Skip to main content

Full text of "INCREASING FLEET DATA TRANSFER CAPABILITIES USING AN UNMANNED AERIAL VEHICLE (UAV)"

See other formats


“Calhoun 


Institutional Archive of the Naval Postgraduate School 





Calhoun: The NPS Institutional Archive 
DSpace Repository 


Theses and Dissertations 1. Thesis and Dissertation Collection, all items 


2020-12 


INCREASING FLEET DATA TRANSFER 
CAPABILITIES USING AN UNMANNED AERIAL 
VEHICLE (UAV) 


Abboud, Antoin J.; Granada, Katrina M.; Kemeny, Alex R.; 
Laboy, Edwin R.; Sanders, Wesley C.; Shadle, Jacob S. 


Monterey, CA; Naval Postgraduate School 
http://hdl.handle.net/10945/66567 


This publication is a work of the U.S. Government as defined in Title 17, United 
States Code, Section 101. Copyright protection is not available for this work in the 
United States. 


Downloaded from NPS Archive: Calhoun 


Calhoun is the Naval Postgraduate School's public access digital repository for 


; \§ D U DL EY research materials and institutional publications created by the NPS community. 
«iis : } Calhoun is named for Professor of Mathematics Guy K. Calhoun, NPS's first 


NM KNOX appointed — and published —- scholarly author, 


LIBRARY Dudley Knox Library / Naval Postgraduate School 
411 Dyer Road / 1 University Circle 


hiipe/fnwmcnpciedh Mibrary Monterey, California USA 93943 





NAVAL 
POSTGRADUATE 
SCHOOL 


MONTEREY, CALIFORNIA 


SYSTEMS ENGINEERING 
CAPSTONE REPORT 


INCREASING FLEET DATA TRANSFER CAPABILITIES 
USING AN UNMANNED AERIAL VEHICLE (UAV) 


by 


Antoin J. Abboud, Katrina M. Granada, Alex R. Kemeny, 
Edwin R. Laboy, Wesley C. Sanders, and Jacob S. Shadle 


December 2020 


Advisor: Brigitte T. Kwinn 





Approved for public release. Distribution is unlimited. 


THIS PAGE INTENTIONALLY LEFT BLANK 


Form Approved OMB 
REPORT DOCUMENTATION PAGE No. 0704-0188 


Public reporting burden for this collection of information is estimated to average | hour per response, including the time for reviewing 
instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of 
information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions 
for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson 
Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project 
(0704-0188) Washington, DC, 20503. 


1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED 
(Leave blank) December 2020 Systems Engineering Capstone Report 
4. TITLE AND SUBTITLE 5. FUNDING NUMBERS 


INCREASING FLEET DATA TRANSFER CAPABILITIES USING AN 
UNMANNED AERIAL VEHICLE (UAV) 


6. AUTHOR(S) Antoin J. Abboud, Katrina M. Granada, Alex R. Kemeny, Edwin 

R. Laboy, Wesley C. Sanders, and Jacob S. Shadle 

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING 

Naval Postgraduate School ORGANIZATION REPORT 
Monterey, CA 93943-5000 NUMBER 

9. SPONSORING / MONITORING AGENCY NAME(S) AND 10. SPONSORING / 
ADDRESS(ES) MONITORING AGENCY 
N/A REPORT NUMBER 


11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the 
official policy or position of the Department of Defense or the U.S. Government. 


12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE 
Approved for public release. Distribution is unlimited. A 
13. ABSTRACT (maximum 200 words) 


Naval Surface Warfare Center Port Hueneme Division identified the need for an improved ship-to-shore 
data transfer capability in order to meet future data demands. The demand for a better ship-to-shore data 
transfer system has been a growing concern in recent years, primarily due to the increasing complexity of 
combat system elements. These data needs, coupled with advancements in communication technology, will 
aid in providing an effective and efficient data-transfer system beyond the current limitations of bandwidth. 
One approach to enhance data transfer capability and supplement existing methods of ship data transfer is 
the use of unmanned systems as either a primary or secondary means of communication. This capstone 
delivers a concept of operations, system architecture, and modeling and simulation analysis for a conceptual 
system intended to meet the United States Navy’s need of increasing ship-to-shore data transfer capability. 
The results shown in the conceptual application of this approach yield a significant operational time 
reduction when compared to the current method of data transfer. Supported by simulation and data analysis, 
this reduction in operational time achieves positive results for both the feasibility of using an unmanned 
aerial vehicle and increasing the capability for ship-to-shore data transfer onboard Navy vessels. 


14. SUBJECT TERMS 15. NUMBER OF 
data transfer, bandwidth, communications, unmanned aerial vehicle, ships, ship to shore PAGES 
107 


16. PRICE CODE 


17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF 
CLASSIFICATION OF CLASSIFICATION OF THIS | CLASSIFICATION OF | ABSTRACT 
REPORT PAGE ABSTRACT 

Unclassified Unclassified Unclassified UU 





NSN 7540-01 -280-5500 Standard Form 298 (Rev. 2-89) 
Prescribed by ANSI Std. 239-18 


THIS PAGE INTENTIONALLY LEFT BLANK 


li 


Approved for public release. Distribution is unlimited. 


INCREASING FLEET DATA TRANSFER CAPABILITIES 
USING AN UNMANNED AERIAL VEHICLE (UAV) 


Antoin J. Abboud, Katrina M. Granada, Alex R. Kemeny, 
Edwin R. Laboy, Wesley C. Sanders, and Jacob S. Shadle 


Submitted in partial fulfillment of the 
requirements for the degree of 


MASTER OF SCIENCE IN SYSTEMS ENGINEERING 
from the 


NAVAL POSTGRADUATE SCHOOL 
December 2020 


Lead Editor: Katrina M. Granada 


Reviewed by: 
Brigitte T. Kwinn 


Accepted by: 
Ronald E. Giachetti 
Chair, Department of Systems Engineering 


ili 


THIS PAGE INTENTIONALLY LEFT BLANK 


iv 


ABSTRACT 


Naval Surface Warfare Center Port Hueneme Division identified the need for an 
improved ship-to-shore data transfer capability in order to meet future data demands. The 
demand for a better ship-to-shore data transfer system has been a growing concern in 
recent years, primarily due to the increasing complexity of combat system elements. 
These data needs, coupled with advancements in communication technology, will aid in 
providing an effective and efficient data-transfer system beyond the current limitations of 
bandwidth. One approach to enhance data transfer capability and supplement existing 
methods of ship data transfer is the use of unmanned systems as either a primary or 
secondary means of communication. This capstone delivers a concept of operations, 
system architecture, and modeling and simulation analysis for a conceptual system 
intended to meet the United States Navy’s need of increasing ship-to-shore data transfer 
capability. The results shown in the conceptual application of this approach yield a 
significant operational time reduction when compared to the current method of data 
transfer. Supported by simulation and data analysis, this reduction in operational time 
achieves positive results for both the feasibility of using an unmanned aerial vehicle and 


increasing the capability for ship-to-shore data transfer onboard Navy vessels. 


THIS PAGE INTENTIONALLY LEFT BLANK 


vi 


TABLE OF CONTENTS 


I. EN PRODUCTION spssssssiscavenssvsetvasseasvccustsvees sessuyccesesoseude soueaceseeasvossnevenensynsteveekeavecests 1 
A. PROJECT OV ER VIEW ‘assscvisscsncescccspccwstnsscestespneesasnnseeaseancobecasecaieespecenbes 1 
B. BA CKG ROUND sis cecesiicsssepeessesansaviepsvonsceseaccsabannienasdvacavavernesiauseatenciberessoatees 1 
C. PROBLEME OVER VTE W sississnscssceseacitecestueiconccconssenieus ovgaasavsentnescotsnesiasehes 2 
D. PROJECT OBJECTIVES, scccesssovssssseevciescavsosassvnesenavevasovstovecsscavscaasvenvoevnes 3 
E. TEAM STRUCTURE ics. ccscceecpudessescrescvensssnaegeceoscventedcavedoenscvoateinavgecsovedeuseds 4 
F. STA KBRHOEDERS, psscccacsassacesnsssnessunedueutieseccaneasiacthacsensaganducasoeeeeteansucsetecss 5 
G. SUIMIIVEA BY i205 s6ssccescusneidascacconvessececuseneccausuneeueacencsonaesancesanorteanovanevesvosceuseses 6 
II. FECHNICAL APPROACH yo iccsccnicseccesescesstescsoarschuveoenssedensudeceesoenscvousesscceesesadendte 7 
A. SCOPE wicacaisseicesvatcacuaceves sues vnscounsuweiosvaessasans ivassewavunsbeastssibsursbanGuicenessunesseassie 7 
B. PRO CHS -csccchistsc ch nceticcasincocuisatcpecacaneaeceateeseciganenciae dia vaceanccccconnsaveesanienecastens 9 
Cc. ASSUMPTIONS AND CONSTRAINTS ,........ccsccssscsssssssscsesscssscssssssecees 12 
1. AUSSUIMPIOIOINS cid cass cvessiicecdecncadscduianccdaduca sutsedesavdncecasevacussisbaloateneceeeues 12 
Zz, CONS CRAIG S55 escatectatiesecssoxceaiaceaneeeecas iene entree 12 
D. SSUTIVEIVEALRY <i; 55 cciseescesecisascecasecassysysasenesscauenesvagsones vaueesnsenas car iesnovanevensrscaaeans 13 
TEE. — LITERATURE: REV DEW 5 ccsiccccticedionssccacessctsccocvedsocencensevenassnavosetdssccavecsceesoendavones 15 
A. DESIGN CONSIDERA TIONG. .....csccssssssssssssssesscssessssscssecsonscssesssscssnaccons 15 
B. PERFORMANCE PARAMETER ...........ccsscsssssssscssccsscssssssecssecsseescoes 17 
Cc. UAV CHARACTERISTICS AND SPECIFICATIONS ............scceseeees 19 
D. ATUTERNA TEV ES sess scsvsskvevsncuevedexcesenvseusvsenavutvansvonsvevecessatvacostanssseuieuness 20 
i, Alternative 1: Existing Satellite Technologies................csssseeee 21 
Ds Alternative 2: UAV as a Relay...........ssccssssscsssscsscsccsssscssssssessessess 22 
3. Alternative 3: UAV Wireless Receive and Transmit................ 22 
4. Alternative 4: UAV Wireless Receive and Land.............sssseee 22 
5. Alternative 5: UAV Wireless Receive and Transmit + 
Ds ain Gh eesavecnsataseciscatessicaataninecaceseciaasndaausadvessaieiaeseecaauetasatenssaaeabasticselss 23 
E. SUUIVEIVEA RY i585 scscccesdeseeisascaceuases seca savdnecsxusuavcucasencsosawesucssancercusnavancueavusceeuses 23 
TV. SYSTEM CONCEPTUALIZATION......ccccccsssssssssssssssssssssssssosscosssssscssseccosscssess 25 
A. OPERATIONAL CONCEPT DEFINITION ............sccssscssscsscessseseeccoes 25 
1. GTM GENS oosc co 55 asec cceesscauieovns cancacccancesectcandec tons cavaceascacctesedavancavussousees 26 
Zz; Operations and Support Descriptions...............cccscccsssscssssscesees 26 
3. Operational ASSUMPTIONS............cccscccssscscssscccssccsesccsssesssseescesees 28 
B. SYS TE VE TERRA Y CEE pei cscesssesaceesxsdeoeasesoucantassaceenceeacenanseneebaaetenacaaceees 29 
1. Materiel Solutions Analysis (MSA) Phase ............csscccsssscesssscees 29 


Vii 


VI. 


F. 


