📃INTRODUCTION

1. Introduction to the BDI Reference Architecture

The Basic Data Infrastructure Framework (BDI) is an infrastructure framework for controlled data sharing, supporting automated advanced information logistics in the physical economy. Departing from traditional messaging paradigms, the BDI shifts towards event-driven data collection at the source, fostering efficient and secure coordination through proven publish-and-subscribe architectures.

This introduction provides a short overview of some issues that play a role in the design of the architecture, starting with some observations about data in a logistics environment. These observations are used in the formulation of architectural principles which are in turn the basis of BDI building blocks. Finally, these building blocks are grouped in functional subsets called KITs.

See bdinetwork.org for a full account of these concepts.

2. Observations

Some observations about data in the logistics environment are given below:

Characteristics of data exchange patterns

The data exchange patterns in typical operational networks are a result of “doing business”. They have specific characteristics:

  • The network of involved parties is driven by the fulfillment of an assignment. These networks are temporary and fluid, meaning that members are added whenever necessary and the network is dissolved when the job is done.

  • Data exchanges are between members of a closed group, i.e. the members are vetted in advance.

  • There can be time constraints on the exchange of data.

Support requirements for a data exchange infrastructure

A common data exchange infrastructure for operational networks should support the following:

  • dynamic instances

  • multiple concurrent instances

  • controlled event-driven exchange

Requirements for event-driven exchange of operational data

Event-driven exchange of operational data within an instance must be:

  • Efficient, i.e. no polling, no unnecessary retrieval

  • Effective, i.e. easy distribution to multiple parties simultaneously

  • Controlled:

    • Limited exposure to malicious actors

    • Only authorized parties can retrieve information

    • Role-based data access

    • The Data Owner tracks access, providing a clear audit trail

Value of data

The following observations are made about the value of data:

  • Data has value

  • Data owners want to protect and monetize this value

Trust in global business networks

The importance of trust in global business networks

  • Identification authentication and authorization play an important role in establishing trust.

  • Zero trust - do not trust anyone before trust is established.

  • Perimeterless trust - do not base trust on membership of a closed group of trusted parties

Last updated