SlideShare a Scribd company logo
1 of 23
Download to read offline
Angelo Corsaro, Ph.D.
                                                    PrismTech
                                    angelo.corsaro@prismtech.com

                          Sara Tucci-Piergiovanni, Ph.D.
                             University of Rome “La Sapienza”
                                        sara.tucci@dis.uniroma1.it




          OpenSplice DDS
          Delivering Performance, Openness, and Freedom




Scaling the Data Distribution
 Service to Global Networks
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Addressing Data Distribution Challenges
                                                          DDS is standard designed to address the data-distribution challenges across
The OMG DDS Standard                                                             a wide class of Defense and Aerospace Applications
‣ Introduced in 2004 to address the Data
  Distribution challenges faced by a wide
  class of Defense and Aerospace
  Applications




                                                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Key requirement for the standard were its
  ability to deliver very high performance while
  seamlessly scaling from embedded to ultra-
  large-scale deployments
‣ Today recommended by key administration
  worldwide and widely adopted across
  several different application domains, such
  as, Automated Trading, Simulations, SCADA,
  Telemetry, etc.

                                                © 2009, PrismTech. All Rights Reserved
Addressing Data Distribution Challenges

‣ DDS is swiftly being adopted as the
  standard for providing System of Systems
  with ubiquitous and access to tactical data




                                                                                     Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ DDS deployments on WAN and sizable MAN
  have also proven it fitness with
  Metropolitan/Wide Area Networks



  So... Why I am doing this presentation?



                                            © 2009, PrismTech. All Rights Reserved
Challenges
DDS presents today some limitations with respect to addressing large scale geographical
deployments, these are:
Discovery
‣ Standard Discovery Protocol Requires Multicast
‣ Scalability




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Limited Control over Topics Visibility, e.g., choosing what to expose to the external world
Communication
‣ Standard Communication Protocol Relies on UDP
‣ No Support for Compression
‣ Difficult NAT/Firewall traversal
‣ Sub-Optimal Data Distribution for WAN Scenario (limited exploitation of multicast)
‣ Scalability
                                          © 2009, PrismTech. All Rights Reserved
Challenges

  Publisher                                                                                     Publisher

               B                                                            B
Subscriber                                                                                       Subscriber




                                                                                                              Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                   m                                                            m
               A           F                                                A           F

 Publisher     J                                                                                 Publisher
                       D       C                                            J
                                                                                    X       Z

               K
                       E
                                                                            K
Subscriber                                                                          Y
                                                                                                 Subscriber
                   DDS-1
   Publisher




                                               Wan


                                   © 2009, PrismTech. All Rights Reserved
Challenges

  Publisher    A                                                                                    Publisher

                   B                                                            B
Subscriber                                                                                           Subscriber




                                                                                                                  Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                       m                                                            m
                   A           F                                                A           F

 Publisher         J                                                                                 Publisher
                           D       C                                            J
                                                                                        X       Z

                   K
                           E
                                                                                K
Subscriber                                                                              Y
                                                                                                     Subscriber
                       DDS-1
   Publisher




                                                   Wan


                                       © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Looking at Internet Apps.
When looking at a solutions for extending DDS applicability to Internet Scale Systems, we can’t
ignore architectures adopted by very successful Internet Applications.

‣ P2P application like KaZaa have shown to scale very well and to support millions of users while




                                                                                                    Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
  effectively managing millions of subjects

‣ Application like Skype are connecting millions of people and managing in real-time they
  presence (discovery)




                                         © 2009, PrismTech. All Rights Reserved
Architecture for Internet Scale DDS

‣ DDS-Level Routers will be introduced that                                                                                                              H 1,1,h

  establish a Peer-to-Peer overlay that                                  N2,5          R                                             N1,1                 H 1,1,1
  relays DDS data over the WAN                                                                      SN
                                                                                                                                R
                                                                                                                                                       H 1,1,0
 ‣ The Router provides a single access point for                     H 2,1,m




                                                                                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
   deciding what to expose to the external world                                                                                SN
                                                                                                      H 1,0,k
 ‣ The Router can perform Topic Transformation, etc.                                       SN
‣ A Network of Super-Nodes is used for
                                                                    R
                                                       N2,0                                        H 1,0,1               N1,0
  ensuring:                                         H 2,0,i                                               H 1,0,0        R
                                                                                                                                                         R          N2,4
 ‣ Scalable (Global) Discovery                                                                        R                                 SN
 ‣ Subscription Management (when crossing the                                                    N2,1
   boundaries of a System)                                                                                          SN                                       H 2,1,n