2. Technology Maturation and Risk Reduction (TMRR) 
Be Engineering and Manufacturing Development (EMD) 


4. Production and Deployment (PD) Phase ..............ccscccsssscessseeees 
5. Operations and Support (O&S) Phase..............scssssccsssrcssssscesees 
NEEDS ANALYSIS os sscssdesscsutayas snsdssedscetacecusdeussousaladssansdenndseslbnocccantataasneve 
REQUIREMENTS ANALYSIS ........csssscssscssesssosssscsesssecsscssesssossesscenconses 
Customer Expectations............cscccsssssssssssssssssssssscsssssesssssessssscssees 
External CONS AUIS. o.cssccssesssersstcussvccsesecvecisdousossssscdavesssvvansobesvecse 
Operational Scemar ios .........c.ccscssssssssssssssssssssssscssssscsssssesesaseseees 
Utilization Environment .............ccsccccsssccssssccsssccssesscssssscssseseees 
System: BOUNCArICS $55 saesccvsccepsasdseonccsocensstonsevacavnconecesnacovenapsvensesevens 
System Requirements .........cccccsssscssscssssscscssssscssssscssssesssssesssscrsees 
FUNCTIONAL AINATS YSIS 408s ccsstuvassossesatessevesdiooevitsesstvesdasbebacessenscasonts 
1. Functional Flow Block Diagram (FFBD)............cccsccssssscsssseeees 
2. Functional Requirements Decomposition.............ccsccsssscssssscees 
SS UIVEN TAY: ecccsiceds vedcaddascasssecssedevsaaSosutbovsddsddicess sikcbbadedsassvsvitersddeuceausssebsviec 


Sa ae Se 


SYSTEM ARCHITECTURE  siscisseostnsscctsscssiccbsssecucsouasencetecstoresdebasdesasseuedsdasecastes 


ZORA ESO 


REQUIREMENTS DIAGRAM...........cccsssssssssssssssssscessessssssesscsscsseseossess 
HIERARCHY DIA GRA Mi ives sisistssciecsesisdsdeisecscisessciseasedascdsctsudscievtcscetestte 
PACKAGE DEAG RA Mi ciccsscredisssiscesstoseadecesecatesteiecdaceessenscdeatssaceuseuoetouts 
BLOCK DEFINITION DIAGRAM (BDD).........cscscssssssssssssssssssessessees 
USE CASE. DEAGRA MM secssessescasessscsuseccacocdeestesucssdscasde devsusedestoncesdb ea uieiiase 
AC TEV FV Y DEAG RAM occa cistie cine ccecaccecesbecs votced olitskisuscoteaeveielncacsesetededsess 
SEQUENCE DIAGRAM siivsicsssstesccivecescnscesiescssedssdavecsuaseouseanecswudacssvaveses 
SUIVEIVEAR Y ccccvcccaseshtecsecsccccnsdves cdewsceucubcce datnvavacepscvehsdsuasteceupcostscunasucspicens 


MODELING AND SIMULATION ..........c.ccccsssssssssssssssssssssscsssessscssesssssessessessess 


A. 


MODELING METHODOLOGY ..0...0.....cessccssesccscscccsecccscscsccssscseseeseoes 
if Problem Identification.................cscsscscsssscscsssecssscsscssscsssscsssseseees 
2. Model Development sicciscisiccisesisaccaseialsscauiiasenciuds saxsciasbincenalesvceuiaes 
3. IFO CED Y ANG AUION sas seh covncuwsdasuacbussis swesseudacshaxepasecacsosesbcceszesestuoeces 
4. Experimental Design and Simulation Conditions...................+ 
ALTERNATIVES ASSESSMENT ...........cccscscsecescssssssscsceecessssscsssceeee 
1. SS EALISENCS swiscisicacscaneasncaacnesenteneetisatsnseawedecebieasthcseucancsbosaeinsusnedseasssoelns 
De Multivariant Regression Modeling................sccccssssscccsssssccsseeees 
3. BACCO Nal DGS aN ocak siesca ieeseszvedcecadadecv'esscevousaiacacechvatdcbindeceavisvectiesse 
ALTERNATIVES COMPARISON ..........scssssssssssscssssssssssccesscsesssssscsene 


Vill 


D. SUIVEMEA REY sesecssssccncesusedanestavvsldcadsiisuaccpsecuseavestusdetwedssedvoudussteousensayivtansttesvuies 66 


VEE WCONCE USION ossesetstintacdhaicapahssiseastdsaiascetsinksuctendesechsdscesteavasouctesstuoceebessetesasesceeosee 67 
A. SUIVEIVIARY isesssiecdcacsdecaticbivetesiadssarscateascbsacsdoassessecesieioceevdepectebwatededderietdsies 67 
B. BEEING BS cess cass ieesovescccseaissve seentsies dics aceaiects ca uceussunducnssnicsecnsuneucddavesseupeecases 68 
C: RECOMMENDA TIONS vissssessscsncnticcsvcses cctecenecsvecestcusudeseacvecessecsedsveceosteee 70 


APPENDIX: RESEARCH NOT INCLUDED IN THE LITERATURE 


BRE VUE WW ss suceeuisotes sedi ceasuviedas das pucscelausiuas dcestudeoden eves shaq uisaudis sites atansckentaandanevsvucsdeatendses 73 
LISTPOP REBETRENCES ss csistasccsscssecteiecocccncosdscitieusscosidusscasancndeeaseacccbescacceoneuascioascecsusses 7S 
IND ETAL. DIS DRE UTION DS 0 cies ccesixestsnutetscesstescsuccaseassucsscvaseudueussicscceeetasedecaaedavsaes 81 


1X 


THIS PAGE INTENTIONALLY LEFT BLANK 


Figure 1. 
Figure 2. 


Figure 3. 


Figure 4. 


Figure 5. 


Figure 6. 


Figure 7. 


Figure 8. 


Figure 9. 


Figure 10. 


Figure 11. 


Figure 12. 
Figure 13. 
Figure 14. 
Figure 15. 
Figure 16. 
Figure 17. 
Figure 18. 
Figure 19. 


Figure 20. 


LIST OF FIGURES 


Wea RCO: SOUCTUE s..st4s.ctsassergssasiegccasdacratinst oastaistevetnsiuacenetectestangtomantets 4 
Tailored Vee Model. Adapted from INCOSE and Wiley (2015a). 0.0.0.0... 8 
Tailored Vee Model Detail. Adapted from INCOSE and Wiley 

(QO ae tiaras sata ems psn aa iea cease es mien erate ntata iach sie atateat. Pena eres o 
igh (Level WBS 2c.i0es cies ce eee ee eee aes 10 
Architecture Development Six-Step Process. Source: Office of the 

Deputy Chief Information Officer (2020)... cee eeeeeeeeeeseeeseeceteeteeeeeneees 12 
AoA Framework. Adapted from The MITRE Corporation (2013b) ......... 20 
Theoretical and Practical Data Rates via Commercial Technology. 

Bourcer Wells (QO) egos ssuhinte se tidtosmndentisienidsasconninetecnd ts briateteceasagacas 21 
DAD Opetationial View soicseci5tosasr ache sciee, Motaenictencitesd nethna tae diosedaceune pas, 
DAD High Level Activity Diagram. ...............cccceseecseeeseeceesceconeeceetteeceneeees a 
DOD Acquisition Management Model (DOD 5000.2). Source: 

PCI OLSSON) cscs acne he at Sedatcc a vedas ses ee danse a eoa sa, Slo Sane Bales 29 
Needs Analysis Phase in the System Life Cycle. Source: Kossiakoff 

(QOL esses sneesccussinsetisiy aawoa bares elereusrecananinadusnpessunahanasue aes dawenseaneedeeaaensonateale 34 
DAD System Level FFBD (ship-to-shore data transfer) «0.0.0... eee 39 
DAD System Requirements Diagram ........... ee ee eeceseceeeeeeeceeneeceeeeseeeeneees 44 
DAD System Hierarchy Diagram 00.0.0... eeeeceessececesececeeeeesseceeseeeenaeeees 45 
DAD System Mission Planning Package Diagram.............. ee eeeeeeeeeereees 46 
High Level DAD System BD Des. ic2.22 inc eee deen eee Gece: 46 
DAD Bolt-On UAV Subsystem BDD 0.0... eeceeeseceesneeeeeteeeeneeeenaeeees 47 
DAD Ground-Based Subsystem BDD......... cee eeecceeeeceeeneeeenteeeeneeeenaeeees 47 
DAD Ship-Based Subsystem BDD........ cee eee esseceseceeeeeeneeceecnseeeseeeeneees 48 


DAD System Use Case Diagram for Receive and Transmit 
PICO ALIY Cs f5 ice Si acs nds dass evcus pada omasuass ogooessesessdao cus sae ddasdecevasetnsyttmects 49 


Figure 21. 
Figure 22. 
Figure 23. 
Figure 24. 
Figure 25. 


Figure 26. 


Data Upload to UAV (Receive and Transmit Alternative)... ee 51 
ADD SEGUE Ce reign oy c2 co osascesysan aus ecadoessctdepaeesoecestassaes veseeccostteeses je 
Satellite Baseliné Model 3.42122: dcesinsdicitee nein eels dls 56 
UAY Relay Model wwissscasivsiaszevitesvearnavsnadeasaecedea sbasnaee gussctessnczeseadavsdeedwaractens 57 
UAV Wireless Receive and Transmit Model ........0..ecceeeeeeeesseeeeeeeeeeeeneees 58 
UAV Wireless Receive and Land Model... ee eeeeeeeceeseeesneceseeeeeeeeneees 59 


xii 


Table 1. 


Table 2. 


Table 3. 


Table 4. 


Table 5. 


Table 6. 


Table 7. 


Table 8. 


Table 9. 


Table 10. 


Table 11. 


Table 12. 


Table 13. 


Table 14. 


Table 15. 


Table 16. 


LIST OF TABLES 


Capstone Delt Vera e ss sac cc ie cccsida tvs scone ctehat asctseraelestua cians cctvetes tonaaeeedss 4 
Team Roles and Responsibilities 0.0.0.0... eeecesceecsececseececseececeeeeeeseeeenseeeenes 5 
Capstone Stakeholders 2:03 :ccisce accede os ockieteen a dceiece teeed el ieslaptee ee dewidage 6 
TOGIS Used sccstieveseltcopes taper sie erence eine Nee eed 11 
UAV Characteristics and Performance Specifications ............ceseeeeteeees 19 
2-Sample t-Test Results for Satellite and UAV Models’ Testability ........ 60 
Descriptive Statistics for Satellite and UAV Models’ Output Times 

PODS GB rai id cits sapceaeiiuiedetevepecseniotancmapcastiadeauupeeival ascites aiawepclilauotantees 60 
Multivariable Linear Regression Statistics for Satellite Model................. 61 
Multivariable Linear Regression Statistics for UAV Models................ 61 
Level. Valuies for Input Factors 'u.csssscceessccsavescaesueseads (eeesasaosengance cedesvadnesondease 62 
Factorial Design for Satellite and UAV Models’ Output «0.00... 63 
CC OmparisOtin LI SUtS cis25 sesc03 coc eaudidirsecseedseaats ts tagcalaaanaseetasendasaneqnands Bee 64 
Alternative Data Transfer Methods .......... cee eeseesseceseceseeeeseeceaeeneessneeeneees 65 
Percentage Improvement (Time) UAV Relay vs. Satellite Relay ............. 68 


Percentage Improvement (Time) UAV Receive and Land vs. 
PALE HIG RELA cialis es Giese oS, carne cia Au cegyssuteele. es aed aces wadvanadeauasecnecas 69 


Percentage Improvement (Time) UAV Receive and Transmit vs. 
ALC LITER CLAY ook wna ccnt ctr sascs ataticg peasy aiteaegh Gadsden sens acmcencadumudete s tees eanceasoeaniae 69 


Xlil 


THIS PAGE INTENTIONALLY LEFT BLANK 


XIV 


LIST OF ACRONYMS AND ABBREVIATIONS 


AoA analysis of alternatives 

ASK amplitude shift keying 

AUV autonomous underwater vehicle 
BDD block definition diagram 

CONOPS concept of operations 

COTS commercial-off-the-shelf 

CPU central processing unit 

CS combat system 

CSSQT combat system ships qualification trials 
CyE cyber engineering 

DAD Deployable Aerial Datalink 

DOD Department of Defense 

DOE design of experiments 

DT developmental training 

EMD engineering and manufacturing development 
EMI electromagnetic interference 

EVM earned value management 

FCE forward connection error 

FFBD functional flow block diagram 
FRPDR full-rate production decision review 
FSK frequency shift keying 

FSO free-space optical 

GB Gigabyte 

Gbps gigabits per second 

GCS ground control station 

GOTS government off the shelf 

GUI graphical user interface 

HPA high power amplifier 


XV 


IAW 
IBD 
TEEE 
INCOSE 
IOT&E 
ISEA 
Kbps 
KPP 

KU 
KVM 
LAN 
LOS 
LRIP 
LTE 
Mbps 
MBSE 
MIMO 
MOE 
MOP 
MSA 
MSSE 
NAVSEA 
NCC 
NISE 
NPS 
NRC 
NSWC PHD 
O&S 
OAM 
PD 


in accordance with 

internal block diagram 

Institute of Electrical and Electronics Engineers 
International Council on Systems Engineering 
initial operational testing and evaluation 
In-Service Engineering Agent 

kilobits per second 

key performance parameter 

Kurtz-unter 

keyboard, video, mouse 

local area network 

line of sight 

low-rate initial production 

long-term evolution 

megabits per second 

model-based systems engineering 
multiple-input multiple-output 

measure of effectiveness 

measure of performance 

materiel solutions analysis 

Master’s of Science in System Engineering 
Naval Sea Systems Command 

network collection center 

Naval Innovate Science and Engineering 
Naval Postgraduate School 

National Research Council 

Naval Surface Warfare Center Port Hueneme Division 
operations and support 

orbital-angular momentum 


production and deployment 


XVi 


PMS 
PSK 
QAM 
RF 
RMDA 
RMF 
RN 
RoCE 
RTB 
SE 

SF 
SME 
Sol 
SysML 
TMRR 
TOC 
TPM 
TPO 
T&E 
UAV 
USN 
USV 
VSU 
Wi-Fi 
WAN 
WBS 
XLUUV 


Project/Program Manager, Ship 

phase shift keying 

quadrature amplitude modulation 

radio frequency 

remote memory direct access 

risk management framework 

relay nodes 

remote memory direct access over converged ethernet 
return to base 

systems engineering 

ship’s force 

subject matter expert 

system of interest 

systems modeling language 

technology maturation and risk reduction 
total ownership cost 

technical performance measure 

Thesis Processing Office 

test and evaluation 

unmanned aerial vehicle 

United States Navy 

unmanned surface vehicle 

variable speed unmanned aerial vehicle 
wireless fidelity 

wireless area networks 

work break down structure 


extra-large unmanned underwater vehicle 


XVii 


THIS PAGE INTENTIONALLY LEFT BLANK 


XVili 


EXECUTIVE SUMMARY 


This capstone was developed in response to a need for an improved ship-to-shore 
data transfer capability in support of United States Navy (USN) test events, identified by 
the Naval Surface Warfare Center Port Hueneme Division (NSWC PHD). Specifically, 
there was a demand for a faster data transmission method to augment existing ship-to- 
shore communication networks to support USN test events. Test event analysis and 
distance support efforts necessitate tremendous amounts of data to be transferred to and 
from shore-based activities. Data transfer constraints imposed by existing 
communications systems can prohibit the possibility of timely test event data analysis and 
distance support efforts. Test events are typically conducted post ship delivery or after an 
availability period where major system upgrades are implemented. With the current goal 
of a 355-ship fleet (O’Rourke 2020) and increasing complexity of ship systems, there will 
be consistent and immediate demand for an improved data transfer capability to support 
test events for the foreseeable future. In response, the capstone team captured relevant 
information to develop the capstone problem statement: 

The demand for a better ship-to-shore (bidirectional) data transfer system 

has been of paramount concern in recent years, primarily due to the 

increasing data needs of combat system elements. These data needs 

coupled with advancements in communication technology will aid in 


providing improved decision-making support and operational capabilities 
beyond the current shipboard system limitations. 


