SlideShare a Scribd company logo
Angelo Corsaro, Ph.D.
                                                    PrismTech
                                    angelo.corsaro@prismtech.com

                          Sara Tucci-Piergiovanni, Ph.D.
                             University of Rome “La Sapienza”
                                        sara.tucci@dis.uniroma1.it




          OpenSplice DDS
          Delivering Performance, Openness, and Freedom




Scaling the Data Distribution
 Service to Global Networks
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Addressing Data Distribution Challenges
                                                          DDS is standard designed to address the data-distribution challenges across
The OMG DDS Standard                                                             a wide class of Defense and Aerospace Applications
‣ Introduced in 2004 to address the Data
  Distribution challenges faced by a wide
  class of Defense and Aerospace
  Applications




                                                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Key requirement for the standard were its
  ability to deliver very high performance while
  seamlessly scaling from embedded to ultra-
  large-scale deployments
‣ Today recommended by key administration
  worldwide and widely adopted across
  several different application domains, such
  as, Automated Trading, Simulations, SCADA,
  Telemetry, etc.

                                                © 2009, PrismTech. All Rights Reserved
Addressing Data Distribution Challenges

‣ DDS is swiftly being adopted as the
  standard for providing System of Systems
  with ubiquitous and access to tactical data




                                                                                     Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ DDS deployments on WAN and sizable MAN
  have also proven it fitness with
  Metropolitan/Wide Area Networks



  So... Why I am doing this presentation?



                                            © 2009, PrismTech. All Rights Reserved
Challenges
DDS presents today some limitations with respect to addressing large scale geographical
deployments, these are:
Discovery
‣ Standard Discovery Protocol Requires Multicast
‣ Scalability




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Limited Control over Topics Visibility, e.g., choosing what to expose to the external world
Communication
‣ Standard Communication Protocol Relies on UDP
‣ No Support for Compression
‣ Difficult NAT/Firewall traversal
‣ Sub-Optimal Data Distribution for WAN Scenario (limited exploitation of multicast)
‣ Scalability
                                          © 2009, PrismTech. All Rights Reserved
Challenges

  Publisher                                                                                     Publisher

               B                                                            B
Subscriber                                                                                       Subscriber




                                                                                                              Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                   m                                                            m
               A           F                                                A           F

 Publisher     J                                                                                 Publisher
                       D       C                                            J
                                                                                    X       Z

               K
                       E
                                                                            K
Subscriber                                                                          Y
                                                                                                 Subscriber
                   DDS-1
   Publisher




                                               Wan


                                   © 2009, PrismTech. All Rights Reserved
Challenges

  Publisher    A                                                                                    Publisher

                   B                                                            B
Subscriber                                                                                           Subscriber




                                                                                                                  Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                       m                                                            m
                   A           F                                                A           F

 Publisher         J                                                                                 Publisher
                           D       C                                            J
                                                                                        X       Z

                   K
                           E
                                                                                K
Subscriber                                                                              Y
                                                                                                     Subscriber
                       DDS-1
   Publisher




                                                   Wan


                                       © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Looking at Internet Apps.
When looking at a solutions for extending DDS applicability to Internet Scale Systems, we can’t
ignore architectures adopted by very successful Internet Applications.

‣ P2P application like KaZaa have shown to scale very well and to support millions of users while




                                                                                                    Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
  effectively managing millions of subjects

‣ Application like Skype are connecting millions of people and managing in real-time they
  presence (discovery)




                                         © 2009, PrismTech. All Rights Reserved
Architecture for Internet Scale DDS

‣ DDS-Level Routers will be introduced that                                                                                                              H 1,1,h

  establish a Peer-to-Peer overlay that                                  N2,5          R                                             N1,1                 H 1,1,1
  relays DDS data over the WAN                                                                      SN
                                                                                                                                R
                                                                                                                                                       H 1,1,0
 ‣ The Router provides a single access point for                     H 2,1,m




