Network-based operations for the Swedish defence forces :
General Material Designation
[Book]
Other Title Information
an assessment methodology /
First Statement of Responsibility
Walter Perry [and others].
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Santa Monica, CA :
Name of Publisher, Distributor, etc.
Rand Corp.,
Date of Publication, Distribution, etc.
2004.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
xxvii, 91 pages ;
Dimensions
28 cm.
SERIES
Series Title
Technical report ;
Volume Designation
119
GENERAL NOTES
Text of Note
"TR-119-FOI."
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references (pages 89-91).
SUMMARY OR ABSTRACT
Text of Note
The Swedish government is undertaking efforts to reorient Swedish Defence Forces from homeland defence to a wider suite of missions, including operations far from Sweden-a significant change in the way Sweden is willing to employ its armed forces. Such missions include expeditionary operations with coalition partners. Therefore, a decision was made to move towards network-based operations linking sensors, decisionmakers, and combat systems to achieve shared awareness, increased speed of command, higher operational tempo, greater lethality, and increased survivability. The methodology proposed in this report suggests several operational functions, such as air and missile defense or joint force command and control, that are representative of the type of missions future Swedish forces may have to perform. Once these operational functions have been prioritised and networks have been designed that connect the elements or forces that will participate in that function, the operational functions are then grouped into interaction categories. These categories include (1)-specialized interaction, with low to medium requirements for access, timeliness, and security; (2) ubiquitous interaction, which involves a large number of organizations; (3) secure interaction, for which participants and the information exchanged must be secured both physically and electronically; and (4) real-time interaction, extremely time-sensitive combat actions requiring that very few participants have access to critical real-time data and are able to share that data, even when network connections and nodes have failed. These interaction categories support the identification of common subnetworks and analogous systems or components in the cost-estimation process, which may draw on several cost-estimation methods. The methodology should identify all relevant costs, including those for the network infrastructure, and costs associated with operational functions supported by the network; should allow for the comparison of historical and notional systems; and should relate network capabilities and metrics to cost so that cost and benefit analysis can be facilitated. The report offers criteria for measures of the needed access to, timeliness of, and security for the network, and metrics for those measures, then relates those metrics broadly to the four interaction categories. It also presents three real-world examples of the types of networks Swedish Defence Forces may be relying on, depending on which of the four proposed options--with their different emphases on capabilities for international operations, homeland defence, and adaptable structure for unforeseen future needs--is selected in 2004.