Presentation - SEDC Conference 2014

Download Report

Transcript Presentation - SEDC Conference 2014

Capability-Based Technical Reference Frameworks for Open System Architecture Implementations

(Leathart, Porter, Schmidt, O’Hare, Crisp, Laird)

Presented by John R. Leathart

Chief Engineer PEO SUB-S Systems Integration Manager - Submarine Warfare Systems NAVSEA05UW

April 3, 2014

Unlocking Potential

Naval Enterprise OSA Strategy

*

OSA Vision: Affordable, Open Platforms that Easily Accommodate Open Modules

Business changes

Implementation Tools

OSA Training

Technical Reference Frameworks

Unlocking Potential *ASN RDA “Naval Open Systems Architecture Strategy” 26 November 2012

Technical Reference Framework

• • Provides a reusable architecture for a family of related applications An integrated set of components Standardized specifications Architectures Data Models Protocols Tools Page 3 Unlocking Potential

Technical Frameworks Enable Buying Choice

Open Interfaces - SPIES CANES Unlocking Potential SWFTS 4

Unlocking Potential

Do You Have a Closed System?

Is your system delivered through a single contract – If so, has it been that way for a while?

Is that prime contractor the only one who knows how your system is architected?

If you answered yes to these two questions, then you are at high risk of a having closed system

What to do if You Have a Closed System • 1st step is to analyze your architecture • Acquire system architecture documents and compare them to the following ten attributes • • • Federated Acquisition/Integrated Operation Data Driven Expandable (Adaptable, Scalable, Extensible) • • Authoritative Governance Published and Discoverable • • Reduced Complexity (Modular Design, Minimized Coupling, Clear/Concise/Consistent) Be Open (Use of Open Standards, Support Re-Use, Utilize Central Services) • • • Be Secure (Compliant, Certifiable, Reliable) Reusability (Portable Components) Defined Intellectual Property and Data Rights Unlocking Potential

Capability Decomposition & the Method to the Madness

Do you meet all 10 characteristics? YES

You are an Open System

– Should be easy to compete in smaller components, lending towards right-sized competition

NO

You are not Open and need an plan of action

– Describe at a high level the capability you are delivering – Using the description, define the pieces of that capability that when combined make up that whole capability – Repeat the step on the pieces until it makes sense to stop • Each piece should be clearly defined, easy to understand, and the individual capabilities are of manageable size Unlocking Potential

Capability Decomposition & the Method to the Madness (cont.) •

You are not Open and need an plan of action (Continued)

– Map the existing system in to these pieces • If the mapping is difficult it is likely your systems architecture is lacking and that piece may need to be re-architected • Change should be accomplished in an evolutionary, not revolutionary, manner • Map out the evolutionary plan of change of the architecture • Requires defining interfaces between components • Use open principles for interfaces (published, using industry standards) • Provides a manageable risk profile

KEY TO SUCCESS

First step should be modest and not aggressive – Pick a piece outside of the programs critical path – Goal should be to prove the viability Unlocking Potential

PEO Submarines Combat Systems Success Story • BSY-2 Combat System for Seawolf Class submarines • Last submarine combat systems designed under GOTS procurement • • Very Capable Very Costly & Delivered late • After initial three Seawolf Class submarines were built the program was cancelled due to cost, with the combat systems significantly contributing to that cost • Virginia Class submarines and COTS based combat systems • Design of the Submarine Warfare Federated Tactical Systems (SWFTS) • Hardware capability defined by the 2yr Technical Insertion (TI) process • Software was based on a data driven design • • Data model defined with 14 data groups utilizing an open standard middleware Programatically broken up into separate PMOs each delivering a piece of the overall combat system (Sonar, Tactical Control, Weapons Control, Imaging, etc) Unlocking Potential

PEO Submarines Combat Systems Success Story (cont.) • Virginia Class submarines and COTS based combat systems (cont.) – Some significant keys to success of the APB process were • The process brings in all sized businesses proposing solutions to requested topics  Significant small business participation – Software lifecycle created to support a drumbeat of improved capability • Two year cycle known as the Advanced Processor Build (APB) – TI hardware design done on even years – APB software baselines are designed on odd years • Utilizes Open System Principles – Published and open interfaces – Use of open standards middleware – Baseline management (governance) on System of System Interfaces Unlocking Potential

PEO Submarines Combat Systems Success Story (cont.) • The solution was originally for Virginia Class submarines but were then extended to the other classes of fast attack submarines • Has been in place for longer than a decade • Significant cost reductions of the cost of acquisition and maintenance of the combat systems on the fast attack submarine fleet • Has dramatically reduced cost and has provided rapid new capability insertion to the substantial benefit of the fleet.

