Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Copyright©PrismTech2016
DDS at the Tactical Edge
– Next Generation Military Fog Computing and
Cloudlets
Andrew Foster
July...
Copyright©PrismTech2016
Agenda
2
► Computing Trends in Defense Systems
► The 3rd Offset
► Cloud Computing in Defense
► Tac...
Copyright©PrismTech2016
Computing Trends in Defense Systems
3
Copyright©PrismTech2016
Network-Centric Warfare
4
► Net-Centric Warfare (NCW) is driving
shift in military culture towards...
Copyright©PrismTech2016
Observ
e
Orient
Decide
Act
Tactical Decision Cycle
Critical for Mission Accomplishment
“Success ca...
Copyright©PrismTech2016
Net-Centric System of Systems
Assets Forward
Dismounted Soldiers
Airborne
Surveillance
Strike
Asse...
Copyright©PrismTech2016
Information Overload
“We’re going to find
ourselves in the not too
distant future swimming in
sens...
Copyright©PrismTech2016
Offset Strategies
8
Copyright©PrismTech2016
What is an Offset Strategy?
9
► Introduction
► An offset is some means of asymmetrically compensat...
Copyright©PrismTech2016
1st Offset
10
► Offset 1 (Nuclear)
► Post WWII the Warsaw Pact had a significant numerical advanta...
Copyright©PrismTech2016
2nd Offset
11
► Offset 2 (ISR – Stealth)
► Post Vietnam Eastern Bloc forces outnumbered NATO force...
Copyright©PrismTech2016
3rd Offset
12
► Offset 3 (Robotic Autonomous Weapons)
► The proposed Third Offset
► Robotics weapo...
Copyright©PrismTech2016
Cloud Computing in Defense
13
Copyright©PrismTech2016
Military Clouds
14
► DoD Cloud Computing key objectives:
► Increased mission effectiveness and
ope...
Copyright©PrismTech2016
Limitations of Cloud Computing
15
► Cloud computing relies on applications, storage and computing
...
Copyright©PrismTech2016
Edge Computing & Tactical Cloudlets
16
Copyright©PrismTech2016
Tactical Cloudlets
17
► Cloudlets can be used to address the
limitations of Cloud Computing at the...
Copyright©PrismTech2016
18
Cloudlet Cloudlet Cloudlet
Cloudlet
Central Core
(Enterprise Cloud)
Tactical Cloudlets
Goal: Pr...
Copyright©PrismTech2016
19
Peer-to-Peer Communications
Goal: Tactical edge networks can benefit from
peer-to-peer communic...
Copyright©PrismTech2016
Synergies with the IoT
20
► Industrial Internet of Things (IoT) systems
share many characteristics...
Copyright©PrismTech2016
Critical Software for the Tactical Edge
21
Copyright©PrismTech2016
Building the GIG
22
► Client/Server technologies
popular in the 90’s such as
CORBA, COM+/DCOM were...
Copyright©PrismTech2016
DDS a Key Enabler of the GIG
23
► The Data Distribution Service
(DDS) was introduced to
overcome t...
Copyright©PrismTech2016
24
▶ Introduced in 2004, DDS is an Object
Management Group (OMG) Standard for
efficient, and secur...
Copyright©PrismTech2016
Real-time Data Sharing for Mission Critical Systems
DDS provides a Distributed Data Space
abstract...
Copyright©PrismTech2016
Designed for mission-critical Network Centric systems
Real-time, low latency, massively scalable, ...
Copyright©PrismTech2016
Where is DDS is Recommended
► DDS has been endorsed and
recommended worldwide as
the technology at...
Copyright©PrismTech2016
PrismTech Defense and Aerospace Solutions
Vortex sets new levels of
performance, reliability,
scal...
Copyright©PrismTech2016
29
▶ VORTEX is a standard-based ubiquitous real-time data
sharing platform for Mission Critical an...
Copyright©PrismTech2016
Proven in Defense / Aerospace
Integrated Modular Vetronics Training & Simulation Systems Naval Com...
Copyright©PrismTech2016
Targeted Vertical Markets
Industrial IoT and other Mission Critical Distributed Systems
Industrial...
Copyright©PrismTech2016
The Vortex Platform
Device-2-DeviceDevice-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog...
Copyright©PrismTech2016
Cloud, Fog and Edge Computing
► VORTEX natively supports
both the Cloud and Fog
Computing
Collect ...
Copyright©PrismTech2016
Battlefield Data Dissemination
▶ Vortex is the intelligent data sharing
platform for mission-criti...
Copyright©PrismTech2016
35
IaaS
analytics
operational systems
information systems
mobile
desktop
web
embedded
fog computin...
Copyright©PrismTech2016
ADLINK Rugged Systems
Part of a larger data-centric capability
Rack Mount Server
• Private/secure ...
Copyright©PrismTech2016
Takeaways
37
► Increasing trend to leverage Cloud Computing in Network Centric military systems
► ...
Copyright©PrismTech2016
Supporting the Defense and Aerospace Community for Over 20 Years
Thank You!
For further informatio...
Upcoming SlideShare
Loading in …5
×

