38
Copyright © PrismTech 2016 DDS at the Tactical Edge Next Generation Military Fog Computing and Cloudlets Andrew Foster July 26, 2016

Data Distribution Service (DDS) at the Tactical Edge - Next Generation Military Fog Computing and Cloudlets

Embed Size (px)

Citation preview

Cop

yrig

ht © P

rismTe

ch 20

16

DDS at the Tactical Edge – Next Generation Military Fog Computing and

Cloudlets

Andrew Foster July 26, 2016

Cop

yrig

ht © P

rismTe

ch 20

16

Agenda

2

► Computing Trends in Defense Systems

► The 3rd Offset

► Cloud Computing in Defense

► Tactical Cloudlets and Fog Computing

► Critical Software for the Tactical Edge

► Concluding Remarks

Cop

yrig

ht © P

rismTe

ch 20

16

Computing Trends in Defense Systems

3

Cop

yrig

ht © P

rismTe

ch 20

16

Network-Centric Warfare

4

► Net-Centric Warfare (NCW) is driving shift in military culture towards interconnected units operating cohesively

► Global Information Grid (GIG) is an all encompassing DoD communications project

► The GIG and NCW tenets: ► Robustly networked force improves

information sharing ► Information sharing enhances the quality

of information and shared situational awareness

► Shared situational awareness enables collaboration and self-synchronization and enhances sustainability and speed of command

► Speed of command, in turn, dramatically increases mission effectiveness

“The right data, at the right place at the right time”

Source: https://en.wikipedia.org/wiki/Global_Information_Grid

Cop

yrig

ht © P

rismTe

ch 20

16

Observe

Orient

Decide

Act

Tactical Decision Cycle Critical for Mission Accomplishment

“Success can only be achieved by

acting inside the enemy’s cycle” †

The acquisition, processing and

dissemination of data, throughout the

battlefield, is key to reducing the time

to arriving at good command decisions

† Colonel John Boyd,

USAF

OODA loop

Observe

Orient

Decide

Act

5

Cop

yrig

ht © P

rismTe

ch 20

16

Net-Centric System of Systems

Assets Forward

Dismounted Soldiers

Airborne

Surveillance

Strike

Assets

Naval Command

Battlefield Command

Multi-Domain Operational

Control

6

COLLECT | STORE | ANALYSE | SHARE

Cop

yrig

ht © P

rismTe

ch 20

16

Information Overload

“We’re going to find ourselves in the not too distant future swimming in sensors and drowning in data” January 2010

Lt. Gen. David A. Deptula, Air Force deputy chief of staff for Intelligence, Surveillance and Reconnaissance

7

Cop

yrig

ht © P

rismTe

ch 20

16

Offset Strategies

8

Cop

yrig

ht © P

rismTe

ch 20

16

What is an Offset Strategy?

9

► Introduction ► An offset is some means of asymmetrically compensating for a

disadvantage, particularly in a military competition

► An offset strategy consequently seeks to deliberately change an unattractive competition to one more advantageous for the implementer

► An offset strategy is a type of competitive strategy that seeks to maintain advantage over potential adversaries over long periods of time while preserving peace where possible

Cop

yrig

ht © P

rismTe

ch 20

16

1st Offset

10

► Offset 1 (Nuclear) ► Post WWII the Warsaw Pact had a significant numerical advantage in

equipment and personnel

► President Eisenhower emphasized nuclear deterrence to avoid large expenditures

► This was the start of the Cold War

Cop

yrig

ht © P

rismTe

ch 20

16

2nd Offset

11

► Offset 2 (ISR – Stealth) ► Post Vietnam Eastern Bloc forces outnumbered NATO forces 3 to 1

► The new emphasis

► Intelligence, Surveillance, and Reconnaissance (ISR)

