Download PDF

The connectivity you need to control and monitor demanding Industrial IoT systems.

Simplify communication with high level APIs for data sharing, publish-subscribe, request-reply and queuing. Libraries support all major programming languages and operating systems. And even bare metal.

Connect new and existing assets with a fast, scalable and secure integration bus. Easily adapt to disparate protocols. Write apps to a unified API and data model decoupled from underlying devices' native interfaces.

Reduce integration and upgrade costs with modularity and loose coupling. DDS compliant pub/sub provides well-defined interfaces and plug-and-play interoperability between system components.
Decentralized for Ultra-High Performance, Scalability and Availability

Apps and devices automatically discover each other and peer-to-peer, including over reliable multicast. No message brokers or servers are required. The result:

• Latency in the microseconds, even with many subscribers
• Throughput of millions of messages per second
• Non-stop availability with no single point of failure
• Autonomous operation with no administration


Seamlessly Share Data from the Edge to the Cloud (and even in the Fog)

Run Over Any Transport: Communicate reliably over any network type and transport protocol, including:
• Shared memory within an intelligent machine
• UDP multicast on a LAN
• TCP or TLS over the Internet
• Non-IP radio or satellite links in the field

Efficiently Route Data: Intelligently bridge data across networks, transport protocols and security domains with RTI Routing Service, a smart software agent. It introspects message contents and only forwards subscribed data. It can also downsample and prioritise data when volume exceeds link capacity.

Deploy Analytics Anywhere: Run analytics and control apps where it makes most sense at the edge or in the cloud. Apps don't change - they are independent of physical proximity and the underlying transport. Easily move intelligence to the edge to process more data with lower latency and greater autonomy.


Portable and Interoperable Product Family

Connext DDS Professional: The world's leading connectivity platform compliant with the Data Distribution Service (DDS) standard. Includes a rich set of productivity-enhancing tools and adapters.

Connext DDS Secure: Extends Professional with robust, DDS compliant security capabilities. These include topic-level access control and the ability to secure any transport, including multicast, without TLS.

Connext DDS Micro: Small-footprint and portable messaging platform for resource-constrained devices and those without an operating system. Portable and interoperable with other Connext DDS products.

Connext DDS Cert: High-assurance messaging solution for systems subject to stringent safety certifications, including DO-178C Level A. RTI supplies both the software and certification artifacts.

more...
  • SUPPLIER
  • RTI
    RTI provides the connectivity platform for the Industrial Internet of Things (IIoT). RTI's solutions connect across field, fog and cloud. Its reliability, security, perfomance and scalability are proven in the most demanding industrial systems. Deployed systems include medical devices and imaging; wind, hydro and solar power; autonomous planes, trains and cars; traffic control; Oil and Gas; robotics, ships and defense. RTI is the largest vendor of products based on the Object Management Group (OMG) Data Distribution Service™ (DDS) connectivity framework.
  • SNAPSHOT
  • Platform as a Service
    Open website
    Open website
  • Application Industries
  • Automotive
    Transportation
  • Application Functions
  • Maintenance
    Product Development
  • USE CASES
  • Perimeter Security & Access Control
    Perimeter security and access control systems protect the external perimeters of a facility, control access to restricted areas, and detect and monitor anomalies. Access control includes the control of persons, vehicles, and materials through entrances and exists in a controlled area or premises. Perimeter detection, in contrast, is the detection of access to the outer limits of a detection area by means of physical barriers, sensors on physical barriers, or exterior sensors. Intrusion alarm systems identify entry or attempted entry of a person or an object into the area and respond to real security breaches and ignoring costly false alarm sources. Perimeter security is the first stage of intrusion security because it detects a breach and triggers an alert, which is a proactive system. Access control relates to permitting or denying access to a person or entity requesting access which is more interactive than intrusion detection, a reactive system.
    Process Control & Optimization
    Process control and optimization (PCO) is the discipline of adjusting a process to maintain or optimize a specified set of parameters without violating process constraints. The PCO market is being driven by rising demand for energy-efficient production processes, safety and security concerns, and the development of IoT systems that can reliably predict process deviations. Fundamentally, there are three parameters that can be adjusted to affect optimal performance. - Equipment optimization: The first step is to verify that the existing equipment is being used to its fullest advantage by examining operating data to identify equipment bottlenecks. - Operating procedures: Operating procedures may vary widely from person-to-person or from shift-to-shift. Automation of the plant can help significantly. But automation will be of no help if the operators take control and run the plant in manual. - Control optimization: In a typical processing plant, such as a chemical plant or oil refinery, there are hundreds or even thousands of control loops. Each control loop is responsible for controlling one part of the process, such as maintaining a temperature, level, or flow. If the control loop is not properly designed and tuned, the process runs below its optimum. The process will be more expensive to operate, and equipment will wear out prematurely. For each control loop to run optimally, identification of sensor, valve, and tuning problems is important. It has been well documented that over 35% of control loops typically have problems. The process of continuously monitoring and optimizing the entire plant is sometimes called performance supervision.
© 2020 IoT ONE