NET-CENTRIC CONVERSATIONS: THE UNIT OF WORK FOR NETWORK CENTRIC WARFARE AND NETWORK CENTRIC OPERATIONS

Similar documents
Department of Defense DIRECTIVE

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Common Joint Tactical Information. FY 2011 Total Estimate. FY 2011 OCO Estimate

Network Centric Operations Urban Warfare

Implementing a COI Service Joint COI Data Implementation

From Stove-pipe to Network Centric Leveraging Technology to Present a Unified View

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

THE JOINT STAFF Research, Development, Test and Evaluation (RDT&E), Defense-Wide Fiscal Year (FY) 2009 Budget Estimates

Global Vigilance, Global Reach, Global Power for America

INTRODUCTION. Chapter One

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

Department of Defense DIRECTIVE

C4I System Solutions.

Department of Defense INSTRUCTION

UNCLASSIFIED. FY 2011 Total Estimate

Agenda. DISDI and the NGA. The National System for Geospatial-Intelligence. Emerging DoD Standard Strategies / Challenges. Benefits.

UNCLASSIFIED. COST (in millions) FY02 FY03 FY04 FY05 FY06 FY07 FY08 FY09

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

ACC/C2ISR Delivering Desired Effects on the Battlefield

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

Test and Evaluation Strategies for Network-Enabled Systems

Tactical Edge Command and Control On-The-Move A New Paradigm

SPECTRUM & SERVICES ENTERPRISE CAPABILITIES

STATEMENT BY LIEUTENANT GENERAL RICHARD P. FORMICA, USA

REPORT DOCUMENTATION PAGE

Managing Dynamic Collaborative Action Teams in a Net-Centric Environment

F oreword. Working together, we will attain the greatest degree of spectrum access possible for the current and future Navy/Marine Corps team.

Adapting C2 for the 21 st Century

UNCLASSIFIED

THE JOINT STAFF Fiscal Year (FY) 2008/2009 Budget Estimates Research, Development, Test and Evaluation (RDT&E), Defense-Wide

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Net Centricity FY 2012 OCO

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Fiscal Year (FY) 2011 Budget Estimates

GLOBAL INFORMATION GRID NETOPS TASKING ORDERS (GNTO) WHITE PAPER.

Defense Transformation

MOTION IMAGERY STANDARDS PROFILE

Annual Automated ISR and Battle Management Symposium

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Support to Networks and Information Integration. FY 2011 Total Estimate. FY 2011 OCO Estimate

The pace of change and level of effort has increased dramatically with

Capability Integration

UNCLASSIFIED. R-1 Program Element (Number/Name) PE J / Joint Integrated Air & Missile Defense Organization (JIAMDO) Prior Years FY 2013 FY 2014

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN VERSION 1 A COMBAT SUPPORT AGENCY

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Joint Command and Control. FY 2011 Total Estimate. FY 2011 OCO Estimate

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM

Joint Program Executive Office Joint Tactical Radio System

MOTION IMAGERY STANDARDS PROFILE

Joint Command and Control Capability Portfolio Management (JC2 CPM)

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Network Centric Operations Conceptual Framework Version 1.0

UNCLASSIFIED. UNCLASSIFIED Defense Information Systems Agency Page 1 of 12 R-1 Line #203

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

2009 ARMY MODERNIZATION WHITE PAPER ARMY MODERNIZATION: WE NEVER WANT TO SEND OUR SOLDIERS INTO A FAIR FIGHT

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

Reconsidering the Relevancy of Air Power German Air Force Development

EXHIBIT R-2, RDT&E Budget Item Justification RESEARCH DEVELOPMENT TEST & EVALUATION, NAVY / BA4

Response to the. Call for Papers on Operational Challenges. Topic #4

Department of Defense DIRECTIVE

Achieving Information Dominance: Unleashing the Ozone Widget Framework

Joint Concept of Operations for. Global Information Grid NetOps

INSTRUCTION. Department of Defense. NUMBER May 22, 2008 USD(P) SUBJECT: Joint Deployment Process Owner

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Quantity of RDT&E Articles

F-16 Fighting Falcon The Most Technologically Advanced 4th Generation Fighter in the World