                                                                                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
   deciding what to expose to the external world                                                                                SN
                                                                                                      H 1,0,k
 ‣ The Router can perform Topic Transformation, etc.                                       SN
‣ A Network of Super-Nodes is used for
                                                                    R
                                                       N2,0                                        H 1,0,1               N1,0
  ensuring:                                         H 2,0,i                                               H 1,0,0        R
                                                                                                                                                         R          N2,4
 ‣ Scalable (Global) Discovery                                                                        R                                 SN
 ‣ Subscription Management (when crossing the                                                    N2,1
   boundaries of a System)                                                                                          SN                                       H 2,1,n

 ‣ Support for establishing communication between
   Pub and Sub (perhaps via STUNT to circumvent                                                                          N2,2   R      R       N2,3
                                                                                                H 2,1,j
   NAT/FIREWALL issues)

                                                                                                                     H 2,1,k                 H 2,1,h
                                                       © 2009, PrismTech. All Rights Reserved
DDS Router
‣ DDS Router communicates with the
    local DDS Domain by Multicast                           Ni
                                                                          R
‣   DDS Router are configured with the
    set of topics to be exposed along with
    potential transformations
‣   Router2Router communication is




                                                                                                      Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                                                                     R         N
    carried on by RTPS over TCP (since                                                            k

    TCP has been tuned over years to
    work fine in WAN
‣   If required the Router takes care of
    compressing Data
‣   DDS Router Runs a “variation” or
    DDSI/RTPS
‣   Topic, Subscription and Publication are propagated to Super Nodes
‣   Information available into super nodes ensure that local reader/writer will be properly matched

                                             © 2009, PrismTech. All Rights Reserved
DDS Super-Nodes (SN)
‣ Super-Nodes store all the “discovery information”
 ‣ List of Topics available in the system                                                           R
                                                                                              SN
 ‣ Associations between Topics and Router role (e.g. Pub or                              SN
                                                                                     R
   Sub)




                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ A distributed protocol is used to replicated data,
                                                                                                   SN
  eventually, on all replicas
                                                                                         SN
‣ Router keep a list of well-known Super-Nodes to
  bootstrap discovery                                                                               R

                                                                                         R

‣ NOTE: Super-Nodes can also be used to support
  the implementation of STUNT-like protocols to
  facilitate NAT/Firewall trespassing
                                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                    {S(B), S(D),P(E)}

      DDS             R1   SN1                                  SN4         R4     DDS




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                           SN2                                  SN3



   {S(A),P(B),P(C)}   R2                                               R3    {S(A),P(D),S(E)}

                  DDS                                                 DDS


                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}    R1-{P(A),S(B),P(C)}                                     {S(B), S(D),P(E)}

      DDS             R1         SN1                                   SN4          R4     DDS
                                                           R4-{S(B), S(D),P(E)}




                                                                                                        Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                 SN2                                   SN3   R3-{S(A),P(D),S(E)}
                           R2-{S(A),P(B),P(C)}

   {S(A),P(B),P(C)}   R2                                                       R3    {S(A),P(D),S(E)}

                  DDS                                                        DDS


                                   © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                    {S(B), S(D),P(E)}

      DDS             R1   SN1                                  SN4         R4     DDS
                             R1-{P(A),S(B),P(C)}
                             R2-{S(A),P(B),P(C)}
                             R3-{S(A),P(D),P(E)}
                             R4-{S(B), S(D),S(E)}




                                                                                                Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                           SN2                                  SN3



   {S(A),P(B),P(C)}   R2                                               R3    {S(A),P(D),S(E)}

                  DDS                                                 DDS


                            © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                               {S(B), S(D),P(E)}

      DDS             R1        SN1                                     SN4            R4       DDS
                          {P(A)} R1-{P(A),S(B),P(C)}
                                 R2-{S(A),P(B),P(C)}
                       {P(A)}    R3-{S(A),P(D),P(E)}                          {P(E)}
                                 R4-{S(B), S(D),S(E)}




                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                SN2                                     SN3

              {P(B)}                                                                   {P(D)}
   {S(A),P(B),P(C)}        {P(B)}                                               R3      {S(A),P(D),S(E)}
                      R2

