In the modern battlespace, the ability to acquire and transmit data to support the processing, exploitation, and dissemination (PED) of information is vital to the enablement of Joint All-Domain Command and Control (JADC2). JADC2 provides a necessary evolution for the armed forces because it operationalizes all battlefield data while enabling more confident and rapid decision making by our nation’s warfighters. Our adversaries, however, are also aware of this and persistently look to engage in electronic warfare, disable forward operated assets, and/or intercept the data being transmittedfreely utilizing whatever means and data available to them with constant attempts to disable forward deployed infrastructure.
The objective of this training is to demonstrate the multiple ways in which commercial dual use technologies are leveraged to extend your communications network to all disparate nodes or leverage them as a potential rerouted pathway. This training will demonstrate infrastructure builds and communications ecosystems with the resiliency of SATCOM backhaul, edge compute and processes through secure, self-healing networks where multiple commercial technologies are utilized. By taking this training the learner will observe how this challenge is addressed and moves beyond the current set of architectures and frameworks and transcends across use cases and applications with frameworks and technology that is interoperable among various systems regardless if your mission is humanitarian assistance disaster management secure architectures or a classified mission communicating with cybersecure differentiated communication backhauls to MARS.
- An overview of the way in which your networks 5G and IoT are vulnerable
- Overview and demo of ecosystems and infrastructures available regardless of domain and data type
- Demonstration of ways in which autonomous sensing moves across these extended networks and disparate nodes in local or deployed edge environments.
Prerequisite Skills, Knowledge, and Software Requirements