1 / 32

THROUGH NET CENTRIC OPERATIONS

ENSURING SITUATIONAL AWARENESS. THROUGH NET CENTRIC OPERATIONS.

maggy-howe
Download Presentation

THROUGH NET CENTRIC OPERATIONS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ENSURING SITUATIONAL AWARENESS THROUGH NET CENTRIC OPERATIONS

  2. OVERVIEW1) Wartime Operations & Decision Making2) Imperatives of effective operations3) Situational Awareness: In Context to War4) Network Centric Operations & their Objectives5) A glimpse of Network Centric Operations6) Tenets of NCO7) How NCO Aids SA?8) Challenges in implementation of Net Centric Operations9) Bharat Electronics Limited and Net Centric Operations

  3. WARTIME OPERATIONS & • DECISION MAKING PROCESS Observe Situation (al) awareness (SA) is critical to analyze, predict and perform tasks effectively in a dynamic environment. Orient Act Decide

  4. IMPERATIVES OF EFFECTIVE OPERATION • Seamless and common Situational Awareness for tactical actions by multiple users • High level of planning & coordination for Joint operations • Detailed information of the resources available at hand for disposal for effective operations along with insight into enemies capabilities • Faster response time FUNDAMENTAL REQUIREMENT The right information should be delivered to the right place at the right time.

  5. Definition Situational Awareness is “the perception of elements in the environment within a volume of time and space, the comprehension of their meaning and the projection of their status in the near future”. “Endsley”“ Objective To provide Complete, Accurate, Updated and real time Environmental Perception to facilitate surveillance, planning for effective and efficient offence / defense. SITUATIONAL AWARENESS: IN CONTEXT TO WAR

  6. Joint Directors of Laboratories (JDL) Model Object Refinement LEVEL1 Situation Assessment LEVEL 2 Threat Assessment LEVEL 3 HCI Process Refinement LEVEL 4 DBMS Support Database Fusion Database Pre-processing of Source data Level 0

  7. Joint Directors of Laboratories (JDL) Model SituationAwareness Object Refinement LEVEL1 Situation Assessment LEVEL 2 Threat Assessment LEVEL 3 HCI Process Refinement LEVEL 4 DBMS Support Database Fusion Database Pre-processing of Source data Level 0

  8. CLASSICAL MODEL OF SA SENSORS FEEDBACK EVALUATION OF ACTION ACTION DOMAIN EXPERTISE DYNAMIC INFO REF. FOR SA OVER NETWORK SITUATIONAL AWARENESS LEVEL 3 Projection of future events/status using applications and Information database Decision Making LEVEL2 Comprehension of current situation using applications & persistent information LEVEL1 Perception creation using sensor I/Ps

  9. NETWORK CENTRIC OPERATIONS Network Centric Operations Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war. These terms have been coined in late 1980s and early 1990s. It seeks to translate an information advantage, enabled by information technology, into a competitive advantage through the robust networking of well informed geographically dispersed forces/resources. Objective To enhance combat power by networking sensors, systems, system of systems, decision makers, and shooters to achieve shared situational awareness by effectively linking friendly forces within the battle-space thereby facilitating increase in speed of command, high tempo of operations, greater lethality, increased survivability, and a degree of self-synchronization.

  10. Net Centric Operations:- Primary Focus • Robust and Quality “information sharing” through reliable networking • Enhance “Shared Situational Awareness” through “information sharing” • Increase “Mission Effectiveness” through “Shared Situational Awareness”

  11. Net Centric Operations:- Primary Focus • NCO involves continued development of 2 key capabilities: • Net Centric Infrastructure • Framework for Reliable transport of Data / Information • Bandwidth Allocation • Remote Diagnostics • Security • Network Monitoring and Congestion Control System

  12. Net Centric Operations (NCO) • NCO involves continued development of 2 key capabilities: • Net Centric Information Processing Technology and Exploitation • Air Defence System • Surveillance System • Decision Support System • Combat Management System • Tactical Data Link System

  13. NETWORK CENTRIC OPERATIONS SENSOR LAYER COMMAND & CONTROL ACTOR LAYER

  14. TENETS OF NCO • A robustly networked force improves information sharing. • Information sharing enhances the quality of information and shared situational awareness. • Shared situational awareness enables collaboration and self-synchronization, and enhances sustainability and speed of command. • These, in turn, dramatically increase mission effectiveness

  15. GENERAL MISCONCEPTION The governing principles for a network-centric force have supplanted or are going to replace the time-tested principles of war—mass, objective, offensive, security, economy of force, manoeuvre, unity of command, surprise, simplicity. FACT The governing principles of NCO provide added direction for executing military operations in the Information Age.

  16. Environment with provision for strike, protection and maneuver PHYSICAL DOMAIN Information gathering and processing NCW SOCIAL DOMAIN INFORMATION DOMAIN COGNITIVE DOMAIN Command to forces viz. Action Decision making on basis of situational awareness

  17. ADVANTAGES

  18. Facilitates INFORMATION SUPERIORITY • Generates information advantage through better timeliness, accuracy, and relevance of information. • • Increase enemy’s information needs, reduce his ability to access information, and raise his uncertainty. • • Assure our own information access through a well networked and interoperable force and protection of our information systems, including sensor systems. • • Decrease our own information needs, especially in volume, by increasing our ability to exploit all of our collectors.

