FREE ELECTRONIC LIBRARY - Dissertations, online materials

Pages:     | 1 |   ...   | 22 | 23 || 25 |


-- [ Page 24 ] --

Interoperability in the Information Architecture " Interoperability is not possible without Use of Common Standards for the waveform and physical layers of information systems

- Use of Common Data Definitions Use of common interpretation

C41FIW will not come true until:

Base-level information infrastructures of the Services use interchangeable components and standard data elements Command and control systems are built to the same common operating environment and use standard data elements FigureD-13 We recommend that on a regular and "no notice" basis the Joint Chiefs of Staff should call, through Atlantic Command, "live" equipment configuration tests with "Joint" referees where the Services demonstrate that forces can talk to each other in command and control and in all the supporting 'ilities." This is the only way to ensure we have forces that are adaptable and can be rapidly configured into a Joint Task Force to answer short notice national security challenges.

We wholeheartedly support the policy outlined in the Secretary of Defense memorandum "Specifications & Standards - A New Way of Doing Business," dated June 29, 1994.

This reform of the acquisition process will yield significant economic benefit.

owever. we have painfully learned that the easy flow of information within and between the various weapons, intelligence, and support activities of the Department is hindered when private and proprietary data elements, style guides, mapping symbols, and other information artifacts are allowed into the Defense information infrastructure. This propagates the modern Tower of Babel and operating inefficiencies to include fratricide - adding a note of caution (see Figure D-14).

It is important to ensure the policies outlined in the 29 June memorandum are not interpreted to undercut the policies contained in DoD Directives 8000.1, Information Management;

8320.1, DoD Data Administration; and 4630.5, Compatibility, Interoperability, and Integration of Command, Control, Communications and Intelligemce (C31) Systems.

Sndfications and Stanards " Policy: Greater use of performance and commercial specifications and standards

- Secrecary of Defense memorandum June 29,1994 "* Caution: To ensure interoperability, data element standardization, Federal Information Processing Standards, and the DoD Technical Architectural Framework for Information Management must be retained and followed.

We should use commercial information technology But we must retain our own language

–  –  –

Technolony Status and Trends "* Current Status of Information Systems:

- Rapid growth in capabilities including processors, displays, man-machine interfaces, COTS software, databases, communications, and networks High cost of maintaining legacy systems Continuing pressure for decreasing DoD budgets

- Procurement constraints make acquisition and development difficult "* Technology Trends:

- Distributed systems will continue to drive market and availability

- Open software will provide system portability

- Systems will be faster, more efficient; parallel processor workstations will improve throughput

- Software solutions will focus on ameliorating network & I/0 bottlenecks

- Greatly expanded capabilities will become available for capturing, processing, displaying, storing, and retrieving huge volumes of information

- Greatly enhanced multi-media user interface capability will become available with faster processors and improved algorithms

- Rapid development will replace rapid prototyping * System Development Trends:

- Software development cycles will continue to be under two years

- Current, established technology and fielded systems will continue to provide a base to promote quick buildup and integration will build on current distributed architecture systems which continue to


–  –  –

Technology Thrusts 5.2 It is clear from the status and trends above that DoD needs to aggressively refocus

investment in:

" Unique military-value-added offensive and defensive technologies to assure we exploit commercial systems better than our adversaries for data certainty and for information warfare, both offensive and defensive;

"* Rapid test tools development;

"* Architecture case tool development; and "* First principles technology for C41 architectures.

Some of the more relevant key technology drivers are listed in Figure D-16.

–  –  –


5.3 Forefront Technologies Applicable forefront technologies include computing hardware, telecommunications hardware, and software. Among the technologies listed in Figure D-17, a few key technologies can be identified that are sufficiently mature to be integrated in the near term and which will play an important role in making C4I For The Warrior faster, cheaper, better.

Forefront Technoloi'es "* Broadband, high gain, light weight and electronically steerable antenna that can access multiple satellites simultaneously "* Personal computing (emphasis on wireless - Laptops to Newtons, Dick Tracy radios) * Gigabyte/terabyte networks * Databases with large heterogeneous data items (e.g., mixing data, text, images, etc.) * Wireless telecommunications * Software testing (+ performance evaluation) Distributed simulation systems M * Distributed computing - maintaining information consistency * Parallel and distributed algorithms * Data compression * Human factors/human interfaces/visualization * Language translation * Optical storage devices (particularly tape) * etc.