 ‣ Support for establishing communication between
   Pub and Sub (perhaps via STUNT to circumvent                                                                          N2,2   R      R       N2,3
                                                                                                H 2,1,j
   NAT/FIREWALL issues)

                                                                                                                     H 2,1,k                 H 2,1,h
                                                       © 2009, PrismTech. All Rights Reserved
DDS Router
‣ DDS Router communicates with the
    local DDS Domain by Multicast                           Ni
                                                                          R
‣   DDS Router are configured with the
    set of topics to be exposed along with
    potential transformations
‣   Router2Router communication is




                                                                                                      Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                                                                     R         N
    carried on by RTPS over TCP (since                                                            k

    TCP has been tuned over years to
    work fine in WAN
‣   If required the Router takes care of
    compressing Data
‣   DDS Router Runs a “variation” or
    DDSI/RTPS
‣   Topic, Subscription and Publication are propagated to Super Nodes
‣   Information available into super nodes ensure that local reader/writer will be properly matched

                                             © 2009, PrismTech. All Rights Reserved
DDS Super-Nodes (SN)
‣ Super-Nodes store all the “discovery information”
 ‣ List of Topics available in the system                                                           R
                                                                                              SN
 ‣ Associations between Topics and Router role (e.g. Pub or                              SN
                                                                                     R
   Sub)




                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ A distributed protocol is used to replicated data,
                                                                                                   SN
  eventually, on all replicas
                                                                                         SN
‣ Router keep a list of well-known Super-Nodes to
  bootstrap discovery                                                                               R

                                                                                         R

‣ NOTE: Super-Nodes can also be used to support
  the implementation of STUNT-like protocols to
  facilitate NAT/Firewall trespassing
                                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                    {S(B), S(D),P(E)}

      DDS             R1   SN1                                  SN4         R4     DDS




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                           SN2                                  SN3



   {S(A),P(B),P(C)}   R2                                               R3    {S(A),P(D),S(E)}

                  DDS                                                 DDS


                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}    R1-{P(A),S(B),P(C)}                                     {S(B), S(D),P(E)}

      DDS             R1         SN1                                   SN4          R4     DDS
                                                           R4-{S(B), S(D),P(E)}




                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                 SN2                                   SN3   R3-{S(A),P(D),S(E)}
                           R2-{S(A),P(B),P(C)}

   {S(A),P(B),P(C)}   R2                                                       R3    {S(A),P(D),S(E)}

                  DDS                                                        DDS


                                   © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                    {S(B), S(D),P(E)}

      DDS             R1   SN1                                  SN4         R4     DDS
                             R1-{P(A),S(B),P(C)}
                             R2-{S(A),P(B),P(C)}
                             R3-{S(A),P(D),P(E)}
                             R4-{S(B), S(D),S(E)}




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                           SN2                                  SN3



   {S(A),P(B),P(C)}   R2                                               R3    {S(A),P(D),S(E)}

                  DDS                                                 DDS


                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                               {S(B), S(D),P(E)}

      DDS             R1        SN1                                     SN4            R4       DDS
                          {P(A)} R1-{P(A),S(B),P(C)}
                                 R2-{S(A),P(B),P(C)}
                       {P(A)}    R3-{S(A),P(D),P(E)}                          {P(E)}
                                 R4-{S(B), S(D),S(E)}




                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                SN2                                     SN3

              {P(B)}                                                                   {P(D)}
   {S(A),P(B),P(C)}        {P(B)}                                               R3      {S(A),P(D),S(E)}
                      R2

                  DDS                                                         DDS


                                    © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                               {S(B), S(D),P(E)}

      DDS        A    R1        SN1                                     SN4            R4       DDS
                          {P(A)} R1-{P(A),S(B),P(C)}
                                 R2-{S(A),P(B),P(C)}
                       {P(A)}    R3-{S(A),P(D),P(E)}                          {P(E)}
                                 R4-{S(B), S(D),S(E)}




                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                SN2                                     SN3

              {P(B)}                                                                   {P(D)}
   {S(A),P(B),P(C)}        {P(B)}                                               R3      {S(A),P(D),S(E)}
                      R2
                       A                                                         A
                                                                                 A

                  DDS                                                         DDS


                                    © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Extension to the DDS Standard
‣ What described in the previous slides can easily be implemented in an
 interoperable manner, exploiting the pre-designed extension points present in
 the DDS Standard




