Network Centric Operations (the GIG’s up!) Network Centric Operations (the (the GIG’s GIG’s up!) up!) Eric Eric Skoog Skoog Director of Engineering Director of Engineering ESC ESC - - 653 653 rd rd ELSW ELSW V0.3: 8 Sep 06 … an Information Age Transformation … an Information Age Transformation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Network Centric Operations(the GIG’s up!)
Network Centric Operations(the (the GIG’sGIG’s up!)up!)
Eric Eric SkoogSkoogDirector of EngineeringDirector of Engineering
ESC ESC -- 653653rdrd ELSWELSW V0.3: 8 Sep 06
… an Information Age Transformation… an Information Age Transformation
Transforming National Defense –Net-Centric Operations
Transforming National Defense Transforming National Defense ––NetNet--Centric OperationsCentric Operations
National Security StrategyNational Security StrategyTransform America’s national security institutions to meet the challenges and opportunities of the twenty-first century.
National Defense StrategyNational Defense StrategyWe will conduct networknetwork--centriccentric operationsoperations with compatible information and communications systems, usable data, and flexible operational constructs.
Beyond battlefield applications, a a networknetwork--centriccentricforceforce can increase efficiency and effectiveness across defense operations, intelligence functions, and business processes...
Transforming to a a networknetwork--centriccentric forceforce requires fundamental changes in process, policy, and culture.
National Military StrategyNational Military Strategy...creation of a collaborative information environment that facilitates information sharinginformation sharing, effective synergistic planning, and execution of simultaneous, overlapping operations... on demand to defense policymakers, warfighters and support personnel.
Net Centric Operations(an emerging operational concept)Net Centric OperationsNet Centric Operations
Creates an Information AdvantageInformation Advantage andtranslates it into a decisive Warfighting Warfighting Advantage Advantage
Information AdvantageInformation Advantage - enabled by robust networkingnetworking of well informed geographically dispersed forces characterized by:
Information sharingShared situational awarenessKnowledge of commander’s intent
WarfightingWarfighting AdvantageAdvantage -- exploits behavioral change and new doctrine to enable:• Self-synchronization• Speed of command• Increased combat power
A Military Transformational Response to the Information Age
so along came Tactical DATA Link (TDL) Networks (particularly JTIDS)so along came Tactical so along came Tactical DATADATA Link Link (TDL) Networks (TDL) Networks (particularly JTIDS)(particularly JTIDS)
E-3 AWACS Block
F-15E
E-8 Joint STARS
U.S. AIR FORCE
JS
LINK 16
And the combat multiplying power of And the combat multiplying power of (many(many--toto--many) networked assets many) networked assets
started to be revealedstarted to be revealed
Networked Mission Assets(the “N” in NCO)
Networked Mission AssetsNetworked Mission Assets(the “N” in NCO)(the “N” in NCO)
NETWORKING ASSETS NETWORKING ASSETS EXTENDS SINGLE SHIP EXTENDS SINGLE SHIP
via mutual support capabilities, i.e.,via mutual support capabilities, i.e.,(1) System function backup/substitution(2) New operationally collaborative, innovative capabilities
U.S. AIR FORCE
JS
U.S. AIR FORCE
JS
NETWORKED MISSION ASSETS
“The space and air network will leverage evolving technologies and bring about the NETWORKNETWORK--CENTRIC OPERATIONSCENTRIC OPERATIONS
capabilities of INTERNETINTERNET--PROTOCOL BASED PROTOCOL BASED NETWORKsNETWORKs to overcome the current challenge of making the information
exchange between platforms completely interoperable without degrading performance.”
General John P. Jumper (former AF Chief of Staff)
The Quest for “Enhanced” Networks
The Quest for The Quest for “Enhanced” Networks“Enhanced” Networks
“The key to achieving information superiority is developing a robust SPACE & AIR NETWORKSPACE & AIR NETWORK
that provides connectivity to network-enabled platforms, fused
intelligence, and real-time command and control.” AF POSTURE STATEMENT TO SENATE
ARMED SERVICES COMMITTEE (10 FEB 05)
0
500
1 4 7 10
Sarnoff’s (N Linear)
11
N
Valu
e
3 Network Value Models
Networks: How does their Value Scale?Networks: How does their Value Scale?Networks: How does their Value Scale?
Metcalf’s (N2 Squared)
22
Reed’s (2N Exponential)
33
aN
bNbN22
c2N
The Result?The Result?Undoubtedly, Undoubtedly, NetCentricNetCentric OperationsOperations
extended to the tactical edge willextended to the tactical edge willsupport the first line of defensesupport the first line of defense
(e.g., the guy in the tank and Battlefield Airmen!)(e.g., the guy in the tank and Battlefield Airmen!)