Data Distribution Service (DDS) at the Tactical Edge - Next Generation Military Fog Computing and Cloudlets

2,921 views

Published on

The Department of Defense's next generation "Third Offset" Initiative will target promising technology areas, including robotics, autonomous systems, miniaturization, and big data, whilst also seeking to improve the military's collaboration with innovative private sector enterprises.

The latest innovations in real-time data-centric network edge computing based on the Data Distribution Service (DDS) standard will be key to delivering on some of these priorities. Whilst Cloud Computing carries data back to a central server for storage and analysis with resultant issues in bandwidth capacity, connectivity and latency common to hostile environments; new Fog Computing and Tactical Cloudlet technologies enable real-time analytics and other functions to be performed at the tactical edge of a network, right at the data source – for example soldiers on the battlefield. This will help enable smart autonomous systems to send, receive and process information when and where it is needed, so ensuring speedier and optimal mission-critical decision making.

Tactical Cloudlets, Fog and Edge Computing will impact the way that the defense community builds the next generation of C4SIR and related military simulation systems, discover how and why. This presentation will allow viewers to learn about the challenges and what innovative new DDS-based technological solutions are available to address them.

PrismTech's Vortex is a proven DDS standards-based technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices. In this presentation we will explain how Vortex naturally fits with the Fog Computing and Tactical Cloudlet paradigm and is the only fog-ready data-sharing infrastructure capable of meeting the needs of defense and aerospace companies - connecting soldiers, unmanned machines, devices and commanders in the field with the intelligence community, and speeding decision-making.

Published in: Software
  • Be the first to comment

Data Distribution Service (DDS) at the Tactical Edge - Next Generation Military Fog Computing and Cloudlets

