NATO Interoperability Standards and Profiles
NISP
Introduction
Near Term
Long Term
Profiles
Design Rules
NATO Interoperability Standards and Profiles
VOLUME V
Design Rules
AdatP-34(G)
7.0
8 March 2013
C3B Interoperability Profiles Capability Team
1. NISP Design Rules
1.1. Summary
1.2. Introduction
1.3. General
1.3.1. Target Group
1.3.2. Definitions, Abbreviations and Acronyms
1.3.3. References
1.4. Background
1.5. Design rules summary
1.5.1. Introduction to design rules
1.5.2. Benefits from using design rules
1.5.3. Consequences of using design rules
1.6. Design rules in a NATO NEC federated environment
1.6.1. Problems or opportunity description
1.6.2. Solution
1.6.2.1. Design rules in the NNEC context
1.6.2.2. General guidance for using design rules
1.6.2.3. Design rule model
1.6.2.4. Packaging of Rules (Rule Package)
1.6.3. Consequences
1.6.3.1. Standards with the use of design rules
1.6.3.2. Profiling with the use of NAF and Standards and Designrules in the NISP
1.7. Reference architecture - National design rules
1.7.1. The Swedish Design rules contributions
1.7.2. Nation x ...
2. International Military Interoperability for information exchange in the NNEC context
2.1. General
2.1.1. Unique Identity
2.1.2. Target Group
2.1.3. Definitions and abbreviations
2.2. Design Rule
2.2.1. Context
2.2.1.1. Introduction
2.2.1.2. The International Military Federation
2.2.1.3. Related design rule areas
2.2.2. Problem
2.2.3. Solution
2.2.3.1. Architecture for interoperability
2.2.3.2. Key Principles
2.2.3.3. The information aspect
2.2.3.4. The security aspect
2.2.3.5. Technology and profiles
2.2.3.6. Summary
2.2.4. Rejected solutions
2.3. Motivation
2.4. Consequences from the solutions
2.5. Examples
2.6. Meta data
2.6.1. Keywords
2.6.2. Associated design rules
A. STANAG Transformation Framework
A.1. Introduction
A.1.1. Background
A.1.2. Scope
A.1.3. Abbreviations and Definitions
A.2. Executive Summary
A.3. Recommendations
A.4. Document Information
A.4.1. Document Revision Information
A.4.2. Document Survey
A.4.2.1. Enclosures
A.4.2.2. Government Documents
A.4.2.3. References
A.5. Analysis
A.5.1. Context
A.5.2. Problem areas and opportunities
A.5.2.1. Lack of automated support for V&V of STANAG content & implementation quality
A.5.2.2. Limited resources available for STANAG configuration management (CM)
A.5.2.3. Unaddressed shortcomings of current STANAGs
A.5.3. Solution Introduction
A.5.3.1. STANAG Transformation Framework (STF) Background
A.5.3.2. Concepts
A.5.4. STF Layers and Definition
A.5.4.1. Data Bearer
A.5.4.2. Routing (Horizontal Layer)
A.5.4.3. Data Element Dictionary (Horizontal Layer)
A.5.4.4. Message Structure (Horizontal Layer)
A.5.4.5. Business Rules (Horizontal Layer)
A.5.4.6. Security Cross-Domain (Vertical Layer)
A.5.4.7. Web Services (Vertical Layer)
A.5.4.8. Operational Cross-Domain (Vertical Layer)
A.5.5. STF Design Rules & Methodology
A.5.5.1. STF Holistic Process
A.5.5.2. Data Bearer Design Rules & Methodology
A.5.5.3. Routing Design Rules & Methodology
A.5.5.4. Data Element Dictionary Layer Design Rules & Methodology
A.5.5.5. Message Structure Layer Design Rules & Methodology
A.5.5.6. Business Rules Design Rules & Methodology
A.5.5.7. Security Cross-Domain Design Rules & Methodology
A.5.5.8. Web Services Design Rules & Methodology
A.5.5.9. Operational Cross-Domain Design Rules & Methodology
A.5.6. Consequences
A.5.6.1. Efficiency
A.5.6.2. Effectiveness
A.5.6.3. Modularity
A.5.6.4. Spiral development
A.5.6.5. Benefits of the layered approach
A.5.6.6. Consequences of implementing the solution
A.5.6.7. Consequences of not implementing the solution
A.5.7. Limitations
A.5.8. Deviations
A.5.9. Examples
A.6. Relations to other products
A.6.1. Dependencies
A.6.2. Impacts
A.6.3. Interferences
A.6.4. Replacement
A.6.5. Change Request (CR)/Improvements
A.7. V&V (Verification and Validation)
A.7.1. Verification and Validation of STF
A.7.2. STF V&V Case Studies
A.7.3. V&V in the Asset Tracking COI
A.7.3.1. STF Analysis: Asset Tracking
A.7.3.2. Asset Tracking Conclusions
A.7.3.3. STF Overall V&V Conclusions: Asset Tracking
A.7.4. V&V in the Friendly Force Tracking (FFT) COI
A.7.4.1. STF Analysis: FFT Phase 1 (NFFI "D" Document)
A.7.4.2. STF Analysis: FFT Phase 2 (STANAG 5527)
A.7.4.3. STF Overall V&V Conclusions: FFT
A.7.5. V&V in the JISR COI
A.7.5.1. GMTI
A.7.5.2. Motion Imagery (MI)
A.7.6. V&V in the TDL COI
A.7.6.1. Link 16
A.7.6.2. Link 22
A.7.6.3. Link 1
A.7.6.4. VMF
A.7.7. V&V for other information exchanges and COIs
A.7.7.1. Over-the-horizon Targeting Gold
A.8. Methods
A.9. Tools
A.10. Outstanding questions
A.11. Miscellaneous
A.12. Future Plans