17
What is C-BML? An overview MSG-79 C-BML Workshop 23. February 2010 Farnborough, UK Ole Martin Mevassvik Principal Scientist FFI (Norwegian Defence Research Establishment)

What is C-BML?

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: What is C-BML?

What is C-BML? An overview

MSG-79 C-BML Workshop

23. February 2010

Farnborough, UK

Ole Martin Mevassvik

Principal Scientist

FFI (Norwegian Defence Research Establishment)

Page 2: What is C-BML?

Report Documentation Page Form ApprovedOMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering andmaintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, ArlingtonVA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if itdoes not display a currently valid OMB control number.

1. REPORT DATE FEB 2010

2. REPORT TYPE N/A

3. DATES COVERED -

4. TITLE AND SUBTITLE What is C-BML? An overview

5a. CONTRACT NUMBER

5b. GRANT NUMBER

5c. PROGRAM ELEMENT NUMBER

6. AUTHOR(S) 5d. PROJECT NUMBER

5e. TASK NUMBER

5f. WORK UNIT NUMBER

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) FFI (Norwegian Defence Research Establishment)

8. PERFORMING ORGANIZATIONREPORT NUMBER

9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)

11. SPONSOR/MONITOR’S REPORT NUMBER(S)

12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited

13. SUPPLEMENTARY NOTES See also ADA564685. 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langagede gestion du champ de bataille pour les operations en coalition). RTO-MP-MSG-079

14. ABSTRACT

15. SUBJECT TERMS

16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

SAR

18. NUMBEROF PAGES

11

19a. NAME OFRESPONSIBLE PERSON

a. REPORT unclassified

b. ABSTRACT unclassified

c. THIS PAGE unclassified

Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Page 3: What is C-BML?

Why Battle Management Language?

• Standardizing C2 to simulation interoperability

• Digitizing C2 information to represent plans,

orders and reports

• Benefits:

– Enables M&S Technologies to support C2

Processes

– Simulating plans and orders without manual

transfer of data between C2 and M&S systems

– Many potential applications: training, planning,

mission rehearsal, C2-C2, robotics…

C4I

Simulation

Robotic

Forces

BML C4I

Page 4: What is C-BML?

A definition

A Battle Management Language (BML) is defined as an

unambiguous language intended to provide for

(1) command and control of simulated and live forces

conducting military operations and

(2) situational awareness and a shared, common operational

picture.

Carey, Kleiner, Hieb & Brown, “Standardizing Battle Management Language –

A Vital Move Towards the Army Transformation,” 01F-SIW-067

Page 5: What is C-BML?

Three views of BML

• BML can be described by

– Doctrine: Terms rooted in ”military language”

– Representation: How to describe missions, tasks…

– Protocols: How to exchange BML

BML

RepresentationCommand & Control

Information Exchange

Data Model (C2IEDM)

XML

Web Services/

Grid Services

Terms rooted in

Military Doctrine,

such as

AAP-6

Tolk et. al, “Merging National BML initiatives

for NATO Projects”, MSG-028, Koblenz, 2004

Page 6: What is C-BML?

Applications of C-BML

• Support of planning, Course of Action (COA) Analysis

– BML is an enabling technology for use of M&S for planning

and decision support

• Training & mission rehearsal

– Improve effectiveness of command and staff training and

reduce the number of operators

• Robotic forces

– Formal unambiguous language allows automatic

interpretation of tasks

• C2 to C2

– More precise and understandable exchange of plans and

orders

Page 7: What is C-BML?

Coalition BML (C-BML) in context of MSG-048

• Orders structured using 5W’s “Who, What, When, Where and Why”

• Focuses on the “Execution” part of an Operation Order (OPORD)

• A formal tasking grammar, C2 Lexical Grammar (C2LG), ensures an

executable BML

• Based on multi-national/NATO C2 standard – Joint Command, Control

and Consultation Information Exchange Data Model (JC3IEDM)

• Exchange of C-BML using XML and Web Services

• Two-way information exchange (orders and reports)

Page 8: What is C-BML?