  1. 1. Copyright©PrismTech2016 DDS at the Tactical Edge – Next Generation Military Fog Computing and Cloudlets Andrew Foster July 26, 2016
  2. 2. Copyright©PrismTech2016 Agenda 2 ► Computing Trends in Defense Systems ► The 3rd Offset ► Cloud Computing in Defense ► Tactical Cloudlets and Fog Computing ► Critical Software for the Tactical Edge ► Concluding Remarks
  3. 3. Copyright©PrismTech2016 Computing Trends in Defense Systems 3
  4. 4. Copyright©PrismTech2016 Network-Centric Warfare 4 ► Net-Centric Warfare (NCW) is driving shift in military culture towards interconnected units operating cohesively ► Global Information Grid (GIG) is an all encompassing DoD communications project ► The GIG and NCW tenets: ► Robustly networked force improves information sharing ► Information sharing enhances the quality of information and shared situational awareness ► Shared situational awareness enables collaboration and self-synchronization and enhances sustainability and speed of command ► Speed of command, in turn, dramatically increases mission effectiveness “The right data, at the right place at the right time” Source: https://en.wikipedia.org/wiki/Global_Information_Grid
  5. 5. Copyright©PrismTech2016 Observ e Orient Decide Act Tactical Decision Cycle Critical for Mission Accomplishment “Success can only be achieved by acting inside the enemy’s cycle” † The acquisition, processing and dissemination of data, throughout the battlefield, is key to reducing the time to arriving at good command decisions † Colonel John Boyd, USAF OODA loop Observe Orient Decide Act 5
  6. 6. Copyright©PrismTech2016 Net-Centric System of Systems Assets Forward Dismounted Soldiers Airborne Surveillance Strike Assets Naval Command Battlefield Command Multi-Domain Operational Control 6 COLLECT | STORE | ANALYSE | SHARE
  7. 7. Copyright©PrismTech2016 Information Overload “We’re going to find ourselves in the not too distant future swimming in sensors and drowning in data” January 2010 Lt. Gen. David A. Deptula, Air Force deputy chief of staff for Intelligence, Surveillance and Reconnaissance 7
  8. 8. Copyright©PrismTech2016 Offset Strategies 8
  9. 9. Copyright©PrismTech2016 What is an Offset Strategy? 9 ► Introduction ► An offset is some means of asymmetrically compensating for a disadvantage, particularly in a military competition ► An offset strategy consequently seeks to deliberately change an unattractive competition to one more advantageous for the implementer ► An offset strategy is a type of competitive strategy that seeks to maintain advantage over potential adversaries over long periods of time while preserving peace where possible
  10. 10. Copyright©PrismTech2016 1st Offset 10 ► Offset 1 (Nuclear) ► Post WWII the Warsaw Pact had a significant numerical advantage in equipment and personnel ► President Eisenhower emphasized nuclear deterrence to avoid large expenditures ► This was the start of the Cold War
  11. 11. Copyright©PrismTech2016 2nd Offset 11 ► Offset 2 (ISR – Stealth) ► Post Vietnam Eastern Bloc forces outnumbered NATO forces 3 to 1 ► The new emphasis ► Intelligence, Surveillance, and Reconnaissance (ISR) ► Precision Guided weapons ► Stealth Technology ► AWACS Early Warning systems
  12. 12. Copyright©PrismTech2016 3rd Offset 12 ► Offset 3 (Robotic Autonomous Weapons) ► The proposed Third Offset ► Robotics weapons systems ► System Autonomy ► Miniaturization ► Big Data ► Advanced Manufacturing ► Collaborations with Private Sector companies (COTS)
  13. 13. Copyright©PrismTech2016 Cloud Computing in Defense 13
  14. 14. Copyright©PrismTech2016 Military Clouds 14 ► DoD Cloud Computing key objectives: ► Increased mission effectiveness and operational efficiencies ► Enable the Department to consolidate and share commodity IT functions resulting in a more efficient use of resources ► Cloud services can enhance Warfighter mobility through device and location independence while providing on‐demand secure global access to mission data and enterprise services ► Cloud platforms and services can provide increased opportunity for rapid application development and reuse of applications acquired by other organizations DoD Cloud Computing Goal “Implement cloud computing as the means to deliver the most innovative, efficient and secure information and IT service in support of the Department’s mission, anywhere, anytime, on any authorized device” Source: Chief Information Officer, Cloud Computing Strategy, July 2012
  15. 15. Copyright©PrismTech2016 Limitations of Cloud Computing 15 ► Cloud computing relies on applications, storage and computing power that resides not on local limited machines but on networks with much more capable servers ► Clouds enable “thin clients” such as handheld devices with limited computing power to tap into greater computing capabilities ► Clouds work well until you get to the tactical edge (e.g. battlefield) where mission requirements change rapidly, the need for computing power is great but communication is limited: ► Intermittent connectivity ► Insufficient network bandwidth ► High network latency
