CERDEC WiMAX Characterization Samsung Mobile WiMAX (WiBRO)

neversinkhurriedMobile - Wireless

Nov 12, 2013 (3 years and 4 months ago)

55 views

Presented by:

Mr. Kenneth Grippo

ATO Manager


Communications
-
Electronics Research, Development and Engineering Center
Command and Control Directorate

Command and
Control Directorate
(C2D)


Information Briefing

Command and Control
Directorate (C2D)

MISSION
:

Enable

quick

transition

of

optimum

capabilities

to

The

Warfighter

through

research,

development,

integration

and

demonstration

of

technologies

and

capabilities,

and

through

the

unequaled

support

to

our

customers

in

all

of

our

core

mission

areas
-

information

and

knowledge

management
;

portable

and

mobile

power
;

platform

integration

and

prototyping
;

environmental

control

systems
;

and

position

and

navigation
.

VISION
:

To

be

the

organization

of

choice

to

the

Army

and

the

Defense

community

with

unquestionable

relevancy

in

all

of

our

core

mission

areas
.

Army Power:


Power for the Dismounted Soldier
ATO


Mounted/Dismounted Soldier
Power ATO


Fuel Cell Hybrid Power Sources
for the Soldier


Co
-
Gen Power System for TOCS


Man Portable Smart Battery
Chargers


Power Management Technologies
for the Soldier


Tactical Power Systems: 1
-
2kw
power sources: Stirling Eng/Fuel
Cells

POS/NAV:


Assured POS/NAV


Network Assisted GPS


Dead Reckoning Device


RF Positioning/Ranging System


MEMS IMU

Battle Command:



Information / Knowledge Management


TITAN ATO


Network Enabled C2 ATO


Network Enabled BC


C2 of Robotic Entities


Decision Support Software


Service Oriented Architecture


Intelligent Agents


Battle Command Planning/Execution


Managed Connectors


Tactical Battle Command

for Unmanned Systems


Air/ground Collaboration

Services for Unmanned Systems


International C2 experiments

Rapid
Prototyping:


Design Prototypes


3
-
D immersive prototypes


Build Prototypes/limited
quantity requirements.

XX

Core Competencies

Enabling Technologies:


Language Translation


Speech Recognition


Visual Interfaces

08
-
08
-
08

Tactical Information Technologies for Assured
Network Operations (TITAN)

Purpose:


Develop, mature, and demonstrate modular tools
and technologies that significantly improve the
network planning and management of the tactical
network


Develop, mature, and demonstrate security tools to
protect mobile networks from attacks and allow
information to be shared across security domains


Develop, mature, and demonstrate agent enhanced
Battle Command (BC) tools to enable real time
situational awareness and

relevant strategic and
tactical battlefield information sharing

Products:


Automated Network Management (NM) Tools


Information Assurance (IA) Tools


Space/Strategic and Tactical Information
Dissemination and Management (ID&M)
Applications and COA development

Payoff:


Reduce manpower and network management
configuration time


Share information across security domains while
ensuring trust/confidence in information being sent
to the Warfighter


Improve information sharing by providing relevant
information from strategic to a tactical operational
unit


Planning/
Replanning

Establishing the
network

Management,
Maintaining and
Reporting (Monitoring
and Fault
management)
Attack
Detect/Predict
Respond
Protect
C2 Protect Elements

Secure Configuration

Shut off unnecessary
services (email/web)

Issue file privileges

User Identification &
Authentication

Passwords/
Biometris

Message Authentication

Host S/W Protection

Host & Network
Intrusion Detection

Malicious Code
Detection

Attack Forecasting

Threat Analysis

Tighten Access Control

Identify Attack Source &
Skill Level

Re-route Traffic

Eliminate Attack Process

Damage Assessment /
Recovery

Malicious Code
Eradication
Protect, Detect, Predict and Respond components will be integrated and
managed by a Security Management architecture

Malicious Software

Viruses

Trojan Horses

Data Insertion /
Modification /
Deletion

Illegally Advance
Privileges

Denial of Service

Flooding
Net work Intruder
Insider Threat
Overrun / Capture
Information Assurance
Network
Management
Information
Dissemination
Management
Operations Order
FRAGO
Commander

s
Intent

Secure the
network

Protect the
information

Allow
information
sharing across
security domains
Find,
manage
and display
information

Planning/
Replanning

Establishing the
network

Management,
Maintaining and
Reporting (Monitoring
and Fault
management)
Attack
Detect/Predict
Respond
Protect
C2 Protect Elements

Secure Configuration

Shut off unnecessary
services (email/web)

Issue file privileges

User Identification &
Authentication

Passwords/
Biometris

Message Authentication

Host S/W Protection

Host & Network
Intrusion Detection

Malicious Code
Detection

Attack Forecasting

Threat Analysis

Tighten Access Control

Identify Attack Source &
Skill Level

Re-route Traffic

Eliminate Attack Process

Damage Assessment /
Recovery

Malicious Code
Eradication
Protect, Detect, Predict and Respond components will be integrated and
managed by a Security Management architecture

Malicious Software

Viruses

Trojan Horses

Data Insertion /
Modification /
Deletion

Illegally Advance
Privileges

Denial of Service

Flooding
Net work Intruder
Insider Threat
Overrun / Capture
Information Assurance
Network
Management
Information
Dissemination
Management
Operations Order
FRAGO
Commander

s
Intent

Secure the
network

Protect the
information

Allow
information
sharing across
security domains
Find,
manage
and display
information
Attack
Detect/Predict
Respond
Protect
C2 Protect Elements

Secure Configuration

Shut off unnecessary
services (email/web)

