Presentation - SEDC Conference 2014

Report
Capability-Based Technical Reference Frameworks for
Open System Architecture
Implementations
(Leathart, Porter, Schmidt, O’Hare, Crisp, Laird)
Presented by John R. Leathart
Chief Engineer
PEO SUB-S
Systems Integration Manager - Submarine
Warfare Systems
NAVSEA05UW
April 3, 2014
Unlocking Potential
Naval Enterprise OSA Strategy*
OSA Vision: Affordable, Open Platforms that Easily Accommodate Open Modules
• Business changes
• Implementation Tools
• OSA Training
• Technical Reference
Frameworks
*ASN RDA “Naval Open Systems Architecture Strategy” 26 November 2012
Unlocking Potential
Technical Reference Framework
• Provides a reusable architecture for a family of related applications
• An integrated set of components
Standardized specifications
Architectures
Data Models
Protocols
Tools
Unlocking Potential
Page 3
Technical Frameworks Enable Buying Choice
Open Interfaces - SPIES
SWFTS
Unlocking Potential
CANES
4
Do You Have a Closed System?
• Is your system delivered through a single
contract
– If so, has it been that way for a while?
• Is that prime contractor the only one who
knows how your system is architected?
 If you answered yes to these two
questions, then you are at high risk of a
having closed system
Unlocking Potential
What to do if You Have a Closed System
• 1st step is to analyze your architecture
• Acquire system architecture documents and compare them to the
following ten attributes
• Federated Acquisition/Integrated Operation
• Data Driven
• Expandable (Adaptable, Scalable, Extensible)
• Authoritative Governance
• Published and Discoverable
• Reduced Complexity (Modular Design, Minimized Coupling, Clear/Concise/Consistent)
• Be Open (Use of Open Standards, Support Re-Use, Utilize Central Services)
• Be Secure (Compliant, Certifiable, Reliable)
• Reusability (Portable Components)
• Defined Intellectual Property and Data Rights
Unlocking Potential
Capability Decomposition & the Method to the Madness
Do you meet all
10 characteristics?
YES
• You are an Open System
– Should be easy to compete in smaller components,
lending towards right-sized competition
NO
• You are not Open and need an plan of action
– Describe at a high level the capability you are delivering
– Using the description, define the pieces of that capability that when
combined make up that whole capability
– Repeat the step on the pieces until it makes sense to stop
• Each piece should be clearly defined, easy to understand, and the individual
capabilities are of manageable size
Unlocking Potential
Capability Decomposition & the Method to the Madness (cont.)
• You are not Open and need an plan of action (Continued)
– Map the existing system in to these pieces
• If the mapping is difficult it is likely your systems architecture is lacking and that
piece may need to be re-architected
• Change should be accomplished in an evolutionary, not revolutionary, manner
• Map out the evolutionary plan of change of the architecture
• Requires defining interfaces between components
• Use open principles for interfaces (published, using industry standards)
• Provides a manageable risk profile
KEY TO SUCCESS
First step should be modest and not aggressive
– Pick a piece outside of the programs critical path
– Goal should be to prove the viability
Unlocking Potential
PEO Submarines Combat Systems Success Story
• BSY-2 Combat System for Seawolf Class submarines
• Last submarine combat systems designed under GOTS procurement
• Very Capable
• Very Costly & Delivered late
• After initial three Seawolf Class submarines were built the program was cancelled due
to cost, with the combat systems significantly contributing to that cost
• Virginia Class submarines and COTS based combat systems
• Design of the Submarine Warfare Federated Tactical Systems (SWFTS)
• Hardware capability defined by the 2yr Technical Insertion (TI) process
• Software was based on a data driven design
• Data model defined with 14 data groups utilizing an open standard middleware
• Programatically broken up into separate PMOs each delivering a piece of the
overall combat system (Sonar, Tactical Control, Weapons Control, Imaging, etc)
Unlocking Potential
PEO Submarines Combat Systems Success Story (cont.)
• Virginia Class submarines and COTS based combat systems (cont.)
– Some significant keys to success of the APB process were
• The process brings in all sized businesses proposing solutions to requested topics
 Significant small business participation
– Software lifecycle created to support a drumbeat of improved capability
• Two year cycle known as the Advanced
Processor Build (APB)
• Utilizes Open System Principles
– Published and open interfaces
– TI hardware design done on even years
– Use of open standards middleware
– APB software baselines are designed on
odd years
– Baseline management (governance) on
System of System Interfaces
Unlocking Potential
PEO Submarines Combat Systems Success Story (cont.)
• The solution was originally for Virginia Class submarines but were then
extended to the other classes of fast attack submarines
• Has been in place for longer than a decade
• Significant cost reductions of the cost of acquisition and maintenance of the
combat systems on the fast attack submarine fleet
• Has dramatically reduced cost and has provided rapid new capability insertion to
the substantial benefit of the fleet.