AUSA BACKGROUND BRIEF

Department of Defense INSTRUCTION

Department of Defense Investment Review Board and Investment Management Process for Defense Business Systems

The current Army operating concept is to Win in a complex

STATEMENT OF. MICHAEL J. McCABE, REAR ADMIRAL, U.S. NAVY DIRECTOR, AIR WARFARE DIVISION BEFORE THE SEAPOWER SUBCOMMITTEE OF THE

First Announcement/Call For Papers

HEADQUARTERS NORAD AND USNORTHCOM INFORMATION GOVERNANCE VOLUME 1 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMMON AVIATION COMMAND AND CONTROL SYSTEM

We Produce the Future. Air Force Doctrine

Collaboration, Interoperability, and Secure Systems

Joint Command and Control (JC2) Capability & C2 Data Model

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification DATE: February 2005 APPROPRIATION/BUDGET ACTIVITY RDT&E, Defense-Wide/05

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

NDIA Ground Robotics Symposium

challenge the force... change the game

a GAO GAO DOD BUSINESS SYSTEMS MODERNIZATION Improvements to Enterprise Architecture Development and Implementation Efforts Needed

Challenges in Vertical Collaboration Among Warfighters for Missile Defense C2

Relationship of the DOD Information Technology Standards Registry (DISR) with the Defense Standardization Program

STATEMENT OF GORDON R. ENGLAND SECRETARY OF THE NAVY BEFORE THE SENATE ARMED SERVICES COMMITTEE 10 JULY 2001

The Concept of C2 Communication and Information Support

Conducting. Joint, Inter-Organizational and Multi-National (JIM) Training, Testing, Experimentation. in a. Distributive Environment

Exhibit R-2, RDT&E Budget Item Justification

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

JCIDS: The New Language of Defense Planning, Programming and Acquisition

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

UNCLASSIFIED. R-1 Program Element (Number/Name) PE F / Distributed Common Ground/Surface Systems. Prior Years FY 2013 FY 2014 FY 2015

Radar Open Systems Architectures

RDT&E BUDGET ITEM JUSTIFICATION SHEET (R-2 Exhibit) MAY 2009 APPROPRIATION / BUDGET ACTIVITY RDT&E, DEFENSE-WIDE / 7

Department of Defense DIRECTIVE

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

Welcome to GSAW2005. Collaboration and Common Solutions. Challenges and Opportunities in Transforming National Security Ground Systems

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Transcription:

NET-CENTRIC CONVERSATIONS: THE UNIT OF WORK FOR NETWORK CENTRIC WARFARE AND NETWORK CENTRIC OPERATIONS Harvey Reed, MITRE, Chief Engineer, Global Combat Support System-Air Force Fred Stein, Col (Ret), MITRE, Senior Engineer, Network Centric Warfare ABSTRACT Network-centric warfare and, increasingly, Joint operations, demand vastly increased interdependencies and relationships among net-centric participants to produce net-centric capabilities and increase mission effectiveness. A net-centric conversation (NCC) captures a set of organizing principles that encompass a formal description and management of net-centric relationships among participants, such as people, machines, weapons, and sensors, that produce such a net-centric capability. The term conversation is used deliberately to capture both the essence of an NCC s ability to change and as the interactions among the participants. Each NCC is version controlled, ensuring that participants know of relevant changes in other participants, which in turn creates a basis of trust. Each NCC has agility metrics to quantify the shortest amount of time needed to change any participant, which enables value-driven portfolio management of NCCs. The Global Combat Support System Air Force is already beginning to support NCCs. BACKGROUND The terms network-centric warfare (NCW) and networkcentric operations (NCO) have become common over the last 5 years within DoD and worldwide. In this paper we will use the following descriptions, taken from the executive summary of the DoD report to Congress 2001. Executive Summary of the DoD Report to Congress 2001 NCW represents a powerful set of warfighting concepts and associated military capabilities that allow warfighters to take full advantage of all available information and bring all available assets to bear in a rapid and flexible manner. The tenets of NCW are: 1. A robustly networked force improves information sharing. 2. Information sharing enhances the quality of information and shared situational awareness. 3. Shared situational awareness enables collaboration and selfsynchronization, and enhances sustainability and speed of command. 4. These, in turn, dramatically increase mission effectiveness. Network-centric Operations provide a force with access to a new, previously unreachable region of the information domain. The ability to operate in this region provides warfighters with a new type of information advantage. This advantage is enabled by the dramatic improvements in information sharing made possible by networking. With this information advantage, a warfighting force can achieve dramatically improved shared situational awareness and knowledge. Network-centric warfare and network-centric operations (NCO) are based on the existence of a highly connected force capable of leveraging the interdependent relationships among sensors, shooters, and decision makers, all enabled by information technology. Net-centric capabilities (such as new kill or supply chains 1 ) are generated by linking multiple weapons, sensors, and people either permanently or temporarily. These net-centric capabilities must support complex relationships. Traditional bilateral interface exchanges such as Exchange Requirements and Control Documents are insufficient to describe and manage complex net-centric capabilities. Since the DoD has no formal mechanism to describe and manage such relationships, it is difficult to maintain 1 A kill or supply chain links participants in a common activity. For example, a kill chain can include a targeter, an air space controller, and a pilot all working together to put an effect on a target. A supply chain includes the product company, distributor, shipping company, and retail stores working together to bring products to the consumer. 1 of 8