                  DDS                                                         DDS


                                    © 2009, PrismTech. All Rights Reserved
How it Works
        {P(A),S(B),P(C)}                                                               {S(B), S(D),P(E)}

      DDS        A    R1        SN1                                     SN4            R4       DDS
                          {P(A)} R1-{P(A),S(B),P(C)}
                                 R2-{S(A),P(B),P(C)}
                       {P(A)}    R3-{S(A),P(D),P(E)}                          {P(E)}
                                 R4-{S(B), S(D),S(E)}




                                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
                                SN2                                     SN3

              {P(B)}                                                                   {P(D)}
   {S(A),P(B),P(C)}        {P(B)}                                               R3      {S(A),P(D),S(E)}
                      R2
                       A                                                         A
                                                                                 A

                  DDS                                                         DDS


                                    © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Extension to the DDS Standard
‣ What described in the previous slides can easily be implemented in an
 interoperable manner, exploiting the pre-designed extension points present in
 the DDS Standard




                                                                                 Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Areas of extension include:
 ‣Discovery
 ‣DDSI/RTPS




                                 © 2009, PrismTech. All Rights Reserved
Discovery Extension
1‣ A new Discovery Protocol should be                                                      R
   added that allows to discover                                            1        SN
                                                                                SN
   relevant information (Topics,                                     R
                                                                                     2
   Subscriptions, Publications) via the




                                                                                               Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
   Super-Nodes                                                                            SN
                                                                                SN
2‣ A new protocol to be used between
   Super-Nodes should also be                                                              R
   standardized!
                                                                                R




                                   © 2009, PrismTech. All Rights Reserved
DDSI/RTPS Protocol xTensions
DDSI/RTPS Should be extended                                           DDS     R1    SN1   SN4         R4   DDS
to include:
                                                                                     SN2   SN3




                                                                                                                  Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣ Support for TCP/IP
 ‣Offloading reliability from DDSI to TCP                                       R2                R3

  whenever possible                                                            DDS               DDS



‣ Compression


                                      © 2009, PrismTech. All Rights Reserved
State of the Art
         Scaling DDS to Global Networks
Agenda


         Extensions to the Standard
         Concluding Remarks
Concluding Remarks
‣ The DDS Standard includes today some known
    limitation when trying to address Ultra-Large-
    Scale Systems
‣   These limitation mostly impact its scalability and
    efficiency




                                                                                           Proprietary Information - Distribution without Expressed Written Permission is Prohibited.
‣   The good news is that exploiting available
    extension points in the standard it is possible to
    extend the DDS Architectural Style to scale to
    Ultra-Large-Scale Systems
‣   The Router/Super-Nodes approach builds over
    years of experience in the domain of Internet
    Scale applications, such as, KaZaa, Skype, etc.
‣   Thus, PrismTech will work toward update of the
    DDS Spec to include these extension points.


                                                  © 2009, PrismTech. All Rights Reserved

More Related Content

What's hot

RPC Over DDS
RPC Over DDSRPC Over DDS
概念モデリング再入門 + DDD
概念モデリング再入門 + DDD概念モデリング再入門 + DDD
概念モデリング再入門 + DDD
Hiroshima JUG
 
オンプレML基盤on Kubernetes パネルディスカッション
オンプレML基盤on Kubernetes パネルディスカッションオンプレML基盤on Kubernetes パネルディスカッション
オンプレML基盤on Kubernetes パネルディスカッション
Yahoo!デベロッパーネットワーク
 
Docker環境でetherium開発環境を作る際のはまりどころ
Docker環境でetherium開発環境を作る際のはまりどころDocker環境でetherium開発環境を作る際のはまりどころ
Docker環境でetherium開発環境を作る際のはまりどころ
健一 茂木
 
オブジェクト指向エクササイズのススメ
オブジェクト指向エクササイズのススメオブジェクト指向エクササイズのススメ
オブジェクト指向エクササイズのススメYoji Kanno
 
