1 / 6

IONA JUMPSTART PROGRAM

IONA JUMPSTART PROGRAM. Central Command Station (proposed). Command Center .NET, HTTP or Swing. 2. Fleet under Attack What to do?. 1. Incoming Entity/Asset’s Locations. 2. DECISION CENTER. 4. If No Go, alert Joint Forces. 3. Go/NO GO Command. 4. Pentagon JMS system.

wells
Download Presentation

IONA JUMPSTART PROGRAM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IONA JUMPSTART PROGRAM

  2. Central Command Station (proposed) Command Center .NET, HTTP or Swing 2. Fleet under Attack What to do? 1. Incoming Entity/Asset’s Locations 2. DECISION CENTER 4. If No Go, alert Joint Forces 3. Go/NO GO Command 4. Pentagon JMS system 3. Mobile Fleet

  3. Alert from Homeland Security Command Center .NET, HTTP or Swing Data transformation Incoming Threat alert A message comes in from Border Patrol that illegal entities exists and are approaching

  4. Decision Center Decision Center Which direction? Threat message CIA Imagery System Java Check Weather threats Go/NO GO Calculate threat’s attack time Check Weather Java Attack Calculation System J2EE Command Center JMS system

  5. Components • Orchestration – Will be used within the decision center • Routing – Will be used within the Command center (when messages are sent to pentagon) • Data Transformation – adaption between incompatible data and interface models of legacy systems and modern Government standards (e.g. NIEM) • SOAP Transport Mediation – between JMS and others • Asynchronous messaging –used throughout, see flow • Security – used to communicate between centers (command center and decision center). HTTPs and user/pass is OK (WS-Security)

  6. Phase 2 and 3 Components • NIEM – transforming incoming threat message from NIEM standard and send to a control center. • Reliable messaging – this can be used as one of the asynchronous guaranteed delivery mechanisms • Database access – Show as one of the WS endpoints …….

More Related