Issue file privileges

User Identification &
Authentication

Passwords/
Biometris

Message Authentication

Host S/W Protection

Host & Network
Intrusion Detection

Malicious Code
Detection

Attack Forecasting

Threat Analysis

Tighten Access Control

Identify Attack Source &
Skill Level

Re-route Traffic

Eliminate Attack Process

Damage Assessment /
Recovery

Malicious Code
Eradication
Protect, Detect, Predict and Respond components will be integrated and
managed by a Security Management architecture

Malicious Software

Viruses

Trojan Horses

Data Insertion /
Modification /
Deletion

Illegally Advance
Privileges

Denial of Service

Flooding
Net work Intruder
Insider Threat
Overrun / Capture
Information Assurance
Network
Management
Information
Dissemination
Management
Operations Order
FRAGO
Commander

s
Intent

Secure the
network

Protect the
information

Allow
information
sharing across
security domains
Find,
manage
and display
information
Task Name

FY07

FY08

FY09

FY10

FY11

Automated Network Management Tools


Mission to Policy Translation Engine


Integrated Fault/IA Correlation and Response
System


Autonomous Adaptive Middleware


Information Assurance Tools


Software Cross Domain Services (CDS)


Automated Intrusion Detection Response (AIDR)


MANET Security Services



Strategic and Tactical ID&M Applications


Agent enhanced threat warning, space
interoperability, situational awareness & Space
COA development / coordination (VISTA)


Battle Command Support Services

4

5

6

4

5

6

Schedule

4

5

6

4

5

6

4

5

6

5/6

4

5

6

3

5

6

6

R.ARL.2009.05/Tactical Human
Integration of Networked Knowledge

Schedule & Cost

MILESTONES

FY09 FY10 FY11 FY12

Automated net
-
centric measures

Experiments: C4ISR OTM

3

Purpose:


Enhance warfighter cognitive performance for
collaboration and decision making in a complex
dynamic net
-
centric environment


Results:


Context specific cognitive networked knowledge
requirements


Automated measures of cognitive processing and
social networking for operations and training


Data aggregation and alert capabilities based on
mission context


Guidelines for appropriate automation reliance


Payoff:


Improved information sharing and mission
performance


More effective use of available information


Improved understanding and trust among distributed
teams


Alignment of warfighter and system capabilities


Endorsements:


BCID, COL Nelson, 03/04/08


GIO, Mr. Burkhardt, 03/27/08


ARCIC, COL Bullimore, 05/08/08


PEO C3T, BG Justice, 05/19/08

Key Evaluations:

Networked
knowledge as force
multiplier

Data aggregation/alert capabilities

3

5

4

2

Knowledge requirements

4

BCBL/CASEL/FFID

Guidelines for automation reliance

3

3

2

2

3

3

4

Tool Integration

7

Schedule & Cost

CER.2009.03 / Collaborative Battlespace
Reasoning & Awareness (COBRA) ATO
-
D

Purpose:

Develop and demonstrate multi
-
platform, cross
community applications and software services

supporting the integration and synchronization of
Intelligence (Intel), Operations (Ops) and
Geospatial (Geo) functions


Products:


Multi
-
platform, cross
-
community applications
and software services



Collaboration Services



Decision Support Software Products



Planning Support Services



Priority Information Requirements (PIR)
Management Tools


Collection / Sensor Management Tools



Commercial/Joint Mapping Tool Kit
(C/JMTK) Enhancements


Unified net
-
centric data strategies


Common architecture and framework across
Intel/Ops/Geo communities


Payoff:

Faster, higher quality decision cycles and
increased Battle Command Unification.

COmposable Software for Mission
Integrated C2 (COSMIC)

Last updated: 09
-
Jun
-
09

GIG

Resources

Development,

Repositories,

Configuration Mgmt,

Quality Control

PM Component

Developer

Army App

Builder

Army App

User

Purpose:


Develop software tools and recommend supporting
hardware to facilitate warfighter application
composition in a secure, governed environment, to
provide immediate software solutions to problems
unanticipated by programs of record


Products:


Overarching architecture and framework


Graphical tools for assembling C2
-
related
software solutions (Apps)


Governance tools that ensure reliability and
security


Enhanced tools (e.g. MS Office extensions) to
provide C2
-
specific functionality


Repository of components and Apps


Reference set of C2
-
related Apps


Payoff:

Warfighters empowered to find, create and share
solutions to unanticipated problems in a managed
environment


Transition plans:

PM Battle Command; PM
Biometrics

Unmanned Systems C2 for
Urban Terrain (U
-
SCOUT)


Purpose:

Plan and manage large numbers of air and ground unmanned assets in the
tactical domain over extended urban areas at scales beyond current unmanned asset
inventories


Problem:

Existing command and control technologies for unmanned systems are
insufficient to address operations in a complex urban environmnet. Such missions will
require robust temporal and spatial planning, allowing for concurrent operation and
execution to multiple, teamed unmanned air and ground assets


Results:


Tactical Battle Command services


able to plan, deploy and manage unmand missions while
maintaining network connectivity


Dynamic resource allocation tools


capable of handling tasking and re
-
tasking of a large
number of unmanned assets


High resolution urban maneuver networks and weather effects models


Information & knowledge management tools to disseminate unmanned sensor data


Payoff:


More effective planning, execution, and coordination of unmanned systems in an urban
environment


Improved operator efficiency through intelligent agents and decision aides


Enhanced ability to observe and collect information in an urban environment

SUMMARY

CERDEC

C
2
D

is

critical

to

providing

technologies

within

o
ur

core

mission

areas

Battle

Command,

Portable

and

Mobile

Power,

Military

Platform

Integration

and

Prototyping,

Environmental

Control

Systems,

and

Navigation

to

The

Warfighter

as

quickly

as

possible
.