Network-centric warfare

Network-centric warfare

Warfare
Miecze.svg
Military history

Portal  v · d · e

Network-centric warfare, also called network-centric operations,[1] is a military doctrine or theory of war pioneered by the United States Department of Defense in the 1990's.

It seeks to translate an information advantage, enabled in part by information technology, into a competitive advantage through the robust networking of well informed geographically dispersed forces.[2] This networking—combined with changes in technology, organization, processes, and people—may allow new forms of organizational behavior.

Specifically, the theory contains the following four tenets in its hypotheses:[3]

  • A robustly networked force improves information sharing;
  • Information sharing enhances the quality of information and shared situational awareness;
  • Shared situational awareness enables collaboration and self-synchronization, and enhances sustainability and speed of command; and
  • These, in turn, dramatically increase mission effectiveness.

Network Enabled Capability is a term used in the United Kingdom and elsewhere for a similar doctrine. In Sweden, one of the first nations in Europe to begin the transformation, the term, translated, is Network Based Defence.[4]

The term "netcentric warfare" may be used interchangeably with the term network-centric warfare.

Contents

Background and history

Network centric warfare can trace its immediate origins to 1996 when Admiral William Owens introduced the concept of a 'system of systems' in a paper of the same name published by the Institute National Security Studies. Owens described the serendipitous evolution of a system of intelligence sensors, command and control systems, and precision weapons that enabled enhanced situational awareness, rapid target assessment, and distributed weapon assignment.

Also in 1996, the Joint Chiefs of Staff released Joint Vision 2010, which introduced the military concept of full-spectrum dominance. Full Spectrum Dominance described the ability of the US military to dominate the battlespace from peace operations through to the outright application of military power that stemmed from the advantages of information superiority.

Network Centric Warfare

The term "network-centric warfare" and associated concepts first appeared in the Department of Navy's publication, "Copernicus: C4ISR for the 21st Century." The ideas of networking sensors, commanders, and shooters to flatten the hierarchy, reduce the operational pause, enhance precision, and increase speed of command were captured in this document. Many of these ideas were further refined and developed through models developed by the consulting firm Booz Allen Hamilton working with the Joint Staff in the Pentagon in the mid to late 1990s.

As a distinct concept, however, network-centric warfare first appeared publicly in a 1998 US Naval Institute Proceedings article by Vice Admiral Arthur K. Cebrowski and John Garstka. The concepts were later given greater depth in the book, Network Centric Warfare coauthored by Gartska, David S. Alberts (Director of Research, OASD-NII), and Fred Stein of The MITRE Corporation.

Published by the Command and Control Research Program (CCRP), the book derived a new theory of warfare from a series of case studies on how business was using information and communication technologies to improve situation analysis, accurately control inventory and production, as well as monitor customer relations.

Understanding Information Age Warfare

Network-centric warfare was followed in 2001 by Understanding Information Age Warfare (UIAW), jointly authored by Alberts, Garstka, Richard Hayes of Evidence Based Research and David S. Signori of RAND. UIAW pushed the implications of the shifts identified by network-centric warfare in order to derive an operational theory of warfare.

Starting with a series of premises on how the environment is sensed, UIAW posits a structure of three domains. The physical domain is where events take place and are perceived by sensors and individuals. Data emerging from the physical domain is transmitted through an information domain.

Data is subsequently received and processed by a cognitive domain where it is assessed and acted upon. The process replicates the "observe, orient, decide, act" loop first described by Col. John Boyd of the USAF.

Power to the Edge

The last publication dealing with the developing theory of network centric warfare appeared in 2003 with Power to the Edge, also published by the CCRP. Power to the Edge is a speculative work suggesting that modern military environments are far too complex to be understood by any one individual, organisation, or even military service.

Modern information technology permits the rapid and effective sharing of information to such a degree that "edge entities" or those that are essentially conducting military missions themselves, should be able to "pull" information from ubiquitous repositories, rather than having centralised agencies attempt to anticipate their information needs and "push" it to them. This would imply a major flattening of traditional military hierarchies, however.

It is not yet clear whether the vision of Power to the Edge is realisable, although Alberts and Hayes argue in the book that the establishment of the Global Information Grid is the first step to accomplishing it.

