Orchestrating computer systems, a new protocol

Video in TIB AV-Portal: Orchestrating computer systems, a new protocol

Formal Metadata

Title
Orchestrating computer systems, a new protocol
Subtitle
Introducing ZOCP an orchestration protocol for live performances, rapid prototyping and the IoT
Alternative Title
Internet Of Things - Deviot02
Title of Series
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
2016
Language
English
Production Year
2015

Content Metadata

Subject Area
Insertion loss Figurate number Communications protocol
Installation art Context awareness Videoconferencing Source code Set (mathematics) Bit Communications protocol Cartesian coordinate system Communications protocol
Word Digitizing Plastikkarte Communications protocol Cartesian coordinate system
Building Presentation of a group Rapid Prototyping Projective plane Videoconferencing Bit Communications protocol Communications protocol Window
Radical (chemistry) Rapid Prototyping Software Text editor Cartesian coordinate system Window
Software Keyboard shortcut Virtual machine Source code Parametrische Erregung Communications protocol Cartesian coordinate system Identity management Physical system
Mathematics Rapid Prototyping Software Function (mathematics) Communications protocol
Rapid Prototyping Software Multiplication sign Virtual machine Text editor Right angle Communications protocol Communications protocol Connected space
Metre Webcam Point (geometry) Standard deviation Wage labour Code Java applet Multiplication sign Execution unit 1 (number) Function (mathematics) Mereology Replication (computing) IP address Number Single-precision floating-point format Software framework Communications protocol Physical system Installation art Area Standard deviation Bit Cartesian coordinate system Open set Type theory Radical (chemistry) Process (computing) Logic output Configuration space Whiteboard Musical ensemble Communications protocol Writing Library (computing)
Rapid Prototyping Touchscreen String (computer science) Communications protocol Writing Library (computing)
Metre Dataflow Group action Server (computing) Service (economics) Multiplication sign Source code Set (mathematics) Limit (category theory) Streaming media Plastikkarte Food energy Field (computer science) Theory Revision control Prototype Different (Kate Ryan album) Term (mathematics) String (computer science) Set (mathematics) Operating system Software framework Theorem Endliche Modelltheorie Communications protocol Information security Physical system Form (programming) Social class Demo (music) Weight Interface (computing) 3 (number) Connected space Type theory Message passing Software Telecommunication Website Right angle Communications protocol Identity management
Software Computer network Endliche Modelltheorie Communications protocol Group action Wide area network
Medical imaging Data model Mechanism design String (computer science) Source code Summierbarkeit Integer Quicksort Communications protocol Complete metric space Descriptive statistics Electronic signature
Counting Streaming media Open set Communications protocol Neuroinformatik
Point (geometry) Virtual machine Communications protocol
Googol Streaming media
the figure that had the loss are our knowledge probably introduced and explained that was CPE political for orchestrating things yeah and the is I is and this is thank you
you right so that yeah for they my name is Ana Luisa I'm from the set 25 foundation and I'm also doing research for a University of light and I will talk about those be and set of B is a protocol for application exchange with as little effort as possible and but before I will demonstrate what it does and how it works I just wanna provide a little bit of context and what we generally do the by showing some videos her
so this is an example of installations rebuild this is a the
usual with Johnson in which we
to light and it's all digital insulation smart artistic insulation and only a practical applications this
is just an example of a word with you and
some other the small video in which we the in which we use a z of the Protocol and this this is a very old so military building in which we 1 what all the windows we project and he's to a historic pictures and they all float around in the building and this is all done rest very biased which we control lenders now if every anybody knows 3 of folks so yet I will try to speak a bit louder you this so but this is generally that they're the kind of the work we do the so I
am I will just demonstrates so what the protocol dust so instead of during the whole presentation style sheets so in the end you can see
a note editor like I now have some notes on the network so I can just check this around and this window I have the monitor the application this is a terminal applications making money in today's session so you don't need any displaced can see that our notes the on-line and so then I can add x amount so just demonstrates from
so the a midterm and there's no just
arrived in and know this an application can be devised it's always run inside an application so you can have multiple nodes on a single machine like I have no I have some colleagues unifrom they are connected to this network as well and I can I can um connects certain parametres Due to others like this and 2 recessive system there can be exchanged automatically I can remove it again and also show you
so I could have the keyboard note so I can just dive in this 1
shows here and I can connect to the outputs to this note and then well I have to sh which the optional further that the last
letter is age and you can see it here
