Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

PrismTech Vortex 2.0 The Industrial Internet of Things Platform

604 views

Published on

The large majority of commercial Internet of Things (IoT) platforms target consumer applications and fall short in addressing the requirements characteristic of Industrial IoT. Vortex has always focused on addressing the challenges characteristic of Industrial IoT systems and with its new 2.0 release sets the new standard!

This presentation will (1) detail the new features introduced in Vortex 2.0, (2) explain how Vortex 2.0 addresses the requirements of Industrial IoT applications better than any other existing platform, including native support for both edge-based Fog and Cloud computing, and (3) showcase how innovative companies are using Vortex for building leading edge Industrial IoT applications.

Published in: Software
  • Be the first to comment

PrismTech Vortex 2.0 The Industrial Internet of Things Platform

  1. 1. Angelo Corsaro, PhD Chief Technology Officer angelo.corsaro@prismtech.com 2.0 The Industrial Internet of Things Platform
  2. 2. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiarynews
  3. 3. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary acquires
  4. 4. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary As part of ADLINK will have the the resources and scale to exploit the full potential of the Vortex in Industrial IoT (IIoT) markets. You will see PrismTech becoming stronger, larger and able to better compete globally.  You will also start to see, later in 2016, new leading-edge IIoT system products emerging from the combination of PrismTech’s software and ADLINK’s hardware technologies.
  5. 5. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary This acquisition reinforces the traction and relevance of the DDS Standard in IIoT.  The combination of ADLINK’s and PrismTech’s strengths offers a tremendous opportunity to combine software and hardware into system-level solutions embracing the edge, mobile, network and data center.
  6. 6. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex 2.0
  7. 7. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex is a standard technology for efficient, ubiquitous, interoperable, secure and platform independent data sharing across network connected devices in151 Characters
  8. 8. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Plenty of Vortex Devices goodies, including new APIs, new features and improved performances
  9. 9. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 More Integration with analytics, IoT and Web technologies
  10. 10. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Extended and Improved Tooling for monitoring, management, testing, record and playback
  11. 11. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Fog Computing Support
  12. 12. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk at a Glance 2.0 Data-Centric Security
  13. 13. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Device
  14. 14. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Updated ISO-C++ with increased usability and support for C++11 lambdas Google Protocol Buffer support for topic type declaration Full support for coherent-updates Improved performance and transparent compression for durable data 6.6.0
  15. 15. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryTopic types can be expressed using different syntaxes, including IDL and ProtoBuf Google Protocol Buffers message ShapeType { option (.omg.dds.type) = {name: "ShapeType"}; required string color = 0 [(.omg.dds.member).key = true]; required long x = 1; required long y = 2; required long shapesize = 3; } struct ShapeType { string color; long x; long y; long shapesize; }; #pragma keylist ShapeType color IDL ProtoBuf
  16. 16. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 2.0.0 Support for 40+ platforms including Windows, Linux, MacOS, ElinOS, VxWorks, and QNX Updated ISO-C++ with increased usability and support for C++11 lambdas Full Durability support including Transient and Persistent Data
  17. 17. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 2.2.0 Support for Python Scripting (via Jython) Extended support for X.509 certificates and CA hierarchies Extended Unicast-only discovery to facilitate configuration in non-multicast enabled environments Improved throughput
  18. 18. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryIntegration
  19. 19. Native Integration with the hottest real-time analytics platforms and CEP Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  20. 20. Integration with the popular Node-RED framework Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  21. 21. Integration with mainstream Dashboard Technologies Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  22. 22. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog
  23. 23. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Fog Computing Vortex naturally fits with the fog computing paradigm and is the only fog-ready data-sharing infrastructure
  24. 24. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 1.3.1 Transparently and dynamically integrates a Fog subsystems while mediating transport protocols and isolating application from dynamics exposed by different networks Controls the topic exposed by a Fog subsystem Defines a security boundary
  25. 25. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary 1.3.1 Data leaves a Fog subsystem only if remote interest is discovered — through dynamic discovery. Applications within a Fog cannot tell if they are communicating with local or remote applications. These applications believe that they always communicate “locally”
  26. 26. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryVortex Fog Deployment