• This is an example of how open systems principles work
• Took a large monolithic combat system (BSY-2) and re-factored the capabilities
using open system principles
• Has been working for more than a decade and still works
• The TI and APB processes have been lauded as a model for acquisition in warfare
systems
Unlocking Potential
Published Open Interfaces & Standards: Methodology
•
Description of Analysis Phase to determine if an architecture lends itself to
being constituted by modular components
Applications
Applications
Sensor
Systems
C2 System
Engagement
System
Stove-piped versus
layered & modular
Weapons
Control
EO
AAW
EG
Technology base:
DII-COE
POSIX
ATM/Ethernet
Endsystem
Applications
Applications
Engagement
System
Weapons
Control
Domain-Specific Services
Common Services
Distribution Middleware
Weapons
Systems
Domain-Specific Services
Middleware
Infrastructure Middleware
Common Services
Distribution Middleware
Infrastructure Middleware
Operating
System
Endsystem
TBM
EG AAW
AAW
Technology base:
Proprietary MW
POSIX
NTDS
Operating
System
Wireless/wired Networks
Endsystem
AAW
MG
Illum
TMB
MG
AAW
AAW
Technology base:
Proprietary MW
VxWorks
FDDI/LANS
Operating
System
C2 System
Sched
Network
Technology base:
Proprietary MW
Mercury
Link16/11/4
Sensor
Systems
Kill
Eval
Weapons
Systems
Technology base:
Proprietary MW
POSIX
VME/1553
Operating
System
Wireless/wired Networks
Endsystem
Published Open Interfaces & Standards: Methodology
Determine the granularity & capability scope of the open interfaces &
standards
• Granularity is a measure of the “surface area” of the interface
• Capability scope identifies the layer(s) of abstraction that are addressed
Other
Launchers
Radars
OSA with
SOA
Comms
Other
Launchers
Radars
OSA with
Product Lines
Comms
Other
Launchers
Radars
OSA with
Domain Reuse
Comms
Other
Launchers
Radars
Early OSA
with COTS
Comms
Other
Launchers
Radars
Ad Hoc
Architecture
Comms
•
Published Open Interfaces & Standards: Methodology
Determine which of the identified components can be published as either
• Open standards, which either exist already or which could be
defined/ratified via a recognized standards organization, or
• Published domain-specific interfaces (local standards), which are defined by
agreements amongst government & contractors in one or more domains
Other
Launchers
Radars
OSA with
SOA
Comms
Other
Launchers
Radars
OSA with
Product Lines
Comms
Other
Launchers
Radars
OSA with
Domain Reuse
Comms
Other
Launchers
Radars
Early OSA
with COTS
Comms
•
Open
domainspecific
interfaces
Open
standards
Published Open Interfaces & Standards: Methodology
•
•
Determine the appropriate
governance models best suited for
defining, adopting, & publishing
the open interfaces & standards
Relevant examples include
• International standards bodies
• Vendor-centric “de facto
standards”
• Managed Government/Industry
consortium
Common Data Models & Protocols for OSA Initiatives
• Common data models & protocols help achieve interoperability between hardware and/or
software applications & services
• These common data models & protocols simplify data interchange & exchange between
components from different suppliers or components implemented using different
technologies.
•
•
•
•
•
What is a Common Data Model and Why is it
Important?
Common data models define the terminology that a
program uses for all of its data sources and the
relationships that exist between different data items
A common data model enables data interoperability
between applications
A Government owned data model can provide
protection from a vendor lock on their interfaces
Ensure interoperability between applications
A Common Data Model
– Allow applications to loosely coupled
– Applications can upgrade at their own pace, because the
data model provides for a common exchange
Unlocking Potential
Commercial Industry Using Data Models
Amazon and Facebook Utilize a common data model to
share key characteristics of their
customers
Apple and Samsung Use Data Models to Support
the Quick Launch of New
Smart Phone Products
Unlocking Potential
Navy Implementation of a Data Model
The Anti Submarine Warfare (ASW) Community of Interest Data
Model (ACDM)is:
• An information exchange model
– A standard to support moving information between systems
– Designed to provide unambiguous interpretation
• Intended as a living model
– Continually evolve to the changing needs of the ASW community
– Grow in capability as the sophistication of ASW systems increases
• Developed to be Flexible
– Support interoperability between software platforms
– Extensible/scalable for individual system / program needs
• Broad in scope
–
–
–
–
–
Tracks and situational awareness
Sensor metrics and sensor data
Mission planning
Simulation and training
Reconstruction and analysis
Unlocking Potential
19
TRF Governance Plan
• Guides the TRF description in acquisition program
documents such as –
•
•
•
•
•
•
•
•
Acquisition Plan
RFP
System Engineering Plan
Interoperability DODAF Views
Information Support Plan
System Specifications
Software Development Plan
Configuration Management Plan
• Creates a coherent picture concerning adherence to
OSD and Navy OSA policy.
Unlocking Potential
Better Buying Power 2.0
Promoting Effective Competition for the Life Cycle
This item is continued from
BBP 1.0 and will focus on
improving the Department’s
early planning for open
architectures and the
successful execution of the
plan to provide for open
architectures and modular
systems. This will include the
development of a business
model and associated
intellectual property strategy
(data rights planning) that can
be implemented over the
lifecycle of the product, starting
while competition still exists.
Enforce open system architectures
and effectively manage technical
data rights:
https://acc.dau.mil/bbp
21
Questions?
Unlocking Potential

similar documents