SlideShare a Scribd company logo
1 of 6
Download to read offline
Enhancing Intelligence in the
‘Internet of Things’
The Business of Embedded Virtualization
Alexander Damisch, Director, Industrial Vertical, Wind River

INNOVATORS START HERE.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

EXECUTIVE SUMMARY
A key driver for embedded system designers is the cloud. With billions of devices becoming connected in the “Internet of things” and sharing data through the cloud, there is a
key challenge in managing this complexity. The amount of data that is moved around the
Internet is expected to double in just three years and there are different architectures for
addressing this challenge of sharing and managing data securely and reliably in the cloud.
This is a different situation from the existing migration of apps into the IT cloud. Systems
handling machine-to-machine (M2M) data have to be reliable, secure, and scalable with
real-time performance measured in microseconds. All this data has to be available anytime, anywhere, and this is opening up new ways for equipment to be designed and built.
This paper takes a look at the key industry trends driving consolidation of processing
workloads to make all the functionality on a device secure, manageable, and scalable.

TABLE OF CONTENTS
Executive Summary.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
Industry Trends  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
	Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
	Complexity  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
	Smart Grid.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4		..
	Manufacturing.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
	Transportation.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
	Consolidation and Separation.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
	Scalability.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Conclusion.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6

2 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

INDUSTRY TRENDS

system grows in a haphazard, unmanaged way. Often the original

One architecture that is gaining ground is to provide more local-

elements of the system are so critical that there is no opportunity

ized, connected processing power close to where it is needed,

to pull everything out and start again from scratch, leading to a

often as a gateway to the wider Internet. In this way, local traffic

more evolutionary architecture.

can be processed quickly and acted on, while the data is still avail-

This often leads to a highly complex base of software that is con-

able to the wider systems across the Internet, whether it is a train,

stantly patched and not well documented, creating bugs, errors,

a manufacturing floor, or a power plant.

and glitches. The safety-critical elements of the design, from

At the heart of this approach is the ability to consolidate a num-

programmable logic controllers to sensors, tend to be relatively

ber of functions, from the communications to the data processing.

simple, well-tested devices that have well-defined code and states

This is costly and complex when implemented in separate boxes,

and are left alone. As a result, adding new functions and features

and the ability to consolidate a wide range of functions reliably

can often impact the overall performance of the system.

and securely into an intelligent single unit that is more cost effec-

All of this is reflected in higher costs for upgrading, managing, and

tive is increasingly popular.

protecting the system. With many industrial embedded systems

Security

not built with communications or security in mind, this is a signifi-

This trend has implications for security. Consolidating workloads in
a single device means communications are linked to real-time operations and the flow of data. This means there is a need to keep certain functions very separate. Safety-critical code has to be protected
and unchanged to retain its certification, and yet the security that
protects the system has to be updated regularly to defend against
ever changing attacks. At the same time, there are communications protocols and data capture in the system that need real-time
performance alongside human interfaces that can be run at slower
speeds.
All of this provides a potentially highly complex environment. The
traditional approach has been to have separate devices for each
of these functions, keeping communications and real- time elements separate. However, security needs to be deeply embedded
within the system to provide the maximum protection, and physical separation leads to a number of architectural challenges that
can be expensive to solve.
Complexity

cant part of the cost of doing business.

Virtualization
Virtualization has been solving a number of these challenges.
Using multiple cores and time and space separation it has been
possible to run the different elements—security, communications,
real-time, and user interface—on separate operating systems on
separate cores. Sometimes these separate cores are in separate
devices on a single board, replacing multiple boards in a system.
Increasingly, these elements have been coming together in a single
multi-core device, offering higher performance that can be used
for more features or lower power consumption, which is now a key
consideration. This trend is being supported with new approaches
such as virtualization extensions within processors capable of supporting time and space separation in hardware, increasing performance and reducing power consumption and system cost.
Now it is possible to run multiple operating systems and separate applications on a single core and still achieve the real-time
performance that many embedded industrial systems require. This

This separation tends to show up in system architectures in a

allows for significantly lower cost and complexity as well as lower

number of ways. Often it shows up with new devices being added

power consumption than with multi-core systems.