Employment of C-BML Lessons learned from the use of BML

• Services needed to efficiently use BML

– Configuration of C2 and simulation systems (define units,

capabilities, terrain…)

– Initialization of C2 and simulation (initial order & positions,

task organization…)

– Time management: two-way exchange of information during

non-real time simulation (scaled time)

– Scalable information exchange, e.g. through publish &

subscribe

Configuration

Terrain data / maps

Define units and

capabilities

Initialization

Initial unit positions

Initial order

(Task organization)

Execution

Exchange of reports,

FRAGOs…

Analysis, AAR

Load data from

previous run(s)

Page 9: What is C-BML?

SISO standardization

• Ongoing Product Development Group on C-BML

• Phased approach for development of C-BML. For each phase

– Data model

– Structure and representation of information

– Information exchange mechanism

– Guidelines

• MSG-048 provides feedback to SISO

Page 10: What is C-BML?

A BML example • Battalion OPORD developed by the Norwegian Army Land

Warfare Centre for the 2009 experiment

• Documented as free text and graphics

• The order needed additional elaboration and clarification to be

put into BML

• Final order put into Norwegian Tactical C2IS (NORTaC-C2IS)

• Simulated by APLET (FRA) and JSAF (UK) during the

experiment

SICF

BMLWEB

SERVICES

ISISNORTaC

ICC

Battleview ABCS

DIS

JC3IEDM +

UAV Sim

JSAF

OneSAF

SIMBAD

Page 11: What is C-BML?

• 1. SITUATION

a. Enemy Forces

• Annex B Intel

• b. Friendly Forces (1) Higher Commander’s Mission

• O/O 1BCT conducts mounted attack 100400Apr 2010 along axes PORSCHE and CORVETTE as the 2UEx(M) main effort (ME) to destroy enemy forces in zone and seize objectives LION and TIGER. BPT attack eny forces across the international border or to the WEST of NORTHWEST. BPT to conduct combat operations NORTH and NORTHWEST in-zone, to destroy ARIAN forces bypassed during the attack, to assist in ejecting Eny remnants from CF territory

• (2) 1HBCT Commander’s Intent

• The purpose of TROJAN HORSE is to maneuver rapidly from an ATK pos along PL DENVER to seize OBJ LION and TIGER, destroy ARIANAN forces in zone and secure objectives along the international border to enable establishment of CASPIAN FEDERATION (CF) regional military stability.

• (3) Neighboring units that could affect the operation. 1-66 CAB(Main effort)

• (a) O/O attack SOUTHEAST in zone along axis PORSCHE to secure OBJ DOG to defeat or bypass ARIANAN forces in zone.

• (b) O/O attack SOUTHEAST in zone along axis PORSCHE to secure OBJ LION to defeat or bypass ARIANAN forces in zone.

• 8th Sqdn 10th CAV

(a) O/O conduct zone recce from PL DENVER to intermidiate OBJ CAT and DOG.

(b) O/O conduct zone recce from PL PEARL to OBJ LION and TIGER.

(c) O/O establish scrren to the SHOUTHWEST of 1HBCT AO across the IB to provide early warning.

(d) BPT continue zone recce forward of 1 HBCT across the IB to locate Eny and direct fires in supp of 1HBCT attack.

• c. Attachments and Detachments

• Annex A Task Org

• d. Commander’s Evaluation. (1) This OPO regulates the attack against OBJ Tiger (2) Pre-condition: The Eny forces in our AO has been reduced to 40% effectiveness by higher echelon (3) Assumptions: The Eny will not stay and fight in his current positions.

2.MISSION

1-22CAB will O/O attack in zone along ROUTE

CORVETTE to secure OBJ CAT and OBJ TIGER.

1-221(tank) and 1-223(Mech) will attack towards

OBJ CAT supported by 1-222(tank) and 1-

224mech in the terrain SOUTH of ROUTE

CORVETTE. 1-222 and 1-224 is to fix the enemy

towards OBJ CAT to allow 1-221and 1-223 to

defeat the ENY in zone. From OBJ CAT I will

continue the attack at one axis until the battalion

has crossed the mash land EAST of PL RUBY.

From PL RUBY I will attack on two axis iot secure

OBJ TIGER and link up with 1-66 CAB in the

SOUTH. During the operation ENG support will be

prioritized for mobility efforts.

