Clapp, g., sworDer,d.coMmand, Control and cOmmunications(c) The Electrical Engineering Handbook Ed. Richard C. Dorf Boca raton crc Press llc. 2000
Clapp, G., Sworder, D. “Command, Control and Communications (C3 )” The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000
103 Command, Control, and Communications(C3) G. Clapp Ocean Surveillance Center 103.3 The Technologies of C 103.4 The Dynamics of Encounters D. Sworder 103.5 The Role of the human Decisionmaker in C3 University of California, San Diego 103.6 Summary 103.1 Scope The focus of this chapter is not a detailed profile of a current or planned military C system but it is rather on programmatic reorderings render such express descriptions to become rapidly outdated. Thus block dagrare o the issues and the technologies of the C mission. Evolving technology, an evolving world order, and constant of specific military systems(and listings of their acronyms)are de-emphasized. Of paramount interest is not electronics technology in isolation, but rather technology integrated into systems and analysis of these systems operating under complex real world environments that include technologically capable adversaries. The human commander or decisionmaker, as the principal action element in a C system, is included explicitly in the 103.2 Background Electronics technology is nowhere more intensively and broadly applied than in military systems. Military systems are effective only through their command and control( c)and this is recognized by the fact that is a critical discipline within the military. Frequently systems will be denoted C2I or CI rather than command and control. This adds to C2 the essential area of intelligence and intelligence products derived from surveillance systems. All variants of these acronyms are to be considered equal, whether or not communications, intelligence, or surveillance have been left implicit or made explicit. Likewise the superscript notation is considered optional and interchangeable. The formal discipline of C3 within the military has not been matched by focused technical journals or university curricula due to its highly multidisciplinary nature Two definitions from a Joint Chiefs of Staff (CS)publication CS, Pub. 1] capture the breadth of C2. This ference defines command and control as"The exercise of authority and direction by a properly designated commander over assigned forces in the accomplishment of his mission Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures which are employed by a commander in planning, directing, coordinating and controlling forces and operations in the accomplishment of his mission. C2 systems are defined, with almost equal breadth, as "An integrated system comprised of doctrine, pI dures, or onal structure, personnel, equipment, facilities, and communications which provides autho ities at all levels with timely and adequate data to plan, direct and control their operation c 2000 by CRC Press LLC
© 2000 by CRC Press LLC 103 Command, Control, and Communications (C3) 103.1 Scope 103.2 Background 103.3 The Technologies of C3 103.4 The Dynamics of Encounters 103.5 The Role of the Human Decisionmaker in C3 103.6 Summary 103.1 Scope The focus of this chapter is not a detailed profile of a current or planned military C3 system but it is rather on the issues and the technologies of the C3 mission. Evolving technology, an evolving world order, and constant programmatic reorderings render such express descriptions to become rapidly outdated. Thus block diagrams of specific military systems (and listings of their acronyms) are de-emphasized. Of paramount interest is not electronics technology in isolation, but rather technology integrated into systems and analysis of these systems operating under complex real world environments that include technologically capable adversaries. The human commander or decisionmaker, as the principal action element in a C3 system, is included explicitly in the system analysis. 103.2 Background Electronics technology is nowhere more intensively and broadly applied than in military systems. Military systems are effective only through their command and control (C2 ) and this is recognized by the fact that C3 is a critical discipline within the military. Frequently systems will be denoted C2 I or C3 I rather than command and control. This adds to C2 the essential area of intelligence and intelligence products derived from surveillance systems.All variants of these acronyms are to be considered equal, whether or not communications, intelligence, or surveillance have been left implicit or made explicit. Likewise the superscript notation is considered optional and interchangeable. The formal discipline of C3 within the military has not been matched by focused technical journals or university curricula due to its highly multidisciplinary nature. Two definitions from a Joint Chiefs of Staff (JCS) publication [JCS, Pub. 1] capture the breadth of C2. This reference defines command and control as “The exercise of authority and direction by a properly designated commander over assigned forces in the accomplishment of his mission. Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures which are employed by a commander in planning, directing, coordinating and controlling forces and operations in the accomplishment of his mission.” C2 systems are defined, with almost equal breadth, as “An integrated system comprised of doctrine, procedures, organizational structure, personnel, equipment, facilities, and communications which provides authorities at all levels with timely and adequate data to plan, direct and control their operations.” G. Clapp Naval Command, Control and Ocean Surveillance Center D. Sworder University of California, San Diego
A LOOK TOWARD FUTURE FLIGHT O March 19, 1996, NASA and McDonnell Douglas Corporation unveiled to the public a new subsonic flight vehicle designated X-36, a remotely piloted tailless research aircraft. The X-36 designed to demonstrate the feasibility of future tailless military fighters that can achieve agility levels superior to those of today's aircraft. In the absence of a tail, control of the X-36 is accomplished by a combination of thrust vectoring and innovative aerodynamic control features. Tailless fighter configurations offer reduced weight, increased range, and improvement in survivability. The X-36 is" flown" by a pilot located in a van at the flight test facility; a camera in the XX-36 cockpit relays instrument readings and displays to a console in the van With a wing span of only 10.4 feet and a gross weight under 1, 300 pounds, the X-36 is powered by a single turbofan originally designed as a cruise missile power plant. The X-36 program is intended to establish confidence to incorporate these technologies in future iloted vehicles. This project exemplifies one aspect of a NASA aeronautical research and technology of gram that seeks to improve the performance, efficiency and environmental characteristics of all types of planes and, additionally, addresses such infrastructure factors as air traffic control, navigation, and nications.( Courtesy of National Aeronautics and Space Administration. Designed jointly by NASA and McDonnell Douglas Corporation, the X-36 is a subscale, remotely piloted tailless vehicle for demonstrating technologies that could lead to lighter, longer e survivable fighter aircraft. (Photo courtesy of National Aeronautics and Space Administration. Though general, two points emerge from these definitions: (1)C is multidisciplinary and (2)C is a process which, to this point, includes only implicit roles for electronics technology. One military service, however, often refers to C and CI or has even used C l where the final C and second I refer to computers and interoperabilit respectively, as acknowledgment of the increasing reliance on technology. A C3 system can be visualized as shown in Fig. 103.1. Within the constraints imposed by organization, doctrine, and the skills of the personnel of the military unit, the commander plans and controls his forces. At basic level, command and control is a resource allocation problem, which often must be solved under much