The capstone team identified a technological opportunity to fill this capability gap 
by leveraging capabilities of existing unmanned aerial vehicle (UAV) platforms to 
facilitate a supplementary line of communication capable of fulfilling stakeholder 
requirements. Additionally, this system would have to operate in environmental 
conditions associated with USN test events, interface with operators at the ship and 
ground station, establish and maintain a bidirectional data connection as required between 
the ship and ground station, and have the capability to interface and write data to 
approved removable media. A conceptual system design was created, named Deployable 


Aerial Datalink (DAD), with the intent to show that utilizing a UAV platform can 


X1X 


achieve stakeholder objectives. This system was intended to provide increased 
availability of data from ship-to-shore. The DAD system operational concept consists of 
using removeable media provided by ship’s force to upload to an external system, which 
will then communicate with a bolt-on subsystem deployed on a UAV for data upload or 
relay. In Figure 1, a USN ship equipped with a DAD modular computer subsystem is 
utilizing the DAD system line of communication to receive or transmit data from the 
DAD modular computer subsystem via the UAV equipped with a DAD bolt-on 


subsystem. 


1.3 UAY with: Bolt-On System 


Los Angolea® ; 


© 
Long Seach 


i 
et | 


11 US NAVY SHIP with Modular Computer Sub-Syvtem 





Figure 1 - DAD Operational View 


The capstone team used a tailored Systems Engineering Vee model during system 
conceptualization, adapted from International Council on Systems Engineering 
(INCOSE) and Wiley (2015). The study produced a concept of operations, technical 
approach, set of feasible candidate solutions, system architecture, system model and 
simulation, and feasibility results. The derived conceptual system was an aggregate of 
analysis of existing communication methods and related systems paired with the 


operational objectives. An analysis of alternatives (AoA) was conducted and four 


XX 


potential solutions were identified for analysis; (1) keep using the existing satellite 
technology, (2) using a UAV as a relay, (3) using a UAV for receipt and transmission, 


and (4) using a UAV for data upload and hard drive removal. 


From the derived system requirements, a physical architecture was developed by 
applying partitioning criteria to translate requirements into system functions. System and 
subsystem functions were then further decomposed, and feasibility criteria was applied to 
develop a physical system architecture. Functions, interfaces, and system composition 
were further defined and captured in the system architecture for which the capstone team 
used the model-based systems engineering (MBSE) tool Innoslate to create the 
conceptual system. Figure 2 provides a high-level DAD system block definition diagram 


(BDD). 


= 


[" 


< beet =e a aA = 
©.1.1 Bolt-On Sup System C.1.2 Grourd-Based Modular Computer Sub-Systen C.1.3 Stip-Based Modular Computer Sub-System 








Figure 2 - DAD System BDD 


With system requirements and system architectures defined, a modeling 
methodology was determined in order to derive expected system performance. The 
modeling and simulation tool ExtendSim was used to analyze relationships between 
operational time and data rates using specific scenario conditions. Analyses supported the 
use of UAVs as a data transfer platform and revealed preferable system configurations 
and system employment methods. Preliminary findings showed promise that the 
conceptual systems utilizing UAVs have potential to deliver an increased data transfer 


capacity over existing communications systems at a lower operational cost to the USN. 


XXi 


References 


INCOSE and Wiley. 2015a. INCOSE Systems Engineering Handbook: A Guide for 
System Life Cycle Processes and Activities. New York: John Wiley & Sons. 
http://ebookcentral.proquest.com/lib/ebook-nps/detail.action?docID=4040424. 


O’Rourke, Ronald. 2020. Navy Force Structure and Shipbuilding Plans: Background and 
Issues for Congress. Washington, D.C.: Congressional Research Service. 
https://www.dau.edu/cop/test/DAU%20S ponsored%20Documents/ 
PM%20Cybersecurity %20Guidebook%20v 1 %200%20with%20publication%20n 
otice.pdf. 


XXil 


ACKNOWLEDGMENTS 


The capstone team would like to recognize their advisor, Department of Systems 
Engineering lecturer Brigitte Kwinn, for her immeasurable guidance and support 
throughout the capstone process. The capstone team would also like to thank Dr. Rama 
Gheris, Department of Systems engineering professor, for her assistance in the 
development and validation of the ExtendSim model and simulation. Although courses 
were conducted online, special thanks are extended to the Department of Systems 
Engineering professors and distance learning team for their continuous support during 


the COVID-19 pandemic. 


Additionally, the capstone team would like to acknowledge the several subject- 
matter experts and stakeholders for their time and expertise. The capstone team would 
like to extend their gratitude to their colleagues and supervisors from Naval Surface 
Warfare Center Port Hueneme Division (NSWC PHD) and Project/Program Manager, 
Ship (PMS) 500, for their flexibility and continuous support throughout the two-year 


program. 


Lastly, and most importantly, the team would like to thank their families for their 


continuous support, understanding, and encouragement throughout the capstone process. 


XXill 


THIS PAGE INTENTIONALLY LEFT BLANK 


XXIV 


I. INTRODUCTION 


A. PROJECT OVERVIEW 


This capstone report is a result of a collaboration effort formed between Naval 
Postgraduate School (NPS), Naval Surface Warfare Center Port Hueneme Division 
(NSWC PHD), and Project/Program Manager, Ship (PMS) 500, to address the issue of 
existing fleet data transfer limitations. The issue addressed in this report was presented to 


the NPS Systems Engineering (SE) 311—192S cohort capstone team by NSWC PHD. 


NSWC PHD provides the United States Navy (USN) surface fleet with 
integration, test and evaluation (T&E), life-cycle engineering, and product support for 
today’s and tomorrow’s warfare systems. NSWC PHD participates in numerous 
certifying events such as combat system ships qualification trials (CSSQT) and various 
other developmental and operational test events (Commander Naval Sea Systems 
Command 2020a). As one of the sponsors of NSWC PHD, PMS 500 “manages the 
design and construction of destroyers, amphibious ships, special mission and support 
ships, as well as a wide range of boats and craft for United States (U.S.) agencies and 


foreign military sales” (Commander Naval Sea Systems Command 2020b). 


The capstone team employed a combination of various engineering disciplines 
(aerospace, computer, mechanical, industrial, and marine engineering), experience 
supporting the Department of Defense (DOD), research, and subject matter expert (SME) 
input to develop a potential solution to address an existing data transfer capability gap to 
support USN test events. The principal goals of this capstone were to investigate the 
feasibility of utilizing unmanned aerial vehicles (UAVs) to improve ship-to-shore data 


transferring capabilities and develop a conceptual deployable datalink system. 


B. BACKGROUND 


As described in ‘A Design for Maintaining Maritime Superiority’ version 2.0 and 
the DOD modernization strategy, the global threat landscape is continually changing and 
the U.S. no longer has the competitive advantage in all areas, making it crucial to 


modernize our digital world to maintain competitiveness. To ensure advantage in all 
1 


areas (Department of Defense 2019), the focus must include the role of data in decision 
making (United States Chief of Naval Operations 2018). USN involvement in 
maintaining a competitive advantage is instrumental and as a maritime nation, the USN 
must increase naval power and warfighting capability through “improved readiness and 
reliability of systems to ensure combat mission capable ships” (Naval Sea Systems 
Command 2019). Availability of data is at the center of ensuring ships’ combat readiness 
and meeting the DOD modernization strategy, as it enables “identification needed for 
subsequent actions, lessons learned, design of improved tactics and systems” (Duren and 
Pollard 1991), along with “improved decision making support and enhanced operational 


capabilities” (Office of the Chief Information Officer 2000). 


As the In-Service Engineering Agent (ISEA) for multiple USN surface ship 
combat system elements, NSWC PHD provides distance and on-site support, training, 
troubleshooting, maintenance, and other logistics and engineering functions. Increased 
availability of data will enable NSWC PHD to more effectively perform ISEA functions 
by bypassing typical delays in receiving data and ultimately will contribute to combat 
system readiness. Typical delays include data shipment and waiting for ships to return 


from deployment. 


C. PROBLEM OVERVIEW 


USN T&E events generate immense quantities of data, due to the increasing 
complexity of modern Naval combat systems. Post-event analysis and distance support 
efforts require combat system data to be transferred from ship to ground-based activities. 
Bandwidth limitations imposed by existing methods of data transfer can affect the 
timeliness of associated analysis required for test event certification or distance support. 
These issues are central to the vision statement provided by the capstone vision owners: 

Transferring data from ship-to-shore has been and continues to be a 

challenge for the USN. Unless we come up with a dynamic solution, soon, 

we will carry this problem onto new developments/platforms. The idea 

behind this project is to develop a system capable of transferring classified 

and unclassified data from an UAV to a shore-based site. Although 


intended for UAVs, the system should also be compatible with other 
platforms with minimum to no impact to the platform’s infrastructure. 


2 


In line with NSWC PHD’s role with providing T&E and direct fleet support to 
surface ships, the intent of this project is to conceptually design a data transfer platform 
for UAV deployment to enable faster availability of data for analysis (Commander Naval 
Sea Systems Command 2020a). The concepts fundamental to design of the data transfer 
platform included being standalone and external to ships’ infrastructure. This design 
concept addressed one of the challenges identified by the National Research Council 
(NRC). According to the NRC, the U.S. continues to struggle to meet the changing needs 
of ship communications due to constraints regarding available space for communication 
suites and upgrading infrastructure to rapidly expanding needs (National Research 
Council 2000). Another important aspect of the conceptual system is the intent to provide 
a method of ship-to-shore data transfer additional to existing ships’ communication 
capabilities. As stated in the 2020 USN Information Superiority Vision, a major 
challenge the USN faces with the transfer of data from ship-to-shore is bandwidth 
limitations. The path for the data to transit is too constrained to achieve data transfer in 
time requirements(Office of the Chief Information Officer 2020). One approach to 
enhance data transmission capability is to supplement existing methods of ship-to-shore 


data transfer through use of UAVs as communication nodes. 


The capstone team developed a system concept named Deployable Aerial 
Datalink (DAD) to address the deficiencies identified by the capstone vision owners. 
Accounting for resources and schedule, the capstone team limited the project scope to 


preliminary design of the DAD system concept. 


D. PROJECT OBJECTIVES 


The primary objective of this capstone was to investigate the feasibility of 
utilizing a UAV as a communication node for ship-to-shore data transfer. A secondary 
objective for this capstone was increasing data availability to ultimately contribute to 
combat system readiness. A tertiary objective was to provide NSWC PHD and other 
DOD activities with a feasible option to supplement existing data transfer methods. The 
last objective of this capstone was to provide NPS and NSWC PHD with the deliverables 
identified in Table 1. 


Table 1. | Capstone Deliverables 








Analysis of A comparison and evaluation of alternative solutions 

Alternatives that meet desired stakeholder capabilities. 

Architecture A graphical representation that defines the structure of 
the system. 

Concept of A description of integrated system characteristics and 

Operations objectives from the stakeholder perspective. 





Literature Review 


A review of available scholarly resources related to the 
system concept. 





Requirements 





Definitions of various system functional and non- 
functional needs. 











