Presentation is loading. Please wait.

Presentation is loading. Please wait.

Designing Data Exchange Experiments Using Architectural Techniques

Similar presentations


Presentation on theme: "Designing Data Exchange Experiments Using Architectural Techniques"— Presentation transcript:

1 Designing Data Exchange Experiments Using Architectural Techniques
25 October 2006 Dave McDaniel Silver Bullet Solutions, Inc.

2 Experiment Purposes Explore new ways of database synchronization across the domains: Submarine Surface Airborne C4ISR Explore new development and experimentation processes for Navy Open Architecture and FORCEnet.

3 Notional OA Experiment OV-1 Maritime Interdiction / ISR
“National Critical Contact of Interest” FORCEnet E-2 P-3 Nat’l CCOI CVN DDG SH-60 C2 Data Fn Backbone Data Link Electronic Emission Detection Shipping Lanes SSN SSGN

4 Maritime Interdiction / ISR Scenario “Critical Contact of Interest Surveillance and Prosecution” Sequence Diagram (UML) Nat'l Assets SSN CVN DDG SH-60/UAV E-2 P-3 Various CCOI report National Assets report CCOI (Critical Contact of Interest) enroute Battlegroup ‘Alpha’ SUW CDR embarked aboard DDG generates cueing order and directs launch of SSC aircraft from CVN; request P-3 for maritime surveillance E2-C locates COI with radar approaching surveillance area outside normal shipping traffic lanes SSGN + embarked SOF teams monitor situation by searching for relevant reports from area; study possibility of take-down mission P-3 checks into TADIL; SUW CDR provides search area coordinates and possible CCOI track information S-3 & SH-60 assets are coordinated for shipping lane traffic ID; imagery fm H-60 provided for Intel cell analysis; CCOI ID confirmed CVN (SOF Capable) provides assets for board & search; SSBN directed to scene for inspection/seizure if required DDG directed to provide area security; designated OSC (On-Scene-Commander) SH-60 reports SOF onboard vessel; no resistance SSBN reports on station; on board SOF disembarks to assist search SOF reports sensitive material secured; vessel underway and escorted by DDG Voice /SIPRNET /GCCS-M Voice report / OPTASK revision Link-11/16 Track ID Change Various Intel report Link-11/16 Control Message Control / Track Message Link-11 / SIPRNET Launch/Control Message/Imagery Various Command Message Various Intel report Voice Command/Control Voice / GCCS-M/ SIPRNET Command and Control Various Intel Report BYG-1 SSDS AEGIS HAWKLINK E2-C2 P3-C2 ISIS GCCS-M

5 Notional OA Experiment OV-1 SURFACE WARFARE/FORCE PROTECTION
“Small Boat Threat” FORCEnet E-2 P-3 CVN SH-60 DDG Data Link SSN C2 Data Fn Backbone

6 SUW Scenario “Small Boat Threat” - Sequence Diagram (UML)
Small Boats SSN CVN DDG SH-60/UAV E-2 P-3 SSN detects multiple small, high speed craft exiting harbor ‘X-Ray’ SSN periscope image of targets of interest passed via SIPRNET to CV-TSC (CVN) & SUW CDR embarked aboard DDG SUW CDR associates image to GCCS-M track and assigns track as COI (Contact of Interest) SH-60/UAV launched for patrol up threat axis for further tracking and reporting of small boat COI E-2 RADAR detects small boat COI; assumes control of SH-60 asset for flight following, air space Deconfliction, comms link SSN imagery update ID'S COI small boats as armed vessels (possible missile launchers and deck mounted guns) DDG reports SH-60 ‘Hawklink’ contacts on COI. Contacts do not respond to IFF interrogations E-2 correlates SH-60 tracks as COI, reorients asset outside COI weapons release area P-3 enters maritime area for Surface Surveillance & Control mission Visual Contact SIPRNET /GCCS-M Track info + Periscope Image SIPRNET/GCCS-M Updated Track info + Periscope Image Voice Launch Link-11/16 Radar Detection Control SIPRNET/GCCS-M Updated Track info + Periscope Image Link-11/16 ID Update Link-11/16 IFF Interrogation Link-11/16 Correlated Track Link-11 Control Message Link-11 SSC Track Data BYG-1 SSDS AEGIS HAWKLINK E2-C2 P3-C2 ISIS GCCS-M

7 Notional OA Experiment OV-1 Theatre Air & Missile Defense
“Military & Commercial Aircraft Deconfliction” FORCEnet E-2 Commercial air corridor Enemy C2 & Airfield CVN DDG SSN ISR Data C2 Data Fn Backbone Data Link Electronic Emission Detection

8 Theatre Air Defense Scenario “Military and Commercial Aircraft Deconfliction” Sequence Diagram (UML)
SSN CVN DDG SH-60/UAV E-2 P-3 E-2 joins Link-11/16 and assumes NCS E-2 generates new tracks ID unknown over country ‘X-ray’ CVN generates track ID alert; 4 of 4 tracks ID Commercial Air based on flight profile ISR reports increased activity at military airfield ‘X-Ray’ DDG generates ID Conflict Alert on track ‘0001’ ; COMMAIR ID change to Unknown based on ISR DDG generates Tactically Significant Track ‘0002’ ; ID Unknown, point of origin correlates to known military airfield E-2 reports track ‘0001’ responds to commercial IFF interrogations; redesig COMMAIR SSN reports increased activity on known GCI channels in country ‘X-Ray’ E-2 reports track ‘0002’ feet wet DDG reports split track 0002; new track ‘0003’; change ID to UNK Assumed Enemy; AAW CDR launches Alert CAP; elevates threat warning condition CVN (Air Resources Element CDR) launches Alert CAP SSN reports CGI channel communications as training oriented DDG re-designates tracks ‘0002 & 0003’ UNK Link-11/16 Net Sync / Control Message Link-11/16 Track report Link-11/16 Track ID Change Voice / SIPRNET Intel report Link-11/16 ID Conflict New Track / TAC SIG Link-11/16 Force ID Message Link-11/16 Voice / SIPRNET Intel report Link-11/16 Threat Warning Link-11/16 Track Composition Link-11/16 CAP Launch Voice / SIPRNET Intel report Link-11/16 Force ID Message BYG-1 SSDS AEGIS E2-C2 ISIS GCCS-M Link-11* - TADIL reports by submarine dependant on TACSIT

9 From these:

10 To these

11 A Common Data Model (CDM)
Based on Cursor on Target (CoT) and JC3IEDM

12 Experiment Using DEP SV-1

13 Results Official report still in progress but:
Showed to VIP’s exchange of Common Data Model (CDM) data between domains – a new way of data synchronization using XML/TCP and IDL/DDS instead of Government custom formatting / parsing software and message protocols (e.g., TADILs).


Download ppt "Designing Data Exchange Experiments Using Architectural Techniques"

Similar presentations


Ads by Google