Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

Similar documents
Weapon Systems Open Architecture Overview

to-end System Test Architecture

Applying MILS to multicore avionics systems

Data-Centric Architecture for Space Systems

Addressing Complexity in Connected & Autonomous Vehicles (and in fact everything else )

A Plexos International Network Operating Technology May 2006

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS

The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems

HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008,

<Insert Picture Here> Enterprise Data Management using Grid Technology

MODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <

Reliable UDP (RDP) Transport for CORBA

IEEE C /08

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

Data Acquisition in High Speed Ethernet & Fibre Channel Avionics Systems

Investigation of System Timing Concerns in Embedded Systems: Tool-based Analysis of AADL Models

Chapter 09 Network Protocols

Real-Time CORBA Experiences in an Avionics Domain

WAN Application Infrastructure Fueling Storage Networks

Distributed IMA with TTEthernet

Data Model Considerations for Radar Systems

CCSDS and NASA Standards for Satellite Control Network Interoperability

Communication in Avionics

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

THE INTERNET OF THINGS FOR DEFENSE

Techological Advantages of Mobile IPv6

References. The vision of ambient intelligence. The missing component...

Functional Requirements 10/20/2003. IEEE Working Group on Mobile Broadband Wireless Access <

Introduction to DDS. Brussels, Belgium, June Gerardo Pardo-Castellote, Ph.D. Co-chair OMG DDS SIG

Lecture 04 Introduction: IoT Networking - Part I

Designing High Performance IEC61499 Applications on Top of DDS

Cisco 5921 Embedded Services Router

02 - Distributed Systems

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

02 - Distributed Systems

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

IT4405 Computer Networks (Compulsory)

Cisco 5921 Embedded Services Router

WAN-DDS A wide area data distribution capability

TU Wien. Fault Isolation and Error Containment in the TT-SoC. H. Kopetz. TU Wien. July 2007

Introduction to computer networking

Applying CORBA to embedded time-triggered real-time systems. S. Aslam-Mir (Sam) Principal CORBA Architect Vertel USA

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Data Centers and Cloud Computing

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ

CHALLENGES AND DEVELOPMENTS FOR A DATA CENTRIC AND MICROSERVICE BASED INFRASTRUCTURE FOR BIG DATA AND AI

Homeland Security: Requirements for Installation Security Decision Support Systems. Battle Command Battle Lab Gordon

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UCOS User-Configurable Open System

Janus: A-Cross-Layer Soft Real- Time Architecture for Virtualization

Data Centers and Cloud Computing. Data Centers

Providing Real-Time and Fault Tolerance for CORBA Applications

Deterministic Ethernet & Unified Networking

DRAFT. Dual Time Scale in Factory & Energy Automation. White Paper about Industrial Time Synchronization. (IEEE 802.

The BITX M2M ecosystem. Detailed product sheet

Architectural Principles

Network Working Group. Category: Informational March IPv4 Option for Sender Directed Multi-Destination Delivery

Lecture 3 Protocol Stacks and Layering

Virtualization Benefits IBM Corporation

TASMUS.

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Quality of Service in US Air Force Information Management Systems

Performance assessment of CORBA for the transport of userplane data in future wideband radios. Piya Bhaskar Lockheed Martin

Modeling and Simulation in Support of Network Centric Warfare Analysis

IxChariot. Predict Device and System Performance Under Realistic Load Conditions

Lecture 16: Network Layer Overview, Internet Protocol

for Multi-Services Gateways

ARM Security Solutions and Numonyx Authenticated Flash

CIS 5373 Systems Security

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

TDDD07 Real-time Systems Lecture 10: Wrapping up & Real-time operating systems

Net-centric Characteristics

IBM Bluemix compute capabilities IBM Corporation

Priya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA

Remote Health Monitoring for an Embedded System

Safety and Security for Automotive using Microkernel Technology

Chapter 3 Virtualization Model for Cloud Computing Environment

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

UNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED

SD-WAN Transform Your Agency

Features. HDX WAN optimization. QoS

Mobility Optimized Access Layer

Evaluation of numerical bus systems used in rocket engine test facilities

ArcGIS Server Architecture Considerations. Andrew Sakowicz

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Internet Design Principles and Architecture

