Algorithm Design for Networked Information Technology Systems

Front Cover
Springer Science & Business Media, 2004 - Computers - 403 pages
0 Reviews

 

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast approaching information age. To date, however, the design and development of NIT systems have been ad hoc and have suffered from a dearth of supporting scientific and theoretical principles.

Algorithm Design for Networked Information Technology Systems presents a scientific theory of NIT systems and logically develops the fundamental principles to help synthesize control and coordination algorithms for these systems. The algorithms described are asynchronous, distributed decision-making (ADDM) algorithms, and their characteristics include correct operation, robustness, reliability, scalability, stability, survivability, and performance. The book explains through case studies the conception, development, experimental testing, validation, and rigorous performance analysis of practical ADDM algorithms for real-world systems from a number of diverse disciplines.

Topics and features:

Develops a logical and practical approach to synthesizing ADDM algorithms for NIT systems

Utilizes a scientific method to address the design & testing of NIT systems

Incorporates case studies to clearly convey principles and real-world applications

Provides a full context for engineers who design, build, deploy, maintain, and refine network-centric systems spanning many human activities

Offers background on core principles underlying the nature of network-centric systems

NIT systems are critical to new information systems and network- or web-connected control systems in all types of organizations. This new monograph is the first to systematically derive a conceptual foundation for NIT systems and fully present an integrated view of the requisite control and coordination (ADDM) algorithms. Practitioners, professionals, and advanced students will find the book an authoritative resource for the design and analysis of NIT systems algorithms.

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

About the author (2004)

Sumit Ghosh is the associate chair for research and graduate programs in the Computer Science and Engineering Department at Arizona State University. Previously, he had been on the faculty at Brown University and has held research positions in private industry. Dr. Ghosh's research has pioneered work in areas such as preemptive semantics for inertial delays in hardware description languages; execution of VHDL models on distributed processors; behavior-level fault modeling; asynchronous distributed fault simulation; timing verification of asynchronous digital designs; deadlock-free distributed discrete event simulation algorithm (YADDES); dynamically reconfigurable computer architectures; and modeling and large-scale simulation of complex real-world systems. Dr. Ghosh's additional contributions include a fundamental framework for network security that has been incorporated into the National Security Agency's Network Rating Model; security on demand in ATM networks; a proposal to integrate the Department of Defense and public ATM network infrastructures; and the synthesis and validation of a comprehensive suite of security attack models for ATM networks. His research is the result of support from the IEEE Foundation, US AFOSR, US Army Research Office, DARPA, Bellcore, NYNEX, National Library of Medicine, NSF, Intel Corp., US Army Research Lab, US Ballistic Missile Defense Organization, National Security Agency, and US Air Force Labs in Rome, New York through Motorola.

Bibliographic information