SlideShare a Scribd company logo
1 of 30
MilSOFT DDS Middleware


Copyright © MilSOFT,Turkey
                        UNCLASSIFIED        1
Outline

• Introduction
• MilSOFT DDS
    • Features
    • Architecture
    • RTPS
• Tools
    • DDS Code Generator
    • DDS SPY
    • DDS Tester
• Performance Results
• DDS Applications
• Conclusion



Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   2
Introduction - Technical Expertise and Capabilities
                     C4I
                           Tactical Data Links
                                 Link 1, Link 11, Link 16, Link 22
                           Naval Combat Management Systems
                           Air Defense Systems
                           Mission Planning Systems
                           Message Handling and Formatted Messages
                                 NATO AdatP-3, US OTH-G, ITU 1371 AIS, NMEA 0183
                           Tactical and Strategical Level C2 Information Systems
                     Electronic Warfare
                           EW Operational Support Centers
                           EW Pre Mission & Post Mission Support Software
                           EW Database Management Systems
                           EW System Test and Evaluation
                           Threat and Jamming Tech. Analysis
                     Image Exploitation Systems
                     Embedded Systems
                           Mission Computer Software
                           Maintenance Data Computer Software
                           Flight Test Instrumentation System
                           SW Development & Verification per DO-178B for FAA Certification
                     Simulation and Modeling
                     Homeland Security & Emergency Management Systems
                     HW Manufacturing Through Subcontract Management
Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                          3
Introduction-DDS Implementation History

  • Initially started as a part of Gemkomsis CMS development
     •   R&D project started in 2004
     •   Supported by Turkish Research and Development Institute
     •   CMS based on OMG standards & OACE
     •   Common services and functions for naval platforms
     •   DDS as middleware


  • MilSOFT DDS continues as a product line

  • OACE Computing environment (including DDS) finds its use
    in multiple projects
     • Turkish Coast Guard SAR Ship CMS
     • Multilink Data link Processor
     • UAV Image Exploitation system



Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                               4
MilSOFT DDS
  •   Started with DDS specification 1.0 adopted version
  •   Current version compatible with DDS specification version 1.2
  •   C++ API for applications
  •   RTPS




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                  5
MilSOFT DDS Implemented Features
  • Minimum Profile (Complete)
     • Minimum profile contains just the mandatory features of the DCPS layer.
       None of the optional features are included.
  • Persistence Profile (Complete)
     • Persistency profile is completely implemented. Durability service is
       designed to be fault tolerant.
  • Content Subscription Profile (Partially Implemented)
     • ContentFilteredTopic and QueryCondition features have been
       implemented. MultiTopic has not been implemented yet.
  • Ownership Profile (Partially Implemented)
     • Only History QoS with depth > 0 feature has been implemented.
  • Object Model Profile (Not Implemented)
     • Contains DLRL and Presentation QoS access_scope = GROUP




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                          6
MilSOFT DDS Architecture
  • Applications use DDS as library
     • No shared memory or DDS service per node
     • Completely decentralized
  • RTPS implemented as the underlying communication protocol
     • DDS Interoperability wire-protocol
  • High performance
  • Zero-copy
  • No dynamic resource (memory, thread, etc) allocation after
    initialization
  • Multicast address per topic concept




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                             7
MilSOFT DDS Middleware




        More information on http://dds.milsoft.com.tr
Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                    8
What Is RTPS?
  • DDS interoperability wire protocol
       • Real-Time Publish Subscribe (RTPS)
  •   Adopted by OMG in June 2006
  •   MilSOFT started to develop RTPS from draft versions
  •   Runs over multicast and connectionless best-effort transports
  •   Current MilSOFT DDS implements RTPS over UDP




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                  9
DDS Tools

  • MilSOFT DDS Automatic Code Generator
  • MilSOFT DDS SPY
  • MilSOFT DDS Tester




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED       10
DDS Automatic Code Generator

  • Definition of DDS types
  • IDL like interface data stored into XML file
  • Generation of type specific files (FooTypeSupport,
    FooDataReader, FooDataWriter)
     • From DDS Code Generator GUI
     • From command line using XML file (for automatic builds)




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                             11
DDS Automatic Code Generator