► Precision Guided weapons

► Stealth Technology

► AWACS Early Warning systems

Cop

yrig

ht © P

rismTe

ch 20

16

3rd Offset

12

► Offset 3 (Robotic Autonomous Weapons) ► The proposed Third Offset

► Robotics weapons systems

► System Autonomy

► Miniaturization

► Big Data

► Advanced Manufacturing

► Collaborations with Private Sector companies (COTS)

Cop

yrig

ht © P

rismTe

ch 20

16

Cloud Computing in Defense

13

Cop

yrig

ht © P

rismTe

ch 20

16

Military Clouds

14

► DoD Cloud Computing key objectives: ► Increased mission effectiveness and

operational efficiencies

► Enable the Department to consolidate and share commodity IT functions resulting in a more efficient use of resources

► Cloud services can enhance Warfighter mobility through device and location independence while providing on‐demand secure global access to mission data and enterprise services

► Cloud platforms and services can provide increased opportunity for rapid application development and reuse of applications acquired by other organizations

DoD Cloud Computing Goal “Implement cloud computing as the means to deliver the most

innovative, efficient and secure information and IT service in

support of the Department’s mission, anywhere, anytime, on any

authorized device”

Source: Chief Information Officer, Cloud Computing Strategy, July 2012

Cop

yrig

ht © P

rismTe

ch 20

16

Limitations of Cloud Computing

15

► Cloud computing relies on applications, storage and computing power that resides not on local limited machines but on networks with much more capable servers

► Clouds enable “thin clients” such as handheld devices with limited computing power to tap into greater computing capabilities

► Clouds work well until you get to the tactical edge (e.g. battlefield) where mission requirements change rapidly, the need for computing power is great but communication is limited:

► Intermittent connectivity

► Insufficient network bandwidth

► High network latency

Cop

yrig

ht © P

rismTe

ch 20

16

Edge Computing & Tactical Cloudlets

16

Cop

yrig

ht © P

rismTe

ch 20

16

Tactical Cloudlets

17

► Cloudlets can be used to address the limitations of Cloud Computing at the tactical edge

► As the name suggest Cloudlets are “little clouds”

► Cloudlets deploy with the troops

► Cloudlets can be hosted on vehicles or other platforms in proximity to the mobile users

► Cloudlets comprise of servers and communication equipment engineered in small enough packages to be carried to the tactical edge:

► provide infrastructure to offload expensive computation

► provide forward data staging for a mission

► perform data filtering to remove unnecessary data from streams intended for dismounted users

► serve as collection points for data heading for enterprise repositories in the Cloud

Source: https://www.sei.cmu.edu/mobilecomputing/research/tactical-cloudlets/index.cfm

Cop

yrig

ht © P

rismTe

ch 20

16

18

Cloudlet Cloudlet Cloudlet Cloudlet

Central Core (Enterprise Cloud)

Tactical Cloudlets Goal: Provide cloud computing capabilities at the edge for computation offload, data staging, and increased survivability of mobile systems

Multi -or Single-Hop Network

► Discoverable, virtual-machine based,

forward-deployed servers located in

single-hop proximity of mobile devices

► Can operate in disconnected

mode

► Communication with the central

core is only needed for

provisioning

► Applications are statically partitioned

into a client and server

► Very thin client runs on mobile

device

► Computation-intensive server

runs on cloudlet

Single-Hop Network

Source: Carnegie Mellon University. Tactical Cloudlets, Grace A. Lewis – Dec 10, 2014

Cop

yrig

ht © P

rismTe

ch 20

16

19

Peer-to-Peer Communications

Goal: Tactical edge networks can benefit from peer-to-peer communications to support increased redundancy and network robustness, combined with a shared operational picture

Cop

yrig

ht © P

rismTe

ch 20

16

Synergies with the IoT

20

► Industrial Internet of Things (IoT) systems share many characteristics with the requirements of the GIG

► Cloud and Edge computing architectures are seen as fundamental building blocks for the Industrial IoT

► New communication technologies being developed for the Industrial IoT can be directly applicable to the needs of the GIG

► For example a Tactical Cloudlet architecture is very similar to the capabilities being defined by the OpenFog Consortium’s Fog Computing reference architecture

