290 likes | 519 Views
Net-Centricity & Net Ready It’s More than Information/Data Interoperability. Jack Zavin Chief, Information Interoperability DoD CIO/A&I Directorate (703) 607-0238, FAX (703) 607-0248 Jack.Zavin@osd.mil. ASD(NII)/DoD CIO Vision. Power to the Edge
E N D
Net-Centricity & Net Ready It’s More than Information/Data Interoperability Jack Zavin Chief, Information Interoperability DoD CIO/A&I Directorate (703) 607-0238, FAX (703) 607-0248 Jack.Zavin@osd.mil
ASD(NII)/DoD CIO Vision Power to the Edge People throughout the trusted, dependable and ubiquitous net are empowered by their ability to access information and recognized for the inputs they provide. Three goals: • Build the net • Populate it • Protect it
Joint Forces Commander (incl. Battle Staff) Nexus – The (Multinational) Joint Task Force Operations The Campaign for Achieving Information Interoperability Processes Organizations Senior Command Authorities Logistics & procurement Sustainment Operations Medical support Direct Support Elements JWAC Personnel support JIC/JAC CINC Staff Augmentation Teams NSOC JSC Non Government Organizations (NGOs) other Spec. Ops Component Commander Maritime Component Commander Air Component Commander Land Component Commander Verification Funding Integrated Architectures & Standards Balanced & Synchronized Doctrine Organization Training Materiel Leadership Personnel Facilities Solution Sets Across the life cycle from “new” to “fielded” DoDD 4630.5 & DoDI 4630.8
Network-Centric or Net-Centric? • Network implies infrastructure • Net-centric supports non-linear relationships and increased tempo of operations
Net-Centric Operations & WarfareA Transformation Enabler Net-Centricity is a transformation enabler that empowers all users with the ability to easily discover, access, integrate, correlate and fuse data/information that support their mission objectives. Netted force
Power to the Edge 1. Make information available on a net that people depend on and trust Department of Defense Transformation Planning Guidance April, 2003 2. Populate the net with new, dynamic sources of information to defeat the enemy 3. Deny the enemy advantages and exploit weaknesses Future Directions For Defense “Services will explicitly identify initiatives to improve … adoption of “post before process” intelligence and information concepts, achievement of data level Interoperability; and deployment of “net-ready” nodes of platforms, weapons and forces. From To Supplier Dominates Consumer Dominates Task Process Exploit Disseminate Task Post Process Use
B A R R I E RB A R R I E R B A R R I E R B A R R I E R End-User Producer End-User Consumer “What data exists?“ “How do I access the data?” “How do I know this data is what I need?” “How can I tell someone what data I need?” “How do I share my data with others?” “How do I describe my data so others can understand it?” User knows data exists and can access it but may not know how to make use of it due to lack of under- standing of what data represents User is unaware this data exists User knows this data existsbut cannot access itbecause of organizational and/or technical barriers ? Organization “A” Organization “B” Organization “C” Net-Centric Data StrategyDefining the Problem
DoD’s Net-Centric Data Strategy • The Net-Centric Data Strategy (signed May 9, 2003) is a key enabler of the Department’s transformation: • The Strategy provides the foundation for managing the Department’s data in a net-centric environment, including: • Ensuring data are visible, accessible, and understandable when needed and where needed to accelerate decision making • “Tagging” of all data (intelligence, non-intelligence, raw, and processed) with metadata to enable discovery by known and unanticipated users in the Enterprise • Posting of all data to shared spaces for users to access except when limited by security, policy, or regulations • Organizing around Communities of Interest (COIs) that are supported by Warfighter, Business, and Intelligence Domains.
