SlideShare une entreprise Scribd logo
1  sur  135
Your systems. Working as one. 
Build Safe & Secure Distributed Systems 
How to Architect Scalable Systems for the Industrial Internet using Open Standards
Topics 
• Introductions 
• Industrial Internet of Things 
• Data Distribution Service 
• DDS in IIoT examples 
• DDS security 
• DDS safety 
• RTI Connext DDS 
• Q&A 
2014-Oct-14 © 2014 RTI 2
Why is RTI? 
To enable and realize the potential of 
smart machines to serve mankind 
2014-Oct-14 © 2014 RTI 3
RTI Enables the Industrial Internet 
• Real-time IIoT 
communication platform 
• Proven across industries 
• Sensor-to-cloud integration 
2014-Oct-14 © 2014 RTI 4
About RTI 
• Market Leader 
– 1,000+ projects use Connext DDS 
– Over 70% DDS middleware market share1 
– Largest embedded middleware vendor2 
– 2013 Gartner Cool Vendor for technology and 
Open Community Source model 
• Standards Leader 
– Active in 15 standards efforts 
– DDS authors, chair, wire spec, security, more 
– IIC steering committee; OMG board 
• Team Quality Leader 
– Stanford research pedigree 
– High-performance, control, systems experts 
– Top quality product, processes, execution 
© 2014 RTI 
1Embedded Market Forecasters 
2VDC Analyst Report 
2014-Oct-14 5
IIoT Infrastructure Trusts RTI 
• World’s largest Wind Power company 
• World’s largest Underground Mining Equipment company 
• World’s largest Navy (all surface ships) 
• World’s largest Automotive company 
• World’s largest Emergency Medical System company 
• World’s largest Medical Imaging provider 
• World’s 2nd largest Patient Monitoring manufacturer 
• World’s 2nd largest Air Traffic control system 
• World’s largest Broadcast Video Equipment manufacturer 
• World’s largest Launch Control System 
• World’s largest Telescope (under construction) 
• World’s 5th-largest Oil & Gas company 
• World’s 6th-largest power plant (largest in US) 
• All of world’s top ten defense companies 
RTI designed into 
over $1 trillion 
2014-Oct-14 © 2014 RTI 6
RTI Named Most Influential IIoT Company 
2014-Oct-14 © 2014 RTI 7
2008 
Global Support and Distribution 
2014-Oct-14 © 2014 RTI 8
Industrial Internet of Things
Industrial Internet of Things (IIoT) 
2014-Oct-14 © 2014 RTI 10
Ingredients 
• Connectivity 
• Sharing big data 
– In motion 
– At rest 
• Software-based intelligence 
2014-Oct-14 © 2014 RTI 14
IIoT Systems Are Distributed 
HMI/UI IT, Cloud & SoS 
Connectivity 
Sensors Actuators 
Streaming 
Analytics & 
Control 
2014-Oct-14 © 2014 RTI 16
IIoT Systems Are Distributed 
2014-Oct-14 © 2014 RTI 17
Unit DataBus 
Unit DataBus 
Example 
Intelligent 
Industrial 
Internet 
Intelligent 
Systems 
Intelligent 
Machines 
Cloud 
Enterprise LAN 
Intelligent 
System of 
Systems 
Unit LAN Segment 
Think HMI 
Intra-machine 
Think HMI 
Think HMI 
Intra-machine 
Sense Intra-machine 
Act 
Sense Act 
2014-Oct-14 © 2014 RTI 18
Consumer Internet of Things 
Centralized, Hub and Spoke 
Information Technology Systems 
Premises or Cloud 
2014-Oct-14 © 2014 RTI 19
Gateway 
There are many vectors along which we can measure end-point “robustness.” Table 1 
summarizes these vectors: 
Table 1: Near-term end-point differences between IIoT and HIoT 
Attribute Industrial IoT (IIoT) Human IoT (HIoT) 
Market Opportunity Brownfield Greenfield 
Product Lifecycle Until dead or obsolete Whims of style and/or budget 
Solution Integration Heterogeneous APIs Vertically integrated 
Security Access Identity & privacy 
Human Interaction Autonomous Reactive 
Availability 0.9999 to 0.99999 (49–5 ‘ ’s) 0.99 to 0.999 (2–3 ‘9’s) 
Access to Internet Intermittent to independent Persistent to interrupted 
Response to Failure Resilient, fail-in-place Retry, replace 
Network Topology Federations of peer-to-peer Constellations of peripherals 
Physical 
Legacy & purpose-built Evolving broadband & 
Connectivity 
wireless 
Example Gateways Commercial monitoring 
Echelon SmartServer 
Consumer home automation 
Revolv Hub 
Interaction Style Event Driven, Publish-Subscribe Request / Response 
Market Opportunity: “Brownfield” is a term borrowed from commercial real estate; it is 
used to denote a potential site for building development that had been previously 
developed for industrial or commercial use. IIoT uses brownfield to describe the 
opportunity to connect more than a century of in-service mechanical and electrical 
http://www.moorinsightsstrategy.com/wp-content/uploads/2013/10/Connecting-with-the-Industrial-Internet-of-Things-IIoT-by-Moor-Insights-Strategy.pdf 
Moore Insights report 2014
Information Technology Systems 
Intelligent Systems 
Streaming analytics and control (Big Data in motion) Big Data (at rest) analytics, ERP, CRM 
Physics speed, deterministic, microseconds+ Human speed, seconds+ 
Decentralized, distributed, disperse Centralized, data center and cloud 
Dynamic, autonomous, plug and play Relatively static, administered 
Can not go down, often even for upgrades Scheduled maintenance, failover OK 
Diverse networks, sometimes disadvantaged Fast, reliable networks 
2014-Oct-14 © 2014 RTI 21
Data Distribution Service 
Designed for the Industrial Internet of Things
For loose coupling, provides: 
• Discovery 
• Routing 
• High-availability 
• QoS enforcement 
• Well-define interfaces 
• Standard interoperability 
Protocol 
Data Distribution Service 
2014-Oct-14 © 2014 RTI 23
DDS Standard 
• Interoperability and 
portability 
– Data model specification 
and discovery 
– Network protocol 
– Programming interface 
• Managed by Object 
Management Group (OMG) 
Cross-vendor source portability 
Standard API 
Data 
Model 
DDS Implementation 
Standard Protocol 
Cross-vendor interoperability 
2014-Oct-14 © 2014 RTI 24
Peer-to-Peer Communication 
DDS-RTPS Wire Interoperability Protocol 
• Completely decentralized 
• No intermediate servers, 
message brokers or ESB 
• Low latency 
• High scalability 
• No single point of failure 
App or 
Component 
DDS Library 
App or 
Component 
DDS Library 
DDS 
API 
2014-Oct-14 © 2014 RTI 25
Easy Integration of Existing Components 
Unmodified 
App 
Adapter 
DDS Routing 
Service 
DDS-RTPS Wire Interoperability Protocol 
Unmodified 
App 
Adapter 
DDS Routing 
Service 
App or 
Component 
DDS Library 
App or 
Component 
DDS Library 
DDS or other protocol 
DDS 
API 
New and Updated Applications Existing, Unmodified Applications 
2014-Oct-14 © 2014 RTI 26
Seamless Enterprise-Wide Connectivity 
Connect Everything, Everywhere 
Data Distribution Service 
Seamless data sharing regardless of: 
• Proximity 
• Platform 
• Language 
• Physical network 
• Transport protocol 
• Network topology 
2014-Oct-14 © 2014 RTI 27
Example: RTI Connext Availability 
• Programming languages and 
environments 
– C, C++, C#/.NET, Java, Ada 
– Lua, Python 
– LabVIEW, MATLAB, Simulink, UML 
– REST/HTTP 
• Operating systems 
– Windows, Linux, Unix, Mac OS 
– Mobile 
– Embedded, real time 
– Safety critical, partitioned 
• Processor families 
– x86, ARM, PowerPC… 
– 32- and 64-bit 
• Transport types 
– Shared memory 
– LAN (incl. multicast) 
– WAN / Internet 
– Wireless 
– Low bandwidth 
2014-Oct-14 © 2014 RTI 28
Foundation: Publish/Subscribe 
Data Distribution Service 
Commands 
Control 
App 
Sensor Data 
Sensor 
Sensor Data 
Display 
App 
Sensor Actuator 
2014-Oct-14 © 2014 RTI 29
Why Distribution Middleware? 
1.0 Common Services 
1.0 Common Services 
RDR IFF ESM SAFE 
RDR IFF ESM SAFE 
DIA NAV MCP IPCC 
DIA NAV MCP IPCC 
DWC 
 Grouping the modules into functional clusters does nothing to change that reality 
and ease software integration 
UNCLASSIFIED 
 Hawkeye has functionally 
oriented software modules 
 Each module talks to many 
other modules 
RIP TRK MSI 
WAC TDA 
L4 L11 L16 SEN DSC 
HMI ACIS 
MUX 
FIL TDM 
 Adding new 
functionality 
cascades integration 
re-work across many 
other modules 
CEC 
8.0 Training 
5.0 Communications 
2.0 Sensors 
3.0 Fusion 
4.0 BMC2 
7.0 Visualization 
6.0 Sensor Control 
RIP CEC TRK MSI 
WAC TDA RAIDER 
CHAT 
SEN DSC 
Distributed Data Framework 
L4 L11 L16 IPv6 
HMI ACIS T4O 
MUX 
FIL TDM aADNS TIS 
 Changing the communication between the modules can ease integration, when the 
new ‘Publish Subscribe’ approach is used – each module publishes its output w/o 
regard to who is receiving it, in contrast to the point-to-point approach of traditional 
inter-process communication 
It’s about an architecture that can assimilate evolving functionality, 
rather than remaining set in time
Reduced Application Development 
Message Centric Data Centric (DDS) 
Application 
Application Logic 
Message Parsing 
and Filtering 
Message Caching 
Addressing, 
Marshaling 
Message Centric 
Middleware 
Send/Receive 
Packets 
Application 
Application Logic 
Data Centric 
Middleware (RTI) 
Message Parsing 
and Filtering 
Message Caching & 
State Management 
Discovery, Presence 
Marshaling, 32/64 
Send/Receive 
Packets 
Savings 
2014-Oct-14 © 2014 RTI 32
Government Asset Tracking System 
Next-Gen Capability: 
• 50K lines of code—order 
of magnitude less 
• 1 yr to develop—8x less 
• 1 laptop—20x less 
• Achieved: 250K+ tracked 
updates/sec, no single 
point of failure 
Legacy Capability: 
• 500K lines of code 
• 8 yrs to develop 
• 21 servers 
• Achieved: 20K tracked 
updates/sec, reliability 
and uptime challenges 
“This would not have been possible with any other known technology.” 
—Network Ops Center Technical Lead 
2014-Oct-14 © 2014 RTI 33
Support for Mission-Critical Systems 
• Autonomous operation 
– Automatic discovery 
– No sys admin or centralized 
infrastructure 
• Non-stop: no single point of failure 
• QoS control and visibility into 
real-time behavior, system health 
• Embeddable 
• Proven in 100,000s of deployed 
devices 
2014-Oct-14 © 2014 RTI 34
Robot Demo 
USB 
Ethernet 
WiFi 
2014-Oct-14 © 2014 RTI 35
Robot Demo 
RTI Connext Databus 
USB 
Ethernet 
WiFi 
2014-Oct-14 © 2014 RTI 36
Robot Demo 
Command 
RTI Connext Databus 
USB 
Ethernet 
WiFi 
Publisher 
Command 
Publisher 
Subscriber 
2014-Oct-14 © 2014 RTI 37
2014 
RPC 
over DDS 
2014 
DDS 
Securit 
y 
DDS: Family of Specifications 
2013 
Web-Enabled 
DDS 
DDS 
2008 
2009 
Implementation 
Network / TCP / UDP / IP 
App 
DDS 
Implementation 
App 
DDS 
Implementation 
2010 2012 
DDS Spec 
2004 
DDS 
2006 
Interoperablity 
UML Profile 
for DDS 
DDS for 
Lw CCM 
DDS 
X-Types 
DDS-STD-C++ 
DDS-JAVA5 
App 
2014-Oct-14 © 2014 RTI 38
RTI Role 
RTI Role Product Status 