© 2000 by CRC Press LLC Though general, two points emerge from these definitions: (1) C3 is multidisciplinary and (2) C3 is a process which, to this point, includes only implicit roles for electronics technology. One military service, however, often refers to C4 and C4 I or has even used C4 I2 where the final C and second I refer to computers and interoperability, respectively, as acknowledgment of the increasing reliance on technology. A C3 system can be visualized as shown in Fig. 103.1. Within the constraints imposed by organization, doctrine, and the skills of the personnel of the military unit, the commander plans and controls his forces. At a basic level, command and control is a resource allocation problem, which often must be solved under much tighter time horizons and subject to greater uncertainty levels than exist in civil applications. A LOOK TOWARD FUTURE FLIGHT n March 19, 1996, NASA and McDonnell Douglas Corporation unveiled to the public a new subsonic flight vehicle designated X-36, a remotely piloted tailless research aircraft. The X-36 is designed to demonstrate the feasibility of future tailless military fighters that can achieve agility levels superior to those of today’s aircraft. In the absence of a tail, control of the X-36 is accomplished by a combination of thrust vectoring and innovative aerodynamic control features. Tailless fighter configurations offer reduced weight, increased range, and improvement in survivability. The X-36 is “flown” by a pilot located in a van at the flight test facility; a camera in the XX-36 cockpit relays instrument readings and displays to a console in the van. With a wing span of only 10.4 feet and a gross weight under 1,300 pounds, the X-36 is powered by a single turbofan originally designed as a cruise missile power plant. The X-36 program is intended to establish confidence to incorporate these technologies in future piloted vehicles. This project exemplifies one aspect of a NASA aeronautical research and technology program that seeks to improve the performance, efficiency, and environmental characteristics of all types of planes and, additionally, addresses such infrastructure factors as air traffic control, navigation, and communications. (Courtesy of National Aeronautics and Space Administration.) Designed jointly by NASA and McDonnell Douglas Corporation, the X-36 is a subscale, remotely piloted tailless vehicle for demonstrating technologies that could lead to lighter, longer-ranging, more survivable, more agile military fighter aircraft. (Photo courtesy of National Aeronautics and Space Administration.) O
ORGANIZATION HARDWARE DOCTRINE EDUCATION FIGURE 103. 1 Components of C3. The four basic components display overlapped regions to indicate their inseparability. A portion of each category can be designed in isolation; a new antenna or a new radio with decreased size, weight, or power consumption has minimal impact on the other components. However, insertion of a broad new technology (e.g, a radio relay combined with a remotely piloted vehicle(RPv)or the networking of radios) has wide reaching consequences and it may take years to fully integrate into doctrine, training, and organization. The conjunction of the four areas, when specified with some detail, represents or contains an architecture. If the assets, the doctrine, and re limited to just one military function, then the aggregation is referred to as a mission architecture. Figure 103.2 depicts two approaches to achieving C3 architectures. The first Fig. 103. 2(a)) is essentially an aggregation and combination of existing assets and is referred to as a"bottom up"architecture. The"top-down"version of architecture development Fig 103. 2(b)] begins with earlier and high order perspective(and higher order oversight). Interfaces and interface standards become more important standards is desired. When new or updated equipment is designed or acquired it can be integrated without new interface developments, a key property of an"open system?"architecture. A developing architecture of this type is entitled, at the Joint Chiefs of Staff level, "CAI for the Warrior. " Service-specific top-down architec ures are Copernicus(Navy), AirLand 2000(Army), MTACCS( Marine Corps Tactical Command and Control System)and a yet unnamed Air Force architecture. Each of these are to be considered as evolving architectures and all reflect the impact and importance of scenarios with highly mobile nodes. The open system or top-down approach promotes interoperability between the developments of each service Capital investment constraints limit strict adherence to either architectural approach. MTACCS is a meta system of seven independently developed systems and is best described as a hybrid architecture. Most commu- nication systems within any of the above architectures existed prior to an architecture and thus have a hybrid nature Doctrine is a formalized description of military mission definitions and often includes the procedures to accomplish those missions. Doctrine will also often specify the organizational structure appropriate to the specific missions. Some military establishments adhere to strong doctrinal orientation, even down to strict dictation of technology developments. Other establishments treat doctrine as a loose guideline that can be liberally modified One foreign military analyst observed that U.S. commanders did not seem to read their own doctrinal publications, and even if they did, would not mpelled to follow them. A flexible military organization with flexible doctrine, however, can be constrained by inflexible hardware and software. Thus an emerging C3 emphasis is a technical focus on modular equipments, standard interfaces between equipments open system"architectures, and(software)programmable equipments The best way to understand military C3 is to view it as a set of adaptive control loops. The basic variable information and most of the effort in C3 synthesis is devoted to information handling and management. The resource allocation problem with feedback found in C3 has obvious similarities to those found in corporate operations and public safety service operations. Each is characterized by multiple priorities, limited resources, timelines, and deadlines for performance. Measures of the consequences of a given action tend to be obscured both by its antecedent actions and by changing external environments. The external environment contains both continuous events(i. e, tracking of targets)and discontinuous events(i.e, an equipment failure or the onset of communications jamming e 2000 by CRC Press LLC
© 2000 by CRC Press LLC The four basic components display overlapped regions to indicate their inseparability. A portion of each category can be designed in isolation; a new antenna or a new radio with decreased size, weight, or power consumption has minimal impact on the other components. However, insertion of a broad new technology (e.g., a radio relay combined with a remotely piloted vehicle (RPV) or the networking of radios) has wide reaching consequences and it may take years to fully integrate into doctrine, training, and organization. The conjunction of the four areas, when specified with some detail, represents or contains an architecture. If the assets, the doctrine, and so on are limited to just one military function, then the aggregation is referred to as a mission architecture. Figure 103.2 depicts two approaches to achieving C3 architectures. The first [Fig. 103.2(a)] is essentially an aggregation and combination of existing assets and is referred to as a “bottomup” architecture. The “top-down” version of architecture development [Fig. 103.2(b)] begins with earlier and high order perspective (and higher order oversight). Interfaces and interface standards become more important in top-down architectures; instead of numerous custom and unique interfaces, a minimal set of interface standards is desired. When new or updated equipment is designed or acquired it can be integrated without new interface developments, a key property of