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
toshihiro ichitani
 
組織にテストを書く文化を根付かせる戦略と戦術
組織にテストを書く文化を根付かせる戦略と戦術組織にテストを書く文化を根付かせる戦略と戦術
組織にテストを書く文化を根付かせる戦略と戦術
Takuto Wada
 
例外設計における大罪
例外設計における大罪例外設計における大罪
例外設計における大罪
Takuto Wada
 
View Customize Pluginで出来ること
View Customize Pluginで出来ることView Customize Pluginで出来ること
View Customize Pluginで出来ること
onozaty
 
プログラムの処方箋~健康なコードと病んだコード
プログラムの処方箋~健康なコードと病んだコードプログラムの処方箋~健康なコードと病んだコード
プログラムの処方箋~健康なコードと病んだコード
Shigenori Sagawa
 
超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール
Shin Tanigawa
 
Pythonのシグナル処理
Pythonのシグナル処理Pythonのシグナル処理
Pythonのシグナル処理
Atsuo Ishimoto
 
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
Takuto Wada
 
2023-03-23_Spiral.AI
2023-03-23_Spiral.AI2023-03-23_Spiral.AI
2023-03-23_Spiral.AI
SasakiYuichi1
 
スクレイピングとPython
スクレイピングとPythonスクレイピングとPython
スクレイピングとPython
Hironori Sekine
 
OAuth 2.0のResource Serverの作り方
OAuth 2.0のResource Serverの作り方OAuth 2.0のResource Serverの作り方
OAuth 2.0のResource Serverの作り方
Hitachi, Ltd. OSS Solution Center.
 
オブジェクト指向できていますか?
オブジェクト指向できていますか?オブジェクト指向できていますか?
オブジェクト指向できていますか?Moriharu Ohzu
 
(今ちゃんと振り返る) ゴール指向要求分析 入門
(今ちゃんと振り返る) ゴール指向要求分析 入門(今ちゃんと振り返る) ゴール指向要求分析 入門
(今ちゃんと振り返る) ゴール指向要求分析 入門
Fuyuki Ishikawa
 
なぜ自社で脆弱性診断を行うべきなのか
なぜ自社で脆弱性診断を行うべきなのかなぜ自社で脆弱性診断を行うべきなのか
なぜ自社で脆弱性診断を行うべきなのか
Sen Ueno
 
大企業Hacks!
大企業Hacks!大企業Hacks!
大企業Hacks!
Ryosuke Otsuya
 

What's hot (20)

RPC Over DDS
RPC Over DDSRPC Over DDS
RPC Over DDS
 
概念モデリング再入門 + DDD
概念モデリング再入門 + DDD概念モデリング再入門 + DDD
概念モデリング再入門 + DDD
 
オンプレML基盤on Kubernetes パネルディスカッション
オンプレML基盤on Kubernetes パネルディスカッションオンプレML基盤on Kubernetes パネルディスカッション
オンプレML基盤on Kubernetes パネルディスカッション
 
Docker環境でetherium開発環境を作る際のはまりどころ
Docker環境でetherium開発環境を作る際のはまりどころDocker環境でetherium開発環境を作る際のはまりどころ
Docker環境でetherium開発環境を作る際のはまりどころ
 
オブジェクト指向エクササイズのススメ
オブジェクト指向エクササイズのススメオブジェクト指向エクササイズのススメ
オブジェクト指向エクササイズのススメ
 
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
多様な働き⽅のチームでどうやって アジャイルにやるの?(雁行陣開発)
 
組織にテストを書く文化を根付かせる戦略と戦術
組織にテストを書く文化を根付かせる戦略と戦術組織にテストを書く文化を根付かせる戦略と戦術
組織にテストを書く文化を根付かせる戦略と戦術
 
例外設計における大罪
例外設計における大罪例外設計における大罪
例外設計における大罪
 
View Customize Pluginで出来ること
View Customize Pluginで出来ることView Customize Pluginで出来ること
View Customize Pluginで出来ること
 
プログラムの処方箋~健康なコードと病んだコード
プログラムの処方箋~健康なコードと病んだコードプログラムの処方箋~健康なコードと病んだコード
プログラムの処方箋~健康なコードと病んだコード
 