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   12
DDS Automatic Code Generator
  • Generating middleware specific code using DDS Automatic
    Code Generator has the following benefits:
     • Application developers do not need to know programming details of
       DDS API
     • Tool usage speeds up software development as major code is
       generated by tool
     • It eliminates errors generated while implementing middleware interface
     • It ensures type consistency and interface control through the project
     • Easy management of system internal interfaces from configuration
       control point of view




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                      13
DDS Automatic Code Generator




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   14
DDS SPY-Display Data

  • Listens network and displays DDS related information
      •   Participating applications to specific DDS
      •   Topics each application publishes or subscribes
      •   Data itself
  • User selectable listening mechanism
      •   Auto
      •   Manual
  •Shows data in multiple views
      •   Current snapshot of the topic
      •   All historical data




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                        15
DDS SPY-Display Data




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   16
DDS SPY-Inject DDS Data

  • Injects data into selected DDS domain
     •   Copy-Paste previously transmitted data and retransmit
     •   User can import MS Excel file for data or copy-paste from MS Excel file.
  • Send more than one topic simultaneously with timestamps
  • Great tool for system integration and testing




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                17
DDS SPY-Inject DDS Data




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   18
MilSOFT DDS Tester

 • Automated test tool for applications communicating over DDS
   middleware
 • Allows definition of test suites and test cases
 • Send and receive topic data to/from middleware
 • Compare test results with excepted results and show them as
   highlighted
 • Show test results (failed tests, successful tests)




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                       19
MilSOFT DDS Tester




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   20
MilSOFT DDS Performance Test Results
  • Test environment
     • 2 computers with Intel Xeon 3.0 Ghz processors.
     • Fedora Linux 4
     • Gigabit ethernet switch
  • Test 1: Latency
     • Ping (Message_size)/pong time(message_size)/2
         • ~125 microsecond for best effort @ 1K message size
         • ~160 microsecond for reliable @ 1K message size

  • Test2: Round trip with 4 byte ACK
     • Ping different message sizes pong is always 4 bytes
         • ~230 microsecond for best effort @ 1K message size
         • ~310 microsecond for reliable @ 1 K message size

  • Test3: Throughput
     • Measure data size received in one second
         • ~26.5 MB @ 1K message size




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                            21
MilSOFT DDS Applications

  • Middleware for CMS, UAV and DLIP product lines

     • GEMKOMSIS CMS
         • Single middleware for handling all communication
         • RM and common services on top of DDS


     • UAV Video Exploitation System
         • Stream data/video over DDS middleware


     • CAVLIS
         • Multilink DLIP




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                          22
Conclusion

• MilSOFT DDS
   •   Developed using mature CMMI-5 processes
   •   Fully compliant to standard
   •   Successfully used/tested in multiple C2 projects
   •   Ready for utilization in projects




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                      23
BACKUP SLIDES




  • BACKUP SLIDES




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED   24
RTPS implementation - Design Decisions
  • Used UDP protocol for message exchange
     • Other protocols like Shared Memory or TCP can be adopted
  • IP multicast for transmission to multiple subscribers
  • Dynamic discovery of RTPS endpoints
     • Implemented using DDS BuiltinTopics
     • No centralized service for discovery
  • Listener interface over RTPS
     • Separate RTPS from DDS implementation
  • Zero copy support
     • No copy of data once it’s in RTPS buffers
     • Users can access the data without copying using DDS API




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                              25
Quality Attributes Addressed by MilSOFT DDS
• Performance
   •   High performance publish-subscribe based DDS middleware
   •   Multicast based data distribution with DDS
   •   Zero-copy and no-dynamic resource allocation implementation
• Reliability
• Modifiability / Scalability
   •   Layered architecture
        •   Middleware separates application logic from computing resources
   •   Data driven publish/subscribe system enables
        •   No component interdependencies
        •   New component additions without changing other components

• Availability
   •   Fault Recovery
        •   DDS Durability Service (transient and persistent data)
        •   Liveliness QoS

• Testability
   •   DDS Spy as test and diagnostic tool
        •   Capture and display data
        •   Retransmit data for testing

Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                          26
DDS in GEMKOMSIS CMS
  • Single standards based middleware for CMS data distribution
     • Resource Manager over DDS
         • Compatible with OMG AMSM specification
     • Alarm Manager over DDS
         • Compatible with OMG ALMAS specification effort
     • Debug Log Framework
         • Collection of log information to centralized location or maintenance application over
           DDS
         • Even use DDS SPY for displaying log information
     • Record Replay over DDS
         • Training
         • Post-mission analysis

  • Multiple worlds using DDS domains
     • Real-world
     • Simulation world




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                           27
Two Host Average Latency
                                                                 TwoHosts,
                                                         Avg. Latency vs Packet Size


                                   10000
     Avg. Latency (Microseconds)




                                   1000



                                                                                                        Best-Effort-ZeroCopy
                                                                                                        Best-Effort-Copy
                                                                                                        Reliable-ZeroCopy



                                    100




                                     10
                                           10   100          1000                      10000   100000
                                                      Packet Size (Bytes)




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                                                28
Round Trip Time with 4 bytes ACK
                                                                                          TwoHosts,
                                                                         Round-Trip Time vs Packet Size ( 4 Byte Reply )

                                                        900


                                                        800
    Round-Trip time for 4 Byte Reply ( microseconds )




                                                        700


                                                        600


                                                        500                                                                         BestEffort-Copy
                                                                                                                                    BestEffort-ZeroCopy
                                                        400                                                                         Reliable-ZeroCopy


                                                        300


                                                        200


                                                        100


                                                          0
                                                              10   100                 1000                 10000          100000
                                                                                Packet Size (Bytes)




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                                                                      29
Throughput
                                                      Throughput vs Packet Size

                        1000000




                         100000
  Throughput (KB/sec)




                                                                                           OneSubscriber
                                                                                           TwoSubscribers, Subscriber #1
                          10000                                                            TwoSubscribers, Subscriber #2




                           1000




                            100
                                  10   100          1000              10000       100000
                                             Packet Size (Bytes)




Copyright © MilSOFT,Turkey
                        UNCLASSIFIED                                                                               30

More Related Content

What's hot

gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
Anne Starr
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
Videoguy
 
Nebulas Solutions Group | R75 Event
Nebulas Solutions Group | R75 EventNebulas Solutions Group | R75 Event
Nebulas Solutions Group | R75 Event
nebulassolutions
 

What's hot (19)

Tele Eye Rxv3
Tele Eye Rxv3Tele Eye Rxv3
Tele Eye Rxv3
 
MIPI DevCon 2016: MIPI DisCo and ACPI - Streamlining MIPI Component Integration
MIPI DevCon 2016: MIPI DisCo and ACPI - Streamlining MIPI Component IntegrationMIPI DevCon 2016: MIPI DisCo and ACPI - Streamlining MIPI Component Integration
MIPI DevCon 2016: MIPI DisCo and ACPI - Streamlining MIPI Component Integration
 
What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
 
Utilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack VulnerabilityUtilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack Vulnerability
 
Ok Labs Webinar Android Migration At The Speed Of Light
Ok Labs Webinar Android Migration At The Speed Of LightOk Labs Webinar Android Migration At The Speed Of Light
Ok Labs Webinar Android Migration At The Speed Of Light
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
Plan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certificationPlan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certification
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
Software Network Data Plane - Satisfying the need for speed - FD.io - VPP and...
 
Insights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service DiscoveryInsights on the configuration and performances of SOME/IP Service Discovery
Insights on the configuration and performances of SOME/IP Service Discovery
 
Dpdk Validation - Liu, Yong
Dpdk Validation - Liu, YongDpdk Validation - Liu, Yong
Dpdk Validation - Liu, Yong
 
Tail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCATail f Systems Whitepaper - Top Ten Management Issues for ATCA
Tail f Systems Whitepaper - Top Ten Management Issues for ATCA
 
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
 
Module 1: ConfD Technical Introduction
Module 1: ConfD Technical IntroductionModule 1: ConfD Technical Introduction
Module 1: ConfD Technical Introduction
 
XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018XPDDS18: Xen Project Weather Report 2018
XPDDS18: Xen Project Weather Report 2018
 
Nebulas Solutions Group | R75 Event
Nebulas Solutions Group | R75 EventNebulas Solutions Group | R75 Event
Nebulas Solutions Group | R75 Event
 
A Path to NFV/SDN - Intel. Michael Brennan, INTEL
A Path to NFV/SDN - Intel. Michael Brennan, INTELA Path to NFV/SDN - Intel. Michael Brennan, INTEL
A Path to NFV/SDN - Intel. Michael Brennan, INTEL
 

Viewers also liked

Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
Lounge47
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
Angelo Corsaro
 

Viewers also liked (10)

What Does Interoperability Mean for the IoT?
What Does Interoperability Mean for the IoT?What Does Interoperability Mean for the IoT?
What Does Interoperability Mean for the IoT?
 
