EC4790 Cyber Architectures and Engineering

The course addresses the holistic design, analysis and integration of the three-tiered cyber architecture of the medium, network, and services. Interoperability and interconnection of heterogeneous networks are discussed. Service oriented architectures and service orchestration mechanisms to include such techniques as artificial intelligence, control theory, min-max algorithm and feedback analysis are introduced. Network centric services and system design for both wired and wireless platforms are emphasized. Tools such as WSDL and SoaML will be introduced. System availability calculations and quality of service issues at different levels of the system are discussed in-depth. Comprehensive approaches to security across all levels of the system-medium, network, and services-are analyzed. Development of network centric, distributed engineering applications will be considered for static as well as mobile services. Sensor networks, information fusion, and end-to-end services are studied.

Prerequisite

EC3730 or EC3710

Lecture Hours

3

Lab Hours

2

Course Learning Outcomes

·       The student will be able to outline the medium, network, and service issues in large-scale heterogeneous network centric system.

·       The student will be able to demonstrate the need for system interoperability functions in network centric systems.

·       The student will be able to define service-oriented architecture and discuss service orchestration and the various techniques used in large scale system implementation and design using the principles of artificial intelligence, min-max principle, and feedback analysis.

·       Given an operational scenario, the student will be able to propose network centric design schemes.

·       The student will be able to list system data flows and traffic management requirements.

·       The student will be able to calculate system availability metrics.

·       The student will be able to propose quality of service requirements and list the relevant system resource metrics to meet the user’s quality of service expectations.

·       The student will be able to propose network centric system security requirements and determine system vulnerabilities.

·       The student will be able to develop schemes for network centric applications for both wired and wireless platforms.

·       The student will be able to propose information processing schemes to enable implementation of centralized and/or distributed fusion algorithms.