Paper
30 April 2009 AN-CASE NET-CENTRIC modeling and simulation
Patricia J. Baskinger, Mary Carol Chruscicki, Kurt Turck
Author Affiliations +
Abstract
The objective of mission training exercises is to immerse the trainees into an environment that enables them to train like they would fight. The integration of modeling and simulation environments that can seamlessly leverage Live systems, and Virtual or Constructive models (LVC) as they are available offers a flexible and cost effective solution to extending the "war-gaming" environment to a realistic mission experience while evolving the development of the net-centric enterprise. From concept to full production, the impact of new capabilities on the infrastructure and concept of operations, can be assessed in the context of the enterprise, while also exposing them to the warfighter. Training is extended to tomorrow's tools, processes, and Tactics, Techniques and Procedures (TTPs). This paper addresses the challenges of a net-centric modeling and simulation environment that is capable of representing a net-centric enterprise. An overview of the Air Force Research Laboratory's (AFRL) Airborne Networking Component Architecture Simulation Environment (AN-CASE) is provide as well as a discussion on how it is being used to assess technologies for the purpose of experimenting with new infrastructure mechanisms that enhance the scalability and reliability of the distributed mission operations environment.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Patricia J. Baskinger, Mary Carol Chruscicki, and Kurt Turck "AN-CASE NET-CENTRIC modeling and simulation", Proc. SPIE 7348, Modeling and Simulation for Military Operations IV, 73480L (30 April 2009); https://doi.org/10.1117/12.820487
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer simulations

Connectors

Distributed interactive simulations

Modeling and simulation

Computer architecture

Network architectures

Information security

Back to Top