Accession Number:

ADA588003

Title:

Coping with Degraded or Denied Environments in the C2 Approach Space

Descriptive Note:

Conference paper

Corporate Author:

ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE

Report Date:

2013-06-01

Pagination or Media Count:

45.0

Abstract:

The NATO Network Enabled Operations NEC C2 Maturity Model N2C2M2 defines a number of Command and Control C2 Approaches that correspond to various ways to accomplish C2 functions. These Approaches are defined by the allocation of decision rights, patterns of interaction, and the distribution of information. Recent work in C2 theory has considered the differences in performance relative to the C2 Approach that is adopted. This work investigates the idea that an optimal operating region of the C2 Approach Space can be identified for particular missions and circumstances, where optimal is a function of effectiveness, efficiency, and agility. While circumstances that are characterized by the presence of degraded network conditions or hostile or extreme environments is of great interest, the performance of various C2 Approach options under these conditions have not been well studied. This paper focuses on the relative resilience of organizations as a function of their C2 Approach a key component of agility. We explore the relationship between C2 Approach and performance under degraded information and communications environments using a set of six unique simulation experiments.

Subject Categories:

  • Computer Programming and Software
  • Military Operations, Strategy and Tactics
  • Radio Communications
  • Command, Control and Communications Systems

Distribution Statement:

APPROVED FOR PUBLIC RELEASE