E. TEAM STRUCTURE 


Team Rico organization was structured as shown in Figure 1. Each team member 


was designated responsible for at least one section, and each team member was expected 


to contribute to remaining sections. High level descriptions of roles and responsibilities 


for each project area are described in Table 2. 


Team Lead 





Antoin Abboud 
Katrina Granada (co-lead) 








J 


J 


J 


| 








Requirements 
Engineering 


Wesley Sanders 
Alex Kemeny 








Architecture 
Design 


Jacob Shadle 
Antoin Abboud 





Analysis of 
Alternatives 


Edwin Laboy 
Wesley Sanders 





Technical 
Editor 


Katrina Granada 
Alex Kemeny (co-editor) 





Figure 1. 


Team Rico Structure 


Table 2. Team Roles and Responsibilities 


Project Led the development of the capstone project and was the focal 
Lead point for communication with project sponsors; was 
responsible for setting expectations and direction for the team 
during the project, developed a project plan, managing 
deliverables, assign tasks to team, and provided updates on a 
regular basis to advisors; was responsible for keeping team 
members and stakeholders informed of key developments and 
any changes in the project plan; was responsible for 
mitigating any risk involved as the project progresses 
Engineering Included responsibility of gap analysis associated with 
Analyst alternative solutions; identified risks associated with each 
alternative solution 
Tech Writers/ | Included responsibility of overall project documentation and 
Editors ensured proper spelling, grammar, and formatting; tasked 
with project report management and submission to the Thesis 
Processing Office (TPO) 
System Included responsibility for the design and documentation of 
Architects system interface, key system components, and infrastructure; 
tasked with the overall design of the system and ensuring 
modeling of system meets technical and functional 











requirements 
Requirements | Included definition, documentation, and requirements 
Engineers maintainment; modeling and simulation; analysis of 


stakeholders needs and conversion to requirements into a 
standard format. 














F. STAKEHOLDERS 


A list of stakeholders and their primary areas of interest are identified in Table 3. 
The most important stakeholder identified is the Fleet, as the main goal of increasing 
availability of data is to contribute to Fleet readiness through improved ISEA support. 
Other stakeholders for this capstone include NSWC PHD, not only as the vision owners, 
but as the command that plays a vital role in supporting combat and weapon systems 
during T&E and ISEA activities; Naval Sea Systems Command (NAVSEA); and 
Program Executive Offices (PEOs) (Commander Naval Sea Systems Command 2020a). 


Table 3. Capstone Stakeholders 


Fleet Improve combat and weapon system readiness, 
increase availability of system data for 
decision making 

NSWC PHD Increase availability of combat and weapon 
system data to improve readiness, increase 
knowledge, improve ISEA support 











NAVSEA Improve fleet readiness, increase ISEA 
effectiveness and support, reduce total 
ownership cost (TOC) 

PEOs Improve fleet readiness, reduce combat 











system failure trends, reduce TOC 





G. SUMMARY 


Maintaining maritime advantage continues to drive the USN to seek new and 
improved methods of increasing naval power and warfighting capability. Increased 
availability of data from ship-to-shore contributes to warfighting capability through 
combat system readiness and enabling ISEAs to better effectively address life cycle 
issues. The purpose of this capstone was to investigate the feasibility of increasing data 


through use of UAVs as nodes between ship-to-shore data transfer. 


HW. TECHNICAL APPROACH 


The intent of the DAD system is to increase fleet data transfer capabilities using 
UAVs. In order to realize this intent, this project used the SE methodology in line with 
the concepts outlined in the International Council on Systems Engineering (INCOSE) 
handbook (INCOSE and Wiley 2015a). The same INCOSE handbook provided the 


following explanations of SE terminology: 


SE is an interdisciplinary approach and means to enable the realization of 
successful systems. It focuses on defining customer needs and required 
functionality early in the development cycle, documenting requirements, 
and then proceeding with design synthesis and system validation while 
considering the complete problem... A life cycle can be defined as the 
series of stages through which something (a system of manufactured 
product) passes... Functionality of a system is typically expressed in terms 
of the interactions of the system with its operating environment, especially 
the users...System architecture is the fundamental concepts or properties 
of a system in its environment embodied in its elements, relationships, and 
in the principles of its design and evolution... The Vee model is a 
sequential method used to visualize various key areas for SE focus, 
particularly during the concept and development stages. 


A. SCOPE 


For this capstone, the Vee model aligned best with the expected deliverables as it 
provided the framework for system conceptualization. The capstone team tailored the 
Vee model to fit the unique requirements of conceptualizing the DAD system, as seen in 
Figure 2 and Figure 3. The scope of this capstone only considered the left side of the Vee 
model and included aspects of key SE processes defined by INCOSE (2020): 


Establishing stakeholders’ success criteria and concerns, and defining 
actual or anticipated customer needs and required functionality, early in 
the development cycle, and revising them as new information is gained 
and lessons are learned...Investigating the solution space, proposing 
alternative solution and operational concepts...Architecting a solution or 
set of solutions based on the selected concept(s)... Modeling (or otherwise 
evaluating) the solution at each relevant phase of the endeavor...in order 
to establish required capability and performance; increase confidence that 
the solution will work as expected and required...Providing the SE 
knowledge and information required by all stakeholder groups to ensure 


7 


coherence of the whole endeavor — typically including a vision statement, 
operational concepts, architecture definition. 


System Development, , 
Define System Full System Operation 
Requirements, and Verification 
CONOPS 


Integration, verification, validation pper Level System 


Upper Level System Realization, 
Requirements and Verification of 


Design, AoA system 


Integration, verification, validation 


Sub-System 
Requirements, Realization, 
Component Detailed Verification of 





Figure 2. Tailored Vee Model. Adapted from INCOSE and Wiley (2015a). 


ystem Development, 

Define System integration, verification, validation 

Requirements, 
CONOPS 














Upper Level System Ted itl Me elie Me ciiler ides 
Requirements and 


Design, AoA 


System Lifecycle 
Functional Analysis 
System Modeling & Simulation 


a ea aig a a acetal na rc a ee arr 


Figure 3. Tailored Vee Model Detail. Adapted from INCOSE and Wiley 
(2015a). 


In conjunction with the tailored Vee model, the capstone team developed a work 
breakdown structure (WBS) to further detail the SE method. Figure 4 shows the high- 
level processes used to define stakeholder needs through system architecture design and 
solution recommendation. Table 4 lists the tools used to perform the SE processes 


outlined in Figure 4. 


B. PROCESS 


The first step taken to define stakeholder needs was to translate the stakeholders’ 
vision statement into the capstone problem definition and capstone objectives. This 
process required review of existing technologies in the fields of ship-to-shore 
communications, ship to UAV, UAV to shore communications, and bandwidth 
limitations. The development of the concept of operations (CONOPS) for the DAD 


system resulted from this process. 





1.0 Define 
stakeholder needs 


1.1 Research 
stakeholder needs 


1.2 Conduct needs 





2.0 Requirements 
Analysis 


2.1 Define system 
requirements 


2.2 Define functional 





3.0 System 
Architecture Design 


3.1 Develop system 
architecture with 
Innoslate 


3.2 Recommend a 
solution for 


Nnalysi f iremen F j 
analysis equirements implementation 


1.3 Develop 2.3 M&S using 
CONOPS ExtendSim 


2.4 Conduct AoA 





Figure 4. High Level WBS 


The next phase in system conceptualization was requirements analysis. During 
this phase, the capstone team identified system and operational requirements through the 
analysis of the existing technology review and decomposition of stakeholder needs. 
ExtendSim software application was utilized to create a mathematical model of the DAD 
system and simulated the effects of inputs on output performance (Law 2013). Another 
aspect of the tailored SE process during the requirements analysis phase is the analysis of 
alternatives (AoA). The AoA enabled evaluation of solutions generated to meet DAD 


system requirements and identified associated potential risks (AcqNotes 2018b). 


10 


Table 4. Tools Used 








Microsoft Word Word processor software used for document 
creation and editing. 

Microsoft Excel Spreadsheet software used for data visualization, 
analysis and calculations. 

Microsoft Project Project management software used to outline 


milestones, deliverables, budget, schedule, and 
project progress. 























Microsoft Power Point Presentation software used to present project 
briefings. 

Microsoft SharePoint Cloud service used for file sharing and storage. 

Innoslate Architecture and system modeling software tool 
used to create diagrams, drawings, and schema of 
the project. 

ExtendSim Simulation software used for modeling and 
optimization. 





The process of system architecting builds upon the derived system requirements 
to develop an architecture as a foundation to guide system design (The MITRE 
Corporation 2013). In line with DOD architecture framework 2.0, the team utilized a 
multi-step process to develop the architecture framework, as seen in Figure 5. These steps 
included determining the intended use of the architecture, determining the architecture 
scope, determining data required to support architecture development, collecting 
architecture data, conducting analysis of architecture objectives, and presenting results in 
accordance with decision-maker (or stakeholder) needs (Office of the Deputy Chief 
Information Officer 2020). Innoslate modeling software was used to create the 


architectural views that are later provided in this report. 


11 








Actomated repos tonet Porthall Anatyses + Architecture presentatorn and views 
and tuncbore Crarecterstes + Actraty Models + Capocty Analyses +Reusetie arctrvtectus data 
+ Technologie bounds + Apctdectura dela erthet + Oute Modes «Wtercperatity assessmerts = + Anatyns reports 
Tune tamels) *Levets of deta! Models Brsenets Process anetyat 
resource Units of mageure Cyparctabormt Modett Teut ochtectre it 
wu scrmose Assormed Meats regetwation acourecy, and suftcency 








Figure 5. Architecture Development Six-Step Process. Source: Office of the 
Deputy Chief Information Officer (2020). 


C. ASSUMPTIONS AND CONSTRAINTS 


The team developed the following set of assumptions and constraints applicable 


to this capstone scope: 


1, Assumptions 


The intent of the system is to supplement existing methods of data 


transfer. 


The intent of the system is to be temporarily deployed on USN surface 


vessels for CSSQTs or other test events. 
2 Constraints 


Capstone schedule has limited the scope of system development. 


12 


System concept will include use of UAV as directed by vision owners. 


Depth of system concept development is limited to keep capstone 


unclassified. 


The team did not have the ability to purchase, manufacture, prototype, 
functionally test, or verify the system outside of conceptualization and 


model-based systems engineering (MBSE) methods. 


Assumptions regarding the operation of the DAD system are listed in Chapter III, 


Section A. 


D. SUMMARY 


The scope of this capstone included SE activities found in the left side of the Vee 
model, including system development, definition of system requirements, a CONOPS, an 
alternatives analysis, and preliminary system architecture. The required tasks for the 
capstone were broken down into three main focuses; defining stakeholder needs, 
requirements analysis, and system architecture design. Assumptions and constraints 


applicable to the scope of the capstone were identified. 


13 


THIS PAGE INTENTIONALLY LEFT BLANK 


14 


Hi. LITERATURE REVIEW 


The purpose of this literature review was to research current knowledge and 
identify knowledge gaps. It includes scholarly reports, scientific journals, technological 
patents, and academic theses. The research was divided into three sections to enable 
greater understanding of the different components that are covered by the scope of the 
capstone project. These documents were analyzed with specific focus on how the 
capstone team could apply the information to the DAD system. The first section 
summarizes studies found regarding design considerations. The second section covers 
performance parameters which focused on findings of effectiveness and efficiency for 
different data transfer methods. The third section compiles a list of UAV characteristics 


and performance specifications 


A. DESIGN CONSIDERATIONS 


Creed and Glenn (2000) were able to transfer data in real-time using radio 
frequency (RF) links. In order to establish ship-to-shore data communication, each vessel 
had its own local area network (LAN) which communicated with the shore command 
center via FreeWave Spread Spectrum Data Transceiver/Ethernet bridge. During their 
effort, requirements were that it must have high speed data transfer, be able to transfer 
data over a 20-mile distance and be low cost. Based on their requirements, FreeWave 
Technologies Spectrum Wireless Data Transceivers provided capabilities required (Creed 


and Glenn 2000). 


Jawhar, Muhamed, Trabelsi and Al-Jaroodi (2016) explored the significance of 
UAV’s in wireless signal networks (WSN) for data collection as a median between relay 
nodes (RN) and distribution sinks/Network Collection Centers (NCC). Using a series of 
UAV algorithms, they developed models that compared the data collection strategies 
across multiple testing parameters, including UAV flight routes (constant speed, variable 
speed, adaptable speed) and different data links (RN to UAV, UAV to sink). Such 
parameters are important to consider for relaying data from an AEGIS platform ship via 


UAV to a land-based site. With a Variable Speed UAV (VSU), the algorithms considered 


15 


both when the UAV was in communication with the RN, and when no communication 
was taking place. Once the data connection was made between the RN nodes and the 
UAV, Jawar explained that medium range protocols- such as IEEE.802.11- have a data 
rate ranging from between | megabyte per second (Mbps) and 70 Mbps, depending on 
the height of the UAV’s flight. Jawar concluded from the various models that the data 
transfer rate was dependent on the buffer size of the RN - as the buffer size increased the 
UAV could deliver more packets to sinks, but the average delay of receiving the data also 


increased (Jawhar et al. 2016). 