  16. 16. Copyright©PrismTech2016 Edge Computing & Tactical Cloudlets 16
  17. 17. Copyright©PrismTech2016 Tactical Cloudlets 17 ► Cloudlets can be used to address the limitations of Cloud Computing at the tactical edge ► As the name suggest Cloudlets are “little clouds” ► Cloudlets deploy with the troops ► Cloudlets can be hosted on vehicles or other platforms in proximity to the mobile users ► Cloudlets comprise of servers and communication equipment engineered in small enough packages to be carried to the tactical edge: ► provide infrastructure to offload expensive computation ► provide forward data staging for a mission ► perform data filtering to remove unnecessary data from streams intended for dismounted users ► serve as collection points for data heading for enterprise repositories in the Cloud Source: https://www.sei.cmu.edu/mobilecomputing/research/tactical-cloudlets/index.cfm
  18. 18. Copyright©PrismTech2016 18 Cloudlet Cloudlet Cloudlet Cloudlet Central Core (Enterprise Cloud) Tactical Cloudlets Goal: Provide cloud computing capabilities at the edge for computation offload, data staging, and increased survivability of mobile systems Multi -or Single-Hop Network ► Discoverable, virtual-machine based, forward-deployed servers located in single-hop proximity of mobile devices ► Can operate in disconnected mode ► Communication with the central core is only needed for provisioning ► Applications are statically partitioned into a client and server ► Very thin client runs on mobile device ► Computation-intensive server runs on cloudlet Single-Hop Network Source: Carnegie Mellon University. Tactical Cloudlets, Grace A. Lewis – Dec 10, 2014
  19. 19. Copyright©PrismTech2016 19 Peer-to-Peer Communications Goal: Tactical edge networks can benefit from peer-to-peer communications to support increased redundancy and network robustness, combined with a shared operational picture
  20. 20. Copyright©PrismTech2016 Synergies with the IoT 20 ► Industrial Internet of Things (IoT) systems share many characteristics with the requirements of the GIG ► Cloud and Edge computing architectures are seen as fundamental building blocks for the Industrial IoT ► New communication technologies being developed for the Industrial IoT can be directly applicable to the needs of the GIG ► For example a Tactical Cloudlet architecture is very similar to the capabilities being defined by the OpenFog Consortium’s Fog Computing reference architecture
  21. 21. Copyright©PrismTech2016 Critical Software for the Tactical Edge 21
  22. 22. Copyright©PrismTech2016 Building the GIG 22 ► Client/Server technologies popular in the 90’s such as CORBA, COM+/DCOM were not suited to implementing the GiG due to the tight coupling, high sensibility to faults, scalability and performance issues
  23. 23. Copyright©PrismTech2016 DDS a Key Enabler of the GIG 23 ► The Data Distribution Service (DDS) was introduced to overcome the limitations of existing technologies and address the data sharing requirements of the GiG for the engagement, awareness and planning grid.
  24. 24. Copyright©PrismTech2016 24 ▶ Introduced in 2004, DDS is an Object Management Group (OMG) Standard for efficient, and secure and interoperable, platform- programming-language independent data sharing Data Distribution Service ▶ DDS has been recently recommended as one of the core IIoT data connectivity technologies by Industrial Internet Consortium Reference Architecture
  25. 25. Copyright©PrismTech2016 Real-time Data Sharing for Mission Critical Systems DDS provides a Distributed Data Space abstraction where applications can autonomously and asynchronously read and write data (topics) Non-functional properties of Data Sharing are controlled through a rich set of QoS Policies Its built in dynamic discovery isolates applications from network topology and connectivity details DDS Data Space is completely decentralized 25 Conceptual Model Actual Implementation
  26. 26. Copyright©PrismTech2016 Designed for mission-critical Network Centric systems Real-time, low latency, massively scalable, fault tolerant and secure Automatic discovery enables spontaneous integration and system orchestration Can be used to support a key requirement of Tactical Cloudlets Enables full semantic interoperability between applications Data-centric solution “liberates” the data in an Network Centric system Natively supports high performance peer-to-peer communication required by real-time Network Centric Edge networks An international, open, maintained standard (API + wire protocol) OS and hardware independent – can run on server, desktop, mobile, embedded, sensor and web environments Vendor independent – no vendor lock-in Why DDS for Network Centric Systems ? 26
  27. 27. Copyright©PrismTech2016 Where is DDS is Recommended ► DDS has been endorsed and recommended worldwide as the technology at the foundation for network centric systems and GIG-like functionalities
