NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS

Similar documents
MODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE

ASNE BMD PANEL C4I EVOLUTION

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

to-end System Test Architecture

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7

Information Sharing in the GIG Environment and the C2 Perspective

Data and Computer Communications

Electronic and Mission Systems

Raytheon Mission Architecture Program (RayMAP) Topic 1: C2 Concepts, Theory, and Policy Paper #40

Securing Content in the Department of Defense s Global Information Grid

Beyond Web Services A network-centric approach to system design

Introduction to computer networking

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model

Modeling and Simulation in Support of Network Centric Warfare Analysis


UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Command Control and Communications. FY 2011 Total Estimate. FY 2011 OCO Estimate

The Next-Gen ISR Conference brought to you by:

National Policy Governing the Use of High Assurance Internet Protocol Encryptor (HAIPE) Products

SAPR platforms and EW multifunctional technology needs. Sergio Attilio Jesi 18 of June 2015, Rome

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Implementing Net-Centric Tactical Warfare Systems

Fusión de datos. ISR & Data Fusion Capabilities

INFORMATION ASSURANCE DIRECTORATE

GPS OCX BLOCK 1 NETCENTRIC INTERFACES. Walid Al-Masyabi Raytheon Company, Intelligence, Information and Services,

Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..

Network Working Group. Category: Standards Track BBN September 1997

Space Mission Communications Security

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED

Lecture 3. The Network Layer (cont d) Network Layer 1-1

15,000+ Networks, 5 Million+ Users:

BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004

University of San Francisco Course Syllabus and Outline

Executive Summary...1 Chapter 1: Introduction...1

Improving SCADA System Security

Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration

Directed Energy S&T. Challenges Overview. L. Bruce Simpson, SES Director Directed Energy Directorate Kirtland AFB, New Mexico

Date: June 4 th a t 1 4:00 1 7:00

IPV6 SIMPLE SECURITY CAPABILITIES.

System of Systems (SoS) M&S VV&A Decomposition: Integrated System Level VV&A (ISLA)

Can Real-Time Operate in an SOA Environment?

Communication Network Simulations Using OPNET

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Cisco 5921 Embedded Services Router

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Architecture for a Truly Integrated Defense Network

UAVs as Communications Routing Nodes in Network-Centric Warfare

Chapter 2 Advanced TCP/IP

Lab 1: Packet Sniffing and Wireshark

developing Real Time Distributed Simulations NADS Nextel Aerospace, Defence & Security

Net-centric Characteristics

Table 3-1 Joint Staff IPv6 Operational Criteria

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

VoIP / RoIP for Technicians

Fundamentals of Telecommunication Networks (ECP 602)

Vortex OpenSplice. Python DDS Binding

Network Security. Thierry Sans

The Literature: Self-Synchronization and Shared Awareness

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

ETSF10 Internet Protocols Transport Layer Protocols

The Net-Enabled Future:

RECONFIGURABLE C3 SIMULATION FRAMEWORK: INTEROPERATION BETWEEN C2 AND COMMUNICATION SIMULATORS. Bong Gu Kang Tag Gon Kim

IPv6: An Introduction

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Joint Tactical Information Distribution System (JTIDS) FY 2013 OCO

IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007

Internet Security: Firewall

Development of MF-TDMA based Satellite Network System Simulation Model

Lecture 2. Computer Networks Models. Network Models 1-1

Multimedia Networking

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Seamless Situational Awareness

Department of Defense INSTRUCTION

Introduction. Goal of This Book. Audience for This Book

Hands-On TCP/IP Networking

University of Southern California EE450: Introduction to Computer Networks

IPv6 and New Security Paradigm

DARPA Initiatives. Preston Marshall DARPA ATO Program Manager. next Generation (XG) Communications Connectionless Networking (CN)

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

QoS Architecture for Tactical Networks

Beyond Technical Interoperability

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Scope and Sequence: CCNA Discovery

Novell TCP IP for Networking Professionals.

