Network-centric warfare

In 1996, Admiral William Owens introduced the concept of a 'system of systems' in a paper published by the Institute for National Security Studies in the United States.As a distinct concept, however, network-centric warfare first appeared publicly in a 1998 US Naval Institute Proceedings article by Vice Admiral Arthur K. Cebrowski and John Garstka.However, the first complete articulation of the idea was contained in the book Network Centric Warfare : Developing and Leveraging Information Superiority by David S. Alberts, John Garstka and Frederick Stein, published by the Command and Control Research Program (CCRP).[4] This book derived a new theory of warfare from a series of case studies on how business was using information and communication technologies to improve situation analysis, accurately control inventory and production, as well as monitor customer relations.Within the Alliance the NATO Interoperability Standards and Profiles (NISP) provides the necessary guidance and technical components to support project implementations and Federated Mission Networking.See also Partnership for Peace for information on extending coordination efforts to non-NATO nations that are keen to support military operations other than war activities, such as international peacekeeping, disaster response, humanitarian aid, etc."With less than half of the ground forces and two-thirds of the military aircraft used 12 years ago in Desert Storm, we have achieved a far more difficult objective.In Desert Storm, battalion, brigade, and division commanders had to rely on maps, grease pencils, and radio reports to track the movements of our forces.By developing interoperability with U.S. systems, in his view, the three arms of the Australian Defence Force could end up operating better with their sister United States services than with each other.[clarification needed] Other possible failure modes or problem areas in network-centric warfare include the occurrence of the Byzantine generals' problem in peer-to-peer systems; problems caused by an inadequate or a shallow understanding of (or general disregard for) self-regulation, self-organization, systems theory, emergent behavior and cybernetics; in addition to this, there are potential issues arising from the very nature of any complex, rapidly developed artificial system arising from complexity theory, which implies the possibility of failure modes such as congestion collapse or cascading failure.
German Army Leopard 2A6M that incorporates systems designed to be used in conjunction with a networked battlefield
outlineHistoryPrehistoricAncientPost-classicalCastlesEarly modernMilitary revolutionPike and shotNapoleonic warfareLate modernIndustrial warfareFourth-gen warfareMilitaryOrganizationCommand and controlDefense ministryAir forceMarinesCoast guardSpace forceReservesEngineersMedicalPoliceDivingInfantryCavalryArtillerySpecial forcesSignal corpsWarshipsSubmarinesAircraft carriersLanding craftAuxiliary shipsFightersBombersCommandClose air supportElectronic-warfareReconnaissanceFire-control systemFire-control radarDirector (military)Combat information centerShip gun fire-controlGun data computerTorpedo data computerBasic trainingMilitary manoeuvrersCombat trainingBattlespaceAerospaceAerialAirborneCold-regionDesertFortificationJungleMountainSubterraneanTunnelAmphibiousSurfaceUnderwaterSeabedInformationWeaponsAir defenceBarrageBiologicalCamouflageHorsesChemicalCombined armsConventionalDenialDisinformationElectromagneticLoiteringMissileNuclearPsychologicalRadiologicalSubmarineUnconventionalTacticsList of military tacticsAirliftAir assaultAirbridgeAirdropAnti-aircraftAnti-subAnti-tankBattleChargeCounterattackCounterinsurgencyConvoyDefeat in detailFoxholeEnvelopmentFormationGuerrillaRapid dominanceEncirclementInvestmentScreenTactical objectiveTarget saturationTrenchWithdrawalOperationalMilitary operationSpecialOperations