Download presentation
Presentation is loading. Please wait.
Published byAnissa Hopkins Modified over 9 years ago
1
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Intelligent Event Processing (IEP)
2
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Architecture: Overview
3
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Architecture: Deployment
4
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Architecture: Runtime
5
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Use Case: RFID Store Theft Detection Z-Mart Store Layout Each product in the store has a RFID emitter that sends out its product ID P_k every 2 seconds. 16 sensors: S_0, …,S_15. One for each section. Sensor S_i receives product ID P_k and reports (S_i, P_k) to the IEP system. One cannot remove a RFID emitter from its product without destroying it.
6
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Use Case: RFID Store Theft Detection Z-Mart existing database system ProductIdTypeId P_0T_0 P_1T_0 …… P_100T_8 …… Product TypeIdTypeDesc T_0HP Printer T_1Dell Monitor …… T_8Sony TV …… ProductType
7
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Use Case: RFID Store Theft Detection Detect: Stolen Product A product is considered stolen if its signal is received by S_15 (sensor at Exit). And it is not paid yet.
8
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Use Case: RFID Store Theft Detection Detect: Dead RFID Emitter A RFID emitter is considered dead if no sensor has received its signal for the past 10 seconds. And its last reporting sensor is not S_15 (sensor at Exit).
9
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Use Case: RFID Store Theft Detection Runtime Data Flow
10
Sun Proprietary/Confidential Information © Sun Microsystems 2005 Features Supports Continuous Query Language (CQL) operators Supports additional operators invented at Sun. Uses SQL for event matching, abstraction, and transformation. Processes events using database engine minimizing network usage.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.