SlideShare a Scribd company logo
1 of 16
Download to read offline
Chapter 7
Complex Events and
Event Hierarchies
jwj0831@gmail.com
Topics covered in this Chapter
●
●
●
●

Event aggregation
Complex events
Event abstraction hierarchies
Personalized and role-based views of hierarchical
systems
7.1 Aggregation and Complex
Events
● A complex event is an aggregation of other events,
called its members as defined in Section 5.3.
● The relationship between a complex event and its
members is called aggregation.
● A complex event can signify an acitivity that consists of
several activities in different parts of a distributed
system.
● Conceptually, we think of a complex event as an event
at a higher level thatn the levels of its members.
7.1 Aggregation and Complex Events
Example 1: A CPU instruction, Add(X, Y)
● An Add instruction of a processor is a complex event
made up of a set of events generated by the registers,
asynchronous logic units, control units, and the clock of
a processor.
● The Add event is thought of as being an event at the
instruction level, and its member events are thought
of as being at a lower level, the resigter transfer level of
the processor.
7.1 Aggregation and Complex Events
Example 2: Message M has been routed to
client C based upon C’s
● Clients running applications on messaging middleware
can request the contents of messages to be tested
before receiving them.
● This event signifies a successful content-based routing
activity carried out on a publish/subscribe middleware.
● It aggregates several middleware events and rules
engine events.
7.2 Creating Complex Events 1/4
● Event pattern rules are used in CEP to create
complex events siginifying the acitivities of sets of
events.
● We refer to rules used to create complex events as
aggregation rules.
● This use of event pattern rules gives us a powerful
method of recognizing significant high-level events
from among a cloud of low-level events.
7.2 Creating Complex Events 2/4
Example: Using event pattern rules
to create complex events
Element

Declarations

Variable

Node N1, N2, Data D, Bit B, Time T1, T2, T3, T4

Event types

Send(Node N1,Node N2, Data D, Bit B, Time T1)
Receive(Node N1,Node N2, Data D, Bit B, Time T1)
Ack(Node N1,Node N2, Bit B, Timt T1)
RecAck(Node N1, Node N2, Bit B, Time T)
CompletdTrans(Node N1, Node N2, Time T1, Time T2)

Relational operators ->(causes)
Pattern

Send(N1, N2, D, B, T1) -> Receive(N2, N1, D, B, T2) ->
Ack(N2, N1, B, T3) -> RecAck (N1, N2, B, T4)

Context test

T4 - T1 < TimeBound

Action

create CompletdTran(N1, N2, T1, T4)
7.2 Creating Complex Events 3/4
Example: Using event pattern rules
to create complex events
● The CompletedTran event is a higher-event.
● Lower-level details, such as the value of the bit used in
the transfer, are abstracted away.
● CEP treats CompletedTran just as any other event.
● And if needed, the lower-events can be traced back
from the complex event.
● Backtracking from a complex event to its member in
CEP is called drill down.
7.2 Creating Complex Events 4/4
● Aggregation is a tool for making the activities in a
complex system understandable to humans.
● One of the reasons we need event patterns to create
complex events is that a complex event can happen in
more than one way-more than one set of lower-level
events, related in the right way, can signify the activity
of the complex event.
7.3 Event Abstraction Hierarchies
● In CEP an event abstraction hierarchy consists of the following
elements.
○ A sequence of levels of activities: Each level consists of a
set of descriptioins of system acitivities and, for each activities,
a specification of the types of events that signify instances of
that acitivity. Level 1 is the lowest level
○ A set of event aggregation rules for each level: For each
level(except level 1), there must be a rule for creating each
type of event at that level as an aggregation of events at levels
below.
● The crucial aspect of this definition is the set of rules specifying
how each event at a higher level is an aggregation of events at
levels below it.
7.4 Building Personalized Concept
Abstraction Hierarchies 1/2
● We use event abstraction hierarchies to specify and implement
personalized views of a target system for each stakeholder in the
system.
● This is a two step process following the definition in Section 7.3.
● Aggregation rules are the key to the second step.
○ The types of events that we choose to view at each
hierarchical level must be specified as types of CEP events.
This is the step where "personalization" of views takes places.
○ An aggregation rule must be defined for each type of event
at each level above level 1.
7.4 Building Personalized Concept
Abstraction Hierarchies 2/2
● Monitoring refers to observing and analyzing level 1 events.
● Viewing refers to computing higher-level complex events using
aggregation rules, and analyzing them by graphical and drill-down
techniques.
● CEP allows us to change our hierarchy definition and introduce
new aggregation rules on the fly, while the target system is
running.
● Viewing shuld be always be flexible, allowing changes to meet
shifts of interests in what the target system is doing.
● CEP lets us choose our types of complex events to suit our roles
and needs. In other words, we can personalize our views.
7.4.1 Viewing Network Activity
Step 1: Define an Event Abstraction Hierarchy 1/2
Level Activities

