enabling systems engineering with an integrated …...2 phone 216-570-8775 [email protected]...
TRANSCRIPT
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145 1
Enabling Systems Engineering with an Integrated Approach to Knowledge Discovery and
Architecture Framework
Michael R. CollinsAdvantage Development, Inc.
October, 2008
2
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Architecting and EngineeringDifferent Sides of the Same Coin
• Engineering employs analysis of function to iteratively decompose and separate a primarily functional representation of a whole into representations of economically producible components that can be assembled to construct the functional whole.
Big implication here! Engineering requires an “initial point” - a representation of the whole — to be successful!
Engineering does not work without an initial point!!
• We refer to this “initial point” as:
Engineerible RequirementsThe set of engineering requirements necessary and sufficient to initiate
the successful engineering and production of a system
Brad Mercer, MITRE, Chief Architect Maritime IT and Engineering
3
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Architecting and EngineeringDifferent Sides of the Same Coin
• Architecting employs synthesis of form to iteratively compose separate elements to form a coherent whole, or a representation of a coherent whole, that can serve as an “initial point” for system development.
• Architecting synthesizes this “initial point” from the collective vision, goals, constraints, and other needs of the stakeholders in the to-be-developed system — converting conflicting stakeholder demands into a conceptualized whole that maximizes the satisfaction of each stakeholder.
• From the point of view of architecting, we refer to this “engineering initial point” as an:
Architecture SpecificationAn architecture description to which all system implementations must
adhere; and a set of principles, practices, and constraints guiding implementation, operation, and evolution of the developed system
Brad Mercer, MITRE, Chief Architect Maritime IT and Engineering
4
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Architecting and EngineeringDifferent Sides of the Same Coin
architecture specification
engineerible requirements
collective vision, goals, constraints,and other needs of the stakeholders
representations of economicallyproducible components that can be
assembled to construct the functional whole
Analysisof Function
iteratively decompose andseparate a primarily functional
representation of a whole
iteratively composeseparate elements toform a coherent wholeSynthesis
of Form
Engineering
Architecting
Brad Mercer, MITRE, Chief Architect Maritime IT and Engineering
5
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
DISCOVER, ARCHITECT, VISUALIZE, MANAGE™
Unresolved information & data: Discovery, Indexing and Clustering
Task
Mission
Chores
Operational Function
Activity
System FunctionsCluster
Operational Nodes - SubNodes
System Nodes Knowledge
SkillsAbilities
OrganizationPersonnelDISCOVER
Structured and Described Information & Data
STSN
OPTA
Activities
Task
MissionFunction
UJTL
Architecture EffortNodes
SystemsFunctions
System Components
Billet Components K/S/A
Components
ARCHITECT
SV-213
Warfighting in Southwest Asia Warfighting in Southwest Asia Tactical Use CaseTactical Use Case
SVSV--2 Systems Communications2 Systems CommunicationsDescriptionDescription
Global Information Grid
Joint Strike Fighter
UCAV
Non-DOD AgenciesOrg Space
Allies and CoalitionOrg Space
Predator
SOF OperationalSystems
Land Warrior System Services
ISRSatellite
DIA CIA
NSA
NIMA / NRO
USCENTCOM
Deployed JSOTF/FOB
Global Hawk
JSOAC / JAOC
UAV
Internet Protocol Network(Wireless/Wideband Network Waveform)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Wireless/WNW)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
Internet Protocol Network(Terrestrial)
9
Non-DoD
JSOTF
USCENTCOM
ISR, Publish, Subscribe
