Bestand wählen
Merken

Orchestrating computer systems, a new protocol

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
the figure that had the loss are our knowledge probably introduced and explained that was CPE political for orchestrating things yeah and the is I is and this is thank you
you right so that yeah for they my name is Ana Luisa I'm from the set 25 foundation and I'm also doing research for a University of light and I will talk about those be and set of B is a protocol for application exchange with as little effort as possible and but before I will demonstrate what it does and how it works I just wanna provide a little bit of context and what we generally do the by showing some videos her
so this is an example of installations rebuild this is a the
usual with Johnson in which we
to light and it's all digital insulation smart artistic insulation and only a practical applications this
is just an example of a word with you and
some other the small video in which we the in which we use a z of the Protocol and this this is a very old so military building in which we 1 what all the windows we project and he's to a historic pictures and they all float around in the building and this is all done rest very biased which we control lenders now if every anybody knows 3 of folks so yet I will try to speak a bit louder you this so but this is generally that they're the kind of the work we do the so I
am I will just demonstrates so what the protocol dust so instead of during the whole presentation style sheets so in the end you can see
a note editor like I now have some notes on the network so I can just check this around and this window I have the monitor the application this is a terminal applications making money in today's session so you don't need any displaced can see that our notes the on-line and so then I can add x amount so just demonstrates from
so the a midterm and there's no just
arrived in and know this an application can be devised it's always run inside an application so you can have multiple nodes on a single machine like I have no I have some colleagues unifrom they are connected to this network as well and I can I can um connects certain parametres Due to others like this and 2 recessive system there can be exchanged automatically I can remove it again and also show you
so I could have the keyboard note so I can just dive in this 1
shows here and I can connect to the outputs to this note and then well I have to sh which the optional further that the last
letter is age and you can see it here
as well right this yeah so this is how you can the build your all network of devices you can exchange although the capabilities this these are the things we call capabilities and then exchanging and the data to signals so a signal is when there's 1 changes signals this 1 and you receive the signal From the sword exchange data um so I'll show you another he example I can also
and she's have nodes connect
automatically those can do that and else I can do it through this node editor but you can do it encode as well so it's not like you have to do is slow to this editor all the time you can do whatever no I think this one's dusty it just displays what is in the network and it can modify it any node can modify any node so now you can see that the subscribing there's connected total count of so the 2 counters are connected and I again the doing my monitor again flip a switch like this 1 you can see here what and I can enter it and you will see it's running it no and I have the same thing going on this machine so everything is interconnected exchange and values what so if I notice that the same switch here you can see it's changing and stuff the a cocoon Joe I hope this is did about what this protocol can do then I can start telling about how it works right
and you interrupt me if you have any questions
so like I said in the beginning this is uh the inflaton we showed this is kind of the landscape we have then when we're working with these kind of installations we have all these types of tools like your data with anybody know your data right like unit dealers provide area don't go to processing Java uh framework . blend of course and we have all these devices are dinos is Gaubatz bats webcams we mount next and every time we have to connect them in a different way we have to write custom code to we have to import the library whatever and we were thinking we have to do this all the time it's very labor intensive we we want something more easily because we don't wanna right go we want to build my my installations with applications no London worry about same works all the time the so that was 1 of the reasons we started thinking about the protocol which help another situation where we're seeing a lot of times that many inputs we have many outputs what we had a single point of processing and of course it would be going worse ones it increases the however there also 1 of the motivations the onset those the so it where we were more fissioning the system like this and this is also a bit out there's that those should be works because like I can control from a node other input output nodes whatever and the challenging part is is this 1 you have to do some logic on the nodes so we have to have a look more smarter input and output systems and this is what we're trying to build into that those the the so the wouldn't acquirements for that those 2 the so we want to be very simple also mental year because if you doing asynchronous stuff it tends to get confusing varies so we want to be as simple as possible we 0 configuration we don't want to work with manual but meters this that knowing the IP address of the board number of every devise a replication and we want around LP and of course we want open standards and the we deal with music so it has to be that's some low latency year as lowest latency n but on the other hand we also want reliability the and the last 1 and this is where the terminal application comes around it and intrusive debugging and monitoring we want to see what is going on a very simple them yeah the so how does it work well and still have the thing over here so I