                                                                                 Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Areas of extension include:
 ‣Discovery
 ‣DDSI/RTPS




                                 © 2009, PrismTech. All Rights Reserved
Discovery Extension
1‣ A new Discovery Protocol should be                                                      R
   added that allows to discover                                            1        SN
                                                                                SN
   relevant information (Topics,                                     R
                                                                                     2
   Subscriptions, Publications) via the




                                                                                               Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
   Super-Nodes                                                                            SN
                                                                                SN
2‣ A new protocol to be used between
   Super-Nodes should also be                                                              R
   standardized!
                                                                                R




                                   © 2009, PrismTech. All Rights Reserved
DDSI/RTPS Protocol xTensions
DDSI/RTPS Should be extended                                           DDS     R1    SN1   SN4         R4   DDS
to include:
                                                                                     SN2   SN3




                                                                                                                  Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Support for TCP/IP
 ‣Offloading reliability from DDSI to TCP                                       R2                R3

  whenever possible                                                            DDS               DDS



‣ Compression


                                      © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Concluding Remarks
‣ The DDS Standard includes today some known
    limitation when trying to address Ultra-Large-
    Scale Systems
‣   These limitation mostly impact its scalability and
    efficiency




                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣   The good news is that exploiting available
    extension points in the standard it is possible to
    extend the DDS Architectural Style to scale to
    Ultra-Large-Scale Systems
‣   The Router/Super-Nodes approach builds over
    years of experience in the domain of Internet
    Scale applications, such as, KaZaa, Skype, etc.
‣   Thus, PrismTech will work toward update of the
    DDS Spec to include these extension points.


                                                  © 2009, PrismTech. All Rights Reserved

More Related Content

What's hot

いまさら聞けないRake入門
いまさら聞けないRake入門いまさら聞けないRake入門
いまさら聞けないRake入門Tomoya Kawanishi
 
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)Ryuichi Yasunaga
 
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也Preferred Networks
 
スイッチ・ルータのしくみ
スイッチ・ルータのしくみスイッチ・ルータのしくみ
スイッチ・ルータのしくみogatay
 
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...NTT DATA Technology & Innovation
 
ネットワークでなぜ遅延が生じるのか
ネットワークでなぜ遅延が生じるのかネットワークでなぜ遅延が生じるのか
ネットワークでなぜ遅延が生じるのかJun Kato
 
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)NTT DATA Technology & Innovation
 
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...Ryuichi Yasunaga
 
ちょっと理解に自信がないな という皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)
ちょっと理解に自信がないなという皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)ちょっと理解に自信がないなという皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)
ちょっと理解に自信がないな という皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)hamaken
 
Cephのベンチマークをしました
CephのベンチマークをしましたCephのベンチマークをしました
CephのベンチマークをしましたOSSラボ株式会社
 
GCを発生させないJVMとコーディングスタイル
GCを発生させないJVMとコーディングスタイルGCを発生させないJVMとコーディングスタイル
GCを発生させないJVMとコーディングスタイルKenji Kazumura
 
Dockerからcontainerdへの移行
Dockerからcontainerdへの移行Dockerからcontainerdへの移行
Dockerからcontainerdへの移行Akihiro Suda
 
バッチは地味だが役に立つ
バッチは地味だが役に立つバッチは地味だが役に立つ
バッチは地味だが役に立つapkiban
 
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017 2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017 unixfreaxjp
 
超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストールShin Tanigawa
 

What's hot (20)

いまさら聞けないRake入門
いまさら聞けないRake入門いまさら聞けないRake入門
いまさら聞けないRake入門
 
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)
3GPP 5G NSA Detailed explanation 5(EN-DC Handover Call Flow)
 
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也
fpgax #11+TFUG ハード部:DNN専用ハードについて語る会-2019-02-02 MN-coreについて 金子 紘也
 
スイッチ・ルータのしくみ
スイッチ・ルータのしくみスイッチ・ルータのしくみ
スイッチ・ルータのしくみ
 
IIJmio meeting 14 IIJmioタイプAとSIMフリー端末について
IIJmio meeting 14 IIJmioタイプAとSIMフリー端末についてIIJmio meeting 14 IIJmioタイプAとSIMフリー端末について
IIJmio meeting 14 IIJmioタイプAとSIMフリー端末について
 
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...
PostgreSQLのバグとの付き合い方 ~バグの調査からコミュニティへの報告、修正パッチ投稿まで~(PostgreSQL Conference Japa...
 