Core DDS API DCPS author 1st implementation 
DDS-RTPS Protocol Sole author 1st implementation 
Based on IEC 
61148, which was 
authored by RTI 
and Schneider 
Automation 
DDS-XTypes Primary author 1st implementation 
Based on prior RTI 
innovation 
DDS C++ PSM 
RFP author; 
specification co-author 
EAR available now 
DDS Java PSM Sole author 
Under 
development 
DDS Security Primary author EAR available now 
Web-enabled DDS Primary author EAR available now 
2014-Oct-14 © 2014 RTI 39
RTI Role 
RTI Role Product Status 
UML Profile for DDS 
Co-submitter 
1st 
implementation 
(3rd-parties) 
Standard being refined 
DDS for lwCCM 
Co-submitter 
1st 
implementation 
(3rd-party) 
RPC over DDS 
Primary 
author 
Submission based 
on current 
capability 
Standard still under 
development 
Instrumentation RFP author Prototype now 
2014-Oct-14 © 2014 RTI 40
DDS Compared to 
Alternative Approaches
Traditional IT and Consumer 
• Centralized ESB or Message 
Broker 
• E.g.: MQTT, XMPP, AMQP, 
CoAP, Web Services 
• Limited scalability and performance 
– Capacity of individual links and switch ports 
– CPU and resource limits on servers 
• Poor robustness 
– Tied to server maintenance and failures 
– Single point of vulnerability 
• Lessens capabilities and utility 
– Single centralized “brain” 
– No autonomy. Lack of intelligence at the edge. 
2014-Oct-14 © 2014 RTI 42
DDS: 
Distributed Analytics & Control at the Edge 
IT 
• Analyze orders of magnitude more data 
• Lower latency control for faster response 
• Highly resilient, no single point of failure 
• Fine-grained access control and security 
• Vastly more capable: Intelligence at the edge 
Same 
Internet, 
but new 
WEB 
2014-Oct-14 © 2014 RTI 43
Comparison 
DD 
S 
DBM 
S 
REST 
CoAP 
MQTT AMQ 
P 
XMP 
P 
Standard wire protocol ✔ ✔ ✔ ✔ ✔ 
Publish/Subscribe (event-driven) ✔ ✔ ✔ ✔ 
Explicit, discoverable interfaces ✔ ✔ 
Type safe (std/disc data encoding) ✔ ✔ ✔ I/S XML 
Standard API ✔ ✔ (JMS) 
Managed state (single src of truth) ✔ ✔ last 
Data-level Quality of Service ✔ 
Content filtering (routing) ✔ ✔ I/S 
Time-based filtering ✔ I/L 
Decentralized (no failure pt, bottleneck) ✔ Fed 
Autonomous (no admin) ✔ 
N/A=Not Applicable, M/O=Metadata Only, I/S=Implementation Specific, I/L=within Integration Logic 
2014-Oct-14 © 2014 RTI 44
DDS in IIoT Examples
BK Medical: Ultrasound 
© 2014 RTI 
”BK Medical is truly redefining Medical 
Ultrasound Imaging where the 
traditional single user / single system 
approach is being replaced with fully 
scalable and distributed multi-user 
systems 
…we selected the RTI Connext DDS 
middleware as this gives us all the 
flexibility and the abstraction layer 
needed for the future of Analogic 
Ultrasound” 
-- Jesper Lomborg Manigoff, VP of 
Engineering, Analogic Global Ultrasound 
2014-Oct-14 46
GE Healthcare 
Revolution® 
"GE Healthcare chose the DDS standard 
because it can handle many classes of 
intelligent machines. 
RTI Connext DDS satisfies the 
demanding requirements of our 
devices, and RTI has the depth and 
experience necessary to partner with 
us in order to meet our stringent 
standards. 
Additionally, RTI's Connext DDS allows 
us to standardize on a single 
communications platform across 
product lines." 
-- J Gustavo Perez, General Manager for 
MI&CT Engineering 
2014-Oct-14 © 2014 RTI 48
Modernize Surgical Networks 
• Connect Operating 
Room Dataflows 
– Waveforms 
– Data recording 
– Multi-channel 
video 
• To many recipients 
– Surgeon 
– Operating theater 
– Students & 
observers 
– Offsite 
© 2014 RTI 
2014-Oct-14 49
DLR: Robotic Surgery 
• The Minimally 
Invasive Robotic 
Surgery (MIRS) system 
at DLR coordinates 
three robots to 
perform delicate 
heart surgery. 
• The system closes a 
distributed loop 
between the robots 
and the remote 
surgeon’s control at 
3kHz. 
• RTI enables new 
medical techniques 
© 2014 RTI 
2014-Oct-14 50
Mevion: Radiotherapy 
• Mevion’s Proton- 
Beam Radiation 
Therapy system zaps 
tumors with 
accelerated protons 
• The treatment must 
be continuous for 30- 
40 days; downtime 
endangers treatment 
success 
• With RTI Connext 
DDS, Mevion’s PBRT 
delivers dependable 
treatment at low cost 
© 2014 RTI 
First patient treated Dec 2013, 
Siteman Cancer Center, St. Louis 
2014-Oct-14 51
Exelis: C2 Communication 
• Exelis (ITT) C4i provides command and control systems 
for military and civilian agencies (fire/police/emergency 
response) 
• RTI Connext DDS connects GUIs to servers that route 
voice and video 
• RTI met the critical needs: scalability, routing, recording 
2014-Oct-14 © 2014 RTI 52
NASA: Robotics Control from ISS 
• NASA’s Human-Robotic 
Systems prototypes 
robots for 
extraterrestrial surfaces 
• NASA uses DDS for low-bandwidth, 
high-delay, 
lossy space-earth 
communications from 
the ISS 
• RTI middleware 
communicates over 
disadvantaged links 
© 2014 RTI 
2014-Oct-14 53
Harmonic: Video Switching 
• Harmonic 
transmission and 
video switching 
equipment delivers 
worldwide video-on-demand 
• RTI handles 1,000s of 
clients, 1,000,000s of 
messages 
• DDS enables high-performance 
scalability and future 
extensibility 
2014-Oct-14 © 2014 RTI 54
Enterprise Cloud Integration 
Analytics 
Connext TCP (WAN) 
Client 
Client 
Client 
Client 
Monitor 
Logging 
• 1000s of clients 
• Secure TLS Transport over 
public WAN 
• Authentication, Access Control, 
& Sticky Sessions 
• High-speed processing 
Redundant, Load- 
Balanced 
Reliable Multicast 
Gateway 
Processor 
Gateway 
Processor 
Gateway 
Processor 
Gateway 
Processor 
Data Center Cloud 
Load 
Balancer 
(F5) 
Connext Input Bus 
QIQuneu-mueeueemory 
workflow 
Connext Processing Bus 
2014-Oct-14 © 2014 RTI 55
VW: Driver Assistance and Safety 
• The VW Driver Assistance 
and Integrated Safety 
system combines radars, 
laser range finders, and 
video to assist safe 
operation 
• It helps avoid obstacles, 
detect lane departures, 
track eye activity, and safely 
negotiate bends 
• The V-Charge program 
demoed an auto-charging 
and parking vehicle in 2014 
• RTI enables advanced 
reactive systems in 
transportation 
http://www.youtube.com/watch?v=7xQfKTAtyNU 
2014-Oct-14 © 2014 RTI 56
Bus Integration: VW Cargate ECU 
• Connect fast Ethernet bus to slower CANbus 
• Automated data translation 
• Simple pub sub between busses 
2014-Oct-14 © 2014 RTI 57
Wi-Tronix: Asset Tracking 
• Wi-Tronix systems 
wirelessly monitor high-value 
mobile assets such 
as locomotives, 
industrial equipment 
and marine vessels 
• RTI addressed critical 
issues such as optimized 
flow and discovery 
process over a wireless 
network 
• RTI middleware works 
effectively over lossy 
wireless networks 
© 2014 RTI 
2014-Oct-14 58
NAV CANADA: Air Traffic Control 
RTI Connext DDS was selected for 
its extensive compliance with the 
Object Management Group 
(OMG) DDS standard; its high 
security rating; its wide support of 
tools and programming 
languages, and its reputation for 
performance, scalability, and 24/7 
reliability 
– Sid Koslow, Chief Technology 
Officer, NAV CANADA. Air Traffic Control for Canada 
2nd largest ANSP in the world 
7 major centers 
2014-Oct-14 © 2014 RTI 59
Air Traffic Control 
Inter-Segment Bus 
Oceanic 
control* 
CAATS Air Control Center Bus 
Center Control 
Radar 
RRaaddaarr Data 
processors 
Controller 
Displays 
Data 
planning 
Data link 
to pilot 
Recording 
Flight data 
processing 
Tower 
systems 
FAA/HOST 
connect 
Weather 
Service 
2014-Oct-14 © 2014 RTI 60
Joy Mining: Mining Equipment 
• Joy Mining is the 
world’s largest mining 
equipment 
manufacturer 
• RTI Connext DDS 
connects the 
controller, operator 
GUI, and historian 
• Reliable, fast 
connectivity enables 
control, debugging, 
and system health 
monitoring for 
continuous mining 
© 2014 RTI 
2014-Oct-14 61
Schneider: PLCs 
• Schneider is a global 
factory automation 
manufacturer 
• RTI Connext DDS eases 
PLC integration, provides 
up-to-the-minute data 
• Connext Micro works with 
limited memory and 
processing power on PLCs 
• RTI middleware connects 
factory PLCs and IT 
systems 
2014-Oct-14 © 2014 RTI 62
NASA: Launch Control System 
• NASA KSC’s new 
Constellation launch 
control SCADA system 
• RTI delivered 300k 
points, at 400k 
msgs/sec with 5x the 
required throughput, at 
1/5 the needed latency 
• RTI connects thousands 
of sensors and actuators 
2014-Oct-14 © 2014 RTI 63
Open Architecture for 
Supply Chain Management
Traditional Approach 
2014-Oct-14 © 2014 RTI 65
Traditional Approach 
2014-Oct-14 © 2014 RTI 66
Traditional Approach 
2014-Oct-14 © 2014 RTI 67
Traditional Approach 
• Hard coded 
connections 
• Up to O(n2) 
• Complex 
• Hard to maintain, 
evolve, re-use 
E.g., sockets, RPC 
2014-Oct-14 © 2014 RTI 68
Result 
Time & cost of 
integration, 
maintenance 
and upgrades 
System Scale and Age 
O(n2) 
2014-Oct-14 © 2014 RTI 69
Solution: Modularity 
2014-Oct-14 © 2014 RTI 70
Key: Interoperability 
Well-defined: 
• Interfaces 
• Semantics 
2014-Oct-14 © 2014 RTI 71
Examples
Audi: Modular HIL Bus 
2014-Oct-14 © 2014 RTI 73
2014-Oct-14 © 2014 RTI 74
2014-Oct-14 © 2014 RTI 75
2014-Oct-14 © 2014 RTI 76
2014-Oct-14 © 2014 RTI 77
2014-Oct-14 © 2014 RTI 78
2014-Oct-14 © 2014 RTI 79
2014-Oct-14 © 2014 RTI 80
Medical Device Interoperability 
• 100,000 to 200,000 annual 
preventable deaths in US hospitals 
– Hospital error is 6th leading cause of 
preventable death 
• $30b in wasted cost 
• Lack of clinical decision support 
– No “smart alarms” 
• Correlation/fusion of data from 
multiple devices 
– Alarm fatigue 
• OR: 70% of anesthesiologists 
disable clinical alarms 
• ICU: 86% false alarms 
– Unsynchronized clocks 
• Manually device configuration is 
error prone (e.g., ORICU) 
2014-Oct-14 © 2014 RTI 81
Integrated Clinical Environment (ICE) 
Standard (ASTM F2761) 
• Developed by Medical Device 
"Plug-and-Play" Interoperability 
Program (MPnP) 
• Specifies interoperability for 
medical devices 
• Encompasses all ICU & 
operating room devices 
– From blood pressure cuffs to 
intravenous pumps to 
ventilators 
– Complete logging 
– Automatic error detection 
– Better care 
• OpenICE reference 
implementation built on 
RTI Connext DDS 
2014-Oct-14 © 2014 RTI 82
DDS Security
Q4 2013 Reported Cyber Incidents to 
U.S. Critical Infrastructure 
http://ics-cert.us-cert.gov/monitors/ICS-MM201312 
2014-Oct-14 © 2014 RTI 85
Threats 
2014-Oct-14 © 2014 RTI 86
Threats 
Alice: Allowed to publish topic T 
