The Hindu Business Line : Armed with information
Armed with information
Oren Barkai
In the civilian sector, a network failure may cause inconvenience and monetary loss in most cases. In the case of the military and defence corps, the slightest system downtime may translate into a national security threat - an intolerable reality..
Communication infrastructure that can keep the troops talking and moving is the key to victory.
On the night of November 26, 2008, ten heavily armed terrorists reached Mumbai's shores and carried out coordinated attacks in India's financial capital, leaving nearly 200 people dead, stunning the nation, and spurring the country to further spruce up its defence infrastructure.
Although India has emerged as a Civilian IT power, this power is yet to be fully exploited for national security and defence.
Defence forces today face difficulties that jeopardise military operations due to the vast amount of voice, data and video that must be transported and shared, to give troops a complete picture of any particular battle.
In the aftermath of the Mumbai terror attacks,
India has realised the importance of communication infrastructure as an integral component of military strength.
India now has the opportunity to look to other countries, facing similar challenges, for insight into improving its military infrastructure.
Every military faces the painful reality that it is cheaper, easier and faster to bring down an army's communication network than it is to fight it.
"An army that cannot talk cannot move. An army that cannot move cannot fight."
Own your networks
The Israeli Defense Forces (IDF), as well as many other leading military forces globally, have, therefore, opted to own and operate their own communication networks rather than depend on civilian operators' infrastructure.
These militaries are able to design, plan and protect their infrastructure to handle the capacity, flexibility and security key to their defence operations.
The army's communication capabilities have become crucial to a successful military agenda, which leads governments to apply a network-centric warfare (NCW) doctrine as an integral part of their military might.
The IDF went a long way in building its own cellular network (known as "Mountain Rose") and WiMax network (known as "Broad Channel").
Network-Centric Warfare
With the ability to provide real-time evaluation of the battlefield, NCW infrastructure is built to handle a rapid move from routine communication activities to wartime operations.
A case in point was the Second Lebanon War, in July 2006, when the IDF had to rapidly transport and gather troops to the country's northern border.
It became clear that
rapid and effective communication was a top priority, with two main requirements: high bandwidth and redundancy. The army's communication network had to be upgraded quickly while under constant artillery attack.
Within hours, mobile communication units - operating in exactly the same way as fixed sites - were moved to the required areas and received instant connectivity based on "point-and-click" allocations.
The use of the fixed COTS-based wireless networks was done in the same way. This capability contributed greatly to the army's field superiority throughout the 34-day conflict.
Implementing NCW
India needs to adopt NCW, but this
move will require flexibility, scalability and redundancy.
The
first priority in implementing NCW is connectivity, or bandwidth.
A robust NCW communication infrastructure must be able to support and transport the vast amounts of voice, data and video-based services to enable decision makers to gain a complete picture of the battlefield in real-time.
Second, there is redundancy. In the civilian sector, a network failure may cause inconvenience and monetary loss in most cases.
In the case of the
military and defence corps, the slightest system downtime may translate into a national security threat - an intolerable reality. The industry benchmark of "five nines" for network reliability, which is usually acceptable for non-military service providers, is not reliable enough for an organisation that demands "always up and running" systems.
Flexibility is another necessity, as the information transmitted must keep up with the rapidly changing battle realities and manoeuvring forces.
Wireless is not the only issue in this case, as Wireline flexibility is mandatory to allow the information flows to the stationary bases.
One may argue that flexibility is also important in civilian telecom scenarios. However,
no operator has ever prepared itself for a scenario in which an entire city moves from one side of the country to the other. The level of flexibility demanded in the defence sector is significantly higher.
Another important aspect is cost-effectiveness. The task of building a converged infrastructure for communication applications is not a new practice.
The first converged infrastructures were based on several distinct platforms.
The idea of building a converged infrastructure has arisen from the capital expenses fiascos of building multiple infrastructures per service and then struggling to keep them alive and working together, in order to utilise them for newer, more advanced services.
To become an advanced military power, both in terms of strength as well as technologically advanced machinery, communication and networking infrastructure (both wireline and wireless) will become a top priority.
India will have to look to telecommunications companies with vast experience in worldwide military operations to build NCW infrastructure.
These companies must be capable of developing solutions with an overall approach to building NCW architecture that guarantees the high-level of expertise necessary for the provision of optimal infrastructure.
The foundation of this architecture rests not only on telecom vendor platforms but also on third-party best-of-breed interoperable products that come together to form an ideal NCW infrastructure solution.
Only then will militaries and, indeed, countries, be able to operate at maximum efficiency to protect their citizens from attack.
The author is Director, Government and Defence Solutions, at ECI Telecom. He can be reached at
[email protected].