Upload
prismtech
View
467
Download
3
Embed Size (px)
Citation preview
Cop
yrig
ht © P
rismTe
ch 20
16
DDS at the Tactical Edge – Next Generation Military Fog Computing and
Cloudlets
Andrew Foster July 26, 2016
Cop
yrig
ht © P
rismTe
ch 20
16
Agenda
2
► Computing Trends in Defense Systems
► The 3rd Offset
► Cloud Computing in Defense
► Tactical Cloudlets and Fog Computing
► Critical Software for the Tactical Edge
► Concluding Remarks
Cop
yrig
ht © P
rismTe
ch 20
16
Network-Centric Warfare
4
► Net-Centric Warfare (NCW) is driving shift in military culture towards interconnected units operating cohesively
► Global Information Grid (GIG) is an all encompassing DoD communications project
► The GIG and NCW tenets: ► Robustly networked force improves
information sharing ► Information sharing enhances the quality
of information and shared situational awareness
► Shared situational awareness enables collaboration and self-synchronization and enhances sustainability and speed of command
► Speed of command, in turn, dramatically increases mission effectiveness
“The right data, at the right place at the right time”
Source: https://en.wikipedia.org/wiki/Global_Information_Grid
Cop
yrig
ht © P
rismTe
ch 20
16
Observe
Orient
Decide
Act
Tactical Decision Cycle Critical for Mission Accomplishment
“Success can only be achieved by
acting inside the enemy’s cycle” †
The acquisition, processing and
dissemination of data, throughout the
battlefield, is key to reducing the time
to arriving at good command decisions
† Colonel John Boyd,
USAF
OODA loop
Observe
Orient
Decide
Act
5
Cop
yrig
ht © P
rismTe
ch 20
16
Net-Centric System of Systems
Assets Forward
Dismounted Soldiers
Airborne
Surveillance
Strike
Assets
Naval Command
Battlefield Command
Multi-Domain Operational
Control
6
COLLECT | STORE | ANALYSE | SHARE
Cop
yrig
ht © P
rismTe
ch 20
16
Information Overload
“We’re going to find ourselves in the not too distant future swimming in sensors and drowning in data” January 2010
Lt. Gen. David A. Deptula, Air Force deputy chief of staff for Intelligence, Surveillance and Reconnaissance
7
Cop
yrig
ht © P
rismTe
ch 20
16
What is an Offset Strategy?
9
► Introduction ► An offset is some means of asymmetrically compensating for a
disadvantage, particularly in a military competition
► An offset strategy consequently seeks to deliberately change an unattractive competition to one more advantageous for the implementer
► An offset strategy is a type of competitive strategy that seeks to maintain advantage over potential adversaries over long periods of time while preserving peace where possible
Cop
yrig
ht © P
rismTe
ch 20
16
1st Offset
10
► Offset 1 (Nuclear) ► Post WWII the Warsaw Pact had a significant numerical advantage in
equipment and personnel
► President Eisenhower emphasized nuclear deterrence to avoid large expenditures
► This was the start of the Cold War
Cop
yrig
ht © P
rismTe
ch 20
16
2nd Offset
11
► Offset 2 (ISR – Stealth) ► Post Vietnam Eastern Bloc forces outnumbered NATO forces 3 to 1
► The new emphasis
► Intelligence, Surveillance, and Reconnaissance (ISR)
► Precision Guided weapons
► Stealth Technology
► AWACS Early Warning systems
Cop
yrig
ht © P
rismTe
ch 20
16
3rd Offset
12
► Offset 3 (Robotic Autonomous Weapons) ► The proposed Third Offset
► Robotics weapons systems
► System Autonomy
► Miniaturization
► Big Data
► Advanced Manufacturing
► Collaborations with Private Sector companies (COTS)
Cop
yrig
ht © P
rismTe
ch 20
16
Military Clouds
14
► DoD Cloud Computing key objectives: ► Increased mission effectiveness and
operational efficiencies
► Enable the Department to consolidate and share commodity IT functions resulting in a more efficient use of resources
► Cloud services can enhance Warfighter mobility through device and location independence while providing on‐demand secure global access to mission data and enterprise services
► Cloud platforms and services can provide increased opportunity for rapid application development and reuse of applications acquired by other organizations
DoD Cloud Computing Goal “Implement cloud computing as the means to deliver the most
innovative, efficient and secure information and IT service in
support of the Department’s mission, anywhere, anytime, on any
authorized device”
Source: Chief Information Officer, Cloud Computing Strategy, July 2012
Cop
yrig
ht © P
rismTe
ch 20
16
Limitations of Cloud Computing
15
► Cloud computing relies on applications, storage and computing power that resides not on local limited machines but on networks with much more capable servers
► Clouds enable “thin clients” such as handheld devices with limited computing power to tap into greater computing capabilities
► Clouds work well until you get to the tactical edge (e.g. battlefield) where mission requirements change rapidly, the need for computing power is great but communication is limited:
► Intermittent connectivity
► Insufficient network bandwidth
► High network latency
Cop
yrig
ht © P
rismTe
ch 20
16
Tactical Cloudlets
17
► Cloudlets can be used to address the limitations of Cloud Computing at the tactical edge