Bob: Allowed to subscribe to topic T 
Eve: Non-authorized eavesdropper 
Trudy: Intruder 
Trent: Trusted infrastructure service 
Mallory: Malicious insider 
1. Unauthorized subscription 
2. Unauthorized publication 
3. Tampering and replay 
4. Unauthorized access to data by 
infrastructure services 
2014-Oct-14 © 2014 RTI 87
Security Terms: a Safe-Deposit Box 
• Authentication: The bank knows who you 
are. You must show ID. 
• Access Control: The bank only lets those 
on an access list into your box. 
• Confidentiality: You are alone in the room. 
Nobody can see the contents of the box. 
• Integrity: The box is sealed. If anybody touches it 
you will know. 
• Non repudiation: You sign when you come in and 
out so you can’t claim that you weren’t there. 
• Availability: The bank is always open. 
2014-Oct-14 © 2014 RTI 88
Security Boundaries 
System Boundary 
Transport 
Data 
2014-Oct-14 © 2014 RTI 89
System Boundary 
System 1 
Cross- 
Domain 
Guard 
• Diode 
• Filter 
• Downgrade 
System 2 
• Across security domains 
• Independent of how data is secured within a 
system 
2014-Oct-14 © 2014 RTI 90
Transport Layer 
Existing 
App 
Adapter 
DDS Routing 
Service 
TCP/IP Capable Network 
Existing 
App 
Adapter 
DDS Routing 
Service 
Native 
DDS App 
DDS Library 
Native 
DDS APP 
DDS Library 
Secure 
Transport 
Secure 
Transport 
Secure 
Transport 
Secure 
Transport 
Typically SSL, 
TLS or DTLS 
2014-Oct-14 © 2014 RTI 91
Secure Data Transfer 
1. Authenticate 
– Verify identity 
2. Securely exchange cryptographic keys 
3. Use keys to: 
– Encrypt data 
– Add a message authentication code 
App 1 App 2 
2014-Oct-14 © 2014 RTI 92
Secure Channel for Cross-Network Bridging 
System 1 
LAN 
Routing 
Service 
System 2 
LAN 
Routing 
Service 
TLS 
WAN/ 
Internet 
Can be used 
with or without 
a firewall 
2014-Oct-14 © 2014 RTI 93
Connecting Clients Across a WAN 
Remote 
App 
Routing 
Service 
Remote 
App 
Remote 
App 
TLS 
• Remote access to cloud or data center 
– Clients communicate with participants in data center 
or cloud LAN, not with each other 
– Clients behind firewalls 
– Only one public address required 
• Example: Exposing a service to end-user clients 
2014-Oct-14 © 2014 RTI 94
Limitations of Transport Security: 
No Inherent Access Control 
• You’re authenticated or you’re not 
• Less an issue for centralized systems 
– E.g.: non-real-time IT and consumer IoT systems 
– Broker centrally manages access control 
App App App 
Device 
Message 
Broker 
Device Device 
• Poor performance 
and scalability 
• Single point of 
failure/failover 
2014-Oct-14 © 2014 RTI 95
Limitations of Transport Security: 
Overall Poor Performance and Scalability 
• No multicast support (even with DTLS over UDP) 
– Broad data distribution is very inefficient 
• Usually runs over TCP: poor latency and jitter 
• Requires a network robust enough to support IP 
and TCP 
• All data treated as reliable 
– Even fast changing data that could be “best effort” 
• Always encrypts all data, metadata and protocol 
headers 
– Even if some data does not have to be private 
• Security is at a very gross level 
2014-Oct-14 © 2014 RTI 96
Introducing DDS Security 
First security standard to address performance, 
safety and security requirements of 
mission-critical and real-time systems 
HMI/UI IT, Cloud & SoS 
Secure DDS 
Streaming 
Analytics & 
Control 
Connectivity 
Sensors Actuators 
2014-Oct-14 © 2014 RTI 97
DDS Security 
• Security extensions to DDS standard 
• Requires trivial or no change to 
existing DDS apps and adapters 
• Runs over any transport 
– Including low bandwidth, unreliable 
– Does not require TCP or IP 
– Multicast for scalability, low latency 
• Plugin architecture 
– Built-in defaults 
– Customizable via standard API 
• Completely decentralized 
– High performance and scalability 
– No single point of failure 
Secure DDS 
library 
Authentication 
Access Control 
Encryption 
Data Tagging 
Logging 
Application 
Any Transport 
(e.g., TCP, UDP, multicast, 
shared memory, ) 
2014-Oct-14 © 2014 RTI 98
2014-Oct-14 © 2014 RTI 99
Service 
Plugin 
Purpose Interactions 
Authentication Authenticate the principal that is 
joining a DDS Domain. 
Handshake and establish 
shared secret between 
participants 
The principal may be an 
application/process or the user 
associated with that 
application or process. 
Participants may messages to 
do mutual authentication and 
establish shared secret 
Access Control Decide whether a principal is 
allowed to perform a protected 
operation. 
Protected operations include 
joining a specific DDS domain, 
creating a Topic, reading a 
Topic, writing a Topic, etc. 
Cryptography Perform the encryption and 
decryption operations. Create & 
Exchange Keys. Compute digests, 
compute and verify Message 
Authentication Codes. Sign and 
verify signatures of messages. 
Invoked by DDS middleware 
to encrypt data, compute and 
verify MAC, compute & verify 
Digital Signatures 
Logging Log all security relevant events Invoked by middleware to log 
Data Tagging Add a data tag for each data
Standard Capabilities 
Authenticatio 
n 
 X.509 Public Key Infrastructure (PKI) with a pre-configured 
shared Certificate Authority (CA) 
 Digital Signature Algorithm (DSA) with Diffie-Hellman and 
RSA for authentication and key exchange 
Access Control  Specified via permissions file signed by shared CA 
 Control over ability to join systems, read or write data topics 
Cryptography  Protected key distribution 
 AES128 and AES256 for encryption 
 HMAC-SHA1 and HMAC-SHA256 for message authentication 
and integrity 
Data Tagging  Tags specify security metadata, such as classification level 
 Can be used to determine access privileges (via plugin) 
Logging  Log security events to a file or distribute securely over 
Connext DDS 
2014-Oct-14 © 2014 RTI 101
Security Flow 
Domain 
Participant 
Create Fails 
Authenticate 
Authenticate 
DP? 
Yes DP? 
No 
Ignore 
Remote DP 
Authenticate 
Remote DP? 
No 
Yes 
No 
Yes 
Access OK? 
Ignore 
remote 
endpoint 
Message 
security 
Endpoint 
Create Fails 
Yes 
Access OK? 
No 
Create 
Domain 
Participant 
Create 
Endpoints 
Discover 
remote DP 
Discover 
remote 
Endpoints 
Send/Receiv 
e data 
2014-Oct-14 © 2014 RTI 102
Protections 
Protected 
Objects 
Domain (by domain_id) 
Topic (by Topic name) 
DataObjects (by Instance/Key) 
Protected 
Operations 
Domain.join 
Topic.create 
Topic.read (includes QoS) 
Topic.write (includes QoS) 
Data.createInstance 
Data.writeInstance 
Data.deleteInstance 
2014-Oct-14 © 2014 RTI 103
Control over Encryption 
• Scope 
– Discovery data 
– Metadata 
– Data 
• For each: 
– Encrypt 
– Sign 
• Optimizes performance by only encrypting 
data that must be private 
2014-Oct-14 © 2014 RTI 104
Example Domain Governance 
2014-Oct-14 © 2014 RTI 105
Example Permissions 
2014-Oct-14 © 2014 RTI 106
DDS Security Status 
• Specification adopted March 2014 
– Considered “Beta” for 1 year 
– RTI chairing Finalization Task Force 
• Specification provides a framework for securing 
DDS systems 
– Built-in plugins provide a common approach for 
applications without specialized requirements 
– Custom plugins can be developed to match more 
specialized deployments and integrate with existing 
infrastructure and hardware 
• Early Access Release available now from RTI 
2014-Oct-14 © 2014 RTI 107
Specification Reviewers Include: 
• GE 
• Intel 
• Siemens 
• Technicolor 
• NSWC 
• General Dynamics 
• THALES 
• SAAB 
• Cassidian 
• QinetiQ & UK MOD 
• Lockheed 
• Raytheon 
• None found any show stoppers 
• Several contacted OMG to urge adoption 
2014-Oct-14 © 2014 RTI 108
DDS Security Demo 
2014-Oct-14 © 2014 RTI 109
Security Example: 
Power Grid 
In Partnership with PNNL 
© 2014 RTI
Data Security Requirements 
Data Item Authentica-tion 
Access 
Control 
Integrity Non-repudiation 
Confidentialit 
y 
Control traffic X X X X X 
Data 
X X 
Telemetry 
traffic 
Physical 
Security Data 
X X X 
Engineering 
maintenance 
X 
Source: www.sxc.hu 
2014-Oct-14 © 2014 RTI 111
Test Environment 
• Real World Environment 
– Transmission switching 
substation 
– Real substation equipment 
• PNNL powerNET Testbed 
– Remote connectivity 
– Local control room 
demonstration environment 
– Dynamically reconfigurable 
2014-Oct-14 © 2014 RTI 112
SCADA Equipment Setup 
2014-Oct-14 © 2014 RTI 113
RTI and PNNL Grid Security Retrofit 
Control Station 
DNP3 
Master 
Device 
Transmission Substation 
DNP3 
Slave 
Device 
RTI Routing 
Service 
Gateway 
RTI Routing 
Service 
ComProcessor 
DNP3 
Slave 
Device 
DNP3 over 
Ethernet DNP3 over DDS 
DNP3 over 
RS232/485 
RTI Routing 
Service 
Gateway 
DDS 
LAN 
DDS 
LAN 
RTI Routing 
Service 
ComProcessor 
IP 
Router 
IP 
Router 
DDS over WAN 
Attack Detector 
Scada 
Converter 
Anomaly 
Detector 
Secure DDS 
over UDP 
Display 
Effective DNP3 
connection 
Details at http://blogs.rti.com 
2014-Oct-14 © 2014 RTI 114
Support for Safety Critical 
Systems
DDS Inherently Well-Suited to Safety Critical 
Systems 
• Non-stop availability 
– No single point of failure 
– …including run-time services 
– Support for redundant networks 
– Automatic failover between redundant publishers 
– Dynamic upgrades 
• Visibility into missed deadlines and presence 
• Proven in hundreds of mission critical systems 
• Used in US DoD TRL 9 systems 
2014-Oct-14 © 2014 RTI 116
High-Assurance Safety: DO-178C 
• Guideline 
• Used by FAA as basis 
for certification 
– Aircraft are “certified” 
– Software code 
developed under 
DO-178 provides “certification evidence” 
• Increasingly adopted for military aircraft 
• Likely required for UAS integration into NAS 
2014-Oct-14 © 2014 RTI 117
DO-178 Safety Levels 
Level Failure Condition 
Typical % of 
avionics code 
A 
Catastrophic 
(may be total loss of aircraft) 
15% 
B 
Hazardous/Severe 
(serious injuries) 
35% 
C 
Major 
(minor injuries) 
30% 
D 
Minor 
(inconvenience) 
15% 
E No effect 5% 
2014-Oct-14 © 2014 RTI 118
Certification Costs 
• Generation of DO-178C 
evidence typically costs 
$50-$100 per ELOC 
• Process objectives must 
be met 
• All must be documented 
• Code must be clean 
– Testable 
– No dead code 
– Deterministic 
Level Process 
Objectives 
Code Coverage 
A 71 
Level B and 100% 
of MCDC 
B 69 
Level C plus 100% 
of DC 
C 62 
Level D plus 100% 
of SC 
D 26 
100% of 
Requirements 
E 0 None 
2014-Oct-14 © 2014 RTI 119
DO-178C Software Life Cycle Data 
   
