Department Of Defense SharePoint Architecture Guide (DSAG) Part 12 Understanding NetOps Agility

There are business rules and principles that have to be followed. They are in place to make sure help with reducing the complexity of the set up. They also work to help reduce the overall cost. Yet you have a system that is very reliable and that can accommodate future changes that need to be implemented into the GIG technical direction.

NetOps Agility NetOps offers a vision for changing the existing capabilities into a multiplier. It offers a way for the Department of Defense to be able to use the power of the GIG. The mission is to offer a unified GIG that is:

Oriented for the mission The information has to be processed in a way that will always support the mission.
User friendly The users need to be able to access the necessary information from anywhere. The GIG should offer this quickly even if the needs of the user happen to be unanticipated.

Global access The mission needs to offer plenty of agility regardless of the user being local or globally positioned.

The GIG NetOps has to be delivered to the organization in a way that varies based on function. It also depends on the type of information to be accessed. The independent management systems of them rarely share information about the status of the managing domain.

The Joint NetOps Concept of Operations allows the Department of Defense to improve the way in which the GIG operated as well as how to secure it. The NetOps is very effective when it comes to the role for net centric operations to be completed. The major changes that have to be addressed include:

Awareness of the information available to commanders.

GIG command and control that can offer quick decision making.

Policies for operating the NetOps have to be clear.

The electromagnetic spectrum of the NetOps needs to be addressed.

The metrics should measure the health and mission readiness of the GIG.

The development of the capabilities needs to have a central governing location
Coordinating the independent NetOps and field activities.

The challenges offer improvement for the operations of the defenses within the GIG. This is completely supported with the ongoing efforts of the mission. There is also a multi partner environment in place.

The NetOps has an environment that allows for the organizational and geographic boundaries to be put in place. For this to work though the Department has to embrace a new method of thinking. They also have to accept new processes which means some new polices. To help with this process the NetOps agility has several goals:

Enable trusted information for the enterprise the premise is for NetOps to be seamless and for the information to flow from one end to the other of the enterprise. This is all in response to what the needs of the user happens to be with the GIG resources in place and allocated parallel with the mission requirements.

To achieve this goal there are two things that have to be considered. First, the NetOps data must be visible and it needs to be accessible for all of the authorized users. Second, the NetOps needs to be understood and then shared for that information to cover all of the missions of the Department of Defense.

Command & Control of the GIG is united The Department of Defense will have a strong dependence on the GIG. This means that it has be able to deliver a variety of commands and controls to all levels of those responsible for making decisions. It is crucial that the Department of Defense is able to take the NetOps and increase the speed of it. At the same time they can take the policy based structure of the GIG domains to coordinate them.

Evolution of the NetOps Time phasing will have to define and develop the net centric portfolio. The policies will help with the overall structure and implementing of plans for a very effective transformation in the beginning as well as additional needs emerge.

There are several rules and principles that need to be established for the foundation of the NetOps to work for the department. These guidelines are very important so it is vital that all of them are implemented successfully for the Department of Defense IT investment to be one that will offer the best benefits.

The Department of Defense needs to operate and defense the GIG as an end to end information resource. They need to create a structure that offers centralized directions so that unanticipated needs can be addressed. This includes but isn’t limited to the possibility of cyber attacks.

The function of the enterprise needs to be integrated across the many management domains. This will allow for the GIG NetOps functions to be operational at different levels. They include operations, tactics, and strategies. The program has to address training and leadership materials.

The application of the GIG program will require the services to offer automation in many areas. At the same time though it has to account for an adjustment to be made so that the resources are fully allocated based on such configurations.

The vision of shared NetOps is one that calls for shared awareness to be in place. All of the applications should be visible and accessible. This allows for the various authorized users to be able to understand all of it. The GIG resources need to have an infrastructure for computing and communication that will be centralized.

Both performance and security are key issues that have to be addressed. The information system has to make it possible for situational awareness and the management of performance to be possible. The NetOps is allows to make the health and readiness of the Department of Defense the opportunity for the services and applications to be supported by the missions of the department.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 13 Understanding How DIEA Will Evolve


Department Of Defense SharePoint Architecture Guide (DSAG) Part 11 Communication Readiness

Since the net centric vision needs to be dependable the network has to eliminate problems. It must be responsive to the various scenarios that can bring power to the edge. This information transporting is vital so a close relationship needs to develop between the infrastructure of the computing and the operations of the network. This is a priority for the support of the GIG services.

The transporting of data for all of the users from various secure domains can be challenging even with today’s technology. The seamless access that needs to be across the GIG is a goal and a priority. The data has to be available for any authorized user at all times and from all locations. The ability to deploy and expand the infrastructure is important.

Recovery of various systems that have been damaged or that have failed is important. The maintenance and availability of the elements is a requirement. The systems and technology that is used need to be seamless between them. The priority is on the communication for the infrastructure. The support ensures that the information can be transported and available to both fixed and mobile users.

