Network-centric Warfare
   HOME

TheInfoList



OR:

Network-centric warfare, also called network-centric operations or net-centric warfare, is a
military doctrine Military doctrine is the expression of how military forces contribute to campaigns, major operations, battles, and engagements. A military doctrine outlines what military means should be used, how forces should be structured, where forces shou ...
or theory of war that aims to translate an information advantage, enabled partly by
information technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
, into a
competitive advantage In business, a competitive advantage is an attribute that allows an organization to outperform its competitors. A competitive advantage may include access to natural resources, such as high-grade ores or a low-cost power source, highly skille ...
through the
computer network A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
ing of dispersed forces. It was pioneered by the
United States Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
in the 1990s.


Background and history

In 1996, Admiral William Owens introduced the concept of a ' system of systems' in a paper published by the Institute for National Security Studies in the United States. He described a system of intelligence sensors, command and control systems, and precision weapons that provided
situational awareness Situational awareness or situation awareness, often abbreviated as SA is the understanding of an environment, its elements, and how it changes with respect to time or other factors. It is also defined as the perception of the elements in the envi ...
, rapid target assessment, and distributed weapon assignment. Also in 1996, the United States' Joint Chiefs of Staff released ''Joint Vision 2010'', which introduced the military concept of full-spectrum dominance. Full Spectrum Dominance described the ability of the US military to dominate the
battlespace Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theater (warfare), theatre of operations, including aerial warfare, air, information warfare, information, ground w ...
from peace operations through to the outright application of military power that stemmed from the advantages of information superiority.


''Network Centric Warfare''

The term "network-centric warfare" and associated concepts first appeared in the United States Department of Navy's publication, "Copernicus: C4ISR for the 21st Century." The ideas of networking sensors, commanders, and shooters to flatten the hierarchy, reduce the operational pause, enhance precision, and increase speed of command were captured in this document. As a distinct concept, however, network-centric warfare first appeared publicly in a 1998 US Naval Institute Proceedings article by Vice Admiral Arthur K. Cebrowski and John Garstka. However, the first complete articulation of the idea was contained in the book ''Network Centric Warfare : Developing and Leveraging Information Superiority'' by David S. Alberts, John Garstka and Frederick Stein, published by the Command and Control Research Program (CCRP). This book derived a new theory of warfare from a series of case studies on how business was using information and communication technologies to improve situation analysis, accurately control inventory and production, as well as monitor customer relations. The information revolution has permeated the military world as well, with network-centric warfare replacing traditional combat methods. Technology is now at the forefront of battlefields, creating a new era of warfare - network-centric. It's a new level of communication and coordination through what is known as tactical interoperability. From human soldiers to smart weapon systems, command & control systems, automatic sentry systems, and platforms on land, air, and space - all these elements are seamlessly connected in a single communication fabric, with encompass battle management systems for all services, catering to individuals from General HQs to soldiers on the field.


''Understanding Information Age Warfare''

''Network-centric warfare'' was followed in 2001 by ''Understanding Information Age Warfare'' (UIAW), jointly authored by Alberts, Garstka, Richard Hayes of Evidence Based Research and David A. Signori of RAND. ''UIAW'' pushed the implications of the shifts identified by network-centric warfare in order to derive an operational theory of warfare. Starting with a series of premises on how the environment is sensed, ''UIAW'' describes three domains. The first is a ''physical domain'', where events take place and are perceived by sensors and people. Data emerging from the physical domain is transmitted through an ''information domain''. It is processed in a ''cognitive domain'' before being acted upon. The process is similar to a "observe, orient, decide, act" loop described by Col. John Boyd of the
USAF The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
.