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Network Mission Assurance Phoenix Challenge 2002 Conference

CS 204: Advanced Computer Networks

Cisco RV180 VPN Router

INFORMATION ASSURANCE DIRECTORATE

8th International. Command and Control Research and Technology Symposium

Lecture 8. Network Layer (cont d) Network Layer 1-1

McAfee Network Security Platform 8.1

Communication Networks

Future Implications of IPv6 Accessorizing IPv6

Weapon Systems Open Architecture Overview

Transcription:

2005 International Command and Control Research and Technology Symposium The Future of Command and Control NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS June 2005 Jim Walsh, Jeff Roberts, Wayne Thompson SPARTA, Inc. 4901 Corporate Drive NW Ste 102 Huntsville, AL 35805-6208 (256) 837-5282, X1203 jim.walsh@sparta.com ltl_01

Introduction Purpose: Describe the Current Capabilities of Our NCW IRAD Program (NESTOR) in the Area of End-to-End Modeling Illustrate NCW Operations on the GIG Solicit Feedback on Future Direction NESTOR is Net-Centric Environment for System Testing and Operational Research SPARTA s Distributed Testbed for the Design, Implementation and Quantitative Evaluation of» NCW Concepts» NCW Infrastructure SPARTA s scale-model of the GIG ltl_02

NCW End-to to-end (NETE) Model NETE Models: GIG Transport Backbone GIG Enterprise Services Joint C2 Sensor-to-Shooter NETE is a Discrete Event Simulation Model Developed Using EXTEND: A GIG System Engineering Tool Examines NCW CONOPS Models NCES Processes Supports Agent/Algorithm Development in Areas Such as Fusion, QoS and IA ltl_03

NETE Model (Homeland Defense Scenario) Packets This Global C2 Node is Connected to IP Network Supported by TSAT. Delay Time, & Throughput Indicates Network Power ltl_04

NETE Model (Force Protection Scenario) Model predicts message delays vs war time and threat load. 14 13 12 11 10 9 8 40 7 6 5 4 3 20 2 1 0 5 35 30 25 15 10 Objects In Track TSATs link widely dispersed Theater BMD Elements. Delay (s) Round-Trip Transmission Delay (From DUR to Receipt of J3.6 w ith Covariance) 0 0 100 200 300 400 500 600 700 800 900 1000 War Tim e (s ) US Aegi s Japan Aegi s Link-16 and JTIDS Range Extension Support BMD Mission THAAD FBX-T 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 Obj ects 40 35 30 25 20 15 10 Objects In Track Delay (s) T ransmissio n D elay - (F ro m T ransmissio n to R eceipt o f J3.6 witho ut C o variance) 5 0 0 100 200 300 400 500 600 700 800 900 1000 War Tim e (s ) ltl_05

NETE is a Mission Level Model, Supported by Engagement, SE and Physics Modeling M&S Primary Uses: M&S Tools for Allocating Operational & System Requirements to Elements Must Support Design Trades Models For Performance Analysis with respect to KPPs and related MOEs and MOPs Must Show Military Utility of the Network & C4ISR Elements SEAS Campaign NETE Mission MOOSE EXTEND Engagement ENG Increasing Increasing Abstraction Abstraction Levels Levels of of Abstraction Abstraction Increasing Increasing Fidelity/Complexity Fidelity/Complexity Models appropriate for incorporation in Real-Time, System-Level Federated Live-Virtual-Constructive environments Must Support: Exercises; User Evaluation; Training OPNET UML System Engineering CERA CAPS Physics-Based Modeling Radar Basing Opt ltl_06

EXTEND OPNET Tool Relationship EXTEND TM EXTEND End-to-End Model Represents: CONOPS/C2BM Processes Comm Nets Sensor Platforms Weapon Platforms GIG BE Comprehensive but Medium Fidelity High fidelity representation of Comm Networks OPNET Model Represents: Networks Protocols Stacks Net Management RF Propagation EXTEND describes the C4ISR concept in the operational context and provides CONOPS/C2BM Processes & Elements to OPNET OPNET TM ltl_07