C2 Info, Collaboration,
COI and ISR Info
C2 / IntelC2 / IntelInformationInformation
TheaterTheaterISRISR NationalNational
ISRISR
SIGINTSIGINT
NonNon--DoDDoDInfoInfoSpecial Reconnaissance
- Target / Threat Assessment
- Armed Reconnaissance- Post Strike
Reconnaissance
SOF tactical operations to gather information and eliminate targets of opportunity
Special Reconnaissance- Target / Threat
Assessment- Armed Reconnaissance- Post Strike
Reconnaissance
SOF tactical operations to gather information and eliminate targets of opportunity
Direct Action- Raids, Ambushes, Assaults- Terminal Guidance
SOF tactical operations directed against enemy missile threats
Direct Action- Raids, Ambushes, Assaults- Terminal Guidance
SOF tactical operations directed against enemy missile threats
TheaterTheaterIntelIntel
ForeignForeignIntel/InfoIntel/Info
Warfighting in Southwest AsiaWarfighting in Southwest AsiaTactical Use CaseTactical Use Case
OVOV--1 Operational1 OperationalConcept GraphicConcept Graphic
(JSOAC)
Direct ActionDirect Action
Precision StrikePrecision Strike
Special ReconnaissanceSpecial Reconnaissance
Armed ReconArmed ReconAllies &Coalition
NIMA /NRO
DIA
NSA
CIA
All SourceAll SourceIntelIntel
IMINTIMINT
DefenseDefenseIntel / MASINTIntel / MASINT
NetworkCentric
InformationDomain
OV-1 12
Warfighting in Southwest Asia Warfighting in Southwest Asia Tactical Use CaseTactical Use Case
SVSV--1 System Interface1 System Interface
Global Information Grid
NCES System
Joint Strike Fighter
UCAV
Non-DOD AgenciesOrg Space
Allies and CoalitionOrg Space
UAV
SI - NCES to ISR Satellite
SI - ISR Satellite to NCES
SI - NCES to UCAV
SI - UCAV to NCES
SI - NCES to UAV
SI - UAV to NCES SI - Predator to NCESSI -
NCES
to G
loba
l Haw
k
SI -
Glo
bal H
awk
to N
CES
SI - JSF to NCES
SI - NCES to JSF
SI - NCES to CIA Client Services Environment
SI - CIA Client Services Environment to NCES
SI - Land Warrior to NCES
SI - NCES to Land Warrior
SI – A/C Client Services Environment to NCES
SI - NCES to A/C Client Services Environment
SI - CENTCOM Client Services Environment to NCES
SI - NCES to CENTCOM Client Services Environment
SI - NCES to JSOTF Client Services Environment
Predator
ISRSatellite
DIA CIA
NSA
NIMA / NRO
USCENTCOM
Deployed JSOTF/FOB
SI - Non-DOD Client Services Environment to NCES
SI - NCES to Non-DoD Client Services Environment
SI - NCES to Predator
Global Hawk
JSOAC / JAOC
SOF OperationalSystems
Land WarriorSystem Services
SI - JSOAC Client Services Environment to NCES
SI - NCES to JSOAC Client Services Environment
SI -
NCE
S to
CIA
Clie
nt S
ervi
ces
Env
ironm
ent
SI -
CIA
Clie
nt S
ervi
ces
Envi
ronm
ent t
o NC
ES
SI - NCES to DIA Client ServicesEnvironment
SI - DIA Client Services Environmentto NCES
ProcessingServices
NetworkSecurityServices
Full-ServiceDirectoryServices
ApplicationServices
EnterpriseData
StorageServices
NetworkManagement
Services
InformationUser
AssistantServices
CommonCatalog
Services
DoDClient ServicesEnvironment
DoDClient ServicesEnvironment
DoDClient ServicesEnvironment
A/CClient ServicesEnvironment
Non-DoDClient ServicesEnvironment
ICClient ServicesEnvironment
ICClient ServicesEnvironment
ICClient ServicesEnvironment
ICClient ServicesEnvironment
SI - NCES to NIMA / NRO IC Client Services Environment
SI - NIMA / NRO IC Client Services Environment
SI - JSOTF Client Services Environment to NCES
SV-1
OV-3/SV-6 OV-5
Warfighting in Southwest Asia Warfighting in Southwest Asia Tactical Use CaseTactical Use Case
OVOV--5 Node Tree5 Node Tree
A3 (3) ProvideCom mand,
Control, andIntelligenceInform ation
A2 (2) ProvideNational Level
Intelligenceand Inform ation
A4122 (4122)Determ ine
Additional SupportRequirem ents for
Arm edReconnaissance
A4112 (4112)Determine Additional
S upport Requirem entsfor Target & Threat
Assessment
A4222 (4222)Determine SupportRequirem ents for
Term inal GuidanceOperations
A4132 (4132)Determ ine
Additional SupportRequirem ents for
P ost StrikeReconnaissance
A4123 (4123)Conduct
Reconnaissance,Detect and