researchBlitzkriegExpeditionaryDeep operationManeuverOperational manoeuvre groupCovertStay-behindStrategyList of military strategies and conceptsMilitary campaignAnti-accessAttritionCommerce raidingCounter-offensiveCulminatingDefence in depthFabianEmpty fortMosaicDeceptionDefensiveOffensiveScorched earthGrand strategyAsymmetricBlockadeBroken-backedCold warColonialConquestContainmentDivide and conquerEconomicEndemicFleet in beingIrregularLiberationLimitedNew generationPerpetualPoliticalPrincelyReligiousResourceStrategicSuccessionTechnologyTheaterTotal warWorld warAdministrativeBranchPolicyTrainingServiceSociologyArea of responsibilityChain of commandDoctrineOrder of battlePrinciples of warEconomy of forceMedicineIntelligenceTechnology and equipmentPersonnelRecruitmentConscriptionMobilizationSpecialismSoldierMoraleVolunteerChildrenTransgenderHarassmentConscientious objectorCounter-recruitmentLogisticsWar economyArms industryMaterielSupply-chain managementMilitary–industrial complexOutpostSciencePower projectionLoss-of-strength gradientLanchester's lawsForce multiplicationOccupationArmisticeCeasefireCourt-martialDesertionGeneva ConventionsGeneva ProtocolIslamic rulesJusticeLawfulUnlawful combatantPerfidyRegularJewish laws on warRules of engagementMartial lawWar crimeWar treasonTheoryAir supremacyAppeasementCommand of the seaDeterrence theoryFull-spectrum dominanceOvermatchJust war theoryPhilosophy of warSecurity dilemmaTripwire forceWargamingSimulationExercisesCombat effectivenessCenter of gravityNon-warfareArms controlCounter-insurgencyDeterrenceDisaster responseGrey-zoneGunboat diplomacyHumanitarian aidLaw enforcementLow-intensity conflictMilitary engineeringPeacekeepingPeacebuildingPeace through strengthShow of forceCultureAwards and decorationsBattle cryWarriorWar filmMilitary science fictionWar novelAnti-war movementFoot drillWar songUniformWargameMilitarizationMilitarismCamp followerSeven Military ClassicsThe Art of WarDe re militariStrategemataWomen in warWar resisterWar studiesHorses in warfareWartime sexual violenceFifth columnMercenaryPrivateerPrivate military companyBattlesMilitary occupationsMilitary termsOperationsSiegesWar crimesWritersmilitary doctrineinformation technologycompetitive advantagecomputer networkingUnited States Department of DefenseAdmiral William Owenssystem of systemssituational awarenessJoint Chiefs of StaffUS militarymilitary powerUS Naval InstituteVice Admiral Arthur K. CebrowskiJohn GarstkaDavid S. AlbertsCommand and Control Research Programinformation revolution"observe, orient, decide, act"Col. John BoydPower to the Edgethe Pentagonpeer-to-peernetwork topologySecretary of DefenseDonald RumsfeldOffice of Force TransformationOffice of the Secretary of DefenseRevolution in Military AffairsGerman ArmyLeopard 2A6MGlobal Information Gridweapons platformssensor systemscommand and control centersNet-Centric Enterprise ServicesCooperative Engagement CapabilityUnited States NavyBCT NetworkUnited States ArmyNet-Centric Enterprise Solutions for InteroperabilityNet-Centric Operations and Warfare Reference ModelASD(NII)joint warfaresynchronizationMission CommandJoint Tactical Radio Systemsoftware-defined radiobandwidthmulti-level securityGlobal Positioning Systemfusionkey managementencryptioncryptographyFederated Mission NetworkingNATO Interoperability Standards and ProfilesStandardization AgreementsPartnership for Peacemilitary operations other than warground forcesDesert StormbattalionbrigadedivisioncommandersRichard CheneyMbit/sLieutenant generalDefense Information Systems Agencyelectromagnetic pulseNational Defense UniversityAustralian Defence ForceFourth Generation Warfarechaos theoryfailure modesByzantine generals' problemsystems theoryemergent behaviorcyberneticscomplexity theorycongestion collapsecascading failureAutonomous logisticsC4ISTARCyberwarfareInformation warfareList of cyber warfare forcesNetwork simulatorWayback Machine