SlideShare a Scribd company logo
10
Most read
12
Most read
23
Most read
Advanced Technology Office
AT()
Angelo	Corsaro,	PhD
Chief	Technology	Officer	
ADLINK	Tech.	Inc.	
angelo.corsaro@adlinktech.com
Olivier	Hécart
Senior	Technologist	
ADLINK	Tech.	Inc.	
olivier.hecart@adlinktech.com
Innovating Together
Context
Internet protocol
For historical reasons, internet has
been built on a host-centric
communication model.
(machine-to-machine)
The Internet today
Most of the application on the
internet today are data / content
centric.
What matters to the user is the
data not as much who has it…
Internet protocol
The internet protocol is inherently
one-to-one. Broadcast and multicast
communications are not viable in wide
networks.
Thus the diffusion of the same data to
multiple consumers is very inefficient.
NDN / CCN
NDN is based on a data centric
networking paradigm.
Data samples are identified with
hierarchical names.
NDN is Inherently Pull and best suited
for static data.
Named Data Networking
Content Centric Networking
/com.adlink/fr/employees/olivier.hecart
DDS is a great data centric technology which embraces powerful concepts
like strong decoupling between publishers and subscribers.
But DDS has been designed for small to medium systems and suffers from
major scalability issues on larger systems.
It is push based which makes uneasy to retrieve specific data or to properly
filter data streams.
Data Distribution Service
The Internet of Tomorrow
With the raise of IoT, the
different devices connected to
the internet use very
heterogeneous networking
technologies (TCP/IP, BLE, 3G,
6LowPan, …).
Some endpoints are
extremely constrained w.r.t
computational, communication
resources as well as energy.
Internet scale data-centric protocol that
unifies data-sharing between any kind of
device including those constrained with
respect to the node resources, such as
computational resources and power, as well
as the network.
Conceptual Model
zenoh provides a data-centric
abstraction in which applications
can read and write data
autonomously and
asynchronously.
The data read and written by
zenoh applications is associated
with one or more resources
identified by a URI.
DDS Global Data Space
...
Data
Writer
Data
Writer
Data
Writer
Data
Reader
Data
Reader
Data
Reader
Data
Reader
Data
Writer
R1
R2
R i
Rn
-- These are Resources
/myhouse/floor/1/musicroom/LightStatus
/myhouse/floor/2/musicroom/LightStatus
/myhouse/floor/2/bedroom/erik/LightStatus
-- These are Selections
/myhouse/floor/2/bedroom/*/LightStatus
/myhouse/**/LightStatus
/myhouse/**
Conceptual Model
Data can be pushed to
subscribers and storages
and be queried from
storages.
zenoh
pub/sub protocol (push)
storage/query protocol (pull)
Publisher SubscriberStorage
write / stream subscribestore query
Conceptual Model
Data can be pushed-to,
pulled or queried-from
applications periodically
or asynchronously.
Routing
Adaptative,
fault tolerant,
brokering and routing.
Live demo
Reliability & Ordering
Z1
Z2
Z6
Z3
Z5
Z4A1 A2
application-to-application reliability
first-to-last-broker
Zenoh supports 3 levels of
reliability :
• Hop to hop reliability.
Ensures reliability and ordering
when NO failures.
• App-to-app reliability.
• First-to-last-broker reliability.
More scalable than app-to-app
reliability.
Load balancing &
Fault tolerance
Clusters
Partitions
Resource names to partition
ids uniform hashing
0-63
64-127
128-191
192-255
0-63
64-127
128-191
192-255
0-63
64-127
128-191
192-255
P S
Zenoh clients
• Low footprint C client
• OCaml client
• Python client
• Bash client
A piece of code
Publisher :
z = zenoh.connect('127.0.0.1:7447')
pub = z.declare_publisher('/demo/hello')
pub.write('Hello world'.encode())
Subscriber :
z = zenoh.connect('127.0.0.1:7447')
z.declare_subscriber(‘/demo/**', lambda rid, data:
print('received {}'.format(data.tobytes().decode())))
Performance
Throughput
0
3500
7000
10500
14000
8 16 32 64 128 256 512 1024 2048 4096 8192 16384
zenoh NATS Cyclone DDS
Mbps
Key Highlights
Key Highlights
Extremely Resource
Constrained Environments
Defined the most wire/power/memory efficient
protocol in the market to provide connectivity
to extremely constrained targets
Support for:
- Peer-to-peer and brokered communication
- Batched data and deltas
- Ordered reliability and fragmentation
- Queries
zenoh
zenoh
6LowPAN
802.15.4
BLE
2G/3G/
LTE
Unspecified API
App App App
…
Application
TCP UDP
IP
Key Highlights
Protocol implementation for a
8-bit micro-controllers takes
300 Bytes of RAM and has
wire-overhead of 4 bytes for
data samples
7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+
|R|S|P| SDATA |
+---------------+
~ SN ~
+---------------+
~ RID | SID ~
+---------------+
~ PRID ~
+---------------+
~ [Payload] ~
+---------------+
Angelo	Corsaro,	PhD	
Olivier	Hécart
ADLINK	Tech.	Inc.	
angelo.corsaro@adlinktech.com
Innovating Together