Connecting Cars with IoT MQTT Feb 6 2014 - Joe Speed @mobilebit
Connecting Cars with IoT MQTT Feb 6 2014 - Joe Speed @mobilebitConnecting Cars with IoT MQTT Feb 6 2014 - Joe Speed @mobilebit
Connecting Cars with IoT MQTT Feb 6 2014 - Joe Speed @mobilebit
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
DDS and XMPP
DDS and XMPPDDS and XMPP
DDS and XMPP
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
 

Similar to Dds presentation brussels

Dds presentation omg
Dds presentation omgDds presentation omg
Dds presentation omg
milsoftSDC
 
Milsoft dds overview
Milsoft dds overviewMilsoft dds overview
Milsoft dds overview
milsoftSDC
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
Cisco Russia
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
Srinivasa Addepalli
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Ryo Jin
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
mfrancis
 

Similar to Dds presentation brussels (20)

Dds presentation omg
Dds presentation omgDds presentation omg
Dds presentation omg
 
Video overdds
Video overddsVideo overdds
Video overdds
 
Milsoft dds overview
Milsoft dds overviewMilsoft dds overview
Milsoft dds overview
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
 
Fiware: Connecting to robots
Fiware: Connecting to robotsFiware: Connecting to robots
Fiware: Connecting to robots
 
DDS Enabling Open Architecture
DDS Enabling Open ArchitectureDDS Enabling Open Architecture
DDS Enabling Open Architecture
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018Fast RTPS Workshop at FIWARE Summit 2018
Fast RTPS Workshop at FIWARE Summit 2018
 
MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...
MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...
MBSE meets Industrial IoT: Introducing the New MagicDraw Plug-in for RTI Co...
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
QoS for Media Networks
QoS for Media NetworksQoS for Media Networks
QoS for Media Networks
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
 
Fiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPSFiware - communicating with ROS robots using Fast RTPS
Fiware - communicating with ROS robots using Fast RTPS
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfZephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
 

More from milsoftSDC

Mil soft company_overview_2013
Mil soft company_overview_2013Mil soft company_overview_2013
Mil soft company_overview_2013
milsoftSDC
 
Mil soft sunum 2013
Mil soft sunum 2013Mil soft sunum 2013
Mil soft sunum 2013
milsoftSDC
 
Mil intel generic-short-eng
Mil intel generic-short-engMil intel generic-short-eng
Mil intel generic-short-eng
milsoftSDC
 
Mil intel generic-short-tr
Mil intel generic-short-trMil intel generic-short-tr
Mil intel generic-short-tr
milsoftSDC
 
Mil intel generic-short-eng
Mil intel generic-short-engMil intel generic-short-eng
Mil intel generic-short-eng
milsoftSDC
 
Mil imadis generic-short-tr
Mil imadis generic-short-trMil imadis generic-short-tr
Mil imadis generic-short-tr
milsoftSDC
 
Mil imadis generic-short-eng
Mil imadis generic-short-engMil imadis generic-short-eng
Mil imadis generic-short-eng
milsoftSDC
 
Mil soft sunum 2012 agustos
Mil soft sunum 2012 agustosMil soft sunum 2012 agustos
Mil soft sunum 2012 agustos
milsoftSDC
 
Usmos mil soft_dds_makale
Usmos mil soft_dds_makaleUsmos mil soft_dds_makale
Usmos mil soft_dds_makale
milsoftSDC
 
Mil soft company overview 2012 v2
Mil soft company overview 2012 v2Mil soft company overview 2012 v2
Mil soft company overview 2012 v2
milsoftSDC
 
Mil soft jets jetsim
Mil soft jets jetsimMil soft jets jetsim
Mil soft jets jetsim
milsoftSDC
 