Cop

yrig

ht © P

rismTe

ch 20

16

Critical Software for the Tactical Edge

21

Cop

yrig

ht © P

rismTe

ch 20

16

Building the GIG

22

► Client/Server technologies popular in the 90’s such as CORBA, COM+/DCOM were not suited to implementing the GiG due to the tight coupling, high sensibility to faults, scalability and performance issues

Cop

yrig

ht © P

rismTe

ch 20

16

DDS a Key Enabler of the GIG

23

► The Data Distribution Service (DDS) was introduced to overcome the limitations of existing technologies and address the data sharing requirements of the GiG for the engagement, awareness and planning grid.

Cop

yrig

ht © P

rismTe

ch 20

16

24

▶ Introduced in 2004, DDS is an Object Management Group (OMG) Standard for efficient, and secure and interoperable, platform- programming-language independent data sharing

Data Distribution Service

▶ DDS has been recently recommended as one of the core IIoT data connectivity technologies by Industrial Internet Consortium Reference Architecture

Cop

yrig

ht © P

rismTe

ch 20

16

Real-time Data Sharing for Mission Critical Systems

DDS provides a Distributed Data Space abstraction where applications can autonomously and asynchronously read and write data (topics)

Non-functional properties of Data Sharing are controlled through a rich set of QoS Policies Its built in dynamic discovery isolates applications from network topology and connectivity details DDS Data Space is completely decentralized

25

Conceptual Model

Actual Implementation

Cop

yrig

ht © P

rismTe

ch 20

16

Designed for mission-critical Network Centric systems Real-time, low latency, massively scalable, fault tolerant and secure

Automatic discovery enables spontaneous integration and system orchestration

Can be used to support a key requirement of Tactical Cloudlets

Enables full semantic interoperability between applications

Data-centric solution “liberates” the data in an Network Centric system

Natively supports high performance peer-to-peer communication required by real-time Network Centric Edge networks

An international, open, maintained standard (API + wire protocol)

OS and hardware independent – can run on server, desktop, mobile, embedded, sensor and web environments

Vendor independent – no vendor lock-in

Why DDS for Network Centric Systems ?

26

Cop

yrig

ht © P

rismTe

ch 20

16

Where is DDS is Recommended

► DDS has been endorsed and recommended worldwide as the technology at the foundation for network centric systems and GIG-like functionalities

Cop

yrig

ht © P

rismTe

ch 20

16

PrismTech Defense and Aerospace Solutions

Vortex sets new levels of

performance, reliability,

scalability, interoperability

and fault-tolerance

► Addressing the real-time data distribution needs of defense and aerospace applications by satisfying a range of requirements at different

temporal and geographical scale for applications such as Radar Processors, Vetronic Systems, Naval Combat Management Systems, Land

Systems, and next-generation Network Centric Systems.

28

Cop

yrig

ht © P

rismTe

ch 20

16

29

▶ VORTEX is a standard-based ubiquitous real-time data sharing platform for Mission Critical and Industrial Internet of Things systems

▶ VORTEX hides low level connectivity, protocol- and

platform-specific details to provide a scalable, efficient, and secure Data Sharing abstraction across embedded, mobile, web, enterprise, cloud and edge applications

▶ VORTEX provides first-class support for Cloud and Fog

Computing Architectures ▶ VORTEX is an open and extensible platform with

connectivity to over 90 communication and data storing technologies, such as MQTT, AMQP, HTTP, RDBMS, HBASE, etc.