an “open system” architecture. A developing architecture of this type is entitled, at the Joint Chiefs of Staff level, “C4I for the Warrior.” Service-specific top-down architectures are Copernicus (Navy), AirLand 2000 (Army), MTACCS (Marine Corps Tactical Command and Control System) and a yet unnamed Air Force architecture. Each of these are to be considered as evolving architectures and all reflect the impact and importance of scenarios with highly mobile nodes. The open system or top-down approach promotes interoperability between the developments of each service. Capital investment constraints limit strict adherence to either architectural approach. MTACCS is a metasystem of seven independently developed systems and is best described as a hybrid architecture. Most communication systems within any of the above architectures existed prior to an architecture and thus have a hybrid nature. Doctrine is a formalized description of military mission definitions and often includes the procedures to accomplish those missions. Doctrine will also often specify the organizational structure appropriate to the specific missions. Some military establishments adhere to strong doctrinal orientation, even down to strict dictation of technology developments. Other establishments treat doctrine as a loose guideline that can be liberally modified. One foreign military analyst observed that U.S. commanders did not seem to read their own doctrinal publications, and even if they did, would not feel compelled to follow them. A flexible military organization with flexible doctrine, however, can be constrained by inflexible hardware and software. Thus an emerging C3 emphasis is a technical focus on modular equipments, standard interfaces between equipments, “open system” architectures, and (software) programmable equipments. The best way to understand military C3 is to view it as a set of adaptive control loops. The basic variable is information and most of the effort in C3 synthesis is devoted to information handling and management. The resource allocation problem with feedback found in C3 has obvious similarities to those found in corporate operations and public safety service operations. Each is characterized by multiple priorities, limited resources, timelines, and deadlines for performance. Measures of the consequences of a given action tend to be obscured both by its antecedent actions and by changing external environments. The external environment contains both continuous events (i.e., tracking of targets) and discontinuous events (i.e., an equipment failure or the onset of communications jamming). FIGURE 103.1 Components of C3
Development c Documented Development Design Developments FIGURE 103.2 Architectural processes. Command and control systems are examples of perhaps the most complex adaptive systems. In its static state,C3 assets are aggregates of sensors, processors, databases, humans(with their attributes and organizations), computer hardware/software, mobile platforms, weapons, and communication equipments distributed over wide areas. In the dynamic state these assets must be mapped into capabilities in the presence of uncertain or unexpected threats, evolving missions, changing environments, mixed with unreliable communications and possible deception. All can be expected to occur over extended geographic regions and at high tempos. In short C maps assets into capabilities. The control processes require rapid and accurate decisionmaking: from this has come the need for heavy reliance on computer-based data systems and high-reliability communications. Despite the existence of fielded weapon systems capable of autonomous operation, the principal action element in the system is still human C3 system complexity arises primarily from the magnitude and mobility of the forces involved; forces that can be composed of up to thousands of mobile platforms and hundreds of thousands of personnel. To this added the large amount of uncertainty present; uncertainty borne of the adversary, of human attributes, dynamics, hostile environments, and communications. Hundreds of radio frequency channels may be in simultaneous use supporting command, surveillance, intelligence, personnel, and logistics functions 103.3 The Technologies of C3 The general scenario outlined in the previous sections is no longer accommodated by last generation technology of grease pencils, maps, and visual signaling. Technology covered in nearly every other chapter of this handbook is rapidly being incorporated into military C3 systems. Defense departments world wide continue to support technology develo from sub-micron microprocessing devices to global infor rmation Technologies with recent major impact on C3 are a. Digital communications/data links/networking. The newer and critical role of digital(computer-com puter)communications initially became possible through satellite communication systems. Tactical data links(short-range digital communications) have been enhanced by error control techniques such coding, automatic repeat requests, and spread spectrum radios. Networking, a well-established commercial hnique, is being developed for tactical applications. Networking offers survivability through alternate e 2000 by CRC Press LLC
© 2000 by CRC Press LLC Command and control systems are examples of perhaps the most complex adaptive systems. In its static state, C3 assets are aggregates of sensors, processors, databases, humans (with their attributes and organizations), computer hardware/software, mobile platforms, weapons, and communication equipments distributed over wide areas. In the dynamic state these assets must be mapped into capabilities in the presence of uncertain or unexpected threats, evolving missions, changing environments, mixed with unreliable communications and possible deception. All can be expected to occur over extended geographic regions and at high tempos. In short, C3 maps assets into capabilities. The control processes require rapid and accurate decisionmaking; from this has come the need for heavy reliance on computer-based data systems and high-reliability communications. Despite the existence of fielded weapon systems capable of autonomous operation, the principal action element in the system is still human. C3 system complexity arises primarily from the magnitude and mobility of the forces involved; forces that can be composed of up to thousands of mobile platforms and hundreds of thousands of personnel. To this is added the large amount of uncertainty present; uncertainty borne of the adversary, of human attributes, dynamics, hostile environments, and communications. Hundreds of radio frequency channels may be in simultaneous use supporting command, surveillance, intelligence, personnel, and logistics functions. 103.3 The Technologies of C3 The general scenario outlined in the previous sections is no longer accommodated by last generation technology of grease pencils, maps, and visual signaling. Technology covered in nearly every other chapter of this handbook is rapidly being incorporated into military C3 systems. Defense departments world wide continue to support technology developments from sub-micron microprocessing devices to global information systems. Technologies with recent major impact on C3 are a. Digital communications/data links/networking. The newer and critical role of digital (computer-computer) communications initially became possible through satellite communication systems. Tactical data links (short-range digital communications) have been enhanced by error control techniques such as coding, automatic repeat requests, and spread spectrum radios. Networking, a well-established commercial technique, is being developed for tactical applications. Networking offers survivability through alternate FIGURE 103.2 Architectural processes