• This is an example of how open systems principles work • Took a large monolithic combat system (BSY-2) and re-factored the capabilities using open system principles • Has been working for more than a decade and still works • The TI and APB processes have been lauded as a model for acquisition in warfare systems Unlocking Potential

• Published Open Interfaces & Standards: Methodology Description of Analysis Phase to determine if an architecture lends itself to being constituted by modular components Stove-piped versus layered & modular Applications Sensor Systems C2 System Technology base: Proprietary MW Mercury Link16/11/4 Technology base: DII-COE POSIX ATM/Ethernet Engagement System Technology base: Proprietary MW POSIX NTDS AAW EG EO Weapons Control Kill Eval Network Sched Illum TBM EG AAW AAW AAW MG TMB MG Technology base: Proprietary MW VxWorks FDDI/LANS Applications Weapons Systems Technology base: Proprietary MW POSIX VME/1553 Applications Sensor Systems Operating System Endsystem C2 System Domain-Specific Services Common Services Distribution Middleware Infrastructure Middleware Engagement System Middleware Operating System Endsystem Weapons Control Applications Weapons Systems Domain-Specific Services Common Services Distribution Middleware Infrastructure Middleware Operating System Endsystem Wireless/wired Networks Operating System Endsystem

Published Open Interfaces & Standards: Methodology • • • Determine the standards granularity & capability scope of the open interfaces & Granularity is a measure of the “surface area” of the interface Capability scope identifies the layer(s) of abstraction that are addressed Ad Hoc Architecture Early OSA with COTS OSA with Domain Reuse OSA with Product Lines OSA with SOA

• Published Open Interfaces & Standards: Methodology • • Determine which of the identified components can be published as either Open standards , which either exist already or which could be defined/ratified via a recognized standards organization, or Published domain-specific interfaces (local standards) , which are defined by agreements amongst government & contractors in one or more domains Early OSA with COTS OSA with Domain Reuse OSA with Product Lines OSA with SOA Open domain specific interfaces Open standards

Published Open Interfaces & Standards: Methodology • • • • • Determine the appropriate governance models best suited for defining, adopting, & publishing the open interfaces & standards Relevant examples include International standards bodies Vendor-centric “de facto standards” Managed Government/Industry consortium

Common Data Models & Protocols for OSA Initiatives • • Common data models & protocols help achieve interoperability between hardware and/or software applications & services These common data models & protocols simplify data interchange & exchange between components from different suppliers or components implemented using different technologies.

What is a Common Data Model and Why is it Important?

• • • • • Common data models define the terminology that a program uses for all of its data sources and the relationships that exist between different data items A common data model enables data interoperability between applications A Government owned data model can provide protection from a vendor lock on their interfaces Ensure interoperability between applications A Common Data Model – Allow applications to loosely coupled – Applications can upgrade at their own pace, because the data model provides for a common exchange Unlocking Potential

Commercial Industry Using Data Models Amazon and Facebook Utilize a common data model to share key characteristics of their customers Apple and Samsung Use Data Models to Support the Quick Launch of New Smart Phone Products

Unlocking Potential

Navy Implementation of a Data Model

• • • • The Anti Submarine Warfare (ASW) Community of Interest Data Model (ACDM)is: An information exchange model – A standard to support moving information between systems – Designed to provide unambiguous interpretation Intended as a living model – – Continually evolve to the changing needs of the ASW community Grow in capability as the sophistication of ASW systems increases Developed to be Flexible – – Support interoperability between software platforms Extensible/scalable for individual system / program needs Broad in scope – Tracks and situational awareness – – – – Sensor metrics and sensor data Mission planning Simulation and training Reconstruction and analysis Unlocking Potential 19

Unlocking Potential

TRF Governance Plan

• Guides the TRF description in acquisition program documents such as – • Acquisition Plan • • • RFP System Engineering Plan Interoperability DODAF Views • • Information Support Plan System Specifications • • Software Development Plan Configuration Management Plan • Creates a coherent picture concerning adherence to OSD and Navy OSA policy.

Better Buying Power 2.0

Promoting Effective Competition for the Life Cycle

This item is continued from BBP 1.0 and will focus on improving the Department’s early planning for open architectures and the successful execution of the plan to provide for open architectures and modular systems. This will include the

development of a business model and associated intellectual property strategy

(data rights planning) that can be implemented over the lifecycle of the product, starting while competition still exists.

https://acc.dau.mil/bbp

Enforce open system architectures and effectively manage technical data rights:

21

Unlocking Potential

Questions?