as well right this yeah so this is how you can the build your all network of devices you can exchange although the capabilities this these are the things we call capabilities and then exchanging and the data to signals so a signal is when there's 1 changes signals this 1 and you receive the signal From the sword exchange data um so I'll show you another he example I can also
and she's have nodes connect
automatically those can do that and else I can do it through this node editor but you can do it encode as well so it's not like you have to do is slow to this editor all the time you can do whatever no I think this one's dusty it just displays what is in the network and it can modify it any node can modify any node so now you can see that the subscribing there's connected total count of so the 2 counters are connected and I again the doing my monitor again flip a switch like this 1 you can see here what and I can enter it and you will see it's running it no and I have the same thing going on this machine so everything is interconnected exchange and values what so if I notice that the same switch here you can see it's changing and stuff the a cocoon Joe I hope this is did about what this protocol can do then I can start telling about how it works right
and you interrupt me if you have any questions
so like I said in the beginning this is uh the inflaton we showed this is kind of the landscape we have then when we're working with these kind of installations we have all these types of tools like your data with anybody know your data right like unit dealers provide area don't go to processing Java uh framework . blend of course and we have all these devices are dinos is Gaubatz bats webcams we mount next and every time we have to connect them in a different way we have to write custom code to we have to import the library whatever and we were thinking we have to do this all the time it's very labor intensive we we want something more easily because we don't wanna right go we want to build my my installations with applications no London worry about same works all the time the so that was 1 of the reasons we started thinking about the protocol which help another situation where we're seeing a lot of times that many inputs we have many outputs what we had a single point of processing and of course it would be going worse ones it increases the however there also 1 of the motivations the onset those the so it where we were more fissioning the system like this and this is also a bit out there's that those should be works because like I can control from a node other input output nodes whatever and the challenging part is is this 1 you have to do some logic on the nodes so we have to have a look more smarter input and output systems and this is what we're trying to build into that those the the so the wouldn't acquirements for that those 2 the so we want to be very simple also mental year because if you doing asynchronous stuff it tends to get confusing varies so we want to be as simple as possible we 0 configuration we don't want to work with manual but meters this that knowing the IP address of the board number of every devise a replication and we want around LP and of course we want open standards and the we deal with music so it has to be that's some low latency year as lowest latency n but on the other hand we also want reliability the and the last 1 and this is where the terminal application comes around it and intrusive debugging and monitoring we want to see what is going on a very simple them yeah the so how does it work well and still have the thing over here so I
can just open going to do this by hand now so I have to this is all Biden think you notice and different and here 0 sorry let's do it like this but learn there was good this better because you know the it's a bit small but it's only a dollar 6 from that screen them the the so I have to import centers be library then I have to say the node where's that those who think and then I have to give it a name I don't have to with it's nice La and now I have a note and I can register any data to so let's no registered the string born string and he said it to work the and they have to specify what can you do with this thing you want to read it to where you want to write to it he wanted to emit signals do you want to me to receive signals so I'm going for the read write and when they meet see on I actually want to achieve the so sorry strength then I have to start it and regional a and the it should be in you know
right yeah the so this 1 can receive things and its energy set to walk so again but would like this there are connected Burma dish with his the blustering is now OK the well did you right chart as it were it we have 3
layers the 1st 1 was the capability exchange well you've seen the nodes they have shown set of meters we call it the capability exchanged and through this like get set them what commands they are updated changed all the we may to make the data is exchanged there where the signals well you've seen signals as well then they're very simple Heidi's with the data from which more simple and on top of that we also have streams because and while we're supposed to be it's running on 0 and q and it's the speed so all dealing with low latency is not most of not best you rather have few defeated so we're thinking like what the set of being there are many protocols and can do things way better than we could think of so why not just use them so that's where we have that strange interface you can just Dell as opposed you if it has a string like an RTP stream video stream and then you can make use of it it will provide methods for connecting streams and will have a little demonstration of that as well but 1st like I said is built on top of Theorem q and on top of that we