Data Transformation Engine Intelligent Business Integration Reference Guide

Chapter 3 - Methods of Execution Event-Driven Execution Model
Intelligent Business Integration Reference Guide
50
4 The map triggered by the HTTP request generates its output, which is passed
onto another map whose output may be passed onto another map, and so
forth. In all cases, the session ID assigned by the Event Agent is passed along
to each subsequent map in the form of a wildcard parameter. Once the
required output has been generated, Map N sends an HTTP request (including
the session ID originally assigned by the Event Agent) to the HTTP adapter and
passes, in that request, its output data to be returned in response to the
original HTTP request in step 2. The HTTP adapter forwards the HTTP request
to the Event Agent.
5 The Event Agent sends the data sent in the HTTP request in step 4 to the client
that made the original HTTP request in step 2. During the time the Event
Server has been executing the maps, the Event Agent has maintained state on
the original HTTP request.
6 The response returned by the output data for the original HTTP request sent in
step 5, is passed back as a response to the Event Server map that made the
HTTP request to the Event Agent in step 4. This in turn can be mapped and
updated as an additional output to a transaction-logging database.
When to use the Event Agent
When the HTTP request requires a complex system of maps to generate the
response.
If the integration is required to use asynchronous messaging.
If a light-footprint solution is required to process internal and external HTTP
requests.
Business Advantages
Single architecture for A2A, B2C, and B2B integration
! Greater re-usability and portability of skills
! No procedural programming
! Ease of ongoing maintenance
! Quicker implementation times
Major platform support
! Leverage existing IT investments—technology & skills
! Reduced cost—no new skill sets needed
Firewall integrity is maintained—no requirement to “punch a hole” into the
firewall from outside in the DMZ
! Threats to business security are minimized