1 / 23

Interoperability Process and Net-Ready Key Performance Parameter

UNCLASSIFIED. Interoperability Process and Net-Ready Key Performance Parameter. LTC Tom Gaetjen J6I. Agenda. Set Stage Today's Approach Tomorrow’s Vision How Do We Get There?. DISA(JITC) Interoperability Test Certification. Revised DODD 5000.1, DODI 5000.2 and DOD 5000.2R - USD-AT&L.

leija
Télécharger la présentation

Interoperability Process and Net-Ready Key Performance Parameter

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UNCLASSIFIED Interoperability Process andNet-Ready Key Performance Parameter LTC Tom Gaetjen J6I

  2. Agenda • Set Stage • Today's Approach • Tomorrow’s Vision • How Do We Get There?

  3. DISA(JITC) Interoperability Test Certification Revised DODD 5000.1, DODI 5000.2 and DOD 5000.2R - USD-AT&L DODD 4630.5 & DODI 4630.8 - OASD-NII Capabilities Acquisition Testing Information Support Plan (OASD-NII) Operational/Systems/Technical Architecture Infrastructure Support • CJCSI 3170 (J8) • Capability Validation Process/Procedures • ICD, CDD, CPD Format • NET READY KPP TEMP Systems specs accurately reflect requirements and acquisition documents Process Service/Agency Testing • DT/Standards Conformance • OT&E • Interoperability Testing • CJCSI 6212 (J6) • Interoperability and Supportability Certification and Testing • Methodology for Net Ready KPP Development /Validation J-6 Interoperability System Validation

  4. MS-A KDP-A MS-C KDP-C MS-B KDP-B DoDI 5000 DAB/DSAB/ITAB DAB/DSAB/ITAB DAB/DSAB/ITAB IOC CJCSI 3170 Analysis REFINE ANALYSIS REFINE ANALYSIS JROC JROC ICD CDD CPD JROC Sync – DoDI 5000 &CJCSI 3170 and 6212 DOT&E Review J6 Validation Test and Evaluation Master Plan (TEMP) Service/Agency Operational Testing CJCSI 6212 J-6 Interoperability & Supportability Certification and Testing Initial Information Systems Plan (ISP) Updated Information Systems Plan (ISP) DISA (JITC) Interoperability Certification Testing J-6 Interoperability and Supportability Certification J-6 interoperability and Supportability Certification IA Accreditation (DITSCAP)

  5. Interoperability KPP Threshold (T) Objective (O) All top-level IERs will be satisfied to the standards specified in the Threshold (T) and Objective (O) values. 100% of top-level IERs designated critical 100% of top-level IERs Interoperability KPP Today Top-level IERs will be used as the basis to develop interoperability KPPs. The interoperability KPP definition will include that all top-level IERs will be satisfied to the standards specified in the threshold and objective values. Typically the threshold criterion for the interoperability KPP will be 100 percent accomplishment of the critical top-level IERs, and the objective criterion for the interoperability KPP will be the accomplishment of all top-level IERs. (CJCSI 6212.01B)

  6. Problem: IER Scalability One-to-One Current Interoperability KPP centers around one DoD architectural view (OV-3) that contains “Information Exchange Requirements” (IERs) • One-to-one relationship (point-to-point) This example: 10 systems IERs 10(9-1) = 90

  7. Solution: The Net-Ready Approach One-to-Many Net Ready approach centers on central network: • Focus on organizational contributions and consumption of information • One-to-network paradigm Network This example: 1 system has to deal 1 interface

  8. One-to-Many

  9. Net-Ready Key Performance Parameter Synthesis Integrated Architecture (FCB/SERVICE/PM) Key Interface Compliance (OSD (NII) & JS) NCOW RM Compliance OSD(NII) Information Assurance (DITSCAP*) • Generic user-interface • Intelligent-assistant capabilities • Net-centric service capabilities (core services, Community of Interest (COI) services, • Environment control services • Enterprise management components. • Operational and Systems functionality • Interface Technical specification • OV, SV-TV bridge • Systems Engineering • Interface MGMT Plan • Availability • Integrity • Authentication • Confidentiality • Non-repudiation • Operational Nodes • Organizational Relationships • Operational Activity • Operational Event-Trace • Systems Functionality Description • Operational Activity to Systems Function • Systems Data Exchange Technical Architecture Profile *DoD Information Technology Security Certification and Accreditation Process *

  10. Net Ready KPP Statement Objective (O) 100% of interfaces; services; policy-enforcement controls; and data correctness, availability and processing requirements in the Joint integrated architecture Net Ready KPP All activity interfaces, services, policy-enforcement controls, and data-sharing of the NCOW-RM and GIG-KIPs will be satisfied to the requirements of the specific Joint integrated architecture products (including data correctness, data availability and data processing), and information assurance accreditation, specified in the threshold (T) and objective (O) values. Threshold (T) 100% of interfaces; services; policy-enforcement controls; and data correctness, availability and processing requirements designated as enterprise-level or critical in the Joint integrated architecture

  11. Attributes Information needs Information timeliness Information assurance Net-enabled Metrics Core Elements Information Processing Information Transfer Information Modeling, Metadata, and Information Exchange Human-Computer Interface Information Security/Assurance Community of Interest (COI) Elements Content, Accuracy, Timeliness, Relevance KPP Testing/ Metrics

  12. Net Centric Characteristics • Is it Internet Protocol (IP) based? • Is it encrypted, with black core only? • Do you handle information only once (OHIO)? • Is data posted for use as soon as it is available? • Do applications encourage “discovery”-Smart Pull, not Push? • Is data separate from the application? • Can users pull multiple applications to access same data? • Does network security support dynamic allocation of access? • Is quality of service defined?