have desire framework with the set z r e protocol and on top of that we have to NZ diary or I source there and then interconnected no so just explain how it works quickly the MIT into nodes they broadcast and that's how they discover each other so they can do a handshake imagine a 3rd of coming it broadcast they can do and shake another interconnected and the nice thing about sigh went on to deal with this anymore we have now a network of interconnected nodes and we can whisper from 1 to the other I or we can shout like that's group messaging messaging and this what we use in that those be as well so when never before and continue any questions so far the theory of the on and so on you yes yeah good question well we are developing the of focusing on development of as revised and yes and we are doing is invited currently because by then is just a great prototyping we yet still designing the political and well we got but do that in C. what's xi the century political fantasy version already all available so and we will definitely go overseas because we need performance so yeah you will go there the sale of the 2 of 1 with the the what you find this not well use and yet I get this question more often but we don't have a security model we don't want deal with that because security makes everything flow and we don't you know we build an insulation you don't need to cure the old the time this is not the protocol if you want to secure communication this is protocol to take you build the of the prototype of an we will there will probably be at a time that will encryption what is the securing of I know it's it's a it's a different thing the fault to the of the thinking for designing the the the latter we know that this yes and it is some of the and yeah the and this and I cannot tell because I don't have any experience with the ROS operating system so it could be that's ah I just heard you say that a servant server-based with but this is not so base is big difference like it simply be of the protocols this is this is a stand-alone very light weight system just open you know you don't need any service nodes will find each other by themselves you don't need any server that deals with something because that's always trouble we would with like we said we want things to be simple I cannot nodes find themselves they don't even know so and the question so that you were still using the vise president of the while we rewrote the buyer is the by version of the site yeah so we boarded the 2 by 2 this is what we see here the and so on so with all of it you might we also of the should be of the form the and they think you think about this for well they are they all have a unique UUID so that's how they did they they identify themselves so as long as the UUID remains the same it's OK you the house and on time yeah they considered yourself like add it in the examples you just get a random UUID so if you look at them we will cost you the year the what happens in that if you have not but we In general we don't use the UUID to uh we reconnect notes we use the the capabilities there that's more identifying than than the UUID show because we can have many nodes do the same thing the so we just say like this is a class of nodes and if Europe from this class you can do this the as the same like the monitor this will soft this uh term obligations our monitor they just reduces all the nodes just looks for nodes and then like what do you do well I wanna know about it and that's how it is it builds his own field I had is 1 more demo where we can streams and stuff no it's types of course right it's
more of a is the questions we're going to the them anyone In the talk of the the yeah like like they 3 years the last 10 you yeah what if nodes are not in the same that like that on some other network well 1st of all we use multicast for that told you network has the support no because then and it's actually what I wrote ahead it's
1 of their research topics we still into discovering along that networks this is a is ai and there's also a gossip model that they can gossip but so we're looking into more methods 4 questions so of the
you know that about the only thing that we know all about you know some of you know well I'm not sure why because you just 7 noting you describe it and from you can generate uh description if you want the words and get but you're trying to completion 1 measures the yeah some of of some for all so the use sum of all the sort of thing we plot of the light on the here well I'm not sure if you if you mean this but you can and to the data model you describe it can be anything like and allow strings or integers in world but you just have to provide a signature of how the data looks because there's always like I have some images of janitors or floats Jeff to provide a signature to it and then you can do anything think yeah there is a cold mechanism that you can call method but actually we haven't used it yet so the what's the use but it is the yeah we're now streaming a
desktop end of anybody so this is a real-time streams and the i is is there anybody here with the 1 of can you just modify
so there's 1 guy here is seemingly destined to my computer now and there's this other but can model what is going on and this is a no well it's an open GL count for so it
can just and modified 4 points of the blame and you have to use that a s WTO you and we know that the so
adjusted for example this is happening to that of future work on your so on my machine but this stiff I of so you think this more
yeah but like a the but this is the streaming note but streams we still in designing the streams so it's not in that 3 or 4 I see just the the OK so we're yeah that the
Feedback