routing, more efficient(shared)use of channel capacity, and interoperability between interconnected users Commercial Integrated Services Digital Networks(ISDN)and Asynchronus Transfer Mode(ATm) technology is appearing in both global and nodal military applications. Traditional voice communica- tions remain important; Department of Defense directives require all voice circuits to be secure or encrypted. Digitized voice techniques offer advantage in digital encryption and compression Space surveillance, terrestrial surveillance, data fusion. The quantity and quality of surveillance systems continues rapid growth utilizing sensors from ground-based, airborne, and space-based vantages. Remote sensing requirements continue to expand the need for real time digital data communications. Unmanned Airborne Vehicles(UAV) and Unmanned Underwater Vehicles(UUV) platform developments continue as a response to a broad range of C3I needs. Two classes of surveillance are active surveillance systems (radar, sonar, and optical)and passive systems(electronic surveillance measuring(ESM), acoustic, infra- red and visual imagery). Passive techniques are preferred as they do not leave a signature that can be exploited by adversaries. a plethora of new sensor systems challenges the currently available communi- cations, processors, and processing systems. Particularly challenging is both the fusion of the outputs of multiple similar sensors and also of dissimilar sensor systems. Fusion protocols and tracking algorithms, oftware intensive, claim an increasing fraction of available resources. with multiple new sensor systems, a technology challenge is the processing, correlation, and fusing of surveillance data into intelligence products and their distribution in a timely and usable form Computer-based data and information systems. From the communications and surveillance capabilities above, the objective has become formation of a consistent tactical picture throughout the operations leatre. Rapidly evolving processing technology allows vast amounts of data handling and management with corresponding shortening of control decisionmaking times. The ability to match computer pro cessing capability with high data rate, reliable, and survivable computer-grade communications on a global basis to small mobile platforms is an ongoing challenge. Military information systems, in order to retain trusted functioning, require procedures for input data that may have been delayed, omitted, partial, inaccurate, or irrelevant(DOPIl). Expanding amounts of software-based systems are needed as response to increased tempo, data volume, and quality while reducting staff and manpower functions d. Architectures and architectural thinking. C3 assets, especially communications, are evolving as assets to be shared, controlled, and rapidly reallocated rather than be dedicated to a specific user. Joint and ombined operations, ng improved interoperability, are becoming common as operations become more regionalized. Two functions of focus, Battle Damage Assessment(BDA)and Indicators and Warn- ings(I&W), are best implemented when surveillance, communications, and intelligence are architectur ally integrated. Inte tegrated systems are also best for timely response to deception and false alarms. A current Navy direction is not to inundate the afloat commander with volumes of unsolicited data but rather have him request what is needed. This style, called information pull, represents a significant change from traditional information push. The impact on supporting communications is to give it a more bursty " character, driven by external events e. Digital signal processing, programmable systems. Single-function C3 hardware is evolving to multifunc tion capability. Each node or platform will emerge with new capabilities that permits rapid and flexible reallocation. Current generation tactical military aircraft, as delivered, have virtually no additional space or weight allowance for new equipments. a desire is to evolve from costly retrofitting to a state of software insertion and integration. Traditional single-band radio systems will be replaced with programmable multiband, multiwaveform systems. Near real-time management and control of highly flexible, pro- grammable systems will become a growing research and development thrust. Next generation cellular technology involving hybrids of frequency hopping, direct sequence spread, and time division spread pectrum techniques invokes new digital signal processing efforts. Also receiving development is Direct Satellite Broadcast(DSB)to tactical military units f. Interoperability and standards. C3I systems, with many dispersed nodes, rely heavily on computer computer communications Standards are being promoted by industry and government to simplify the development, acquisition, and insertion of new technology as well as to promote interoperability between e 2000 by CRC Press LLC
© 2000 by CRC Press LLC routing, more efficient (shared) use of channel capacity, and interoperability between interconnected users. Commercial Integrated Services Digital Networks (ISDN) and Asynchronus Transfer Mode (ATM) technology is appearing in both global and nodal military applications. Traditional voice communications remain important; Department of Defense directives require all voice circuits to be secure or encrypted. Digitized voice techniques offer advantage in digital encryption and compression. b. Space surveillance, terrestrial surveillance, data fusion. The quantity and quality of surveillance systems continues rapid growth utilizing sensors from ground-based, airborne, and space-based vantages.Remote sensing requirements continue to expand the need for real time digital data communications. Unmanned Airborne Vehicles (UAV) and Unmanned Underwater Vehicles (UUV) platform developments continue as a response to a broad range of C3I needs. Two classes of surveillance are active surveillance systems (radar, sonar, and optical) and passive systems (electronic surveillance measuring (ESM), acoustic, infrared and visual imagery). Passive techniques are preferred as they do not leave a signature that can be exploited by adversaries. A plethora of new sensor systems challenges the currently available communications, processors, and processing systems. Particularly challenging is both the fusion of the outputs of multiple similar sensors and also of dissimilar sensor systems. Fusion protocols and tracking algorithms, software intensive, claim an increasing fraction of available resources. With multiple new sensor systems, a technology challenge is the processing, correlation, and fusing of surveillance data into intelligence products and their distribution in a timely and usable form. c. Computer-based data and information systems. From the communications and surveillance capabilities above, the objective has become formation of a consistent tactical picture throughout the operations theatre. Rapidly evolving processing technology allows vast amounts of data handling and management with corresponding shortening of control decisionmaking times. The ability to match computer processing capability with high data rate, reliable, and survivable computer-grade communications on a global basis to small mobile platforms is an ongoing challenge. Military information systems, in order to retain trusted functioning, require procedures for input data that may have been delayed, omitted, partial, inaccurate, or irrelevant (DOPII). Expanding amounts of software-based systems are needed as a response to increased tempo, data volume, and quality while reducting staff and manpower functions. d. Architectures and architectural thinking. C3 assets, especially communications, are evolving as assets to be shared, controlled, and rapidly reallocated rather than be dedicated to a specific user. Joint and combined operations,requiring improved interoperability, are becoming common as operations become more regionalized. Two functions of focus, Battle Damage Assessment (BDA) and Indicators and Warnings (I&W), are best implemented when surveillance, communications, and intelligence are architecturally integrated. Integrated systems are also best for timely response to deception and false alarms. A current Navy direction is not to inundate the afloat commander with volumes of unsolicited data but rather have him request what is needed. This