Software Ecosystem Architectural Model and Application Program Interface for Common Core Combat System
Navy SBIR 2020.1 - Topic N201-057
NAVSEA - Mr. Dean Putnam - [email protected]
Opens: January 14, 2020 - Closes: February 26, 2020 (8:00 PM ET)

N201-057

TITLE: Software Ecosystem Architectural Model and Application Program Interface for Common Core Combat System

 

TECHNOLOGY AREA(S): Information Systems

ACQUISITION PROGRAM: PEO IWS 1.0, AEGIS Combat System Program Office

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), 22 CFR Parts 120-130, which controls the export and import of defense-related material and services, including export of sensitive technical data, or the Export Administration Regulation (EAR), 15 CFR Parts 730-774, which controls dual use items. Offerors must disclose any proposed use of foreign nationals (FNs), their country(ies) of origin, the type of visa or work permit possessed, and the statement of work (SOW) tasks intended for accomplishment by the FN(s) in accordance with section 3.5 of the Announcement. Offerors are advised foreign nationals proposed to perform on this topic may be restricted due to the technical data under US Export Control Laws.

OBJECTIVE: Develop a Common Core Combat System (CCCS) software application execution and cross-application coordination environment (ecosystem) and associated Application Program Interface (API) capable of supporting various DoD- or 3rd-party-sourced dynamically loadable real-time tactical combat systems client applications.

DESCRIPTION: The Navy requires expansion of its sea-based advantage through increased capability. This need is addressed by providing technology that has the potential to improve Combat Systems client applications real-time performance (and the overall tactical performance and effectiveness of the host surface platform), as well as enabling multi-platform software re-utilization and commonality. This may allow for a reduction in the number of platforms needed in a specific tactical arena by improving the overall tactical efficiency of the battlegroup as a whole, resulting in a subsequent improvement in overall affordability.

The current implementation of the AEGIS Combat System has fundamental architectural limitations deriving from its initial hardware and software design constraints. These architectural limitations have forced the use of inefficient �bolt-on� style modernization modifications and enhancements to meet evolving 21st century threats. Currently available commercial systems and software that might be considered for adaptation to partially address the Navy�s combat systems requirement for advanced situational awareness (SA) (e.g., the FAA Air Traffic Control System hardware and software) are dated in their designs. They lack the software flexibility and track monitoring capacity required to adequately address tactical requirements. Specifically, the currently available commercial technology mentioned above is limited in that it lacks the capability to track, identify, and manage complex air, surface and subsurface entities and threats present in a combat environment. Additionally, such commercial systems have no intrinsic ability to provide a real-time-response-capable software execution environment for DoD- or 3rd-party-sourced combat systems client applications. Since no viable commercial alternatives exist or thus cannot be adapted to address these needs, it becomes necessary for the Navy to pursue a different avenue of exploration.

The Navy needs a combat systems application software execution environment (i.e., software �ecosystem�) for use within a host CCCS (or AEGIS) environment. This software ecosystem will support various DoD- or 3rd-party-sourced dynamically loadable real-time tactical combat systems client applications, all potentially executing simultaneously within the software ecosystem. Here �dynamically loadable� means that a client application can be loaded and started at operator discretion within a currently executing combat system instance, without the need to reload, restart, or otherwise interfere with the current running status of the combat system. The software ecosystem must also provide these client applications with a common API enabling access to combat systems weapon, sensor, and Common Operational Picture data in a real-time manner. The innovative challenge in this design task derives from providing these services without jeopardizing or degrading the overall real-time performance of the other simultaneously executing client applications or the host combat system itself. A fundamental architectural redesign of the combat systems core is needed to enable the efficient, rapid, and cost-effective addition of new capabilities, such as multi-platform sensor and weapons coordination, off-board/organic on-the-fly sensor and weapons integration, built-in cyber resilience, and real-time fault recovery. To address this critical need, a new CCCS architecture is currently in the planning stage, with the intent of providing a modular set of platform-agnostic common combat system services. This CCCS implementation, when supplemented by platform-specific sets of weapon, sensor, and communications capabilities modules, will constitute a new, modular, dynamically adaptable combat system design that can evolve to meet future emerging threats in a rapid and cost-effective manner.

Development of a CCCS software application execution and cross-application coordination environment (ecosystem) and associated API is critical to the future needs of the Navy. Such a capability will allow for the rapid integration of new tactical capabilities within a currently installed and running combat system instance. This software ecosystem is intended to serve as: (i) a core combat system architectural enhancement within the current AEGIS system; or (ii) a primary modular component within the newly proposed CCCS platform-agnostic combat system, intended for implementation on Future Surface Combatant (FSC) and other appropriate Navy platforms.