BUT WHAT ABOUT AFFORDABILITY?BUT WHAT ABOUT AFFORDABILITY?
d o t d o t MM l p fl p f
DOTMLPF (does the “M” stand for MONEY?)
DOTDOTMMLPF LPF (does the (does the “M”“M” stand for MONEY?)stand for MONEY?)
VALUEVALUE: we are just now beginning to understand the full dynamics and value of ‘networking’ and netcentric operations
SPEEDSPEED: where netCentric-based capabilities prevail, information latency will be reduced, ‘dots will be connected faster’ and organizations will become more agile
COMMAND & CONTROLCOMMAND & CONTROL: netCentric-based capabilities will be used to facilitate leaderships’ proactive vision and cognition while concurrently supporting autonomy
SHARED SERVICESSHARED SERVICES: there is a metamorphosis taking place today, as stovepipes are broken down into manageable capabilities that areprovided to downstream consumers; facilitating more effective portfolio management of the enterprise
MARKETSHAREMARKETSHARE: may erode in the short term for some companies by competing solutions that introduce netCentric capabilities.
Summary: ESC..Summary: ESC..Summary: ESC..
Is Is commitedcommited to building netto building net--centric centric systems affordably & efficientlysystems affordably & efficiently
Has established a Strategic Technical Plan Has established a Strategic Technical Plan (STP) to define the architectural approach(STP) to define the architectural approach
Has generated Has generated NetCentricNetCentric Enterprise Enterprise Solutions for Interoperability (NESI) Solutions for Interoperability (NESI) documentation to provide documentation to provide NetCentricNetCentricimplementation guidanceimplementation guidance
= a concept of military combat and support operations where Information Superiority leads to military victory and is achieved through the timely integration of finder,
decider and shooter information and decision making.
The RESULT Improved Shared AwarenessIncreased Speed of CommandHigher OPSTEMPOGreater Precision and therefore leathalityIncreased SurvivabilityReduced FratricideUnaided Self Synchronization
i.e., INCREASED COMBAT POWER
Network Centric Warfare (NCW) NCO in Wartime
Network Centric Warfare (NCW) NCO in Wartime
Netted force
The “Big 5” Programs
1. GIG Bandwidth Expansion2. Joint Tactical Radio System3. Transformational Satellite4. Information Assurance5. Net Centric Enterprise Svcs
The “Big 5” ProgramsThe “Big 5” Programs
1.1. GIG Bandwidth ExpansionGIG Bandwidth Expansion2.2. Joint Tactical Radio SystemJoint Tactical Radio System3.3. Transformational SatelliteTransformational Satellite4.4. Information AssuranceInformation Assurance5.5. Net Centric Enterprise Net Centric Enterprise SvcsSvcs
Working hard to Network the ForceWorking hard to Working hard to
Network the ForceNetwork the Force
Networking the Force via mandated systems?Networking the Force Networking the Force
via mandated systems?via mandated systems?
Centralized Chain That Can Be Cut or BrokenMultiple “Stovepipe” Comms InfrastructuresTotally Unrestricted InformationTask, Process, Exploit, Disseminate (TPED)Fixed – Domain Specific – SecurityDuplicative Data Entry Best-Time-Possible Hierarchical CommandPush Information OutBandwidth ConstrainedCycle-time in HoursRisk AvoidanceCircuits
Doesn’t MeanDoesn’t MeanMeansMeansRobust Networks Without a Central WeaknessInteroperable Communications InfrastructureMore Information, Gathered in Smarter WaysTask, Post, Process, Use (TPPU)Dynamic – or Situational – SecurityOnly Handle Information Once (OHIO) Real-time CollaborationPull Assured Information DownSecure Bandwidth As NeededCycle-time in SecondsRisk ManagementPackets
Info Storage – equivalent of 800MB per person on earth each yearEmail – 31 B sent daily; expect to double by 2006Instant Messages (IM) – 592B sent daily; expect 1,380B by 2007Wireless Technology – over 1.5B mobile phone users; expected 2+B by 2007Internet – 1B users in 2005; expect 1.35B by 2007
Intelligence Functions; Business Processes – Capabilities Based: Access, Share, Collaborate– Fundamental Changes: Process, Policy, Culture– Emphasis Shift: From moving the user to the data – to moving data to
the user
Connecting People With Information
Defining Net-Centricity
People, processes, and technology working together to enable timely:
– ACCESS to information– SHARING of information– COLLABORATION among those who need
it most
Can Only Be Done on The Net!
Connecting People With Information
Private Sector Support
We continue to need your ideas and initiatives– Most important single thing is for more secure
commercial products, practices and services– But contributions welcome in every area
We need YOU– Help us solve our most pressing IA and technology
issues– Help us excite and attract the needed future talent
Need to bring more youth now into public serviceBaby Boomers beginning to retire
– Help us make this real…all of our futures depend on it