The subject of this text is command control communication and information (C3I), which is the management infrastructure for any large or complex dynamic resource system. Decision-making is the essence of C3I, which is accomplished through phased implementation of a set of facilities, communications, personnel, equipment and procedures for monitoring, forecasting, planning, directing, allocating resources, and generating options to achieve specific and general objectives. A C3I system is a decision-making network that reflects a hierarchical organization of C3I nodes. Each node is responsible for the management of some portion of the available resources, where the higher level nodes are responsible for a correspondingly greater portion of the resources. Within a C3I system, both command and control decision-making occur at every level of the hierarchy. Command decisions at one level determine how to satisfy the management decisions at a higher level.By taking similar national and international systems as a model, this book explains how the management infrastructure can be planned and designed using available technologies, techniques and standards to achieve stated user operational requirements, including time and cost constraints which may be imposed on the system. The book discusses design requirements and the technical and operational issues raised, and then deals with the main subject of designing C3I systems. This text should serve as a useful reference to professionals and C3I system designers.
1 Introduction.- 1.1 Objective and Scope.- 1.2 Definitions.- 1.3 Problem Areas.- 1.4 System Acquisition Phases.- 1.5 Design Methodology.- 1.6 Content of the Book.- 1.7 References.- 2 Methodology for Collecting and Analyzing User Requirements Mission-Oriented Analysis.- 2.1 Coverage.- 2.2 Elements of MOA.- 2.3 Requirements Analysis and Computer Aided System Engineering.- 2.4 Derivation of System Design Parameters and Features.- 2.5 Testbedding and Prototyping.- 2.6 References.- 3 General System Outline Goal Architecture.- 3.1 System Concept.- 3.2 Basic Information Processing Functions.- 3.3 Communication Subsystem.- 3.4 References.- 4 Reference Model.- 4.1 Purpose and Objective.- 4.2 Functional Elements.- 4.3 References.- 5 System Architecture Design.- 5.1 Introduction.- 5.2 Node Level Architecture.- 5.3 Communications Networks.- 5.4 Data and Message Exchange Services.- 5.5 Standards.- 5.6 References.- Annex 5-A Local Area Network (LAN) Technologies and Standards.- Annex 5-B Abbreviations.- Annex 5-C Standards Used by the European Commission.- 6 System Configuration.- 6.1 Scope.- 6.2 Hardware Configuration.- 6.3 Software Configuration.- 6.4 References.- Annex 6-A Data Traffic Calculation.- 7 Security Architecture.- 7.1 Trust in the C3I System.- 7.2 Threats to Computer Systems.- 7.3 Vulnerabilities in Computer Systems.- 7.4 Attacks on Computer Systems.- 7.5 Estimation of Security Risk.- 7.6 Security Solutions.- 7.7 Implementation of Secure Systems Based on TCSEC.- 7.8 Multi Level Secure (MLS) System Design Issues.- 7.9 Alternative Security Designs.- 7.10 References.- 8 System Management.- 8.1 Requirements and Objectives.- 8.2 Surveillance and Control System (SURCONS).- 8.3 References.- 9 System Costing and Implementation.- 9.1 Scope.- 9.2 Cost Methodology.- 9.3 Implementation Plan.- 9.4 References.- Epilogue.