ネットワークでなぜ遅延が生じるのか
ネットワークでなぜ遅延が生じるのかネットワークでなぜ遅延が生じるのか
ネットワークでなぜ遅延が生じるのか
 
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)
ゼロトラスト、やってみた。~そこにCOVID-19がやってきた~(NTTデータ テクノロジーカンファレンス 2020 発表資料)
 
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...
3GPP 5G SA Detailed explanation 1(Relationship between 5G Identifier and Virt...
 
ちょっと理解に自信がないな という皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)
ちょっと理解に自信がないなという皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)ちょっと理解に自信がないなという皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)
ちょっと理解に自信がないな という皆さまに贈るHadoop/Sparkのキホン (IBM Datapalooza Tokyo 2016講演資料)
 
Cephのベンチマークをしました
CephのベンチマークをしましたCephのベンチマークをしました
Cephのベンチマークをしました
 
GCを発生させないJVMとコーディングスタイル
GCを発生させないJVMとコーディングスタイルGCを発生させないJVMとコーディングスタイル
GCを発生させないJVMとコーディングスタイル
 
IIJmio meeting 27 5G NSAについて
IIJmio meeting 27 5G NSAについてIIJmio meeting 27 5G NSAについて
IIJmio meeting 27 5G NSAについて
 
Dockerからcontainerdへの移行
Dockerからcontainerdへの移行Dockerからcontainerdへの移行
Dockerからcontainerdへの移行
 
これから始めるエンジニアのためのクラウド超入門
これから始めるエンジニアのためのクラウド超入門これから始めるエンジニアのためのクラウド超入門
これから始めるエンジニアのためのクラウド超入門
 
バッチは地味だが役に立つ
バッチは地味だが役に立つバッチは地味だが役に立つ
バッチは地味だが役に立つ
 
Rubyの黒魔術
Rubyの黒魔術Rubyの黒魔術
Rubyの黒魔術
 
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017 2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017
2017年11月02日「radare2」トーク/ワークショップAVTokyo 2017
 
超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール
 
PostgreSQL失敗談
PostgreSQL失敗談PostgreSQL失敗談
PostgreSQL失敗談
 

Viewers also liked

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpoliticsoiwan
 
Small Business Owners' Work-Life Balance
Small Business Owners' Work-Life BalanceSmall Business Owners' Work-Life Balance
Small Business Owners' Work-Life BalanceInterCall
 
Practical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous ConferencesPractical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous ConferencesElisabeth Riedl
 
Crosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingCrosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingFaye Brownlie
 
Charla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er cicloCharla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er cicloXXX XXX
 
CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert Faye Brownlie
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology IncubatorsAngelo Corsaro
 
Efficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time JavaEfficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time JavaAngelo Corsaro
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presleyhelenavf1
 
Sarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sampleSarah Robins Powell resume/work sample
Sarah Robins Powell resume/work samplesayster
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equationspd3h
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equationspd3h
 
Pharm Collaborations Cbi Pres
Pharm Collaborations Cbi PresPharm Collaborations Cbi Pres
Pharm Collaborations Cbi Presthess1121
 
Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12Faye Brownlie
 
Electing A President Individual Quiz
Electing A President Individual QuizElecting A President Individual Quiz
Electing A President Individual Quizguest71290aa
 
Valentine's day
Valentine's dayValentine's day
Valentine's dayXXX XXX
 
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall StreetOpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall StreetAngelo Corsaro
 

Viewers also liked (20)

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
Small Business Owners' Work-Life Balance
Small Business Owners' Work-Life BalanceSmall Business Owners' Work-Life Balance
Small Business Owners' Work-Life Balance
 
Practical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous ConferencesPractical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous Conferences
 
Crosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingCrosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about Thinking
 
Charla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er cicloCharla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er ciclo
 
CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology Incubators
 
Efficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time JavaEfficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time Java
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presley
 
Sarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sampleSarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sample
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equations
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equations
 
Pharm Collaborations Cbi Pres
Pharm Collaborations Cbi PresPharm Collaborations Cbi Pres
Pharm Collaborations Cbi Pres
 
Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12
 
Electing A President Individual Quiz
Electing A President Individual QuizElecting A President Individual Quiz
Electing A President Individual Quiz
 