超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール超簡単! JettyをWindowsにインストール
超簡単! JettyをWindowsにインストール
 
Pythonのシグナル処理
Pythonのシグナル処理Pythonのシグナル処理
Pythonのシグナル処理
 
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
SQLアンチパターン 幻の第26章「とりあえず削除フラグ」
 
2023-03-23_Spiral.AI
2023-03-23_Spiral.AI2023-03-23_Spiral.AI
2023-03-23_Spiral.AI
 
スクレイピングとPython
スクレイピングとPythonスクレイピングとPython
スクレイピングとPython
 
OAuth 2.0のResource Serverの作り方
OAuth 2.0のResource Serverの作り方OAuth 2.0のResource Serverの作り方
OAuth 2.0のResource Serverの作り方
 
オブジェクト指向できていますか?
オブジェクト指向できていますか?オブジェクト指向できていますか?
オブジェクト指向できていますか?
 
(今ちゃんと振り返る) ゴール指向要求分析 入門
(今ちゃんと振り返る) ゴール指向要求分析 入門(今ちゃんと振り返る) ゴール指向要求分析 入門
(今ちゃんと振り返る) ゴール指向要求分析 入門
 
なぜ自社で脆弱性診断を行うべきなのか
なぜ自社で脆弱性診断を行うべきなのかなぜ自社で脆弱性診断を行うべきなのか
なぜ自社で脆弱性診断を行うべきなのか
 
大企業Hacks!
大企業Hacks!大企業Hacks!
大企業Hacks!
 

Viewers also liked

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpoliticsoiwan
 
Small Business Owners' Work-Life Balance
Small Business Owners' Work-Life BalanceSmall Business Owners' Work-Life Balance
Small Business Owners' Work-Life Balance
InterCall
 
Practical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous ConferencesPractical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous Conferences
Elisabeth Riedl
 
Crosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingCrosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingFaye Brownlie
 
Charla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er cicloCharla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er ciclo
XXX XXX
 
CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert
Faye Brownlie
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology Incubators
Angelo Corsaro
 
Efficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time JavaEfficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time Java
Angelo Corsaro
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presley
helenavf1
 
Sarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sampleSarah Robins Powell resume/work sample
Sarah Robins Powell resume/work samplesayster
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equationspd3h
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equationspd3h
 
Pharm Collaborations Cbi Pres
Pharm Collaborations Cbi PresPharm Collaborations Cbi Pres
Pharm Collaborations Cbi Presthess1121
 
Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12
Faye Brownlie
 
Electing A President Individual Quiz
Electing A President Individual QuizElecting A President Individual Quiz
Electing A President Individual Quizguest71290aa
 
Valentine's day
Valentine's dayValentine's day
Valentine's day
XXX XXX
 
Present Tense Verbs
Present Tense VerbsPresent Tense Verbs
Present Tense Verbs
Livemocha .com
 
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall StreetOpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
Angelo Corsaro
 

Viewers also liked (20)

Week 6 cyberpolitics
Week 6 cyberpoliticsWeek 6 cyberpolitics
Week 6 cyberpolitics
 
Small Business Owners' Work-Life Balance
Small Business Owners' Work-Life BalanceSmall Business Owners' Work-Life Balance
Small Business Owners' Work-Life Balance
 
Practical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous ConferencesPractical Aspects Of The Campaign And Results Of Previous Conferences
Practical Aspects Of The Campaign And Results Of Previous Conferences
 
Crosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about ThinkingCrosscurrents, 2011. It's All about Thinking
Crosscurrents, 2011. It's All about Thinking
 
Charla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er cicloCharla uso tecnologías 3 er ciclo
Charla uso tecnologías 3 er ciclo
 
CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert CR4YR collaboration.Aug 2013, Oct Prince Rupert
CR4YR collaboration.Aug 2013, Oct Prince Rupert
 
Roadmap and Technology Incubators
Roadmap and Technology IncubatorsRoadmap and Technology Incubators
Roadmap and Technology Incubators
 
Efficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time JavaEfficient Memory-Reference Checks for Real-time Java
Efficient Memory-Reference Checks for Real-time Java
 
Elvis Presley
Elvis PresleyElvis Presley
Elvis Presley
 
Sarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sampleSarah Robins Powell resume/work sample
Sarah Robins Powell resume/work sample
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equations
 
Visualizing Differential Equations
Visualizing Differential EquationsVisualizing Differential Equations
Visualizing Differential Equations
 
Pharm Collaborations Cbi Pres
Pharm Collaborations Cbi PresPharm Collaborations Cbi Pres
Pharm Collaborations Cbi Pres
 
Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12Bullkley.leadership.nov.22.12
Bullkley.leadership.nov.22.12
 
Electing A President Individual Quiz
Electing A President Individual QuizElecting A President Individual Quiz
Electing A President Individual Quiz
 
Valentine's day
Valentine's dayValentine's day
Valentine's day
 
ikp321-01
ikp321-01ikp321-01
ikp321-01
 
Present Tense Verbs
Present Tense VerbsPresent Tense Verbs
Present Tense Verbs
 
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall StreetOpenSplice DDS: The Open Source Middleware Accelerating Wall Street
OpenSplice DDS: The Open Source Middleware Accelerating Wall Street
 
Sph 106 Ch 15
Sph 106 Ch 15Sph 106 Ch 15
Sph 106 Ch 15
 

Similar to Scaling the Data Distribution Service to Global Networks

The Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall StreetThe Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall Street
Angelo Corsaro
 
Hibernating DDS
Hibernating DDSHibernating DDS
Hibernating DDS
Angelo Corsaro
 
OpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open SourceOpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open Source
Angelo Corsaro
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter Roaming
John Loughney
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org Community
Angelo Corsaro
 
A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDS
Angelo Corsaro
 
Embrace Change
Embrace ChangeEmbrace Change
Embrace Change
Angelo Corsaro
 

Similar to Scaling the Data Distribution Service to Global Networks (7)

The Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall StreetThe Open Source Messaging Powering Wall Street
The Open Source Messaging Powering Wall Street
 
Hibernating DDS
Hibernating DDSHibernating DDS
Hibernating DDS
 
OpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open SourceOpenSplice DDS Goes Open Source
OpenSplice DDS Goes Open Source
 
Diameter and Diameter Roaming
Diameter and Diameter RoamingDiameter and Diameter Roaming
Diameter and Diameter Roaming
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org Community
 
A Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDSA Gentle Introduction to OpenSplice DDS
A Gentle Introduction to OpenSplice DDS
 
Embrace Change
Embrace ChangeEmbrace Change
Embrace Change
 

More from Angelo Corsaro

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
Angelo Corsaro
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
Angelo Corsaro
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Angelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Angelo Corsaro
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
Angelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
Angelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
Angelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
Angelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
Angelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
Angelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
Angelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
Angelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
Angelo Corsaro
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
Angelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
Angelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
Angelo Corsaro
 

More from Angelo Corsaro (20)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog ComputingBreaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Cyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT AgeCyclone DDS: Sharing Data in the IoT Age
Cyclone DDS: Sharing Data in the IoT Age
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
Data Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained EnvionrmentsData Sharing in Extremely Resource Constrained Envionrments
Data Sharing in Extremely Resource Constrained Envionrments
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
Vortex II -- The Industrial IoT Connectivity Standard
Vortex II -- The  Industrial IoT  Connectivity StandardVortex II -- The  Industrial IoT  Connectivity Standard
Vortex II -- The Industrial IoT Connectivity Standard
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Scaling the Data Distribution Service to Global Networks