More Related Content

PDF
5G positioning for the connected intelligent edge
PDF
How will sidelink bring a new level of 5G versatility.pdf
PDF
Device-level AI for 5G and beyond
PPTX
01 elements of modern networking by nader elmansi
PPT
Lecture 6: IoT Data Processing
PDF
Building Topology in NS3
PPT
IoT _protocols.ppt
PPT
wireless application protocol
5G positioning for the connected intelligent edge
How will sidelink bring a new level of 5G versatility.pdf
Device-level AI for 5G and beyond
01 elements of modern networking by nader elmansi
Lecture 6: IoT Data Processing
Building Topology in NS3
IoT _protocols.ppt
wireless application protocol

What's hot (20)

PDF
zenoh: The Edge Data Fabric
PDF
Zenoh: The Genesis
PDF
Zenoh Tutorial
PDF
zenoh: zero overhead pub/sub store/query compute
PDF
PDF
Cyclone DDS: Sharing Data in the IoT Age
PPTX
Big data analytics
PPTX
Data Lakehouse, Data Mesh, and Data Fabric (r2)
PDF
Charles Caldwell - Improve Your Life with AI.pdf
PPTX
Building a modern data warehouse
PDF
Understanding generative AI models A comprehensive overview.pdf
PPTX
Data2030 Summit MEA: Data Chaos to Data Culture March 2023
PDF
Enabling a Data Mesh Architecture with Data Virtualization
PDF
Architect’s Open-Source Guide for a Data Mesh Architecture
PDF
Big Data Security in Apache Projects by Gidon Gershinsky
PPTX
Data mesh
PDF
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
PDF
Foundry technical intro
PDF
Big Data & Analytics (Conceptual and Practical Introduction)
PDF
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
zenoh: The Edge Data Fabric
Zenoh: The Genesis
Zenoh Tutorial
zenoh: zero overhead pub/sub store/query compute
Cyclone DDS: Sharing Data in the IoT Age
Big data analytics
Data Lakehouse, Data Mesh, and Data Fabric (r2)
Charles Caldwell - Improve Your Life with AI.pdf
Building a modern data warehouse
Understanding generative AI models A comprehensive overview.pdf
Data2030 Summit MEA: Data Chaos to Data Culture March 2023
Enabling a Data Mesh Architecture with Data Virtualization
Architect’s Open-Source Guide for a Data Mesh Architecture
Big Data Security in Apache Projects by Gidon Gershinsky
Data mesh
Data Mesh in Practice - How Europe's Leading Online Platform for Fashion Goes...
Foundry technical intro
Big Data & Analytics (Conceptual and Practical Introduction)
Data Science Tutorial | What is Data Science? | Data Science For Beginners | ...
Ad

Similar to zenoh -- the ZEro Network OverHead protocol (20)