style, called information pull,represents a significant change from traditional information push. The impact on supporting communications is to give it a more “bursty” character, driven by external events. e. Digital signal processing, programmable systems. Single-function C3 hardware is evolving to multifunction capability. Each node or platform will emerge with new capabilities that permits rapid and flexible reallocation. Current generation tactical military aircraft, as delivered, have virtually no additional space or weight allowance for new equipments.A desire is to evolve from costly retrofitting to a state of software insertion and integration. Traditional single-band radio systems will be replaced with programmable multiband, multiwaveform systems. Near real-time management and control of highly flexible, programmable systems will become a growing research and development thrust. Next generation cellular technology involving hybrids of frequency hopping, direct sequence spread, and time division spread spectrum techniques invokes new digital signal processing efforts. Also receiving development is Direct Satellite Broadcast (DSB) to tactical military units. f. Interoperability and standards. C3I systems, with many dispersed nodes, rely heavily on computercomputer communications. Standards are being promoted by industry and government to simplify the development, acquisition, and insertion of new technology as well as to promote interoperability between
independently developed systems Significantly the Department of Defense has edicted that commercial standards for electronics and telecommunications are to be utilized in preference to military standards in order to promote more rapid and lower cost acquisition of state-of-the-art technology. Two additional motivations for new standards are increased traffic requirements and increased system complexity. C3 applications and users have found significant benefit in increasing communication with programmati- ally unrelated data sources such as databases and sensors. There is an increase in internal communica- tions as well. Also systems have become more complex, forcing programs to develop modularized architectures. Software is replacing hardware as the most complicated component of communications and C2 systems to design, build, and maintain. Modularized architectures are required to simplif development and enable insertion of new technologies The primary computer-to-computer communications architecture has been the Open Systems Inter connection(OSI) Reference Model. The OSI Reference Model has been successful as a layered architecture with well-defined interfaces and specified division of functions. The Department of Defense has com- mitted to adopting an enhanced version of the osi protocols, called the government OSI Profile ( GOSIP). OSI/GOSIP integration into C3 systems is lagging because of delays in accredited vendor implementations and the cost of upgrading the existing communications infrastructure. NATO is also adopting standards for their joint procurement policies; to a significant degree they overlap commercial standards OSI brings to C3 a set of application services that had not been previously available. For example, the OSI electronic mail standards(usually called X 400) provide message forwarding, distribution list cre- ation and distribution, and obsolete message extraction among other services to users. In addition to the security protocols contained in the lower layers of the OSI stack, X 400 has its own security services uch as message origin authentication, message flow confidentiality, message content integrity, and nonrepudiation of delivery, services that are highly desirable in C3 environments. OSI also has enhanced file transfer and management capabilities, systems management, directory, and transaction processing, mong other application functions, all providing enhanced capability to C3 users g. Precision timing and position location(GPS). Navigation/position location historically is important and becomes more so in high dynamic maneuver warfare. With the introduction of the Global Positioning System(GPS), 3-dimensional positioning is available to the smallest of high-mobility nodes. Even with a less than complete satellite constellation, position accuracies can become less than 100 m h. Displays and workstations. High-resolution displays combined with programmable workstations and software lead to flexible node functions and consequently to flexible architectures. A C3 workstation could, in principle, support any of a number of C3I functions; a relocation of operators may be the only requirement to physically relocate a command node. Numerous decision aids are now being included within workstations and with their more comprehensive capability are now often described as decision support systems(DSS). Man-machine interface(MMI), as a result, grows in importance. i. Software techniques. With the growing computational power and memory capability of microprocessor systems,C3 system performance will increasingly be determined by software performance. The cost and complexity of software appears to expand in proportion to host computer capability and is more frequently becoming a system limiting factor. ADA is dictated to be the common programming language of the Defense Department; however, exceptions can be approved. Verification and validation(v&v) generated software and software maintainence have grown to necessitate organizational changes within the military Software standards have also increased in importance in new C3 systems. POSIX standards (published as IEEE 1003)govern the software interfaces to operating system services in various com puting platforms [NIST, 1990]. As such, they allow application programs written according to the standards to be reused. POSIX standardizes interfaces to security, networking, and diverse system services, including file management, memory and process management, and system administration services. POSIX.5 provides bindings for the ADA programming language Simulation and modeling. Both techniques are employed with the objective of designing or analyzing the performance of a C3I system. With the advent of faster computation, complex scenarios can be gamed" in near real time, and modeling will then be within the decision aid realm e 2000 by CRC Press LLC
© 2000 by CRC Press LLC independently developed systems. Significantly the Department of Defense has edicted that commercial standards for electronics and telecommunications are to be utilized in preference to military standards in order to promote more rapid and lower cost acquisition of state-of-the-art technology. Two additional motivations for new standards are increased traffic requirements and increased system complexity. C3 applications and users have found significant benefit in increasing communication with programmatically unrelated data sources such as databases and sensors. There is an increase in internal communications as well. Also systems have become more complex, forcing programs to develop modularized architectures. Software is replacing hardware as the most complicated component of communications and C2 systems to design, build, and maintain. Modularized architectures are required to simplify development and enable insertion of new technologies. The primary computer-to-computer communications architecture has been the Open Systems Interconnection (OSI) Reference Model. The OSI Reference Model has been successful as a layered architecture with well-defined interfaces and specified division of functions. The Department of Defense has committed to adopting an enhanced version of the OSI protocols, called the Government OSI Profile (GOSIP). OSI/GOSIP integration into C3 systems is lagging because of delays in accredited vendor implementations and the cost of upgrading the existing communications infrastructure. NATO is also adopting standards for their joint procurement policies; to a significant degree they overlap commercial standards. OSI brings to C3 a set of application services that had not been previously available. For