Gemkomsis 2012
Gemkomsis 2012Gemkomsis 2012
Gemkomsis 2012
milsoftSDC
 
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
milsoftSDC
 

More from milsoftSDC (14)

Mil soft company_overview_2013
Mil soft company_overview_2013Mil soft company_overview_2013
Mil soft company_overview_2013
 
Mil soft sunum 2013
Mil soft sunum 2013Mil soft sunum 2013
Mil soft sunum 2013
 
Mil intel generic-short-eng
Mil intel generic-short-engMil intel generic-short-eng
Mil intel generic-short-eng
 
Mil intel generic-short-tr
Mil intel generic-short-trMil intel generic-short-tr
Mil intel generic-short-tr
 
Mil intel generic-short-eng
Mil intel generic-short-engMil intel generic-short-eng
Mil intel generic-short-eng
 
Mil imadis generic-short-tr
Mil imadis generic-short-trMil imadis generic-short-tr
Mil imadis generic-short-tr
 
Mil imadis generic-short-eng
Mil imadis generic-short-engMil imadis generic-short-eng
Mil imadis generic-short-eng
 
Mil soft sunum 2012 agustos
Mil soft sunum 2012 agustosMil soft sunum 2012 agustos
Mil soft sunum 2012 agustos
 
Usmos mil soft_dds_makale
Usmos mil soft_dds_makaleUsmos mil soft_dds_makale
Usmos mil soft_dds_makale
 
Mil soft company overview 2012 v2
Mil soft company overview 2012 v2Mil soft company overview 2012 v2
Mil soft company overview 2012 v2
 
Mil soft jets jetsim
Mil soft jets jetsimMil soft jets jetsim
Mil soft jets jetsim
 
Gvls 2012
Gvls 2012Gvls 2012
Gvls 2012
 
Gemkomsis 2012
Gemkomsis 2012Gemkomsis 2012
Gemkomsis 2012
 
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng2012 july mil soft_ie_capabilities__iic_solutions-general-eng
2012 july mil soft_ie_capabilities__iic_solutions-general-eng
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Dds presentation brussels