to the system to provide new features or new security, and the

3 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

Smart Grid

Manufacturing

The current industry focus on the smart grid is a classic example

Similarly, manufacturing plants can benefit from virtualization. A

of the challenges of adding intelligence and networking to exist-

single-core device can run several “soft” programmable logic

ing legacy systems. The concept of the smart grid is driven by the

controllers (PLC) and provide the security and communications

need to integrate variable power sources such as wind or wave

for sensors and networks around the shop floor through a real-

power into the existing power grid based around static sources

time operating system. Graphical interfaces can be added via the

such as traditional power stations. To do this requires “smart

non-real-time elements to make machines more user friendly and

meters” that measure consumption in the home, office, or factory

productive with an easy upgrade process that does not perturb

as well as a network to carry that data back and control the differ-

other parts of the systems.

ent parts of the grid based on the real-time data. This is a highly
complex task that requires large amounts of data handling and
processing power overlaid on a grid that was constructed in the
1950s or even earlier.

With the communications stacks implemented securely and reliably, all the data from around the floor can be available whenever
and wherever required. This can be used to make planning more
efficient and allow algorithms to spot potential problems within

While there are large scale data centre implementations for han-

the equipment, triggering preventative maintenance routines and

dling predictive algorithms, a vast amount of processing has to be

reducing costly downtime.

handled towards the edge of the grid. Potentially handling thousands of smart meters and sensors throughout the grid, this acts
as a gateway to the wider network and protects all those meters
and power systems from intrusion. Real-time performance is vital,
as is reliability and traceability of all the data when it is used for
billing purposes.
There is a very clear place for such gateways acting as servers for
the “client” meters, but the current multi-core devices can have
higher performance than necessary. The performance of single
core devices is now such that one device can run a secure realtime operating system such as Wind River’s VxWorks® that can

Transportation
Transport shows similar characteristics. Increasing amounts of electronics are making their way into transportation systems, especially
trains. New safety-critical braking control and signaling systems are
being implemented alongside data management and entertainment networks, all on a physical platform that is decades old. Costeffective commercial off-the-shelf (COTS) systems based around
single-core devices can now handle these key features such as train
information systems and other functions safely and securely.
Instead of having signals on the rail, trains now have their own

handle both data and communications stacks alongside a general

highly sophisticated signal and position management systems.

purpose operating system such as Microsoft Windows or embed-

Positive train control systems are adding highly connected intel-

ded Linux. This simplifies the system design and allows existing

ligence in trains, for example, making them position-aware as

code to be run safely and securely but also allows security to

well as providing a centralized advanced train control (ATC) man-

be updated regularly. New features and data handling routines

agement system. This ATC system is a key example of an M2M

can be added in the non-real-time portion of the design without

cloud architecture, taking data from trains around the network to

impacting on the real-time, security, or communications elements.

enhance the operation and safety of the system as a whole. Using

This dramatically reduces the complexity, risk, and costs of rolling

this connected distributed intelligence can improve safety and

out the infrastructure that is required for the smart grid.

performance but the challenge is to implement such a system cost
effectively.

4 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

Operational Control Center

High A
Authority
Management
Server

Remote
Users

Communications

Train Control

Training/Train
Controller/
Transit
Manager

Train
Control
Servers

*n
TCP/IP
Router

UPS

Authority
Server,
Trainborne,
Wayside

Trainborne

Diagnostic Support

GPS Location
Determination

Trackside
Crossing

Key

Local Communications

Wireless
Network

Defect
Detectors

Control
Point

Rail-Rail
Interfaces

Wayside Interface Units (WIUs)

Architecture of a positive train control system

Consolidation and Separation

Scalability

There are two areas where virtualization is particularly relevant:

A key element of virtualization is the scalability. Supporting mul-

providing consolidation of workloads and combining communica-

tiple operating systems on a single core means the system is eas-

tion stacks with other functions.

ily expandable to higher-performance multi-core devices with

Consolidation of workloads is at the heart of the move to having
all data accessible anywhere. Keeping real-time functions separate
from general data processing and handling is vital to maintaining systems’ responsiveness, but it all has to be kept secure. This
leads to new system architectures based around the dynamic flow
of data. Here, control, interface, security, and communications are
all kept separate as they all change at different rates and have
different requirements. Being able to combine these functions in
a single device and still keep them separate is a vital element in
providing design flexibility and agility.