  27. 27. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary location transparency Cloud Computing Fog Computing Device-to-Cloud Communication Device-to-Device Communication Fog-to-Cloud Communication Cloud-to-Cloud Communication Device-to-Device Communication Collect | Store | Analyse | Share Collect | Store | Analyse | Share Fog Computing Fog Computing
  28. 28. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex device, such as Lite, Café, and Web are used to share data between different kinds of applications within a car Café and Web are typically used Android / HTML5 based infotainment Lite in typically used in ECU, sensors and onboard analytics
  29. 29. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog is used to transparently (for in car apps) decouple and control the data sharing within and across the car Vortex Fog also helps defining security boundaries and policies
  30. 30. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with car to car communication Vortex Fog allows to decouple the transport used for in-car communication and that used for car-to-car communication
  31. 31. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Fog efficiently and securely deals with cloud connectivity adapting traffic flows and protocols Device-to-Cloud Communication Cloud Analytics Fog Analytics Fog Analytics Fog Analytics
  32. 32. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Vortex Cloud efficiently and securely makes data available to any device at an Internet Scale Cloud Analytics Fog Analytics Fog Analytics Fog Analytics Device-to-Cloud Communication
  33. 33. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryData-Centric Security
  34. 34. Secure Data-Level security with Pluggable Authentication Access Control and Crypto Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  35. 35. Default Plug-ins X.509 Public Key Infrastructure (PKI) based authentication Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  36. 36. Default Plug-ins Access Control List available at a trusted/ authenticated URI Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  37. 37. Default Plug-ins Crypto based on TLS Cipher Suite Device-2-DeviceDevice-2-Cloud Fog-2-Cloud Device-2-Fog Cloud-2-Cloud Fog-2-Fog infrastructuresdk
  38. 38. Secure Data-Security as opposed to simply Transport-Level security Arthur Dent Arthur Dent Ford Prefect Zaphod Beeblebrox Marvin Trillian left/A(r,w), left/B(r) left/A(r,w), left/B(r,w), left/X(r) left/*(r,w) left/*(r), right/(w) left/A(r,w), left/B(r,w), right/C(r,w) Ford Prefect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  39. 39. Secure Fine-grained access control over Partition/Topic regular expressions Arthur Dent Arthur Dent Ford Prefect Zaphod Beeblebrox Marvin Trillian left/A(r,w), left/B(r) left/A(r,w), left/B(r,w), left/X(r) left/*(r,w) left/*(r), right/(w) left/A(r,w), left/B(r,w), right/C(r,w) Ford Prefect Zaphod Beeblebrox Trillian Marvin A B A,B X * * A,B,C Identity Access Rights Sessions are authenticated and communication is encrypted Only the Topic included as part of the access rights are visible and accessible
  40. 40. Boundary Security Boundary security support is enabled by Vortex-Fog Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Access Control
  41. 41. Boundary Security Separates security concerns at different scales and controls what information is exposed Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Access Control
  42. 42. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Data-Centric Security Management &Configuration
  43. 43. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Certificate Management Certificate Authority (CA) hierarchies are supported to facilitate certificate management
  44. 44. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Certificate/Key Management Tool Eases the creation of Certificate Authorities hierarchies as well as service and device certificates
  45. 45. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Applications belonging to the same Fog subsystem share the same identity and the same access rights Access Control Fog Access Control
  46. 46. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Device-to-Cloud Communication Peer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS So long as the Fog CA is trusted the Fog instance will be trusted to join the Vortex infrastructure. Access Control Fog Access Control
  47. 47. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Access control for an entire Fog can be easily controlled by defining rules for either a “Cluster Subject Name” or a “Cluster Id” Fog Access Control
  48. 48. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS Each device can have its own identity or identities can be shared per “security-level” Access Control Device-to-Cloud Communication Device Access Control
  49. 49. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryPeer-to-Peer (Broker-less) Device-to-Device Communication Fog Computing Fog Computing Fog Computing TLS TLS So long as the device’s CA is trusted the device will be trusted. Access Control Device-to-Cloud Communication Device Access Control
  50. 50. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary Devices access control can be defined using a specific certificate name or a regular expression on the subject name Device Access Control
  51. 51. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiaryDemo
  52. 52. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary
  53. 53. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary at a Glance 2.0 Vortex 2.0 is the most advanced data- sharing infrastructure for IoT and IIoT applications available on the market It has off-the-shelf support for Fog Computing, Data-Level Security, integration with Analytics, and extremely high performance
  54. 54. This slides have been crafted by Angelo Corsaro Any use of these slides that does include me as Author/Co-Author is plagiary

×