Analysis of Policy and Standards for Joint C4ISR Network Technologies

M. Ceruti, L. Duffy, Y. Arias-Thode
{"title":"Analysis of Policy and Standards for Joint C4ISR Network Technologies","authors":"M. Ceruti, L. Duffy, Y. Arias-Thode","doi":"10.1109/POLICY.2007.6","DOIUrl":null,"url":null,"abstract":"The focus of this poster is on an analysis of the relationships between U.S. Department of Defense (DoD) networks and policy, including policy about technology acquisition and usage. Policy affects technology research, development, test, evaluation, transition and refresh. Specific network-related technology areas support military command, control, and communications (C3). Some of these technologies are described with a view toward assessing the status of policy in specific areas. The relationship between policy and network technology is explored with questions such as, \"What is policy doing for technology and vice versa?\" and \"How should we set policy priorities?\" Network policy can be divided into at least two categories. The first is policy that governs acquisition and life cycle support, such as research, development, test, evaluation, fielding, funding, and upgrading existing network technology. The other category of network policy pertains to how networks are used, user requirements for protocol, training, and rules to prevent user-created problems of all kinds. Factors that affect military network policy include the following. a. Policy has a cascading affect that is similar to the inheritance property in object-oriented design. b. Changes in user requirements and funding levels affect policy and vice versa. c. An increase in the number of deployed networks and their use has increased the number, frequency, and level of detail of policy changes and refinements. d. Policy should support new ways to use network technology. New and recently available network technologies necessitate policy updates. e. A trend is developing toward an increase in the need for training of network administrators. More training is required to include network policy and its interpretation in the context of heightened threats and greater reliance on networks for distributed, secure communications. f. Technology that enables multi-level security usage and development needs to rely on sound technologically sensible policy for its implementation. g. Policy relies on modern, dependable technology for communication, refinement, and enforcement, h. When policy changes, technology must be designed to accommodate that change without degrading every other aspect of the system, i. Systems must be change compliant and change tolerant. Policy must reflect this, j. Policy must meet the need for constant usage of critical, mission-essential technology (such C3). k. Policy must address how new networks and network types will be funded, tested, certified, fielded, and maintained. Policy should promote design and implementation of an open-network architecture with \"plug-and- play\" modularity, m. Scientists, technology developers, and users need to suggest policy changes that affect all aspects of science and technology. The defense community needs to improve methods of selecting priorities with regard to military network policy, its formulation, enforcement, and modification. As the joint military is becoming more net centric, policy makers and technology developers need to become more aware of how these priorities affect readiness and the ability of operational personnel to respond. Policy should be more responsive and flexible to include changes and upgrades according to feedback from end users so that networks can provide better, more efficient and dependable service to the war fighter. Most DoD policy was formulated with robust, persistent, and working networks in mind. Policy, standards, and technology need to be expanded to cover discontinuous and frail networks. Fault tolerance in joint combat-system networks must be upgraded. Ideally, policy development should parallel closely the development of technology and not lag far behind it.","PeriodicalId":240693,"journal":{"name":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2007.