3. EXECUTION

Intent: The intent of this operation is to destroy or bypass ENY forces in zone iot facilitate CF regional military stability. This will be done by seizing OBJ CAT and TIGER with the Bn moving along Axis CORVETTE. End state is reached when OBJ

TIGER is secured. a. Concept of operation Annex C Ops Overlay.

b. Tasks/Mission(s) to maneuver units 1-221 Tank Coy

1. O/O attack along ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone.

2. Secure NORTHERN part of OBJ CAT.

3. Secure NORTHERN part of OBJ TIGER

1-222 Tank Coy

1. O/O attack SOUTH of ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone.

2. FIX ENY forces in OBJ CAT

2. Secure SOUTHERN part of OBJ CAT.

3. Secure SOUTHERN part of OBJ TIGER

1-223 Mech Coy

1. O/O attack along ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone.

2. Secure NORTHERN part of OBJ CAT.

3. Secure NORTHERN part of OBJ TIGER

1-224 Mech Coy4

1. O/O attack SOUTH of ROUTE CORVETTE. Destroy or bypass ARIANAN forces in zone.

2. FIX ENY forces in OBJ CAT

2. Secure SOUTHERN part of OBJ CAT.

3. Secure SOUTHERN part of OBJ TIGER

c. Tasks/Mission(s) to combat support units

Recce Plt: Route recce in force ROUTE CORVETTE

Mortar plt: Annex D fire support

Eng Coy: Annex F Engineer

d. Coordinating instructions (It may include the

following) (1) CCIR:

(2) Deception guidance (3) Specific priorities, in order of completion

(4) Time line (5) Guidance on orders and rehearsals

4. ADMINISTRATION/LOGISTICS

a. Support Concept

Annex R

b. Materiel and Services (1) Supply

(2) Maintenance (3) Transportation (4) Construction

c. Medical Evacuation and Hospitalization (1) Location of units medical facilities

(2) Evacuation route(s) d. Personnel

e. Civil-Military Cooperation (1) Control of civilian population

(2) Refugees

f. Miscellaneous

5. COMMAND AND SIGNAL

a. Command, Control, and Communications.

b. Signal

Copy No 1 of 1 copies

Issuing Headquarters: 1-22CAB HQ

Place of Issue:

Date-Time Group of Signature:

Message Reference No.

OPERATION ORDER NO 001

References: See OPORD 2010-14 (OP TROJAN HORSE) 1HBCT

Time Zone: CHARLIE

Task Organization: Annex A ORBAT

Page 12: What is C-BML?

PL Jade

PL Denver

PL Opal

PL Pearl

PL Ruby

Marsh

Route Corvette

N

S

E W

COA1: Chosen COA. Bn on

road and terrain axis. Give

mutual support. ME along

road. Requires Engineer

support. Slower but safer.

(fix)

(cover)

(main attack)

(supp. attack)

Splits objective area

into NORTH / SOUTH

Page 13: What is C-BML?

Detailing ”Execution”

Unit Phase 1 from PL DENVER to PL AUSTIN

Phase 2 from PL AUSTIN to PL PEARL Phase 3 from PL PEARL to PL RUBY

Phase 4 from PL RUBY to TIGER

1-221 Tank Sqn

Main attack along axis corvette (this indicates attack direction), control measure route corvette

Seize objective area CAT. (optional) Support by fire 1-222 and 1-224

Secure objective area CAT_NORTH

Main attack along axis corvette, control measure route_to_TIGER

Main attack along axis corvette, control measure route_to_TIGER

Seize objective area TIGER_NORTH

Secure objective area TIGER_NORTH

1-223 Mech Cpy

Main attack along axis corvette, control measure route corvette

Seize objective area CAT

Secure objective area CAT_NORTH

Main attack along axis corvette, control measure route_to_TIGER

Main attack along axis corvette, control measure route_to_TIGER

Seize objective area TIGER_NORTH

Secure objective area TIGER_NORTH

1-222 Tank Sqn

Supporting attack along axis south of corvette, control measure route_to_CAT_SOUTH