Frink (2005) introduced a patent for a data retrieval system which uses a UAV to 
retrieve collected data from at least one surface data collection instrument. Frink’s 
invention can be placed in a ship and other types of marine vehicles. He stated that 
satellite data retrieval was limited by at least three constraints: uplink time allocations 
must be monitored and adjusted frequently, limited time slots available, and required 
significant amount of power from ground station to communicate effectively. One of the 
features for this invention was eliminating the need for personnel to retrieve data on-site 
by launching a UAV to the ground-based data collection instrument which had a 


transceiver attached to it (Frink 2005). 


Wells (2010) discusses the major components associated with a high data rate 
architecture. These components include a power supply, data interface, modulator, 
demodulator, transmitter, receiver, combiner, and an antenna. According to Wells, the 
most important aspect of a power supply is that it has to have a high reliability as well as 
avoid power loss. The power supply must also “be designed to tolerate poor quality input 
power with high levels of noise and/or transient spikes and avoid feeding back noise or 
interference.” Techniques to increase “robustness of the data stream” were listed and 
include forward correction error (FCE), interleaving, and encryption. Four classes of 
modulation are examined; amplitude shift keying (ASK), frequency shift keying (FSK), 
phase shift keying (PSK), and quadrature amplitude modulation (QAM). An issue often 
faced with demodulation is discussed, multipath fading, as well as a common solution, 
adaptive equalization. The importance of a power detector is to control high power 
amplifier (HPA) output and output power. A concern for unregulated power output is the 


16 


possibility of violating licensing rules and interfering with other nearby wireless services. 
A critical aspect of a receiver is to control the gain of the amplifier, otherwise the signal 
is at risk for being distorted or the demodulator could be overloaded. Wells introduced a 
combiner as a method for efficient use of hardware, through utilization of one antenna to 
perform the actions of a transmitter and receiver. Antenna types are compared for 
different uses; including highly directional reflector and aperture for long-distance 
communications, and parabolic and flat panel for high capacity systems. Wells also 
discusses methods for achieving gigabit per second data rates. These methods include 
single channel transmission, adjacent channel transmission, dual-polarization 
transmission, dual channel dual polarization, data compression, and multiple-input 


multiple-output (MIMO) transmission (Wells 2010). 


B. PERFORMANCE PARAMETERS 


Yang (2018) proposed more effective data transfer means from a ship to coastal 
area by designing three different data structures. These data structures included one for 
RF and long-term evolution (LTE) based networks, one for satellite-based networks 
(conventional method), and the last for emergency alerts. In this study, Yang states that 
“satellite-based networks cover the entire ocean, but the costs are very expensive” (Yang 


2018). 


Johansen et al. (2014), developed experiments testing a UAV as a wireless relay 
between an autonomous underwater vehicle (AUV) and a local ground control station 
(GCS). Using geometric calculations to determine optimal data upload based on antenna 
location, along with constructing an IEE802.11 Wireless fidelity (Wi-Fi) modem link 
provided five test setups with results in average data rate between 326 kilobits per second 
(Kbps) and 790 Kbps. The conclusion showed the driver behind the reduction in data 
rates was the proprietary wireless system on the AUV that provided “a relatively low 
capacity wireless data link regardless of signal strength and quality,” from the 802.11 
standards of 11 Mbps to 54 Mbps (Johansen et al. 2014). 


Li et al. (2017), considered the potential of optical communications between a 


ground transmitter and a ground receiver by using a UAV. By utilizing orbital-angular 


ey 


momentum (OAM) multiplexing, there was significant increased capacity of free-space 
data transmission to moving platforms. This free-space optical (FSO) communication 
system included the ground station as well as the OAM transmitter and receiver while the 
UAV hovered in the air. In the conducted experiments, the authors were able to measure 
a data transfer rate of up to 80 Gigabits per second (Gbps) over a short roundtrip link 
(100m) (Li et al. 2017). 


Burdakov et al. (2009), presented two algorithms that were capable of generating 
relays in order to transmit sensor information back to a ground station. For their thesis, all 
UAVs had the same range for communication. They explained that in order to minimize 
transmission degradation UAVs require line of sight communication, and, that even 
though it can be amended by increasing altitude, that will mean greater ranges (Burdakov 


et al. 2009). 


Tierney et al. (2012), compared data transfer protocols over high latency network 
paths in an effort to achieve efficient and high-performance data transfer. This study was 
focused on meeting expanding scientific data transfer needs for distributed architectures. 
Although Tierney, Kissel et al., found that typical data transfers had a 10 Gbps 
connection or had data transferred in parallel to circumvent bandwidth limitations, their 
evaluation showed the best per-stream performance was around 13 Gbps, including 40 
Gbps hosts. They recommended improvements to data transfer methods including the use 
of zero-copy systems over the typical send()/recv() and the use of remote memory direct 


access (RMDA) over converged ethernet (RoCE) (Tierney et al. 2012). 


In a UAV cellular communications study, Xiao, Xia, and Xia (2016) discussed the 
potential issues associated with utilizing a moving communication node. Some of the 
issues they identified included blockage, beamforming, and propagation loss. Significant 
signal degradation can occur when line of sight (LOS) from the ground-based station to 
the UAV is blocked by any structure, but the proposed solution to address this issue is to 
incorporate adaptive cruising algorithms. Xiao, Xia, and Xia identified thorough 
beamforming was found to be timely and costly due to a large number of directions for 
the antenna to train. A hierarchical beamforming structure was investigated and they 


recommended as a method to significantly reduce search time. Use of a directional 
18 


antenna was shown to contribute to higher powered received signals (Xiao, Xia, and Xia 


2016). 


C. UAV CHARACTERISTICS AND SPECIFICATIONS 


Table 5 compiles a variety of UAV physical characteristics and performance 


specifications. 


Table 5. UAV Characteristics and Performance Specifications 
































Proteus! 12500 1150 61000 219 313 14 78 56 
Altus 12 2130 460 65000 81 120 24 54 24 
ue 10500 1150 50000 230 300 14 66 36 
Reaper? 

Pretararape | 2250 710 25000 Bd 135 24 55 27 
hae 135 58 19500 63 100 16 16 8 
Tigersharké 610 . 14000 63 92 10 22 14 
Ricue 416 185 15100 - 126 - 17 14 
rr 18000 86 150 9 16 10 
pice 68 15000 81 130 9 14 1 
Scan Eagle! 49 ; 19500 69 92 24 10 6 

Vindicator 22/ 100 
i : witnedagt | 2500 65 200 3 9 9 



































Jackson, Peacock, and Munson (2003) 

“General Atomics ALTUS” (2019; Gibbs (2017) 

“General Atomics MQ-9 Reaper” (2020); United States Air Force (2015b) 
4“General Atomics MQ-1 Predator” (2020); United States Air Force (2015a) 
“Boeing Insitu RQ-21 Blackjack” (2020); Insitu Inc. (2017) 

®NASC (2020) 

™AAI RQ-2 Pioneer” (2020); Military (2020) 

“Griffon Aerospace” (2020) 

“A AT RQ-7 Shadow” (2020) 

10B oeing Insitu ScanEagle” (2020) 

"QinetiQ (2017) 


19 


D. ALTERNATIVES 


In order to effectively find potential solutions for increasing availability of data 
through ship-to-shore data transfer, the capstone team adopted the AoA framework in 
Figure 6 identified by The MITRE Corporation (2013b). The capstone team identified 
objectives from the stakeholder vision statement and then defined analysis criteria. The 
capstone team also utilized the knowledge gained from the literature review and SME 
feedback to identify, assess, and compare alternatives. This section of the AoA identifies 
and describes the alternatives that were analyzed using modeling and simulation. 


Additional detailed analysis is provided in Chapter VI, Section B. 


















2.0 Establish analysis 
foundation/framework 


3.0 Identify and 


1.0 Plan define alternatives 


5.0 Compare 40 Assess 


are eae alternatives alternatives 





Figure 6. AoA Framework. Adapted from The MITRE Corporation (2013b) 


The research of design constraints, performance parameters, and UAV 
characteristics and performance aided the capstone team with identification of 
alternatives and important design considerations. Information provided by Johansen et al. 
(2014); Tierney et al. (2012); Jawhar, Muhamed, Trabelsi and Al-Jaroodi (2016); and Li 
et al. (2017) was found to be outside of the scope of the capstone. Information provided 
by Creed and Glenn (2000), Yang (2018), and Frink (2005) were important design and 
performance considerations but technologies discussed did not fit the scenario in which 
the DAD conceptual system was going to be utilized. Research by Xiao, Xia, and Xia 
(2016) was helpful to understand design considerations if utilizing a LOS with a 
directional antenna. Information provided by Wells (2010) was useful to understand 
important transceiver design considerations and limitations with range and environment. 


Data rates and data transfer technologies provided by wells in Figure 7 made a significant 
20 


contribution, as microwave technology provided the best potential for a data rates and 
was used as input for modeling and simulation. The data listed in Table 5 provided 
insight into bolt-on subsystem design constraints as well as flight time limitations for data 
transfer. The ranges identified for each UAV platform also provided insight into potential 
use beyond CSSQT scenarios, permitting a data transfer technology that can support 


longer ranges. 


Fixed Microwave (6 to 40 GHz) 
and mm-wave (> 60 GHz) 


802.11n WiFi (5.8 GHz) 








802.11a/b/g WiFi (2.4/5.8 GHz) 


Theoretical 
802.162 WiMAX (to 3.5 GHz) 
[] Practically realizable 
LTE 4G (to 2.5 GHz) 























0 100 200 300 400 500 600 700 800 900 =1,000 
Data Rate (Mbps) 


Figure 7. Theoretical and Practical Data Rates via Commercial Technology. 
Source: Wells (2010) 


Based on stakeholder feedback, DOD experience, CSSQT knowledge, and UAV 
operating knowledge, the capstone team prioritized communication range and potential 
data rate as focal aspects for alternative solution development. Alternative solutions 
regarding UAV or ship system integration were not developed or analyzed as they were 
considered high risk for schedule and cost. The alternatives analyzed were chosen based 
off limited integration requirements and potential for rapid development and deployment. 
As specified in the vision statement, the alternatives developed in addition to the baseline 


data transfer method were centered around UAV utilization. 


1. Alternative 1: Existing Satellite Technologies 


This alternative will keep the conventional satellite connection as the only method 
of ship-to-shore data transfer. This method is the control and the benchmark for 


comparison. Stakeholders identified current data transfer rates range from 9 — 12 Mbps. 


21 


25 Alternative 2: UAV as a Relay 


The second alternative identified is using a UAV-deployed DAD subsystem as a 
relay. This method is constrained by technology capability because the range at which the 
UAV is required to position is equidistant between ship-to-shore. The increase in distance 
rules out many data transfer technologies due to reduced capability at further distances, as 
well as some of the UAV platforms listed in Table 5 due to limited endurance and longer 
data transfer times. Also, increased distance requires greater power for data transmission 
over longer ranges, a design consideration that may impact UAV platform selection. This 


alternative enables bidirectional ship-to-shore data transfer. 


3. Alternative 3: UAV Wireless Receive and Transmit 


The third alternative is using a UAV deployed DAD subsystem with wireless 
technology for both receiving and transmitting functionality. This method is constrained 
by UAV platform range capability, as a wireless receive and transmit subsystem would 
enable the ship to be at a further distance from shore. This method is also constrained by 
UAV platform endurance due to the increased flight time associated with uploading and 
downloading data to/from the DAD system components. The ability to have the UAV in 
closer proximity to the ship widens the data transfer technologies available for utilization. 


This alternative enables bidirectional ship-to-shore data transfer. 


4. Alternative 4: UAV Wireless Receive and Land 


The fourth alternative is using a UAV-deployed DAD subsystem to wirelessly 
receive and store data from the ship onto a removeable hard drive, then return to base 
(RTB) for personnel to retrieve the hard drive. This method is constrained mainly by the 
size of the UAV-deployed DAD subsystem, as it cannot exceed maximum UAV payload 
capacity. The benefit to selecting this alternative is the potential avoidance of limiting 
UAV platform selection to those with greater endurance, as the UAV would only be 
required to transit to ship proximity for data upload and RTB for hard drive removal. A 
second benefit to selecting this alternative is also the avoidance of a more complicated 
UAV-deployed DAD subsystem design that accounts for data transmission. This 


alternative restricts data transfer from ship-to-shore and is not bidirectional. 
2 


5. Alternative 5: UAV Wireless Receive and Transmit + Land 


A fifth alternative identified is a combination of UAV wireless receive and 
transmit technology with a removeable hard drive. This method has the same constraints 
as Alternative 3 but has the benefit of hard drive retrieval in case of emergency. This 
method allows for the time saving benefits of alternative 4 but also for the transmission 
of data to the ship to support troubleshooting efforts, or as mission dictates. This 


alternative will not be analyzed as it will be covered through alternatives 3 and 4. 