© 
System 
Requirements 
High-Level 
Requirements 
Low-Level 
Requirements 
Source 
Code 
Executable 
Object Code 
Software 
Architecture 
© 2014 RTI 120
Test Strategy 
   
Requirements-Based Test Selection 
© 
 
Requirements-Based Test Coverage Analysis 
 
Structural Coverage Analysis 
© 2014 RTI 121
Tenets Of Safety-Critical Software 
• Reduce code size 
• Consider testability in design 
• Design code to be deterministic 
2014-Oct-14 © 2014 RTI 122
Connext DDS Cert 
• Small footprint, certifiable DDS 
– ~25K ELOC 
– No dynamic memory allocation 
– Static endpoint discovery only 
• Follows OMG DDS specification 
– C and C++ APIs 
– Subset of minimum profile 
• Application portability and interoperability with full DDS 
– Including Routing Service 
• Compatible with RTI’s FACE interface 
• DO-178C Level A certification available 1H 2015 
2014-Oct-14 © 2014 RTI 123
DO-178C Level A Certification Evidence 
• Plan for Software Aspects of 
Certification (PSAC) 
• Software Development Plan (SDP) 
– Requirements standards 
– Design standards 
– Code standards 
• Software Verification Plan (SVP) 
• Software Configuration 
Management Plan (SCM) 
• Software Quality Assurance Plan 
• Software Requirements Data 
• Design Description 
• Traceability 
• SQA Records 
• SCM Records 
• Software Configuration Index 
• Software Verification Cases and 
Procedures 
• Software Verification Results 
• Software Accomplishment 
Summary 
Certification evidence can be re-used across programs 
2014-Oct-14 © 2014 RTI 124
Savings from DDS Certification Evidence 
30,000 ELOC 20,000 ELOC 10,000 ELOC 
Level A $3,000,000 $2,000,000 $1,000,000 
Level B $2,550,000 $1,700,000 $850,000 
Level C $1,800,000 $1,200,000 $600,000 
• DDS certification evidence available at fraction 
of cost 
• Availability at start of project also reduces risk 
2014-Oct-14 © 2014 RTI 125
Summary 
• Certifiable DDS designed for safety-critical 
applications now available 
– Connext DDS Cert 
– Standards compliant 
– Small footprint 
• Code is certifiable to DO-178 Level A 
– Minimal lines of code 
– Deterministic 
• Certification evidence is reusable 
2014-Oct-14 © 2014 RTI 126
RTI Connext DDS
DDS Differentiation 
DDS Standard 
Interoperability 
Portability 
Real-time QoS 
2014-Oct-14 © 2014 RTI 128
Connext DDS Product Family 
Secure Professional Micro Cert 
DDS-RTPS Wire Interoperability Protocol 
Full DDS 
Libraries 
Routing 
Service 
Database 
Integration 
DDS 
Subset 
DDS Subset 
DO-178C Certifiable 
Admin Console 
Monitoring 
Microsoft Excel 
Recording 
Replay 
Wireshark 
Persistence 
Logging 
Prototyper 
General Purpose 
& Real-Time Apps 
Remote 
Apps 
Existing Apps and Devices 
Adapter 
Small Footprint 
Apps 
High Assurance 
Apps 
JMS API 
Security 
Plugins 
2014-Oct-14 © 2014 RTI 129
Application Code 
Data Types 
Dynamically 
defined (API) 
Custom Pre-defined 
C, C++, C#, Java, Ada, Lua, LabVIEW, Simulink, Python 
Data-Centric Publish/Subscribe 
Automatic 
Discovery 
History 
Cache 
Monitoring 
Local & remote APIs 
Quality of Svc 
API & file-based 
Operating System and Network Stack 
Windows, Linux, Unix, embedded, mobile, RTOS 
Interface 
Compiler 
Interface Definitions 
• IDL 
• XML 
Shared 
Memory 
UDPv4 & v6 
ucast & mcast 
TLS & DTLS 
(SSL) 
WAN 
TCP 
Custom 
Pluggable Transport Interface 
Generated 
DDS APIs – event-driven, polled & SQL query 
Reliability • DDS-RTPS Wire Protocol 
<XML> 
Plugins 
Fully dynamic 
Static endpoint 
Server Based 
Low 
Bandwidth 
<XML> 
UML 
MATLAB 
Request/reply, Guaranteed Messaging, JMS 
Security 
Plugins 
Authentication 
Encryption 
Access Control 
Tagging 
Logging 
Custom 
2014-Oct-14 © 2014 RTI 130
Q&A and Discussion
Next Steps – Learn More 
• Contact RTI 
– Demo, Q&A 
• Download software 
– www.rti.com/downloads 
– Free trial with comprehensive tutorial 
– RTI Shapes Demo 
• Watch videos & webinars, read 
whitepapers 
– www.rti.com/resources 
– www.youtube.com/realtimeinnovatio 
ns 
2014-Oct-14 © 2014 RTI 132
dds.omg.org 
www.rti.com 
community.rti.com 
demo.rti.com 
www.youtube.com/realtimeinnovations 
blogs.rti.com 
www.twitter.com/RealTimeInnov 
www.facebook.com/RTIsoftware 
www.omg.org 
www.slideshare.net/GerardoPardo 
www.slideshare.net/RealTimeInnovations 
2014-Oct-14 © 2014 RTI 133
Summary 
• IIOT is next industrial revolution 
– Save money through efficiency 
– Make money through new services 
• DDS is ideal foundation for IIoT 
– Seamless sensor-to-cloud data sharing 
– Meets real-time, mission-critical requirements 
– Leading-edge security and safety 
– Proven foundation 
– Eases existing system migration/modernization 
• RTI Connext provides the most robust DDS solution 
2014-Oct-14 © 2014 RTI 134
Thank You!

Contenu connexe

Tendances

Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsReal-Time Innovations (RTI)
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Real-Time Innovations (RTI)
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareReal-Time Innovations (RTI)
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsReal-Time Innovations (RTI)
 
Why is DDS the Right Communications Standard for the Industrial Internet?
Why is DDS the Right Communications Standard for the Industrial Internet?Why is DDS the Right Communications Standard for the Industrial Internet?
Why is DDS the Right Communications Standard for the Industrial Internet?Real-Time Innovations (RTI)
 
System Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsSystem Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsReal-Time Innovations (RTI)
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...Real-Time Innovations (RTI)
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsReal-Time Innovations (RTI)
 
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftReal-Time Innovations (RTI)
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Real-Time Innovations (RTI)
 
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018   Optimizing your client's wi-fi experienceCisco Connect Halifax 2018   Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experienceCisco Canada
 
The History and Evolution of SDN
The History and Evolution of SDNThe History and Evolution of SDN
The History and Evolution of SDNNapier University
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutionsteam-WIBU
 

Tendances (20)

Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
The Industrial Internet of Things and RTI
The Industrial Internet of Things and RTIThe Industrial Internet of Things and RTI
The Industrial Internet of Things and RTI
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 
Why is DDS the Right Communications Standard for the Industrial Internet?
Why is DDS the Right Communications Standard for the Industrial Internet?Why is DDS the Right Communications Standard for the Industrial Internet?
Why is DDS the Right Communications Standard for the Industrial Internet?
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
System Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsSystem Architecture for C4I Coalition Operations
System Architecture for C4I Coalition Operations
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned Aircraft
 
TechTalk: Connext DDS 5.2.
TechTalk: Connext DDS 5.2.TechTalk: Connext DDS 5.2.
TechTalk: Connext DDS 5.2.
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
 
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018   Optimizing your client's wi-fi experienceCisco Connect Halifax 2018   Optimizing your client's wi-fi experience
Cisco Connect Halifax 2018 Optimizing your client's wi-fi experience
 
The History and Evolution of SDN
The History and Evolution of SDNThe History and Evolution of SDN
The History and Evolution of SDN
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutions
 

En vedette

Introducción a Android y conexión con SharePoint
Introducción a Android y conexión con SharePointIntroducción a Android y conexión con SharePoint
Introducción a Android y conexión con SharePointAlbert Lozano Ciller
 
The 5th methodology: implementing a holistic approach to mobile research
The 5th methodology: implementing a holistic approach to mobile researchThe 5th methodology: implementing a holistic approach to mobile research
The 5th methodology: implementing a holistic approach to mobile researchMerlien Institute
 
