1 / 6

Central Command Station Jumpstart Program: Fleet Under Attack Response Framework

The proposed Central Command Station Jumpstart Program is designed for rapid decision-making during fleet attacks. With incoming threat alerts from Homeland Security and Border Patrol, the program facilitates effective communication through a structured Decision Center and Command Center framework. It employs robust messaging systems, including JMS, SOAP, and NIEM standards for data transformation and routing. Key features include weather threat checks, threat calculation, orchestration of messages, and secure access protocols. This program ensures timely action, coordinating alerts to Joint Forces and the Pentagon for collective response.

wells
Télécharger la présentation

Central Command Station Jumpstart Program: Fleet Under Attack Response Framework

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IONA JUMPSTART PROGRAM

  2. Central Command Station (proposed) Command Center .NET, HTTP or Swing 2. Fleet under Attack What to do? 1. Incoming Entity/Asset’s Locations 2. DECISION CENTER 4. If No Go, alert Joint Forces 3. Go/NO GO Command 4. Pentagon JMS system 3. Mobile Fleet

  3. Alert from Homeland Security Command Center .NET, HTTP or Swing Data transformation Incoming Threat alert A message comes in from Border Patrol that illegal entities exists and are approaching

  4. Decision Center Decision Center Which direction? Threat message CIA Imagery System Java Check Weather threats Go/NO GO Calculate threat’s attack time Check Weather Java Attack Calculation System J2EE Command Center JMS system

  5. Components • Orchestration – Will be used within the decision center • Routing – Will be used within the Command center (when messages are sent to pentagon) • Data Transformation – adaption between incompatible data and interface models of legacy systems and modern Government standards (e.g. NIEM) • SOAP Transport Mediation – between JMS and others • Asynchronous messaging –used throughout, see flow • Security – used to communicate between centers (command center and decision center). HTTPs and user/pass is OK (WS-Security)

  6. Phase 2 and 3 Components • NIEM – transforming incoming threat message from NIEM standard and send to a control center. • Reliable messaging – this can be used as one of the asynchronous guaranteed delivery mechanisms • Database access – Show as one of the WS endpoints …….

More Related