  • 1. MilSOFT DDS Middleware Copyright © MilSOFT,Turkey UNCLASSIFIED 1
  • 2. Outline • Introduction • MilSOFT DDS • Features • Architecture • RTPS • Tools • DDS Code Generator • DDS SPY • DDS Tester • Performance Results • DDS Applications • Conclusion Copyright © MilSOFT,Turkey UNCLASSIFIED 2
  • 3. Introduction - Technical Expertise and Capabilities  C4I  Tactical Data Links  Link 1, Link 11, Link 16, Link 22  Naval Combat Management Systems  Air Defense Systems  Mission Planning Systems  Message Handling and Formatted Messages  NATO AdatP-3, US OTH-G, ITU 1371 AIS, NMEA 0183  Tactical and Strategical Level C2 Information Systems  Electronic Warfare  EW Operational Support Centers  EW Pre Mission & Post Mission Support Software  EW Database Management Systems  EW System Test and Evaluation  Threat and Jamming Tech. Analysis  Image Exploitation Systems  Embedded Systems  Mission Computer Software  Maintenance Data Computer Software  Flight Test Instrumentation System  SW Development & Verification per DO-178B for FAA Certification  Simulation and Modeling  Homeland Security & Emergency Management Systems  HW Manufacturing Through Subcontract Management Copyright © MilSOFT,Turkey UNCLASSIFIED 3
  • 4. Introduction-DDS Implementation History • Initially started as a part of Gemkomsis CMS development • R&D project started in 2004 • Supported by Turkish Research and Development Institute • CMS based on OMG standards & OACE • Common services and functions for naval platforms • DDS as middleware • MilSOFT DDS continues as a product line • OACE Computing environment (including DDS) finds its use in multiple projects • Turkish Coast Guard SAR Ship CMS • Multilink Data link Processor • UAV Image Exploitation system Copyright © MilSOFT,Turkey UNCLASSIFIED 4
  • 5. MilSOFT DDS • Started with DDS specification 1.0 adopted version • Current version compatible with DDS specification version 1.2 • C++ API for applications • RTPS Copyright © MilSOFT,Turkey UNCLASSIFIED 5
  • 6. MilSOFT DDS Implemented Features • Minimum Profile (Complete) • Minimum profile contains just the mandatory features of the DCPS layer. None of the optional features are included. • Persistence Profile (Complete) • Persistency profile is completely implemented. Durability service is designed to be fault tolerant. • Content Subscription Profile (Partially Implemented) • ContentFilteredTopic and QueryCondition features have been implemented. MultiTopic has not been implemented yet. • Ownership Profile (Partially Implemented) • Only History QoS with depth > 0 feature has been implemented. • Object Model Profile (Not Implemented) • Contains DLRL and Presentation QoS access_scope = GROUP Copyright © MilSOFT,Turkey UNCLASSIFIED 6
  • 7. MilSOFT DDS Architecture • Applications use DDS as library • No shared memory or DDS service per node • Completely decentralized • RTPS implemented as the underlying communication protocol • DDS Interoperability wire-protocol • High performance • Zero-copy • No dynamic resource (memory, thread, etc) allocation after initialization • Multicast address per topic concept Copyright © MilSOFT,Turkey UNCLASSIFIED 7
  • 8. MilSOFT DDS Middleware More information on http://dds.milsoft.com.tr Copyright © MilSOFT,Turkey UNCLASSIFIED 8
  • 9. What Is RTPS? • DDS interoperability wire protocol • Real-Time Publish Subscribe (RTPS) • Adopted by OMG in June 2006 • MilSOFT started to develop RTPS from draft versions • Runs over multicast and connectionless best-effort transports • Current MilSOFT DDS implements RTPS over UDP Copyright © MilSOFT,Turkey UNCLASSIFIED 9
  • 10. DDS Tools • MilSOFT DDS Automatic Code Generator • MilSOFT DDS SPY • MilSOFT DDS Tester Copyright © MilSOFT,Turkey UNCLASSIFIED 10
  • 11. DDS Automatic Code Generator • Definition of DDS types • IDL like interface data stored into XML file • Generation of type specific files (FooTypeSupport, FooDataReader, FooDataWriter) • From DDS Code Generator GUI • From command line using XML file (for automatic builds) Copyright © MilSOFT,Turkey UNCLASSIFIED 11
  • 12. DDS Automatic Code Generator Copyright © MilSOFT,Turkey UNCLASSIFIED 12
  • 13. DDS Automatic Code Generator • Generating middleware specific code using DDS Automatic Code Generator has the following benefits: • Application developers do not need to know programming details of DDS API • Tool usage speeds up software development as major code is generated by tool • It eliminates errors generated while implementing middleware interface • It ensures type consistency and interface control through the project • Easy management of system internal interfaces from configuration control point of view Copyright © MilSOFT,Turkey UNCLASSIFIED 13
  • 14. DDS Automatic Code Generator Copyright © MilSOFT,Turkey UNCLASSIFIED 14
  • 15. DDS SPY-Display Data • Listens network and displays DDS related information • Participating applications to specific DDS • Topics each application publishes or subscribes • Data itself • User selectable listening mechanism • Auto • Manual •Shows data in multiple views • Current snapshot of the topic • All historical data Copyright © MilSOFT,Turkey UNCLASSIFIED 15