E. SUMMARY 


Through the literature review, the capstone team was able to identify different 
data transfer methods, technologies, and alternatives to ultimately increase data transfer 
capability. In addition to the current USN date transfer method, alternatives identified 
were utilization of the UAV as a relay, for wireless receipt and transmission, and for 
wireless receipt and RTB. The research conducted and alternatives identified showcased 
important information about the design constraints associated with use of a UAV as a 
platform for data transfer. This literature review provides multiple perspectives on how 


the information found can be applied to the conceptualization of the DAD system. 


23 


THIS PAGE INTENTIONALLY LEFT BLANK 


24 


IV. SYSTEM CONCEPTUALIZATION 


A. OPERATIONAL CONCEPT DEFINITION 


The capstone team developed a system concept that addressed the data transfer 
capability gap identified by the vision owners. In addition to increasing availability of 
data, the system concept was centered around modularity to avoid the complexities of 
integrating with at least two host platforms. As displayed in Figure 8, the DAD 


conceptual system is composed of: 


One ship-based modular, standalone computer system capable of having 


no direct interface with the ship’s combat system. 


One bolt on assembly unit external to the UAV, capable of having no 
direct interaction with the UAV’s systems. This bolt on unit will provide 
the capability of using the UAV as a communication node for data 


transfer. 


One ground-based modular, standalone computer system capable of using 


power provided by the ground station. 


Los Angeles” . 


; A 
i a z oon 
~~ 


bem AA 


11 US DAVY SHEP wth Mocaitiar Comparten Lath Systeme 





Figure 8. _ DAD Operational View 
20 


1. Benefits 


The operational concept of the DAD system was to transfer ship’s combat system 
data through utilization of UAVs outfitted with a bolt on deployable data transfer system, 
enable faster availability to data for SME analysis, and decrease elapsed time between 
events and decision making. The DAD system will increase ship-to-shore data transfer 


effectiveness through the following benefits: 


providing an additional method of data transfer redundant to existing 


methods 


providing an increase to battlespace awareness and an improvement to 


tactical decision making through faster availability of critical data 


fulfilling a capability gap identified by USN leadership through an 


increase in data transfer rate 


providing a system with the ability to update software and hardware at a 


faster rate and potentially lesser cost than existing shipboard systems 


2 Operations and Support Descriptions 


Operation and support of the DAD system involves participation from ship’s 
force (SF), DAD operators, UAV pilots, UAV launch and recovery team, element SMEs, 
and CSSQT team. SF will be responsible for maneuvering the ship to the best UAV link 
location and downloading the combat system data onto removeable media. The DAD 
operators will be responsible for uploading/downloading data and establishing 
communications with the bolt-on subsystem. The UAV pilots will be responsible for 
guiding the UAV to both ship-based and ground-based link locations and to the launch/ 
recovery site(s). The UAV launch and recovery team will be responsible for UAV 
preparation, launch, recovery, and any associated post flight requirements. The UAV 
launch and recovery team will also be responsible for mounting and unmounting the bolt- 


on DAD subsystem. The element SMEs will be receiving the downloaded data and will 


26 


perform analysis as required. The CSSQT team will be responsible for coordinating and 


executing the data transfer with all involved activities during at-sea events. 


1 1.2 1.3 14 15 


16 
Data 
e- Planning |) UAV Launch > Osta rerred to-—> gownoaa "UAV Recovery Data Analysis ie 
Figure 9. DAD High Level Activity Diagram 


Figure 9 shows the various phases associated with utilization of the DAD system. 
To accomplish data transfer from ship-to-shore via the DAD system, the following 


general actions have been identified: 
1. The CSSQT team, DAD SMEs, UAV teams, and SF will coordinate the 


planning and execution of using the DAD system for data transfer. 


2 Launch team will prepare UAV with the DAD bolt-on subsystem and will 
launch UAV. 


a. Ship’s technician will pull data from the combat system and will store on 


removeable media. 


4, Ship’s technician will provide the removeable media to the ship-based 
DAD operator. 
on Ship-based DAD operator will load the combat system data onto the 


modular computer subsystem. 


6. UAV will arrive at designated location; ship-based DAD operator will 
initialize communications with the DAD bolt-on subsystem and will begin 


data transfer process. 


21 


10. 


ine 


3. 


UAV will travel to a designated location near the ground station, ground- 
based DAD operator will initialize communications with the DAD bolt-on 


system and will begin data transfer process. 


Ground-based DAD operator will verify data transfer and download 


completion with ship-based DAD operator and UAV operator. 
UAV will continue mission or RTB for recovery. 


Ground-based DAD operator will upload combat system data to a 


designated server for combat system element SME access. 


Combat system element SME will analyze data and provide solutions/ 


recommendations to decision makers. 


Operational Assumptions 


To keep in line with the scope of this capstone and to simplify the operational 


process, the following assumptions were made with regards to transferring data via the 


DAD system: 


DAD system utilization will occur on a predetermined day during CSSQT 
execution, after completion of specified event(s). This will include all 


requirements relative to test range scheduling. 


The UAV that will carry the bolt-on subsystem will be identified prior to 


CSSQT execution during the course of planning phase. 


Data transfer was limited to combat system data but can be expanded to 


any data available for transfer via removeable media. 


The modular computer subsystem will utilize available shipboard 


removeable media to transfer and upload data. 


The ship will be responsible for properly handling the removeable media 


after the ship-based DAD operator has completed the data transfer. 


28 


No distinction was made between the transfer of classified and 


unclassified data. 


DAD system utilization was limited to use of one UAV, but multiple 
UAVs with bolt-on subsystems can be used as communication nodes to 


relay data from further distances. 
Data transfer will not exceed UAV loiter time. 


The ground-based DAD operator and applicable SMEs will have access to 


the same server. 


B. SYSTEM LIFE CYCLE 


DOD acquisition models subdivide the system life cycle into a set of basic steps 
that separate major decision milestones. The decisions of these milestones are based on 
the result of completed system objectives in the preceding life cycle phase, as shown in 


Figure 10. 


Disposal 





Sytems Aequistons 
Legend © = Decision Point aX = Milestone Decision C) = Major Review 


Figure 10. DOD Acquisition Management Model (DOD 5000.2). Source: 
AcqNotes (2018c). 





1. Materiel Solutions Analysis (MSA) Phase 
As identified by AcqNotes (2018d): 


The purpose of the MSA Phase is to analyze all potential material 
solutions for an identified need. This phase consists of an AoA and 
material solution activities to include measures of effectiveness, cost 
estimates, schedule, CONOPS and risk assessment. The goal of this phase 


29 


is to recommend possible solutions for further exploration in the 
Technology Maturation & Risk Reduction (TMRR) Phase. 


The MSA Phase for this capstone is divided into three stages: needs analysis, 
concept exploration, and concept definition. Given the scope of this capstone, project 
deliverables and objectives are met through the MSA activities, highlighted in Chapter 
IV, Section C through Chapter IV, Section E of this report, as well as the AoA in Chapter 
VI, Section B. 


During the MSA phase, cyber engineering (CyE) efforts focus on gaining an 
understanding of the system mission, operational environment, and the program’s risk 
management strategy. The CyE tasks for this phase include development of cyber 
functional requirements driven by assurance of mission critical functions, system 
categorization based on mission, and the initiation of security control selection. These 
functional requirements can serve as the baseline for the Cybersecurity Battle Plan, which 
includes a Cybersecurity Strategy, Program Protection Plan, Security Assessment Report 


and Security Authorization Package (Department of Defense 2015). 


a. Needs Analysis 


The capstone team conducted an extensive literature review and used stakeholder 
and SME feedback throughout the first phase of system conceptualization. As a result, 
the capstone team was able to identify existing operational deficiencies and capability 
gaps in current data transfer methods. “Without proper understanding of the user needs, 
any system runs the risk of being built to solve the wrong problems” (Fairley, Forsberg, 
and Madachy 2020). Section C, Needs Analysis, answered the questions “Is there a need 
for a new system?” and “How will this need be satisfied?.” The purpose of the needs 
analysis was to provide a description of capabilities needed in the system of interest 


(Sol). 


b. Concept Exploration 


The concept exploration phase provides an initial set of system performance 
requirements which will be measured later against a set of required capabilities and 


performance. This set of requirements are described in Section D for the DAD system 
30 


concept. Evaluation parameters were identified and deemed critical in order to evaluate 
system operational effectiveness. In order to proceed to the concept definition phase, the 
following elements needed identification: the system boundary, system functions, system 


elements, system sub-elements, and system element interactions. 


é. Concept Definition 


The goal of the concept definition phase is to identify a set of Sol functional 
specifications. Section E describes in detail the Sol’s intended usage and its capabilities. 
These sets of functional requirements described the DAD system operational intent and 
the capability that will be provided to its stakeholders. This phase delivered a set of 
architecture models created using Innoslate. For the AoA discussed in Chapter I, 
verification matrices were created and supporting details are provided with supporting 


details for each of the alternatives analyzed. 


2. Technology Maturation and Risk Reduction (TMRR) Phase 


As identified by AcqNotes (2018d), the purpose of the TMRR phase is to “reduce 
technology risks and to determine the appropriate set of technologies to be integrated into 
a future system that satisfies the needs. . . . This phase will consist of risk reduction, cost 
estimations, and programmatic activities.” The major product of the TMRR phase is 
competitive prototyping from which an applicable program office will determine at 


Milestone B which prototype will proceed as a funded, program of record. 


The continued development of the DAD system would allow government 
contractors to compete with government off the shelf (GOTS), commercial-off-the-shelf 
(COTS), or new development DAD system components. Based on the complexity and 
design requirements for the modular computers, multiple vendors could bid on any or all 


of the data transfer computer subsystems. 


During this phase, it is important to design hardware and software concepts with 
cyber capabilities in mind. In the case that the DAD system is fielded, stakeholders must 
analyze the best method to address obsolescence while accounting for both cost and 


schedule. With risk management, the system development team must consider the effects 


31 


of hardware and software obsolescence on the overarching acquisition process and cyber 


capability issues. 


= i Engineering and Manufacturing Development (EMD) Phase 


The purpose of the EMD phase is the realization of the system design. “The goal 
of the EMD phase is to complete the engineering development and proceed into 
production and development’(AcqNotes 2018d). Major activities in this phase include 
developmental testing (DT) and initial operational test and evaluation IOT&E) 
(AcqNotes 2018a). 


If the DAD system development continued to this phase, the selected prototype 
vendor(s) would be funded to further design and test through laboratory and experimental 
scenarios. DT and IOT&E at land-based test sites can showcase data transmission 
capabilities and can progress to sea-based testing when the system is demonstrated as 


mature. 


Regarding CyE efforts during this phase, the security T&E engineer must have 
security controls and requirements assessed, the cyber risk assessment updated, and the 
risk management framework (RMF) package submitted. It is critical that cyber 
capabilities maintenance procedures and manuals include system administration 
requirements, procedures for patching, virus scanning, antivirus signature updates, 


amongst others. 


4. Production and Deployment (PD) Phase 
Defined by AcqNotes (2018d), the objective of the PD phase is to: 


Achieve an operational capability that satisfies the users and mission 
needs. This phase consists of two efforts: low-rate initial production 
(LRIP) and full-rate production decision review (FRPDR). The phase will 
also include operational testing of the capability to determine its 
effectiveness. 


An operational DAD system finishes operational testing in a sea-based scenario 
with a USN vessel with full system validation, and the applicable program office will 


fully fund contractors to build and deploy DAD systems. 
32 


5. Operations and Support (O&S) Phase 


“The purpose of the O&S phase is life-cycle sustainment and disposal. The life- 
cycle sustainment activities overlap the FRPDR effort of the PD phase. The phase ends 
with the final disposal of a system” (AcqNotes 2018d). 


The sustainment efforts of the DAD system depend on a number of factors, 
including ISEA support, DAD system inventory across the U.S. fleet (potentially 
including Foreign Military Sales to allied nations), and adaptability of the system to 
upgrade across newer UAV platforms, hardware/software upgrades, and hardware/ 


software obsolescence. 


GA NEEDS ANALYSIS 


The objective of conducting a needs analysis is to identify that a valid operational 
need exists and that a new system will fulfill that need at an affordable cost with an 
acceptable level of associated risk. The needs analysis is critical in revealing why a new 
system is needed and allows for a conceptualization of a successful system to form in the 
minds of stakeholders by producing arguments that support the stated needs. The needs 
analysis should answer the following questions: (Blanchard and Fabrycky 2011) 


(1) What is required of the system in “functional” terms? 
(2) What functions must the system perform? 
(3) What are the “primary” functions? 


(4) What are the “secondary” functions? What must be accomplished to alleviate 


the stated deficiency: when must this be accomplished? 
(5) Where is it to be accomplished? 
(6) How many times or at what frequency must this be accomplished? 