Introducing Vortex

Sensors/

Things/

Devices

Connectivity/

Transport

Edge Management/

Telemetry

Application

Platform

Enterprise

Systems

Ubiquitous Data Sharing peer-to-peer, device-to-cloud, cloud-to-cloud

Cop

yrig

ht © P

rismTe

ch 20

16

Proven in Defense / Aerospace

Integrated Modular Vetronics Training & Simulation Systems Naval Combat Systems

Air Traffic Control & Management Unmanned Air Vehicles Aerospace Applications

30

Cop

yrig

ht © P

rismTe

ch 20

16

Targeted Vertical Markets Industrial IoT and other Mission Critical Distributed Systems

Industrial Automation Healthcare

Smart Energy Financial Transportation Smart Cities

IT & Networks Defense & Aerospace

31

Cop

yrig

ht © P

rismTe

ch 20

16

The Vortex Platform

Device-2-Device Device-2-Cloud

Fog-2-Cloud

Device-2-Fog

Cloud-2-Cloud

Fog-2-Fog

▶ Device implementations optimized for OT and IT and mobile platforms

▶ Native support for Cloud and Fog Computing Architectures

▶ High performance, extensible and configurable protocol gateway framework enabling seamless integration with third party communication technologies

▶ Monitor and manage a system from any location and on any device

32

Cop

yrig

ht © P

rismTe

ch 20

16

Cloud, Fog and Edge Computing

► VORTEX natively supports both the Cloud and Fog Computing

Collect | Store | Analyze | Share

Cloud Computing

Fog Computing

Device-to-Cloud

Communication

Device-to-Device

Communication

Fog-to-Cloud

Communication

Cloud-to-Cloud

Communication

Device-to-Device

Communication

Fog Computing

Fog Computing

33

“IoT at the edge. By 2018,

40% of IoT-created data will

be stored, processed,

anlayzed, and acted upon

close to the edge of the

network.” – Dec 3 2014

Cop

yrig

ht © P

rismTe

ch 20

16

Battlefield Data Dissemination ▶ Vortex is the intelligent data sharing

platform for mission-critical applications ▶ End-to-end QoS providing

▶ Superior performance & scalability, reliability, determinism, interoperability, security and network efficiency

▶ Dynamic discovery

▶ Devices find each other automatically

▶ Peer-to-peer connections ▶ Decentralized data space with no single points of

failure

▶ Temporal decoupling ▶ Late joiners can subscribe to historical data if required

▶ Operating System and programming

language independent

▶ Built on Open Standards (DDS)

34

Cop

yrig

ht © P

rismTe

ch 20

16

35

IaaS

analytics

operational systems

information systems

mobile

desktop

web

embedded

fog computing

integration

Cop

yrig

ht © P

rismTe

ch 20

16

ADLINK Rugged Systems Part of a larger data-centric capability

Rack Mount Server

• Private/secure cloud

High-Density ATCA

• Workstation virtualization

• Naval radar processing

SETO

• Server for Extreme Outdoor applications

• Mobile edge computing

VPX

• Bespoke system integration

HPERC

• Rugged GPU-enabled computer

Ultra-Portable

• COM module

• Lightweight systems

► Rugged Systems

► Target Platforms

36

Cop

yrig

ht © P

rismTe

ch 20

16

Takeaways

37

► Increasing trend to leverage Cloud Computing in Network Centric military systems

► Latest defense initiatives such as US DoD 3rd Offset are investing heavily in mobile, autonomous systems, miniaturization, robotics, big data and COTS

► Cloud Computing has a number of limitations for Tactical Edge systems

► Tactical Cloudlets are a means to make cloud services and processing available to mobile users by offloading computation to servers deployed on platforms closer to the users

► Cloudlets leverage automatic discovery and VM based provisioning, combined with peer-to-peer communications

► The DDS standard was designed to support the requirements of the Gig and Network Centric systems

► DDS is a data-centric peer-to-peer protocol that can support a Tactical Edge architecture leveraging a network of Cloudlets

► Vortex is the most effective and proven DDS solution stack for next generation Network Centric military systems with native support for Cloud and Edge/Fog/Cloudlet computing

Cop

yrig

ht © P

rismTe

ch 20

16

Supporting the Defense and Aerospace Community for Over 20 Years

Thank You!

For further information please don’t hesitate contact Andrew Foster at:

[email protected]

Or visit our web site at:

www.prismtech.com

38