This includes the physical networks, the protocols, transmission systems, facilities, and the management throughout the GIG framework. For this to happen though there needs to be a wireless line of site, SATCOM line of sight, and a fiber option traditional wire line. The priority should be on a core foundation being established that will transport all of the elements with such advanced technology. It must be able to successfully support the network for voice, data, and video with multiple levels of security in place.

For the concepts of the net centric environment to be transported, the environment requires a great deal of planning across the departments. Changes have to reflect the policies, procedures, and guidance that are in place. The planning has to take the capacity and equipment into consideration so that it is completely supported. The focus needs to include:

Modularization the design solutions should be IP based and modularized. They need to be able to identify patterns of use, location, and the mission that is being focused on. The configurations emerge so that they can be mixed and matched depending on the mission. Standardized materials have to be used in order to offer faster deployment for all users. This also cuts down on the amount of training necessary in the architecture.

Uniqueness is limited The technologies out there do offer plenty of great opportunities. They replace non standard equipment and their requirements for support. This will allow for the network to be operational with less maintenance or repairs. Therefore the cost of it is going to be reduced but you get more benefits.

The GIG communications infrastructure needs to be supportive of the IP traffic. The layered design if the IP for the transport needs to be connective at end points. Supporting the migration of the Cipher Text core is required so that the classified and unclassified traffic that is encrypted can be transported. The communications system has to provide for flexibility within the support network to all of the GIG node users. This includes the areas where they have more than one network domain.

The GIG communication system has to be designed and configured so that it is adaptable as well as reliable. This is accomplished with a network that is configured for management and has diverse paths including the cable routing. There are automatic routes offered too that can be applied. The spectrum management has to be flexible as well as dynamic.

Rapid deployment With the infrastructure equipment being configured you will be able to have the rapid deployment of the GIG abilities. This will be responsible to any mission requirements that are in place including tactical needs. The understanding of the requirements will be embedded in the resources so that the deployment is fast and enhanced from any site.

Evolution of technology There will be new types of technology that offer testing and that can increase the functions of the existing system. Once approved they can be implemented in the network. This technology has to be supportive of Internet Protocol Version 6 and of Simple Network Management Protocol Version 3.

The guide for the decisions made will be those that include anticipated opportunities for the tiered network. The security has to be considered with every step. This is why completely testing the equipment configuration both internally and with interconnections has to be done. There can be pilot programs that offer chances the deployments to be fully evaluated.

The elements of them will be embedded for the Department of Defense processing. This is a critical factor of the entire process that needs to be looked at. The ability of the department to realize that the transport of the information and the support goals of the net centric community have been realized is essential.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 12 Understanding NetOps Agility


Department Of Defense SharePoint Architecture Guide (DSAG) Part 10 Standardization of the GIG Computing Infrastructure

The net centric operating environment and applications won’t be hosted or maintained by dedicated software any longer. Instead they will be virtual on the GIG computing nodes across the various resources in the GIG. The computing nodes are IT facilities that allow for hosting the various applications and services. Data is stored and the content is controlled so that they it is delivered within the different service levels.

The computing nodes allow for security, backup, and information assurance to be in place across the IT network that is being hosted. The computing nodes can be offered in a variety of levels. This can range from a fixed enterprise scale to a regional processing area. The use of standard rules for the computing nodes is vital for the DIEA 1.0.

The GIG resources have to be on the edge and that will happen with a fixed and deployed computing node technology that is responsive. All of the computing nodes have to be NetOps certified and accredited in order for them to meet the computing service provider requirements.

The computing infrastructure has to support all of the missions of the department. It must provide the edge with an on demand access that is secure for shared spaces. The information of the assets has to work for the functionality, the security, and the integrity of all the domains.

Consolidating the computing infrastructure has fixed mode operations in place so that it is cost effective. At the same time the mission capabilities and operational effectiveness won’t be compromised. The infrastructure needs to offer security and plenty of storage for the data.

The infrastructure also needs to offer a host environment that can evolve. That way it can be adaptable to the different needs of the applications. It can also meet the demands of the increased services that are available throughout the department.

The computing infrastructure needs to be consolidated so that it I can offer the best possible extension. The resources will be the most efficient when they can be used both regionally and globally.

The platform for computing needs to have an independent locations. This will provide real time allocation for all of the shared resources. This infrastructure is responsible for supporting the needs and requirements of the edge environment. This doesn’t stop due to connectivity or a limited amount of bandwidth.

The implementation of the computing infrastructure needs to offer transparent interfaces. This will allow the users to always get top performance and a high quality of service. These abilities need to be agile so that they can continue to respond even when the demands for the computing increase.

With shared computing and data storage there are resources that have to be accessible for the virtual management and control with the GIG to occur. The GIG computing infrastructure needs to be certified and accredited by designated authorities.

There are some basic rules an principles that need to be covered. They will offer guidance for the department so that the environment can support net centric implementation of the applications and services for IT. Then it can meet the needs of the edge.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 11 Communication Readiness