DTN Interworking for Future Internet Presented by Chang, Dukhyun

The zenterprise Unified Resource Manager IBM Corporation

GREEN HILLS SOFTWARE: EAL6+ SECURITY FOR MISSION CRITICAL APPLICATIONS

Daedalus/GloMop Architectural Walkthrough

Transcription:

for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com Command and Control Research and Technology Symposium San Diego, CA

NCW as a Hierarchical Control System Monitoring and Control Functions C4ISR, Logistics, etc. Intelligence Functions Abstract Fuse Monitor Assess Abstract, Fuse Information Our & Their Organization Materiel Objectives, Plans The Situation The Physical Environment Direct C2 Functions Plan Direct Act Mission management Collaborate Vehicle & weapons control, etc. for Network-Centric Warfare- 2

Our Focus: Software Infrastructure at the Tactical Level Applications Software Infrastructure Application Services System Services Hardware Software infrastructure: application and system services that provide an execution environment for software applications Tactical level Where the information world meets the physical world Where information-rich applications meet vehicle and weapons control Where communications bandwidth, power, and other resources are at a premium and under enemy attack for Network-Centric Warfare- 3

Challenges Supporting applications with diverse requirements Integrating these applications into a coherent system-ofsystems Incorporating COTS IT components to reduce time to fielding and lifecycle costs for Network-Centric Warfare- 4

Diverse Application Requirements Applications requirements vary widely along several dimensions, yet must integrate or co-exist in the system-of-systems Dimension Span Dependability Timing Workload Workload variability Security Definition Scope of monitoring and control function Level of assurance that functional and performance requirements are met Cycle/response time requirements CPU cycles memory size IO & communications bandwidth Variation in resource requirements over time Authentication, integrity, confidentiality, etc. Vehicle subsystem Vehicle Multi-vehicle Safety critical Mission critical Other Millisec/sec/minute Hard-/soft-/non-RT None/small/large Range for Network-Centric Warfare- 5

Outline Architectural assumptions System integration and resource management Information management Summary for Network-Centric Warfare- 6

Assumed Hardware and Network Architecture General Purpose Processor General Purpose Processor General Purpose Processor Wireless Network Vehicle Gateway e.g. JTRS Vehicle Gateway eg. JTRS Wired Network Vehicle Gateway eg. JTRS Wired Network Wired Network µcontroller µcontroller General Purpose Processor µcontroller µcontroller General Purpose Processor µcontroller µcontroller General Purpose Processor Actuator Actuator Actuator Actuator Control Network Actuator Actuator Control Network Control Network for Network-Centric Warfare- 7

Top-Level Software Decomposition Software Infrastructure Applications Application Services System Services Hardware Applications Implement user-visible components of system functionality Application services Used by multiple applications Are aware of application-specific algorithms and/or data structures Examples Naming services ORB services Information management Workflow management System services Manage computing and communications resources: CPU, memory, communications bandwidth, storage, I/O devices, etc. Are insensitive to applicationspecific algorithms and/or data structures Examples OS services (POSIX) Transport and lower-level communications services (TCP, UDP, IP, IEEE 802.x, etc.) Time service for Network-Centric Warfare- 8

Inter- and Intra-Vehicle Protocol Stacks General- Purpose Processor Vehicle General- Purpose Processor General- Purpose Processor µcontroller Applications Applications Applications Applications Application Services Application Layer Protocols Application Services Application Layer Protocols Application Services Application Layer Protocols Application Services System Services Transport & Network Layer Protocols System Services Transport & Network Layer Protocols System Services System Services Hardware Phys. & Link Router Phys. & Link Hardware Physical & Link Layer Protocols Hardware Physical & Link Layer Protocols Hardware for Network-Centric Warfare- 9

Outline Architectural assumptions System integration and resource management Information management Summary for Network-Centric Warfare- 10

Key Requirements Assure system performance when applications share computing and communications resources Essential for safety- and mission-critical applications Support diverse application requirements in the same system-of-systems Span, dependability, timing, workload, workload variability, etc. Execute COTS applications and application services unmodified (out of the box) Windows, POSIX, Java, etc. Adapt to changing mission goals, system workload, and resource availability for Network-Centric Warfare- 11

Alternatives for Assuring Performance Tweak and test system each time an application is added Adjust execution priorities and cycle times until system works Time consuming and brittle Explicitly manage computing and communications resources Prevent an application s faulty, malicious, or gluttonous behavior from usurping other applications resources Resource management includes: Allocating resources to applications Enforcing allocations Space- and time-partitioned operating system Time-partitioned network Static (design time) or dynamic (run time) for Network-Centric Warfare- 12

