global information grid
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Ali H. Al-Bayatti ◽  
Hussein Zedan ◽  
Antoniuo Cau ◽  
François Siewe

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid (GIG) was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks (MANoN) is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union’s recommendation M.3400 to manage securely the future of military Network-Centric Warfare (NCW). The authors will employ Interval Temporal Logic (ITL) as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator (NS-2) to provide and check whether security requirements are met in a comprehensive manner.


Author(s):  
Matthew D. Compton ◽  
Kenneth M. Hopkinson ◽  
Gilbert L. Peterson ◽  
James T. Moore

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data flows. A Network Tasking Order process is proposed as a means of collecting this information, analyzing the information to generate network taskings, and disseminating those taskings. Tactical integration of assets in mobile networks is introduced as another planning variable in the battlefield; not unlike logistical considerations such as fuel, ammunition, water, and so on used currently in operation planning. Modeling and simulation is used to support the proposed benefits.


Author(s):  
Supriya Ghosh

This chapter lets you understand the terms Net-Centric and Net Centricity, and helps you identify the context and paradigm shift this really signifies within the military community and civilian marketplace. Note the integrated approach to implementing Net Centricity, the overall focus of the Net-Centric Data Strategy, the data goals, and concept of the Global Information Grid and Network Centric Warfare. We make sure that we discuss issues and challenges regarding a net-centric environment and provide you with a literature review of commercial and defense publications on the matter.


Sign in / Sign up

Export Citation Format

Share Document