  28. 28. Copyright©PrismTech2016 PrismTech Defense and Aerospace Solutions Vortex sets new levels of performance, reliability, scalability, interoperability and fault-tolerance ► Addressing the real-time data distribution needs of defense and aerospace applications by satisfying a range of requirements at different temporal and geographical scale for applications such as Radar Processors, Vetronic Systems, Naval Combat Management Systems, Land Systems, and next-generation Network Centric Systems. 28
  29. 29. Copyright©PrismTech2016 29 ▶ VORTEX is a standard-based ubiquitous real-time data sharing platform for Mission Critical and Industrial Internet of Things systems ▶ VORTEX hides low level connectivity, protocol- and platform-specific details to provide a scalable, efficient, and secure Data Sharing abstraction across embedded, mobile, web, enterprise, cloud and edge applications ▶ VORTEX provides first-class support for Cloud and Fog Computing Architectures ▶ VORTEX is an open and extensible platform with connectivity to over 90 communication and data storing technologies, such as MQTT, AMQP, HTTP, RDBMS, HBASE, etc. Introducing Vortex Sensors/ Things/ Devices Connectivity/ Transport Edge Management/ Telemetry Application Platform Enterprise Systems Ubiquitous Data Sharing peer-to-peer, device-to-cloud, cloud-to-cloud
  30. 30. Copyright©PrismTech2016 Proven in Defense / Aerospace Integrated Modular Vetronics Training & Simulation Systems Naval Combat Systems Air Traffic Control & Management Unmanned Air Vehicles Aerospace Applications 30
  31. 31. Copyright©PrismTech2016 Targeted Vertical Markets Industrial IoT and other Mission Critical Distributed Systems Industrial AutomationHealthcare Smart EnergyFinancial TransportationSmart Cities IT & Networks Defense & Aerospace 31
  32. 32. Copyright©PrismTech2016 The Vortex Platform Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog ▶ Device implementations optimized for OT and IT and mobile platforms ▶ Native support for Cloud and Fog Computing Architectures ▶ High performance, extensible and configurable protocol gateway framework enabling seamless integration with third party communication technologies ▶ Monitor and manage a system from any location and on any device 32
  33. 33. Copyright©PrismTech2016 Cloud, Fog and Edge Computing ► VORTEX natively supports both the Cloud and Fog Computing Collect | Store | Analyze | Share Cloud Computing Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication Cloud-to-Cloud Communication Device-to-Device Communication Fog Computing Fog Computing 33 “IoT at the edge. By 2018, 40% of IoT-created data will be stored, processed, anlayzed, and acted upon close to the edge of the network.” – Dec 3 2014
  34. 34. Copyright©PrismTech2016 Battlefield Data Dissemination ▶ Vortex is the intelligent data sharing platform for mission-critical applications ▶ End-to-end QoS providing ▶ Superior performance & scalability, reliability, determinism, interoperability, security and network efficiency ▶ Dynamic discovery ▶ Devices find each other automatically ▶ Peer-to-peer connections ▶ Decentralized data space with no single points of failure ▶ Temporal decoupling ▶ Late joiners can subscribe to historical data if required ▶ Operating System and programming language independent ▶ Built on Open Standards (DDS) 34
  35. 35. Copyright©PrismTech2016 35 IaaS analytics operational systems information systems mobile desktop web embedded fog computing integration
  36. 36. Copyright©PrismTech2016 ADLINK Rugged Systems Part of a larger data-centric capability Rack Mount Server • Private/secure cloud High-Density ATCA • Workstation virtualization • Naval radar processing SETO • Server for Extreme Outdoor applications • Mobile edge computing VPX • Bespoke system integration HPERC • Rugged GPU-enabled computer Ultra-Portable • COM module • Lightweight systems ► Rugged Systems ► Target Platforms 36
  37. 37. Copyright©PrismTech2016 Takeaways 37 ► Increasing trend to leverage Cloud Computing in Network Centric military systems ► Latest defense initiatives such as US DoD 3rd Offset are investing heavily in mobile, autonomous systems, miniaturization, robotics, big data and COTS ► Cloud Computing has a number of limitations for Tactical Edge systems ► Tactical Cloudlets are a means to make cloud services and processing available to mobile users by offloading computation to servers deployed on platforms closer to the users ► Cloudlets leverage automatic discovery and VM based provisioning, combined with peer-to-peer communications ► The DDS standard was designed to support the requirements of the Gig and Network Centric systems ► DDS is a data-centric peer-to-peer protocol that can support a Tactical Edge architecture leveraging a network of Cloudlets ► Vortex is the most effective and proven DDS solution stack for next generation Network Centric military systems with native support for Cloud and Edge/Fog/Cloudlet computing
  38. 38. Copyright©PrismTech2016 Supporting the Defense and Aerospace Community for Over 20 Years Thank You! For further information please don’t hesitate contact Andrew Foster at: andrew.foster@prismtech.com Or visit our web site at: www.prismtech.com 38

×