A ttack Targetsof Opportunity
A4212 (4212)Determine
Additional SupportRequirements forA ttacking Target
A 421 (4210) ConductRaids, Am bushes, orDirect A ssaults (JP 3-
05)
A4131 (4131)Process Post
S trikeReconnaissance
MissionInformation
A411 (4110)Conduct Target andThreat A ssessm ent
(JP 3-05)
A422 (4220)Conduct Terminal
GuidanceOperations (JP 3-05)
A413 (4130)Conduct Post Strike
Reconnaissance(JP 3-05)
A4121 (4121)Process A rm edReconnaissance
MissionInformation
A41 (4100)Conduct SpecialReconnaissanceMission (JP 3-05)
A42 (4200)Conduct DirectAction M ission
(JP 3-05)
A4221 (4221)P rocess Term inalGuidance Mission
Inform ation
A412 (4120)Conduct Arm edReconnaissance
(JP 3-05)
A4223 (4223)Direct Munitions
at DesignatedTargets
A4211 (4211)P rocess DirectA ction Mission
Information
A4111 (4111)Process Target
and ThreatInform ation
A 4 (4) ConductS OF
Operations inSW A
A4113 (4113)Identify and
Assess Targetand Threat
A4133 (4133)Measure
Results ofS trike
A 0 (0) Conduct
Warfighting inS outhwest A sia
A4213 (4213)Attack Target
A5 (5) ConductA ir Operations
A1 (1) AchieveInform ationDominance
A12 (12) AssureInformation
A 11 (11)Provide
KnowledgeM anagem ent
Services
A13 (13) UseInformation
OV-4
Warfighting in Southwest Asia Tactical Use CaseOV-4 Command Relationships ChartWarfighting in Southwest Asia Tactical Use CaseOV-4 Command Relationships Chart
Combatant Commander
CommanderJoint Task Force
Joint Force AirComponentCommander
Combat UnitsCombat Units
Joint ForceMaritime
ComponentCommander
Combat Units
Operational Control
Administrative/Logistical Support
Area of Focus
Joint Force LandComponentCommander
ArmyCommander
NavyCommander
MarineCommander
Air ForceCommander
Theater Component Commands
Special Operations ForcesCommander
Joint ForceSpecial
OperationsComponentCommander
SOF Team
ARSOTF /NSWTG /AFSOF
11
SOF UnitActivities
"(4) Conduct SOF Operations in SWA""(4100) Conduct Special Reconnaissance Mission (JP 3-05)"
"(4111) Process Target and Threat Information""(4112) Determine Additional Support Requirements for Target & Threat
Assessment""(4113) Identify and Assess Target and Threat"
"(4120) Conduct Armed Reconnaissance (JP 3-05)""(4121) Process Armed Reconnaissance Mission Information"
"(4122) Determine Additional Support Requirements for Armed Reconnaissance""(4123) Conduct Reconnaissance, Detect and Attack Targets of Opportunity"
"(4130) Conduct Post Strike Reconnaissance (JP 3-05)""(4131) Process Post Strike Reconnaissance Mission Information""(4132) Determine Additional Support Requirements for Post Strike
Reconnaissance""(4133) Measure Results of Strike"
"(4200) Conduct Direct Action Mission (JP 3-05)""(4211) Process Direct Action Mission Information"
"(4212) Determine Additional Support Requirements for Attacking Target""(4213) Attack Target"
"(4220) Conduct Terminal Guidance Operations (JP 3-05)""(4221) Process Terminal Guidance Mission Information"
"(4222) Determine Support Requirements for Terminal Guidance Operations""(4223) Direct Munitions at Designated Targets"
Network Centric InformationDomain
Activities"(1) Achieve Information
Dominance"
JSOTF/FOBActivities
"(3) Provide Command,Control, and Intelligence
Information"USCENTCOM
Activities"(3) Provide Command,Control, and Intelligence
Information"
Allied and Coalition ForcesActivities
"(2) Provide National LevelIntelligence and
Information"
NCID - USCEN
TCOM
USCENTCOM
- NCID
NCID - Allied and Coalition Forces
Allied and Coalition Forces - NCID
NCID - Non-DoD Agencies
Non-DoD Agencies - NCID
NC
ID -
JSO
T F
CIAActivities
"(2) Provide National LevelIntelligence and Information"
JSO
TF -
NC
I D
NCID - SOF Unit
SOF Unit - NCID
OVOV--2 Operational Node 2 Operational Node ConnectivityConnectivity
Warfighting in Southwest Warfighting in Southwest Asia Tactical Use CaseAsia Tactical Use Case
Non-DoD AgenciesActivities
Intelligence andInformation"
"(2) Provide National Level
NCID - DIADIA - NCID
NC
ID -
NSA
NSA
-N
CID N
CID
-CI A
CIA -
NC
I D
NCID – NIMA / NRO