trust among participants, which slows adoption of NCO. The adoption of methods to allow system design, engineering and perhaps most important change management is key to supporting the DoD JV 2010 and JV 2020. Starting with Joint Vision 2010 and its successor, Joint Vision 2020, the Joint Chiefs of Staff (JCS) recognized the need for "information superiority" to retain the United States' warfighting advantage in the Information Age. This prompted the Assistant Secretary of Defense for Networks and Information Integration and the Defense Information Systems Agency to urge industry to produce systems that were "interoperable" at various levels. That guidance, in turn, led to the establishment of architectural frameworks and standards to assist in reaching the goal of interoperability. While interoperability is vital to facilitate Net Centric Operations starting with Operation Enduring Freedom made it clear that U.S. forces would carry the fight to our enemies in new ways. The dramatic success of the combined U.S. Special Operations Forces/Air Force and allies in Afghanistan highlighted a significant new requirement: that of interdependence. Forces from the individual Services would no longer operate alone; from very small groups to senior headquarters all operational units would be joint. Increasingly, the Services and their supporting branches will depend on each other for support in the form or transportation, intelligence, and even direct fires to accomplish their mission. The current Army Chief of Staff has frequently emphasized this in both public and private forums, and the Chairman of the JCS has echoed his statements. The terms network-centric and net-centric are often used interchangeably and may lead to increased confusion as the concepts of NCW and NCO evolve. Here we use network-centric to mean the relationship of the platforms in the sensor network to the platforms in the engagement network. They are linked by an information infrastructure grid consisting of communications links and information systems. As the concept of NCW and the corresponding operational concept of NCO become established we might expect organizational change to some extent. For example, NCO was integral in Afghanistan and in Iraq, both in the initial high-intensity stage of warfare and in the latter stages of stability operations. We must take into account a society s/entity s ability to change as information dominates the nature of relationships, and then we might expect to see greater acceptance of the concepts within the military establishments. EXAMPLES OF NCO NCW and NCO are based on the existence of a highly network-connected force capable of leveraging the relationships among sensors, shooters, and decision makers, all enabled by information technology (IT). Netcentric capabilities (such as new kill or supply chains) are generated by relating multiple weapons, sensors, and people to each other, either permanently or temporarily. These capabilities require the creation and management of transitive multilateral relationships. Traditional bilateral interface exchanges such as information exchange requirements and interface control documents are insufficient to describe and manage transitive, multilateral, net-centric capabilities. Since the DoD has no formal mechanism to describe and manage such relationships, it is difficult to maintain trust among participants, which slows adoption of NCO. Net-centric conversations (NCCs) and their organizing principles address this problem. In the future, advances in IT will dramatically increase the number of interfaces, interrelationships, and interdependencies between NCO participants, including machines, civilians, and members of the military, whether U.S., allied, or coalition. Moreover, the Information Age allows these relationships to assume an increasingly ad hoc nature. It will no longer be one system, or even a system of systems, but rather the loose coupling of systems and the exchange of data that will allow combat power to be channeled and focused. The first example of NCO (Figure 1) begins with a sensor: in this case a man on horseback passing the target to the airborne command post over the Global Information Grid. The airborne command post (ABCP) then evaluates the data and determines that additional data is required to engage the target. To gain the additional data the ABCP tasks another sensor: a naval jet fighter that provides the data to the ABCP via its on-board radar. The ABCP then tasks a bomber already in flight. The bomber, in turn, passes the data to its precision-guided munitions. Control of the munitions now returns to the original sensor, who becomes part of the command and control process. The key point here is that this instance of a kill chain was neither anticipated nor specifically trained for. However, the general concept or type of net-centric capability 2 of 8