5 | White Paper | Wind River Confidential. Internal Use Only.

minimal risk. The multi-core device can handle the operating systems on separate cores, providing higher performance for more
advanced features without having to rewrite and retest the existing system implementation. This brings a dramatic savings in the
development time and costs of moving to a new generation of
equipment. This also allows vendors to provide scalable equipment platforms that are based around a common code base that
is tested and reliable.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

CONCLUSION

a single board rather than multiple units with multiple boards

Virtualization has already opened up a wide range of new applica-

reduces the upfront costs. With millions of M2M systems being

tions in IT, but the ability to provide true real-time performance

rolled out, connected to hundreds of thousands of gateway units,

alongside a mainstream operating system opens up yet more

this is a significant savings in the upfront cost of a rollout.

embedded opportunities in new and existing markets. Smart

Decoupling the software life cycle of different elements and still

grid networks, manufacturing systems, and transportation are

being able to use a single device can reduce expenses. Not man-

all set to benefit from the consolidation of workloads and the

aging multiple versions of replacement boards and having fewer

separation of communication and security functions onto a single

boxes on the shelf reduces operational expenses of warehousing

core.

and stock management. Replacing units with problems before they

This allows cost-effective embedded systems to be developed that

fail is also significantly simpler and more cost effective with a single

are secure, reliable, and future-proof. Running the same operating

unit rather than multiple boards.

systems on a single core and multi-core device opens up a platform

All of this can provide dramatic savings in development time and

of equipment that can scale from a single core to many, all with the

equipment cost, allowing more processing performance to sit

same base of software.

closer to where it is needed in the network and support lower cost

Consolidation of workloads also has a significant effect on the capi-

sensors and terminals in the home or on the factory floor.

tal and operational expenditures. Building a single unit with

Wind River is a world leader in embedded and mobile software. Wind River has been pioneering computing inside embedded devices since 1981, and its technology is found in more than
1 billion products. Wind River is headquartered in Alameda, California, with offices in more than 20 countries. To learn more, visit Wind River at www.windriver.com.
©2012 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev 05/2012

More Related Content

What's hot

ITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNBoris Loukanov
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingGoodzuma
 
Cloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityCloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityBelinda Edwards
 
Business models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainBusiness models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainJosé Luis Casal
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Bob Radvanovsky
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 

What's hot (10)

The Datacentre of the Future
The Datacentre of the Future The Datacentre of the Future
The Datacentre of the Future
 
ITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGN
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityCloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information Security
 
IBM Cloud
IBM CloudIBM Cloud
IBM Cloud
 
The Cloud Networking Report 2011
The Cloud Networking Report 2011The Cloud Networking Report 2011
The Cloud Networking Report 2011
 
Job help
Job helpJob help
Job help
 
Business models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainBusiness models based on IoT, AI and Blockchain
Business models based on IoT, AI and Blockchain
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 

Viewers also liked

Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence ApproachIntelegia Group
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search Systembkearns111
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetKari A. Hintikka
 

Viewers also liked (7)

Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search System
 
active|watch - revolution in internet intelligence
active|watch - revolution in internet intelligenceactive|watch - revolution in internet intelligence
active|watch - revolution in internet intelligence
 
Forget Internet Intelligence!
Forget Internet Intelligence!Forget Internet Intelligence!
Forget Internet Intelligence!
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligence
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from Patents
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the Internet
 

Similar to Enhancing intelligence with the Internet of Things

Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data CenterJuniper Networks
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingDarrell Jordan-Smith
 
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloudTechnologyBIZ
 
Cloud Computing Sun Microsystems
Cloud Computing Sun MicrosystemsCloud Computing Sun Microsystems
Cloud Computing Sun Microsystemsdanielfc
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXAngel Villar Garea
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureTechnologyBIZ
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Advantec Distribution
 
White Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in HealthcareWhite Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in Healthcareinfsoft GmbH
 
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM India Smarter Computing
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideEMC
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...Juniper Networks
 
Ibm system z in a mobile world providing secure and timely mobile access to...
Ibm system z in a mobile world   providing secure and timely mobile access to...Ibm system z in a mobile world   providing secure and timely mobile access to...
Ibm system z in a mobile world providing secure and timely mobile access to...bupbechanhgmail
 
