slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Army Netcentric Warfare PowerPoint Presentation
Download Presentation
Army Netcentric Warfare

Loading in 2 Seconds...

play fullscreen
1 / 15

Army Netcentric Warfare - PowerPoint PPT Presentation


  • 131 Views
  • Uploaded on

U.S. Army Research Laboratory. Army Netcentric Warfare. Dr John W. Gowens II Director Computational and Information Sciences Directorate. XXXX. XXX. XX. X. Best global knowledge Worst local knowledge.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Army Netcentric Warfare' - marcy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

U.S. Army Research Laboratory

Army

Netcentric

Warfare

Dr John W. Gowens II

Director

Computational and Information Sciences

Directorate

slide2

XXXX

XXX

XX

X

Best global knowledge

Worst local knowledge

New technologies are needed to enable information exchange between the local and global worlds

ES2

Every Soldier is a Sensor

Currently provides limited reporting capability from the soldier in

the field

  • Global/Local Interactions
  • Cross-Domain Tactical Gateway
  • Distributed Dynamic Processing
  • Signal Processingfor Communications
  • Secure Networking
  • Sensor Communications

Best local knowledge

Worst global knowledge

slide3

Language

Translation

Multi-media

Reports

IMINT

SIGINT

MASINT

HUMINT

Sensors

Intelligent Filters

Reliable Network

Reasonable Bandwidth

Time Sensitivity

Limited Bandwidth

Time Critical

Global Services

Local Services

Transformation

Correlation

Prediction

Visualization

Fusion

Visualization

Correlation

Prediction

Fusion

CDIX

Local/Global Interactions

  • Global assets tipping local assets
  • Local Assets filling in the gaps for global assets
  • Local/Global monitoring to detect plan/operation deviation
  • Refining Global information to relevant local events
  • Inferencing behaviors to provide explanation and assessment through narratives
  • Pusher and Catcher on each side of the Cross Domain Solution
slide4

Local (Dismounted) Fusion

Global Fusion

  • Local node pulls information from global node to help plan next mission
  • Local node fuses global pull with their organic sensors to develop better Sit Awareness
  • Local node pushes critical information to global node
  • Local node has similarinteractions with adjacent local nodes
  • Global node supports the pull of information relevant to the needs of the local node to complete analysis
  • Global node fuses filtered information coming up from local node into its own information base

Organic Sensors

Soldiers

LOCAL

FUSION

GLOBAL / LOCAL

FUSION

Fusion Node

FCS/DCGS-A

LOCAL / LOCAL

FUSION

LOCAL / GLOBAL

FUSION

Soldiers

Fusion Node

UA/UE Organic

Theater/National

C2

Organic Sensors

Protecting the force from imminent threatsthrough interactive and automated fusion of networked local and global information sources

slide5

14

3

13

12

11

8

9

10

7

6

5

4

1

2

Digitally sign using unclass DoD PKI cert

Provide data to SIPRNET via Web Services

Detect and reject malicious code

Detect and screen mobile code

Apply meta tags

Store data for secret use

Verify meta tags

Verify unclass digital signature

Verify SIPRNET digital signature

Store for unclassified use

Transfer across boundary

Detect and reject malicious code

Digitally sign using SIPRNET PKI cert

Detect and screen mobile code

Cross-domain Tactical Gateway

  • Innovative Cross Domain Solution (Unclassified to Secret - IATO Approval)
  • Human in the loop (Secret to Unclassified)
  • Pusher and Catcher on each side of the Cross Domain

SIPRNET

ARL’s CDIX SolutionUNCLASSIFIED to SECRET

Global

Fusion

Services

Long Haul

Network

Soldiers

Tactical Secure Mobile Network

Local Fusion Services

Secret TG Processing

Catcher

Pusher

Unclassified TG Processing

CDIX Solution/Data Diode

VSAT Terminal

Tactical Gateway

Sensors

Unclassified Environment

Classified Environment

slide6

Unreliable

Intermittent

Reliable

  • Automated Discovery and Multiple Protocol Support (TCP UDP RUDP)
  • Bandwidth Management
  • Adaptive Quality of Service
  • Tactical Network Resiliency
    • Topological Changes
    • Intermittent Connectivity
    • Availability
  • Connectivity Maintenance and Visualization
  • Web Services where Appropriate
    • Periphery of System
    • Bridge to Reliable Commercial Network Infrastructure

Distributed Dynamic Processing

Managing the collection, flow and processing of battlefield information across a dynamic, unreliable, intermittent, and limited bandwidth tactical network

slide7

Tactical Communications and Networks

Self-configuring wireless network technologies that enable secure, scalable, energy-efficient, and survivable mobile and sensor networks.