''Power to the Edge''

The last publication dealing with the developing theory of network centric warfare appeared in 2003 with '' Power to the Edge'', also published by the CCRP. ''Power to the Edge'' is a speculative work suggesting that modern military environments are far too complex to be understood by any one individual, organisation, or even military service. Modern information technology permits the rapid and effective sharing of information to such a degree that "edge entities" or those that are essentially conducting military missions themselves, should be able to "pull" information from ubiquitous repositories, rather than having centralised agencies attempt to anticipate their information needs and "push" it to them. This would imply a major flattening of traditional military hierarchies, however. ''Power To The Edges radical ideas had been under investigation by
the Pentagon The Pentagon is the headquarters building of the United States Department of Defense, in Arlington County, Virginia, across the Potomac River from Washington, D.C. The building was constructed on an accelerated schedule during World War II. As ...
since at least 2001. In ''UIAW'', the concept of
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
activity combined with more traditional hierarchical flow of data in the network had been introduced. Shortly thereafter, the Pentagon began investing in peer-to-peer research, telling software engineers at a November 2001 peer-to-peer conference that there were advantages to be gained in the redundancy and robustness of a peer-to-peer
network topology Network topology is the arrangement of the elements (Data link, links, Node (networking), nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, ...
on the battlefield. Network-centric warfare/operations is a cornerstone of the ongoing transformation effort at the Department of Defense initiated by former Secretary of Defense Donald Rumsfeld. It is also one of the five goals of the Office of Force Transformation, Office of the Secretary of Defense. See Revolution in Military Affairs for further information on what is now known as "defense transformation" or "transformation".


Related technologies and programs

The US DOD has mandated that the Global Information Grid (GIG) will be the primary technical framework to support US network-centric warfare/network-centric operations. Under this directive, all advanced weapons platforms, sensor systems, and command and control centers are eventually to be linked via the GIG. The term system of systems is often used to describe the results of these types of massive integration efforts. The topic Net-Centric Enterprise Services addresses the applications context of the GIG. A number of significant U.S. military programs are taking technical steps towards supporting network-centric warfare. These include the Cooperative Engagement Capability (CEC) of the
United States Navy The United States Navy (USN) is the naval warfare, maritime military branch, service branch of the United States Department of Defense. It is the world's most powerful navy with the largest Displacement (ship), displacement, at 4.5 millio ...
and the BCT Network of the
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
. Net-Centric Enterprise Solutions for Interoperability (NESI) provides, for all phases of the acquisition of net-centric solutions, actionable guidance that meets network-centric warfare goals of the United States Department of Defense. The guidance in NESI is derived from the higher level, more abstract concepts provided in various directives, policies and mandates such as the Net-Centric Operations and Warfare Reference Model (NCOW RM) and the ASD(NII) Net-Centric Checklist.


Doctrinal tenets in United States

The doctrine of network-centric warfare for the United States armed forces draws its highest level of guidance from the concept of "team warfare", meaning the integration and synchronization of all appropriate capabilities across the various services, ranging from
Army An army, ground force or land force is an armed force that fights primarily on land. In the broadest sense, it is the land-based military branch, service branch or armed service of a nation or country. It may also include aviation assets by ...
to
Air Force An air force in the broadest sense is the national military branch that primarily conducts aerial warfare. More specifically, it is the branch of a nation's armed services that is responsible for aerial warfare as distinct from an army aviati ...
to
Coast Guard A coast guard or coastguard is a Maritime Security Regimes, maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with cust ...
. This is part of the principle of joint warfare. The tenets of network-centric warfare are: * Tenet 1: A robustly networked force improves information sharing. * Tenet 2: Information sharing and collaboration enhance the quality of information and shared
situational awareness Situational awareness or situation awareness, often abbreviated as SA is the understanding of an environment, its elements, and how it changes with respect to time or other factors. It is also defined as the perception of the elements in the envi ...
. * Tenet 3: Shared situational awareness enables self-
synchronization Synchronization is the coordination of events to operate a system in unison. For example, the Conductor (music), conductor of an orchestra keeps the orchestra synchronized or ''in time''. Systems that operate with all parts in synchrony are sa ...
. * Tenet 4: These, in turn, dramatically increase mission effectiveness. Net-Centric operations are compatible with
Mission Command Mission command, also referred to as mission-type tactics, is a style of military command, which is derived from the Prussia, Prussian-pioneered mission-type tactics doctrine, combines centralized intent with decentralized execution subsidiarity, a ...
doctrine, which theoretically allows considerable freedom of action for combat troops, and with more decentralized approaches to Command and Control (C2).


