Cyber Architectures and Engineering

Course #EC4790

Est.imated Completion Time: 3 months


The course addresses the holistic design, analysis and integration of the three-tiered cyber architecture of the medium, network, and services. Interoperability and interconnection of heterogeneous networks are discussed. Service oriented architectures and service orchestration mechanisms to include such techniques as artificial intelligence, control theory, min-max algorithm and feedback analysis are introduced. Network centric services and system design for both wired and wireless platforms are emphasized. Tools such as WSDL and SoaML will be introduced. System availability calculations and quality of service issues at different levels of the system are discussed in-depth. Comprehensive approaches to security across all levels of the system-medium, network, and services-are analyzed. Development of network centric, distributed engineering applications will be considered for static as well as mobile services. Sensor networks, information fusion, and end-to-end services are studied.

Included in degrees & certificates

  • 296


  • EC3730
  • EC3710

Learning Outcomes

·       The student will be able to outline the medium, network, and service issues in large-scale heterogeneous network centric system.

·       The student will be able to demonstrate the need for system interoperability functions in network centric systems.

·       The student will be able to define service-oriented architecture and discuss service orchestration and the various techniques used in large scale system implementation and design using the principles of artificial intelligence, min-max principle, and feedback analysis.

·       Given an operational scenario, the student will be able to propose network centric design schemes.

·       The student will be able to list system data flows and traffic management requirements.

·       The student will be able to calculate system availability metrics.

·       The student will be able to propose quality of service requirements and list the relevant system resource metrics to meet the user’s quality of service expectations.

·       The student will be able to propose network centric system security requirements and determine system vulnerabilities.

·       The student will be able to develop schemes for network centric applications for both wired and wireless platforms.

·       The student will be able to propose information processing schemes to enable implementation of centralized and/or distributed fusion algorithms.

Offerings database access
Asset Publisher

Application Deadlines

  •  08 Jul 2024

    Fall Quarter applications due

Asset Publisher

Academic Calendar

No upcoming events.