Event Types

Level 2

Completed transmission

CompletedTrans(Node N1, Node N2, Time T1, Time
T2)

Degraded performance

DegPerf(Node N1, Node N2, Time T, Time T1)

Send data with bit

Send(Node N1,Node N2, Data D, Bit B, Time T)

Wait for acknowledge

Wait(Node N, Data D, Bit B, Time T)

Time out

TimeOut(Node N, Time Delta, Time T)

Resend data

ReSend(Node N1, Node N2, Data D, Bit B, Time T)

Acknowledge data with bit

Ack(Node N1,Node N2, Data D, Bit B, Timt T)

Receive data

Receive(Node N1,Node N2, Bit B, Time T)

Receive an acknowledge

ReceiveAck(Node N1, Node N2, Bit B, Time T)

Level 1
7.4.1 Viewing Network Activity
Step 1: Define an Event Abstraction Hierarchy 2/2
● Our goal is to show how an abstraction hierarchy is used to define
monitoring and viewing.
● Level 1 activities are those of the alternating bit protocol itself.
● Leve 2 defines the activities that are significant to us in our view of
the network protocol activity.
● In this example, we choose two views:
○ completed transmission as a measure of good performance
○ degraded performance as a measure of bad performance
● Each level 2 event is an aggregation of level 1 events.
7.4.1 Viewing Network Activity
Step 2: Define Aggregation Rules 1/2
Element

Declarations

Variable

Node N1, N2, Data D, Bit B, Time T1, T2, T3, T4

Event types

Send(Node N1,Node N2, Data D, Bit B, Time T1)
Receive(Node N1,Node N2, Data D, Bit B, Time T1)
Ack(Node N1,Node N2, Bit B, Timt T1)
RecAck(Node N1, Node N2, Bit B, Time T)
CompletdTrans(Node N1, Node N2, Time T1, Time T2)

Relational operators ->(causes)
Pattern

Send(N1, N2, D, B, T1) -> Receive(N2, N1, D, B, T2) ->
Ack(N2, N1, B, T3) -> RecAck (N1, N2, B, T4)

Context test

T4 - T1 < TimeBound

Action

create CompletdTran(N1, N2, T1, T4)
7.4.1 Viewing Network Activity
Step 2: Define Aggregation Rules 2/2
● Drill Down
Completed Transmission
M1(2,5)

Level 2

Completed Transmission
M(1,7)

Send
M2,1

Wait
M2,1

RecAck
M1,0

Send
M1,0

TimeOut
M,0

Ack
M1,0

Receive
M,0

Ack
M,0

Send
M,0

Wait
M,0

Receive
M1,0

ReSend
M,0

Receive
M,0

Ack
M,0

RecAck
M,0

1

2

3

4

5

6

7

Level 1

time

More Related Content

What's hot

Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Daniel Moldovan
 
Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Georgiana Copil
 
SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...Georgiana Copil
 
On Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesOn Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesDaniel Moldovan
 
Concurrency control
Concurrency controlConcurrency control
Concurrency controlkansel85
 
