Top 10 Data Requirements For JADC2
Top 10 Data Requirements For JADC2
Rapid changes in the global security environment are challenging the U.S. Military’s ability
to seize, maintain and protect its information and decision advantage over potential JADC2 Data Requirements:
adversaries. These challenges require a focused U.S. Department of Defense (DoD) effort
to modernize how the Joint Force develops, implements and manages its C2 capabilities 1. DATA CENTRICITY
to prevail in all operational domains, across echelons, and with coalition mission partners.
JADC2 provides a coherent approach for shaping future Joint Force C2 capabilities and 2. NETWORK TRANSPORT-
is intended to produce the warfighting capability to sense, make sense, and act at all AGNOSTIC
levels and phases of war, across all domains, and with designated partners, to deliver a
decisive information advantage to the operational and tactical commander so they can 3. MULTI-DOMAIN SECURITY
converge joint and multi-domain effects at the speed of relevance. ARCHITECTURE
8. INTEROPERABILITY
Created to accelerate the implementation of agile, highly-responsive systems, the
JADC2 program enables the U.S. Air Force, U.S. Army and U.S. Navy to implement 9. SCALABILITY
service-specific solutions in the Advanced Battle Management System (ABMS) project,
Project Convergence and Project Overmatch, respectively, to address these network 10. NETWORK HEALTH
and interoperability needs. The implementation of these systems is now driving the TOOLS
emergence of data requirements that will guide and refine successful implementations
of JADC2.
rti.com
TOP 10 DATA REQUIREMENTS FOR JADC2
1. DATA CENTRICITY
To enable decision dominance at the speed of war, JADC2 systems must provide data to decision makers and decision-
making Artificial Intelligence (AI) and Machine Learning (ML) systems across different operational commands, from the
tactical edge to the cloud. This aligns precisely with the DoD Data Strategy announced on September 30, 2020 that directs
DoD leaders to evolve all DoD assets into data-centric assets that treat data as a weapon system. This document outlines
seven goals of this strategy — to make data Visible, Accessible, Understandable, Linked, Trustworthy, Interoperable and
Secure (VAULTIS).
Data centricity refers to a system architecture where data is the primary and permanent asset, and applications come and
go. Instead of exchanging messages, software components communicate via shared data objects that appear to be local
data. Applications directly read and write the value of these objects, which are cached in each participant.
To reap the rewards of a data-centric architecture network, architects need to:
• Establish metadata tagging criteria
• Adopt and use standardized data interfaces
• Implement common data availability and access practices
• Incorporate data security best practices
• Establish JADC2-conformant Information Technology (IT) standards
• Apply VAULTIS goals throughout the enterprise
The requirements for effective data integration must be considered from the earliest stages of data sharing and security
and applied across the warfighting domains, in order to deliver rapid collection, fusion and customization of data.
Ideal for JADC2 systems, RTI Connext® is the leading software connectivity framework for implementing data-centric
architectures in next-generation defense systems. It is built upon a peer-to-peer, data-centric architecture that delivers
critical real-time data to AI and ML at wire speed, without servers or brokers. Connext is loosely coupled with a network
discovery capability, enabling a network component “plug-n-play” capability. This allows users to dynamically insert new
capabilities into a network that can be automatically discovered by operations technology, without powering down their
systems.
The Connext architecture supports VAULTIS by design. Its application programming interfaces (APIs) drive access and
visibility across multiple hardware and operating systems platforms in a consistent, understandable format. Its Real-Time
Publish-Subscribe (RTPS) wire protocol drives rapid and consistent interoperability, while its open security capabilities
enable trusted access across multiple security domains in real time. Connext enables a clear, open standards-based
migration from network-centric systems to powerful data-centric environments, in many cases using the same network
equipment.
2. NETWORK TRANSPORT-AGNOSTIC
JADC2 networks must support all network transports, as these include a multitude of physical links such as HF, V/UHF
communications links, SATCOM, landline and/or optical fiber. Therefore, it is necessary to move data across wide-area
networks to the tactical edge across all of these possible links in the path, without loss of data integrity. In addition, the
JADC2 networks must eliminate the barriers between training and warfighting to enable a ‘train as you fight’ paradigm. The
opportunities for Blended Synthetic [training] Environments comprising multiple actors in the air, on the ground or at sea
are limitless with a properly instituted multi-domain network.
