mission critical computing: do standards...
TRANSCRIPT
Mission Critical Computing:Do Standards Matter?
Dawn MeyerriecksPrincipal Director, Global Information Grid Enterprise Services
(703)[email protected]
Current Operations Support : A Sample Operational Thread
““Freedom is not synonymous with an easy life.... There are many difficult things about freedom: It does not give you safety, it creates moral dilemmas for you; it requires self-discipline; it
imposes great responsibilities; but such is the nature of Man and in such consists his glory and salvation.”
Margaret Thatcher
Sample Mission Thread:Battle Damage Assessment to Target
LegendArmyNavy
Air ForceJoint
CommercialCamp Doha
Qatar
DISN
Sigonella
Ali Al Salem
Norfolk
GWY
Langley
PSAB
MacDill
USAF RemoteOPNS
European Spt Site
GWY
ClientAppSvr
CJTF Deployed
Client
Networks @ Multiple Security Levels
INTERNET
DataSvr
ClientAppSvr
ClientCommSvr
C2 Reachback
DoD Intranet
KG
KG
KG
KG
KG
KGDataSvr
ClientAppSvr
ClientCommSvr
Intel Reachback
Intel Network
Logistics Reachback
AppSvr
DataSvr
DataSvr
Sensors
Shooter
DoD Secret Network
ClientAppSvr
JTF Deployed
Client
Personnel Reachback
AppSvr
DataSvr
AppSvr
FW
Joint Worldwide Intelligence
Communication SystemJoint Intel Center
K-7 CP 2270 Fiber PP
OC3 Mux Fiber PP
SPACELINK
OC3 Mux
Pair Gain
Cooper PP
Cooper PP
Pair Gain
P800 10 MS
EchoCanceller
P Coder
Pair Gain
Pair Gain
PRC
K-7 SIPRNET Router
CP 2270K-19
NIPRNET Router
SL-100 (DSN)
CP 2270 EF 8650SCTE 5 MS
EF 8650SCTE 5 MS CX Patch KG-194 Patch P 800
RESPONSIBILITY USAF Tech Control Center
RESPONSIBILITY RESPONSIBILITY RESPONSIBILITYSPACELINK Defense Information Systems Agency USN Tech Control Center
ATM
JWICS Enclave/
DIAC
JWICS Enclave
CX
CP2270
Joint Worldwide Intelligence
Communication System
JOINTJOINT
NAVYDISA
AIR FORCE
K-7
P800 10 MS
Communications Relay Path
JWICS SIPR
Single Supporting Data Source
Service/JTF
National
MLDBR
CoCom
JTT
JTT
JTTJTT JTT JTT
NIMA(St. Louis)
JTT
GCCS
CENTCOM
MLDBR
West CoastBGs/ARGs/MEUs
EUCOMSOUTHCOM
CENTRIX(Coalition)
PACOM(JICPAC)
GCCS/GCCS
GCCSGCCSGCCS
GCCSGCCS
STRATCOM
SOCOMGCCSGCCS
ARCENT(CFLCC)
NAVCENT(CFMCC)CENTAF
BATTLEGROUP
GCCS/TBMCS
GCCS/TBMCS
GCCS/GCCS(ASAS)
GCCS-M/GCCS-M
GCCS-M/GCCS-M
IOS/IOS
GCCSclients
JTF-SWA(CFACC) MARCENT SOCCENT
(CFSOCC)
JSOC
JCS DIA
INSCOM NSA NRO (Field Site)
GCCS/GCCS
GCCS/GCCS
GCCS/GCCS
GCCS/GCCS
GCCS
NIMA
GCCS
Operation Iraqi Freedom Successes
First- All-Service and SOF, Red, Blue, & Intel fused picture.
First- Large-scale use of secure satellite phones in a combat environment.
First- Extensive coalition automated information sharing exchange.
First- Desktop collaboration tools used for joint C2.
First- Widespread use of VTC as a C2 system.
First- Ubiquitous use of commercial SATCOM to supplement military SATCOM.
First- Extensive coordinated use of UAVs.
First- Real time in-transit/asset visibility.
Operation Iraqi FreedomCommunications Trends
May2003
Voic
e D
RSN
Voic
e D
RSN
DA
TA
DA
TA
NIP
R/S
IPR
NIP
R/S
IPR
Voic
e D
SNVo
ice
DSN
FIB
ER O
PTIC
FIB
ER O
PTIC
SATC
OM
SATC
OM
Secu
re V
TC
Secu
re V
TC
138 X138 X10 X10 X 6 X6 X 39 X39 X 22 X22 X
17 X17 X5 X5 X
305305MbpsMbps
1919MbpsMbps
44MbpsMbps
44 confper day
3200Mbps
130Mbps
750Kmin/day
19K19Kmin/daymin/day
2.12.1MbpsMbps
10.5Mbps
555Mbps
2 conf.2 conf.per dayper day
176176per mo.per mo.
3100+per mo.
Sep2001
Logi
stic
s Q
ueri
es
Logi
stic
s Q
uerie
s
Why We’re Here Today:The Challenge
• Current Enterprise-Wide Infrastructure Approaches Are Aging– Good News: 27 Releases of Global Command and Control Since
9/11– Bad News: Insufficiently Scalable, Flexible, Technologically
Dated• Current Web Services, Enterprise Application Integration,
Service-Oriented Architectures Hold Promise– Good News: Early Enterprise Efforts Indicate Certain Aspects of
Technology are Sufficiently Mature for Broad Application– Bad News: Lots of Maturation Still Required – Both for the
Federal Enterprise to Use and for the Commercial Technology Itself
The Future
“…possibly the single-most transforming thing in our forces will not be a weapons system, but a set of a set of
interconnectionsinterconnections and a substantially enhanced capability because of that awarenessawareness.”
-- Defense Secretary Rumsfeld
To Counter the Asymmetric Threat:Agile NetCentric Warfare
- Transform Federal Intranets into Service Oriented Architectures
- Publish all information as early and as widely as possible- Empower Users to pull whatever they want whenever they
want- Distribute Product Management to specialized
Communities but- Clearly identify Information Producers to the Enterprise- Exploit Market Mechanisms
Visibility Supply & Demand Agility ROI Metrics
“Boundaryless Information Flow”
Scale: Several Million Users; Tens of Thousands of Information Services
Keys to Agility1st - Comprehensive, accurate, shared Situation Awareness to
enable self-synchronization
2nd - Mobility and “Composability” to rapidly reconfigure forces and supporting information capabilities
3rd - Service Oriented Architecture (SOA)– Modular, loosely coupled Rapidly reconfigurable– Ubiquitous user access Collaboration
Result: Dramatically accelerated organizational learning* cycle!*Responders (Users) exhibit rapid behavior change in combat (continuous experimentation)
The New Assumptions• Industrial Age (System-centric)
– Clear lines of authority– Limited Scope (Finite system boundaries and user population)– Known, relatively static requirements– Predictable future (stable Business environment and standard processes)– Deduce designs from high level abstractions and test effectiveness with small-scale
experimentation
• Information Age (Net-centric)– Boundless information space with no single controlling authority– Highly dynamic requirements w/ many unknowns– Marginally predictable near term future– Many users engaging in unpredictable ways at unpredictable intervals– Highly, Dynamically Interconnected
Designs must:8. Derive from massive simulations and ongoing real world observations 9. Be agile before and after fielding in response to new conditions
The New ImperativesHow to Improve Design of large, complex Net-
centric capabilities? How to Lower Risks inherent in designing and
deploying large, complex Net-centric capabilities?
Shape evolution of Enterprise ITVice
Build systems