The CCCS modular ecosystem architectural framework and software component API should provide a comprehensive architectural model for a complete, versatile platform-agnostic �core� combat system, when taken in conjunction with: (i) an appropriate CCCS core combat system modular architectural framework and software component API; (ii) an appropriate CCCS multi-platform coordination architecture and inter-platform data exchange algorithm set; and (iii) an appropriate multi-platform coordinated/synchronized Distributed Common Operational Picture (DCOP) subsystem implementation. The term, �core� implies that this system architecture and implementation will provide those combat system services and capabilities that are considered necessary to satisfy common tactical warfighting requirements spanning various and diverse surface combatants. This core combat system implementation, when configured with the appropriate surface warfighting platform-specific sensor and weapons capability software modules, should be capable of fulfilling the functional warfighting capabilities and requirements needed to support the vast majority of U.S. Navy surface platforms well into the future. The CCCS modular applications program execution and cross-applications data exchange and coordination environment (hereafter referred to as the �ecosystem�) will provide a software execution environment supporting multiple dynamically loadable (i.e., run-time loadable) combat systems operator controlled and/or autonomous applications. The ecosystem will support application performance monitoring and control services as well as inter-application (ship and cross-platform or battlegroup) coordination and data exchange services, all provided via a well-defined and documented ecosystem API. The architecture of the API will provide a layer of software abstraction hiding any implementation-specific details of CCCS provided lower-level software communications and control services.

The CCCS ecosystem architectural model and software framework will support a software execution environment and API capable of supporting a scalable number of independently executing combat systems applications and autonomous AI-based software agents or entities, such as tactical and engagement planning tools, multi-platform weapons control and assignment tools, and AI-based situational awareness autonomous agents. Within the ecosystem, each application or entity will be capable (when granted the appropriate access permissions) of accessing: (i) ship- or battlegroup-hosted weapons and sensor system control elements system status and sensor data; (ii) DCOP data; (iii) inter-application cross-platform data exchange and messaging services; and (iv) host combat system (i.e., CCCS) ecosystem software management performance monitoring metrics and applications execution controls.

With respect to ship-based ecosystem applications accessing organic-hosted (such as ship)capabilities, all four of the access categories listed above should support real-time access and control. With respect to ship-based ecosystem applications accessing non-organic-hosted (such as battlegroup) capabilities, near real-time performance should be the goal. The ecosystem architecture and its API will support a Quality-of-Service (QOS) application and local and remote capabilities performance monitoring subsystem. This subsystem should be capable of providing QOS metrics for each off-board capability to any application granted access to that capability. The QOS metrics for any capability should be based on appropriate weapons communications control-loop delay and sensor data delay measurements derived from periodic automated communications-loop access senescence and jitter testing of off-board capabilities.

The ecosystem subsystem software architecture and API framework should be modular in nature. The installation, removal, activation, and deactivation of the ecosystem modular software within an executing CCCS implementation (or other host combat system) should have no adverse effect on the real-time performance of the CCCS system or the services it provides to the host platform and operator at the time those changes are implemented.� An exemplar of this type of no impact behavior during runtime installation and removal of capabilities within an executing system can be observed in the Linux operating system kernel module control facilities (kernel 4.4 and above), e.g., the insmod, rmmod, depmod, lsmod, modinfo, and modprobe commands [Refs. 2, 3].� The process of installing, removing, upgrading, or otherwise controlling the ecosystem software implementation module within an executing CCCS installation should be easily executed by combat systems watch personnel, without the need for specially trained software maintenance personnel.

The CCCS ecosystem API architecture and software framework will provide a native suite of Ecosystem cross-application and cross-platform data exchange and message services. The API will provide a level of software abstraction, masking the underlying implementation details of the communications services framework of the CCCS (or host combat systems) that it utilizes. The ecosystem API will also provide ecosystem resident software applications and entities with an access-controlled combat system weapons and sensor-system data real-time- or near real-time-capable interface. This API will be architected to provide a platform-agnostic abstracted weapons and sensor access mechanism capable of providing access to both organic and non-organic weapons and sensors utilizing common well-defined and documented data and control software structures, and access to the QOS metric subsystem described previously to quantify performance when accessing near real-time non-organic capabilities. The ecosystem API architecture will also implement a software applications access control subsystem, which will utilize a hierarchically structured set of privilege levels to control access to both organic and non-organic weapons and sensor systems data and interfaces.

