IoT through Matrix

Video in TIB AV-Portal: IoT through Matrix

Formal Metadata

IoT through Matrix
Subtitle is a new open standard for distributed, real-time communication
Alternative Title
Internet Of Things - Deviot0
Title of Series
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date
Production Year

Content Metadata

Subject Area
Latent heat Matrix (mathematics) Matrix (mathematics)
Slide rule Service (economics) Service (economics) Open source Sound effect Planning Public domain 3 (number) Offenes Kommunikationssystem Front and back ends Data management Telecommunication Different (Kate Ryan album) Matrix (mathematics) Point cloud Communications protocol Communications protocol Matrix (mathematics) Router (computing) Physical system
Standard deviation Service (economics) Implementation Beta function Service (economics) Open source Server (computing) Patch (Unix) Projective plane Open source Client (computing) Database Representational state transfer Event horizon Implementation Matrix (mathematics) Social class
Point (geometry) Standard deviation Slide rule Context awareness Game controller Group action Service (economics) Open source State of matter Characteristic polynomial Database Open set Replication (computing) Discrete element method Host Identity Protocol Expected value Telecommunication Different (Kate Ryan album) Synchronization Single-precision floating-point format Matrix (mathematics) Encryption Message passing Social class Source code Standard deviation Projective plane Virtualization Cryptography Open set Message passing Personal digital assistant Telecommunication Normal (geometry) Encryption Communications protocol Matrix (mathematics) Identity management Local ring Spacetime
User interface Logical constant Standard deviation Server (computing) Service (economics) Graph (mathematics) State of matter Weight Maxima and minima Public domain Mass Streaming media Usability Particle system Digital photography Doubling the cube Velocity Matrix (mathematics) Software testing Matrix (mathematics) Form (programming)
Point (geometry) Laptop Standard deviation Randomization Service (economics) Design by contract Real-time operating system Client (computing) Student's t-test Metadata Medical imaging Matrix (mathematics) Source code Software testing Message passing Physical system Domain name Graph (mathematics) Key (cryptography) Demo (music) Interface (computing) Fitness function Public domain Bit System call Degree (graph theory) Type theory Message passing Linearization Video game Object (grammar) Matrix (mathematics)
Gateway (telecommunications) Email Standard deviation Randomization Group action Building Scripting language User interface State of matter Modal logic Multiplication sign ACID Real-time operating system Solid geometry Client (computing) Uniform resource locator Sign (mathematics) Computer cluster Blog Computer configuration Matrix (mathematics) Cuboid Information Computer font Algorithm Touchscreen Block (periodic table) Sound effect Menu (computing) Bit Instance (computer science) Representational state transfer Type theory Message passing Emulator Coefficient of determination Reflektor <Informatik> Hill differential equation Pattern language Right angle Metric system Pole (complex analysis) Fundamental theorem of algebra Slide rule Server (computing) Game controller Service (economics) Identifiability Dependent and independent variables Real number Computer-generated imagery Sigma-algebra Maxima and minima Event horizon Hand fan Telecommunication Natural number Video game console Message passing Computer architecture Pay television Standard deviation Dependent and independent variables Consistency Interface (computing) Timestamp Inclusion map Uniform boundedness principle Voting Hypermedia Software Service-oriented architecture Communications protocol Matrix (mathematics)
Standard deviation Greatest element Context awareness Scripting language Service (economics) Observational study Computer-generated imagery Set (mathematics) Web browser Client (computing) Disk read-and-write head Semantics (computer science) Dimensional analysis Web 2.0 Cache (computing) Video game console Descriptive statistics Dependent and independent variables Internettelefonie Cellular automaton Moment (mathematics) Public domain System call Connected space Degree (graph theory) Type theory Message passing Internet forum Right angle Quicksort Communications protocol Matrix (mathematics) Form (programming)
Point (geometry) Standard deviation Server (computing) Scripting language Service (economics) Computer-generated imagery Demo (music) Client (computing) Power (physics) Architecture Direct numerical simulation Root Telecommunication Cuboid Identity management Server (computing) Moment (mathematics) Client (computing) Bit Cartesian coordinate system Flow separation Logic Hybrid computer Matrix (mathematics) Identity management
Standard deviation Android (robot) Clique problem Service (economics) Java applet Graph (mathematics) Demo (music) Client (computing) Mereology Number Operator (mathematics) Single-precision floating-point format Intercept theorem Message passing Identity management Installation art Service (economics) Inheritance (object-oriented programming) Server (computing) Boilerplate (text) Data storage device Metadata Client (computing) Cartesian coordinate system Data mining Visualization (computer graphics) Direct numerical simulation Matrix (mathematics)