Fix enemy in objective area CAT. (optional) Attack along axis route_to_CAT_SOUTH

Secure objective area CAT_SOUTH

Follow and support along route route_to_TIGER until phase line PL_RUBY

Supporting attack from phase line PL_RUBY along route_to_TIGER_SOUTH

Seize objective area TIGER_SOUTH

Secure objective area TIGER_SOUTH

1-224 Mech Cpy

Supporting attack along axis south of corvette, control measure route_to_CAT_SOUTH

Fix enemy in objective area CAT. (optional) Attack along axis route_to_CAT_SOUTH

Secure CAT_SOUTH

Follow and support along route_to_TIGER until phase line PL_RUBY

Supporting attack from phase line PL_RUBY along route_to_TIGER_SOUTH

Seize objective area TIGER_SOUTH

Secure objective area TIGER_SOUTH

Page 14: What is C-BML?

• An order is defined as tasks, control measures

and resources and is stored into JC3IEDM

• Tasks defined graphically

• Task properties defined through dialog boxes

~ NORTnC-CJIS: 1-11 _CP

Frl~ \'lew rl<IP ntob~ 006 F1.:.norcer LOJm:;; 1ccls 1~r: J611JLO'detls:

· ~.:.t..a~ ~ ~ ~,.L.ruh• ;'- '* '·" ~o: [@E;. c • ~•!f£..t rl' •c , ; O'to·lay[xplou~:l" '1 X 1 I:Mn an:lu of Dlll:tlc

-O.(~EnUC:)r . -0 0 FII·..Jtt.o = -oo~rNet.. nwos

i· -u~-: Planlln!:Pot_D£N~. R) :- ·0 i Pli1nUnrPn~_nPA1

I )~:::; PkmJNOR_C(..!.._001) :--0 ~ Pli1nrNnR_rf"A_nnr_PHr: : -1¥1 ~ rl~niNOn_a:.L._001_rll2 ·0 ~i PlaniNOR_CCA_OOI_PH3:

i -0~ rl~nJNOn O:.L. oo~ r11.r !- -~IEJ I-'1anJNUK_Ll/,_UU~j

-0~~ PlduiNOR_O:A_OO~_pH1.· i· ·0 ~ 1-'lanJNUK_U./,_UU~_I-'H~. '· ·0 :-1 PlanrNOR_O:A_002_PH3

I )~::-" Pkani~IOR_O:.L._002_PH{ ! -~ ::i Pli1n1Rf>j"lnr#l1_1-F:F:_Il-:(1-??)

PJ ~~ PkanJRcpor:£T1_1 SI>_PTJ" 221 .O~~i PlaniRepor:~I_Et--_G-11-22)

: ·0 ~ rl~nJnepor:.sOl [f'-, rn· ·221 '_--0 ~ 1-'lanJKepor:~_l--l_l.ll~-:u ___ l

-~ ;:::; PldiiiAt:L-'UI.~_F=LPll.l-22 ' -~ ; 1-'laniKepor:tUI_U".VJl-111

Task flostility Friend Last Update 0910522 Reportir111 Or~ 1-22_CP

Task"' 11·22 Intent Text

Cooroent

OK

1=1 -[Qil-1£.1-".!.1.

c::J "6ttdJI'

Concel

O Tetach"

~ ''3lU.Ul'

¥-~ 1-n_L-1-'.1-<:~_LI-'

~- IQ1·22' ._,,

.. -::..J "!dt3:""l '

! .·!1 ")etoo:--h'

¢ c:il 2211.1 221"

ffi (21-?717 1-??1?

OJ I&J12213.12213

ffi E2J1-:.'l?1::l1-??1::l

:±1- IQil-222. "-222

$ - IZil-223. "·223

' :_ ::J ",'\tl3::"l'

.. ·:J ")tiddr'

vi 2~-

2-1-2

2-13

243

t-J1Jl30::: E0·1?.1l':<Xl oJit:23 t v;co::c Zonc_:;l';N

'~-!in

NORTaC FFI C2-gateway C21S

Hibernate Mapping in Java JAXB

!- -----m: i-~--.-~1 :- - --.--- -*- - --: :-J~

1-.~-----~-: :-----:~~---

: :~ :: :: - :: -~ ~ ~ ~ - ...:..;... ;.

-- - -=--:_ ____ -- __ : ~ ---- - ----- __ : ~ ---- -- ---- - _: :_ ______ _ ___ __ : :_ ____ ___ - - --

JCW3llbj&t!S XML

tJUI<l

SBML Se1ver

.,.. , ...