► As the name suggest Cloudlets are “little clouds”
► Cloudlets deploy with the troops
► Cloudlets can be hosted on vehicles or other platforms in proximity to the mobile users
► Cloudlets comprise of servers and communication equipment engineered in small enough packages to be carried to the tactical edge:
► provide infrastructure to offload expensive computation
► provide forward data staging for a mission
► perform data filtering to remove unnecessary data from streams intended for dismounted users
► serve as collection points for data heading for enterprise repositories in the Cloud
Source: https://www.sei.cmu.edu/mobilecomputing/research/tactical-cloudlets/index.cfm
Cop
yrig
ht © P
rismTe
ch 20
16
18
Cloudlet Cloudlet Cloudlet Cloudlet
Central Core (Enterprise Cloud)
Tactical Cloudlets Goal: Provide cloud computing capabilities at the edge for computation offload, data staging, and increased survivability of mobile systems
Multi -or Single-Hop Network
► Discoverable, virtual-machine based,
forward-deployed servers located in
single-hop proximity of mobile devices
► Can operate in disconnected
mode
► Communication with the central
core is only needed for
provisioning
► Applications are statically partitioned
into a client and server
► Very thin client runs on mobile
device
► Computation-intensive server
runs on cloudlet
Single-Hop Network
Source: Carnegie Mellon University. Tactical Cloudlets, Grace A. Lewis – Dec 10, 2014
Cop
yrig
ht © P
rismTe
ch 20
16
19
Peer-to-Peer Communications
Goal: Tactical edge networks can benefit from peer-to-peer communications to support increased redundancy and network robustness, combined with a shared operational picture
Cop
yrig
ht © P
rismTe
ch 20
16
Synergies with the IoT
20
► Industrial Internet of Things (IoT) systems share many characteristics with the requirements of the GIG
► Cloud and Edge computing architectures are seen as fundamental building blocks for the Industrial IoT
► New communication technologies being developed for the Industrial IoT can be directly applicable to the needs of the GIG
► For example a Tactical Cloudlet architecture is very similar to the capabilities being defined by the OpenFog Consortium’s Fog Computing reference architecture
Cop
yrig
ht © P
rismTe
ch 20
16
Building the GIG
22
► Client/Server technologies popular in the 90’s such as CORBA, COM+/DCOM were not suited to implementing the GiG due to the tight coupling, high sensibility to faults, scalability and performance issues
Cop
yrig
ht © P
rismTe
ch 20
16
DDS a Key Enabler of the GIG
23
► The Data Distribution Service (DDS) was introduced to overcome the limitations of existing technologies and address the data sharing requirements of the GiG for the engagement, awareness and planning grid.
Cop
yrig
ht © P
rismTe
ch 20
16
24
▶ Introduced in 2004, DDS is an Object Management Group (OMG) Standard for efficient, and secure and interoperable, platform- programming-language independent data sharing
Data Distribution Service
▶ DDS has been recently recommended as one of the core IIoT data connectivity technologies by Industrial Internet Consortium Reference Architecture
Cop
yrig
ht © P
rismTe
ch 20
16
Real-time Data Sharing for Mission Critical Systems
DDS provides a Distributed Data Space abstraction where applications can autonomously and asynchronously read and write data (topics)
Non-functional properties of Data Sharing are controlled through a rich set of QoS Policies Its built in dynamic discovery isolates applications from network topology and connectivity details DDS Data Space is completely decentralized
25
Conceptual Model
Actual Implementation
Cop
yrig
ht © P
rismTe
ch 20
16
Designed for mission-critical Network Centric systems Real-time, low latency, massively scalable, fault tolerant and secure
Automatic discovery enables spontaneous integration and system orchestration
Can be used to support a key requirement of Tactical Cloudlets
Enables full semantic interoperability between applications
Data-centric solution “liberates” the data in an Network Centric system
Natively supports high performance peer-to-peer communication required by real-time Network Centric Edge networks
An international, open, maintained standard (API + wire protocol)
OS and hardware independent – can run on server, desktop, mobile, embedded, sensor and web environments
Vendor independent – no vendor lock-in
Why DDS for Network Centric Systems ?
26
Cop
yrig
ht © P
rismTe
ch 20
16
Where is DDS is Recommended
► DDS has been endorsed and recommended worldwide as the technology at the foundation for network centric systems and GIG-like functionalities
Cop
yrig
ht © P
rismTe
ch 20
16
PrismTech Defense and Aerospace Solutions
Vortex sets new levels of
performance, reliability,
scalability, interoperability
and fault-tolerance
► Addressing the real-time data distribution needs of defense and aerospace applications by satisfying a range of requirements at different
temporal and geographical scale for applications such as Radar Processors, Vetronic Systems, Naval Combat Management Systems, Land
Systems, and next-generation Network Centric Systems.