As seen in Figure 11, the primary inputs of the needs analysis are operational 
deficiencies and technological opportunities. The team first derived inputs for the needs 
analysis from the provided vision statement, followed by a more in-depth exploration of 


background information, stakeholder needs, and a technical review. 


33 


Operational System Operational 
Deficiencies Effectiveness 








Technological System Capabilities 
Opportunities 


Figure 11. Needs Analysis Phase in the System Life Cycle. Source: 
Kossiakoff (2011). 


Operational deficiencies were initially identified by the stakeholder vision 
statement and were further refined by follow-on research in the background and technical 
review. The primary operational deficiency identified was the demand for a faster data 
transmission method to augment existing ship-to-shore communication networks to 
support USN test events. Test event analysis and distance support efforts necessitate 
tremendous amounts of data to be transferred to ground-based activities. Bandwidth 
constraints imposed by existing communications systems can prohibit the possibility of 


both timely test event data analysis and distance support efforts. 


The capstone team identified a technological opportunity to fill this capability gap 
by leveraging capabilities of existing UAV platforms to facilitate a new line of 
communication capable of fulfilling stakeholder requirements. The capstone team set out 
to develop a novel system to augment existing USN communication systems with one 
that can handle the steep data transfer requirements associated with USN test events. 
Additionally, this system would have to operate in environmental conditions associated 
with these events, interface with operators at the ship and ground station, establish and 
maintain a bidirectional data connection as required between the ship and ground station, 
and have the capability to interface and write data to approved removable media. Test 
events are typically conducted post ship delivery or after an availability period, where 


major system upgrades were implemented. With the current goal of a 355-ship fleet 
34 


(O’ Rourke 2020) and increasing complexity of ship systems, there will be consistent and 
immediate demand for an improved data transfer capability to support test events for the 
foreseeable future. The majority of test events occur on ranges in U.S. territorial waters. 
These ranges have an existing infrastructure and established distances between ship 


operational areas and ground stations. 


Partitioning criteria was applied to translate that information into functions and 
further allocate those functions into subsections. System and subsystem functions were 
then further decomposed, and feasibility criteria was applied to formulate the feasibility 
of the DAD concept. The derived conceptual system was an aggregate of analysis of 


predecessors and related systems and paired with operational objectives. 


D. REQUIREMENTS ANALYSIS 


Maintaining progression through the systems engineering process, the 
requirements analysis phase examines the operational perspective of the DAD system and 
states requirements in terms of project objectives. The intent of the requirements analysis 
is to restate or amplify both the system capabilities and system operational effectiveness 
associated with the overall operational objectives. The analysis performed in this section 
is derived from the definition of stakeholder needs as well as background research 


applicable to system designs regarding UAV data transfer. 


The requirements analysis can be expanded into a process of tasks to transform 
the system capability inputs into more specific functional system performance 
requirements. By utilizing the Institute of Electrical and Electronics Engineers (IEEE) 
P1220, the capstone team was able to follow the systems engineering standard for 
performing a comprehensive process in completing the Requirements Analysis (Defense 
Acquisition University 2001). The capstone team tailored the list to consider all 


necessary DAD system requirements. 


1. Customer Expectations 


The vision owners for this project understood both the project objectives in their 


entirety and the validation process for the DAD system. Throughout our collaborative 


D> 


meetings they expected our evidence to achieve its intended use in the conceptual, 


operational environment within the academic timeframe allowed. 


22 External Constraints 


The list of external constraints can be sub-categorized by Academic Compliance 


constraints and System Capability constraints. 


a. Academic Compliance 


Given the educational aspect of this hypothetical data transfer system, the 
information released for viewing and referencing purposes to the general public must 
comply with DISTRIBUTION STATEMENT A: Available for Public Use (Defense 
Technical Information Center 2012) .This restricts sharing any potential classified, 


proprietary, operational or otherwise vulnerable data and information. 


b. System Capability 


The scenarios in which the DAD system operates involves the respective 
subsystems and their components to interact with both existing ship and shore software 
and hardware systems, which can limit the interface capabilities. There are additional 
cybersecurity risks to be considered when transferring classified data between ship and 


shore subsystems. 


3. Operational Scenarios 


In order to achieve the project objectives in the allotted academic timeframe, the 
operational scope consists of a small scale, single UAV to transfer data as a 
communication node from ship-to-shore, during a CSSQT or other test events. Chapter 
VI explains a post feasibility study that allows for expansion of the operational scenario 


capabilities. 


4. Utilization Environments 


The hypothetical operational scenarios include ideal maritime environmental 


conditions to transfer data from ship-to-shore during CSSQT or other test events. These 


36 


ideal conditions include daytime, clear weather (no low-pressure systems present in the 


operational area), with steady sea-state conditions. 


op System Boundaries 


There are multiple boundary considerations for this project- operational, 
hardware, software- that define the full capabilities of the DAD system. We have greater 
interest in the hardware and software boundaries of the system, as these are best 
represented by the systems architecture framework. The framework can outline the UAV, 
ship and shore subsystem locations and their physical components, including operators 
and removable media, as well as the operating system functional data paths within the 


communication relay of the system. 


Given the conceptual design scope of this project, physical interfaces were 
considered as a suggestion based on both ergonomic principles and existing shipboard 
installation availability. The physical configuration spaces on both ship and shore may 
allow a smaller subsystem that is deployable, with modularity and a quick setup. 


6. System Requirements 

System requirements were partitioned between functional and non-functional 
requirements. The capstone team developed the following requirements for the DAD 
system after multiple feedback discussions with subject matter experts on both UAV’s 
and communication relays: 

a. Functional Requirements 

Functional requirements were further decomposed in Chapter IV, Section E. 

System shall have a human interface for the ground-based and ship-based 


subsystems. 


System shall have a user-friendly graphical user interface (GUI) for the 


ground-based and ship-based subsystems. 
System shall operate in clear weather conditions. 


af 


System shall establish and maintain a bidirectional data connection. 
System shall receive/write data via authorized removable media. 


System shall have an operational availability of xx% (threshold) or xx% 


(objective). 


Bolt-on subsystem shall be able to withstand takeoff, landing, and in-flight 


conditions 
Bolt-on subsystem shall be deployable with xx minutes. 
Bolt-on subsystem shall be uninstalled within xx minutes. 


Non-functional Requirements 


System shall transfer data at a minimum rate of xx Mbps (threshold) or xx 


Mbps (objective) 


Ship-based modular computer subsystem shall utilize 110v electrical 


outlet. 
Systems shall encrypt data at rest on portable and removeable media. 


All DAD system sub-components shall have an encryption and decryption 


capabilities. 
System shall encrypt data in transit. 


Bolt-on subsystem shall have a minimum battery life of xx hours 


(threshold) or xx hours (objective). 
Bolt-on subsystem shall be under xx pounds (Ibs) and xx cubic feet (ft). 


Bolt-on subsystem shall be battery powered. 


38 


E. FUNCTIONAL ANALYSIS 


There is an importance to analyze what the system must do before describing how 
those system capabilities are to be completed. The Functional Analysis offers a 
decomposition of the system functional requirements through several subsystems 
arranged in a hierarchical structure (Whitcomb 2000). The DAD system can be 
decomposed into its modular and bolt on subsystems’ functional flow with respect to the 


functional requirements listed in Section D. 


1. Functional Flow Block Diagram (FFBD) 


Utilizing an FFBD relates the inputs and outputs of the DAD system while 
providing insight into the flow between the different system functions (INCOSE and 
Wiley 2015b). The conceptualized scenario involves data input from either a ship-based 
or ground-based user on the respective modular computer subsystem. That data package 
is sent from one modular subsystem through a UAV’s transmitter/receiver bolt-on 
subsystem as a relay for data retrieval to the other modular subsystem. A system level 


FFBD is illustrated in Figure 12. 


Ones SSS = 
Figure 12. DAD System Level FFBD (ship-to-shore data transfer) 


Figure 12 defines the functional scope of the DAD system, showing both 
communications between the ship and shore on UAV services, and the data transfer 
interactions between the modular and bolt-on subsystems. Note that this functional 
example did not implement bi-directional flow in the same diagram, but each of the 
functional steps would proceed in the same order had the shore requested UAV services 


to send data from the shore modular subsystem to the ship modular subsystem. 


39 


2s Functional Requirements Decomposition 


a. System shall have a human machine interface for both ground-based 
and ship-based subsystem 


For any ship test event, the process of communicating data starts with SF (both 
enlisted and officers) relaying data packages to be received and interpreted by 
government ISEAs. In order for the data to be extracted, both SF and ISEA must have the 
physical capability to access the means to insert/compress the data to be sent, as well as 


extract/decompress the relayed data package. 


b. System shall have a user-friendly GUI for the ground-based and ship- 
based subsystems 


To assist with efficient use of both computer subsystems, the GUI shall have an 


application that is easy to navigate with clear and concise information. 


c. System shall operate during clear weather conditions 


This requirement is necessary for reliably conducting data transfer operations 
using the DAD system. Inclement weather conditions provide increased risk for impaired 


data transfer capability, or event cancellation altogether. 


d. System shall establish and maintain a bidirectional data connection as 
required to both ground-based and ship-based subsystems 


The UAV will have a predetermined flight plan, based on the request from the 
ship. The UAV will proceed on course until in range to establish a data connection; the 
UAV would fly in a loitering pattern about the ship to ensure a stable connection to 
upload the data package. The ship would minimize its own change of course to keep a 
consistent loitering pattern. In the event of a loss of communications or loss of global 
positioning system (GPS) signal between the UAV and the ground operators, 
programmed protocols would guide the UAV back towards the ground station until 


communication link could be reestablished. 


40 


e. System shall receive/write data via authorized removeable media 


The DAD system is conceptualized around existing shipboard spaces and overall 


physical attributes, as well as hardware/software suites within the applicable combat 


system baseline. 
f System shall have an operational availability of xx% (threshold) or xx% 
(objective) 


Operational availability is a function of reliability, maintainability, and 
supportability. The better the operational availability, the greater the capability for the 
USN. (Office of the Chief of Naval Operations 2003) 


g. Bolt-on subsystem shall be able to withstand takeoff, landing, and in- 
flight conditions 


Exposure to extreme environmental conditions requires the bolt-on subsystem to 
be tested for shock, vibration, thermal cycling, salt-water, fog, electromagnetic 


interference (EMI), and others. 


h. Bolt-on subsystem shall be deployable within xx minutes 


UAV deployment is dependent on acceptable launch conditions, potentially 
decreasing the amount of time available to install the bolt-on subsystem. In order to be 
available for use during real time decision making, the bolt-on subsystem must be able to 


be installed within a given timeframe to avoid further launch delays. 


i. Bolt-on subsystem shall be uninstalled within xx minutes 


To be able to effectively maintain data control, is it important for the system to be 


easily uninstalled in order to perform any direct download or sanitization. 


F. SUMMARY 


The capstone team expanded the idea of a data transfer system into an operational 
concept that addressed the data transfer capability cap identified by the vision owners. 
Considering the program requirements of acquiring a future DAD system, a layout of the 


system life cycle was addressed by subdividing system deliverable across the multiple 
4] 


phases of DOD Acquisition. Given the conceptual scope of this project, most of the 
capstone deliverables were shown in the MSA phase. This included a needs analysis that 
identified an existing operational need and a concept exploration that included a 
requirements analysis restating both system capabilities and system operational 
effectiveness. Finally, a concept definition showed a functional analysis that described 


how the system capabilities were to be completed. 


42 


V. SYSTEM ARCHITECTURE 


System architecture provides a foundation for design and development through 
organization of system components, their relationships to each other and to their 
environment (The MITRE Corporation 2013). System architecture communicates the 
system’s design through visual representation of functionalities, interfaces, and 
requirements to ensure desired stakeholder requirements will be met. The architecting 


process also helps to define system constraints, boundaries, and additional requirements. 


The architecture for the DAD system was developed in accordance with (IAW) 
the DOD framework shown in Figure 5 (Office of the Deputy Chief Information Officer 
2020) using the MBSE tool Innoslate. Different system diagrams were developed in order 
to showcase the DAD system and its functionalities on a broader level. Systems modeling 
language (SysML) was used to create the following diagrams: requirements diagram, 
package diagram, block definition diagram, use case, activity diagram, and a sequence 


diagram. 


A. REQUIREMENTS DIAGRAM 


Development of the DAD system architecture began with the identification of 
system requirements. The purpose of requirements diagrams is to represent relationships 
between requirements, as well as partition those requirements into functional and non- 
functional groups (SysML.org 2020b). DAD system requirements were initially 
conceptualized by stakeholder needs and were refined through research and technical 
review. Figure 13 shows a high-level requirements diagram for the DAD system. System 
functional requirements define basic system behavior and for the DAD system included 
interface, operational environment, data transfer, UAV launch, and availability 
requirements. Non-functional requirements define how the system will perform its 
behavior and for the DAD system included performance, design, and software security 
requirements (QRA Team 2019). The requirements identified in Figure 13 were 


previously discussed in Chapter IV, Section D. 