Touchscreen Group action Building Scripting language Graph (mathematics) Multiplication sign View (database) Archaeological field survey Numbering scheme Insertion loss Client (computing) Parameter (computer programming) Mereology Semantics (computer science) Duality (mathematics) Sign (mathematics) Synchronization Single-precision floating-point format Bifurcation theory Matrix (mathematics) Encryption Software framework Data conversion Hill differential equation Physical system Identity management Electric generator Block (periodic table) Bit Special unitary group Flow separation Public-key cryptography Connected space Electronic signature Type theory Message passing Telecommunication Chain Right angle Figurate number Spacetime Directed graph Point (geometry) Implementation Server (computing) Service (economics) Addition Link (knot theory) Token ring Line (geometry) Computer-generated imagery Streaming media Event horizon Number Wave packet Mach's principle Revision control Propagator Energy level Data structure Message passing Authentication Home page Dependent and independent variables Graph (mathematics) Weight Consistency Planning Ellipse Elliptic curve Cache (computing) Network topology Matrix (mathematics) Form (programming) Local ring
yelling and hadn't privileges for whatever adjusted to the recording and modern know matrixes did anybody make it to the light told yesterday all a voice speak a k a handful of people so we wanted to do so soon matrix 1 rather than jumping straight into a and I a t and specific stuff the basically uh was provided seed from all sides well this
is not enough and an to minimize the slides the typical past couple devices talk to 1 another and nothing really talking to the clouds today I'm sure that you've got a and B the really at the obviously but I guess we can talk about fragmentation and follows from the fact that you end up with a bunch of different vendors he want to go and take your own and they and check into that particular clouds and 3rd devices that looks to the cloud and perhaps the absolute manipulating the moral so lots of that then the service and it sucks because you don't know dates it so even the open systems so if you're using my protocol like and QTT OK co Apple something like that between the devices and the backend system the chances are that the data is going to be locked into your IBM clouds of all your undergarment off effect this will however happens to be so matrix is all about this Liberation and that's
basically going over way saying that and that's stored and follows a lot with that's and vendors so you basically locked into a given vendor things on interoperating the horrible fragmentation because you devices from different vendors onto a plane and so matrixes this
liberation efforts to go and provides a open-source
persistent soon database for decentralized messaging basically all event was they remain in the river new project which is why you probably haven't heard of us we started in September we went into beta and in December 7th pretty early because right now where nonprofits um and what it is is a bunch of HTTP API for decentralized persistent messaging so rather than inventing yes another REST API way he puts in Jason to a service to put some data up to the class instead we provide a very simple client-server API if you want to talk http and that allows you to put Jason out the it still open source the with expecting that this back as an open standards and we've got a patch of ice and reference implementations of so
commenter is basically an open decentralized persistent eventually consistent cryptographically secure western based with Jason over HTTP API so if you think of what would happen if something like Cassandra had babies with X and p then you end up with something about like matrix so anybody can go and spend up their own nodes there and so the and start replicates in states for a room as we call it it was originally written for instant messaging but it applies really nicely fired see because in the end it's any kind adjacent the you can publish in the context of the room and yourself or stops replicating the states of any of the room that it's participating in with any of the service so there is no single point of control and no single point of failure over where that data is stored so we have the ability to break down the walls between the bandits Loyalist see we can also go to bridge the gaps between all the different messaging and bubbles of like another I'll see that would expect BP on virtual proprietary things like what's up to on the normality the things but the characteristics
is aggressively open so it's obviously open standards and open source open project anybody very welcome to give a simple request longer and for the complete European federations so anybody can purpose of message history is the 1st class citizen this isn't a message-passing protocol like x and Pb and very much a state synchronization practical group communication is work that which is very useful for piety pictures obviously got lots of different devices wanting to submit data into a similar space so there isn't any point communication you always going updates the in group communication the using strong crypto between the service that provides briefing of the Czech use case for a masters and we will be supporting X local end-to-end encryption roles in other that has led so enough talking slides approaches the slides let's do a the the
certain workflow agent like this
room and here is what you get with