FigureD-17 The U.S. is world leader in forefront technology for C4I. However, these technologies have not been exploited for battlefield use. The problem in many cases is not technology development; it is adopting the technology that has been developed. Several factors have

inhibited integration of these forefront technologies into the DoD infrastructure:

"* Risk-averse procurement process;

"* Large capital investment in legacy stovepipe systems, need for backward compatibility;

"* Need for defense specific systems - inhibits off-the-shelf purchasing (DoD suppliers are typically not at the forefront); and " Large size and widespread distribution of the software and hardware systems.

D-22 As a specific example, the advent of commercial space systems, with reductions in the cost to use commercial space services, is bringing about a potential revolution in commercial communications, navigation, imagery and environmental services. The day of the Dick Tracy wrist radio is not that far in the future. Whether there are ROCS, SONS or MENS will not matter if and when the GLOBALSTARS, IRIDIUMS, DBSs, WORLDVIEWs and EYEGLASSES (projected commercial imagery systems) are on orbit for ad hoc JTF commanders and CINCs to use to provide connectivity and information for the battlefield in a crisis or contingency - if the need is there they will buy and use the service. The proliferation of commercial GPS receivers by caring and concerned mothers and fathers to their sons in battle in Desert Storm is a graphic example of just that. The challenge again is that in the age of offensive and defensive Information Warfare, as well as use of Information in Warfare to attain and maintain information dominance of the battlefield, dependence on this kind of commercial capability might well result in its denial to those who will try to depend on these services in time of stress. As is well known from Desert Shield/Desert Storm, over 80% of our communications satellite use was through commercial capability and well over 3/4 of our airlift was from the commercial reserve airlift fleet and commercial systems. Just as the DoD determined many years ago that our needs for airlift in contingency and crisis would far exceed our military capacity, and established contracts with the airlines to provide unique military value added capability through commercial aircraft and systems for such contingencies, it would seem wise for the DoD to make prioritized choices for unique military value added investments in space-based commercial and federal government civil imagery, navigation, environmental, and communications systems. We need to do this to both enhance their utility to our warriors in time of need, as well as to potentially deny those capabilities to our adversaries during those times.

It is strongly recommended that the Battlefield Information Task Force initiate examination of dramatically expanded defense-prioritized requirements and investments leading to more reliable and robust dependency on use of imagery, navigation, environmental and communications information services from commercial and federal civil space-based capabilities, and to allow real time surge in time of need.

5.4 Software Technologies. Software, with a small amount of hardware, can substitute for complete interoperability in many cases (e.g., Internet). Connecti, ty mechanisms include gateways, marriage boxes, common nodes such as satellites, bridging software, standards and protocols. In some cases interfaces of existing elements can be modified to achieve connectivity (as in Desert Shield/Storm). Software can be the intermediary between different security systems. It can seek sources and routes and provide buffering, memory, redialing, etc. Most important, software is the key to what the user sees and hears. With a simple key stroke it can completely

reconfigure a display, fan out whole distributions, reconfigure a network, etc. Software offers:

"* Modularity and reusability (issue is selecting module size; i.e., resolving the twin problems of functional aggregation and partitioning);

"* External simplicity and internal complexity of modules (e.g. object-oriented hidden routines and external control shells);

"* Shared resources used to set up "phantom" or "virtual" capabilities and networks;

"* Interoperability between and among modules (but not necessarily internal to each);

"* Recognition of different architectures for different purposes; and "* Open architectures for C41; i.e., extendibility, expandability, alternate applications.




–  –  –

While the Task Force found no breakthrough R&D efforts, it is clear that since our adversaries have access to the same modem information systems technologies as we, our levo eral or hasmecial technology through unique military value added exploitation and investment in defense-peculiar needs will be critical to attaining and maintaining information dominance of the battlefield. In that light, as is indicated in Figure D-18, two special needs of military information systems relate to enhanced reconfigurability and information and information systems protection. Commercial systems are designed to work in relatively static locations, with predictable communications and repeatable information needs. Military scenarios are too divers ae ade a system designet under these assumptions acceptable. While the commercial world has security concerns, most advancedccess to information.