Wireless Network

Testbed

Signal Processingfor Communications

  • Multi-Input Multi-Output (MIMO)
  • Multi-Carrier Waveforms
  • Ultra Wideband Communications
  • Cross-Layer Designs
  • Non-Cooperative Signal Processing

Secure Networking

  • Intrusion Detection for MANETs
  • Secure Network Emulation and Performance Analysis
  • Mobile Ad Hoc (MANET) Routing
  • Autoconfiguring Networks

Sensor Communications

  • The Blue Radio, energy-efficient communications for unattended sensor nodes
  • Low Power RF and Fast Acquisition Modem
  • Energy-Efficient, Secure Ad Hoc Routing
  • Energy-Efficient Medium Access Control Protocols
slide9

Secure Networking

Mobile tactical networks that are highly mobile, efficient, self-configuring, survivable, and secure.

Challenges

  • Highly dynamicnetworks with mobile nodes and mobile networking infrastructure
  • Limited bandwidth and resources
  • No concentration points where traffic can be analyzed
  • Cannot rely on centralized network or security services
  • Intermittent connectivity, noisy wireless channels, congestion

Approach

  • Mobile ad hoc (MANET) networking and autoconfiguration protocols
  • Intrusion detection/localization for network infrastructure protocols
  • Emulation environment where performance characteristics of secure networking is assessed in realistic mobile scenarios
slide10

INFORMATION ASSURANCE

Intrusion Detection

  • Challenges
  • Lack of single good location to monitor network traffic- topology changes, broadcast nature of wireless
  • Wireless medium unreliable- intermittent connectivity, packets loss, noise
  • Limited bandwidth –cannot exchange large volumes of intrusion detection data over many hops
  • Commercial wired network detection technology won’t work
  • Approach
  • Initial focus on Cooperative Intrusion Detection Hierarchy Technique
  • Each node has basic capability to detect and report on any unusual network activity.
  • Next higher level node aggregates data from multiple nodes to confirm unusual activity and passes findings on.
  • Nodes higher in hierarchy further aggregate data, determine if activity crosses threshold, and disseminate compromised node ID.
  • Evolve with network protocol upgrades, OLSR, to HSLS, to MALSR
slide12

MODEM

RF BOARD

Sensor Communications

Survivable and energy-efficient communications for distributed, unattended sensor nodes.

Challenges

  • Extreme bandwidth, power, energy, and computational constraints
  • Severe near-earth propagation effects
  • Self-organization under a variety of delivery mechanisms
  • Duty-cycling operations to extend battery life
  • Jam-resistant
  • Low cost

Approach

Blue Radio

  • Duty cycling to conserve energy
  • Robust, high processing gain waveforms that are fast-acquisition to allow duty cycling
  • Low overhead, reactive/proactive ad hoc routing
  • Energy-efficient Medium Access Control (MAC) including duty cycling, power control, and multi-user detection
  • Leveraging commercial wireless radio components
  • Application specific routing and scheduling
slide13

Ultra Wideband Communications and Geolocation

Multi-Input Multi-Output (MIMO)

Multi-Carrier Waveforms

Signal Processing

for Communications

Signal processing techniques that enable high data-rate, covert, on-the-move communications in dynamic and hostile environments

Challenges

  • Highly diverse dynamic channels and network topologies
  • LPD/LPI/Anti-Jam under mobile conditions
  • Non-contiguous spectrum and coexistence
  • Low complexity transceiver design
  • Bandwidth, spectrum, and energy constraints
  • Co-site interference

Approach

  • Multi-Input Multi-Output (MIMO) multiple antenna systems for high data-rate communications
  • Multi-Carrier waveforms to exploit available spectrum and to combat fading
  • Ultra Wideband communications and geolocation for dense urban terrain
  • Cross-Layer techniques for improved energy consumption and performance
  • Non-cooperative signal processing
slide14

Free-Space Laser Communication

Develop adaptive laser communication systems that are robust, light-weight, secure, and operate at high data rates for advanced communications and information distribution technologies

slide15

Army netcentric

warfare depends on MANET technology

for connectivity