SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Enhancing Intelligence in the
‘Internet of Things’
The Business of Embedded Virtualization
Alexander Damisch, Director, Industrial Vertical, Wind River

INNOVATORS START HERE.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

EXECUTIVE SUMMARY
A key driver for embedded system designers is the cloud. With billions of devices becoming connected in the “Internet of things” and sharing data through the cloud, there is a
key challenge in managing this complexity. The amount of data that is moved around the
Internet is expected to double in just three years and there are different architectures for
addressing this challenge of sharing and managing data securely and reliably in the cloud.
This is a different situation from the existing migration of apps into the IT cloud. Systems
handling machine-to-machine (M2M) data have to be reliable, secure, and scalable with
real-time performance measured in microseconds. All this data has to be available anytime, anywhere, and this is opening up new ways for equipment to be designed and built.
This paper takes a look at the key industry trends driving consolidation of processing
workloads to make all the functionality on a device secure, manageable, and scalable.

TABLE OF CONTENTS
Executive Summary.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
Industry Trends  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
	Security  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
	Complexity  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
. .
Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
	Smart Grid.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4		..
	Manufacturing.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
	Transportation.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
	Consolidation and Separation.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
	Scalability.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Conclusion.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6

2 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

INDUSTRY TRENDS

system grows in a haphazard, unmanaged way. Often the original

One architecture that is gaining ground is to provide more local-

elements of the system are so critical that there is no opportunity

ized, connected processing power close to where it is needed,

to pull everything out and start again from scratch, leading to a

often as a gateway to the wider Internet. In this way, local traffic

more evolutionary architecture.

can be processed quickly and acted on, while the data is still avail-

This often leads to a highly complex base of software that is con-

able to the wider systems across the Internet, whether it is a train,

stantly patched and not well documented, creating bugs, errors,

a manufacturing floor, or a power plant.

and glitches. The safety-critical elements of the design, from

At the heart of this approach is the ability to consolidate a num-

programmable logic controllers to sensors, tend to be relatively

ber of functions, from the communications to the data processing.

simple, well-tested devices that have well-defined code and states

This is costly and complex when implemented in separate boxes,

and are left alone. As a result, adding new functions and features

and the ability to consolidate a wide range of functions reliably

can often impact the overall performance of the system.

and securely into an intelligent single unit that is more cost effec-

All of this is reflected in higher costs for upgrading, managing, and

tive is increasingly popular.

protecting the system. With many industrial embedded systems

Security

not built with communications or security in mind, this is a signifi-

This trend has implications for security. Consolidating workloads in
a single device means communications are linked to real-time operations and the flow of data. This means there is a need to keep certain functions very separate. Safety-critical code has to be protected
and unchanged to retain its certification, and yet the security that
protects the system has to be updated regularly to defend against
ever changing attacks. At the same time, there are communications protocols and data capture in the system that need real-time
performance alongside human interfaces that can be run at slower
speeds.
All of this provides a potentially highly complex environment. The
traditional approach has been to have separate devices for each
of these functions, keeping communications and real- time elements separate. However, security needs to be deeply embedded
within the system to provide the maximum protection, and physical separation leads to a number of architectural challenges that
can be expensive to solve.
Complexity

cant part of the cost of doing business.

Virtualization
Virtualization has been solving a number of these challenges.
Using multiple cores and time and space separation it has been
possible to run the different elements—security, communications,
real-time, and user interface—on separate operating systems on
separate cores. Sometimes these separate cores are in separate
devices on a single board, replacing multiple boards in a system.
Increasingly, these elements have been coming together in a single
multi-core device, offering higher performance that can be used
for more features or lower power consumption, which is now a key
consideration. This trend is being supported with new approaches
such as virtualization extensions within processors capable of supporting time and space separation in hardware, increasing performance and reducing power consumption and system cost.
Now it is possible to run multiple operating systems and separate applications on a single core and still achieve the real-time
performance that many embedded industrial systems require. This