Predictive Business Process Monitoring with LSTM Neural Networks
Predictive Business Process Monitoring with LSTM Neural NetworksPredictive Business Process Monitoring with LSTM Neural Networks
Predictive Business Process Monitoring with LSTM Neural NetworksMarlon Dumas
 
Concurrency of Issues of Distributed Advance Transaction
Concurrency of Issues of Distributed Advance TransactionConcurrency of Issues of Distributed Advance Transaction
Concurrency of Issues of Distributed Advance TransactionAbdelhafiz Khoudour
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Asoka Korale
 
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...Georgiana Copil
 
poster on "An Efficient Improved Group Key Agreement Protocol Based on Diff...
poster on "An Efficient Improved Group Key Agreement Protocol Based on   Diff...poster on "An Efficient Improved Group Key Agreement Protocol Based on   Diff...
poster on "An Efficient Improved Group Key Agreement Protocol Based on Diff...JAYANT RAJURKAR
 
Realtime systems chapter 1
Realtime systems chapter 1Realtime systems chapter 1
Realtime systems chapter 1Binay Ghimire
 
Distributed Database Design and Relational Query Language
Distributed Database Design and Relational Query LanguageDistributed Database Design and Relational Query Language
Distributed Database Design and Relational Query LanguageAAKANKSHA JAIN
 
Jerry banks introduction to simulation
Jerry banks   introduction to simulationJerry banks   introduction to simulation
Jerry banks introduction to simulationsarubianoa
 

What's hot (17)

OSCh17
OSCh17OSCh17
OSCh17
 
Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds
 
Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity
 
SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...
 
On Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesOn Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud Services
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Predictive Business Process Monitoring with LSTM Neural Networks
Predictive Business Process Monitoring with LSTM Neural NetworksPredictive Business Process Monitoring with LSTM Neural Networks
Predictive Business Process Monitoring with LSTM Neural Networks
 
Concurrency of Issues of Distributed Advance Transaction
Concurrency of Issues of Distributed Advance TransactionConcurrency of Issues of Distributed Advance Transaction
Concurrency of Issues of Distributed Advance Transaction
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...
 
Chapter00000000
Chapter00000000Chapter00000000
Chapter00000000
 
eBiz#3: CEP
eBiz#3: CEPeBiz#3: CEP
eBiz#3: CEP
 
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...
Controlling Cloud Services Elasticity in Heterogeneous Clouds - UCC 2014 - Cl...
 
poster on "An Efficient Improved Group Key Agreement Protocol Based on Diff...
poster on "An Efficient Improved Group Key Agreement Protocol Based on   Diff...poster on "An Efficient Improved Group Key Agreement Protocol Based on   Diff...
poster on "An Efficient Improved Group Key Agreement Protocol Based on Diff...
 
Realtime systems chapter 1
Realtime systems chapter 1Realtime systems chapter 1
Realtime systems chapter 1
 
Distributed Database Design and Relational Query Language
Distributed Database Design and Relational Query LanguageDistributed Database Design and Relational Query Language
Distributed Database Design and Relational Query Language
 
Jerry banks introduction to simulation
Jerry banks   introduction to simulationJerry banks   introduction to simulation
Jerry banks introduction to simulation
 
Chapter7
Chapter7Chapter7
Chapter7
 

Viewers also liked

자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰Woojin Joe
 
[E6]2012. netty internals
[E6]2012. netty internals[E6]2012. netty internals
[E6]2012. netty internalsNAVER D2
 
Netty 시작하기 (4)
Netty 시작하기 (4)Netty 시작하기 (4)
Netty 시작하기 (4)Daehyun Kim
 
빠르게훓어보는 Node.js와 Vert.x
빠르게훓어보는 Node.js와 Vert.x빠르게훓어보는 Node.js와 Vert.x
빠르게훓어보는 Node.js와 Vert.xTerry Cho
 
Get started with netty
Get started with nettyGet started with netty
Get started with netty창규 김
 

Viewers also liked (6)

자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰
 
Jmeter
JmeterJmeter
Jmeter
 
[E6]2012. netty internals
[E6]2012. netty internals[E6]2012. netty internals
[E6]2012. netty internals
 