Producers of data maketheir data visible by advertising their data in catalogs Producers ensure data is accessible by posting data to a secure, shared storage space Producer Consumer Streaming video available. “Tagged” with discovery metadata; video available in “shared space” via data access service. Metadata added to catalog. Automated search of sources using discovery metadata. Pull data of interest. Using registered format, definitions, and core services, translate into needed structure. Consumers of data search catalogs to discovery what data assets are visible Data is accessed from shared storage space Consumer understands what the data is because its context and structure are described Security Services (e.g., PKI, SAML) Ubiquitous Metadata Global Shared Data Catalogs Nets Space Enterprise & Community Services Application Services (e.g., Web) Metadata Registries The structure and semantics of certain data assets are provided by developers increasing the ability to understand and use the data asset Developer Understands the data format to build applications that post, process, exchange, and display information. Net-Centric Data CONOPS
Information Format & Content • Information Transfer • Information Processing • User Interface Information Exchange Requirement Activity 1 Node B Activity 1 Activity 2 Node A Activity 3 Interface, Speed, Security, Interoperability Level,... Activity 2 Node B System X System Y System X (Collaboration) Node A System Z Information Exchange Requirement Interface System Y InformationExchangeRequirement Activity 1 Network Paths Interface System Y Activity 4 Node C Interface Node C System X Integrated Architecture *(One Architecture - 3 Views)with Related Sources & Documents JOINT OPERATIONS, OPERATING, FUNCTIONAL & INTEGRATING CONCEPTs All View The Operational View describesand interrelates the operational elements, tasks and activities, and information flows required to accomplish mission operations. The Systems Viewdescribes and interrelates the existing or postulated technologies, systems, and other resources intended to support the operational view. * Functional Area & Organizational “AS Programmed ” & “T0 BE(s)” The Technical Viewdescribes the profile of rules, standards, and conventions governing systems implementation. • Information Security DOT_LP_ Documents (e.g. TTP, Doctrine) DoD IT Standards Registry (JTA +) • The bottom line: keep this equation balanced:OV = SV + Non-Materiel
The Global Information Grid DoDD 8100.1 The GIG supports all Department of Defense, National Security and related Intelligence Community missions and functions in war and in peace. The GIG encompasses the globally interconnected, end-to end set of information capabilities, associated processes and personnel for collecting, posting, distributing and managing information on demand by warfighters, policy makers and support personnel.
Joint Capabilities Integration & Development And The GIG Architecture CJCSI 3170.01C “As they are developed, the integrated architectures will provide the construct for analysis to identify capability shortfalls, compare alternatives for improving joint warfighting capabilities, and associated resource implications.” The GIG Architecture represents information use and Information Technology in the capabilities process Fits Here
Where we are moving to: The Net-Ready KPP • Net-Ready Key Performance Parameter (NR-KPP). The NR-KPP assessesinformation needs, information timeliness, information assurance, and net-enabled attributes required for information exchange and use. The NR-KPP consists of measurable and testable characteristics and/or performance metrics required for the timely, accurate, and complete exchange and use of information to satisfy information needs for a given capability. The NR-KPP is comprised of the following elements: • Compliance with the Net-Centric Operations and Warfare (NCOW) Reference Model (RM) • Compliance with applicable Global Information Grid (GIG) Key Interface Profiles (KIPs) • Verification of compliance with DoD information assurance requirements • Supporting integrated architecture products required to assess information exchange and use for a given capability
Information needs … Information timeliness … Information assurance … Net-enabled … • Information Needs: A condition or situation requiring knowledge or intelligence derived from received, stored, or processed facts and data. • Information Timeliness: Occurring at a suitable or appropriate time for a particular condition or situation. • Information Assurance: Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. • Net-Enabled: The continuous ability to interface and interoperate to achieve operationally secure exchanges of information in conformance with enterprise constraints. Required KPP Attributes
Information Operations Network Operations Computer Network Recon Exploit Attack Information Assurance Information Dissemination Management Computer Network Defense Network Management PSYOP EW, etc. Defense in Depth Strategy Protect, Detect, React Capabilities Supported by People, Technology & Operations Organizing Construct for IA INFORMATION ASSURANCE: Information Operations that protect and defendinformation and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
JTF System Allied & Coalition Node Ground POP Interface CENTRIXS Information _1 System Environment Management System System Interface_1 Interface_9 BICES System Interface_8 System Content Interface_17 Node Airborne Maritime System Interface Staging Interface_2 _2 System Griffin Assets SCI Data Interface _18 Space System Assets System Interface_19 System Interface_3 Interface_7 System CES System Interface Node _16 POP Interface System System _10 Interface_15 System Interface_20 System System Node Node Node Collateral Interface Interface Interface _12 Data Space _9 _11 Intelligence Assets POP Community (IC) Collection Processing DoD System System Business Community Node Node Interface Logistics Interface System _6 _5 HRM Interface_24 System Interface Accounting Analysis _26 POP System System System & Finance System Interface Interface Node Interface _28 _21 Interface _23 System System _8 Interface_25 Interface System_ _27 Interface_31 POP System System_ Node Interface_29 POP Interface System_ System_ _7 Interface_32 DECS Interface_30 System Interface _22 POP POP NCOW Reference Model V 1.0 Content • Overview & Summary (AV-1) • Integrated Dictionary (AV-2) • Activity Model Node Tree (OV-5) • Systems View (SV-1, SV-2) • Standards Forecast (TV-2) Net-Centric Information Environment Net-Centric Systems Interfaces Description Provide Net-Centric Information Environment Net-Centric Standards Profile First Description of net-centricity at the enterprise level
Applicable KIP Compliance Supporting Architecture Metrics NCOW RM Compliance • Inspection • Analysis • Test • Inspection • Analysis • Inspection • Test IA Compliance • Inspection Measurable and Testable Net-Ready KPP Net-Ready KPP Synthesis & Verification
* Briefing on ABCS in OEF/OIF, Dr. Hutchison, DOT&E, NDIA Interoperability 2004 Observations* • Network Management • Network planning only at brigade level, not division. • Primarily used for situational awareness. • Meteorological Support • Not used. SIPRNET and USAF weather sensors used instead. • Topographic Support • Provides decision makers with the products required. • Operators cited difficulties in operating, transporting and maintaining the system.
