Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type
{ "homeurl": "http://complexityacademy.io/", "resultstype": "isotopic", "resultsposition": "block", "itemscount": 4, "imagewidth": 70, "imageheight": 70, "resultitemheight": "70px", "showauthor": 0, "showdate": 0, "showdescription": 0, "charcount": 3, "noresultstext": "No results!", "didyoumeantext": "Did you mean:", "defaultImage": "http://solutionslab.io/academy/wp-content/uploads/sites/4/2016/10/Search-defualt.jpg", "highlight": 0, "highlightwholewords": 1, "openToBlank": 0, "scrollToResults": 0, "resultareaclickable": 1, "autocomplete": { "enabled": 1, "googleOnly": 1, "lang": "en", "mobile": 1 }, "triggerontype": 1, "triggeronclick": 1, "triggeronreturn": 1, "triggerOnFacetChange": 1, "trigger": { "delay": 300, "autocomplete_delay": 310 }, "overridewpdefault": 0, "override_method": "post", "redirectonclick": 0, "redirectClickTo": "results_page", "redirect_on_enter": 0, "redirectEnterTo": "results_page", "redirect_url": "?s={phrase}", "settingsimagepos": "right", "settingsVisible": 0, "hresulthidedesc": "1", "prescontainerheight": "400px", "pshowsubtitle": "0", "pshowdesc": "1", "closeOnDocClick": 1, "iifNoImage": "description", "iiRows": 2, "iiGutter": 5, "iitemsWidth": 200, "iitemsHeight": 200, "iishowOverlay": 1, "iiblurOverlay": 1, "iihideContent": 1, "loaderLocation": "auto", "analytics": 0, "analyticsString": "", "show_more": { "url": "?s={phrase}", "action": "ajax" }, "mobile": { "trigger_on_type": 1, "trigger_on_click": 1, "hide_keyboard": 0, "force_res_hover": 0, "force_sett_hover": 0, "force_sett_state": "closed" }, "compact": { "enabled": 0, "width": "100%", "closeOnMagnifier": 1, "closeOnDocument": 0, "position": "static", "overlay": 0 }, "animations": { "pc": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "fadeInDown" }, "mob": { "settings": { "anim" : "fadedrop", "dur" : 300 }, "results" : { "anim" : "fadedrop", "dur" : 300 }, "items" : "voidanim" } }, "autop": { "state": "disabled", "phrase": "", "count": 10 }, "fss_layout": "column" }

Event-Driven Architecture

EDA comes from the world of software systems design and it is optimized for dynamic and changing environments

EDA comes from the world of software systems design and it is optimized for dynamic and changing environments

Event-driven architecture (EDA) is a design pattern built around the production, detection, and reaction to events that take place in time. It is a design paradigm normalized for dynamic, asynchronous, process-oriented contexts; it is most widely applied within software engineering.1

Dynamical Systems

Information technology is key to enabling a new world of event-driven architecture. When we start putting chips in all kinds of devices and objects, instrumenting our technologies and putting smartphones in the hands of many, the world around us stops being dumb and static and starts being more dynamic, adaptive, and things start happening in real-time. When the lights in a house or a garage door are instrumented with sensors and actuators, they no longer need a person to turn them on. Instead, they wait in a restless state, listening for some event to occur to which they can then instantly respond.
This is in contrast to many of our traditional systems where the components are constrained by some centralized coordination mechanism, with information often having to be routed from the local level to a centralized control mechanism, then batch processed and returned to the component to respond after some delay. The components within complex systems are able to adapt locally, which means they can often act and react in real-time. Added to this is the fact that many of these complex engineered systems are loosely coupled networks of unassociated components. They don’t really have any structure. Sometimes they don’t even exist until some event actually happens. When I make a query on a search engine, my computer might be coupling to a data center in Texas. But the next time I make the same query, I might be interacting with a server in South Korea. Depending on the system’s load balance at that instant in time, the network’s structure is defined dynamically during the system’s run time.

Example

An event-driven architecture consists primarily of event creators, event managers, and event consumers.2 The event creator, which is the source of the event, only knows that the event has occurred and broadcasts a signal to indicate so. An event manager, as the name implies, functions as intermediary managing events. When the manager receives notification of an event from a creator, it may apply some rules to process the event. But ultimately, events are passed downstream to event consumers where a single event may initiate numerous downstream activities. Consumers are entities that need to know the event has occurred and typically subscribe to some type of event manager. For example, an online accommodation service where event creators (that is, property owners) broadcast the availability of their accommodation to the event manager (the online platform), which would aggregate these, and event consumers (people looking for accommodation) could subscribe to the platform’s mailing list sending them notifications for any new relevant listings.

Advantages

EDA is well suited to loosely coupled and dynamic networks that have become more prevalent with the rise of mobile computing

EDA is well suited to loosely coupled and dynamic networks that have become more prevalent with the rise of mobile computing

Some of the advantages to using an event-driven architecture are: EDA is particularly well suited to the loosely coupled structure of complex engineered systems. We do not need to define a well bounded formal system of which components are either a part of or not. Instead, components can remain autonomous, being capable of coupling and decoupling into different networks in response to different events. Thus, components can be used and reused by many different networks.
Secondly, versatility. Event-driven architecture allows systems to be constructed in a manner that facilitates greater responsiveness because event-driven systems are, by design, normalized to unpredictable, nonlinear, and asynchronous environments. They can be highly versatile and adaptable to different circumstance. Next EDA is inherently optimized for real-time analytics. Within this architectural paradigm, we have a much greater capacity to find, analyze, and then respond to patterns in time before critical events happen, whereas traditionally, we spend a lot of time looking in the rear-view mirror analyzing data about things that happened yesterday or last year. Event-driven architecture enables a more preemptive world. Instead of waiting for my car to break down and then leaving it in the garage for a few days to be fixed, we can preempt the whole thing by having the car send a stream of information to a data center that analyses it and triggers events when patterns leading to dysfunctional activity are identified.
This is the world of real-time Big Data, advanced analytics, and complex event processing. Complex event processing is a method of tracking and analyzing streams of information that combine data from multiple sources to infer events or patterns that suggest circumstances. The goal of complex event processing is to identify meaningful events (such as opportunities or threats) and respond to them before they happen or as quickly as possible after they happen. Complex event processing goes hand in hand with an event-driven architecture.

Disadvantages

The disadvantages of EDA include security risks and increased complexity. Because EDA systems are often extremely loosely coupled and highly distributed: we don’t always know exactly what components are part of the system and the dependencies between them. The system can become opaque and some small event could trigger an unforeseen chain of relations. A good example of this is algorithmic trading, which is a paradigm of event-driven architecture. This involves computer algorithms that are engineered to conduct financial transactions given a certain event, typically buying or selling a security on some change in the market price. No one has full or even partial information about what algorithms are out there, what they all do and how they might be interconnected. This situation within a critical infrastructure is clearly a serious security problem. A corollary to this is that things can get very complex due to the open and inherent nonlinear nature of this type of design pattern.

Cite this article as: Joss Colchester, "Event-Driven Architecture," in Complexity Academy, May 7, 2015, http://complexityacademy.io/event-driven-architecture/.
  1. View Source
  2. View Source