The military has this concern plus the possibility for network disruption. In addition, the mobiliation of military systems complicates the ability to authenticate users and their uses of systems.

There are three factors that should differentiate U.S. military information systems from those of a capable adversary: sensors, ability to reconfigure under stress, and ability to conduct information warfare. When coupled with advanced U.S. simulation capability, the warfighter can develop and tune the skills and techniques necessary to establish and preserve a competitive edge in dynamically managing information system reconfiguration.

Enhanced Reconfigurability and Information and Information Systems Protection are improved by leveraging commercial and/or DoD technologies. Supporting technologies for Enhanced Reconfigurability are categorized as Joint Battlespace Modeling & Simulation Environment, Information Assimilation and Information Movement. For Information and Information Systems Protection, applicable technologies are categorized as Enterprise Security, NetD-24 work Security and Data Security. Figures D-19 and D-20 provide the specifics on each of these technologies. Note from these figures that the Panel considers it important to leverage current commercial and ongoing DoD efforts in many refocus areas, as well as to initiate more DoD investment where the commercial marketplace does not lead.

6.1 Enhanced Reconfigurability

–  –  –

Figure D-19 The necessity to deal with a wide range of unanticipated crises that involve joint and coalition operations places new requirements on the C4I information systems. These systems must be designed with architectures that facilitate reconfiguration at two levels. First, the systems should be designed to permit new technologies and functionality to be rapidly added to the system. Second, they should permit the warrior to adapt the system to meet unique needs.

Meeting these dual requirements necessitates refocused R&D investment in the three areas described below.

Joint Battlespace Environments. Today's simulation based training systems, planning and collaboration tools, and operational systems have been separately developed and do not interoperate. Additionally, separate communications systems are used to support these applications. Having these separate systems results in a very inefficient use of our resources. More importantly, it deprives the warfighter from using the simulation environment to evaluate new C4I tools and to plan for and rehearse operations using real data and the same information systems that will be used in exercises and combat operations. Technologies needed to support

joint battlespace environments are:

Tools for developing, fielding, and evaluating component syýPms: A great deal of flexibility is needed in the joint battlespace environment to accomr the testing and evaluation of new C4I systemn and software. Tools and methodolob are needed to support the development and fielding systems by assembling components and rapidly tailoring the sf D-25 system to meet specific mission needs. These tools should incorporate performance metrics, help evaluate interoperability, and provide measures of relative operational utility.

Pages:     | 1 |   ...   | 22 | 23 || 25 |

Similar works:

«PROGRAM 3 – SHIFTING NATURE ANNOUNCER Major funding for China From the Inside has been provided by the Corporation For Public Broadcasting. Additional funding is provided by the KQED Campaign for the Future Program Venture Fund; individuals, foundations and corporations committed to the production and acquisition of quality programs; by David and Cecilia Lee, and others a complete list is available from PBS; and by contributions to your PBS station from viewers like you. Thank you. WU...»

«A Guide To Frequently Asked Questions Bicycles and Vehicles BICYCLE & PEDESTRIAN MOVE OVER 3 FEET FOR CYCLISTS Share the Road MOVE OVER FOR CYCLISTS ON MULTI-LANE ROADS Resources For more information on Nevada’s Bicycle Safety and Education Programs, Contact: Nevada Department of Transportation Bicycle and Pedestrian Program (775) 888-RIDE (7433) Cycling In Nevada Nevada is a wonderful place to bicycle. Whether your riding preference is on a roadway or down a dirt trail, Nevada’s wide open...»

«35 Trident – Tony Blair informed the House of Commons in June 2005 that he would ‘listen to Honourable not in our Members before making any decisions on backyard replacing Trident’. In subsequent statements, the government promised to hold a parliamentary debate on the nuclear deterrent’s future. In Blair’s words, this is ‘a huge decision for the country and it will probably be done in a far more open way than decisions that have been William Walker taken before’, [Blair’s...»

«Has Globalization Strengthened South Korea’s National Research System? National and International Dynamics of the Triple Helix of Scientific Co-authorship Relationships in South Korea 1 Ki-Seok Kwon 2, Han Woo Park 3, Minho So 4, and Loet Leydesdorff 5 Abstract We trace the structural patterns of co-authorship between Korean researchers at three institutional types (University, Government, and Industry) and their international partners in terms of the mutual information generated in these...»