This separation tends to show up in system architectures in a

allows for significantly lower cost and complexity as well as lower

number of ways. Often it shows up with new devices being added

power consumption than with multi-core systems.

to the system to provide new features or new security, and the

3 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

Smart Grid

Manufacturing

The current industry focus on the smart grid is a classic example

Similarly, manufacturing plants can benefit from virtualization. A

of the challenges of adding intelligence and networking to exist-

single-core device can run several “soft” programmable logic

ing legacy systems. The concept of the smart grid is driven by the

controllers (PLC) and provide the security and communications

need to integrate variable power sources such as wind or wave

for sensors and networks around the shop floor through a real-

power into the existing power grid based around static sources

time operating system. Graphical interfaces can be added via the

such as traditional power stations. To do this requires “smart

non-real-time elements to make machines more user friendly and

meters” that measure consumption in the home, office, or factory

productive with an easy upgrade process that does not perturb

as well as a network to carry that data back and control the differ-

other parts of the systems.

ent parts of the grid based on the real-time data. This is a highly
complex task that requires large amounts of data handling and
processing power overlaid on a grid that was constructed in the
1950s or even earlier.

With the communications stacks implemented securely and reliably, all the data from around the floor can be available whenever
and wherever required. This can be used to make planning more
efficient and allow algorithms to spot potential problems within

While there are large scale data centre implementations for han-

the equipment, triggering preventative maintenance routines and

dling predictive algorithms, a vast amount of processing has to be

reducing costly downtime.

handled towards the edge of the grid. Potentially handling thousands of smart meters and sensors throughout the grid, this acts
as a gateway to the wider network and protects all those meters
and power systems from intrusion. Real-time performance is vital,
as is reliability and traceability of all the data when it is used for
billing purposes.
There is a very clear place for such gateways acting as servers for
the “client” meters, but the current multi-core devices can have
higher performance than necessary. The performance of single
core devices is now such that one device can run a secure realtime operating system such as Wind River’s VxWorks® that can

Transportation
Transport shows similar characteristics. Increasing amounts of electronics are making their way into transportation systems, especially
trains. New safety-critical braking control and signaling systems are
being implemented alongside data management and entertainment networks, all on a physical platform that is decades old. Costeffective commercial off-the-shelf (COTS) systems based around
single-core devices can now handle these key features such as train
information systems and other functions safely and securely.
Instead of having signals on the rail, trains now have their own

handle both data and communications stacks alongside a general

highly sophisticated signal and position management systems.

purpose operating system such as Microsoft Windows or embed-

Positive train control systems are adding highly connected intel-

ded Linux. This simplifies the system design and allows existing

ligence in trains, for example, making them position-aware as

code to be run safely and securely but also allows security to

well as providing a centralized advanced train control (ATC) man-

be updated regularly. New features and data handling routines

agement system. This ATC system is a key example of an M2M

can be added in the non-real-time portion of the design without

cloud architecture, taking data from trains around the network to

impacting on the real-time, security, or communications elements.

enhance the operation and safety of the system as a whole. Using

This dramatically reduces the complexity, risk, and costs of rolling

this connected distributed intelligence can improve safety and

out the infrastructure that is required for the smart grid.

performance but the challenge is to implement such a system cost
effectively.

4 | White Paper | Wind River Confidential. Internal Use Only.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

Operational Control Center

High A
Authority
Management
Server

Remote
Users

Communications

Train Control

Training/Train
Controller/
Transit
Manager

Train
Control
Servers

*n
TCP/IP
Router

UPS

Authority
Server,
Trainborne,
Wayside

Trainborne

Diagnostic Support

GPS Location
Determination

Trackside
Crossing

Key

Local Communications

Wireless
Network

Defect
Detectors

Control
Point

Rail-Rail
Interfaces

Wayside Interface Units (WIUs)

Architecture of a positive train control system

Consolidation and Separation

Scalability

There are two areas where virtualization is particularly relevant:

A key element of virtualization is the scalability. Supporting mul-

providing consolidation of workloads and combining communica-

tiple operating systems on a single core means the system is eas-

tion stacks with other functions.

ily expandable to higher-performance multi-core devices with

Consolidation of workloads is at the heart of the move to having
all data accessible anywhere. Keeping real-time functions separate
from general data processing and handling is vital to maintaining systems’ responsiveness, but it all has to be kept secure. This
leads to new system architectures based around the dynamic flow
of data. Here, control, interface, security, and communications are
all kept separate as they all change at different rates and have
different requirements. Being able to combine these functions in
a single device and still keep them separate is a vital element in
providing design flexibility and agility.

5 | White Paper | Wind River Confidential. Internal Use Only.

minimal risk. The multi-core device can handle the operating systems on separate cores, providing higher performance for more
advanced features without having to rewrite and retest the existing system implementation. This brings a dramatic savings in the
development time and costs of moving to a new generation of
equipment. This also allows vendors to provide scalable equipment platforms that are based around a common code base that
is tested and reliable.
ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’

CONCLUSION

a single board rather than multiple units with multiple boards

Virtualization has already opened up a wide range of new applica-

reduces the upfront costs. With millions of M2M systems being

tions in IT, but the ability to provide true real-time performance

rolled out, connected to hundreds of thousands of gateway units,

alongside a mainstream operating system opens up yet more

this is a significant savings in the upfront cost of a rollout.

embedded opportunities in new and existing markets. Smart

Decoupling the software life cycle of different elements and still

grid networks, manufacturing systems, and transportation are

being able to use a single device can reduce expenses. Not man-

all set to benefit from the consolidation of workloads and the

aging multiple versions of replacement boards and having fewer

separation of communication and security functions onto a single

boxes on the shelf reduces operational expenses of warehousing

core.

and stock management. Replacing units with problems before they

This allows cost-effective embedded systems to be developed that

fail is also significantly simpler and more cost effective with a single

are secure, reliable, and future-proof. Running the same operating

unit rather than multiple boards.

systems on a single core and multi-core device opens up a platform

All of this can provide dramatic savings in development time and

of equipment that can scale from a single core to many, all with the

equipment cost, allowing more processing performance to sit

same base of software.

closer to where it is needed in the network and support lower cost

Consolidation of workloads also has a significant effect on the capi-

sensors and terminals in the home or on the factory floor.

tal and operational expenditures. Building a single unit with

Wind River is a world leader in embedded and mobile software. Wind River has been pioneering computing inside embedded devices since 1981, and its technology is found in more than
1 billion products. Wind River is headquartered in Alameda, California, with offices in more than 20 countries. To learn more, visit Wind River at www.windriver.com.
©2012 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev 05/2012

Contenu connexe

Tendances

ITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNBoris Loukanov
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingGoodzuma
 
Cloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityCloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityBelinda Edwards
 
Business models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainBusiness models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainJosé Luis Casal
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Bob Radvanovsky
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 

Tendances (10)

The Datacentre of the Future
The Datacentre of the Future The Datacentre of the Future
The Datacentre of the Future
 
ITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGNITU-T Study Group 13 Future networks including mobile and NGN
ITU-T Study Group 13 Future networks including mobile and NGN
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information SecurityCloud Computing Adoption and the Impact of Information Security
Cloud Computing Adoption and the Impact of Information Security
 
IBM Cloud
IBM CloudIBM Cloud
IBM Cloud
 
The Cloud Networking Report 2011
The Cloud Networking Report 2011The Cloud Networking Report 2011
The Cloud Networking Report 2011
 
Job help
Job helpJob help
Job help
 
Business models based on IoT, AI and Blockchain
Business models based on IoT, AI and BlockchainBusiness models based on IoT, AI and Blockchain
Business models based on IoT, AI and Blockchain
 
Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)Project SHINE Findings Report (1-Oct-2014)
Project SHINE Findings Report (1-Oct-2014)
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 

En vedette

Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence ApproachIntelegia Group
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search Systembkearns111
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetKari A. Hintikka
 

En vedette (7)

Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
 
Inteligence Search System
Inteligence Search SystemInteligence Search System
Inteligence Search System
 
active|watch - revolution in internet intelligence
active|watch - revolution in internet intelligenceactive|watch - revolution in internet intelligence
active|watch - revolution in internet intelligence
 
Forget Internet Intelligence!
Forget Internet Intelligence!Forget Internet Intelligence!
Forget Internet Intelligence!
 
Internet Intelligence
Internet IntelligenceInternet Intelligence
Internet Intelligence
 
Artificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from PatentsArtificial Intelligence for Internet of Things Insights from Patents
Artificial Intelligence for Internet of Things Insights from Patents
 
The netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the InternetThe netcrowds and the forms of the collective intelligence on the Internet
The netcrowds and the forms of the collective intelligence on the Internet
 

Similaire à Enhancing intelligence with the Internet of Things

Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data CenterJuniper Networks
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingDarrell Jordan-Smith
 
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloudTechnologyBIZ
 
Cloud Computing Sun Microsystems
Cloud Computing Sun MicrosystemsCloud Computing Sun Microsystems
Cloud Computing Sun Microsystemsdanielfc
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXAngel Villar Garea
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureTechnologyBIZ
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Advantec Distribution
 
White Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in HealthcareWhite Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in Healthcareinfsoft GmbH
 
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM India Smarter Computing
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideEMC
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...Juniper Networks
 
Ibm system z in a mobile world providing secure and timely mobile access to...
Ibm system z in a mobile world   providing secure and timely mobile access to...Ibm system z in a mobile world   providing secure and timely mobile access to...
Ibm system z in a mobile world providing secure and timely mobile access to...bupbechanhgmail
 
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...TanuAgrawal27
 
IBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM India Smarter Computing
 

Similaire à Enhancing intelligence with the Internet of Things (20)

Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
 
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud ComputingEverything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing
 
04367a
04367a04367a
04367a
 
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloud
 
Cloud Computing Sun Microsystems
Cloud Computing Sun MicrosystemsCloud Computing Sun Microsystems
Cloud Computing Sun Microsystems
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
2000330 en
2000330 en2000330 en
2000330 en
 
ITSM Approach for Clouds
 ITSM Approach for Clouds ITSM Approach for Clouds
ITSM Approach for Clouds
 
This is
This is This is
This is
 
Juniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric ArchitectureJuniper Networks: Q Fabric Architecture
Juniper Networks: Q Fabric Architecture
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
 
White Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in HealthcareWhite Paper Indoor Positioning in Healthcare
White Paper Indoor Positioning in Healthcare
 
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud ComputingIBM Data Center Networking: Planning for Virtualization and Cloud Computing
IBM Data Center Networking: Planning for Virtualization and Cloud Computing
 
VMware Network Virtualization Design Guide
VMware Network Virtualization Design GuideVMware Network Virtualization Design Guide
VMware Network Virtualization Design Guide
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
 
Ibm system z in a mobile world providing secure and timely mobile access to...
Ibm system z in a mobile world   providing secure and timely mobile access to...Ibm system z in a mobile world   providing secure and timely mobile access to...
Ibm system z in a mobile world providing secure and timely mobile access to...
 
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
Smart Traffic Management System using Internet of Things (IoT)-btech-cse-04-0...
 
IBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data CenterIBM Flex System Networking in an Enterprise Data Center
IBM Flex System Networking in an Enterprise Data Center
 

Plus de The Marketing Distillery

Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityThe Marketing Distillery
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of ThingsThe Marketing Distillery
 
Capitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerCapitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerThe Marketing Distillery
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
Smart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsSmart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsThe Marketing Distillery
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementThe Marketing Distillery
 
How Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsHow Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsThe Marketing Distillery
 

Plus de The Marketing Distillery (20)

Big Data 2.0
Big Data 2.0Big Data 2.0
Big Data 2.0
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunity
 
7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things7 steps to business success on the Internet of Things
7 steps to business success on the Internet of Things
 
Capitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primerCapitalizing on the Internet of Things: a primer
Capitalizing on the Internet of Things: a primer
 
Making sense of consumer data
Making sense of consumer dataMaking sense of consumer data
Making sense of consumer data
 
Capitalizing on the Internet of Things
Capitalizing on the Internet of ThingsCapitalizing on the Internet of Things
Capitalizing on the Internet of Things
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
Getting started in Big Data
Getting started in Big DataGetting started in Big Data
Getting started in Big Data
 
Smart networked objects and the Internet of Things
Smart networked objects and the Internet of ThingsSmart networked objects and the Internet of Things
Smart networked objects and the Internet of Things
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Smart cities and the Internet of Things
Smart cities and the Internet of ThingsSmart cities and the Internet of Things
Smart cities and the Internet of Things
 
The ABCs of Big Data
The ABCs of Big DataThe ABCs of Big Data
The ABCs of Big Data
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
How Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing effortsHow Big Data can help optimize business marketing efforts
How Big Data can help optimize business marketing efforts
 
Big Data analytics
Big Data analyticsBig Data analytics
Big Data analytics
 
The Business Analyst as a leader
The Business Analyst as a leaderThe Business Analyst as a leader
The Business Analyst as a leader
 

Dernier

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Enhancing intelligence with the Internet of Things