Netty 시작하기 (4)
Netty 시작하기 (4)Netty 시작하기 (4)
Netty 시작하기 (4)
 
빠르게훓어보는 Node.js와 Vert.x
빠르게훓어보는 Node.js와 Vert.x빠르게훓어보는 Node.js와 Vert.x
빠르게훓어보는 Node.js와 Vert.x
 
Get started with netty
Get started with nettyGet started with netty
Get started with netty
 

Similar to The Power Of Event Chapter 7

Part 1 A Simple Introduction to Complex Event Processing
Part 1 A Simple Introduction to Complex Event ProcessingPart 1 A Simple Introduction to Complex Event Processing
Part 1 A Simple Introduction to Complex Event ProcessingWoojin Joe
 
The process approach (and business process management)
The process approach (and business process management)The process approach (and business process management)
The process approach (and business process management)Nicola Mezzetti
 
PATTERNS06 - The .NET Event Model
PATTERNS06 - The .NET Event ModelPATTERNS06 - The .NET Event Model
PATTERNS06 - The .NET Event ModelMichael Heron
 
Use case point ( Software Estimation Technique)
Use case point ( Software Estimation Technique)Use case point ( Software Estimation Technique)
Use case point ( Software Estimation Technique)Punjab University
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementDamir Delija
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processingOpher Etzion
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006Tim Bass
 
Scalability truths and serverless architectures
Scalability truths and serverless architecturesScalability truths and serverless architectures
Scalability truths and serverless architecturesRegunath B
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event ProcessingJohn Plummer
 
Unit 02 unit – ii project planning and scheduling
Unit 02 unit – ii project planning and schedulingUnit 02 unit – ii project planning and scheduling
Unit 02 unit – ii project planning and schedulingRAMCHANDRA KODAM
 
A Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing CloudsA Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing Cloudsijsrd.com
 
Event driven architecture
Event driven architectureEvent driven architecture
Event driven architectureVinod Wilson
 
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...Flink Forward
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulationcatherine roussey
 
Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms
Recovery of Data in Cluster Computing By Using Fault Tolerant MechanismsRecovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms
Recovery of Data in Cluster Computing By Using Fault Tolerant MechanismsIOSR Journals
 
Cross Language Process Model Reuse Po Em2009
Cross Language Process Model Reuse Po Em2009Cross Language Process Model Reuse Po Em2009
Cross Language Process Model Reuse Po Em2009mturi
 

Similar to The Power Of Event Chapter 7 (20)

Part 1 A Simple Introduction to Complex Event Processing
Part 1 A Simple Introduction to Complex Event ProcessingPart 1 A Simple Introduction to Complex Event Processing
Part 1 A Simple Introduction to Complex Event Processing
 
The process approach (and business process management)
The process approach (and business process management)The process approach (and business process management)
The process approach (and business process management)
 
PATTERNS06 - The .NET Event Model
PATTERNS06 - The .NET Event ModelPATTERNS06 - The .NET Event Model
PATTERNS06 - The .NET Event Model
 
Use case point ( Software Estimation Technique)
Use case point ( Software Estimation Technique)Use case point ( Software Estimation Technique)
Use case point ( Software Estimation Technique)
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems management
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
 
Chapter 5 ppt
Chapter 5 pptChapter 5 ppt
Chapter 5 ppt
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006
 
Ooad 3
Ooad 3Ooad 3
Ooad 3
 
Scalability truths and serverless architectures
Scalability truths and serverless architecturesScalability truths and serverless architectures
Scalability truths and serverless architectures
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
 
Unit 02 unit – ii project planning and scheduling
Unit 02 unit – ii project planning and schedulingUnit 02 unit – ii project planning and scheduling
Unit 02 unit – ii project planning and scheduling
 
A Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing CloudsA Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing Clouds
 
Event driven architecture
Event driven architectureEvent driven architecture
Event driven architecture
 
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...
Flink Forward Berlin 2018: Shriya Arora - "Taming large-state to join dataset...
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulation
 