evil photo of me I'm using my test is a state of the form was of going and looking to our web interface on a matrix of the now this is just test usability from going a channel why the some of the weights and the problem is services test matrix on matrix the all and it's showing a bunch of constant ignore this graph is this is the reality see that in a minute but here you go out all bunch of history of people chasing away the fossa consumers of a bunch of experiments of users in if we go and look at some of the light velocity of the particle mass test the matrix so all those using where others were from the on a difference of by this guy here is running his own server J I already and all of the states of the stream so all of adjacent if you double click on anything that goes up the underlying Jason colleges if it comes to rest the so it's free Jason there's just a
text message for the body of and the remind the and the type is an and or read message which is some kind of message within that really so and then you thinking hey this just
looks I'll see with a bit of a completely and all the rest of the the service is potentially more interesting so I go and invite through a there are numerous which is hopefully this is going well you know that we regularly influence what we've got some of the goal of testing is a linear system use it is one's going in the corner down here is go up soon and Andrzej and found there which is hooks up by abusive to a car but it's a special magical call that you can't see because become fit 1 and here we are actually trying to use in the real car a Volkswagen Passat somewhere in rain in France and it turns out that soon the telemetry portable using on it has some strange characteristic which means that we can't get the data out so we're gonna have a really cool remote demo maybe going get life telemetry out of a cop in France students into matrix and replied that look at the graph update but hasn't said the IDB to ports which all cars since 1996 exposed is 1 of the least and those things other than the fiscal connected and soon be filled get the data out so we're running a customer later on the laptop is still conducive to the phone the phone is running a matrix client which is the missing bunches of those and I 3 a minute now into the room and then we're consuming and the angular gyrus with interface here so that we get some miracle that we've actually got messed coming in here and to make it more visual what we've done is to given text bodies as well as the Jason metadata so with this lies in the head with the and just run the graph in real time as they come in and I think was missing every 2nd by the looks of it and if the government should double click on 1 of these you can see that it's like a it's a message for the room and and the cost of English the body for human readability but because object race and we're just going contracts and random key value pairs so we're gonna talk this message which is the image of a star mainspace services decayed cable dominant engine data live person domain in that sense the top and then we got some random telemetry that should coming off car if you call this habitat 211 degrees centigrade so you probably worry it's like no other disposals enough of him as that and I think we were measuring the we load on the bacterial or something to so the point here is that with the missing completely random
data from the engine lightweight device sign the world into the state of fabric and in this particular instance I think we're both from the sides of the we're by fusing the matrix old that box yeah could be writing his own of matrix of over on and demand and that would have been better than a given you go off in all of this and and so the rebound effect right about the vote synchronizing it in real time between the 2 so even if the matrix to also that goes down the data would still exist only as 1 we could lose all of that data from away and then synchronize it back in time from the so lecturing nobody owns the dates like was that could go it's all of states and we can synchronize the pattern matrix told everything signs so it with the blockchain style algorithm that talk about in a minute and so make sure that nobody tampers with history because he got a big problem if some random person FeDeRate's into this room and some you start soon submitting that history that never really happens but assume that basically the architecture of the we have going on here so we hope the matrix will be this very simple generic HTTP messaging fabric would anybody who wants to pub some data persistently can go check into so rather than every random HTTP API on every cheap tension sensor inventing yes another REST interface most of the respondents went supremacy of what the actual API looks like the experiments not like a boring solids but you look at the inspector so see what's going on the network now for the I should emphasize that we are not proposing matrix as a device protocol necessary it's obviously convenient if you've already got http and the the mothers will use the standard HTTP API dismissing the data but so if you wanted to 0 and q t t your and TTS Enel carpal something a lot more efficient and that's fine I mean just needs to bridge at some level and so the HTTP laughter matrix and the you could run your own transpose on the server to support doing that or you have a gateway like a cow acid with and the value that matrix is bringing is instead the federation desynchronization the crap so between the service rather than trying to be a silver bullet for the device to serve interface that said we still need to get data enough that somehow we might as well look at it is the name of the pair of because we well you is among the specter of I know that there are a bunch of long-lived of poles here each from