Page 15: What is C-BML?

BML-JC3IEDM mapping in NORTaC-C2IS

ACT TMPRL. ASSOC ACT ~:relative task) ?=? xml 8 ~ OrderPush PK, F Kl !!!l!i....!a.!l

PK, FK2 !!.!lLMlJlt PK act tmprl anoc 1x loame __ ----------- -----, 8 ~ OrderPush

I ~ T askerslntent

f----+ PK Jlli.il!.

cat_code---+ ------------------------i-. 8 ~ Task L__,.-L' "_r_:.d_u_r _-_-_-_-_-_-..,~ - -------- -------------------------- - - - : - 8 ~ GroundTask

~ 8 ~ TaskeeWho r----;::::::============__Q_=t------ _;.JI+--------= ~ Unit!D

I 8 ~ What I .....------ ~ WhatCode

.. cT PK lliJll

eel c:>d .. ACTIA name - · - - - - - - ·-

t ~CT RES

PK,FKI lliJll PK m..w...lJ.

cel_code=RI

~·--·" .~CT RES !ToM

PK,FKI lliJll PK,FKI ilkLilLJ!

FK2 obl_item_ld

03J ITEM (taskee)

p K lll1Lillm..lll.

::at_code=OR ,a me

I I

I

I

I

I

I

I

ACT_OBJVE

PK,FKI PK

lli..!!l. act objve jx

cat_codo=OI

ACT .OBJVE ITEM

PK,FKI lliJll PK,FKI act obJyo Jx

FK2 cat_code=NOS obj_ltem_ld

-·-·-·-l -·-·-·-OBJ _ITEM (affected who)

p K 2l1Ul.tliLil!.

cat_code=OR narre

ctl_code• ACTIA I 8 ~ Where

I r·-- ··--·····--···--·····--···--·· ~ WhereiD

! 1±1 ~ AtWhere I l 8 ~ startWhen

I i 8 ~ RelativeWhen eel _c:>de•PLAN I i ~ QJalifier actv _ ::ode• A TISPT ptndstart date - 1_--r-_-_--_-_--_-_--_--_-_--_ ~ ReferenceDu-amn ptld_start_lrne T ~ RelativeWhenReferenceTask!D start_quat_co<IE I a ret End\1/hen ptld_enc_date ' ~

~~::::::: = ~---·-·-·--~ -~--·-·-·-·-· -· ~-~ ~~~meQuaiier '--------- ~ Datelrne I 8 ~ AffectedWho

.----------------ii-------- ~ Unit!D i · 13 ~ T askControiMeasures

i [!] ControiMeasurelabel

j [!] ControiMeasurelabel

-·- ·-· ·- ·- ·- ·-·-·-·-·- ·-·- ·-·-·- -i-·- ·-·-·- ·-·- ·- [!] Task!D

j ~ OrderlssuedWhen

i ~ Order!D 06J ITEt.1 (where) l 1±1 ~ TaskerWho

P K 2lliJ.IiJn.jj. j ~ T askOrganization

cat_::oda=FE j 1±1 ~ ControiMeasures name ----·----· ·----··--·····--···--·····--···--·····--···,;

ACT _TASK

PK,FKI

.---..L._--

version•"1.0' encoding="UTF-8" standalone="yes'

Kill the enemy

1-222

ATTSPT

ROUTE_SOUTHOF _CORVETTE

STRENO

24500.000

20936ATTACK_ALONG_CORVETTE_1

AT

20091013131909.000

1·221

Bde_boundary _north Bde_boundary _south

2093BSUPATTACK_SOUTH_CORVETTE

20090916090025.000

20935NOR_COA_001

Page 16: What is C-BML?

WHO

WHAT

WHEN

WHERE

WHY

Web Service BML

Server

Page 17: What is C-BML?

Summary

• C-BML digitizes C2 information and standardizes the M&S-C2

interface

• C-BML can change the way we conduct C2 and is an enabler

for use of M&S in support of C2

• A C-BML standard is being developed by SISO

• NATO RTO activities (MSG-048/MSG-085) play an important

role in multinational testing of and experimentation with C-BML