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...TanuAgrawal27
 
IBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM India Smarter Computing
 

Similar to Enhancing intelligence with the Internet of Things (20)

Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 
04367a
04367a04367a
04367a
 
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloud
 
Cloud Computing Sun Microsystems
Cloud Computing Sun MicrosystemsCloud Computing Sun Microsystems
Cloud Computing Sun Microsystems
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
2000330 en
2000330 en2000330 en
2000330 en
 
ITSM Approach for Clouds
 ITSM Approach for Clouds ITSM Approach for Clouds
ITSM Approach for Clouds
 
This is
This is This is
This is
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric Architecture
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
 
White Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in HealthcareWhite Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in Healthcare
 
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design Guide
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
 
Ibm system z in a mobile world providing secure and timely mobile access to...
Ibm system z in a mobile world   providing secure and timely mobile access to...Ibm system z in a mobile world   providing secure and timely mobile access to...
Ibm system z in a mobile world providing secure and timely mobile access to...
 
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
 
IBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data Center
 

More from The Marketing Distillery

Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityThe Marketing Distillery
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of ThingsThe Marketing Distillery
 
Capitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerCapitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerThe Marketing Distillery
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
Smart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsSmart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsThe Marketing Distillery
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementThe Marketing Distillery
 
How Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsHow Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsThe Marketing Distillery
 

More from The Marketing Distillery (20)

Big Data 2.0
Big Data 2.0Big Data 2.0
Big Data 2.0
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunity
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things
 
Capitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerCapitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primer
 
Making sense of consumer data
Making sense of consumer dataMaking sense of consumer data
Making sense of consumer data
 
Capitalizing on the Internet of Things
Capitalizing on the Internet of ThingsCapitalizing on the Internet of Things
Capitalizing on the Internet of Things
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
Getting started in Big Data
Getting started in Big DataGetting started in Big Data
Getting started in Big Data
 
Smart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsSmart networked objects and the Internet of Things
Smart networked objects and the Internet of Things
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Smart cities and the Internet of Things
Smart cities and the Internet of ThingsSmart cities and the Internet of Things
Smart cities and the Internet of Things
 
The ABCs of Big Data
The ABCs of Big DataThe ABCs of Big Data
The ABCs of Big Data
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
How Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsHow Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing efforts
 
Big Data analytics
Big Data analyticsBig Data analytics
Big Data analytics
 
The Business Analyst as a leader
The Business Analyst as a leaderThe Business Analyst as a leader
The Business Analyst as a leader
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Enhancing intelligence with the Internet of Things