can just open going to do this by hand now so I have to this is all Biden think you notice and different and here 0 sorry let's do it like this but learn there was good this better because you know the it's a bit small but it's only a dollar 6 from that screen them the the so I have to import centers be library then I have to say the node where's that those who think and then I have to give it a name I don't have to with it's nice La and now I have a note and I can register any data to so let's no registered the string born string and he said it to work the and they have to specify what can you do with this thing you want to read it to where you want to write to it he wanted to emit signals do you want to me to receive signals so I'm going for the read write and when they meet see on I actually want to achieve the so sorry strength then I have to start it and regional a and the it should be in you know
right yeah the so this 1 can receive things and its energy set to walk so again but would like this there are connected Burma dish with his the blustering is now OK the well did you right chart as it were it we have 3
layers the 1st 1 was the capability exchange well you've seen the nodes they have shown set of meters we call it the capability exchanged and through this like get set them what commands they are updated changed all the we may to make the data is exchanged there where the signals well you've seen signals as well then they're very simple Heidi's with the data from which more simple and on top of that we also have streams because and while we're supposed to be it's running on 0 and q and it's the speed so all dealing with low latency is not most of not best you rather have few defeated so we're thinking like what the set of being there are many protocols and can do things way better than we could think of so why not just use them so that's where we have that strange interface you can just Dell as opposed you if it has a string like an RTP stream video stream and then you can make use of it it will provide methods for connecting streams and will have a little demonstration of that as well but 1st like I said is built on top of Theorem q and on top of that we have desire framework with the set z r e protocol and on top of that we have to NZ diary or I source there and then interconnected no so just explain how it works quickly the MIT into nodes they broadcast and that's how they discover each other so they can do a handshake imagine a 3rd of coming it broadcast they can do and shake another interconnected and the nice thing about sigh went on to deal with this anymore we have now a network of interconnected nodes and we can whisper from 1 to the other I or we can shout like that's group messaging messaging and this what we use in that those be as well so when never before and continue any questions so far the theory of the on and so on you yes yeah good question well we are developing the of focusing on development of as revised and yes and we are doing is invited currently because by then is just a great prototyping we yet still designing the political and well we got but do that in C. what's xi the century political fantasy version already all available so and we will definitely go overseas because we need performance so yeah you will go there the sale of the 2 of 1 with the the what you find this not well use and yet I get this question more often but we don't have a security model we don't want deal with that because security makes everything flow and we don't you know we build an insulation you don't need to cure the old the time this is not the protocol if you want to secure communication this is protocol to take you build the of the prototype of an we will there will probably be at a time that will encryption what is the securing of I know it's it's a it's a different thing the fault to the of the thinking for designing the the the latter we know that this yes and it is some of the and yeah the and this and I cannot tell because I don't have any experience with the ROS operating system so it could be that's ah I just heard you say that a servant server-based with but this is not so base is big difference like it simply be of the protocols this is this is a stand-alone very light weight system just open you know you don't need any service nodes will find each other by themselves you don't need any server that deals with something because that's always trouble we would with like we said we want things to be simple I cannot nodes find themselves they don't even know so and the question so that you were still using the vise president of the while we rewrote the buyer is the by version of the site yeah so we boarded the 2 by 2 this is what we see here the and so on so with all of it you might we also of the should be of the form the and they think you think about this for well they are they all have a unique UUID so that's how they did they they identify themselves so as long as the UUID remains the same it's OK you the house and on time yeah they considered yourself like add it in the examples you just get a random UUID so if you look at them we will cost you the year the what happens in that if you have not but we In general we don't use the UUID to uh we reconnect notes we use the the capabilities there that's more identifying than than the UUID show because we can have many nodes do the same thing the so we just say like this is a class of nodes and if Europe from this class you can do this the as the same like the monitor this will soft this uh term obligations our monitor they just reduces all the nodes just looks for nodes and then like what do you do well I wanna know about it and that's how it is it builds his own field I had is 1 more demo where we can streams and stuff no it's types of course right it's