certainly could have been anticipated, prepared for, and encoded as an NCC that captures the nature of cooperation and message exchange required to instantiate this type of interaction in the field during operations. An Example of Joint Operations People Platforms - Connections ADOC S CAOC TST Cell IMT DS Recent Combat Example in Iraq SADL Link-16 JR E H Imarsat (V) Iridium (V) UHF TAC SAT (V/D) Laser Rangefinder - GPS Locates Target for engagement Agility is the Key Platforms, In IT, In Personnel Sensor input linked to Command Center Link 16 (D) Radar (D) UFH (v) Final Link To Target GPS (D) C2 Center request more Data to task weapons Platform Link 16 (D) UHF Sat (V) Combat Track II (D) UHF (V) Combat Track II (D) Keyboard to Bomb Engages Targets Figure 1 Joint Operations Increase Interdependencies Figure 2 illustrates the next example, which is taken from Western Iraq in 2005. Breaking down the radio stovepipes enabled data and information to be shared in ways never before experienced in large-scale conflict. The key technology was the Battlefield Universal Gateway Equipment. This combination of IT technologies permitted data from sensor and command and control platforms equipped with Link 16 to share data with weapons platforms equipped with the Enhanced Position Location Reporting System and to receive information from ground units equipped with several other radio systems. The key point is that stovepipe systems can be linked or loosely coupled, and that this coupling can produce significant combat power by sharing information. While neither of these examples represents mature NCO, both provide insight as to what is possible when data is shared among people and systems in communities of interest (COIs). We must now develop a means to capture these new transitive multilateral relationships so that engineers can design and implement net-centric capabilities that are agile enough to respond to the highly interdependent and ad hoc nature of today s warfare. UA V Figure 2 Breaking Radio Stovepipes Increases Interdependencies NET-CENTRIC CONVERSATIONS INTRODUCTION Existing stovepipe systems and bilateral tools and techniques make it difficult to construct a net-centric capability. In a typical notional example (Figure 3) we see that stovepipe systems expose services S1, S2, and S3, which exchange messages M1, M2, and M3 among themselves and ultimately with the analyst user U1. Moreover, the services are protected by security perimeters P1,, and. For this capability to retain operational integrity, none of the participants, including security perimeters, can change. The agreements are described in bilateral interface agreements 1 3, managed by separate program offices. Change, if it can happen at all, occurs very slowly, sometimes over a period of years. Stovepipe System #1 #1 P1 S1 M1 Enemy Target #2 #2 Stovepipe System S2 SOF Stovepipe Systems Separate s M2 Currently stovepipe systems make agreements with their nearest neighbors but no mechanism to describe and manage an entire thread of processing Kill Box Stovepipe System S3 Brok er M3 Link 16 Ene my Targ et U1 #3 #3 LEGEND S1 web service S2 web service S3 web service M1 message M2 message M3 message U1 User P1 security perimeter 1 security perimeter 2 security perimeter 3 Figure 3 Bilateral s Are Inadequate Link 16 Frien dly Grou nd Trac k 3 of 8

