of things platform
TRANSCRIPT
AngeloCorsaro,PhDChiefTechnologyOfficer
2.0The Industrial Internet of Things Platform
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiarynews
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryacquires
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
As part of ADLINK will have the the resources and scale to exploit the full potential of the Vortex in Industrial IoT (IIoT) markets.
You will see PrismTech becoming stronger, larger and able to better compete globally.
You will also start to see, later in 2016, new leading-edge IIoT system products emerging from the combination of PrismTech’s software and ADLINK’s hardware technologies.
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This acquisition reinforces the traction and relevance of the DDS Standard in IIoT.
The combination of ADLINK’s and PrismTech’s strengths offers a tremendous opportunity to combine software and hardware into system-level solutions embracing the edge, mobile, network and data center.
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices
in151 Characters
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
at a Glance2.0
Plenty of Vortex Devices goodies, including new APIs, new features and
improved performances
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
at a Glance2.0
More Integration with analytics, IoT and Web
technologies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
at a Glance2.0
Extended and Improved Tooling for monitoring, management, testing,
record and playback
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
at a Glance2.0
Fog Computing Support
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
at a Glance2.0
Data-Centric Security
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Updated ISO-C++ with increased usability and support for C++11 lambdas
Google Protocol Buffer support for topic type declaration
Full support for coherent-updates
Improved performance and transparent compression for durable data
6.6.0
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed using different syntaxes,
including IDL and ProtoBuf
Google Protocol Buffers
message ShapeType { option (.omg.dds.type) = {name: "ShapeType"}; required string color = 0 [(.omg.dds.member).key = true]; required long x = 1; required long y = 2; required long shapesize = 3; }
struct ShapeType { string color; long x; long y; long shapesize; }; #pragma keylist ShapeType color
IDL
ProtoBuf
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.0.0
Support for 40+ platforms including Windows, Linux, MacOS, ElinOS, VxWorks, and QNX
Updated ISO-C++ with increased usability and support for C++11 lambdas
Full Durability support including Transient and Persistent Data
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
2.2.0
Support for Python Scripting (via Jython)
Extended support for X.509 certificates and CA hierarchies
Extended Unicast-only discovery to facilitate configuration in non-multicast enabled environments
Improved throughput
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration
Native Integration with the hottest real-time analytics
platforms and CEP Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
Integration with the popular Node-RED framework
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
Integration with mainstream Dashboard Technologies
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryFog Computing
Vortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Transparently and dynamically integrates a Fog subsystems while mediating transport protocols and isolating application from dynamics exposed by different networks
Controls the topic exposed by a Fog subsystem
Defines a security boundary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
1.3.1
Data leaves a Fog subsystem only if remote interest is discovered — through dynamic discovery.
Applications within a Fog cannot tell if they are communicating with local or remote applications. These applications believe that they always communicate “locally”
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
location transparency
Cloud Computing
Fog Computing
Device-to-Cloud Communication
Device-to-Device Communication
Fog-to-Cloud Communication
Cloud-to-Cloud Communication
Device-to-Device Communication
Collect | Store | Analyse | Share
Collect | Store | Analyse | Share
Fog Computing
Fog Computing
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car
Café and Web are typically used Android / HTML5 based infotainment
Lite in typically used in ECU, sensors and onboard analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car
Vortex Fog also helps defining security boundaries and policies
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and securely deals with car to car communication
Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols
Device-to-Cloud Communication
Cloud Analytics
Fog AnalyticsFog Analytics
Fog Analytics
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale
Cloud Analytics
Fog AnalyticsFog Analytics
Fog Analytics
Device-to-Cloud Communication
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security
SecureData-Level security with Pluggable Authentication Access Control and Crypto
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
Default Plug-insX.509 Public Key
Infrastructure (PKI) based authentication
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
Default Plug-insAccess Control List
available at a trusted/authenticated URI
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
Default Plug-ins
Crypto based on TLS Cipher Suite
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
infra
stru
ctur
esd
k
SecureData-Security as opposed to simply Transport-Level
security
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,BX
*
*
A,B,C
Identity Access RightsSessions are authenticated and communication is encrypted
Only the Topic included as part of the access rights are visible and accessible
SecureFine-grained access control over Partition/Topic regular
expressions
Arthur Dent
Arthur Dent
Ford Prefect
Zaphod Beeblebrox
Marvin
Trillian
left/A(r,w), left/B(r)
left/A(r,w), left/B(r,w), left/X(r)
left/*(r,w)
left/*(r), right/(w)
left/A(r,w), left/B(r,w), right/C(r,w)
Ford Prefect
Zaphod Beeblebrox
Trillian
Marvin
A
B
A,BX
*
*
A,B,C
Identity Access RightsSessions are authenticated and communication is encrypted
Only the Topic included as part of the access rights are visible and accessible
Boundary SecurityBoundary security support is
enabled by Vortex-Fog
Device-to-Cloud Communication
Peer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
Access Control
Boundary SecuritySeparates security concerns at
different scales and controls what information is exposed
Device-to-Cloud Communication
Peer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Data-Centric Security Management
&Configuration
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate Management
Certificate Authority (CA) hierarchies are supported
to facilitate certificate management
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Certificate/Key Management
ToolEases the creation of Certificate Authorities hierarchies as well as
service and device certificates
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud Communication
Peer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
Applications belonging to the same Fog subsystem
share the same identity and the same access rights
Access Control
Fog Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Device-to-Cloud Communication
Peer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
So long as the Fog CA is trusted the Fog instance will be trusted to join the
Vortex infrastructure.
Access Control
Fog Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
Access control for an entire Fog can be easily
controlled by defining rules for either a “Cluster
Subject Name” or a “Cluster Id”
Fog Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
Each device can have its own identity or identities can be shared per “security-level”
Access Control
Device-to-Cloud CommunicationDevice
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less)
Device-to-Device Communication
Fog Computing Fog ComputingFog Computing
TLS
TLS
So long as the device’s CA is trusted the device will be
trusted.
Access Control
Device-to-Cloud CommunicationDevice
Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryDevices access control can
be defined using a specific certificate name or
a regular expression on the subject name
Device Access Control
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiaryDemo
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
This slides have been crafted by Angelo Corsaro
Any use of these slides that does include me as Author/Co-Author is plagiary
at a Glance2.0
Vortex 2.0 is the most advanced data-sharing infrastructure for IoT and IIoT applications available on the market
It has off-the-shelf support for Fog Computing, Data-Level Security, integration with Analytics, and extremely high performance