Power To The Edge's radical ideas had been under investigation by the Pentagon since at least 2001. In UIAW, the concept of peer-to-peer activity combined with more traditional hierarchical flow of data in the network had been introduced.

Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer network topology on the battlefield. Colonel Robert Wardell said "You have to empower the fringes if you are going to... be able to make decisions faster than the bad guy".[5]

Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense.

See Revolution in Military Affairs for further information on what is now known as "defense transformation" or "transformation".

Related technologies and programs

German Army Leopard 2A6M that incorporates systems designed to be used in conjunction with a networked battlefield

The US DOD has mandated that the Global Information Grid (GIG) will be the primary technical framework to support US network-centric warfare/network-centric operations. Under this directive, all advanced weapons platforms, sensor systems, and command and control centers are eventually to be linked via the GIG. The term system of systems is often used to describe the results of these types of massive integration efforts.

The topic Net-Centric Enterprise Services addresses the applications context of the GIG.

A number of significant U.S. military programs are taking technical steps towards supporting network-centric warfare. These include the Cooperative Engagement Capability (CEC) of the United States Navy and the BCT Network of the United States Army.

Net-Centric Enterprise Solutions for Interoperability (NESI) provides, for all phases of the acquisition of net-centric solutions, actionable guidance that meets network-centric warfare goals of the United States Department of Defense. The guidance in NESI is derived from the higher level, more abstract concepts provided in various directives, policies and mandates such as the Net-Centric Operations and Warfare Reference Model (NCOW RM) and the ASD(NII) Net-Centric Checklist.

Doctrinal tenets in United States

The doctrine of network-centric warfare for the United States armed forces draws its highest level of guidance from the concept of "team warfare", meaning the integration and synchronization of all appropriate capabilities across the various services, ranging from Army to Air Force to Coast Guard. This is part of the principle of joint warfare.

The tenets of network-centric warfare are:[6]

  • Tenet 1: A robustly networked force improves information sharing.
  • Tenet 2: Information sharing and collaboration enhance the quality of information and shared situational awareness.
  • Tenet 3: Shared situational awareness enables self-synchronization.
  • Tenet 4: These, in turn, dramatically increase mission effectiveness.

Some architectural and design challenges

  • The complexity of the Joint Tactical Radio System (JTRS) offers insight into the challenges of integrating numerous different communications systems into a unified whole. It is intended to be a software-defined radio for battlefield communications that will be backwards compatible with a very large number of other military and civilian radio systems.
  • An April 10, 2008 GAO report (GAO FCS report) highlighted the scalability of the network as a major risk factor to the Network Centric FCS program. The proposed system will be unable to network all the units into one self-forming, self-healing network.
  • The problem of coordinating bandwidth usage in a battlespace is a significant challenge, when every piece of mobile equipment and human participant becomes a potential source or relay of RF emissions.
  • It is difficult to efficiently transfer information between networks having different levels of security classification. Although multi-level security systems provide part of the solution, human intervention and decision-making is still needed to determine what specific data can and cannot be transferred.
  • Accurate locational awareness is limited when maneuvering in areas where Global Positioning System (GPS) coverage is weak or non-existent. These areas include the inside of buildings, caves, etc. as well as built-up areas and urban canyons, which are also settings for many modern military operations. Much work on reliable fusion of positional data from multiple sensors remains to be done.
  • Providing secure communications in network-centric warfare/network-centric operations is difficult, since successful key management for encryption is typically the most difficult aspect of cryptography, especially with mobile systems. The problem is exacerbated with the need for speedy deployment and nimble reconfiguration of military teams, to respond to rapidly changing conditions in the modern battlespace.

International activities

There is significant need to harmonize the technical and operational aspects of net-centric warfare and net-centric operations among multiple nations, in order to support coalition activities, joint operations, etc. Standard Agreement is the coordinating vehicle for establishing shared technical standards among NATO nations.

See also Partnership for Peace for information on extending coordination efforts to non-NATO nations that are keen to support military operations other than war activities, such as international peacekeeping, disaster response, humanitarian aid, etc.