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The focus of this poster is on an analysis of the relationships between U.S. Department of Defense (DoD) networks and policy, including policy about technology acquisition and usage. Policy affects technology research, development, test, evaluation, transition and refresh. Specific network-related technology areas support military command, control, and communications (C3). Some of these technologies are described with a view toward assessing the status of policy in specific areas. The relationship between policy and network technology is explored with questions such as, "What is policy doing for technology and vice versa?" and "How should we set policy priorities?" Network policy can be divided into at least two categories. The first is policy that governs acquisition and life cycle support, such as research, development, test, evaluation, fielding, funding, and upgrading existing network technology. The other category of network policy pertains to how networks are used, user requirements for protocol, training, and rules to prevent user-created problems of all kinds. Factors that affect military network policy include the following. a. Policy has a cascading affect that is similar to the inheritance property in object-oriented design. b. Changes in user requirements and funding levels affect policy and vice versa. c. An increase in the number of deployed networks and their use has increased the number, frequency, and level of detail of policy changes and refinements. d. Policy should support new ways to use network technology. New and recently available network technologies necessitate policy updates. e. A trend is developing toward an increase in the need for training of network administrators. More training is required to include network policy and its interpretation in the context of heightened threats and greater reliance on networks for distributed, secure communications. f. Technology that enables multi-level security usage and development needs to rely on sound technologically sensible policy for its implementation. g. Policy relies on modern, dependable technology for communication, refinement, and enforcement, h. When policy changes, technology must be designed to accommodate that change without degrading every other aspect of the system, i. Systems must be change compliant and change tolerant. Policy must reflect this, j. Policy must meet the need for constant usage of critical, mission-essential technology (such C3). k. Policy must address how new networks and network types will be funded, tested, certified, fielded, and maintained. Policy should promote design and implementation of an open-network architecture with "plug-and- play" modularity, m. Scientists, technology developers, and users need to suggest policy changes that affect all aspects of science and technology. The defense community needs to improve methods of selecting priorities with regard to military network policy, its formulation, enforcement, and modification. As the joint military is becoming more net centric, policy makers and technology developers need to become more aware of how these priorities affect readiness and the ability of operational personnel to respond. Policy should be more responsive and flexible to include changes and upgrades according to feedback from end users so that networks can provide better, more efficient and dependable service to the war fighter. Most DoD policy was formulated with robust, persistent, and working networks in mind. Policy, standards, and technology need to be expanded to cover discontinuous and frail networks. Fault tolerance in joint combat-system networks must be upgraded. Ideally, policy development should parallel closely the development of technology and not lag far behind it.
联合C4ISR网络技术政策与标准分析
这张海报的重点是分析美国国防部(DoD)网络与政策之间的关系,包括有关技术获取和使用的政策。政策影响着技术的研究、开发、测试、评价、过渡和更新。特定的网络相关技术领域支持军事指挥、控制和通信(C3)。描述其中一些技术是为了评估具体领域的政策状况。政策和网络技术之间的关系通过诸如“政策对技术的作用是什么,反之亦然?”和“我们应该如何设置政策优先级?”网络策略至少可以分为两类。第一个是管理获取和生命周期支持的政策,例如研究、开发、测试、评估、部署、资助和升级现有的网络技术。另一类网络策略涉及如何使用网络、用户对协议的需求、培训和规则,以防止用户产生各种问题。影响军事网络政策的因素包括以下几个方面。a.策略具有级联效应,类似于面向对象设计中的继承属性。b.用户需求和供资水平的变化影响政策,反之亦然。c.部署的网络数量及其使用的增加增加了政策变化和改进的数量、频率和细节水平。政策应支持使用网络技术的新方法。新的和最近可用的网络技术需要更新策略。e.对网络管理员培训的需求正在增加。需要更多的培训,包括在威胁加剧和更依赖网络进行分布式、安全通信的背景下对网络政策及其解释。f.能够使用和发展多层次安全的技术需要依靠技术上合理的政策来实施。策略依赖于现代的、可靠的技术进行沟通、改进和执行,h。当策略发生变化时,技术必须被设计成在不降低系统其他方面的情况下适应这种变化,i.系统必须是变化兼容和变化容忍的。政策必须反映这一点,j.政策必须满足持续使用关键的、任务必需的技术(如C3)的需要。政策必须解决如何资助、测试、认证、部署和维护新网络和网络类型的问题。政策应促进具有“即插即用”模块化的开放网络架构的设计和实施。科学家、技术开发人员和用户需要建议影响科学和技术各个方面的政策变化。防务界需要改进选择军事网络政策优先事项的方法,包括其制定、执行和修改。随着联合军队越来越以网络为中心,政策制定者和技术开发人员需要更加意识到这些优先事项如何影响战备状态和作战人员的反应能力。政策应更具响应性和灵活性,根据最终用户的反馈包括变更和升级,以便网络能够为作战人员提供更好、更高效和更可靠的服务。大多数国防部政策都是在考虑到强大、持久和工作网络的情况下制定的。需要扩大政策、标准和技术,以覆盖不连续和脆弱的网络。联合作战系统网络的容错能力必须得到提升。理想情况下,政策的发展应该与技术的发展紧密同步,而不是远远落后于技术的发展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信