NIMA / NRO - NCID
DIAActivities
"(2) Provide National LevelIntelligence and Information"
NIMA / NROActivities
"(2) Provide National LevelIntelligence and Information"NSA
Activities"(2) Provide National Level
Intelligence and Information"
Air OperationsActivities
"(5) Conduct AirOperations
NCID –
Air Ops
Air Ops -
NCID
OV-2
Program Documents &Reports
Visualization Products (DODAF Artifacts)
VISUALIZE
MANAGE
6
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Root Process Problem
• Complexity of data elements is overwhelming • Difficult to support the book-keeping management of all of the data elements and their relationships across all the echelons of the Enterprise
‘Structuring’ complexity‘Echelon integration and enterprise description’–everything is a part of a larger systemPersistent, iterative, and evolutionary incorporation in a knowledge and reuse environment
7
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Discovery
• Every object, relationship and aggregation of objects in the knowledge metamodel is in documents, the universe of textual models
• Discovery is about finding the objects, relationships, aggregations and descriptions of each of these in the authoritative and original data sources
• Integration is about using Discovery to build and describe the Architecture using an architecture meta-model
8
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Concept, Themes, and Description
• A concept, or theme, is the encapsulation of a pattern that is identified as a gestalt: a persistent and unique ‘signature’
• Documents are textual patterns• Models are labeled, structured patterns• Labels are knowledge anchors to concepts and
themes• Knowledge is pattern recognition, association and
application in integrated textual and model gestalts
9
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
DISCOVERING CONCEPTS / THEMES
• ‘Information' can be treated as quantifiable symbols in communications
• Natural language has a high degree of unessential content, the less frequently a unit of communication occurs, the more information it conveys
• Information objects extracted from Natural Language text form a index unique to that concept
• The architecture metamodel is the syntactic of the knowledge pattern and is semantically rigorous
• Information objects cluster based upon an inference relationship measuring semantic completeness
10
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Program Implementation
Baseline
phone companyemail
VoIP (Voice-over-IP)
de facto standard
Info-Tech Research
McKinsey Consulting
“standard” phone lines
Legacy and low-end VoIP systems
VoIP (Voice-over-IP)
ProgramReportingObject #1
ProgramReportingObject #2
ProgramReportingObject #R
ProgramReportingObject #N
Long distance call
misnomers and myths
Cluster the indexes of the information objects using
Statistical Inference!
Mapping and Demonstrating Impactful Relationships
Define the information objects and index them
Example Cluster Picture from the Cartia: ThemeScape Web Site
THE UNIVERSE OF DOCUMENTS CONTAINS THE INFORMATION OBJECTS THAT DESCRIBE THE IMPLEMENTATION BASELINE
11
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Cluster and Relationship Visualizations
Pictures from Battelle, PNNL Starlight Web Site http://starlight.pnl.gov/Cluster and integrate using the architecture meta modelVisualization can take many forms presenting many perspectives.Tracing of the models back to the authoritative and original data sources.
12
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
DISCOVERY PROCESS
1.0DISCOVER
1.1INDEX
1.2CLUSTER
1.3ANALYZE
1.4DESCRIBE
Information Theory
Statistical Inference
Architecture Conceptual
Data Model -Metamodel
Semantic Completeness
Information Objects
Indexed Information Objects
Information Clusters
Encapsulated Concepts
Iterative Labeled Concept Descriptions
Information Rich Concepts, Indexes and Clusters
Discovery works best when it has a pre-existent form upon which it can operate.