thinking that his actions on fact taking a 2nd because it's long their request just bombing the data you probably thinking perhaps known as polling that's a bit 1998 with deliberately implemented the simplest possible baseline HTTP API imaginable so that if you are running it on a constrained devices and you don't have WebSockets you can just do a GET request and sends horrific to talk about to be on a constrained voice but if we want to keep it as simple as possible so that you can do WebSockets Allcock but that's option transport feature and have between your particular lots of the service if we look at what happens when I actually said the messages so the work of a constrained myself on screen Cervantes gonna say the person in control of and so the messages going through the largely meanwhile the owner the inspector we can find that request will happen then and so we're looking for a approach valence approach replaces the actual messenger over the top notification you can see the URL is just about is going to matrix all underscore matrix client agility won't rooms this horrible reminding which is the internal identifier of the server and then we're sending a message of type and real message so it's not quite rests with what is rest but it's not of the whole rest of pattern that we're going to private is rather being rated leap year rest so the actual prepared to flee the since the the message experience so you can see that we're this through Mendel text body you can stop now and response we go back is the idea of the the increases mean well on the next slide on Monday have told us something of a problem because notification which uh yeah and then we get a local echo we get remote coming back from the server services are events request which is going and pollen of and we get a bunch of chunks of data and they have an age they got the consonants of the Jason which we put out the regarding are the reasonable time stamps from the origin server where and metrics sh uh and so on we got the revised the ugly thing again we got a message I and these are ideas basically precisely this and that we would see if we're and the booklets of the
message of make sense any questions we then remove this the yes this was an in the terms or in a pub sub so you could think that as a topic but critically it's persistent by its very nature so online QTT where you got your broker campuses things and has a history and said the histories takes it as the fundamental building block for all of us the so the level of disposable
asset and another thing that you can use this for is assumed the I'm just sort arbitrary signaling of any flavor so work we get and go back to all won't back and matrix so matrix so long uh and this chapter is in building agent moments In so 1st of of the new composition of him and his work so so here we can see in the question semantics going on on the bottom of the user particularly we will be a device to go and join a new topic in here and various so common drawings and then the angular um you right here if I had 1 of the in camera or microphone buttons like far with all Sea and this world the right which we are because we embarrassing i'm talking give you 6 on our own the NBA service when you go over to have much but what is the study so you can see that this is the level of physical well being held there in the not strictly relevant fired see but you can imagine for a security cameras so context having a very very simple VoIP phone set up API voraciously degree is that a kind of useful if anyone here Hexham about CC you because the straight dimension mentioned by having to embed a set client in a browser or making up the yes another HTTP API is of course what the xk CD cultured cells answers the 1 true pitch did not 1 so the or you're talking jingle or something like that where is it fair to look at the what I did it again I just put adjacent love interest this 1 is of type n equal invites rather than Enron message and there's this horrible thing here which is the session description protocol that has taken straight out of about OTC so all it's doing is talking to the RTC peer connection API in the web of is the grabbing but injuries that 1 had to set up the call for the guy to respond you just puts the response from his but out to see so that's 1 head and your that's it yeah so I said no go this really really simple standard messaging
farm so that gives you a very guarded the deficiency also have here
that architecturally speaking we have
use this power point come the no
and potentially it's a typical federations so that's what I'm saying often might as well be e-mail or exon BPA also or anything like that the Saudi interesting things of at moment we have I don't see through the kind of human identity problem of handled as a separate cluster of service that's probably gonna get decentralized to the moment it's the logical single points in like a DNS root servers and we also have application services any day now so it's interesting the specs for this but it's basically defining a box which can manipulate the data in the fabric so we've superpowers it's like the hybrid between and I'll see box RC services no lets you start doing arbitary business logic on the data in the fabric In talk about that a bit the clients of the world by the
Ford Focus pain they can be is the chorus then as you like so the angular client I was just showing you here was crazy thick installs all of that history lately in HTML 5 local storage has offline operation blah-blah-blah where is this part there on Java on Android that was emitting a telemetry yeah it's a single person and that's where I think yes decays using as a couple of thousand mines possibly number of Java boilerplate to go and talk to the parents of learn identity service about those applications since the so I'm going to show you a number