«Lazard Investment Funds (the “Company”) Application Form for Individuals (Agent – Permitted Fee RDR) PLEASE COMPLETE THIS FORM CLEARLY USING CAPITAL LETTERS. IT IS IMPORTANT THAT YOU READ THE DECLARATIONS BEFORE SIGNING. PLEASE ALSO READ THE KEY INVESTOR INFORMATION DOCUMENT BEFORE INVESTING. Please complete, sign and return with your cheque to: Lazard Fund Managers Limited, PO Box 364, Darlington, DL1 9RD, Tel 0370 606 6459, Fax 0370 275 0017. Please make cheques payable to: “Lazard...»

«Cyber Security Perspectives Making cyber security a part of a company’s DNA -A set of integrated processes, policies and standards John Suffolk Senior Vice President | Global Cyber Security Officer Huawei Technologies October 2013 Authors This document has been co-authored by numerous excellent colleagues from around the world. My role has been simple: to edit their fine work into a white paper that clearly and consistently communicates Huawei’s position and perspectives on cyber security;...»

«BY-LAWS OF TRINITY EPISCOPAL CHURCH, AMBLER Revised December 14, 2010 ARTICLE 1 Of the Relation of the Corporation to the Episcopal Church and to Diocesan Authority Section 1. This Church acknowledges itself to be a member of, and to belong to, The Episcopal Church of the Diocese of Pennsylvania, and the Episcopal Church in the United States of America. As such, it accedes to, recognizes, and adopts the Constitution, Canons, Doctrines, Discipline, and Worship of the Episcopal Church in the...»

«THE IMPACT OF ORGANIZATIONAL JUSTICE ON ORGANIZATIONAL LOYALTY CONSIDERING THE ROLE OF SPIRITUALITY TRUST VARIABLES (CASE STUDY: SOUTH PARS GAS COMPLEX) Sima Radmanesh South Pars Gas Complex, Iran sima.radmanesh@gmail.com Abstract: The presence of large number of active rival gas companies on Persian Gulf border necessitates the adaptation and implementation of effective employee retention strategies as well as implementation of promoting loyalty and belonging strategies of specialized staffs...»

«CLASSICAL, MEDIEVAL & RENAISSANCE STUDIES Programs & Classes 2016-2017 Student Advising Handbook http://artsandscience.usask.ca/cmrs/ TABLE OF CONTENTS Program Description 2 Courses for 2016/17 10 Core CMRS Courses 15 New Courses and Special Topics Courses 17 Spring/Summer Courses 2016 17 Calendar Descriptions 19 FACULTY ADVISING FOR CMRS STUDENTS   2016-2017 CMRS students continuing their studies next year in Major or Honours programs are required to complete a 2016-2017 student program...»

«Equality and Human Rights Commission Research report 88 Barriers to employment and unfair treatment at work: a quantitative analysis of disabled people’s experiences Nick Coleman, Wendy Sykes, and Carola Groom Independent Social Research Barriers to employment and unfair treatment at work: a quantitative analysis of disabled people’s experiences Research Report no. 88 Nick Coleman, Wendy Sykes, and Carola Groom Independent Social Research © Equality and Human Rights Commission 2013 First...»

«IDENTIFYING RISKS AND SCENARIOS THREATENING THE ORGANIZATION AS AN ENTERPRISE Janey V. Camp1 and Mark D. Abkowitz2 Abstract While risk management has existed for centuries, today it remains a consideration that all too often resides in an organizational silo, associated with planning a new project, evaluating a potential financial investment, complying with new regulations, or responding to a previous incident. Whereas, conceptually it is recognized that risks are inherent within an...»

«FOSTER HANDBOOK Vancouver Orphan Kitten Rescue Association VOKRA Updated April, 2013 VOKRA FOSTER HANDBOOK May 2013 1 TABLE OF CONTENTS Welcome to Fostering! Meet your VOKRA Support Team Taking a Break Preparing to Foster Join our Facebook groups Access the Foster Website Mixing VOKRA kitties with your cat(s) Kitty-proof your home Checklist The Kitties are Coming, the Kitties are Coming! Picking up Kitties Your foster kitty’s “passport” Supplies Medications Where to keep your foster...»

<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.