  • 1. Enhancing Intelligence in the ‘Internet of Things’ The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River INNOVATORS START HERE.
  • 2. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ EXECUTIVE SUMMARY A key driver for embedded system designers is the cloud. With billions of devices becoming connected in the “Internet of things” and sharing data through the cloud, there is a key challenge in managing this complexity. The amount of data that is moved around the Internet is expected to double in just three years and there are different architectures for addressing this challenge of sharing and managing data securely and reliably in the cloud. This is a different situation from the existing migration of apps into the IT cloud. Systems handling machine-to-machine (M2M) data have to be reliable, secure, and scalable with real-time performance measured in microseconds. All this data has to be available anytime, anywhere, and this is opening up new ways for equipment to be designed and built. This paper takes a look at the key industry trends driving consolidation of processing workloads to make all the functionality on a device secure, manageable, and scalable. TABLE OF CONTENTS Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Industry Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Smart Grid. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 .. Manufacturing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Transportation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Consolidation and Separation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Scalability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 | White Paper | Wind River Confidential. Internal Use Only.
  • 3. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ INDUSTRY TRENDS system grows in a haphazard, unmanaged way. Often the original One architecture that is gaining ground is to provide more local- elements of the system are so critical that there is no opportunity ized, connected processing power close to where it is needed, to pull everything out and start again from scratch, leading to a often as a gateway to the wider Internet. In this way, local traffic more evolutionary architecture. can be processed quickly and acted on, while the data is still avail- This often leads to a highly complex base of software that is con- able to the wider systems across the Internet, whether it is a train, stantly patched and not well documented, creating bugs, errors, a manufacturing floor, or a power plant. and glitches. The safety-critical elements of the design, from At the heart of this approach is the ability to consolidate a num- programmable logic controllers to sensors, tend to be relatively ber of functions, from the communications to the data processing. simple, well-tested devices that have well-defined code and states This is costly and complex when implemented in separate boxes, and are left alone. As a result, adding new functions and features and the ability to consolidate a wide range of functions reliably can often impact the overall performance of the system. and securely into an intelligent single unit that is more cost effec- All of this is reflected in higher costs for upgrading, managing, and tive is increasingly popular. protecting the system. With many industrial embedded systems Security not built with communications or security in mind, this is a signifi- This trend has implications for security. Consolidating workloads in a single device means communications are linked to real-time operations and the flow of data. This means there is a need to keep certain functions very separate. Safety-critical code has to be protected and unchanged to retain its certification, and yet the security that protects the system has to be updated regularly to defend against ever changing attacks. At the same time, there are communications protocols and data capture in the system that need real-time performance alongside human interfaces that can be run at slower speeds. All of this provides a potentially highly complex environment. The traditional approach has been to have separate devices for each of these functions, keeping communications and real- time elements separate. However, security needs to be deeply embedded within the system to provide the maximum protection, and physical separation leads to a number of architectural challenges that can be expensive to solve. Complexity cant part of the cost of doing business. Virtualization Virtualization has been solving a number of these challenges. Using multiple cores and time and space separation it has been possible to run the different elements—security, communications, real-time, and user interface—on separate operating systems on separate cores. Sometimes these separate cores are in separate devices on a single board, replacing multiple boards in a system. Increasingly, these elements have been coming together in a single multi-core device, offering higher performance that can be used for more features or lower power consumption, which is now a key consideration. This trend is being supported with new approaches such as virtualization extensions within processors capable of supporting time and space separation in hardware, increasing performance and reducing power consumption and system cost. Now it is possible to run multiple operating systems and separate applications on a single core and still achieve the real-time performance that many embedded industrial systems require. This This separation tends to show up in system architectures in a allows for significantly lower cost and complexity as well as lower number of ways. Often it shows up with new devices being added power consumption than with multi-core systems. to the system to provide new features or new security, and the 3 | White Paper | Wind River Confidential. Internal Use Only.
  • 4. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ Smart Grid Manufacturing The current industry focus on the smart grid is a classic example Similarly, manufacturing plants can benefit from virtualization. A of the challenges of adding intelligence and networking to exist- single-core device can run several “soft” programmable logic ing legacy systems. The concept of the smart grid is driven by the controllers (PLC) and provide the security and communications need to integrate variable power sources such as wind or wave for sensors and networks around the shop floor through a real- power into the existing power grid based around static sources time operating system. Graphical interfaces can be added via the such as traditional power stations. To do this requires “smart non-real-time elements to make machines more user friendly and meters” that measure consumption in the home, office, or factory productive with an easy upgrade process that does not perturb as well as a network to carry that data back and control the differ- other parts of the systems. ent parts of the grid based on the real-time data. This is a highly complex task that requires large amounts of data handling and processing power overlaid on a grid that was constructed in the 1950s or even earlier. With the communications stacks implemented securely and reliably, all