  • 16. DDS SPY-Display Data Copyright © MilSOFT,Turkey UNCLASSIFIED 16
  • 17. DDS SPY-Inject DDS Data • Injects data into selected DDS domain • Copy-Paste previously transmitted data and retransmit • User can import MS Excel file for data or copy-paste from MS Excel file. • Send more than one topic simultaneously with timestamps • Great tool for system integration and testing Copyright © MilSOFT,Turkey UNCLASSIFIED 17
  • 18. DDS SPY-Inject DDS Data Copyright © MilSOFT,Turkey UNCLASSIFIED 18
  • 19. MilSOFT DDS Tester • Automated test tool for applications communicating over DDS middleware • Allows definition of test suites and test cases • Send and receive topic data to/from middleware • Compare test results with excepted results and show them as highlighted • Show test results (failed tests, successful tests) Copyright © MilSOFT,Turkey UNCLASSIFIED 19
  • 20. MilSOFT DDS Tester Copyright © MilSOFT,Turkey UNCLASSIFIED 20
  • 21. MilSOFT DDS Performance Test Results • Test environment • 2 computers with Intel Xeon 3.0 Ghz processors. • Fedora Linux 4 • Gigabit ethernet switch • Test 1: Latency • Ping (Message_size)/pong time(message_size)/2 • ~125 microsecond for best effort @ 1K message size • ~160 microsecond for reliable @ 1K message size • Test2: Round trip with 4 byte ACK • Ping different message sizes pong is always 4 bytes • ~230 microsecond for best effort @ 1K message size • ~310 microsecond for reliable @ 1 K message size • Test3: Throughput • Measure data size received in one second • ~26.5 MB @ 1K message size Copyright © MilSOFT,Turkey UNCLASSIFIED 21
  • 22. MilSOFT DDS Applications • Middleware for CMS, UAV and DLIP product lines • GEMKOMSIS CMS • Single middleware for handling all communication • RM and common services on top of DDS • UAV Video Exploitation System • Stream data/video over DDS middleware • CAVLIS • Multilink DLIP Copyright © MilSOFT,Turkey UNCLASSIFIED 22
  • 23. Conclusion • MilSOFT DDS • Developed using mature CMMI-5 processes • Fully compliant to standard • Successfully used/tested in multiple C2 projects • Ready for utilization in projects Copyright © MilSOFT,Turkey UNCLASSIFIED 23
  • 24. BACKUP SLIDES • BACKUP SLIDES Copyright © MilSOFT,Turkey UNCLASSIFIED 24
  • 25. RTPS implementation - Design Decisions • Used UDP protocol for message exchange • Other protocols like Shared Memory or TCP can be adopted • IP multicast for transmission to multiple subscribers • Dynamic discovery of RTPS endpoints • Implemented using DDS BuiltinTopics • No centralized service for discovery • Listener interface over RTPS • Separate RTPS from DDS implementation • Zero copy support • No copy of data once it’s in RTPS buffers • Users can access the data without copying using DDS API Copyright © MilSOFT,Turkey UNCLASSIFIED 25
  • 26. Quality Attributes Addressed by MilSOFT DDS • Performance • High performance publish-subscribe based DDS middleware • Multicast based data distribution with DDS • Zero-copy and no-dynamic resource allocation implementation • Reliability • Modifiability / Scalability • Layered architecture • Middleware separates application logic from computing resources • Data driven publish/subscribe system enables • No component interdependencies • New component additions without changing other components • Availability • Fault Recovery • DDS Durability Service (transient and persistent data) • Liveliness QoS • Testability • DDS Spy as test and diagnostic tool • Capture and display data • Retransmit data for testing Copyright © MilSOFT,Turkey UNCLASSIFIED 26
  • 27. DDS in GEMKOMSIS CMS • Single standards based middleware for CMS data distribution • Resource Manager over DDS • Compatible with OMG AMSM specification • Alarm Manager over DDS • Compatible with OMG ALMAS specification effort • Debug Log Framework • Collection of log information to centralized location or maintenance application over DDS • Even use DDS SPY for displaying log information • Record Replay over DDS • Training • Post-mission analysis • Multiple worlds using DDS domains • Real-world • Simulation world Copyright © MilSOFT,Turkey UNCLASSIFIED 27
  • 28. Two Host Average Latency TwoHosts, Avg. Latency vs Packet Size 10000 Avg. Latency (Microseconds) 1000 Best-Effort-ZeroCopy Best-Effort-Copy Reliable-ZeroCopy 100 10 10 100 1000 10000 100000 Packet Size (Bytes) Copyright © MilSOFT,Turkey UNCLASSIFIED 28
  • 29. Round Trip Time with 4 bytes ACK TwoHosts, Round-Trip Time vs Packet Size ( 4 Byte Reply ) 900 800 Round-Trip time for 4 Byte Reply ( microseconds ) 700 600 500 BestEffort-Copy BestEffort-ZeroCopy 400 Reliable-ZeroCopy 300 200 100 0 10 100 1000 10000 100000 Packet Size (Bytes) Copyright © MilSOFT,Turkey UNCLASSIFIED 29
  • 30. Throughput Throughput vs Packet Size 1000000 100000 Throughput (KB/sec) OneSubscriber TwoSubscribers, Subscriber #1 10000 TwoSubscribers, Subscriber #2 1000 100 10 100 1000 10000 100000 Packet Size (Bytes) Copyright © MilSOFT,Turkey UNCLASSIFIED 30