  19. Facilitates SHARED AWARENESS

  20. Fosters SPEED OF COMMAND & DECISION MAKING Recognize an information advantage and convert it into a competitive advantage by creating processes and procedures otherwise impossible (within prudent risk). This is facilitated by AD missions packages such as Surveillance, Identification, Threat Evaluation followed by Weapon Assignment and Mission Engagement viz. Interception. • Through battlefield innovation and adaptation, compress decision timelines to turn information advantage into decision superiority and decisive effects with fast communication and dissemination of information over the backbone “The network” . ROBUST NETWORK Risk Management Interoperable Infrastructure Centralized Management Packets Cycle-time configuration High Bandwidth Real-time Collaboration Dynamic Security

  21. Fosters SELF SYNCHRONIZATION AND CO-ORDINATION Increase the opportunity for low-level forces to operate nearly autonomously and to re-task themselves through exploitation of shared awareness and the commander’s intent. SITUATIONAL AWARENESS @ C&C CENTRE WITH ISSUE OF COMMAND COMMAND

  22. Facilitates Deeper Insight Expand use of deployable, distributed, and networked sensors, both distant and proximate, that detect actionable information on items of interest at operationally relevant ranges to achieve decisive effects. • • Leverage increasingly persistent intelligence, surveillance, and reconnaissance (ISR). • • Use sensors as a manoeuvre element to gain and maintain information superiority. • • Exploit sensors as a deterrent when employed visibly as part of an overt display of intent. • • Enable every weapon platform to be a sensor, from the individual soldier to a satellite.

  23. Facilitates High level of Impact Assessment, Re-planning and Action Exploit the principles of high-quality shared awareness, dynamic self-synchronization, dispersed and de-massed forces, deep sensor reach, compressed operations and levels of war, and rapid speed of command to enable the joint force to swiftly identify, adapt to, and change an opponent’s operating context to one’s advantage.

  24. CHALLENGES • Technical Limitation (Need for seamless connectivity and bandwidth) • Operational Limitation (Interpretation of abundant data and information) • Strategic Limitation • Cultural Limitations • Training • Doctrine • Leadership • Intelligence • Networked Coalitions • Acquisition Reforms

  25. BHARAT ELECTRONICS LIMITED & NETWORK CENTRIC SYSTEMS

  26. BEL CAPABILITIES GIS Based Advanced Displays & HMI Tracking & Data Fusion Sensor Management Surveillance Scalability Multi-tier Information Flow Combat Management Threat Evaluation Record & Replay Operational Monitoring Technical Monitoring with network management and remote diagnostics Use of Open Standards & Technology Online Composite Situation Picture Management & Calibration System Interception Enhanced Storage Capacity Identification Asset Planning Decision Support System State-of-art Hardware Multi-Platform Persistent Database with online replication Persistent Database with online replication Intelligence Weapon Assignment Disaster Management along with fault tolerance Disaster Management along with fault tolerance Domain Expertise Domain Expertise Integration With Legacy Systems Error Logging Intelligence CRM and help desk support Mission Report Web based Interoperability Automated event archiving Op Environment Sim Centralized Authentication Recovery

  27. ADVANTAGES WITH BEL • Experienced in development & integration of variety of sensors (ground based to air-borne, mobile to static) with it’s Command & Control Systems due to the core strength in engineering capabilities • Knowledge of state-of-art COTS hardware, its evaluation and integration of hardware with in-house developed application software • BEL has a well established selection, evaluation & procurement procedure for purchase part (servers, workstations, LAN switches, communication cables, OFCs, rugged industrial computers, communication systems & other electronic devices) Proven expertise in development of real-time NCO systems based on Artificial Intelligence (AI) & Domain knowledge CONFIDENTIAL

  28. In-depth understanding of mil-grade hardware & hardened software for mil-grade applications • Experience of commissioning a number of turn-key projects for our customers by providing requirement specific solutions involving customization and tailoring based upon our strength in field of mechanical, electronics and software engineering • Knowledge of handling confidential data and algorithms • Relatively low cost of development • Complete Product Life Cycle Support for intended life Annual Press Conference 2009

  29. THANK YOU CONFIDENTIAL

  30. Interoperability: • Inter-networking different platforms (systems) for the Same Service • Inter-networking and sharing noise-less relevant information across services • Identifying which Information possessed by one force is important to others • Team Protocol and Interface to sustain Common Situation Picture • Synchronization • Temporal Synchronization • Handling time-delayed data • Handling “out-of-sequence” data • Technical Challenges in Implementing NCO

  31. Technical Challenges in Implementing NCO • Communication: • Communication Data Rate Requirements • Reduced need for explicit communication • Bandwidth Reduction by Reporting Responsibility assignment • Target Designation to another sensor/system • Shared SA Devices • Shared Display • Shared environment • Shared GIS, maps, charts • Shared Communicating Devices (verbal, non-verbal) • Shared Generation and processing of Quality Parameters • Resolution of Conflicting information / perception

  32. Technical Challenges in Implementing NCO • Sensor Management: • Obtain complimentary, rather than duplicated data • Knowledge base creation and deployment related to Sensor limitation, such as blind zone • Cooperative Sensor report validation by use of Commercial Database to detect anomaly

More Related