  • 1. Angelo Corsaro, Ph.D. PrismTech angelo.corsaro@prismtech.com Sara Tucci-Piergiovanni, Ph.D. University of Rome “La Sapienza” sara.tucci@dis.uniroma1.it OpenSplice DDS Delivering Performance, Openness, and Freedom Scaling the Data Distribution Service to Global Networks
  • 2. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 3. Addressing Data Distribution Challenges DDS is standard designed to address the data-distribution challenges across The OMG DDS Standard a wide class of Defense and Aerospace Applications ‣ Introduced in 2004 to address the Data Distribution challenges faced by a wide class of Defense and Aerospace Applications Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Key requirement for the standard were its ability to deliver very high performance while seamlessly scaling from embedded to ultra- large-scale deployments ‣ Today recommended by key administration worldwide and widely adopted across several different application domains, such as, Automated Trading, Simulations, SCADA, Telemetry, etc. © 2009, PrismTech. All Rights Reserved
  • 4. Addressing Data Distribution Challenges ‣ DDS is swiftly being adopted as the standard for providing System of Systems with ubiquitous and access to tactical data Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ DDS deployments on WAN and sizable MAN have also proven it fitness with Metropolitan/Wide Area Networks So... Why I am doing this presentation? © 2009, PrismTech. All Rights Reserved
  • 5. Challenges DDS presents today some limitations with respect to addressing large scale geographical deployments, these are: Discovery ‣ Standard Discovery Protocol Requires Multicast ‣ Scalability Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Limited Control over Topics Visibility, e.g., choosing what to expose to the external world Communication ‣ Standard Communication Protocol Relies on UDP ‣ No Support for Compression ‣ Difficult NAT/Firewall traversal ‣ Sub-Optimal Data Distribution for WAN Scenario (limited exploitation of multicast) ‣ Scalability © 2009, PrismTech. All Rights Reserved
  • 6. Challenges Publisher Publisher B B Subscriber Subscriber Proprietary Information - Distribution without Expressed Written Permission is Prohibited. m m A F A F Publisher J Publisher D C J X Z K E K Subscriber Y Subscriber DDS-1 Publisher Wan © 2009, PrismTech. All Rights Reserved
  • 7. Challenges Publisher A Publisher B B Subscriber Subscriber Proprietary Information - Distribution without Expressed Written Permission is Prohibited. m m A F A F Publisher J Publisher D C J X Z K E K Subscriber Y Subscriber DDS-1 Publisher Wan © 2009, PrismTech. All Rights Reserved
  • 8. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 9. Looking at Internet Apps. When looking at a solutions for extending DDS applicability to Internet Scale Systems, we can’t ignore architectures adopted by very successful Internet Applications. ‣ P2P application like KaZaa have shown to scale very well and to support millions of users while Proprietary Information - Distribution without Expressed Written Permission is Prohibited. effectively managing millions of subjects ‣ Application like Skype are connecting millions of people and managing in real-time they presence (discovery) © 2009, PrismTech. All Rights Reserved
  • 10. Architecture for Internet Scale DDS ‣ DDS-Level Routers will be introduced that H 1,1,h establish a Peer-to-Peer overlay that N2,5 R N1,1 H 1,1,1 relays DDS data over the WAN SN R H 1,1,0 ‣ The Router provides a single access point for H 2,1,m Proprietary Information - Distribution without Expressed Written Permission is Prohibited. deciding what to expose to the external world SN H 1,0,k ‣ The Router can perform Topic Transformation, etc. SN ‣ A Network of Super-Nodes is used for R N2,0 H 1,0,1 N1,0 ensuring: H 2,0,i H 1,0,0 R R N2,4 ‣ Scalable (Global) Discovery R SN ‣ Subscription Management (when crossing the N2,1 boundaries of a System) SN H 2,1,n ‣ Support for establishing communication between Pub and Sub (perhaps via STUNT to circumvent N2,2 R R N2,3 H 2,1,j NAT/FIREWALL issues) H 2,1,k H 2,1,h © 2009, PrismTech. All Rights Reserved