example, the OSI electronic mail standards (usually called X.400) provide message forwarding, distribution list creation and distribution, and obsolete message extraction among other services to users. In addition to the security protocols contained in the lower layers of the OSI stack, X.400 has its own security services such as message origin authentication, message flow confidentiality, message content integrity, and nonrepudiation of delivery, services that are highly desirable in C3 environments. OSI also has enhanced file transfer and management capabilities, systems management, directory, and transaction processing, among other application functions, all providing enhanced capability to C3 users. g. Precision timing and position location (GPS). Navigation/position location historically is important and becomes more so in high dynamic maneuver warfare. With the introduction of the Global Positioning System (GPS), 3-dimensional positioning is available to the smallest of high-mobility nodes. Even with a less than complete satellite constellation, position accuracies can become less than 100 m. h. Displays and workstations. High-resolution displays combined with programmable workstations and software lead to flexible node functions and consequently to flexible architectures. A C3 workstation could, in principle, support any of a number of C3I functions; a relocation of operators may be the only requirement to physically relocate a command node. Numerous decision aids are now being included within workstations and with their more comprehensive capability are now often described as decision support systems (DSS). Man-machine interface (MMI), as a result, grows in importance. i. Software techniques. With the growing computational power and memory capability of microprocessor systems, C3 system performance will increasingly be determined by software performance. The cost and complexity of software appears to expand in proportion to host computer capability and is more frequently becoming a system limiting factor. ADA is dictated to be the common programming language of the Defense Department; however, exceptions can be approved. Verification and validation (V&V) of generated software and software maintainence have grown to necessitate organizational changes within the military. Software standards have also increased in importance in new C3 systems. POSIX standards (published as IEEE 1003) govern the software interfaces to operating system services in various computing platforms [NIST, 1990]. As such, they allow application programs written according to the standards to be reused. POSIX standardizes interfaces to security, networking, and diverse system services, including file management, memory and process management, and system administration services. POSIX.5 provides bindings for the ADA programming language. j. Simulation and modeling. Both techniques are employed with the objective of designing or analyzing the performance of a C3I system. With the advent of faster computation, complex scenarios can be “gamed” in near real time, and modeling will then be within the decision aid realm
103.4 The Dynamics of Encounters Within dynamic systems, and the C3 systems that support them, it is important to identify and clarify time scales involved. Military engagements range from sub-second events such as local missile point defense to the long-term development and implementation of global strategy. Each involves basic aspects of decision and control theory: objectives, observations, and feedback and control. In the military environment, the observation aspect is especially complex, requiring the placement, collection, transmission, and aggregation of data from numerous dispersed sources. Control and decision techniques derived for one echelon level may be inappro- priate for others, primarily due to the time available for the assessment and feedback process. Often, the impact f a decision will not be measurable before yet another control decision is required. Thus, the relative roles of utomation and humans will be different at different levels. The human may have to project a decisionmaking consequence long before the system hardware/software can obtain measures of it. As an example of encounter space-time domains, surface Navy echelon levels have order-of-magnitude scales Organization Level Time Scale of Interest Geographic Extent(km) Platform seconds. minutes Battle Group minuteshours hours-days 000s Theater 000s+ Service/National weeks-years Global At the platform level, the time scale range reflects engagement times which may include limited or local amounts of tracking. At the Battle Group level, the time scale corresponds to tasks such as maneuver, coordinated engagement, and track management. Any of the organizational levels may additionally have planning functions that precede the operational time scales by up to months or years. The planning side includes events such as logistics, maintainence, training, and exercises, all of which contribute toward becoming a more capable combatant. Figure 103.3 portrays the planning and the operational or execution phases as well as portraying the adaptive control loop approach to C3. The lighter shaded feedback path is employed when it is required to compare status with the current plan It is also available for adjustment when plans or objectives are modified. The execution phases are represented by the Stimulus-Hypothesis-Options-Response(SHOR) Paradigm suggested by Wohl [1981]. The control the oretic implications are apparent in the figure; the Stimulus-Hypothesis is a representation of situation assess- ment with its implicit uncertainty. Quickness and accuracy with which a military command organization can transverse the execution loop is a general measure of performance(MOP). Qualitatively it is generally accepted that the side with the best ability to transverse the SHOR execution loop will have a significant military advantage. In this light, attributes of the execution loop become a measure of effectiveness(Moe)of the C3 system in terms of operational outcomes. Rules of Engagement(ROE) impact tempo by reducing uncertainty or options available to the decisionmaker. Some scenarios develop with such quickness that the C3 system must react nearly reflexively(e.g, without consideration of possible options). One class of rules is made known to all the participants; if a particular manuever is observed, then a specified response will result. The SHOR Paradigm illustrates why counter-communications and counter-command and control are increasingly important operational and technical areas. Counter-C3 need only delay the process rather than disrupt or destroy it in order to be an effective technique. The Navy, for example, is now incorporating electronic warfare(EW)as a warfare area on equal status to the traditional anti-submarine (ASw), anti-aircraft warfare (AAW), and anti-surface warfare(ASUW)areas. Control of the electromagnetic spectrum is becoming as critical as the control of the physical battlefield Electronic counter-measures(ECM) such as jamming and deception are technical options available to the commander. Either adversary may elect to respond to the ECM threat by a series of electronic counter-counter measure(ECCM)techniques. Anti-jam(AD)communications can employ a variety of techniques such as spread spectrum, power control, adaptive coding and feedback, multiple routes, and adaptive antenna arrays. a signal e 2000 by CRC Press LLC
