link : OPED: can WIN-T evolve?
OPED: can WIN-T evolve?
C4ISR
OPED: can WIN-T evolve?
By Joe Kim - senior vice president and global CTO for Solar Winds
As military action becomes more dispersed, the Department of Defense (DOD) is expanding the concept of the wireless warfighter. A great example is the United States Army’s Warfighter Information Network-Tactical (WIN-T), which “delivers an extensive tailorable suite of integrated tactical network communication and network/cyber management capabilities to support today’s complex Joint, Coalition, and Civil missions worldwide.”
But as mobile technology continues to play a mission-critical role in national defense, the DOD must take steps to ensure that communications between commanders and armed forces remain clear and secure. It must implement strategies to monitor all aspects of its mobile networks for reliability and security.
Can You Hear Me?
Nobody wants a “can you hear me” situation when lives are at stake. Unfortunately, for many mobile military operations, reliable communication has become increasingly complex.
Today, there are several main issues that armed forces routinely encounter when setting up mobile communications and tactical operations centers (TOCs). Data and
It’s not just verbal communications that can be compromised; access to mission-critical data can also be problematic. Though the size and sophistication of the equipment will vary based on the mission, each TOC includes physical and virtual servers to host applications, storage systems, applications, and underpinning networks. Faulty communications networks can make it difficult for forces to access and share important resources and information, which could impact their missions.
Consistent and effective battlefield communications
The importance of automated network management and monitoring in this type of environment cannot be overstated, since it can be the key to maintaining consistent and effective battlefield communications. Military forces can easily identify potential problem areas in their mobile communications systems so that forces maintain constant and secure contact with each other and central command. Continuous network monitoring can also help proactively prevent issues—from possible cyberintrusions to bandwidth anomalies and beyond—before they become real problems.
There are several ways that managers can use network monitoring to improve warfighter communications. Bandwidth usage can be closely monitored to discern and identify network bottlenecks that could impact soldier-to-soldier and unit-to-unit communications, and provide network engineers with the information they need to alleviate the congestion. Network traffic types, patterns, and protocols can be closely analyzed to identify the impact that each of these components is having on the network. All of these reports can provide valuable information that can be used to reduce latency and jitters and improve overall quality of communications.
from All Articles and Blogs http://ift.tt/2uaPPPl
via Defens News
thus Article OPED: can WIN-T evolve?
You now read the article OPED: can WIN-T evolve?with the link address https://uswordarmy.blogspot.com/2017/07/oped-can-win-t-evolve.html
0 Response to "OPED: can WIN-T evolve?"
Post a Comment