Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications / Edition 1

Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications / Edition 1

ISBN-10:
0792399161
ISBN-13:
9780792399162
Pub. Date:
05/31/1997
Publisher:
Springer US
ISBN-10:
0792399161
ISBN-13:
9780792399162
Pub. Date:
05/31/1997
Publisher:
Springer US
Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications / Edition 1

Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications / Edition 1

Hardcover

$219.99
Current price is , Original price is $219.99. You
$219.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The subject of this book is Command Control Communication and Information 3 (C I) which is the management infrastructure for any large or complex dynamic resource systems. Here command means the determination of what to do, and control means the ongoing managementof the execution ofa command. 3 Decision making is the essence of C I which is accomplished through a phased implementation of a set of facilities, communications, personnel, equipment and procedures for monitoring, forecasting, planning, directing, allocating resources, and generating options to achieve specific and general objectives. 3 The C I system that is in question here is for a strategic military command including its subordinate commands. Although the design methodology that will be expounded in the book is for a military system, it can, to a large extent, apply also to tactical military as well as to civilian management information systems (MIS). 3 A C I system is a decision making network that reflects a hierarchical organization 3 of C I nodes. Each node is responsible for the management of some portion of the available resources, where the higher level nodes are responsible for a 3 correspondingly greater portion of the resources. Within a C I system both command and control decision making occur at every level of the hierarchy. Command decisions at one level determine how to satisfy the management decisions at a higher level.

Product Details

ISBN-13: 9780792399162
Publisher: Springer US
Publication date: 05/31/1997
Series: The Springer International Series in Engineering and Computer Science , #400
Edition description: 1997
Pages: 301
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

1 Introduction.- 1.1 Objective and Scope.- 1.2 Definitions.- 1.3 Problem Areas.- 1.4 System Acquisition Phases.- 1.5 Design Methodology.- 1.6 Content of the Book.- 1.7 References.- 2 Methodology for Collecting and Analyzing User Requirements Mission-Oriented Analysis.- 2.1 Coverage.- 2.2 Elements of MOA.- 2.3 Requirements Analysis and Computer Aided System Engineering.- 2.4 Derivation of System Design Parameters and Features.- 2.5 Testbedding and Prototyping.- 2.6 References.- 3 General System Outline Goal Architecture.- 3.1 System Concept.- 3.2 Basic Information Processing Functions.- 3.3 Communication Subsystem.- 3.4 References.- 4 Reference Model.- 4.1 Purpose and Objective.- 4.2 Functional Elements.- 4.3 References.- 5 System Architecture Design.- 5.1 Introduction.- 5.2 Node Level Architecture.- 5.3 Communications Networks.- 5.4 Data and Message Exchange Services.- 5.5 Standards.- 5.6 References.- Annex 5-A Local Area Network (LAN) Technologies and Standards.- Annex 5-B Abbreviations.- Annex 5-C Standards Used by the European Commission.- 6 System Configuration.- 6.1 Scope.- 6.2 Hardware Configuration.- 6.3 Software Configuration.- 6.4 References.- Annex 6-A Data Traffic Calculation.- 7 Security Architecture.- 7.1 Trust in the C3I System.- 7.2 Threats to Computer Systems.- 7.3 Vulnerabilities in Computer Systems.- 7.4 Attacks on Computer Systems.- 7.5 Estimation of Security Risk.- 7.6 Security Solutions.- 7.7 Implementation of Secure Systems Based on TCSEC.- 7.8 Multi Level Secure (MLS) System Design Issues.- 7.9 Alternative Security Designs.- 7.10 References.- 8 System Management.- 8.1 Requirements and Objectives.- 8.2 Surveillance and Control System (SURCONS).- 8.3 References.- 9 System Costing and Implementation.- 9.1 Scope.- 9.2 Cost Methodology.- 9.3 Implementation Plan.- 9.4 References.- Epilogue.
From the B&N Reads Blog

Customer Reviews