© 2000 by CRC Press LLC 103.4 The Dynamics of Encounters Within dynamic systems, and the C3 systems that support them, it is important to identify and clarify time scales involved. Military engagements range from sub-second events such as local missile point defense to the long-term development and implementation of global strategy. Each involves basic aspects of decision and control theory: objectives, observations, and feedback and control. In the military environment, the observation aspect is especially complex, requiring the placement, collection, transmission, and aggregation of data from numerous dispersed sources. Control and decision techniques derived for one echelon level may be inappropriate for others, primarily due to the time available for the assessment and feedback process. Often, the impact of a decision will not be measurable before yet another control decision is required. Thus, the relative roles of automation and humans will be different at different levels. The human may have to project a decisionmaking consequence long before the system hardware/software can obtain measures of it. As an example of encounter space-time domains, surface Navy echelon levels have order-of-magnitude scales as shown: At the platform level, the time scale range reflects engagement times which may include limited or local amounts of tracking.At the Battle Group level, the time scale corresponds to tasks such as maneuver, coordinated engagement, and track management. Any of the organizational levels may additionally have planning functions that precede the operational time scales by up to months or years. The planning side includes events such as logistics, maintainence, training, and exercises, all of which contribute toward becoming a more capable combatant. Figure 103.3 portrays the planning and the operational or execution phases as well as portraying the adaptive control loop approach to C3. The lighter shaded feedback path is employed when it is required to compare status with the current plan. It is also available for adjustment when plans or objectives are modified. The execution phases are represented by the Stimulus-Hypothesis-Options-Response (SHOR) Paradigm suggested by Wohl [1981]. The control theoretic implications are apparent in the figure; the Stimulus-Hypothesis is a representation of situation assessment with its implicit uncertainty. Quickness and accuracy with which a military command organization can transverse the execution loop is a general measure of performance (MOP). Qualitatively it is generally accepted that the side with the best ability to transverse the SHOR execution loop will have a significant military advantage. In this light, attributes of the execution loop become a measure of effectiveness (MOE) of the C3 system in terms of operational outcomes. Rules of Engagement (ROE) impact tempo by reducing uncertainty or options available to the decisionmaker. Some scenarios develop with such quickness that the C3 system must react nearly reflexively (e.g., without consideration of possible options). One class of rules is made known to all the participants; if a particular manuever is observed, then a specified response will result. The SHOR paradigm illustrates why counter-communications and counter-command and control are increasingly important operational and technical areas. Counter-C3 need only delay the process rather than disrupt or destroy it in order to be an effective technique. The Navy, for example, is now incorporating electronic warfare (EW) as a warfare area on equal status to the traditional anti-submarine (ASW), anti-aircraft warfare (AAW), and anti-surface warfare (ASUW) areas. Control of the electromagnetic spectrum is becoming as critical as the control of the physical battlefield. Electronic counter-measures (ECM) such as jamming and deception are technical options available to the commander. Either adversary may elect to respond to the ECM threat by a series of electronic counter-counter measure (ECCM) techniques.Anti-jam (AJ) communications can employ a variety of techniques such as spread spectrum, power control, adaptive coding and feedback, multiple routes, and adaptive antenna arrays. A signal Organization Level Time Scale of Interest Geographic Extent (km) Platform seconds-minutes 10’s Battle Group minutes-hours 100’s Fleet hours-days 1000’s Theater days-weeks 1000’s + Service/National weeks-years Global
SHOR Assignment Preliminary Operational observations Option EXECUTION FIGURE 103.3 The planning and execution phases of operation may also be protected by making it difficult to intercept; some low probability of intercept(LPI)methods ar again spread spectrum, directive antennas, power control, EM propagation strategies, and message brevity The SHOR paradigm has important advantages. First, it is generally applicable to all military echelon levels. Second, it represents a control process with its explicit dynamics rather than a relational or physical intercon- lection of system components. Finally, it puts focus on the roles of controlling and decisionmaking without a erformed by human to be able to describe both human and computer performance with a common type of represe 103.5 The role of the human decisionmaker in c3 Designers of C3 systems often fail to acknowledge the fact that the " central, essential ingredients in any command and control system are not the things which they plan and design; rather they are the commanders and decisionmakers themselves"[Wohl, 1981]. Despite its centrality, designation of human roles is seemingly arbitrary and often controversial. In most system studies, the human decisionmaker is not thought of as an integral part of the system, but is instead given an external position as a"user"of data or an"input"to the rest f the system. Without a means of integrating the behavior of interrelated decisionmakers into a comprehensive description of system response, the proper hominal role is difficult to determine. To justify and support human action, a clear understanding of the benefits and limitations of human intervention is required. The complexity and unpredictability of a C3 environment prompt the inclusion of hominal blocks. The ability to respond to changing operational conditions requires"intelligence, and in a C3 system this intelligence is distributed between people and algorithms. The human has a marvelous capacity for coping with vague an infusing data, making sense out of information so fragmentary that it would paralyze a computer. A computer information processing algorithm has, in turn, an unexcelled capability to process and display data at a rate that would bewilder a person. Proper marriage of humans and computers yields a robust system, quick to adapt to changes and capable of handling high data rates. For example, for the various subtasks found in the network management component of a C3 system, the relative roles of people and algorithms might be that shown in Fig 103.4. With the advent of open system architectures, network management appears as a crucial resource allocation function. High speeds and large databases are best left within the domain of the computer, while those nodes demanding insight appropriately have a corporeal flavor A comprehensive C2 model is created by bringing together models of subsidiary elements. The form of these models should be as compliant as possible within constraints imposed by tractability. In any event, the model should display e 2000 by CRC Press LLC
© 2000 by CRC Press LLC may also be protected by making it difficult to intercept; some low probability of intercept (LPI) methods are again spread spectrum, directive antennas, power control, EM propagation strategies, and message brevity. The SHOR paradigm has important advantages. First, it is generally applicable to all military echelon levels. Second, it represents a control process with its explicit dynamics rather than a relational or physical interconnection of system components. Finally, it puts focus on the roles of controlling and decisionmaking without a pre-bias on whether that function should be performed by humans or computers. The remaining challenge is to be able to describe both human and computer performance with a common type of representational framework. 