Editor's Notes

  1. In my presentation I will cover a brief introduction of MilSOFT and Dedicate my time to our DDS implementation including the tools we have developed for DDS. I will provide brief information on our performance measurements and projects built on top of DDS
  2. MilSOFT is a privately owned Turkish company. It has been established in 1998 and nearly 300 engineers work in MilSOFT. It has received CMMI-5 Level in 2005, 1st CMMI-5 company in Turkey and Europe It has developed projects for customers like Lurssen/German shipyard, Thales/France, IAI-ELTA, Elbit in Israel, Skorsky in USA and for Turkish Army We have experience in C4I systems including Tactical Data Links, Naval CMS, EW systems like development of systems for Operational Support Centers. We took part in UAV project in Turkey and implementing Image Exploitation System. We have developed SW components for mission computer systems and maintenance data computer for Skorsky We have developed Homeland Security and Emergency Management System for Turkish Government
  3. We have initially begun our DDS implementation in our naval CMS project; gemkomsis. It was an R&D project which is also supported by Turkish Research and Development Institude Along with our CMS implementation based on Open Architecture Computing Environment of US Navy, we have implemented DDS middleware Later on DDS implementation is separated from CMS project as an product line Our DDS implementation now is used in our 3 major projects and some other small projects. They are Turkish Coast Guard SAR Ship CMS project, Multi Link Data Link Processor Project and UAV Image Exploitation System Project
  4. We have started our DDS implementation in year 2004 basing on version 1.0 adopted specification We have developed C++ DDS implementation and later on with the RTPS specification, we have begun developing RTPS implementation
  5. In this slide you can see our implementation status. We have completed minimum profile and persistency profile. We have implemented Content Subscription Profile and Ownership Profile partially and We have not implemented DLRL option.
  6. As highlights of our implementation, Our DDS implementation is a library implementation, we have no shared memeory or DDS service per node. Only DDS Durability Service is implemented as an executable and it runs in multiple instances in a system for fault tolerance requirements We have implemented our DDS according to no dynamic resource allocation principle And we are using multicast address per topic concept
  7. DDS as a library DDS spy and code generator utilities to support development and testing RTPS will provide a interoperability among DDS instances. More information can be found on our web site
  8. Under our DDS implementation, we provide a RTPS implementation. We have have developed our RTPS implementation from the standard’s draft versions. Our implementation runs on multicast and UDP protocol
  9. Coming to the tools we have developed supporting our DDS middleware; We have developed code generator, DDS Spy and DDS tester
  10. DDS Auto Code generator provides a very interactive user interface and stores type definitions in XML files It can be run from command line for providing automatic build support
  11. In this slide you can see the user interface for definiton of types and topics.
  12. Code Generator, as it is obvious, helps developers for definition of system interfaces and related DDS code
  13. Here you can see the user interface for definition of Data Reader Quality of Service parameters
  14. It uses the BUILT-IN data topics of DDS spec. User can select the automatic listening of DDS topics or user can select manual selection of topics It can provide current snapshot of the system data or all historical data
  15. Here you can see a snapshot of DDS Spy user ünterface. On the left you can see all participants and topics published/subscribed On the right you can see the data of each topic together with QoS values
  16. Another feature of DDS spy is it can inject data to system simply by copying and pasting It sends data with the given timestamps
  17. Here you see a user interface on which you can enter data to be injected
  18. Another tool, DDS Tester can inject data and compare the related answers from the system components with the expected values. It is developed for automated CSCI testing. It shows results in the form of pass/fail
  19. We have executed some performance tests on our DDS implementation. Test environment is as given in the slide and the results of the tests are as given in the slide.
  20. We have used our DDS implementation in 3 of our major projects namely on our GEMKOMSIS CMS, UAV Video Exploitation System and Multi link data link system
  21. As a result, Our DDS implementation is developed using our proven CMMI-5 processes It is fully compliant to specification; no proprietary interfaces are introduced It has been tested in 3 projects and it is ready for utilization in complex projects.