Figure 4 shows an alternative approach that records the transitive multi-party agreement in an NCC, in this case a single agreement, Publish-01. This agreement can be encoded into metadata and used to analyze the future impact of proposed changes. The NCC allows change to happen in an orderly fashion, facilitates management of that change, and provides the basis for net-centric capabilities to evolve and improve over time without causing disruption to operations. Our primary focus is on creating and managing relationships among the participants (sensors, shooters, decision makers, supporting machines and people) who use the network to exchange messages. We will not address the network itself (routers, bridges, pipes, etc.), except for the cases where a firewall or proxy would interfere with the exchange of messages. This distinction is important because the network itself should be largely unconstrained in how it delivers services. We simply assume the network service is highly available and has the ability to deliver messages. Further, individual systems with web technologies and messaging technologies such as an enterprise service bus (ESB) do not construct netcentric capabilities in and of themselves. They provide connection mechanisms, but the challenge involves describing, recording, and managing the relationships the DoD wants to create. Moreover, key aspects of the NCC must be amenable to rapid change to make the NCC adaptable for use in specific situations in the field. In addition to traditional, acquisition-oriented major changes, such as upgrading a service, we will witness parametric changes that can be introduced in a matter of hours or minutes. The ability to accommodate management of both large and small changes, which includes allowing the field to make some structured changes, is what makes the NCC concept transformational. P1 S1 One One Multi-party Multi-party Publish-01 Publish-01 M1 S2 Net-Centric Conversations Scaling requires Multi-party M2 Net-Centric Conversations provide a means to create one agreement that covers many participants. This assures we can manage change over time. S3 M3 U1 LEGEND S1 web service S2 web service S3 web service M1 message M2 message M3 message U1 User P1 security perimeter 1 security perimeter 2 security perimeter 3 Figure 4 Net-Centric Conversations Are a Single NET-CENTRIC CONVERSATION DEFINITION AND ORGANIZING PRINCIPLES An NCC is a persistent multi-party agreement describing a set of relationships between sensors, shooters, decision makers, and other participants that create a net-centric capability. NCCs have five organizing principles: 1. An NCC is described, registered, and discoverable, and represents a persistent netcentric capability. 2. An NCC has both humans and machines as participants and is completely described by the set of possible message exchanges between them. 3. An NCC is associated with a set of net-centric key performance indicators (KPIs). 4. An NCC has an agility profile derived from the agility metrics of the participants and messages. 5. Portfolio management of NCCs reduces the complexity of the enterprise, and forms the basis of value-based evolution of the enterprise. Principle #1 An NCC is described, registered, and discoverable, and represents the persistent net-centric capability. NCC is a binding layer (see Figure 5) for the messages and mission services (warfighter and business capability) that in turn use enterprise services. In addition, the NCC describes critical roles for people, supporting doctrine, and procedures. The NCC is entered into an NCC registry so that impact analyses can examine any proposed changes. This impact analysis must support the examination of both low-level and high-level changes. A typical scenario subject to impact analysis is a proposed change to a mission service, for example, to increase the functionality offered by that service. In a transitive multilateral situation many program offices will contribute services. The NCC impact analysis can alert all potentially affected program offices of a pending change that the group needs to discuss. This scenario also highlights the critical importance of the stability of message structures. Whereas many individual mission services could change with no resulting impact on other participants, the same cannot be said of message structure. In the future message structures will be defined as XML schemas whose vocabulary will be well defined and explained by COI data panels. XML is flexible and 4 of 8