Static vs. Dynamic Resource Management Static Resource Management Resources are allocated before the system is fielded Needed for safety- and missioncritical applications Appropriate for lower-level loops: vehicle/weapon control Dynamic Resource Management Resources are reallocated when application workload, resources, or priorities change Needed when application workload and/or resources vary widely and efficient resource utilization is needed Applicable for more dynamic applications, e.g. mission planning for Network-Centric Warfare- 13

Operating System Alternatives A single commercial OS One size doesn t fit all: No single operating environment can support this range of requirements Hard real-time vehicle control vs. mission planning POSIX vs. Win32 API vs. ARINC 653 A single common operating environment specific to military systems One size doesn t fit all Can t execute COTS applications & application services out of the box Conclusions Multiple operating systems required Broadly-accepted APIs are essential Interoperability is essential for Network-Centric Warfare- 14

Time-Space Partitioned Operating Systems Static partitioning for lower-level, safety/mission-critical functions ARINC 653 standard Used for commercial avionics Several COTS implementations LynxOS-178 Green Hills Integrity-178B VxWorks AE653 Limited support for traditional OS services 653+POSIX hybrids Dynamic partitioning for higherlevel monitoring and control functions Linux variants e.g. TimeSys Hypervisor approach multiple operating systems sharing hardware Windows App1 Windows Linux Network App2 Linux Hypervisor ARINC653 App3 App3 App4 Linux for Network-Centric Warfare- 15

Communications Services Vehicle µcontroller µcontroller Actuator General Purpose Processor Actuator Wireless Network Radio Wired Network Control Network Again, one size doesn t fit all Control network for hard RT functions Time-partitioned MIL-STD-1553B, ARINC659, Time-Triggered Protocol (TTP) Assured performance through static allocation Wired intra-vehicle network for soft- and non-rt functions IP over (redundant) Ethernet High, constant available bandwidth Bandwidth allocation possible e.g. AFDX/ARINC 664 Wireless inter-vehicle network Trend is to IPv6 over JTRS Lower, variable end-to-end bandwidth and availability Performance can t be assured in battlefield situations Time partitioning is a major research challenge for Network-Centric Warfare- 16

Dynamic Distributed Multi-Resource Management Especially important for soft-rt, distributed applications A continuing research challenge Requirements Allocate multiple computing and communications resources to applications Adapt to changing mission goals, system workload, and resource availability Recommended approach Applications specify resource needs in terms of QoS ranges Policy specification (tied to mission plan) defines relative importance of competing applications Resource management component Allocates resources within QoS ranges Adjusts allocations as workload, resource availability, policy change for Network-Centric Warfare- 17

Outline Architectural assumptions System integration and resource management Information management Summary for Network-Centric Warfare- 18

Information Management Defined Run-time information management functions Storage Retrieval Search Dissemination Related design-time information modeling functions An essential application service for network-centric monitoring and control functions for Network-Centric Warfare- 19

Key Requirements Interoperability Multiple implementations Multiple types of information Search and access Profiles Effective use of available bandwidth Integration with system resource management Information flow awareness Common format and interpretation of shared information Can t require common software base in a huge system-of-systems Persistent structured Persistent documents, images, etc. Low-volume, time-critical, volatile Find relevant databases and documents Push and pull Define information needs Send only what s needed Avoid duplicate transmission Send incremental updates Adapt to changing information needs, resource availability, mission goals Monitor information delivery effectiveness for Network-Centric Warfare- 20

Information Management Approach Make maximum use of existing standards SQL, X.500/LDAP, FTP, etc. View information dissemination as selective replication State-oriented vs. message-oriented approach Measure Information Quality of Service in terms of replica freshness and accuracy Integrate with distributed resource management Freshness and accuracy requirements translate to bandwidth and delay Adapt replication to available communications resources Shared Information Replication via Asynchronous Messaging Shared Information Information at Node A Information at Node B for Network-Centric Warfare- 21

Summary Extremely diverse application requirements force a mixture of operating systems and network protocols One size does not fit all Broadly-accepted APIs and protocols are essential Manage system resources explicitly Distributed, multi-resource management is a research challenge for Network-Centric Warfare- 22