NH Magazine número 9 -abril 2015-
NH Magazine número 9  -abril 2015-NH Magazine número 9  -abril 2015-
NH Magazine número 9 -abril 2015-SEMANARIO HELVECIA
 
Historia "hora de aventuras"
Historia "hora de aventuras"Historia "hora de aventuras"
Historia "hora de aventuras"Antoniooalm
 
Francis perez mapa conceptual dibujo - copia
Francis perez   mapa conceptual dibujo - copiaFrancis perez   mapa conceptual dibujo - copia
Francis perez mapa conceptual dibujo - copiafrancisyen54
 
Diari del 13 de maig de 2015
Diari del 13 de maig de 2015Diari del 13 de maig de 2015
Diari del 13 de maig de 2015diarimes
 
Introducción a google drive
Introducción a google driveIntroducción a google drive
Introducción a google drivejoycegmoreno
 
The Future in designing for the sex(es)
The Future in designing for the sex(es)The Future in designing for the sex(es)
The Future in designing for the sex(es)Cathy Wang
 
Proyectos fundación terpel
Proyectos fundación terpelProyectos fundación terpel
Proyectos fundación terpeljohnjalopez
 
Marketing Strategy for Mr Smart Wash Digital
Marketing Strategy for Mr Smart Wash Digital Marketing Strategy for Mr Smart Wash Digital
Marketing Strategy for Mr Smart Wash Digital Krisnawati Sukmaya
 
Estudio Social Travel NH
Estudio Social Travel NHEstudio Social Travel NH
Estudio Social Travel NHConcepto05
 
Curriculum Vitae Maria Aminta Henrich Nonone Warmy Khuyay
Curriculum Vitae Maria Aminta Henrich Nonone Warmy KhuyayCurriculum Vitae Maria Aminta Henrich Nonone Warmy Khuyay
Curriculum Vitae Maria Aminta Henrich Nonone Warmy KhuyayAminta Henrich Warmi Khuyay
 
Semana vocacional 2011
Semana vocacional 2011Semana vocacional 2011
Semana vocacional 2011Josean
 
إدارة الوقت من المنظور الإسلامي والإداري
إدارة الوقت من المنظور الإسلامي والإداريإدارة الوقت من المنظور الإسلامي والإداري
إدارة الوقت من المنظور الإسلامي والإداريMohammad Kettani
 
Portafolio servicios pp presentacion dic09
Portafolio servicios pp  presentacion dic09Portafolio servicios pp  presentacion dic09
Portafolio servicios pp presentacion dic09Grupo Riceli
 
Organizaciones Sanitarias Integradas. El futuro de la sanidad.
Organizaciones Sanitarias Integradas. El futuro de la sanidad.Organizaciones Sanitarias Integradas. El futuro de la sanidad.
Organizaciones Sanitarias Integradas. El futuro de la sanidad.Carlos Alberto Arenas Díaz
 

En vedette (20)

Introducción a Android y conexión con SharePoint
Introducción a Android y conexión con SharePointIntroducción a Android y conexión con SharePoint
Introducción a Android y conexión con SharePoint
 
Circulos de guitarra
Circulos de guitarraCirculos de guitarra
Circulos de guitarra
 
The 5th methodology: implementing a holistic approach to mobile research
The 5th methodology: implementing a holistic approach to mobile researchThe 5th methodology: implementing a holistic approach to mobile research
The 5th methodology: implementing a holistic approach to mobile research
 
NH Magazine número 9 -abril 2015-
NH Magazine número 9  -abril 2015-NH Magazine número 9  -abril 2015-
NH Magazine número 9 -abril 2015-
 
Historia "hora de aventuras"
Historia "hora de aventuras"Historia "hora de aventuras"
Historia "hora de aventuras"
 
Francis perez mapa conceptual dibujo - copia
Francis perez   mapa conceptual dibujo - copiaFrancis perez   mapa conceptual dibujo - copia
Francis perez mapa conceptual dibujo - copia
 
Inmaculada Senovilla - Mundo Cocina
Inmaculada Senovilla - Mundo CocinaInmaculada Senovilla - Mundo Cocina
Inmaculada Senovilla - Mundo Cocina
 
Gic Market In Canada
Gic Market In CanadaGic Market In Canada
Gic Market In Canada
 
Diari del 13 de maig de 2015
Diari del 13 de maig de 2015Diari del 13 de maig de 2015
Diari del 13 de maig de 2015
 
Introducción a google drive
Introducción a google driveIntroducción a google drive
Introducción a google drive
 
The Future in designing for the sex(es)
The Future in designing for the sex(es)The Future in designing for the sex(es)
The Future in designing for the sex(es)
 
Proyectos fundación terpel
Proyectos fundación terpelProyectos fundación terpel
Proyectos fundación terpel
 
Marketing Strategy for Mr Smart Wash Digital
Marketing Strategy for Mr Smart Wash Digital Marketing Strategy for Mr Smart Wash Digital
Marketing Strategy for Mr Smart Wash Digital
 
Estudio Social Travel NH
Estudio Social Travel NHEstudio Social Travel NH
Estudio Social Travel NH
 
Curriculum Vitae Maria Aminta Henrich Nonone Warmy Khuyay
Curriculum Vitae Maria Aminta Henrich Nonone Warmy KhuyayCurriculum Vitae Maria Aminta Henrich Nonone Warmy Khuyay
Curriculum Vitae Maria Aminta Henrich Nonone Warmy Khuyay
 
Transparencias
TransparenciasTransparencias
Transparencias
 
Semana vocacional 2011
Semana vocacional 2011Semana vocacional 2011
Semana vocacional 2011
 
إدارة الوقت من المنظور الإسلامي والإداري
إدارة الوقت من المنظور الإسلامي والإداريإدارة الوقت من المنظور الإسلامي والإداري
إدارة الوقت من المنظور الإسلامي والإداري
 
Portafolio servicios pp presentacion dic09
Portafolio servicios pp  presentacion dic09Portafolio servicios pp  presentacion dic09
Portafolio servicios pp presentacion dic09
 
Organizaciones Sanitarias Integradas. El futuro de la sanidad.
Organizaciones Sanitarias Integradas. El futuro de la sanidad.Organizaciones Sanitarias Integradas. El futuro de la sanidad.
Organizaciones Sanitarias Integradas. El futuro de la sanidad.
 

Similaire à October Southern CA Road Shows - Build Safe and Secure Distributed Systems

Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureReal-Time Innovations (RTI)
 
Easing Integration of Large-Scale Real-Time Systems with DDS
Easing Integration of Large-Scale Real-Time Systems with DDSEasing Integration of Large-Scale Real-Time Systems with DDS
Easing Integration of Large-Scale Real-Time Systems with DDSRick Warren
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsReal-Time Innovations (RTI)
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSReal-Time Innovations (RTI)
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsThibault Cantegrel
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTSolace
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Richard Hudson
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDSRick Warren
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersRadisys Corporation
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...Real-Time Innovations (RTI)
 
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PROIDEA
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT projectEurotech
 

Similaire à October Southern CA Road Shows - Build Safe and Secure Distributed Systems (20)

Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The Architecture
 
DDS Enabling Open Architecture
DDS Enabling Open ArchitectureDDS Enabling Open Architecture
DDS Enabling Open Architecture
 
Easing Integration of Large-Scale Real-Time Systems with DDS
Easing Integration of Large-Scale Real-Time Systems with DDSEasing Integration of Large-Scale Real-Time Systems with DDS
Easing Integration of Large-Scale Real-Time Systems with DDS
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
 
Developer Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trendsDeveloper Day 2014 - 4 - wind river - iot business and technology trends
Developer Day 2014 - 4 - wind river - iot business and technology trends
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1
 
Introduction to DDS
Introduction to DDSIntroduction to DDS
Introduction to DDS
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data CentersDeploying Hyperscale SDN and NFV in Next-Generation Data Centers
Deploying Hyperscale SDN and NFV in Next-Generation Data Centers
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 

Plus de Real-Time Innovations (RTI)

Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Real-Time Innovations (RTI)
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesReal-Time Innovations (RTI)
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Real-Time Innovations (RTI)
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...Real-Time Innovations (RTI)
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareReal-Time Innovations (RTI)
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Real-Time Innovations (RTI)
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Real-Time Innovations (RTI)
 
Integrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachIntegrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachReal-Time Innovations (RTI)
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryReal-Time Innovations (RTI)
 

Plus de Real-Time Innovations (RTI) (18)

A Tour of RTI Applications
A Tour of RTI ApplicationsA Tour of RTI Applications
A Tour of RTI Applications
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car Architectures
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
Tech Mahindra - Connected Engineering
Tech Mahindra - Connected EngineeringTech Mahindra - Connected Engineering
Tech Mahindra - Connected Engineering
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)
 
Integrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachIntegrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component Approach
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic Surgery
 

Dernier

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 

Dernier (20)

WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 

October Southern CA Road Shows - Build Safe and Secure Distributed Systems

  • 1. Your systems. Working as one. Build Safe & Secure Distributed Systems How to Architect Scalable Systems for the Industrial Internet using Open Standards
  • 2. Topics • Introductions • Industrial Internet of Things • Data Distribution Service • DDS in IIoT examples • DDS security • DDS safety • RTI Connext DDS • Q&A 2014-Oct-14 © 2014 RTI 2
  • 3. Why is RTI? To enable and realize the potential of smart machines to serve mankind 2014-Oct-14 © 2014 RTI 3
  • 4. RTI Enables the Industrial Internet • Real-time IIoT communication platform • Proven across industries • Sensor-to-cloud integration 2014-Oct-14 © 2014 RTI 4
  • 5. About RTI • Market Leader – 1,000+ projects use Connext DDS – Over 70% DDS middleware market share1 – Largest embedded middleware vendor2 – 2013 Gartner Cool Vendor for technology and Open Community Source model • Standards Leader – Active in 15 standards efforts – DDS authors, chair, wire spec, security, more – IIC steering committee; OMG board • Team Quality Leader – Stanford research pedigree – High-performance, control, systems experts – Top quality product, processes, execution © 2014 RTI 1Embedded Market Forecasters 2VDC Analyst Report 2014-Oct-14 5
  • 6. IIoT Infrastructure Trusts RTI • World’s largest Wind Power company • World’s largest Underground Mining Equipment company • World’s largest Navy (all surface ships) • World’s largest Automotive company • World’s largest Emergency Medical System company • World’s largest Medical Imaging provider • World’s 2nd largest Patient Monitoring manufacturer • World’s 2nd largest Air Traffic control system • World’s largest Broadcast Video Equipment manufacturer • World’s largest Launch Control System • World’s largest Telescope (under construction) • World’s 5th-largest Oil & Gas company • World’s 6th-largest power plant (largest in US) • All of world’s top ten defense companies RTI designed into over $1 trillion 2014-Oct-14 © 2014 RTI 6
  • 7. RTI Named Most Influential IIoT Company 2014-Oct-14 © 2014 RTI 7
  • 8. 2008 Global Support and Distribution 2014-Oct-14 © 2014 RTI 8
  • 10. Industrial Internet of Things (IIoT) 2014-Oct-14 © 2014 RTI 10
  • 11.
  • 12.
  • 13.
  • 14. Ingredients • Connectivity • Sharing big data – In motion – At rest • Software-based intelligence 2014-Oct-14 © 2014 RTI 14
  • 15.
  • 16. IIoT Systems Are Distributed HMI/UI IT, Cloud & SoS Connectivity Sensors Actuators Streaming Analytics & Control 2014-Oct-14 © 2014 RTI 16
  • 17. IIoT Systems Are Distributed 2014-Oct-14 © 2014 RTI 17
  • 18. Unit DataBus Unit DataBus Example Intelligent Industrial Internet Intelligent Systems Intelligent Machines Cloud Enterprise LAN Intelligent System of Systems Unit LAN Segment Think HMI Intra-machine Think HMI Think HMI Intra-machine Sense Intra-machine Act Sense Act 2014-Oct-14 © 2014 RTI 18
  • 19. Consumer Internet of Things Centralized, Hub and Spoke Information Technology Systems Premises or Cloud 2014-Oct-14 © 2014 RTI 19
  • 20. Gateway There are many vectors along which we can measure end-point “robustness.” Table 1 summarizes these vectors: Table 1: Near-term end-point differences between IIoT and HIoT Attribute Industrial IoT (IIoT) Human IoT (HIoT) Market Opportunity Brownfield Greenfield Product Lifecycle Until dead or obsolete Whims of style and/or budget Solution Integration Heterogeneous APIs Vertically integrated Security Access Identity & privacy Human Interaction Autonomous Reactive Availability 0.9999 to 0.99999 (49–5 ‘ ’s) 0.99 to 0.999 (2–3 ‘9’s) Access to Internet Intermittent to independent Persistent to interrupted Response to Failure Resilient, fail-in-place Retry, replace Network Topology Federations of peer-to-peer Constellations of peripherals Physical Legacy & purpose-built Evolving broadband & Connectivity wireless Example Gateways Commercial monitoring Echelon SmartServer Consumer home automation Revolv Hub Interaction Style Event Driven, Publish-Subscribe Request / Response Market Opportunity: “Brownfield” is a term borrowed from commercial real estate; it is used to denote a potential site for building development that had been previously developed for industrial or commercial use. IIoT uses brownfield to describe the opportunity to connect more than a century of in-service mechanical and electrical http://www.moorinsightsstrategy.com/wp-content/uploads/2013/10/Connecting-with-the-Industrial-Internet-of-Things-IIoT-by-Moor-Insights-Strategy.pdf Moore Insights report 2014
  • 21. Information Technology Systems Intelligent Systems Streaming analytics and control (Big Data in motion) Big Data (at rest) analytics, ERP, CRM Physics speed, deterministic, microseconds+ Human speed, seconds+ Decentralized, distributed, disperse Centralized, data center and cloud Dynamic, autonomous, plug and play Relatively static, administered Can not go down, often even for upgrades Scheduled maintenance, failover OK Diverse networks, sometimes disadvantaged Fast, reliable networks 2014-Oct-14 © 2014 RTI 21
  • 22. Data Distribution Service Designed for the Industrial Internet of Things
  • 23. For loose coupling, provides: • Discovery • Routing • High-availability • QoS enforcement • Well-define interfaces • Standard interoperability Protocol Data Distribution Service 2014-Oct-14 © 2014 RTI 23
  • 24. DDS Standard • Interoperability and portability – Data model specification and discovery – Network protocol – Programming interface • Managed by Object Management Group (OMG) Cross-vendor source portability Standard API Data Model DDS Implementation Standard Protocol Cross-vendor interoperability 2014-Oct-14 © 2014 RTI 24
  • 25. Peer-to-Peer Communication DDS-RTPS Wire Interoperability Protocol • Completely decentralized • No intermediate servers, message brokers or ESB • Low latency • High scalability • No single point of failure App or Component DDS Library App or Component DDS Library DDS API 2014-Oct-14 © 2014 RTI 25
  • 26. Easy Integration of Existing Components Unmodified App Adapter DDS Routing Service DDS-RTPS Wire Interoperability Protocol Unmodified App Adapter DDS Routing Service App or Component DDS Library App or Component DDS Library DDS or other protocol DDS API New and Updated Applications Existing, Unmodified Applications 2014-Oct-14 © 2014 RTI 26
  • 27. Seamless Enterprise-Wide Connectivity Connect Everything, Everywhere Data Distribution Service Seamless data sharing regardless of: • Proximity • Platform • Language • Physical network • Transport protocol • Network topology 2014-Oct-14 © 2014 RTI 27
  • 28. Example: RTI Connext Availability • Programming languages and environments – C, C++, C#/.NET, Java, Ada – Lua, Python – LabVIEW, MATLAB, Simulink, UML – REST/HTTP • Operating systems – Windows, Linux, Unix, Mac OS – Mobile – Embedded, real time – Safety critical, partitioned • Processor families – x86, ARM, PowerPC… – 32- and 64-bit • Transport types – Shared memory – LAN (incl. multicast) – WAN / Internet – Wireless – Low bandwidth 2014-Oct-14 © 2014 RTI 28
  • 29. Foundation: Publish/Subscribe Data Distribution Service Commands Control App Sensor Data Sensor Sensor Data Display App Sensor Actuator 2014-Oct-14 © 2014 RTI 29
  • 30.
  • 31. Why Distribution Middleware? 1.0 Common Services 1.0 Common Services RDR IFF ESM SAFE RDR IFF ESM SAFE DIA NAV MCP IPCC DIA NAV MCP IPCC DWC  Grouping the modules into functional clusters does nothing to change that reality and ease software integration UNCLASSIFIED  Hawkeye has functionally oriented software modules  Each module talks to many other modules RIP TRK MSI WAC TDA L4 L11 L16 SEN DSC HMI ACIS MUX FIL TDM  Adding new functionality cascades integration re-work across many other modules CEC 8.0 Training 5.0 Communications 2.0 Sensors 3.0 Fusion 4.0 BMC2 7.0 Visualization 6.0 Sensor Control RIP CEC TRK MSI WAC TDA RAIDER CHAT SEN DSC Distributed Data Framework L4 L11 L16 IPv6 HMI ACIS T4O MUX FIL TDM aADNS TIS  Changing the communication between the modules can ease integration, when the new ‘Publish Subscribe’ approach is used – each module publishes its output w/o regard to who is receiving it, in contrast to the point-to-point approach of traditional inter-process communication It’s about an architecture that can assimilate evolving functionality, rather than remaining set in time
  • 32. Reduced Application Development Message Centric Data Centric (DDS) Application Application Logic Message Parsing and Filtering Message Caching Addressing, Marshaling Message Centric Middleware Send/Receive Packets Application Application Logic Data Centric Middleware (RTI) Message Parsing and Filtering Message Caching & State Management Discovery, Presence Marshaling, 32/64 Send/Receive Packets Savings 2014-Oct-14 © 2014 RTI 32
  • 33. Government Asset Tracking System Next-Gen Capability: • 50K lines of code—order of magnitude less • 1 yr to develop—8x less • 1 laptop—20x less • Achieved: 250K+ tracked updates/sec, no single point of failure Legacy Capability: • 500K lines of code • 8 yrs to develop • 21 servers • Achieved: 20K tracked updates/sec, reliability and uptime challenges “This would not have been possible with any other known technology.” —Network Ops Center Technical Lead 2014-Oct-14 © 2014 RTI 33
  • 34. Support for Mission-Critical Systems • Autonomous operation – Automatic discovery – No sys admin or centralized infrastructure • Non-stop: no single point of failure • QoS control and visibility into real-time behavior, system health • Embeddable • Proven in 100,000s of deployed devices 2014-Oct-14 © 2014 RTI 34
  • 35. Robot Demo USB Ethernet WiFi 2014-Oct-14 © 2014 RTI 35
  • 36. Robot Demo RTI Connext Databus USB Ethernet WiFi 2014-Oct-14 © 2014 RTI 36
  • 37. Robot Demo Command RTI Connext Databus USB Ethernet WiFi Publisher Command Publisher Subscriber 2014-Oct-14 © 2014 RTI 37
  • 38. 2014 RPC over DDS 2014 DDS Securit y DDS: Family of Specifications 2013 Web-Enabled DDS DDS 2008 2009 Implementation Network / TCP / UDP / IP App DDS Implementation App DDS Implementation 2010 2012 DDS Spec 2004 DDS 2006 Interoperablity UML Profile for DDS DDS for Lw CCM DDS X-Types DDS-STD-C++ DDS-JAVA5 App 2014-Oct-14 © 2014 RTI 38
  • 39. RTI Role RTI Role Product Status Core DDS API DCPS author 1st implementation DDS-RTPS Protocol Sole author 1st implementation Based on IEC 61148, which was authored by RTI and Schneider Automation DDS-XTypes Primary author 1st implementation Based on prior RTI innovation DDS C++ PSM RFP author; specification co-author EAR available now DDS Java PSM Sole author Under development DDS Security Primary author EAR available now Web-enabled DDS Primary author EAR available now 2014-Oct-14 © 2014 RTI 39
  • 40. RTI Role RTI Role Product Status UML Profile for DDS Co-submitter 1st implementation (3rd-parties) Standard being refined DDS for lwCCM Co-submitter 1st implementation (3rd-party) RPC over DDS Primary author Submission based on current capability Standard still under development Instrumentation RFP author Prototype now 2014-Oct-14 © 2014 RTI 40
  • 41. DDS Compared to Alternative Approaches
  • 42. Traditional IT and Consumer • Centralized ESB or Message Broker • E.g.: MQTT, XMPP, AMQP, CoAP, Web Services • Limited scalability and performance – Capacity of individual links and switch ports – CPU and resource limits on servers • Poor robustness – Tied to server maintenance and failures – Single point of vulnerability • Lessens capabilities and utility – Single centralized “brain” – No autonomy. Lack of intelligence at the edge. 2014-Oct-14 © 2014 RTI 42