of the visualization to try to
articulate more clearly what's going on with the uh data and session
homepage matrix also you can follow along if user and we got this thing called works and what we have here a free and participate in service and 3 and signing off from here the humans but they might as well be devices and what happens is that Alaska's and center Jason residents the Mexicans eventually got just about the could go up the hill but let's enjoy just go and believe me that there's a problem which is posting adjacent and search allegiance and this through the no and obviously hits the home server and the soldiers and persists faster-moving into a graph where but also of the history of that room and it finds it with the key pair and Alice has on our survey work concerns with approximately the now that related over to the other guys and they also persist in their so this so this point everybody's in sync we got a consistent view of what's happening in the topic that really put a of what's called the service validate the before accepting it and they also validate the the identity of our stock commas correct but they also check whether at ACL level you're allowed to do whatever that message was so we've got a decentralized ACL system built into it so that if Alice so the way that you so that the vise doesn't have permission to post a particular type of message at that point in the room then you basically have to get people to prove that they have permission to do the things they do this chemical and 1 of the most useful but because of is you'll be a free-for-all them as model of after us semantics basically that that's kind of good enough so that message gets really that's a different and you can see that the GET request and on the beach you API for the client server side we use sink which is a very cool incremental sink API rather than event stream by shared your version of now said Bob response that all on the device cobalt response and goes and builds another message into his of the graph because see concrete feeling here that it's in the previous message and this is because is building up a data structure where each message goes and so on points to the previous 1 is cryptographically signed using a block trains dolphins so here's the link to the previous methods including a signature which goes and signs of uh which assigned in its own right you can keep on following that this chain of trust to the beginning of room to stop people from insert single history but as Charlie was figures and things like this and time we got a race but hey it's eventually consistent with both this is foreign because when both method relies on all that happens is that we get a bifurcation in the message graph the conversation history here effectively just like to central dynamo again splits the history of ugliness and when transgressive propagates as well everybody is now back and saying that yeah OK there was a race between these messages but that's OK the OK go well beyond my data that the building up of sentences that space any questions the yeah is and the supplements yup there's of known so the question was how performance is that have as I latency especially given we're doing trypsin also especially as we persist everything and the answer is that right now it sucks because it's early days we haven't done any performance work at all the reference implementation is in Python interested which is the fastest thing we're using sequel like for the backing store which is pretty fast but not exactly and friend multithreaded so was saying for a couple hundred milliseconds to go from end to end through federation is we could be so much better but it will be added the critic is in a bottle that actual where users an elliptical stuff design it's very very light weights but that's more the persistence and if you're talking http won the fact you probably setting up a new connection tree tops this taking the time that that's definitely optimizable is not superfast but it should be good enough time and I so abnormal encryption is still steps where uh and finding at them and so do the action of the sun in the face all the federated messages but basically got a bunch of EDD whatever the elliptic curve and signatures on the Jason and I should repeat the question of course none which was a are we using h max so actually trips in the message assigning its and the Federation you this assigned completely separately between the clients we're gonna happen to and 2 and but that's ability are all we will be using X local edges Mark Simone's Birds of crazy scheme for asynchronous flunky ratcheting over group communication and but that separate from the trust the main that exist between the federated service any other questions part of the plan of the the so the client also the server and use in an access token for now which is just to get parameters are not exactly super secure them and the question was how does the client to events that would serve and so how you to get access is a pluggable authentication scheme a bit like a wealth of by off is 1 of the implementations of but you could also do a two-factor off to go and so white identify a phone number and that use about which is basically an extensible framework between the client and server to manage OK so there it would have been finished among the the world that have a