Concurrent • Responsive • Timely • Consistent Information • Sequential • Unresponsive • Untimely • Inconsistent Information Commander’s Guidance Combat Assessment Target Development Capabilities Assessment Mission Planning Commander’s Decision The Joint Targeting Cycle in a Net Centric Environment “As Is” “To Be”
The Confusion Factor Levels of Warfare Joint Mission Areas • As Is • Deployment/Redeployment • Movement and Maneuver • Strategic Deterrence • Overseas Presence • and Force Protection • Special Operations • Joint C2 • Focused Logistics • Multinational Ops and • Interagency Coordination • Employ Fires • Information Operations • Force Protection • MOOTW • ISR • Communications/Computer • Environment CM-1014-00; Joint Mission Areas to Organize the Joint Operational Architecture; 6 September 2000 • Strategic • Operational • Tactical Organizational Structure • Joint Task Force • JTF Standing Headquarters • COCOM • Military Service Functional Joint Operations Capability Joint Functional Capabilities (NC,C2,FA,FP,FL) Joint Operating Capabilities Joint Integrating Capabilities Missions or Mission Threads • To Be • Deployment/Redeployment • Dominant Maneuver • Strategic Deterrence • Overseas Presence • and Force Protection • Special Operations • Joint C2 • Focused Logistics • Multinational Operations • and Interagency Coordination • Precision Engagement • Information Superiority • Full Dimensional Protection • Close Air Support • Combat Search and Rescue • Theater Air and Missile Defense • Suppression of Enemy Air Defenses • Others • Enterprise • Community • of • Interest • Porfolios • BMMP Domains • Acquisition/Procurement • Finance Accounting Operations & Financial Management • Human Resource Management • Strategic, Planning, & Budgeting • Installations & Environment Operational Capability? • SIGINT • MASINT • Fire Support • Personnel • Logistics Enterprise Information Environment Mission Area
Consumer Producer and Developer Make Data Accessible to and Usable by Known and Unanticipated Users Empowering Known and Unanticipated Users Shift Power to the User: • Bring data consumers, producers, and system developers closer together through Communities Of Interest • Guide data management activities through user-driven metrics, user ratings/feedback, and data sharing incentives • Provide the infrastructure and services (e.g., GIG B/E, NCES, Shared Spaces, Catalogs) to permit the user to find and retrieve data
NET CENTRIC ATTRIBUTES A work in process
Architecture Products Required to Assess Information Exchange and Use Information needs … (AV-1, OV-2, OV-4, OV-5, SV-4, SV-5, SV-6) Information timeliness … (OV-6c, SV-5, SV-6) Information assurance …(OV-5, SV-4, SV-5, SV-6) Net-enabled … (OV-2, SV-4, SV-5, TV-1, NCOW RM)
Interoperability “ The ability of systems, units or forces to provide services to and accept services from other systems, units or forcesand use the services to enable them to operate effectively together.” Joint Publication 1-02 (emphasis added) ... the right information... at the right time ... in the right format ... to the right “warfighter” Interoperability is more than just information exchange: it impacts systems, process, procedures, organizations and missions over the life cycle; and it must be balanced with Information Assurance