information dominance
play

Information Dominance through Unmanned Autonomous Vehicles 15 th - PowerPoint PPT Presentation

Information Dominance through Unmanned Autonomous Vehicles 15 th Annual INCOSE Region II Fall mini-Conference 30 October, 2010 San Diego, California Dr. S.S. Kamal Phone: 703-676-8111 Cell: 858-967-0589 E-Mail: kamalss@saic.com Defense


  1. Information Dominance through Unmanned Autonomous Vehicles 15 th Annual INCOSE Region II Fall mini-Conference 30 October, 2010 San Diego, California Dr. S.S. Kamal Phone: 703-676-8111 Cell: 858-967-0589 E-Mail: kamalss@saic.com Defense Solutions Group

  2. Some Perspective 2 1.Why “Information Dominance”?  DoD’s adoption of a Revolutionary in Military Affairs (RMA) launched information as the 3 rd dimension of modern warfare, alongside personnel and materiel.  RMA originally theorized by the Soviet Armed Forces in the 1970s and 1980s; particularly by Marshal Nikolai Ogarkov. Also of great interest by the Chinese military.  RMA = military Transformation = tied to modern information , communications , and space technology 2. What is a UAV?  Widely used to refer to an unmanned aerial vehicle; unmanned airborne vehicle; a “drone”  Now used to refer to the broader spectrum of unmanned vehicles in any domain: ground, water, air or space.  Unmanned Ground Vehicle- UGV  Unmanned Ground Sensors- UGS  Unmanned Underwater Vehicles- UUV  Unmanned Dual Domain Vehicles - UD2V

  3. Unmanned Aerial Vehicle 3

  4. Predator Maverick ISIS Q: Where Do We Fit In All of This? 4

  5. A: In Netw orking 5 1. Wireless is the technology focus 2. Specifically…wireless networking 3. Autonomous ≠ Robotic 5

  6. The Tactical Battlefield 6 6

  7. The Netw ork “Fabric” 7 7 UAV UUV UGS UGV UGS

  8. Our Focus… 8 COGNIZANT MANETs NETWORKS NETCENTRICITY CONTEXT NETWORKS

  9. 1. MANETs 9 • M obile A d Hoc Net works 1. Networks whose devices move in whatever manner (direction & speed) to execute their missions; maintaining wireless links between them to transport information (data, voice, video) between any source and destination device. 2. Because devices also route information that they did not originate, MANET devices are viewed as wireless routers . 3. Because the wireless “front-end” of these routers can be software- configured to function as many different types of radios, MANET devices are also viewed as software-definable-radio ( SDR ) routers . 4. Because 2 & 3 are true, MANET devices are being built today as SDRs with a traditional IP router integrated behind it.

  10. 2. COGNIZANT NETWORKS 10 These are MANET networks whose devices are “ aware of their situation ” and “ aware of the current applications ” 2. Situation : absolute location, relative location, source & destination location, level of threat/jamming/interference is underway 3. Current Applications : what high-level QoS policies should be applied, given the type of traffic/information passing through the device.

  11. 3. CONTEXT NETWORKS 11 Essentially a higher level of awareness and cognizance. Netcentricity = Doing your business ON the network, not via the network. Some brief examples: • Sending MedEvac alerts if warfighter sensors show injuries • Detecting UAVs and nearby MANET devices to augment network “fabric” • Determining alternate network routes if Command Centers compromised, or channels jammed • Proposing alternate mission tasks if elements compromised- during mission • Presenting Common Relevant Operating Picture (CROP) across entire organization- not only to command or OPS centers.

  12. Tying It All Together 12 Maverick Hardware Software Modules Modules SCALABILITY MANET Standard Management Interfaces Modules 12

  13. The NETCENTRIC Battlefield 1 1 3 3 UAVs: Critical Partners in UAV Establishing Information Dominance UUV UGS UGV UGS

  14. OUTSIDE the DEFENSE SECTOR 14 • Dept. of Homeland Security • Firefighting • Law Enforcement • Emergency Search-and-Rescue • Emergency Response/ Natural Disasters • Emergency Medical Response 14

Recommend


More recommend