can allow extensions, but changing existing structure or the vocabulary itself will have far-reaching effects. Organizing Principle #1 Organizing Principle #2 An NCC has both human and machines as participants and is completely described by the set of possible message exchanges between them. Impact Analysis (both directions) An NCC is described, registered, and discoverable, and represents the persistent net-centric capability. Net-centric Conversation (business process, chat, pub/sub, etc) Mission Information (messages) Mission Services (incl. data and sensors) Enterprise Services (messaging, storage, etc) Net-Centric Conversations are registered and point to dependent services and metadata. When a service or metadata is versioned, we can do simple impact I n t e g r i t y - S e r v i c e - E x c e analysis. l l e n c e Figure 5 NCC Organizing Principle #1 Principle #2 An NCC has both humans and machines as participants and is completely described by the set of possible message exchanges between them. An NCC binds machines and users in a transitive multilateral agreement to produce a net-centric capability. As shown in the NCO examples above as well as in the notional scenario in Figure 6, the capability is enabled by the exchange of messages. We can go a step further and say that the possible message exchanges define the NCC and that this information is what is recorded in the NCC s entry in the NCC registry. We can of course associate supporting CONOPS and other ancillary materials to aid in the understanding and measurement of the NCC, but the message exchange is the center of the net-centric capability. Figure 6 shows a sample entry in an NCC registry. Each NCC is registered to create a binding and changecontrolled record of the participants and the KPIs used to measure the NCC. Each mention of a participant points to its entry in its own registry. For example, Service S1 is described in full in its Service Discovery. 2 The NCC registry then becomes a new, fifth type of Discovery that differs from the others in that it consists of a set of relationships among participants, but does not describe any individual participants in detail. 2 DISA NCES program prescribes four Discovery services (registries) Services, Metadata, Content, and People as part of its SOA Foundation (SOAF). We are proposing a fifth type of Discovery to maintain relationship links between all the other entries. U-2 NCC Name decide Laser-target-01 Users U-1, U-2, U-3 M-4 M-3 S-2 Systems S-1, S-2, S-3, S-4 M-5 M-2 Messages, M-2, M-3, M-4, M-5, M-6 M-6 SOF U-1 CONOPS & Doctrine Figure 6 NCC Organizing Principle #2 S-3 S-1 S-4 sensor effect U-3 Mission Effectiveness KPIs 1. Ave time to target 2. Ave accuracy Principle #3 An NCC is associated with a set of net-centric KPIs. Each NCC has an associated set of one or more KPIs. These KPIs must be expressed in terms of warfighterand/or business-level measurements, as appropriate. This enables a portfolio manager to properly assess the contribution of the NCC to the value of the overall portfolio. Further, if the portfolio manager wants to improve the value (KPI) s/he can do so in an objective manner. This must be balanced against the cost of changing the NCC, as revealed by its agility profile (see principle #4). The warfighter- and/or business-level KPIs will be derived from a combination of human/machine observations (e.g., time to target, target assessment) as well as lower level IT infrastructure measurements (time for certain messages to arrive or be dispatched). These KPI derivations will generally be custom built, and represent a key asset in managing the NCC portfolio. Principle #4 An NCC has an agility profile derived from the agility metrics of the participants and messages. One of the defining measures needed for managing NCCs is a determination of the minimum time to change (including configuration) associated with participants (Figure 7). These individual measurements are rolled up into the minimum time to change any NCC. That minimum time depends strongly on the develop/deploy/configure processes employed by each participant s owning organization. By raising the visibility 5 of 8

of the amount of time needed to change participants, we can focus policy and resources on high-priority slow spots. Thus, NCC agility metrics will, for the first time, give us a summary view of how agile the enterprise is, which is a key performance metric for DoD transformation. Agility has two aspects: that of the acquisition community and that of the operational community. The acquisition community constructs NCCs or pieces of NCCs that must be highly reliable and event driven (vice file transfer or database copy driven) and that include major acquisition-controlled systems as participants. The DoD must support both institutional pieces of an NCC, as well as support the operational edge of an NCC, by leveraging light-weight development and/or configuration changes. In both cases, NCC registries with impact analysis and agility metrics guide NCC evolution so that all participants remain informed and stability is maintained. Organizing Principle #4 An NCC has an Agility Profile derived from the agility metrics of the participants and messages (NOTIONAL) Participant type User Service Service Service Message Message Message Perimeter Perimeter Perimeter Participant Name U-1 S-1 S-2 S-3 M-2 M-3 P-1 P-2 P-3 Min time to develop / train Train=10 days 42 days 67 days 83 days 120 days 160 days 200 days Organization AETC Contractor-1 Contractor-2 Contractor-2 COI-1 COI-1 COI-2 AFNOSC DISA DISA Figure 7 NCC Organizing Principle #4 Min time to re-configure 13 days 5 days Firewall=90 days Firewall=60 days Firewall=45 days Leadership can understand the performance of an NCC because the performance is measured in warfighter/business terms. Leadership can understand the minimum time to change an NCC because each NCC has an associated agility profile. Leadership can balance the need to improve KPIs against anticipated agility costs in an objective manner. Leadership can also understand how NCCs relate to each other because NCCs can be assembled to yield compound NCCs. The set of all NCCs and their relationships to each other represents the as-built architecture of the enterprise, expressed in capability terms. This will focus leadership attention on integrated capability transformation and away from isolated systems or particular technologies. Portfolio management of NCCs requires a social and organizational transformation to recognize that net-centric capabilities, including NCCs, require a rethinking of ownership. Currently, isolated programs of record (PORs) own capability. To support increasing Joint interdependencies we must be able to express these interdependencies as NCCs and establish the right level of ownership. This discussion goes beyond the scope of this paper, but the authors predict that high-level compound NCCs will be owned at the Joint level, and that the Office of Force Transformation will monitor agility metrics. Organizing Principle #5 Portfolio management of NCCs reduces the complexity of the enterprise, and forms the basis of value-based evolution of the enterprise. Need to change Principle #5 Portfolio management of NCCs reduces the complexity of the enterprise, and forms the basis of value-based evolution of the enterprise. NCC Mission KPIs Bombs delivered People deployed Planes Available How long to change? Agility Metrics Time to change a business process Time to change a mission service Time to change a network connection NCCs are managed with a combination of KPI performance metrics balanced against agility metrics, as shown in Figure 8. This additional transformation tool helps to rationalize the process of adding capability. Leadership (military and civilian) can understand the capability of an NCC because the capability is described in warfighter and/or business terms. Figure 8 NCC Organizing Principle #5 EXAMPLE FROM GCSS-AF The Global Combat Support System Air Force (GCSS- AF) is a National Security System that supplies the information system infrastructure to applications and 6 of 8