13
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
ARCHITECTURE & DISCOVERY
• Architecture is the description of the intrinsic relationships, characteristics and behaviors of the system under study
All systems have an architecture ─ intentionally architected or not ─and that architecture is a primary determinant of the system’s behavior. Brad Mercer, MITRE Principal ArchitectArchitecture is the model in Modeling and Simulation and a rigorous and well-constructed model can be executed
• Discovery: the process for identifying the conceptual syntactic of architecture and the rich semantics
• Present architecture efforts are neither semantically complete nor rich: they contain a series of model artifacts (products) built and limited to “labeled” components and relationships; it has no processes, only product templates
14
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Taxonomies of Primitives
• Indexing and clustering builds initial identification and organization of labeled themes and concepts
• Clusters are labeled taxonomical elements• Rich taxonomies can be developed from clusters
Structured and organized categorization of informationSyntactic and semantic descriptionsParent – child relationships
• Labeled themes and concepts are the architecture primitives
15
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Topologies in Domains(information, behavioral, functional)
• Topology in architectures relates to the connectedness of child – child with order of precedence and importance
• Information object references contain topological reference information useful in describing and identifying the syntactic and semantic elements
• The taxonomical and topological elements provide the structure and precedence of concepts and their references provide the content for specification
16
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
Persistence (Primitives) and Re-use (Encapsulations)
To be Persistent, the model must decompose to its fundamental components, its primitives.
To be Re-useable, the model must encapsulate its fundamental components, or primitives into re-useable
Objects.
IDEF0 MODELS mix component information and concerns and are a visualization standard, not a data standard.
x y Consumed
Data or MessageProduced
Data or Message
Activity Rules
OpNode
State
Activity
Aggregation
y = f(x)At a NodeFor a Given StateAccording to a set of rules
17
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
OperNodeA.c
OperNodeA.a
OperNodeA.d
OperNodeA.b
Oper Node A Decomposition
Enterprise Decomposition by Echelon
f(x)x
OperNode
A
Rule1
y
f(x)
f(x)
f(x)
f(x)
f(x)
x
Rule1
y
f(x) Decomposition
1. Decomposition is Echelon by Echelon: as two separate ‘synchronous’ taxonomies2. Functional Decomposition is done with IDEF0, and the Operational Node
Decomposition is done synchronously to this 3. Inputs-Output of the IDEF 0 Model and their mapping to the Node Model are the
Information Flow Model. These Inputs-Outputs are the Information Elements that provide topological reference, precedence of function and critical exchange information for interoperability concerns
4. This process PROVIDES THE RIGOR for the architecture primitives.
1.De-confliction of meta-model components to remove mixing of concerns
2.Encapsulation represents the statement of a gestalt.
3.Incremental instances of encapsulation represent Rules and States.
4.Decomposition is a basic principle of Architecting and Engineering
18
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
View Relationships: Simplified Calculus
Activity NODE
An Activity done at a Node produces an Output
SystemFunction System
A System Function done at a System produces an Output
KSA BILLET
A KSA done at a Billet produces an Output
PERSONNEL /ORGANIZATION
DOCTRINE
TRAINING
MATERIEL / FACILITY
19
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145
DISCOVERY ENABLED ARCHITECTURE SPECIFICATION
• Document information objects describe the taxonomy and topology of architecture primitives and relationships
• Integration is accomplished using the principles and practices of a tightly coupled discovery-based architecting process
Indexing and Clustering provide navigation to the authoritative and original sources for descriptions of the information objectsClustering, using these descriptions, iteratively refines and extracts more relevant information objects
This enables the Synthesis of Form• Discovery described Architectures enables the development
of Rigorous, Semantically complete Architecture Specifications, i.e., engineerible requirements
This enables the Analysis of Function
Phone [email protected]
© 2008925 Bassett Road, Suite A
P. O. Box 45154, Westlake, OH 44145 20
QUESTIONS
Advantage Development, Inc.Michael R. Collins
440-808-1250 Office216-570-8775 Cellular