  • 11. DDS Router ‣ DDS Router communicates with the local DDS Domain by Multicast Ni R ‣ DDS Router are configured with the set of topics to be exposed along with potential transformations ‣ Router2Router communication is Proprietary Information - Distribution without Expressed Written Permission is Prohibited. R N carried on by RTPS over TCP (since k TCP has been tuned over years to work fine in WAN ‣ If required the Router takes care of compressing Data ‣ DDS Router Runs a “variation” or DDSI/RTPS ‣ Topic, Subscription and Publication are propagated to Super Nodes ‣ Information available into super nodes ensure that local reader/writer will be properly matched © 2009, PrismTech. All Rights Reserved
  • 12. DDS Super-Nodes (SN) ‣ Super-Nodes store all the “discovery information” ‣ List of Topics available in the system R SN ‣ Associations between Topics and Router role (e.g. Pub or SN R Sub) Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ A distributed protocol is used to replicated data, SN eventually, on all replicas SN ‣ Router keep a list of well-known Super-Nodes to bootstrap discovery R R ‣ NOTE: Super-Nodes can also be used to support the implementation of STUNT-like protocols to facilitate NAT/Firewall trespassing © 2009, PrismTech. All Rights Reserved
  • 13. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 14. How it Works {P(A),S(B),P(C)} R1-{P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS R4-{S(B), S(D),P(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 R3-{S(A),P(D),S(E)} R2-{S(A),P(B),P(C)} {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 15. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} R3-{S(A),P(D),P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {S(A),P(B),P(C)} R2 R3 {S(A),P(D),S(E)} DDS DDS © 2009, PrismTech. All Rights Reserved
  • 16. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS R1 SN1 SN4 R4 DDS {P(A)} R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} {P(A)} R3-{S(A),P(D),P(E)} {P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {P(B)} {P(D)} {S(A),P(B),P(C)} {P(B)} R3 {S(A),P(D),S(E)} R2 DDS DDS © 2009, PrismTech. All Rights Reserved
  • 17. How it Works {P(A),S(B),P(C)} {S(B), S(D),P(E)} DDS A R1 SN1 SN4 R4 DDS {P(A)} R1-{P(A),S(B),P(C)} R2-{S(A),P(B),P(C)} {P(A)} R3-{S(A),P(D),P(E)} {P(E)} R4-{S(B), S(D),S(E)} Proprietary Information - Distribution without Expressed Written Permission is Prohibited. SN2 SN3 {P(B)} {P(D)} {S(A),P(B),P(C)} {P(B)} R3 {S(A),P(D),S(E)} R2 A A A DDS DDS © 2009, PrismTech. All Rights Reserved
  • 18. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 19. Extension to the DDS Standard ‣ What described in the previous slides can easily be implemented in an interoperable manner, exploiting the pre-designed extension points present in the DDS Standard Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Areas of extension include: ‣Discovery ‣DDSI/RTPS © 2009, PrismTech. All Rights Reserved
  • 20. Discovery Extension 1‣ A new Discovery Protocol should be R added that allows to discover 1 SN SN relevant information (Topics, R 2 Subscriptions, Publications) via the Proprietary Information - Distribution without Expressed Written Permission is Prohibited. Super-Nodes SN SN 2‣ A new protocol to be used between Super-Nodes should also be R standardized! R © 2009, PrismTech. All Rights Reserved
  • 21. DDSI/RTPS Protocol xTensions DDSI/RTPS Should be extended DDS R1 SN1 SN4 R4 DDS to include: SN2 SN3 Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ Support for TCP/IP ‣Offloading reliability from DDSI to TCP R2 R3 whenever possible DDS DDS ‣ Compression © 2009, PrismTech. All Rights Reserved
  • 22. State of the Art Scaling DDS to Global Networks Agenda Extensions to the Standard Concluding Remarks
  • 23. Concluding Remarks ‣ The DDS Standard includes today some known limitation when trying to address Ultra-Large- Scale Systems ‣ These limitation mostly impact its scalability and efficiency Proprietary Information - Distribution without Expressed Written Permission is Prohibited. ‣ The good news is that exploiting available extension points in the standard it is possible to extend the DDS Architectural Style to scale to Ultra-Large-Scale Systems ‣ The Router/Super-Nodes approach builds over years of experience in the domain of Internet Scale applications, such as, KaZaa, Skype, etc. ‣ Thus, PrismTech will work toward update of the DDS Spec to include these extension points. © 2009, PrismTech. All Rights Reserved