  • 43. DDS: Distributed Analytics & Control at the Edge IT • Analyze orders of magnitude more data • Lower latency control for faster response • Highly resilient, no single point of failure • Fine-grained access control and security • Vastly more capable: Intelligence at the edge Same Internet, but new WEB 2014-Oct-14 © 2014 RTI 43
  • 44. Comparison DD S DBM S REST CoAP MQTT AMQ P XMP P Standard wire protocol ✔ ✔ ✔ ✔ ✔ Publish/Subscribe (event-driven) ✔ ✔ ✔ ✔ Explicit, discoverable interfaces ✔ ✔ Type safe (std/disc data encoding) ✔ ✔ ✔ I/S XML Standard API ✔ ✔ (JMS) Managed state (single src of truth) ✔ ✔ last Data-level Quality of Service ✔ Content filtering (routing) ✔ ✔ I/S Time-based filtering ✔ I/L Decentralized (no failure pt, bottleneck) ✔ Fed Autonomous (no admin) ✔ N/A=Not Applicable, M/O=Metadata Only, I/S=Implementation Specific, I/L=within Integration Logic 2014-Oct-14 © 2014 RTI 44
  • 45. DDS in IIoT Examples
  • 46. BK Medical: Ultrasound © 2014 RTI ”BK Medical is truly redefining Medical Ultrasound Imaging where the traditional single user / single system approach is being replaced with fully scalable and distributed multi-user systems …we selected the RTI Connext DDS middleware as this gives us all the flexibility and the abstraction layer needed for the future of Analogic Ultrasound” -- Jesper Lomborg Manigoff, VP of Engineering, Analogic Global Ultrasound 2014-Oct-14 46
  • 47.
  • 48. GE Healthcare Revolution® "GE Healthcare chose the DDS standard because it can handle many classes of intelligent machines. RTI Connext DDS satisfies the demanding requirements of our devices, and RTI has the depth and experience necessary to partner with us in order to meet our stringent standards. Additionally, RTI's Connext DDS allows us to standardize on a single communications platform across product lines." -- J Gustavo Perez, General Manager for MI&CT Engineering 2014-Oct-14 © 2014 RTI 48
  • 49. Modernize Surgical Networks • Connect Operating Room Dataflows – Waveforms – Data recording – Multi-channel video • To many recipients – Surgeon – Operating theater – Students & observers – Offsite © 2014 RTI 2014-Oct-14 49
  • 50. DLR: Robotic Surgery • The Minimally Invasive Robotic Surgery (MIRS) system at DLR coordinates three robots to perform delicate heart surgery. • The system closes a distributed loop between the robots and the remote surgeon’s control at 3kHz. • RTI enables new medical techniques © 2014 RTI 2014-Oct-14 50
  • 51. Mevion: Radiotherapy • Mevion’s Proton- Beam Radiation Therapy system zaps tumors with accelerated protons • The treatment must be continuous for 30- 40 days; downtime endangers treatment success • With RTI Connext DDS, Mevion’s PBRT delivers dependable treatment at low cost © 2014 RTI First patient treated Dec 2013, Siteman Cancer Center, St. Louis 2014-Oct-14 51
  • 52. Exelis: C2 Communication • Exelis (ITT) C4i provides command and control systems for military and civilian agencies (fire/police/emergency response) • RTI Connext DDS connects GUIs to servers that route voice and video • RTI met the critical needs: scalability, routing, recording 2014-Oct-14 © 2014 RTI 52
  • 53. NASA: Robotics Control from ISS • NASA’s Human-Robotic Systems prototypes robots for extraterrestrial surfaces • NASA uses DDS for low-bandwidth, high-delay, lossy space-earth communications from the ISS • RTI middleware communicates over disadvantaged links © 2014 RTI 2014-Oct-14 53
  • 54. Harmonic: Video Switching • Harmonic transmission and video switching equipment delivers worldwide video-on-demand • RTI handles 1,000s of clients, 1,000,000s of messages • DDS enables high-performance scalability and future extensibility 2014-Oct-14 © 2014 RTI 54
  • 55. Enterprise Cloud Integration Analytics Connext TCP (WAN) Client Client Client Client Monitor Logging • 1000s of clients • Secure TLS Transport over public WAN • Authentication, Access Control, & Sticky Sessions • High-speed processing Redundant, Load- Balanced Reliable Multicast Gateway Processor Gateway Processor Gateway Processor Gateway Processor Data Center Cloud Load Balancer (F5) Connext Input Bus QIQuneu-mueeueemory workflow Connext Processing Bus 2014-Oct-14 © 2014 RTI 55
  • 56. VW: Driver Assistance and Safety • The VW Driver Assistance and Integrated Safety system combines radars, laser range finders, and video to assist safe operation • It helps avoid obstacles, detect lane departures, track eye activity, and safely negotiate bends • The V-Charge program demoed an auto-charging and parking vehicle in 2014 • RTI enables advanced reactive systems in transportation http://www.youtube.com/watch?v=7xQfKTAtyNU 2014-Oct-14 © 2014 RTI 56
  • 57. Bus Integration: VW Cargate ECU • Connect fast Ethernet bus to slower CANbus • Automated data translation • Simple pub sub between busses 2014-Oct-14 © 2014 RTI 57
  • 58. Wi-Tronix: Asset Tracking • Wi-Tronix systems wirelessly monitor high-value mobile assets such as locomotives, industrial equipment and marine vessels • RTI addressed critical issues such as optimized flow and discovery process over a wireless network • RTI middleware works effectively over lossy wireless networks © 2014 RTI 2014-Oct-14 58
  • 59. NAV CANADA: Air Traffic Control RTI Connext DDS was selected for its extensive compliance with the Object Management Group (OMG) DDS standard; its high security rating; its wide support of tools and programming languages, and its reputation for performance, scalability, and 24/7 reliability – Sid Koslow, Chief Technology Officer, NAV CANADA. Air Traffic Control for Canada 2nd largest ANSP in the world 7 major centers 2014-Oct-14 © 2014 RTI 59
  • 60. Air Traffic Control Inter-Segment Bus Oceanic control* CAATS Air Control Center Bus Center Control Radar RRaaddaarr Data processors Controller Displays Data planning Data link to pilot Recording Flight data processing Tower systems FAA/HOST connect Weather Service 2014-Oct-14 © 2014 RTI 60
  • 61. Joy Mining: Mining Equipment • Joy Mining is the world’s largest mining equipment manufacturer • RTI Connext DDS connects the controller, operator GUI, and historian • Reliable, fast connectivity enables control, debugging, and system health monitoring for continuous mining © 2014 RTI 2014-Oct-14 61
  • 62. Schneider: PLCs • Schneider is a global factory automation manufacturer • RTI Connext DDS eases PLC integration, provides up-to-the-minute data • Connext Micro works with limited memory and processing power on PLCs • RTI middleware connects factory PLCs and IT systems 2014-Oct-14 © 2014 RTI 62
  • 63. NASA: Launch Control System • NASA KSC’s new Constellation launch control SCADA system • RTI delivered 300k points, at 400k msgs/sec with 5x the required throughput, at 1/5 the needed latency • RTI connects thousands of sensors and actuators 2014-Oct-14 © 2014 RTI 63
  • 64. Open Architecture for Supply Chain Management
  • 68. Traditional Approach • Hard coded connections • Up to O(n2) • Complex • Hard to maintain, evolve, re-use E.g., sockets, RPC 2014-Oct-14 © 2014 RTI 68
  • 69. Result Time & cost of integration, maintenance and upgrades System Scale and Age O(n2) 2014-Oct-14 © 2014 RTI 69
  • 71. Key: Interoperability Well-defined: • Interfaces • Semantics 2014-Oct-14 © 2014 RTI 71
  • 73. Audi: Modular HIL Bus 2014-Oct-14 © 2014 RTI 73
  • 81. Medical Device Interoperability • 100,000 to 200,000 annual preventable deaths in US hospitals – Hospital error is 6th leading cause of preventable death • $30b in wasted cost • Lack of clinical decision support – No “smart alarms” • Correlation/fusion of data from multiple devices – Alarm fatigue • OR: 70% of anesthesiologists disable clinical alarms • ICU: 86% false alarms – Unsynchronized clocks • Manually device configuration is error prone (e.g., ORICU) 2014-Oct-14 © 2014 RTI 81
  • 82. Integrated Clinical Environment (ICE) Standard (ASTM F2761) • Developed by Medical Device "Plug-and-Play" Interoperability Program (MPnP) • Specifies interoperability for medical devices • Encompasses all ICU & operating room devices – From blood pressure cuffs to intravenous pumps to ventilators – Complete logging – Automatic error detection – Better care • OpenICE reference implementation built on RTI Connext DDS 2014-Oct-14 © 2014 RTI 82
  • 84.
  • 85. Q4 2013 Reported Cyber Incidents to U.S. Critical Infrastructure http://ics-cert.us-cert.gov/monitors/ICS-MM201312 2014-Oct-14 © 2014 RTI 85
  • 86. Threats 2014-Oct-14 © 2014 RTI 86
  • 87. Threats Alice: Allowed to publish topic T Bob: Allowed to subscribe to topic T Eve: Non-authorized eavesdropper Trudy: Intruder Trent: Trusted infrastructure service Mallory: Malicious insider 1. Unauthorized subscription 2. Unauthorized publication 3. Tampering and replay 4. Unauthorized access to data by infrastructure services 2014-Oct-14 © 2014 RTI 87
  • 88. Security Terms: a Safe-Deposit Box • Authentication: The bank knows who you are. You must show ID. • Access Control: The bank only lets those on an access list into your box. • Confidentiality: You are alone in the room. Nobody can see the contents of the box. • Integrity: The box is sealed. If anybody touches it you will know. • Non repudiation: You sign when you come in and out so you can’t claim that you weren’t there. • Availability: The bank is always open. 2014-Oct-14 © 2014 RTI 88
  • 89. Security Boundaries System Boundary Transport Data 2014-Oct-14 © 2014 RTI 89
  • 90. System Boundary System 1 Cross- Domain Guard • Diode • Filter • Downgrade System 2 • Across security domains • Independent of how data is secured within a system 2014-Oct-14 © 2014 RTI 90
  • 91. Transport Layer Existing App Adapter DDS Routing Service TCP/IP Capable Network Existing App Adapter DDS Routing Service Native DDS App DDS Library Native DDS APP DDS Library Secure Transport Secure Transport Secure Transport Secure Transport Typically SSL, TLS or DTLS 2014-Oct-14 © 2014 RTI 91
  • 92. Secure Data Transfer 1. Authenticate – Verify identity 2. Securely exchange cryptographic keys 3. Use keys to: – Encrypt data – Add a message authentication code App 1 App 2 2014-Oct-14 © 2014 RTI 92
  • 93. Secure Channel for Cross-Network Bridging System 1 LAN Routing Service System 2 LAN Routing Service TLS WAN/ Internet Can be used with or without a firewall 2014-Oct-14 © 2014 RTI 93
  • 94. Connecting Clients Across a WAN Remote App Routing Service Remote App Remote App TLS • Remote access to cloud or data center – Clients communicate with participants in data center or cloud LAN, not with each other – Clients behind firewalls – Only one public address required • Example: Exposing a service to end-user clients 2014-Oct-14 © 2014 RTI 94
  • 95. Limitations of Transport Security: No Inherent Access Control • You’re authenticated or you’re not • Less an issue for centralized systems – E.g.: non-real-time IT and consumer IoT systems – Broker centrally manages access control App App App Device Message Broker Device Device • Poor performance and scalability • Single point of failure/failover 2014-Oct-14 © 2014 RTI 95
  • 96. Limitations of Transport Security: Overall Poor Performance and Scalability • No multicast support (even with DTLS over UDP) – Broad data distribution is very inefficient • Usually runs over TCP: poor latency and jitter • Requires a network robust enough to support IP and TCP • All data treated as reliable – Even fast changing data that could be “best effort” • Always encrypts all data, metadata and protocol headers – Even if some data does not have to be private • Security is at a very gross level 2014-Oct-14 © 2014 RTI 96