Supporting comments

"With less than half of the ground forces and two-thirds of the military aircraft used 12 years ago in Desert Storm, we have achieved a far more difficult objective ... In Desert Storm, it usually took up to two days for target planners to get a photo of a target, confirm its coordinates, plan the mission, and deliver it to the bomber crew. Now we have near real-time imaging of targets with photos and coordinates transmitted by e-mail to aircraft already in flight. In Desert Storm, battalion, brigade, and division commanders had to rely on maps, grease pencils, and radio reports to track the movements of our forces. Today, our commanders have a real-time display of our armed forces on their computer screen."[7]

--former Vice President Richard Cheney.

"Net-centric warfare's effectiveness has greatly improved in 12 years. Desert Storm forces, involving more than 500,000 troops, were supported with 100 Mbit/s of bandwidth. Today, OIF forces, with about 350,000 warfighters, had more than 3,000 Mbit/s of satellite bandwidth, which is 30 times more bandwidth for a force 45 percent smaller. U.S. troops essentially used the same weapon platforms used in Operation Desert Storm with significantly increased effectiveness."[8]

--Lieutenant general Harry D. Raduege Jr, director, Defense Information Systems Agency.

Contradictory views

"Our incipient NCW plans may suffer defeat by [adversaries] using primitive but cagey techniques, inspired by an ideology we can neither match nor understand; or by an enemy who can knock out our vulnerable Global Positioning System or use electromagnetic pulse weapons on a limited scale, removing intelligence as we have construed it and have come to depend upon. Fighting forces accustomed to relying upon downlinks for information and commands would have little to fall back upon."
—Charles Perrow, Information Assurance, National Defense University, May 2003

The aspiration of the Australian Defence Force (ADF) to embrace network-centric warfare is outlined in the document ADF Force 2020. This vision has been criticized by Aldo Borgu, director of the Australian Strategic Policy Institute (ASPI). By developing interoperability with U.S. systems, in his view, the three arms of the Australian Defence Force could end up operating better with their sister United States services than with each other.[9]

Network centric warfare is criticized by proponents of Fourth Generation Warfare (4GW) doctrine.[citation needed]

Also, since Network-centric warfare focuses so much on distributing information, one has to be wary of the effect of false, misleading, or misinterpreted information entering the system, be it through enemy deception or simple error. Just as the usefulness of correct information can be amplified, so too can the repercussions of incorrect data entering the system achieve much greater non-positive outcomes.[citation needed]

One way that this can happen is through errors in initial conditions in an uncorrected, closed system that subsequently skew result-sets; the result-sets are then reused, amplifying the initial error by orders of magnitude in subsequent generations of result-sets; see chaos theory.[clarification needed]

Other possible failure modes or problem areas in network-centric warfare include the occurrence of the Byzantine generals' problem in peer-to-peer systems; problems caused by an inadequate or a shallow understanding of (or general disregard for) self-regulation, self-organization, systems theory, emergent behavior and cybernetics; in addition to this, there are potential issues arising from the very nature of any complex, rapidly-developed artificial system arising from complexity theory, which implies the possibility of failure modes such as congestion collapse or cascading failure.[citation needed]

See also

US military and Department of Defense specific:

References

  1. ^ Congressional Research Service NCO Background and Oversight Issues for Congress 2007, p. 1.
  2. ^ Department of Defense. The Implementation of Network-Centric Warfare. Washington, D.C., 2005, p. 4.
  3. ^ Department of Defense. The Implementation of Network-Centric Warfare. Washington, D.C., 2005, p. 7.
  4. ^ "LedsystT - Suppliers". Swedish Defence Materiel Administration. http://www.fmv.se/WmTemplates/Page.aspx?id=1421. Retrieved 2008-11-16. 
  5. ^ Walker, Leslie (November 8, 2001). "Uncle Sam Wants Napster!". Washington Post (Washingtonpost.com). http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=washtech/techthursday/columns/dotcom&contentId=A59099-2001Nov7. Retrieved 2008-11-16. 
  6. ^ Alberts, D.S., (2002), Information Age Transformation: Getting to a 21st Century Military, Washington, DC, CCRP Publications. pp. 7-8. First published 1996.
  7. ^ "Crosstalk". Stsc.hill.af.mil. 2004-01-04. http://www.stsc.hill.af.mil/crosstalk/2004/01/0401Raduege.html. Retrieved 2008-11-16. 
  8. ^ Lt. Gen. Harry D. Raduege Jr., "Net-Centric Warfare Is Changing the Battlefield Environment", Defense Information Systems Agency
  9. ^ Blenkin, Max. AAP General News (Australia), 9/17/2003

Alberts, D.S., Garstka, J.J., Stein, F.P., (2000) Network Centric Warfare: Developing and Leveraging Information Superiority, CCRP Publ., 2nd Edition (Revised). Aug 1999, Second Print Feb 2000.

