INTRODUCTION
Introduction to the BDI Reference Architecture
The Basic Data Infrastructure Framework (BDI) is an infrastructure framework for controlled data sharing, supporting automated advanced information logistics in the physical economy. Departing from traditional messaging paradigms, the BDI shifts towards event-driven data collection at the source, fostering efficient and secure coordination through proven publish-and-subscribe architectures.
This introduction provides a short overview of some issues which play a role in the design of the architecture. We start with some observations about data in a logistic environment. These observations are used in the formulation of architectural principles which are in turn the basis of BDI building blocks. Finally, these building blocks are grouped in functional subsets called KITs.
See bdinetwork.org for a full account of these concepts.
Observations
The data exchange patterns in typical operational networks are a result of “doing business” have specific characteristics:
The network of involved parties is driven by the fulfillment of an assignment - these networks are temporary and fluid, that is, members are added whenever necessary and the network is dissolved when the job is done.
Data exchanges are between members of a closed group, i.e. the members are vetted in advance.
There can be time constraints on the exchange of data.
A common data exchange infrastructure for operational networks should support:
Dynamic instances
Multiple concurrent instances
Controlled event-driven exchange
Event-driven exchange of operational data within an instance must be:
Efficient: no polling, no unnecessary retrieval
Effective: easy distribution to multiple parties simultaneously
Controlled:
Limited exposure to malicious actors.
Only authorized parties can retrieve information.
Role based data access.
The Data Owner tracks access, providing a clear audit trail.
The value of data:
Data has value
Data owners want to protect and monetize this value
The importance of trust in global business networks
Identification authentication and authorization play an important role in establishing trust.
Zero trust - do not trust anyone before trust is established.
Perimeterless trust - do not base trust on membership of a closed group of trusted parties
Last updated