28
Cop
yrig
ht © P
rismTe
ch 20
16
29
▶ VORTEX is a standard-based ubiquitous real-time data sharing platform for Mission Critical and Industrial Internet of Things systems
▶ VORTEX hides low level connectivity, protocol- and
platform-specific details to provide a scalable, efficient, and secure Data Sharing abstraction across embedded, mobile, web, enterprise, cloud and edge applications
▶ VORTEX provides first-class support for Cloud and Fog
Computing Architectures ▶ VORTEX is an open and extensible platform with
connectivity to over 90 communication and data storing technologies, such as MQTT, AMQP, HTTP, RDBMS, HBASE, etc.
Introducing Vortex
Sensors/
Things/
Devices
Connectivity/
Transport
Edge Management/
Telemetry
Application
Platform
Enterprise
Systems
Ubiquitous Data Sharing peer-to-peer, device-to-cloud, cloud-to-cloud
Cop
yrig
ht © P
rismTe
ch 20
16
Proven in Defense / Aerospace
Integrated Modular Vetronics Training & Simulation Systems Naval Combat Systems
Air Traffic Control & Management Unmanned Air Vehicles Aerospace Applications
30
Cop
yrig
ht © P
rismTe
ch 20
16
Targeted Vertical Markets Industrial IoT and other Mission Critical Distributed Systems
Industrial Automation Healthcare
Smart Energy Financial Transportation Smart Cities
IT & Networks Defense & Aerospace
31
Cop
yrig
ht © P
rismTe
ch 20
16
The Vortex Platform
Device-2-Device Device-2-Cloud
Fog-2-Cloud
Device-2-Fog
Cloud-2-Cloud
Fog-2-Fog
▶ Device implementations optimized for OT and IT and mobile platforms
▶ Native support for Cloud and Fog Computing Architectures
▶ High performance, extensible and configurable protocol gateway framework enabling seamless integration with third party communication technologies
▶ Monitor and manage a system from any location and on any device
32
Cop
yrig
ht © P
rismTe
ch 20
16
Cloud, Fog and Edge Computing
► VORTEX natively supports both the Cloud and Fog Computing
Collect | Store | Analyze | Share
Cloud Computing
Fog Computing
Device-to-Cloud
Communication
Device-to-Device
Communication
Fog-to-Cloud
Communication
Cloud-to-Cloud
Communication
Device-to-Device
Communication
Fog Computing
Fog Computing
33
“IoT at the edge. By 2018,
40% of IoT-created data will
be stored, processed,
anlayzed, and acted upon
close to the edge of the
network.” – Dec 3 2014
Cop
yrig
ht © P
rismTe
ch 20
16
Battlefield Data Dissemination ▶ Vortex is the intelligent data sharing
platform for mission-critical applications ▶ End-to-end QoS providing
▶ Superior performance & scalability, reliability, determinism, interoperability, security and network efficiency
▶ Dynamic discovery
▶ Devices find each other automatically
▶ Peer-to-peer connections ▶ Decentralized data space with no single points of
failure
▶ Temporal decoupling ▶ Late joiners can subscribe to historical data if required
▶ Operating System and programming
language independent
▶ Built on Open Standards (DDS)
34
Cop
yrig
ht © P
rismTe
ch 20
16
35
IaaS
analytics
operational systems
information systems
mobile
desktop
web
embedded
fog computing
integration
Cop
yrig
ht © P
rismTe
ch 20
16
ADLINK Rugged Systems Part of a larger data-centric capability
Rack Mount Server
• Private/secure cloud
High-Density ATCA
• Workstation virtualization
• Naval radar processing
SETO
• Server for Extreme Outdoor applications
• Mobile edge computing
VPX
• Bespoke system integration
HPERC
• Rugged GPU-enabled computer
Ultra-Portable
• COM module
• Lightweight systems
► Rugged Systems
► Target Platforms
36
Cop
yrig
ht © P
rismTe
ch 20
16
Takeaways
37
► Increasing trend to leverage Cloud Computing in Network Centric military systems
► Latest defense initiatives such as US DoD 3rd Offset are investing heavily in mobile, autonomous systems, miniaturization, robotics, big data and COTS
► Cloud Computing has a number of limitations for Tactical Edge systems
► Tactical Cloudlets are a means to make cloud services and processing available to mobile users by offloading computation to servers deployed on platforms closer to the users
► Cloudlets leverage automatic discovery and VM based provisioning, combined with peer-to-peer communications
► The DDS standard was designed to support the requirements of the Gig and Network Centric systems
► DDS is a data-centric peer-to-peer protocol that can support a Tactical Edge architecture leveraging a network of Cloudlets
► Vortex is the most effective and proven DDS solution stack for next generation Network Centric military systems with native support for Cloud and Edge/Fog/Cloudlet computing
Cop
yrig
ht © P
rismTe
ch 20
16
Supporting the Defense and Aerospace Community for Over 20 Years
Thank You!
For further information please don’t hesitate contact Andrew Foster at:
Or visit our web site at:
www.prismtech.com
38