Connext works across all network transports, including UDP, TCP, InfiniBand, shared memory and more. Connext naturally
extends this connectivity to soldier training systems. This approach enables a migration from vendor-locked, server-based
legacy training environments using HLA, DIS, CIGI and TENA standards to modern open gaming systems using Unity®
and Epic Games® Unreal Engine®. Connext provides all training systems with access to live, real-time data from any field
of operations. This enables very rich platforms that allow soldiers to train as they fight and use the exact data they will
use in the fight. Connext is the ideal connectivity foundation for next-generation training systems, such as the U.S. Army
Synthetic Training Environment (STE).
2 • rti.com
TOP 10 DATA REQUIREMENTS FOR JADC2
3 • rti.com
TOP 10 DATA REQUIREMENTS FOR JADC2
8. INTEROPERABILITY
The Joint Force data fabric must consist of efficient, evolvable and broadly applicable common data standards and
architectures, with standardized key interfaces and services to access, aggregate, manage, store, process and share data
across a large environment with a wide variety of partners and for operational uses. This wide range of mission participants
demands rapid interoperability between disparate systems to bring to the fight the latest technologies and capabilities
for the warfighter. The fastest and easiest way to do this is to have an open, standards-based wire protocol, so network
applications can speak the same language.
RTI Connext supports the RTPS wire protocol, based on an open standard managed by OMG. RTPS in JADC2 systems
guarantees interoperability between applications written in different programming languages and deployed on different
systems by different defense suppliers. This enables a single, integrated, coherent JADC2 network.
9. SCALABILITY
Universal and continuous information sharing must be designed and operated at the enterprise level. JADC2 applications
and processes will depend on multiple enterprise nodes and supporting communications networks to provide global
connectivity with the bandwidth, functionality and security needed to bring vital information to the Joint Force Commander.
JADC2 systems must be able to rapidly scale to support diverse deployment designs and enable new operational units
to ‘join the fight’ with existing networks, without loss of integrity. Joining units will need the same data model knowledge
to properly interface with existing units. Note that since the network is ‘equipment-agnostic’ and adheres to MOSA and
a common data model, the joining units can seamlessly tap into the JADC2 network — simply put, it is interoperability in
action.
RTI Connext delivers peer-to-peer architecture that eliminates dependencies on network servers and brokers, and is
therefore able to provide secure data at physics speed between devices and warfighters. This has been proven in defense
deployments, including sensor-to-shooter platforms with over ten million publish-subscribe pairs.
4 • rti.com
TOP 10 DATA REQUIREMENTS FOR JADC2
SUMMARY
These ten JADC2 network capabilities — Data Centricity, Network Transport-Agnostic, Multi-Domain Security Architecture,
Zero Trust, MOSA, Open Standards, Cloud to Tactical Edge Connectivity, Design for Disconnected Operations with Data
Persistence, Interoperability, Scalability and Network Health Tools — will enable a true Mission Partner Environment that
is inclusive of all combined sensors, command and control. Optimized weapons systems across our Armed Services and
coalition partner ecosystem form the foundation of a successful, deployable and maintainable JADC2 environment.
RTI Connext, a commercial product, is already proven in defense networks and is the only technology that fulfills all of
these demanding network requirements. Its existing deployment footprint vastly reduces the cost and time of realizing a
viable and robust JADC2 environment. Connext peer-to-peer architecture eliminates servers and brokers, enabling real-
time access to data at physics speed for all operations domains worldwide, as well as decision dominance at the speed
of war. Connext is the ideal connectivity foundation for JADC2, enabling a single unified network that can operate as one.
ABOUT RTI
Real-Time Innovations (RTI) is the infrastructure software company for smart-world systems. Across industries, RTI Connext® is the leading software
framework for intelligent distributed systems. RTI runs a smarter world.
RTI is the market leader in products compliant with the Data Distribution Service (DDS™) standard. RTI is privately held and headquartered in
Silicon Valley with regional offices in Colorado, Spain, and Singapore.
RTI, Real-Time Innovations and the phrases “RTI Runs a Smarter World” and “Your systems. Working as one,” are registered trademarks or trademarks of Real-Time
Innovations, Inc. All other trademarks used in this document are the property of their respective owners. ©2024 RTI. All rights reserved. 80023 V4 0424 5 • rti.com