Introduciton to bpmn
Introduciton to bpmn Introduciton to bpmn
Introduciton to bpmn
 
G017124045
G017124045G017124045
G017124045
 
Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms
Recovery of Data in Cluster Computing By Using Fault Tolerant MechanismsRecovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms
Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms
 
Cross Language Process Model Reuse Po Em2009
Cross Language Process Model Reuse Po Em2009Cross Language Process Model Reuse Po Em2009
Cross Language Process Model Reuse Po Em2009
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

The Power Of Event Chapter 7

  • 1. Chapter 7 Complex Events and Event Hierarchies jwj0831@gmail.com
  • 2. Topics covered in this Chapter ● ● ● ● Event aggregation Complex events Event abstraction hierarchies Personalized and role-based views of hierarchical systems
  • 3. 7.1 Aggregation and Complex Events ● A complex event is an aggregation of other events, called its members as defined in Section 5.3. ● The relationship between a complex event and its members is called aggregation. ● A complex event can signify an acitivity that consists of several activities in different parts of a distributed system. ● Conceptually, we think of a complex event as an event at a higher level thatn the levels of its members.
  • 4. 7.1 Aggregation and Complex Events Example 1: A CPU instruction, Add(X, Y) ● An Add instruction of a processor is a complex event made up of a set of events generated by the registers, asynchronous logic units, control units, and the clock of a processor. ● The Add event is thought of as being an event at the instruction level, and its member events are thought of as being at a lower level, the resigter transfer level of the processor.
  • 5. 7.1 Aggregation and Complex Events Example 2: Message M has been routed to client C based upon C’s ● Clients running applications on messaging middleware can request the contents of messages to be tested before receiving them. ● This event signifies a successful content-based routing activity carried out on a publish/subscribe middleware. ● It aggregates several middleware events and rules engine events.
  • 6. 7.2 Creating Complex Events 1/4 ● Event pattern rules are used in CEP to create complex events siginifying the acitivities of sets of events. ● We refer to rules used to create complex events as aggregation rules. ● This use of event pattern rules gives us a powerful method of recognizing significant high-level events from among a cloud of low-level events.
  • 7. 7.2 Creating Complex Events 2/4 Example: Using event pattern rules to create complex events Element Declarations Variable Node N1, N2, Data D, Bit B, Time T1, T2, T3, T4 Event types Send(Node N1,Node N2, Data D, Bit B, Time T1) Receive(Node N1,Node N2, Data D, Bit B, Time T1) Ack(Node N1,Node N2, Bit B, Timt T1) RecAck(Node N1, Node N2, Bit B, Time T) CompletdTrans(Node N1, Node N2, Time T1, Time T2) Relational operators ->(causes) Pattern Send(N1, N2, D, B, T1) -> Receive(N2, N1, D, B, T2) -> Ack(N2, N1, B, T3) -> RecAck (N1, N2, B, T4) Context test T4 - T1 < TimeBound Action create CompletdTran(N1, N2, T1, T4)
  • 8. 7.2 Creating Complex Events 3/4 Example: Using event pattern rules to create complex events ● The CompletedTran event is a higher-event. ● Lower-level details, such as the value of the bit used in the transfer, are abstracted away. ● CEP treats CompletedTran just as any other event. ● And if needed, the lower-events can be traced back from the complex event. ● Backtracking from a complex event to its member in CEP is called drill down.
  • 9. 7.2 Creating Complex Events 4/4 ● Aggregation is a tool for making the activities in a complex system understandable to humans. ● One of the reasons we need event patterns to create complex events is that a complex event can happen in more than one way-more than one set of lower-level events, related in the right way, can signify the activity of the complex event.