services for Air Force operations support. GCSS-AF provides application, hosting, data, integration, and security services, as well as the Air Force Portal. Integration services include an ESB that allows applications and services to exchange messages. GCSS- AF is currently developing several NCCs in partnership with the programs, their systems and COIs that supply the mission services. The example below illustrates how GCSS-AF is assembling mission and enterprise services into an NCC to deliver a net-centric publish/subscribe capability. Figure 9 shows a notional example of a simple personnel change notification. Publishing notifications of change is a key enabler of NCW that shares awareness among participants and increases self-synchronization. Publishing Service S-1 (personnel) sends a notification message to the ESB E-1 service on the NIPRNET (network-1) side of GCSS-AF. The notification takes the form of a publish message,. The ESB E-1 then pushes Message to Subscribing Service S-2 (force readiness) on the ESB E-1 side, and also to Subscribing Service S-3 (warfighter) on the ESB E-3 (network-2) side via the cross-network service E-2. P1 NCC Name Notify-01 Users none S-1 ESB-Network-1 E-1 Systems & Services S-1 (personnel) S-2 (force readiness combat support) S-3 (force readiness warfighter) E-1 (ESB) E-2 (ESB) E-3 (ESB) S-2 E-2 CROSS-NETWOK SERVICE Messages (airman status change) Example from GCSS-AF Notional Security Perimeters P1 (personnel security) (GCSS-AF security) (warfighter security) E-3 ESB-Network-2 CONOPS & Doctrine Alert Airman status change S-3 Mission Effectiveness KPIs 1. Average time to deliver alert from personnel to warfighter 2. Percent delivered from personnel to warfighter Configure ESB when new subscribers are added Create SOA that permits easy substitution of services as long as interfaces are maintained Change subscribing services if message payload semantics change Change filters for crossnetwork services if message semantics change 1 day 3 5 days 180 days 6 months 1 year These agility metrics are an important factor when evaluating proposed NCC changes to determine the shortest amount of time needed to make a version change. We can balance the value of the change against cost and time. SUMMARY NCC organizing principles enable us to build net-centric capabilities from transitive multilateral relationships among new and existing information systems and users and to measure them with KPIs. They also allow us to maintain version control across all participants in an NCC and to track agility metrics, which quantify the minimum time needed to change individual NCC capabilities and the enterprise as a whole. Understanding the overall agility of the enterprise is critical to successful transformation to net-centricity. Bibliography: 1. " Network Centric Warfare - Leveraging Information Superiority" CCRP 1999/ 2000 first and second editions Figure 1 2. Western Iraq paper presented at June CRP San Diego Calf 2006 Figure 2 Figure 9 Example from GCSS-AF Even this very simple example (one publisher, two subscribers) involves ten participants: three services, two ESBs (network-1 and network-2), the cross-network service, the message payload schema/semantics, and three security perimeters. If any one of the participants must change, each of the remaining participants must be consulted beforehand. Each type of change must be coordinated, and is associated with different agility metrics. Table 1 continues the notional example. Table 1 Sample NCC Agility Metrics 3 This is an example where publish and subscribe connections are configured, not developed, and can support agility in the field. 7 of 8