  • 97. Introducing DDS Security First security standard to address performance, safety and security requirements of mission-critical and real-time systems HMI/UI IT, Cloud & SoS Secure DDS Streaming Analytics & Control Connectivity Sensors Actuators 2014-Oct-14 © 2014 RTI 97
  • 98. DDS Security • Security extensions to DDS standard • Requires trivial or no change to existing DDS apps and adapters • Runs over any transport – Including low bandwidth, unreliable – Does not require TCP or IP – Multicast for scalability, low latency • Plugin architecture – Built-in defaults – Customizable via standard API • Completely decentralized – High performance and scalability – No single point of failure Secure DDS library Authentication Access Control Encryption Data Tagging Logging Application Any Transport (e.g., TCP, UDP, multicast, shared memory, ) 2014-Oct-14 © 2014 RTI 98
  • 100. Service Plugin Purpose Interactions Authentication Authenticate the principal that is joining a DDS Domain. Handshake and establish shared secret between participants The principal may be an application/process or the user associated with that application or process. Participants may messages to do mutual authentication and establish shared secret Access Control Decide whether a principal is allowed to perform a protected operation. Protected operations include joining a specific DDS domain, creating a Topic, reading a Topic, writing a Topic, etc. Cryptography Perform the encryption and decryption operations. Create & Exchange Keys. Compute digests, compute and verify Message Authentication Codes. Sign and verify signatures of messages. Invoked by DDS middleware to encrypt data, compute and verify MAC, compute & verify Digital Signatures Logging Log all security relevant events Invoked by middleware to log Data Tagging Add a data tag for each data
  • 101. Standard Capabilities Authenticatio n  X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)  Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange Access Control  Specified via permissions file signed by shared CA  Control over ability to join systems, read or write data topics Cryptography  Protected key distribution  AES128 and AES256 for encryption  HMAC-SHA1 and HMAC-SHA256 for message authentication and integrity Data Tagging  Tags specify security metadata, such as classification level  Can be used to determine access privileges (via plugin) Logging  Log security events to a file or distribute securely over Connext DDS 2014-Oct-14 © 2014 RTI 101
  • 102. Security Flow Domain Participant Create Fails Authenticate Authenticate DP? Yes DP? No Ignore Remote DP Authenticate Remote DP? No Yes No Yes Access OK? Ignore remote endpoint Message security Endpoint Create Fails Yes Access OK? No Create Domain Participant Create Endpoints Discover remote DP Discover remote Endpoints Send/Receiv e data 2014-Oct-14 © 2014 RTI 102
  • 103. Protections Protected Objects Domain (by domain_id) Topic (by Topic name) DataObjects (by Instance/Key) Protected Operations Domain.join Topic.create Topic.read (includes QoS) Topic.write (includes QoS) Data.createInstance Data.writeInstance Data.deleteInstance 2014-Oct-14 © 2014 RTI 103
  • 104. Control over Encryption • Scope – Discovery data – Metadata – Data • For each: – Encrypt – Sign • Optimizes performance by only encrypting data that must be private 2014-Oct-14 © 2014 RTI 104
  • 105. Example Domain Governance 2014-Oct-14 © 2014 RTI 105
  • 107. DDS Security Status • Specification adopted March 2014 – Considered “Beta” for 1 year – RTI chairing Finalization Task Force • Specification provides a framework for securing DDS systems – Built-in plugins provide a common approach for applications without specialized requirements – Custom plugins can be developed to match more specialized deployments and integrate with existing infrastructure and hardware • Early Access Release available now from RTI 2014-Oct-14 © 2014 RTI 107
  • 108. Specification Reviewers Include: • GE • Intel • Siemens • Technicolor • NSWC • General Dynamics • THALES • SAAB • Cassidian • QinetiQ & UK MOD • Lockheed • Raytheon • None found any show stoppers • Several contacted OMG to urge adoption 2014-Oct-14 © 2014 RTI 108
  • 109. DDS Security Demo 2014-Oct-14 © 2014 RTI 109
  • 110. Security Example: Power Grid In Partnership with PNNL © 2014 RTI
  • 111. Data Security Requirements Data Item Authentica-tion Access Control Integrity Non-repudiation Confidentialit y Control traffic X X X X X Data X X Telemetry traffic Physical Security Data X X X Engineering maintenance X Source: www.sxc.hu 2014-Oct-14 © 2014 RTI 111
  • 112. Test Environment • Real World Environment – Transmission switching substation – Real substation equipment • PNNL powerNET Testbed – Remote connectivity – Local control room demonstration environment – Dynamically reconfigurable 2014-Oct-14 © 2014 RTI 112
  • 113. SCADA Equipment Setup 2014-Oct-14 © 2014 RTI 113
  • 114. RTI and PNNL Grid Security Retrofit Control Station DNP3 Master Device Transmission Substation DNP3 Slave Device RTI Routing Service Gateway RTI Routing Service ComProcessor DNP3 Slave Device DNP3 over Ethernet DNP3 over DDS DNP3 over RS232/485 RTI Routing Service Gateway DDS LAN DDS LAN RTI Routing Service ComProcessor IP Router IP Router DDS over WAN Attack Detector Scada Converter Anomaly Detector Secure DDS over UDP Display Effective DNP3 connection Details at http://blogs.rti.com 2014-Oct-14 © 2014 RTI 114
  • 115. Support for Safety Critical Systems
  • 116. DDS Inherently Well-Suited to Safety Critical Systems • Non-stop availability – No single point of failure – …including run-time services – Support for redundant networks – Automatic failover between redundant publishers – Dynamic upgrades • Visibility into missed deadlines and presence • Proven in hundreds of mission critical systems • Used in US DoD TRL 9 systems 2014-Oct-14 © 2014 RTI 116
  • 117. High-Assurance Safety: DO-178C • Guideline • Used by FAA as basis for certification – Aircraft are “certified” – Software code developed under DO-178 provides “certification evidence” • Increasingly adopted for military aircraft • Likely required for UAS integration into NAS 2014-Oct-14 © 2014 RTI 117
  • 118. DO-178 Safety Levels Level Failure Condition Typical % of avionics code A Catastrophic (may be total loss of aircraft) 15% B Hazardous/Severe (serious injuries) 35% C Major (minor injuries) 30% D Minor (inconvenience) 15% E No effect 5% 2014-Oct-14 © 2014 RTI 118
  • 119. Certification Costs • Generation of DO-178C evidence typically costs $50-$100 per ELOC • Process objectives must be met • All must be documented • Code must be clean – Testable – No dead code – Deterministic Level Process Objectives Code Coverage A 71 Level B and 100% of MCDC B 69 Level C plus 100% of DC C 62 Level D plus 100% of SC D 26 100% of Requirements E 0 None 2014-Oct-14 © 2014 RTI 119
  • 120. DO-178C Software Life Cycle Data    © System Requirements High-Level Requirements Low-Level Requirements Source Code Executable Object Code Software Architecture © 2014 RTI 120
  • 121. Test Strategy    Requirements-Based Test Selection ©  Requirements-Based Test Coverage Analysis  Structural Coverage Analysis © 2014 RTI 121
  • 122. Tenets Of Safety-Critical Software • Reduce code size • Consider testability in design • Design code to be deterministic 2014-Oct-14 © 2014 RTI 122
  • 123. Connext DDS Cert • Small footprint, certifiable DDS – ~25K ELOC – No dynamic memory allocation – Static endpoint discovery only • Follows OMG DDS specification – C and C++ APIs – Subset of minimum profile • Application portability and interoperability with full DDS – Including Routing Service • Compatible with RTI’s FACE interface • DO-178C Level A certification available 1H 2015 2014-Oct-14 © 2014 RTI 123
  • 124. DO-178C Level A Certification Evidence • Plan for Software Aspects of Certification (PSAC) • Software Development Plan (SDP) – Requirements standards – Design standards – Code standards • Software Verification Plan (SVP) • Software Configuration Management Plan (SCM) • Software Quality Assurance Plan • Software Requirements Data • Design Description • Traceability • SQA Records • SCM Records • Software Configuration Index • Software Verification Cases and Procedures • Software Verification Results • Software Accomplishment Summary Certification evidence can be re-used across programs 2014-Oct-14 © 2014 RTI 124
  • 125. Savings from DDS Certification Evidence 30,000 ELOC 20,000 ELOC 10,000 ELOC Level A $3,000,000 $2,000,000 $1,000,000 Level B $2,550,000 $1,700,000 $850,000 Level C $1,800,000 $1,200,000 $600,000 • DDS certification evidence available at fraction of cost • Availability at start of project also reduces risk 2014-Oct-14 © 2014 RTI 125
  • 126. Summary • Certifiable DDS designed for safety-critical applications now available – Connext DDS Cert – Standards compliant – Small footprint • Code is certifiable to DO-178 Level A – Minimal lines of code – Deterministic • Certification evidence is reusable 2014-Oct-14 © 2014 RTI 126
  • 128. DDS Differentiation DDS Standard Interoperability Portability Real-time QoS 2014-Oct-14 © 2014 RTI 128
  • 129. Connext DDS Product Family Secure Professional Micro Cert DDS-RTPS Wire Interoperability Protocol Full DDS Libraries Routing Service Database Integration DDS Subset DDS Subset DO-178C Certifiable Admin Console Monitoring Microsoft Excel Recording Replay Wireshark Persistence Logging Prototyper General Purpose & Real-Time Apps Remote Apps Existing Apps and Devices Adapter Small Footprint Apps High Assurance Apps JMS API Security Plugins 2014-Oct-14 © 2014 RTI 129
  • 130. Application Code Data Types Dynamically defined (API) Custom Pre-defined C, C++, C#, Java, Ada, Lua, LabVIEW, Simulink, Python Data-Centric Publish/Subscribe Automatic Discovery History Cache Monitoring Local & remote APIs Quality of Svc API & file-based Operating System and Network Stack Windows, Linux, Unix, embedded, mobile, RTOS Interface Compiler Interface Definitions • IDL • XML Shared Memory UDPv4 & v6 ucast & mcast TLS & DTLS (SSL) WAN TCP Custom Pluggable Transport Interface Generated DDS APIs – event-driven, polled & SQL query Reliability • DDS-RTPS Wire Protocol <XML> Plugins Fully dynamic Static endpoint Server Based Low Bandwidth <XML> UML MATLAB Request/reply, Guaranteed Messaging, JMS Security Plugins Authentication Encryption Access Control Tagging Logging Custom 2014-Oct-14 © 2014 RTI 130
  • 132. Next Steps – Learn More • Contact RTI – Demo, Q&A • Download software – www.rti.com/downloads – Free trial with comprehensive tutorial – RTI Shapes Demo • Watch videos & webinars, read whitepapers – www.rti.com/resources – www.youtube.com/realtimeinnovatio ns 2014-Oct-14 © 2014 RTI 132
  • 133. dds.omg.org www.rti.com community.rti.com demo.rti.com www.youtube.com/realtimeinnovations blogs.rti.com www.twitter.com/RealTimeInnov www.facebook.com/RTIsoftware www.omg.org www.slideshare.net/GerardoPardo www.slideshare.net/RealTimeInnovations 2014-Oct-14 © 2014 RTI 133
  • 134. Summary • IIOT is next industrial revolution – Save money through efficiency – Make money through new services • DDS is ideal foundation for IIoT – Seamless sensor-to-cloud data sharing – Meets real-time, mission-critical requirements – Leading-edge security and safety – Proven foundation – Eases existing system migration/modernization • RTI Connext provides the most robust DDS solution 2014-Oct-14 © 2014 RTI 134