the data from around the floor can be available whenever and wherever required. This can be used to make planning more efficient and allow algorithms to spot potential problems within While there are large scale data centre implementations for han- the equipment, triggering preventative maintenance routines and dling predictive algorithms, a vast amount of processing has to be reducing costly downtime. handled towards the edge of the grid. Potentially handling thousands of smart meters and sensors throughout the grid, this acts as a gateway to the wider network and protects all those meters and power systems from intrusion. Real-time performance is vital, as is reliability and traceability of all the data when it is used for billing purposes. There is a very clear place for such gateways acting as servers for the “client” meters, but the current multi-core devices can have higher performance than necessary. The performance of single core devices is now such that one device can run a secure realtime operating system such as Wind River’s VxWorks® that can Transportation Transport shows similar characteristics. Increasing amounts of electronics are making their way into transportation systems, especially trains. New safety-critical braking control and signaling systems are being implemented alongside data management and entertainment networks, all on a physical platform that is decades old. Costeffective commercial off-the-shelf (COTS) systems based around single-core devices can now handle these key features such as train information systems and other functions safely and securely. Instead of having signals on the rail, trains now have their own handle both data and communications stacks alongside a general highly sophisticated signal and position management systems. purpose operating system such as Microsoft Windows or embed- Positive train control systems are adding highly connected intel- ded Linux. This simplifies the system design and allows existing ligence in trains, for example, making them position-aware as code to be run safely and securely but also allows security to well as providing a centralized advanced train control (ATC) man- be updated regularly. New features and data handling routines agement system. This ATC system is a key example of an M2M can be added in the non-real-time portion of the design without cloud architecture, taking data from trains around the network to impacting on the real-time, security, or communications elements. enhance the operation and safety of the system as a whole. Using This dramatically reduces the complexity, risk, and costs of rolling this connected distributed intelligence can improve safety and out the infrastructure that is required for the smart grid. performance but the challenge is to implement such a system cost effectively. 4 | White Paper | Wind River Confidential. Internal Use Only.
  • 5. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ Operational Control Center High A Authority Management Server Remote Users Communications Train Control Training/Train Controller/ Transit Manager Train Control Servers *n TCP/IP Router UPS Authority Server, Trainborne, Wayside Trainborne Diagnostic Support GPS Location Determination Trackside Crossing Key Local Communications Wireless Network Defect Detectors Control Point Rail-Rail Interfaces Wayside Interface Units (WIUs) Architecture of a positive train control system Consolidation and Separation Scalability There are two areas where virtualization is particularly relevant: A key element of virtualization is the scalability. Supporting mul- providing consolidation of workloads and combining communica- tiple operating systems on a single core means the system is eas- tion stacks with other functions. ily expandable to higher-performance multi-core devices with Consolidation of workloads is at the heart of the move to having all data accessible anywhere. Keeping real-time functions separate from general data processing and handling is vital to maintaining systems’ responsiveness, but it all has to be kept secure. This leads to new system architectures based around the dynamic flow of data. Here, control, interface, security, and communications are all kept separate as they all change at different rates and have different requirements. Being able to combine these functions in a single device and still keep them separate is a vital element in providing design flexibility and agility. 5 | White Paper | Wind River Confidential. Internal Use Only. minimal risk. The multi-core device can handle the operating systems on separate cores, providing higher performance for more advanced features without having to rewrite and retest the existing system implementation. This brings a dramatic savings in the development time and costs of moving to a new generation of equipment. This also allows vendors to provide scalable equipment platforms that are based around a common code base that is tested and reliable.
  • 6. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ CONCLUSION a single board rather than multiple units with multiple boards Virtualization has already opened up a wide range of new applica- reduces the upfront costs. With millions of M2M systems being tions in IT, but the ability to provide true real-time performance rolled out, connected to hundreds of thousands of gateway units, alongside a mainstream operating system opens up yet more this is a significant savings in the upfront cost of a rollout. embedded opportunities in new and existing markets. Smart Decoupling the software life cycle of different elements and still grid networks, manufacturing systems, and transportation are being able to use a single device can reduce expenses. Not man- all set to benefit from the consolidation of workloads and the aging multiple versions of replacement boards and having fewer separation of communication and security functions onto a single boxes on the shelf reduces operational expenses of warehousing core. and stock management. Replacing units with problems before they This allows cost-effective embedded systems to be developed that fail is also significantly simpler and more cost effective with a single are secure, reliable, and future-proof. Running the same operating unit rather than multiple boards. systems on a single core and multi-core device opens up a platform All of this can provide dramatic savings in development time and of equipment that can scale from a single core to many, all with the equipment cost, allowing more processing performance to sit same base of software. closer to where it is needed in the network and support lower cost Consolidation of workloads also has a significant effect on the capi- sensors and terminals in the home or on the factory floor. tal and operational expenditures. Building a single unit with Wind River is a world leader in embedded and mobile software. Wind River has been pioneering computing inside embedded devices since 1981, and its technology is found in more than 1 billion products. Wind River is headquartered in Alameda, California, with offices in more than 20 countries. To learn more, visit Wind River at www.windriver.com. ©2012 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev 05/2012