Valentine's day
Valentine's dayValentine's day
Valentine's day
 
ikp321-01
ikp321-01ikp321-01
ikp321-01
 
Present Tense Verbs
Present Tense VerbsPresent Tense Verbs
Present Tense Verbs
 
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall StreetOpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
 
Sph 106 Ch 15
Sph 106 Ch 15Sph 106 Ch 15
Sph 106 Ch 15
 

Similar to Scaling the Data Distribution Service to Global Networks

The Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall StreetThe Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall StreetAngelo Corsaro
 
OpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open SourceOpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open SourceAngelo Corsaro
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter RoamingJohn Loughney
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org CommunityAngelo Corsaro
 
A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSAngelo Corsaro
 

Similar to Scaling the Data Distribution Service to Global Networks (7)

The Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall StreetThe Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall Street
 
Hibernating DDS
Hibernating DDSHibernating DDS
Hibernating DDS
 
OpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open SourceOpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open Source
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter Roaming
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org Community
 
A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDS
 
Embrace Change
Embrace ChangeEmbrace Change
Embrace Change
 

More from Angelo Corsaro

zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Scaling the Data Distribution Service to Global Networks

  • 1. Angelo Corsaro, Ph.D. PrismTech angelo.corsaro@prismtech.com Sara Tucci-Piergiovanni, Ph.D. University of Rome “La Sapienza” sara.tucci@dis.uniroma1.it OpenSplice DDS Delivering Performance, Openness, and Freedom Scaling the Data Distribution Service to Global Networks
  • 2. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 3. Addressing Data Distribution Challenges DDS is standard designed to address the data-distribution challenges across The OMG DDS Standard a wide class of Defense and Aerospace Applications ‣ Introduced in 2004 to address the Data Distribution challenges faced by a wide class of Defense and Aerospace Applications Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Key requirement for the standard were its ability to deliver very high performance while seamlessly scaling from embedded to ultra- large-scale deployments ‣ Today recommended by key administration worldwide and widely adopted across several different application domains, such as, Automated Trading, Simulations, SCADA, Telemetry, etc. © 2009, PrismTech. All Rights Reserved
  • 4. Addressing Data Distribution Challenges ‣ DDS is swiftly being adopted as the standard for providing System of Systems with ubiquitous and access to tactical data Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ DDS deployments on WAN and sizable MAN have also proven it fitness with Metropolitan/Wide Area Networks So... Why I am doing this presentation? © 2009, PrismTech. All Rights Reserved
  • 5. Challenges DDS presents today some limitations with respect to addressing large scale geographical deployments, these are: Discovery ‣ Standard Discovery Protocol Requires Multicast ‣ Scalability Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Limited Control over Topics Visibility, e.g., choosing what to expose to the external world Communication ‣ Standard Communication Protocol Relies on UDP ‣ No Support for Compression ‣ Difficult NAT/Firewall traversal ‣ Sub-Optimal Data Distribution for WAN Scenario (limited exploitation of multicast) ‣ Scalability © 2009, PrismTech. All Rights Reserved
  • 6. Challenges Publisher Publisher B B Subscriber Subscriber Proprietary Information - Distribution without Expressed Written Permission is Prohibited. m m A F A F Publisher J Publisher D C J X Z K E K Subscriber Y Subscriber DDS-1 Publisher Wan © 2009, PrismTech. All Rights Reserved
  • 7. Challenges Publisher A Publisher B B Subscriber Subscriber Proprietary Information - Distribution without Expressed Written Permission is Prohibited. m m A F A F Publisher J Publisher D C J X Z K E K Subscriber Y Subscriber DDS-1 Publisher Wan © 2009, PrismTech. All Rights Reserved
  • 8. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 9. Looking at Internet Apps. When looking at a solutions for extending DDS applicability to Internet Scale Systems, we can’t ignore architectures adopted by very successful Internet Applications. ‣ P2P application like KaZaa have shown to scale very well and to support millions of users while Proprietary Information - Distribution without Expressed Written Permission is Prohibited. effectively managing millions of subjects ‣ Application like Skype are connecting millions of people and managing in real-time they presence (discovery) © 2009, PrismTech. All Rights Reserved