  • 10. 7.3 Event Abstraction Hierarchies ● In CEP an event abstraction hierarchy consists of the following elements. ○ A sequence of levels of activities: Each level consists of a set of descriptioins of system acitivities and, for each activities, a specification of the types of events that signify instances of that acitivity. Level 1 is the lowest level ○ A set of event aggregation rules for each level: For each level(except level 1), there must be a rule for creating each type of event at that level as an aggregation of events at levels below. ● The crucial aspect of this definition is the set of rules specifying how each event at a higher level is an aggregation of events at levels below it.
  • 11. 7.4 Building Personalized Concept Abstraction Hierarchies 1/2 ● We use event abstraction hierarchies to specify and implement personalized views of a target system for each stakeholder in the system. ● This is a two step process following the definition in Section 7.3. ● Aggregation rules are the key to the second step. ○ The types of events that we choose to view at each hierarchical level must be specified as types of CEP events. This is the step where "personalization" of views takes places. ○ An aggregation rule must be defined for each type of event at each level above level 1.
  • 12. 7.4 Building Personalized Concept Abstraction Hierarchies 2/2 ● Monitoring refers to observing and analyzing level 1 events. ● Viewing refers to computing higher-level complex events using aggregation rules, and analyzing them by graphical and drill-down techniques. ● CEP allows us to change our hierarchy definition and introduce new aggregation rules on the fly, while the target system is running. ● Viewing shuld be always be flexible, allowing changes to meet shifts of interests in what the target system is doing. ● CEP lets us choose our types of complex events to suit our roles and needs. In other words, we can personalize our views.
  • 13. 7.4.1 Viewing Network Activity Step 1: Define an Event Abstraction Hierarchy 1/2 Level Activities Event Types Level 2 Completed transmission CompletedTrans(Node N1, Node N2, Time T1, Time T2) Degraded performance DegPerf(Node N1, Node N2, Time T, Time T1) Send data with bit Send(Node N1,Node N2, Data D, Bit B, Time T) Wait for acknowledge Wait(Node N, Data D, Bit B, Time T) Time out TimeOut(Node N, Time Delta, Time T) Resend data ReSend(Node N1, Node N2, Data D, Bit B, Time T) Acknowledge data with bit Ack(Node N1,Node N2, Data D, Bit B, Timt T) Receive data Receive(Node N1,Node N2, Bit B, Time T) Receive an acknowledge ReceiveAck(Node N1, Node N2, Bit B, Time T) Level 1
  • 14. 7.4.1 Viewing Network Activity Step 1: Define an Event Abstraction Hierarchy 2/2 ● Our goal is to show how an abstraction hierarchy is used to define monitoring and viewing. ● Level 1 activities are those of the alternating bit protocol itself. ● Leve 2 defines the activities that are significant to us in our view of the network protocol activity. ● In this example, we choose two views: ○ completed transmission as a measure of good performance ○ degraded performance as a measure of bad performance ● Each level 2 event is an aggregation of level 1 events.
  • 15. 7.4.1 Viewing Network Activity Step 2: Define Aggregation Rules 1/2 Element Declarations Variable Node N1, N2, Data D, Bit B, Time T1, T2, T3, T4 Event types Send(Node N1,Node N2, Data D, Bit B, Time T1) Receive(Node N1,Node N2, Data D, Bit B, Time T1) Ack(Node N1,Node N2, Bit B, Timt T1) RecAck(Node N1, Node N2, Bit B, Time T) CompletdTrans(Node N1, Node N2, Time T1, Time T2) Relational operators ->(causes) Pattern Send(N1, N2, D, B, T1) -> Receive(N2, N1, D, B, T2) -> Ack(N2, N1, B, T3) -> RecAck (N1, N2, B, T4) Context test T4 - T1 < TimeBound Action create CompletdTran(N1, N2, T1, T4)
  • 16. 7.4.1 Viewing Network Activity Step 2: Define Aggregation Rules 2/2 ● Drill Down Completed Transmission M1(2,5) Level 2 Completed Transmission M(1,7) Send M2,1 Wait M2,1 RecAck M1,0 Send M1,0 TimeOut M,0 Ack M1,0 Receive M,0 Ack M,0 Send M,0 Wait M,0 Receive M1,0 ReSend M,0 Receive M,0 Ack M,0 RecAck M,0 1 2 3 4 5 6 7 Level 1 time