OPNET EXTEND Tool Relationship EXTEND TM EXTEND End-to-End Model Represents: CONOPS/C2BM Processes FCS and Joint Interoperability Comm Nets Sensor Platforms Weapon Platforms JTRS Network OPNET TM OPNET Model Represents: 3D Visualization Terrain Interference Masking RF Propagation OPNET Provides Higher Fidelity Network Assessment And Parameters For EXTEND COMM Model To Use In End-to-end Analysis And Assessment ltl_08

Global C2 Node: Model Drill Down TCP/IP Model Router Model Separate TCP and IP processing: Modular design permits easy integration of additional Comm protocols (e.g. UDP) as they are built ltl_09

NETE: Router Model Current Router Capability IPv6 Headers IPv6 packet processing Upgraded Network Identification Method Makes for easy Plug-And- Play construction of network models. Planned Router Upgrades Dynamically constructed routing tables Based on presence of network participants Will require inter-router com and additional processing logic. Dynamic message routing based on route availability & loading Will require inter-router com and additional processing logic. Adjusting Parameters Allows Representation of Alternative Routers ltl_010

NETE: Communication Processing Hi fidelity representation of handshaking protocols Link initiation Link termination ltl_011

NETE Status and Plans Function Current Capability Future Capability IP Routers TCP/IPv4, IPv6 (selectable), Link-16 Parametric Router UDP; Multicast Contingency Routing Transport Layer SAT COMM EXTEND FTP Import/Export Feature (Off-Line use of CERA and Real Time Access to CERA Server using SOAP) Use of CERA for Dynamic Satellite Coverage and Routing Function Current Capability Future Capability Sensor/ Weapon Element Sensor Weapon UAV Waypoints; Simple Sensor Representation (Probabilistic); Import Sensor and Events From Off-Line Models CAP Station; Import Weapon and Events From Off-Line Models Simple Process with Delays and Pk Draw Incorporate Simple Imagery and Radar Models; Tracking Math Model Decision Architecture to Develop Weapon Policy Geo Reference/ Math Models Coordinate Transforms; Math/Vector/Matrix Routines; Internal FOV, Line of Sight Models; Threat Objects Carry Signature; Environment Models (Simple) ltl_012

Function NETE Status and Plans Enterprise Services Current Capability Future Capability Information Distribution Scripted Publish- Subscribe; Developed Off-line CID VOI Model Incorporate VOI as Smart Pull Mechanism Information Assurance (IA) Scripted Net Attack Incorporate GSAKMP for Group Security Key Management Quality of Service (QoS) Trades to Understand Quality of Service Capability/Issues QoS Monitoring/Algorithms C2BM Function Current Capability Future Capability Sensor Management Scripted Trigger Events Cause Sensor Tasking; Integrated BBN for VOI Based Tasking Decision Architecture Approach- Sensor Policy Generation Weapon Management Engagement Events (Available Battle Space) Internally Derived Ditto for Weapon Policy Generation Fusion CID Fusion Model (Integrated NETE with BBN Modeling Environment- NETICA) Decision Architecture Performs Levels 1-4 Fusion (Focus on 1 and 4); Includes CID Fusion ltl_013

EXTEND Catalog ltl_014

NETE Summary Current Library of Model (Blocks) Supports Many Relevant Mission Areas in NCW Force Application: Sensors, Weapons and Networks for Strike Force Protection: C2BMC Timeline for Missile Defense Intelligence: Collectors (Surface, Air and Space), Messaging Routing and End-User Receipt GIG Core Services: Transformational Comms, IA, Messaging, Discovery Additional Fidelity Being Added to NETE in CY05 Modular IP: UDP TMOS: TSAT; Policy Based Network Management; QoS/VOI Fusion/Decision Architecture Integration Continue Development:» Discovery and Interface with Agents (Discovery/VOI)» Physics-Based Sensor Interface (CERA)» Information Assurance (IA) with Firewalls, IPSEC-IP, IDS ltl_015