  • 1. Enhancing Intelligence in the ‘Internet of Things’ The Business of Embedded Virtualization Alexander Damisch, Director, Industrial Vertical, Wind River INNOVATORS START HERE.
  • 2. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ EXECUTIVE SUMMARY A key driver for embedded system designers is the cloud. With billions of devices becoming connected in the “Internet of things” and sharing data through the cloud, there is a key challenge in managing this complexity. The amount of data that is moved around the Internet is expected to double in just three years and there are different architectures for addressing this challenge of sharing and managing data securely and reliably in the cloud. This is a different situation from the existing migration of apps into the IT cloud. Systems handling machine-to-machine (M2M) data have to be reliable, secure, and scalable with real-time performance measured in microseconds. All this data has to be available anytime, anywhere, and this is opening up new ways for equipment to be designed and built. This paper takes a look at the key industry trends driving consolidation of processing workloads to make all the functionality on a device secure, manageable, and scalable. TABLE OF CONTENTS Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Industry Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Smart Grid. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 .. Manufacturing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Transportation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Consolidation and Separation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Scalability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 | White Paper | Wind River Confidential. Internal Use Only.
  • 3. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ INDUSTRY TRENDS system grows in a haphazard, unmanaged way. Often the original One architecture that is gaining ground is to provide more local- elements of the system are so critical that there is no opportunity ized, connected processing power close to where it is needed, to pull everything out and start again from scratch, leading to a often as a gateway to the wider Internet. In this way, local traffic more evolutionary architecture. can be processed quickly and acted on, while the data is still avail- This often leads to a highly complex base of software that is con- able to the wider systems across the Internet, whether it is a train, stantly patched and not well documented, creating bugs, errors, a manufacturing floor, or a power plant. and glitches. The safety-critical elements of the design, from At the heart of this approach is the ability to consolidate a num- programmable logic controllers to sensors, tend to be relatively ber of functions, from the communications to the data processing. simple, well-tested devices that have well-defined code and states This is costly and complex when implemented in separate boxes, and are left alone. As a result, adding new functions and features and the ability to consolidate a wide range of functions reliably can often impact the overall performance of the system. and securely into an intelligent single unit that is more cost effec- All of this is reflected in higher costs for upgrading, managing, and tive is increasingly popular. protecting the system. With many industrial embedded systems Security not built with communications or security in mind, this is a signifi- This trend has implications for security. Consolidating workloads in a single device means communications are linked to real-time operations and the flow of data. This means there is a need to keep certain functions very separate. Safety-critical code has to be protected and unchanged to retain its certification, and yet the security that protects the system has to be updated regularly to defend against ever changing attacks. At the same time, there are communications protocols and data capture in the system that need real-time performance alongside human interfaces that can be run at slower speeds. All of this provides a potentially highly complex environment. The traditional approach has been to have separate devices for each of these functions, keeping communications and real- time elements separate. However, security needs to be deeply embedded within the system to provide the maximum protection, and physical separation leads to a number of architectural challenges that can be expensive to solve. Complexity cant part of the cost of doing business. Virtualization Virtualization has been solving a number of these challenges. Using multiple cores and time and space separation it has been possible to run the different elements—security, communications, real-time, and user interface—on separate operating systems on separate cores. Sometimes these separate cores are in separate devices on a single board, replacing multiple boards in a system. Increasingly, these elements have been coming together in a single multi-core device, offering higher performance that can be used for more features or lower power consumption, which is now a key consideration. This trend is being supported with new approaches such as virtualization extensions within processors capable of supporting time and space separation in hardware, increasing performance and reducing power consumption and system cost. Now it is possible to run multiple operating systems and separate applications on a single core and still achieve the real-time performance that many embedded industrial systems require. This This separation tends to show up in system architectures in a allows for significantly lower cost and complexity as well as lower number of ways. Often it shows up with new devices being added power consumption than with multi-core systems. to the system to provide new features or new security, and the 3 | White Paper | Wind River Confidential. Internal Use Only.
  • 4. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ Smart Grid Manufacturing The current industry focus on the smart grid is a classic example Similarly, manufacturing plants can benefit from virtualization. A of the challenges of adding intelligence and networking to exist- single-core device can run several “soft” programmable logic ing legacy systems. The concept of the smart grid is driven by the controllers (PLC) and provide the security and communications need to integrate variable power sources such as wind or wave for sensors and networks around the shop floor through a real- power into the existing power grid based around static sources time operating system. Graphical interfaces can be added via the such as traditional power stations. To do this requires “smart non-real-time elements to make machines more user friendly and meters” that measure consumption in the home, office, or factory productive with an easy upgrade process that does not perturb as well as a network to carry that data back and control the differ- other parts of the systems. ent parts of the grid based on the real-time data. This is a highly complex task that requires large amounts of data handling and processing power overlaid on a grid that was constructed in the 1950s or even earlier. With the communications stacks implemented securely