PDF
zenoh -- the ZEro Network OverHead protocol
PDF
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
PDF
Construire une « data fabric » pour les environnements edge
PDF
"Taming the Dragon": Zenoh's Genesis
PDF
Smart, Secure and Efficient Data Sharing in IoT
PDF
IoT Lab @COPELABS
PDF
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
PDF
Connected Mobile and Web Applications with Vortex
PDF
Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...
PDF
Delay Tolerant Networks Protocols and Applications 1st Edition Athanasios V. ...
PDF
Software Defined Networking (SDN): A Revolution in Computer Network
PDF
Reactive Data Centric Architectures with DDS
PDF
Delay Tolerant Networks Protocols and Applications 1st Edition Athanasios V. ...
PDF
DDS in Action -- Part I
PDF
"Taming the Dragon": Get Started with Zenoh
PPTX
IT1634 – SDN Unit 1.pptx Software defined
PDF
Industrial Internet of Things: Protocols an Standards
PPT
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
PDF
Cyclone DDS Unleashed: The Origins
PPT
RTI Data-Distribution Service (DDS) Master Class 2011
zenoh -- the ZEro Network OverHead protocol
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Construire une « data fabric » pour les environnements edge
"Taming the Dragon": Zenoh's Genesis
Smart, Secure and Efficient Data Sharing in IoT
IoT Lab @COPELABS
Eclipse IoT Summit 2016: In The Age of IoT Think Data-Centric
Connected Mobile and Web Applications with Vortex
Connected Mobile and Web Applications with PrismTech Vortex Data Sharing Plat...
Delay Tolerant Networks Protocols and Applications 1st Edition Athanasios V. ...
Software Defined Networking (SDN): A Revolution in Computer Network
Reactive Data Centric Architectures with DDS
Delay Tolerant Networks Protocols and Applications 1st Edition Athanasios V. ...
DDS in Action -- Part I
"Taming the Dragon": Get Started with Zenoh
IT1634 – SDN Unit 1.pptx Software defined
Industrial Internet of Things: Protocols an Standards
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Cyclone DDS Unleashed: The Origins
RTI Data-Distribution Service (DDS) Master Class 2011
Ad

More from Angelo Corsaro (20)

PDF
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
PDF
Eastern Sicily
PDF
fog05: The Fog Computing Infrastructure
PDF
fog05: The Fog Computing Platform
PDF
Programming in Scala - Lecture Four
PDF
Programming in Scala - Lecture Three
PDF
Programming in Scala - Lecture Two
PDF
Programming in Scala - Lecture One
PDF
Data Sharing in Extremely Resource Constrained Envionrments
PDF
The DDS Security Standard
PDF
The Data Distribution Service
PDF
RUSTing -- Partially Ordered Rust Programming Ruminations
PDF
Vortex II -- The Industrial IoT Connectivity Standard
PDF
Fog Computing Defined
PDF
DDS In Action Part II
PDF
DDS and OPC UA Explained
PDF
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
PDF
Fluid IoT Architectures
PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
PDF
Microservices Architecture with Vortex — Part II
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Eastern Sicily
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Platform
Programming in Scala - Lecture Four
Programming in Scala - Lecture Three
Programming in Scala - Lecture Two
Programming in Scala - Lecture One
Data Sharing in Extremely Resource Constrained Envionrments
The DDS Security Standard
The Data Distribution Service
RUSTing -- Partially Ordered Rust Programming Ruminations
Vortex II -- The Industrial IoT Connectivity Standard
Fog Computing Defined
DDS In Action Part II
DDS and OPC UA Explained
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Fluid IoT Architectures
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Microservices Architecture with Vortex — Part II