  • 10. Architecture for Internet Scale DDS ‣ DDS-Level Routers will be introduced that H 1,1,h establish a Peer-to-Peer overlay that N2,5 R N1,1 H 1,1,1 relays DDS data over the WAN SN R H 1,1,0 ‣ The Router provides a single access point for H 2,1,m Proprietary Information - Distribution without Expressed Written Permission is Prohibited. deciding what to expose to the external world SN H 1,0,k ‣ The Router can perform Topic Transformation, etc. SN ‣ A Network of Super-Nodes is used for R N2,0 H 1,0,1 N1,0 ensuring: H 2,0,i H 1,0,0 R R N2,4 ‣ Scalable (Global) Discovery R SN ‣ Subscription Management (when crossing the N2,1 boundaries of a System) SN H 2,1,n ‣ Support for establishing communication between Pub and Sub (perhaps via STUNT to circumvent N2,2 R R N2,3 H 2,1,j NAT/FIREWALL issues) H 2,1,k H 2,1,h © 2009, PrismTech. All Rights Reserved
  • 11. DDS Router ‣ DDS Router communicates with the local DDS Domain by Multicast Ni R ‣ DDS Router are configured with the set of topics to be exposed along with potential transformations ‣ Router2Router communication is Proprietary Information - Distribution without Expressed Written Permission is Prohibited. R N carried on by RTPS over TCP (since k TCP has been tuned over years to work fine in WAN ‣ If required the Router takes care of compressing Data ‣ DDS Router Runs a “variation” or DDSI/RTPS ‣ Topic, Subscription and Publication are propagated to Super Nodes ‣ Information available into super nodes ensure that local reader/writer will be properly matched © 2009, PrismTech. All Rights Reserved
  • 12. DDS Super-Nodes (SN) ‣ Super-Nodes store all the “discovery information” ‣ List of Topics available in the system R SN ‣ Associations between Topics and Router role (e.g. Pub or SN R Sub) Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ A distributed protocol is used to replicated data, SN eventually, on all replicas SN ‣ Router keep a list of well-known Super-Nodes to bootstrap discovery R R ‣ NOTE: Super-Nodes can also be used to support the implementation of STUNT-like protocols to facilitate NAT/Firewall trespassing © 2009, PrismTech. All Rights Reserved
  • 13. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 14. How it Works {P(A),S(B),P(C)} R1-{P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS R4-{S(B), S(D),P(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 R3-{S(A),P(D),S(E)} R2-{S(A),P(B),P(C)} {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 15. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} R3-{S(A),P(D),P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 16. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS {P(A)} R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} {P(A)} R3-{S(A),P(D),P(E)} {P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {P(B)} {P(D)} {S(A),P(B),P(C)} {P(B)} R3 {S(A),P(D),S(E)} R2 DDS DDS © 2009, PrismTech. All Rights Reserved
  • 17. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS A R1 SN1 SN4 R4 DDS {P(A)} R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} {P(A)} R3-{S(A),P(D),P(E)} {P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {P(B)} {P(D)} {S(A),P(B),P(C)} {P(B)} R3 {S(A),P(D),S(E)} R2 A A A DDS DDS © 2009, PrismTech. All Rights Reserved
  • 18. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 19. Extension to the DDS Standard ‣ What described in the previous slides can easily be implemented in an interoperable manner, exploiting the pre-designed extension points present in the DDS Standard Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Areas of extension include: ‣Discovery ‣DDSI/RTPS © 2009, PrismTech. All Rights Reserved
  • 20. Discovery Extension 1‣ A new Discovery Protocol should be R added that allows to discover 1 SN SN relevant information (Topics, R 2 Subscriptions, Publications) via the Proprietary Information - Distribution without Expressed Written Permission is Prohibited. Super-Nodes SN SN 2‣ A new protocol to be used between Super-Nodes should also be R standardized! R © 2009, PrismTech. All Rights Reserved
  • 21. DDSI/RTPS Protocol xTensions DDSI/RTPS Should be extended DDS R1 SN1 SN4 R4 DDS to include: SN2 SN3 Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Support for TCP/IP ‣Offloading reliability from DDSI to TCP R2 R3 whenever possible DDS DDS ‣ Compression © 2009, PrismTech. All Rights Reserved
  • 22. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 23. Concluding Remarks ‣ The DDS Standard includes today some known limitation when trying to address Ultra-Large- Scale Systems ‣ These limitation mostly impact its scalability and efficiency Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ The good news is that exploiting available extension points in the standard it is possible to extend the DDS Architectural Style to scale to Ultra-Large-Scale Systems ‣ The Router/Super-Nodes approach builds over years of experience in the domain of Internet Scale applications, such as, KaZaa, Skype, etc. ‣ Thus, PrismTech will work toward update of the DDS Spec to include these extension points. © 2009, PrismTech. All Rights Reserved