Presentation is loading. Please wait.

Presentation is loading. Please wait.

Horizontal Fusion Implementation of a Services Oriented Architecture

Similar presentations


Presentation on theme: "Horizontal Fusion Implementation of a Services Oriented Architecture"— Presentation transcript:

1 Horizontal Fusion Implementation of a Services Oriented Architecture
Marian Cherry HF Portfolio Manager 703/

2 What is a Services Oriented Architecture
A Framework for interoperability that is: A Design for an environment that:  is made up of applications, data, and tools (called “services”)  Where the services are: distributed throughout the network Location is irrelevant defined/described using a common language and put in a registry (much like the yellow pages) independent of whatever communications they are traveling on platform independent And once discovered: they can be retrieved/pulled to the user are combined to perform functions “Composeable” applications and data

3 What is Horizontal Fusion?
An accelerant for the operational implementation of the GIG Services Oriented Architecture (framework for interoperability) Provide funds to Programs of Record to modify their operational baselines to join the SOA “web”front ends/data labeling/security, etc… Maximize ROI of legacy investments Modify vs. rebuild Capitalize on existing training A Pathfinder for NCES, DoD Data Management Strategy and Net-Centric IA In a microcosm, find the SOA implementation pitfalls and recommend vector checks in specifications/developers guidance A Pillar of the overall DoD CIO investment strategy for DoD IT *next chart A Portfolio – not a program Began in January 2003 Integration of functional components Not development of functional components

4 HF and the DoD CIO Strategic Investment Plan
FY04 FY FY FY FY FY09 Policy & Architecture Guidance UCS Directive Arch/NCOW Reference Model UCS Implementation IPV6 Implementation Completed (Goal) Joint Tactical Radio System Software Communications Architecture Provides IP-based, self-managed, BLOS, mobile data and voice communications services Cluster 1 Vehicular & Army Rotary Wing Cluster 2 Handheld Cluster AMF (Airborne, Maritime & Fixed Station) Cluster 5 Small form fit IOC Cluster 1 IOC Cluster 2 IOC Cluster AMF large IOC Cluster AMF small IOC Cluster 5 Handheld/manpack ? IOC Cluster 5 other form fits ? GIG Bandwidth Expansion Optical Mesh IP Network Comm Infrastructure Provides ubiquitous, secure, robust optical IP foundation network Optical Bandwidth to STEP and Teleport sites Optical Bandwidth to Ground Sites IOC ( 6 Sites) FOC ( UP TO 101 Sites) TCA SATCOM Incorporates mobile/tactical users and global intelligence via optical cross links and EHF IP links TSAT (CY11 Launch) Wideband Gapfiller Optical IP Networking for Joint Operations Centers and ISR locations 1 2 3 4 Optical Bandwidth Support for Additional Global Hawk UAVs Reachback Capabilities for Deployed Forces Wideband Networking for UAVs and Other ISR Net-Centric Enterprise Services Provides information and data services to all GIG users Core Enterprise Services (9) + Application Program Interfaces Application Mediation - User Assist Enterprise Systems Management Discovery Collaboration Messaging IA/Security Storage Services Increment 1 (All CESs) in 3 Spirals FY10 Increment 2 (All CESs) in 3 Spirals FY13 ISP Services Identity Mgmt Infrastructure (PKI, Biometrics) Network Defense (Enterprise Sensor Grid) Information Assurance Programs Defense in Depth Key Mgmt Infrastructure Enables trusted computer, networking, and data services to all GIG users CAC Fully Deployed 10 Gb Optical Encryptor 40 Gb Terrestrial HAIPE IP IA Component of GIG Arch 1 Gb Terrestrial HAIPE IP 10 Gb Terrestrial HAIPE IP 40 Gb Space HAIPE IP(FY10) Horizontal Fusion Portfolio Op-Intel Data Applications Processes Develops and provides net-centric means/tools to enable the smart pull and fusion of data by users through inter-related capability improvements - Improved Shared Access to Collateral data for Combat Support - Collateral data available at RSCs & DECCs Data & App’s - Collaborative Collection Management - Improved Strategic & Tactical C2 - Automated Tagging of Selected Sensor and Combat Support Data - Deployment of web-enabled Collaborative Applications to Joint Commanders - Net-centric Security Services ISR Battle Management - Improved information Sharing with Coalition Partners Power To The Edge - Data Net-Centric Enterprise Services (DDMS) - Multi-INT Fusion for Warfighters ForceNet Net-Centric DCGS Deployable CJTF HQs Future Combat System (FCS) (examples)

5 2003/2004 Participants

6 2004 Accomplishments Provided a web environment with search, discovery, collaboration, language translation, etc…) for warfighters Enabled web access to a myriad of data sources (person-based degree of separation analysis, track data, NGA/NGIC/DIA data and products, weather, HUMINT spot reports) meta-tagged with registration (I can find it) and security tags (and match it to user clearance) Created specifications and services supporting over 30 programs in a net-centric environment Provides the springboard for widespread net-centric operations and warfighting Implemented a single sign-on for applications and data access for users including coalition Implemented a set of web-based security services that are more secure than any available Ensures that users are exposed only to the data and services consistent with their clearances First use of mobile code PKI signing hard cards on the SIPRNET Proved that integration at the data level will save the DoD time and effort 5 months start to finish to 30 projects

7 FY2003/04 Take Aways Implementation of a Net-centric environment is technically doable Cultural and Policy issues make implementation difficult Net-Centric implementation is an integration effort Not about building “shiny objects” It’s about attaching capability to a common environment Focus is on interoperable services and accessible data We CAN capitalize on legacy investments Using web interfaces and tagging data Net-centric processes need continued investment and refinement Development Test and Integration Certification and Accreditation User Operations (JFCOM)

8 Out in Front HF deployment baseline is already in conformance with pending Information Sharing Environment Legislation Proposed McCain/Lieberman Legislation inspired by 9/11 report Calls for an Information Sharing Network (Title II, Section 201) A “decentralized, distributed coordinated environment” which shares “…information horizontally across agencies, vertically between levels of government, and, as appropriate with the private sector” (Section 201(c)(2)(A), page 201) “building on existing systems capabilities …” (Section 201(c)(2)(B), page 201) “utilizing industry best practices, … minimizing the centralization of data and seeking to use common tools and capabilities whenever possible” (Section 201(c)(2)(C), page 201) “employing an information rights management approach that controls access to data rather than to whole networks” through “access controls, authentication and authorization, audits, and other strong mechanisms” (Section 201(c)(2)(D)&(I), page 201) “providing directory services for locating people and information… (Section 201(d)(1), page 202)

9 FY2005 Plan First user operational assessment of net-centric implementation FusionNet (18th Airborne) and JEODNet Operational Access to SOA Core Enterprise Services/Collateral Space FusionNet and JEODNet plug into Collateral Space as a Data Provider and Consumer Pass lessons learned to cognizant organizations (DISA, NSA, …) Prepare for FY2006 activities Continue work on standards and specifications Identify implementation issues/forge path ahead Federation, Scalability, Security Incorporate next version of CES and new CES(es) Continue to bring in additional data sources and functional capabilities into the environment (as funding allows)


Download ppt "Horizontal Fusion Implementation of a Services Oriented Architecture"

Similar presentations


Ads by Google