more of a is the questions we're going to the them anyone In the talk of the the yeah like like they 3 years the last 10 you yeah what if nodes are not in the same that like that on some other network well 1st of all we use multicast for that told you network has the support no because then and it's actually what I wrote ahead it's
1 of their research topics we still into discovering along that networks this is a is ai and there's also a gossip model that they can gossip but so we're looking into more methods 4 questions so of the
you know that about the only thing that we know all about you know some of you know well I'm not sure why because you just 7 noting you describe it and from you can generate uh description if you want the words and get but you're trying to completion 1 measures the yeah some of of some for all so the use sum of all the sort of thing we plot of the light on the here well I'm not sure if you if you mean this but you can and to the data model you describe it can be anything like and allow strings or integers in world but you just have to provide a signature of how the data looks because there's always like I have some images of janitors or floats Jeff to provide a signature to it and then you can do anything think yeah there is a cold mechanism that you can call method but actually we haven't used it yet so the what's the use but it is the yeah we're now streaming a
desktop end of anybody so this is a real-time streams and the i is is there anybody here with the 1 of can you just modify
so there's 1 guy here is seemingly destined to my computer now and there's this other but can model what is going on and this is a no well it's an open GL count for so it
can just and modified 4 points of the blame and you have to use that a s WTO you and we know that the so
adjusted for example this is happening to that of future work on your so on my machine but this stiff I of so you think this more
yeah but like a the but this is the streaming note but streams we still in designing the streams so it's not in that 3 or 4 I see just the the OK so we're yeah that the
Einfügungsdämpfung
Protokoll <Datenverarbeitungssystem>
Figurierte Zahl
Bit
Protokoll <Datenverarbeitungssystem>
Menge
Programm/Quellcode
Protokoll <Datenverarbeitungssystem>
Installation <Informatik>
Kartesische Koordinaten
Kontextbezogenes System
Videokonferenz
Digitalisierer
Protokoll <Datenverarbeitungssystem>
Wort <Informatik>
Kartesische Koordinaten
Chipkarte
Bit
Protokoll <Datenverarbeitungssystem>
Bildschirmfenster
Gebäude <Mathematik>
Protokoll <Datenverarbeitungssystem>
Projektive Ebene
Kombinatorische Gruppentheorie
Rapid Prototyping
Videokonferenz
Texteditor
Datennetz
Bildschirmfenster
Radikal <Mathematik>
Kartesische Koordinaten
Rapid Prototyping
Schnelltaste
Virtuelle Maschine
Knotenmenge
Datennetz
Programm/Quellcode
Protokoll <Datenverarbeitungssystem>
Kartesische Koordinaten
Identitätsverwaltung
Physikalisches System
Parametrische Erregung
Datennetz
Mathematisierung
Protokoll <Datenverarbeitungssystem>
Rapid Prototyping
Funktion <Mathematik>
Einfach zusammenhängender Raum
Texteditor
Virtuelle Maschine
Knotenmenge
Protokoll <Datenverarbeitungssystem>
Datennetz
Rechter Winkel
Protokoll <Datenverarbeitungssystem>
Rapid Prototyping
Offene Menge
Bit
Prozess <Physik>
Punkt
Applet
Zahlenbereich
Schreiben <Datenverarbeitung>
Kartesische Koordinaten
Mathematische Logik
Framework <Informatik>
Code
Netzadresse
Whiteboard
Eins
Arbeit <Physik>
Knotenmenge
Einheit <Mathematik>
Standardabweichung
Gruppe <Mathematik>
Datentyp
Datenreplikation
Protokoll <Datenverarbeitungssystem>
Programmbibliothek
Radikal <Mathematik>
Meter
Installation <Informatik>
Konfigurationsraum
Funktion <Mathematik>
Webcam
Protokoll <Datenverarbeitungssystem>
Einfache Genauigkeit
Physikalisches System
Ein-Ausgabe
Flächeninhalt
Mereologie
Standardabweichung
Knotenmenge
Protokoll <Datenverarbeitungssystem>
Programmbibliothek
Schreiben <Datenverarbeitung>
Rapid Prototyping
Touchscreen
Zeichenkette
Chipkarte
Telekommunikation
Demo <Programm>
Web Site
Subtraktion
Gewicht <Mathematik>
Klasse <Mathematik>
Gruppenkeim
Versionsverwaltung
Identitätsverwaltung
Term
Framework <Informatik>
Physikalische Theorie
Streaming <Kommunikationstechnik>
Bildschirmmaske
Knotenmenge
Informationsmodellierung
Theorem
Netzbetriebssystem
Datentyp
Protokoll <Datenverarbeitungssystem>
Meter
Drei
Schnittstelle
Prototyping
Einfach zusammenhängender Raum
Datennetz
Protokoll <Datenverarbeitungssystem>
Computersicherheit
Quellcode
Physikalisches System
Datenfluss
Menge
Inverser Limes
Energiedichte
Dienst <Informatik>
Datenfeld
Menge
Rechter Winkel
Server
Message-Passing
Zeichenkette
Informationsmodellierung
Knotenmenge
Datennetz
Gruppentheorie
Datennetz
Protokoll <Datenverarbeitungssystem>
Weitverkehrsnetz
Deskriptive Statistik
Kraftfahrzeugmechatroniker
Vervollständigung <Mathematik>
Gewichtete Summe
Ganze Zahl
Programm/Quellcode
Protokoll <Datenverarbeitungssystem>
Datenmodell
Elektronische Unterschrift
Bildgebendes Verfahren
Quick-Sort
Zeichenkette
Streaming <Kommunikationstechnik>
Offene Menge
Protokoll <Datenverarbeitungssystem>
Computer
Zählen
Virtuelle Maschine
Punkt
Protokoll <Datenverarbeitungssystem>
Streaming <Kommunikationstechnik>

Metadaten

Formale Metadaten

Titel Orchestrating computer systems, a new protocol
Untertitel Introducing ZOCP an orchestration protocol for live performances, rapid prototyping and the IoT
Alternativer Titel Internet Of Things - Deviot02
Serientitel FOSDEM 2015
Autor Loonstra, Arnaud
Lizenz CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34423
Herausgeber FOSDEM VZW
Erscheinungsjahr 2016
Sprache Englisch
Produktionsjahr 2015

Inhaltliche Metadaten

Fachgebiet Informatik

Ähnliche Filme

Loading...
Feedback