  13. 3 How GES/NCES works Storage Services Discovery Services Messaging Services 2 1 1 4 Recon Team 3 1 Post Alert Match Profile & Trigger Alert 2 4 Pull

  14. 3 How NCES works (Cont’d) Collaboration Services Mediation Services Security Services 1 1 1 2 1 Coalition Recon Team Fusion Center 1 Report 2 Deliver Transformed Data 3 Share Estimate

  15. Complementary and Corresponding Systems • GIG BE • JTRS • GCCS • NCES • TCS • Crypto Modernization • Collaboration Tools • Horizontal Fusion

  16. CLASSIFICATION (U) JTRS Internal growth capacity Set modes/ capabilities/ configuration via net Retransmit/Crossband/waveform supportable Field time/critical waveforms Operate designated # of channels at same time Scaleable Networking Services System Network Interoperability FCS Joint Interoperability Networked Battle Command Network lethality Transportability Sustainability/Reliability Training Survivability T OMMORROW Evolving the Interoperability Key Performance Parameter T O D A Y Business Domains Warfighter Domains Expedient COIs Command & Control Users Force Application Installations & Environment Human Resources Acquisition/ Procurement Protection National Intel Domain Finance, Accounting Operations Strategic Planning & Budget Logistics Focused Logistics Battlespace Awareness Key Interface Applications Enterprise Services Management Mediation Discovery Security Key Interface Messaging Collaboration User Assistant Storage Key Interface Net Centric Enterprise Services (NCES) 4 Pillars Information Assurance NCOW RM Compliant Integrated Architecture Products GIG KIPs Key Interface

  17. Questions?

  18. BACKUPS

  19. Net-Centric Operations and Warfare (NCOW)Reference Model Provide Net-Centric Information Environment A0 Interact with Net-Centric Services A1 Perform Net-Centric User/Entity Services A2 Provide Net-Centric Services A3 Resource Service Requests A4 Manage Net-Centric Information Environment A5

  20. Framework Products Framework Product Name General Description AV-1 Overview and Summary Information Scope, purpose, intended users, environment depicted, analytical findings OV-2 Operational Node Connectivity Description Operational Nodes, operational activities performed at each node, connectivity and information exchange needlines between nodes OV-4 Organizational Relationships Chart Organizational, role, or other relationships among organizations OV-5 Operational Activity Model Operational activities, relationships among activities, inputs and outputs. Overlays can show cost performing nodes, or other pertinent information. OV-6c Operational Event-Trace Description One of three products used to describe operational activity sequence and timing – traces actions in a scenario or sequence of events and specifies timing of events. SV-4 Systems Functionality Description Functions performed by systems and the information flow among system functions SV-5 Operational Activity to Systems Function Traceability Matrix Mapping of systems back to operational capabilities or of system functions back to operational activities. SV-6 Systems Data Exchange Matrix Provides details of systems data being exchanged between systems. TV-1 Technical Standards Profile Extraction of standards that apply to the given architecture. Supporting Integrated Architecture Products

  21. Business Domains Installations & Environment Human Resource Acquisition/ Procurement Finance, Accounting Operations Strategic Planning & Budget Logistics GIG Enterprise Services Vision DoD (Title 10) IC (Title 50) Warfighter Domains Expedient COI’s Users Users Domain/ Community-of-Interest (COI) capabilities Force Application Command & Control COI’s Protection COI’s National Intel Domain Battlespace Awareness Focused Logistics Levels of services above core level Cross Domain COI’s (e.g. Situational Awareness, M&S) GIG Network Application Discovery Security Mediation Application Discovery Security Mediation Enterprise Service Management Services Services Services Services Core Enterprise Services (CES) User User Assistant Storage Collaboration Assistant Storage Messaging Services Services Services Net-Centric Enterprise Services

  22. Communications KIPs Logical Networks to DISN Transport Backbone Space to Terrestrial Interface JTF to Coalition JTF Component to JTF Headquarters Joint Interconnection Service DISN Service Delivery Node Secure Enclave Service Delivery Node (e.g., SCI/Collateral KIP) Computing KIPs Application Server to Database Server Client to Server Applications to COE/CCP Network Operations KIPs End System to PKI Management Systems to (integrated) Management Systems Management Systems to Managed Systems IDM to Distribution Infrastructure Information Servers to IDM Infrastructure Applications Application Server to Shared Data (e.g., Situational Awareness Data KIP) The 17 Key Interfaces Teleport (i.e., deployed interface to DISN) (Pilot Projects in Red)

  23. DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Document Mission Need Phase 1 Definition SSAA Phase 2 Verification Life Cycle Activity System Development Activity Registration Negotiation Acceptable Ready To Certify Yes Yes Certification Analysis Agreement No Yes Correct SSAA No No Reanalysis Phase 4 Post Accreditation Phase 3 Validation SSAA SSAA No Certification Evaluation Of Int Sys Change Requested System Operation Certify System Yes Yes Develop Recommend. No Compliance Validation Required No Accreditation Granted Yes Yes

More Related