External links

  1. IDGA's Network Centric Warfare
  2. The OASD-NII Command and Control Research Program (CCRP)
  3. NCOW Wiki Network-Centric Operations Warfare Wiki
  4. Net-Centric Enterprise Solutions for Interoperability (NESI)
  5. NCW related article on Crosstalk - Defense Software Engineering Journal
  6. Army War College article: Principles of Warfare on the Network-Centric Battlefield
  7. http://www.globalsecurity.org
  8. NCW Topics on Defense Update
  9. C4I.org - Computer Security & Intelligence
  10. Ericsson white paper: C4ISR for Network-Oriented Defense
  11. Understanding Network Centric Warfare
  12. Launching a new kind of warfare
  13. U.S. Air Force prepares to fight in cyberspace
  1. THE IMPORTANCE OF NETWORK ENABLED CAPABILITIES FOR 21st CENTURY DEFENCE AND NATIONAL SECURITY Article by Air Marshal Subhash Bhojwani

International links

  1. Swedish Defence Materiel Administration, includes published technical documentation.
  2. NATO Network Enabled Capabilities (NNEC)
  3. NETWORKING IN THE INDIAN SCENARIO
  4. Information Warfare
  5. NCW specialized German-American IT Venture

Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Network centric warfare — Le Network Centric Warfare est un concept popularisé sous le nom de guerre en réseau et qui est apparu à la fin du XXe siècle dans les doctrines militaires. Terme d origine américaine, il décrit une manière de conduire des opérations… …   Wikipédia en Français

  • Network-Centric Warfare — Das Militär als ein vernetztes Unternehmen (nach einer Grafik des US Verteidigungsministeriums) Network Centric Warfare (NCW), zu Deutsch etwa: netz(werk)zentrierte Kriegführung, ist ein militärisches Konzept, das durch die Vernetzung von… …   Deutsch Wikipedia

  • Network-centric warfare — Das Militär als ein vernetztes Unternehmen (nach einer Grafik des US Verteidigungsministeriums) Network Centric Warfare (NCW), zu Deutsch etwa: netz(werk)zentrierte Kriegführung, ist ein militärisches Konzept, das durch die Vernetzung von… …   Deutsch Wikipedia

  • Network Centric Warfare — Das Militär als ein vernetztes Unternehmen (nach einer Grafik des US Verteidigungsministeriums) Network Centric Warfare (NCW), zu Deutsch etwa: netz(werk)zentrierte Kriegführung, ist ein militärisches Konzept, das durch die Vernetzung von… …   Deutsch Wikipedia

  • Network centric warfare — Das Militär als ein vernetztes Unternehmen (nach einer Grafik des US Verteidigungsministeriums) Network Centric Warfare (NCW), zu Deutsch etwa: netz(werk)zentrierte Kriegführung, ist ein militärisches Konzept, das durch die Vernetzung von… …   Deutsch Wikipedia

  • Network Centric Warfare — Le Network Centric Warfare est un concept popularisé sous le nom de guerre en réseau et qui est apparu à la fin du XXe siècle dans les doctrines militaires. Terme d origine américaine, il décrit une manière de conduire des opérations… …   Wikipédia en Français

  • Network Centric Product Support — (NCPS) is an emerging computer architecture that was developed to leverage new information technology and global networks to assist in managing maintenance, support and supply chain of mobile complex products made up of one or more systems, such… …   Wikipedia

  • Network-Centric Service-Oriented Enterprise (NCSOE) — is a new generation enterprise capable of conducting collaboration and management of internal and external information. Using Network Centric Enterprise Services (NCES) , the enterprise can now enforce information and decision superiority in a… …   Wikipedia

  • Network Centric Operations Industry Consortium — Type Non Profit Industry Telecommunications Founded 2004 …   Wikipedia

  • Network-centric organization — A network centric organization is a network governance pattern emerging in many progressive 21st century enterprises. This implies new ways of working, with consequences for the enterprise’s infrastructure, processes, people and culture. Contents …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”