Some architectural and design challenges

* The complexity of the Joint Tactical Radio System (JTRS) offers insight into the challenges of integrating numerous different communications systems into a unified whole. It is intended to be a software-defined radio for battlefield communications that will be backwards compatible with a very large number of other military and civilian radio systems. * An April 10, 2008 GAO report
GAO FCS report
highlighted the scalability of the network as a major risk factor to the Network Centric FCS program. The proposed system will be unable to network all the units into one self-forming, self-healing network. * The problem of coordinating bandwidth usage in a battlespace is a significant challenge, when every piece of mobile equipment and human participant becomes a potential source or relay of RF emissions. * It is difficult to efficiently transfer information between networks having different levels of security classification. Although multi-level security systems provide part of the solution, human intervention and decision-making is still needed to determine what specific data can and cannot be transferred. * Accurate locational awareness is limited when maneuvering in areas where
Global Positioning System The Global Positioning System (GPS) is a satellite-based hyperbolic navigation system owned by the United States Space Force and operated by Mission Delta 31. It is one of the global navigation satellite systems (GNSS) that provide ge ...
(GPS) coverage is weak or non-existent. These areas include the inside of buildings, caves, etc. as well as built-up areas and urban canyons, which are also settings for many modern military operations. Much work on reliable fusion of positional data from multiple sensors remains to be done. * Providing secure communications in network-centric warfare/network-centric operations is difficult, since successful key management for
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
is typically the most difficult aspect of
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, especially with mobile systems. The problem is exacerbated with the need for speedy deployment and nimble reconfiguration of military teams, to respond to rapidly changing conditions in the modern battlespace.


International activities

There is significant need to harmonize the technical and operational aspects of net-centric warfare and net-centric operations among multiple nations, in order to support coalition activities, joint operations, etc. The NATO Command Structure and many NATO and non-NATO nations have joined the Federated Mission Networking (FMN) initiative and work together under the FMN Framework Process to coordinate the design, development and delivery of operational and technical capabilities required to conduct net-centric operations. Within the Alliance the NATO Interoperability Standards and Profiles (NISP) provides the necessary guidance and technical components to support project implementations and Federated Mission Networking. Individual ''Standardization Agreements'' are the coordinating vehicle for establishing shared technical standards among
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
nations. See also Partnership for Peace for information on extending coordination efforts to non-NATO nations that are keen to support military operations other than war activities, such as international peacekeeping, disaster response, humanitarian aid, etc.


Supporting comments

"With less than half of the ground forces and two-thirds of the military aircraft used 12 years ago in Desert Storm, we have achieved a far more difficult objective. ... In Desert Storm, it usually took up to two days for target planners to get a photo of a target, confirm its coordinates, plan the mission, and deliver it to the bomber crew. Now we have near real-time imaging of targets with photos and coordinates transmitted by e-mail to aircraft already in flight. In Desert Storm,
battalion A battalion is a military unit, typically consisting of up to one thousand soldiers. A battalion is commanded by a lieutenant colonel and subdivided into several Company (military unit), companies, each typically commanded by a Major (rank), ...
,
brigade A brigade is a major tactical military unit, military formation that typically comprises three to six battalions plus supporting elements. It is roughly equivalent to an enlarged or reinforced regiment. Two or more brigades may constitute ...
, and division commanders had to rely on maps, grease pencils, and radio reports to track the movements of our forces. Today, our
commander Commander (commonly abbreviated as Cmdr.) is a common naval officer rank as well as a job title in many army, armies. Commander is also used as a rank or title in other formal organizations, including several police forces. In several countri ...
s have a real-time display of our armed forces on their computer screen."
—former Vice President Richard Cheney.
"Net-centric warfare's effectiveness has greatly improved in 12 years. Desert Storm forces, involving more than 500,000 troops, were supported with 100 Mbit/s of bandwidth. Today, OIF forces, with about 350,000 warfighters, had more than 3,000 Mbit/s of satellite bandwidth, which is 30 times more bandwidth for a force 45 percent smaller. U.S. troops essentially used the same weapon platforms used in Operation Desert Storm with significantly increased effectiveness."
Lieutenant general Lieutenant general (Lt Gen, LTG and similar) is a military rank used in many countries. The rank traces its origins to the Middle Ages, where the title of lieutenant general was held by the second-in-command on the battlefield, who was norma ...
Harry D. Raduege Jr, director, Defense Information Systems Agency.