103.5 The Role of the Human Decisionmaker in C3 Designers of C3 systems often fail to acknowledge the fact that the “central, essential ingredients in any command and control system are not the things which they plan and design; rather they are the commanders and decisionmakers themselves” [Wohl, 1981]. Despite its centrality, designation of human roles is seemingly arbitrary and often controversial. In most system studies, the human decisionmaker is not thought of as an integral part of the system, but is instead given an external position as a “user” of data or an “input” to the rest of the system. Without a means of integrating the behavior of interrelated decisionmakers into a comprehensive description of system response, the proper hominal role is difficult to determine. To justify and support human action, a clear understanding of the benefits and limitations of human intervention is required. The complexity and unpredictability of a C3 environment prompt the inclusion of hominal blocks. The ability to respond to changing operational conditions requires “intelligence,” and in a C3 system this intelligence is distributed between people and algorithms. The human has a marvelous capacity for coping with vague and confusing data, making sense out of information so fragmentary that it would paralyze a computer. A computer information processing algorithm has, in turn, an unexcelled capability to process and display data at a rate that would bewilder a person. Proper marriage of humans and computers yields a robust system, quick to adapt to changes and capable of handling high data rates. For example, for the various subtasks found in the network management component of a C3 system, the relative roles of people and algorithms might be that shown in Fig. 103.4. With the advent of open system architectures, network management appears as a crucial resource allocation function. High speeds and large databases are best left within the domain of the computer, while those nodes demanding insight appropriately have a corporeal flavor. A comprehensive C2 model is created by bringing together models of subsidiary elements. The form of these submodels should be as compliant as possible within constraints imposed by tractability. In any event, the model should display: FIGURE 103.3 The planning and execution phases of operations
HierarchyPlanning Global Network Task Mea Strategy HUMAN ased) FIGURE 103.4 Control hierarchies 1. An analytical structure permitting the evaluation of influence functions 2. Explicit communication dependence 3. Amenability to aggregation and disaggregation Each of these desiderata arises in studies within the field of System Science, and this discipline would appear to provide the natural formalism for quantitative investigations of command and control systems. Athans articulates this view by observing that C3 systems" are characterized by a high degree of complexity, a generic distribution of the decision-making process among several decision making agents, the need for reliable operation in the presence of multiple failures, and the inevitable interaction of humans with computer-based decision support systems and decision aids "[Athans, 1987]. It needs to be emphasized, however, that a C2 system differs from those commonly encountered in system theory in at least three primary ways 1. Because command and control is at its essence a human decisionmaking activity, it is not sufficient to model only the sensors, computers, displays, etc. The hominal dynamics must be integrated with those of the electromechanical elements 2. Any effective C3 system must have the capacity to evolve over time. Such systems are frequently estab lished with a limited set of elements. Either for a specific operation or during their lifetime a subset of these elements will be modified or replaced, and their roles expanded or constricted as changing demands are placed upon the system. Hence, the system description must be more flexible than those in common 3. In contrast to conventional system design problems, there is no single nominal operating condition about which the system is maintained. Indeed, the critical attribute of a C3 system is its ability to respond to major changes in condition or state. In two Middle East naval events(USS Stark, Vincennes)the missile defense systems were set for a state that had just immediately changed. Furthermore, the system is often used in environments quite different from those envisioned in its design. Hence, the uncertain circum- stances within which the decisionmakers must accomplish their tasks must be properly reflected in any system architecture. A commander brings special skills to such a system, but some of them are difficult to quantify. For example, 1. Decisionmaking in semantically rich problem domains 2. Analogical reasoning and problem structuring 3. Information processing and application of heuristics To properly identify a specific function for a human decisionmaker, the advantage accruing to his inclusion must be shown. Quantitative models of human responses have been developed in various ways, from ad hoc to purely normative. In the most promising of these, the form of the response dynamics of an individual commander is determined from the solution to an optimization problem. The optimization problem is framed by supposing that the decisionmaker strives to act in the most effective way, but is constrained by both cognitive e 2000 by CRC Press LLC
© 2000 by CRC Press LLC 1. An analytical structure permitting the evaluation of influence functions 2. Explicit communication dependence 3. Amenability to aggregation and disaggregation Each of these desiderata arises in studies within the field of System Science, and this discipline would appear to provide the natural formalism for quantitative investigations of command and control systems. Athans articulates this view by observing that C3 systems “are characterized by a high degree of complexity, a generic distribution of the decision-making process among several decision making ‘agents,’ the need for reliable operation in the presence of multiple failures, and the inevitable interaction of humans with computer-based decision support systems and decision aids” [Athans, 1987]. It needs to be emphasized, however, that a C2 system differs from those commonly encountered in system theory in at least three primary ways: 1. Because command and control is at its essence a human decisionmaking activity, it is not sufficient to model only the sensors, computers, displays, etc. The hominal dynamics must be integrated with those of the electromechanical elements. 2. Any effective C3 system must have the capacity to evolve over time. Such systems are frequently established with a limited set of elements. Either for a specific operation or during their lifetime a subset of these elements will be modified or replaced, and their roles expanded or constricted as changing demands are placed upon the system. Hence, the system description must be more flexible than those in common use. 3. In contrast to conventional system design problems, there is no single nominal operating condition about which the system is maintained. Indeed, the critical attribute of a C3 system is its ability to respond to major changes in condition or state. In two Middle East naval events (USS Stark, Vincennes) the missile defense systems were set for a state that had just immediately changed. Furthermore, the system is often used in environments quite different from those envisioned in its design. Hence, the uncertain circumstances within which the decisionmakers must accomplish their tasks must be properly reflected in any system architecture. A commander brings special skills to such a system, but some of them are difficult to quantify. For example, people have singular competence in: 1. Decisionmaking in semantically rich problem domains 2. Analogical reasoning and problem structuring 3. Information processing and application of heuristics To properly identify a specific function for a human decisionmaker, the advantage accruing to his inclusion must be shown. Quantitative models of human responses have been developed in various ways, from ad hoc to purely normative. In the most promising of these, the form of the response dynamics of an individual commander is determined from the solution to an optimization problem. The optimization problem is framed by supposing that the decisionmaker strives to act in the most effective way, but is constrained by both cognitive FIGURE 103.4 Control hierarchies