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

zenoh -- the ZEro Network OverHead protocol

  • 3. Internet protocol For historical reasons, internet has been built on a host-centric communication model. (machine-to-machine)
  • 4. The Internet today Most of the application on the internet today are data / content centric. What matters to the user is the data not as much who has it…
  • 5. Internet protocol The internet protocol is inherently one-to-one. Broadcast and multicast communications are not viable in wide networks. Thus the diffusion of the same data to multiple consumers is very inefficient.
  • 6. NDN / CCN NDN is based on a data centric networking paradigm. Data samples are identified with hierarchical names. NDN is Inherently Pull and best suited for static data. Named Data Networking Content Centric Networking /com.adlink/fr/employees/olivier.hecart
  • 7. DDS is a great data centric technology which embraces powerful concepts like strong decoupling between publishers and subscribers. But DDS has been designed for small to medium systems and suffers from major scalability issues on larger systems. It is push based which makes uneasy to retrieve specific data or to properly filter data streams. Data Distribution Service
  • 8. The Internet of Tomorrow With the raise of IoT, the different devices connected to the internet use very heterogeneous networking technologies (TCP/IP, BLE, 3G, 6LowPan, …). Some endpoints are extremely constrained w.r.t computational, communication resources as well as energy.
  • 9. Internet scale data-centric protocol that unifies data-sharing between any kind of device including those constrained with respect to the node resources, such as computational resources and power, as well as the network.
  • 10. Conceptual Model zenoh provides a data-centric abstraction in which applications can read and write data autonomously and asynchronously. The data read and written by zenoh applications is associated with one or more resources identified by a URI. DDS Global Data Space ... Data Writer Data Writer Data Writer Data Reader Data Reader Data Reader Data Reader Data Writer R1 R2 R i Rn -- These are Resources /myhouse/floor/1/musicroom/LightStatus /myhouse/floor/2/musicroom/LightStatus /myhouse/floor/2/bedroom/erik/LightStatus -- These are Selections /myhouse/floor/2/bedroom/*/LightStatus /myhouse/**/LightStatus /myhouse/**
  • 11. Conceptual Model Data can be pushed to subscribers and storages and be queried from storages. zenoh pub/sub protocol (push) storage/query protocol (pull) Publisher SubscriberStorage write / stream subscribestore query
  • 12. Conceptual Model Data can be pushed-to, pulled or queried-from applications periodically or asynchronously.
  • 15. Reliability & Ordering Z1 Z2 Z6 Z3 Z5 Z4A1 A2 application-to-application reliability first-to-last-broker Zenoh supports 3 levels of reliability : • Hop to hop reliability. Ensures reliability and ordering when NO failures. • App-to-app reliability. • First-to-last-broker reliability. More scalable than app-to-app reliability.
  • 16. Load balancing & Fault tolerance Clusters Partitions Resource names to partition ids uniform hashing 0-63 64-127 128-191 192-255 0-63 64-127 128-191 192-255 0-63 64-127 128-191 192-255 P S
  • 17. Zenoh clients • Low footprint C client • OCaml client • Python client • Bash client
  • 18. A piece of code Publisher : z = zenoh.connect('127.0.0.1:7447') pub = z.declare_publisher('/demo/hello') pub.write('Hello world'.encode()) Subscriber : z = zenoh.connect('127.0.0.1:7447') z.declare_subscriber(‘/demo/**', lambda rid, data: print('received {}'.format(data.tobytes().decode())))
  • 20. Throughput 0 3500 7000 10500 14000 8 16 32 64 128 256 512 1024 2048 4096 8192 16384 zenoh NATS Cyclone DDS Mbps
  • 22. Key Highlights Extremely Resource Constrained Environments Defined the most wire/power/memory efficient protocol in the market to provide connectivity to extremely constrained targets Support for: - Peer-to-peer and brokered communication - Batched data and deltas - Ordered reliability and fragmentation - Queries zenoh zenoh 6LowPAN 802.15.4 BLE 2G/3G/ LTE Unspecified API App App App … Application TCP UDP IP
  • 23. Key Highlights Protocol implementation for a 8-bit micro-controllers takes 300 Bytes of RAM and has wire-overhead of 4 bytes for data samples 7 6 5 4 3 2 1 0 +-+-+-+-+-+-+-+-+ |R|S|P| SDATA | +---------------+ ~ SN ~ +---------------+ ~ RID | SID ~ +---------------+ ~ PRID ~ +---------------+ ~ [Payload] ~ +---------------+