11.5 Concluding Remarks
This chapter has focused on the NM architecture across the tactical GIG and described the need for the cipher text NM interoperability for the joint forces. It is important to consider the dynamic nature of the tactical GIG, which requires NM techniques that pass abstracted but sufficient information among the joint forces' networks. This in turn enables each force's NM to make intelligent resource management decisions. The abstraction methodology is based on HAIPE tunnel addresses. A query structure minimizes the control signaling, while making the networks interoperate seamlessly. While this chapter focused on the SPI, QoS metrics, and real-time resource management information, the interfaces presented here can be expanded to cover other NM areas (such as fault information, spectrum information, etc.) to create a comprehensive SPI definition of the GIG interoperability.
The presented case of sharing of NCW resources with the JWNM is simply a case study; similar situations exist in other DoD networks. For example, the AN is expected to be used by different networks as a reach-back in joint missions. If the NM of the AN were designated to provide certain resources for the ground networks, a similar interface could be used to allow the ground networks to have a say in managing the provided resources for the optimization of their own resources.
In concluding this third part of the book, it is necessary to emphasize that the concept of an open architecture ...
Get Tactical Wireless Communications and Networks: Design Concepts and Challenges now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.