Network-based operations for the Swedish defence forces :
نام عام مواد
[Book]
ساير اطلاعات عنواني
an assessment methodology /
نام نخستين پديدآور
Walter Perry [and others].
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Santa Monica, CA :
نام ناشر، پخش کننده و غيره
Rand Corp.,
تاریخ نشرو بخش و غیره
2004.
مشخصات ظاهری
نام خاص و کميت اثر
xxvii, 91 pages ;
ابعاد
28 cm.
فروست
عنوان فروست
Technical report ;
مشخصه جلد
119
يادداشت کلی
متن يادداشت
"TR-119-FOI."
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references (pages 89-91).
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The Swedish government is undertaking efforts to reorient Swedish Defence Forces from homeland defence to a wider suite of missions, including operations far from Sweden-a significant change in the way Sweden is willing to employ its armed forces. Such missions include expeditionary operations with coalition partners. Therefore, a decision was made to move towards network-based operations linking sensors, decisionmakers, and combat systems to achieve shared awareness, increased speed of command, higher operational tempo, greater lethality, and increased survivability. The methodology proposed in this report suggests several operational functions, such as air and missile defense or joint force command and control, that are representative of the type of missions future Swedish forces may have to perform. Once these operational functions have been prioritised and networks have been designed that connect the elements or forces that will participate in that function, the operational functions are then grouped into interaction categories. These categories include (1)-specialized interaction, with low to medium requirements for access, timeliness, and security; (2) ubiquitous interaction, which involves a large number of organizations; (3) secure interaction, for which participants and the information exchanged must be secured both physically and electronically; and (4) real-time interaction, extremely time-sensitive combat actions requiring that very few participants have access to critical real-time data and are able to share that data, even when network connections and nodes have failed. These interaction categories support the identification of common subnetworks and analogous systems or components in the cost-estimation process, which may draw on several cost-estimation methods. The methodology should identify all relevant costs, including those for the network infrastructure, and costs associated with operational functions supported by the network; should allow for the comparison of historical and notional systems; and should relate network capabilities and metrics to cost so that cost and benefit analysis can be facilitated. The report offers criteria for measures of the needed access to, timeliness of, and security for the network, and metrics for those measures, then relates those metrics broadly to the four interaction categories. It also presents three real-world examples of the types of networks Swedish Defence Forces may be relying on, depending on which of the four proposed options--with their different emphases on capabilities for international operations, homeland defence, and adaptable structure for unforeseen future needs--is selected in 2004.