Both the CCCS ecosystem architectural model and its associated APIs will be well-documented and conform to open systems architectural principles and standards [Ref. 4]. Implementation attributes should include scalability and the ability to run within the computing resources available within the AEGIS combat systems BL9 or later hardware environment.

The technology will be compatible with the C++ programming language and capable of running in a Linux (Redhat RHEL 7.5/Fedora 29/Ubuntu 18.4.1 or later) processing environment as a standalone application (i.e., no critical dependencies on network-based remotely hosted resources, save for sensor data emulators). The prototype CCCS implementation will demonstrate the following: first, the ability to start, stop, and control multiple operator-driven or autonomous combat systems applications or software agent entities; second, the ability of real-time performance when executing various data exchange operations between ecosystems-hosted applications and entities; and lastly, the ability of real-time performance when executing various data exchange operations between organic and non-organic ecosystem-hosted software applications and entities, and real-time or near real-time access and control of organic and non-organic sensor and weapons system emulators.

Any prototype produced during Phase II shall demonstrate that it meets the capabilities described above during a functional test to be held at an AEGIS or FSC prime integrator supported Land Based Test Site (LBTS) identified by the Government and capable of� simulating an AEGIS BL9 compatible or newer combat system hardware test environment.

Work produced in Phase II may become classified. Note: The prospective contractor(s) must be U.S. Owned and Operated with no Foreign Influence as defined by DOD 5220.22-M, National Industrial Security Program Operating Manual, unless acceptable mitigating procedures can and have been be implemented and approved by the Defense Security Service (DSS). The selected contractor and/or subcontractor must be able to acquire and maintain a secret level facility and Personnel Security Clearances, in order to perform on advanced phases of this contract as set forth by DSS and NAVSEA in order to gain access to classified information pertaining to the national defense of the United States and its allies; this will be an inherent requirement. The selected company will be required to safeguard classified material IAW DoD 5220.22-M during the advance phases of this contract.

PHASE I: Design a concept for a CCCS software application execution and cross-application coordination environment (ecosystem) and associated API. Establish feasibility through modeling and analysis to show the concept will meet the required parameters in the Description. The Phase I Option, if exercised, will include the initial design specifications and capabilities description to build a prototype solution in Phase II.

PHASE II: Design, develop, and deliver a prototype software implementation of the CCCS ecosystem. Demonstrate that the prototype meets the capabilities detailed in the Description during a functional test that will be held at an AEGIS or FSC prime integrator-supported LBTS provided by the Government, representing an AEGIS BL9 or newer combat system hardware environment.

It is probable that the work under this effort will be classified under Phase II (see Description section for details).

PHASE III DUAL USE APPLICATIONS: Support the Navy in transitioning the technology for Navy use. Integrate the CCCS ecosystem software along with other CCCS compliant core capability and platform-specific capability software modules into a prototype combat system implementation, consisting of a Common CCCS experimental prototype, implemented on a virtualized hardware environment within an AEGIS compliant land-based testbed.

This capability has potential for dual-use capability within the commercial Air Traffic Control system in future development of an air traffic control system capable of rapid upgrade to handle increasingly complex traffic control patterns.

REFERENCES:

1. Mattis, J.� �Summary of the 2018 National Defense Strategy.�. U.S. Department of Defense, 2018. https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf

2. Mauerer, Wolfgang. �Professional Linux Kernel Architecture.� Wiley Publishing, Inc.: Indianapolis, 2008. https://cse.yeditepe.edu.tr/~kserdaroglu/spring2014/cse331/termproject/BOOKS/ProfessionalLinuxKernelArchitecture-WolfgangMauerer.pdf

3. Love, Robert. �Linux Kernel Development: A thorough guide to the design and implementation of the Linux Kernel (3rd Ed).�� Addison Wesley, 2010. https://doc.lagout.org/operating%20system%20/linux/Linux%20Kernel%20Development%2C%203rd%20Edition.pdf

4. Schmidt, Douglas. �A Naval Perspective on Open-Systems Architecture.�� SEI Blog, 11 July 2016. Software Engineering Institute, Carnegie Mellon University.� https://insights.sei.cmu.edu/sei_blog/2016/07/a-naval-perspective-on-open-systems-architecture.html

KEYWORDS: Common Core Combat System; Modular Applications Program Execution and Cross-applications Data exchange and Coordination Environment; Rapid and Cost-effective Addition of New Capabilities; Cross-applications Data Exchange and Coordination Environment; Communications Services Framework; Dynamically Loadable Real-time Tactical Combat Systems Client Applications