and reliably, all the data from around the floor can be available whenever and wherever required. This can be used to make planning more efficient and allow algorithms to spot potential problems within While there are large scale data centre implementations for han- the equipment, triggering preventative maintenance routines and dling predictive algorithms, a vast amount of processing has to be reducing costly downtime. handled towards the edge of the grid. Potentially handling thousands of smart meters and sensors throughout the grid, this acts as a gateway to the wider network and protects all those meters and power systems from intrusion. Real-time performance is vital, as is reliability and traceability of all the data when it is used for billing purposes. There is a very clear place for such gateways acting as servers for the “client” meters, but the current multi-core devices can have higher performance than necessary. The performance of single core devices is now such that one device can run a secure realtime operating system such as Wind River’s VxWorks® that can Transportation Transport shows similar characteristics. Increasing amounts of electronics are making their way into transportation systems, especially trains. New safety-critical braking control and signaling systems are being implemented alongside data management and entertainment networks, all on a physical platform that is decades old. Costeffective commercial off-the-shelf (COTS) systems based around single-core devices can now handle these key features such as train information systems and other functions safely and securely. Instead of having signals on the rail, trains now have their own handle both data and communications stacks alongside a general highly sophisticated signal and position management systems. purpose operating system such as Microsoft Windows or embed- Positive train control systems are adding highly connected intel- ded Linux. This simplifies the system design and allows existing ligence in trains, for example, making them position-aware as code to be run safely and securely but also allows security to well as providing a centralized advanced train control (ATC) man- be updated regularly. New features and data handling routines agement system. This ATC system is a key example of an M2M can be added in the non-real-time portion of the design without cloud architecture, taking data from trains around the network to impacting on the real-time, security, or communications elements. enhance the operation and safety of the system as a whole. Using This dramatically reduces the complexity, risk, and costs of rolling this connected distributed intelligence can improve safety and out the infrastructure that is required for the smart grid. performance but the challenge is to implement such a system cost effectively. 4 | White Paper | Wind River Confidential. Internal Use Only.
  • 5. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ Operational Control Center High A Authority Management Server Remote Users Communications Train Control Training/Train Controller/ Transit Manager Train Control Servers *n TCP/IP Router UPS Authority Server, Trainborne, Wayside Trainborne Diagnostic Support GPS Location Determination Trackside Crossing Key Local Communications Wireless Network Defect Detectors Control Point Rail-Rail Interfaces Wayside Interface Units (WIUs) Architecture of a positive train control system Consolidation and Separation Scalability There are two areas where virtualization is particularly relevant: A key element of virtualization is the scalability. Supporting mul- providing consolidation of workloads and combining communica- tiple operating systems on a single core means the system is eas- tion stacks with other functions. ily expandable to higher-performance multi-core devices with Consolidation of workloads is at the heart of the move to having all data accessible anywhere. Keeping real-time functions separate from general data processing and handling is vital to maintaining systems’ responsiveness, but it all has to be kept secure. This leads to new system architectures based around the dynamic flow of data. Here, control, interface, security, and communications are all kept separate as they all change at different rates and have different requirements. Being able to combine these functions in a single device and still keep them separate is a vital element in providing design flexibility and agility. 5 | White Paper | Wind River Confidential. Internal Use Only. minimal risk. The multi-core device can handle the operating systems on separate cores, providing higher performance for more advanced features without having to rewrite and retest the existing system implementation. This brings a dramatic savings in the development time and costs of moving to a new generation of equipment. This also allows vendors to provide scalable equipment platforms that are based around a common code base that is tested and reliable.
  • 6. ENHANCING INTELLIGENCE IN THE ‘INTERNET OF THINGS’ CONCLUSION a single board rather than multiple units with multiple boards Virtualization has already opened up a wide range of new applica- reduces the upfront costs. With millions of M2M systems being tions in IT, but the ability to provide true real-time performance rolled out, connected to hundreds of thousands of gateway units, alongside a mainstream operating system opens up yet more this is a significant savings in the upfront cost of a rollout. embedded opportunities in new and existing markets. Smart Decoupling the software life cycle of different elements and still grid networks, manufacturing systems, and transportation are being able to use a single device can reduce expenses. Not man- all set to benefit from the consolidation of workloads and the aging multiple versions of replacement boards and having fewer separation of communication and security functions onto a single boxes on the shelf reduces operational expenses of warehousing core. and stock management. Replacing units with problems before they This allows cost-effective embedded systems to be developed that fail is also significantly simpler and more cost effective with a single are secure, reliable, and future-proof. Running the same operating unit rather than multiple boards. systems on a single core and multi-core device opens up a platform All of this can provide dramatic savings in development time and of equipment that can scale from a single core to many, all with the equipment cost, allowing more processing performance to sit same base of software. closer to where it is needed in the network and support lower cost Consolidation of workloads also has a significant effect on the capi- sensors and terminals in the home or on the factory floor. tal and operational expenditures. Building a single unit with Wind River is a world leader in embedded and mobile software. Wind River has been pioneering computing inside embedded devices since 1981, and its technology is found in more than 1 billion products. Wind River is headquartered in Alameda, California, with offices in more than 20 countries. To learn more, visit Wind River at www.windriver.com. ©2012 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev 05/2012