Contradictory views

The aspiration of the
Australian Defence Force The Australian Defence Force (ADF) is the Armed forces, military organisation responsible for the defence of Australia and its national interests. It consists of three branches: the Royal Australian Navy (RAN), Australian Army and the Royal Aus ...
(ADF) to embrace network-centric warfare is outlined in the document ''ADF Force 2020''. This vision has been criticized by Aldo Borgu, director of the Australian Strategic Policy Institute (ASPI). By developing interoperability with U.S. systems, in his view, the three arms of the Australian Defence Force could end up operating better with their sister United States services than with each other.Blenkin, Max
AAP General News
(Australia), 9/17/2003
Network centric warfare is criticized by proponents of Fourth Generation Warfare (4GW) doctrine. Also, since Network-centric warfare focuses so much on distributing information, one has to be wary of the effect of false, misleading, or misinterpreted information entering the system, be it through enemy deception or simple error. Just as the usefulness of correct information can be amplified, so too can the repercussions of incorrect data entering the system achieve much greater non-positive outcomes. One way that this can happen is through errors in initial conditions in an uncorrected, closed system that subsequently skew result-sets; the result-sets are then reused, amplifying the initial error by orders of magnitude in subsequent generations of result-sets; see
chaos theory Chaos theory is an interdisciplinary area of Scientific method, scientific study and branch of mathematics. It focuses on underlying patterns and Deterministic system, deterministic Scientific law, laws of dynamical systems that are highly sens ...
. Other possible failure modes or problem areas in network-centric warfare include the occurrence of the Byzantine generals' problem in
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network, forming a peer-to-peer network of Node ...
systems; problems caused by an inadequate or a shallow understanding of (or general disregard for) self-regulation, self-organization,
systems theory Systems theory is the Transdisciplinarity, transdisciplinary study of systems, i.e. cohesive groups of interrelated, interdependent components that can be natural or artificial. Every system has causal boundaries, is influenced by its context, de ...
, emergent behavior and
cybernetics Cybernetics is the transdisciplinary study of circular causal processes such as feedback and recursion, where the effects of a system's actions (its outputs) return as inputs to that system, influencing subsequent action. It is concerned with ...
; in addition to this, there are potential issues arising from the very nature of any complex, rapidly developed artificial system arising from complexity theory, which implies the possibility of failure modes such as congestion collapse or
cascading failure A cascading failure is a failure in a system of interconnection, interconnected parts in which the failure of one or few parts leads to the failure of other parts, growing progressively as a result of positive feedback. This can occur when a singl ...
.


See also

* Autonomous logistics *
Battlespace Battlespace or battle-space is a term used to signify a military strategy which integrates multiple armed forces for the military theater (warfare), theatre of operations, including aerial warfare, air, information warfare, information, ground w ...
* C4ISTAR *
Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
*
Information warfare Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
* List of cyber warfare forces * Network simulator


References


External links


C4I Systems

The OASD-NII Command and Control Research Program (CCRP)

Net-Centric Enterprise Solutions for Interoperability (NESI)


* Army War College article: Principles of Warfare on the Network-Centric Battlefield
globalsecurity.org

C4I.org - Computer Security & Intelligence
{{Authority control Net-centric Command and control United States Department of Defense doctrine Information operations and warfare *