43 


a 


aureee =< Feawreredt >> 
"Sees tee | Reems | Scene” Race tn 
Requirements Security Requirements 





bolt-on sub-system shail Shall transfer data sta | Bolt-on sub-system shall 
be deployable within xx minimum rate of xx Mbps be under xx Ibs and xx 
minutes (threshold) or xx Mbps cubic ft 
Bolt-on sub-system shall <a Weaate > Ship-based modular 
be uninstalled within xx 
minutes electrical outiet 





Figure 13. DAD System Requirements Diagram 


44 


B. HIERARCHY DIAGRAM 


The purpose of a hierarchy diagram is to show the Sol with the physical context 
of its intended environment and external systems. Through visualization of physical 
relationships, a better understanding can be gained about the system interactions and 
boundaries. Figure 14 shows the upper levels of the DAD system alongside the external 
systems associated with utilization of the DAD system for data transfer. Fourth level 
subsystems were shown on select third level subsystems to simplify the hierarchy 


diagram. 


Universe 





Citi 

















Co 
Boron Modular Moduler 
Sub-5 ~F UAV eae Supply | Weather Sea State 
ie | Sub-System _ Sib Syston ws) ‘ , 
| ¥ ’ ¥ 
Cia Cit Ca 4 C123 OF 
Power Source Transmitted 
| eatery | cpu | Kv Revewer Stip 
(C24 C22 
Compal Communication 
\aeeuaeene | cSpmaaene 





Figure 14. DAD System Hierarchy Diagram 


C. PACKAGE DIAGRAM 


The purpose of a package diagram is to support the organization of complex 
system architecture through ‘decomposed by’ (solid lines) or ‘ related to’ (dashed lines) 
relationships between elements packaged with unique identifiers (SysML.org 2020a). For 
this capstone, a mission planning package diagram was created to show the elements 
associated with using the DAD system for data transfer during a CSSQT. Figure 15 also 
shows how the DAD system fits into CSSQT execution. To keep in line with the scope of 
this capstone, the DAD system is shown as an additional method of data transfer, next to 


45 


currently used methods of satellite and hand-carrying data transfer. Combined with the 
high-level physical relationships identified in the hierarchy diagram, the non-physical 
relationships identified in this package diagram helps to visually represent the activities 


and entities involved with using the DAD system to transfer data during a CSSQT. 




















Plannrg 
Mesion | CSsoT 
OO GR) 
| — 7 
osseR Progam 
<< ON > Funding Tracking Firing Everts 
TSE ee ————— Events 
Guidelines ews = cssor » 
Test Team 
Iderthcator Daa 
{ Meragement 
| : Data upload 1 Osta 
W 
Test Gojoctive js Milestones | Schedule have © uAY ree rom 
L » | 
Cenicaion | ner Satobo meet: > Elomert Cato * ia 7 
ESS = | DataTranster =~ *~~~*~ Recording b- seman + < =xe8 » 
+ ccireet oe 
Nissior Scanano Msson | Hand Carry : 
Conot Pane Data Transter ' 


Cortfication | Readiness 





Figure 15. DAD System Mission Planning Package Diagram 


D. BLOCK DEFINITION DIAGRAM (BDD) 


The purpose of a BDD is to define the features of a block as properties, 
operations, and relationships; and relationships between blocks as associations and 
dependencies (No Magic, Inc. 2020). The BDDs shown in Figures 16 through 19 breaks 
down the DAD system into its subsystems and subcomponents. Additionally, the external 
actors are shown via aggregation. Figure 16 shows the DAD system decomposed into its 
three major subcomponents: the bolt-on UAV unit, ground-based modular computer 


subsystem, and ship-based modular computer subsystem. 


ap 


[ l 


a — = Cenk = 
C.1.1 Bolt-On Sub System C.1.2 Grourd-Based Modular Computer Sub-Syster C.1.3 Stip-Based Moctar Computer Sub-System 





Figure 16. High Level DAD System BDD 
46 


Figure 17 decomposes the bolt-on UAV unit into its respective subcomponents 
including the transmitter receiver, power supply, power distribution module, network 
switch, and central processing unit (CPU). An aggregation relationship between the UAV 


and bolt-on UAV unit are shown. 


























| Cau 4 C.1.1 Bolt-On Sub-Gystem |» 6.115CPU | 

r ROSES 

| C.1.1.1 Transmitier/Reveiver = ©.1.1.4 Network Seach 
6.1.12 Power Suppl ©.:4.1.4 Romer Distioulion Modade 








Figure 17. DAD Bolt-On UAV Subsystem BDD 


Figure 18 decomposes the ground-based modular computer subsystem into its 
respective subcomponents, including the CPU, KVM (Keyboard, Video, Mouse), and 
transmitter/receiver. Aggregation relationships with the ground-based operator and 


ground station power supply are shown. 


wl 





a= thick oe «wl. a= bach ne 
C.1.2.5 Ground Shation Power Supply j—S) C12 Ground Based Modular Computer Sub Systers re | C.1.24 Geound Station Opeutor 
| ‘ + 
== == oo tae os 


C121 CPU C122KvWM C.1.23 Tranerritier Revewer 








Figure 18. DAD Ground-Based Subsystem BDD 


47 


Figure 19 decomposes the ship-based modular computer subsystem into its 
respective subcomponents, including the CPU, KVM, and transmitter/receiver. 


Aggregation relationships with the ship-based operator and shipboard power supply are 


shown. 
C.1.3.5 Shipboard Power Supply —e— C.1 3 Ship-Based Modular Computer Sub-System oo C.1.3.4 Shipboard Operater 
= | = 
ae aus =a 
C.13.1 CPU C1iA32KvM C.13.3 Trarumiter Revove 


Figure 19. DAD Ship-Based Subsystem BDD 


E. USE CASE DIAGRAM 


A use case diagram represents system transactions with external actors. System 
transactions are represented by ovals with action-oriented verbs or phrases, system 
boundaries are represented by rectangles and have unique identifiers, and actors are 
represented by stick-figures. Use case diagrams can also be used to identify top level 


requirements (SysML.org 2020d). 


Figure 20 shows the actors and transactions associated with the UAV launch and 
data upload to UAV boundaries. To simplify the diagram, top level actions were used 
within the shown system boundaries. For the UAV launch portion of the operational 
sequence, three main transactions were identified; equip UAV with bolt-on subsystem, 
prep UAV to launch, and launch UAV. The actors associated with the UAV launch 
transactions are the DAD team, launch team, and UAV pilot. For the data upload to UAV 
portion of the operational sequence, five main transactions were identified; pilot UAV, 
verify intercept location, upload data to the modular computer ship-based subsystem, 
upload data to bolt-on subsystem, download combat system (CS) data, and maintain bare 
steerage. The actors associated with this phase are the UAV pilot, DAD SME, bolt-on 


subsystem, ship-based modular computer subsystem, and ship’s force. 
48 


UAV Launch 


DAD Team 


Bot-On Sub- System 





Ship's Force 


Figure 20. DAD System Use Case Diagram for Receive and Transmit 
Alternative 


F. ACTIVITY DIAGRAM 


An activity diagram is used to describe the control flow and object flow among 
actions. An action is defined as a primitive executable behavior, control flow is defined 
as the flow of functional behaviors, and object flow is defined as data flow of object 
inputs/outputs (SysML.org 2020e). In the activity diagram in Figure 21, actions are 
represented as white boxes, input/output are represented by green rectangles, and 


decision points are represented by white diamonds. The activity diagram flows from left 


49 


to right and different actors are shown by different ‘lanes. Actors include personnel as 


well as equipment. 


Figure 21 identifies the required actions for data upload and data transmission 
from the DAD SME, ship-based modular computer subsystem, bolt-on subsystem, UAV, 
UAV pilot, and SF. The data upload phase is initiated by verification of ‘intercept’ 
location by the DAD SME and the UAV pilot, or the location where the UAV is going to 
be positioned and be in range to communicate with the DAD ship-based modular 
computer subsystem. Once the location is determined/verified, the UAV pilot will 
maneuver the UAV to that location. Independent of those actions, the DAD SME will 
upload the CS data (removeable media previously obtained from SF) and verify if upload 
was successful. If upload was not successful, the DAD SME will attempt again or request 
another removeable media from SF. After CS data upload completion to the ship-based 
modular computer subsystem and arrival of the UAV on location, the DAD SME will 
establish a connection with the bolt-on subsystem and initiate data upload. The DAD 
SME will monitor upload status and upon completion will terminate connection with the 
bolt-on subsystem. Completion status will be relayed to the UAV pilot and the UAV pilot 
can then maneuver the UAV for ground station download. Due to variability of flight 


time without using a specific UAV, fuel consumption was not shown as a resource. 


50 














Data Upload to UAV (Receive and Transmit Alternative) 


Figure 21. 


51 


G. SEQUENCE DIAGRAM 


The purpose of a sequence diagram is to display sequential system interactions/ 
behaviors as messages between actors (SysML.org 2020c). A sequence diagram is similar 
to an activity diagram in that both show interactions between entities, but a sequence 
diagram does not show input or output. Figure 22 shows the required actions for data 
download from the UAV to the ground station. Actors include the bolt-on subsystem, 
DAD SME, ground-based modular computer subsystem, UAV, and UAV pilot. The data 
download phase has similar actions to the data upload phase, with the exception of 
communications between the bolt-on subsystem and the ground-based modular computer 


subsystem. Upon completion, the UAV can RTB or continue mission. 








Figure 22. DAD Sequence Diagram 
a2 


H. SUMMARY 


System architecture serves as the organization of system elements with each 
other, as well as the environment. The visual representation provided through each 
diagram created in Innoslate assist in communication of system interfaces, relationships, 
boundaries, and constraints. The capstone team referenced the DOD architecture 
framework 2.0 multi-step process as a guide to develop DAD system architecture (2020), 
based off the requirements identified in Chapter IV, Section D, Subsection 6. Combined, 
all provided diagrams describe upper and lower level relationships between the DAD 


system and external activities. 


53 


THIS PAGE INTENTIONALLY LEFT BLANK 


54 


VI. MODELING AND SIMULATION 


A. MODELING METHODOLOGY 


The model used for this capstone was created using the modeling and simulation 
tool ExtendSim. The purpose of using ExtendSim for modeling and simulation was to (1) 
produce a model that was a representation of the intended construction of the Sol, (2) 
enable analyses to predict the effects of any changes made to the Sol, and (3) evaluate 
Sol behaviors and performance under different existing and proposed configurations 
(Maria 1997). The following steps to construct and execute the ExtendSim model was 


adapted from the Introduction to Modeling and Simulation (1997). 


1. Problem Identification 


Problem identification is discussed in Chapter I, Section C. 


2. Model Development 


The baseline model was developed with regards to real CSSQT scenarios. During 
a CSSQT on a controlled range, the ship is located within a specified number of miles 
offshore to enable communications with range safety and the test conductor. Proximity to 
shore allows for CS element data to be transferred and analyzed. The quantity of data that 


is typically transferred during any given CSSQT event was also taken into consideration. 


The baseline model represented ship’s current method for data transfer, satellite 
using Kurtz-unter (KU) band. The satellite scenario was the comparative control for 
amount of operational time required to transfer data from ship-to-shore. In the satellite 
model shown in Figure 23, the first function in the simulation was to set the file size to be 
transmitted. The second function was a human factor delay to account for establishing 
satellite connection. The data relay function was then used for calculating how long the 
data will take to transit based on data rates provided by Wells (2010) and file size for 
element data. The final function of the simulation was to tabulate the operational time 


and write it to a database for analysis, representing the data being received. 


55 





Set File Data 
Received 





Figure 23. Satellite Baseline Model 


3. Model Validation 


Model validation was provided through research of existing and validated 
systems, SME and stakeholder feedback, as well as academic modeling and simulation 
SME feedback. Another method of model validation was comparison of simulation 
model outputs utilizing various input combinations, such as different data transfer 
technologies coupled with the different event condition inputs, such as human factor 


variations. 


4. Experimental Design and Simulation Conditions 


Three different data transfer scenarios utilizing UAVs were modeled. Simulation 
conditions included variations in human factor delays, data transfer capabilities, and time 
required for the UAV to maneuver from different locations. Simulation inputs also 
included variations in file size, UAV specifications, and distances from shore. Expected 
simulation outputs were data rates and operational times. Using these specific scenarios, 
data transfer technologies can be compared to show more coverage of current COTS 


capabilities. Statistical analysis of operational time and relation to specified variables 


56 


aided in understanding the benefits and risks associated with utilizing unmanned vehicles 


to transmit data. Alternatives are compared in Section C. 


a. UAV as a relay 


For this scenario, the bolt-on subsystem was used as a communication node, 
similar to the KU band method, where the data will be wirelessly transferred through the 
subsystem to the ground station. The relay scenario represented a case where the ship is 
in such a proximity that the ship-based subsystem can communicate with the ground- 
based subsystem. As shown in Figure 24, the first function in this simulation was to set 
the file size and the second function was to set the human factor delay. The next function 
included in the simulation was the UAV transit function. This function was an added 
delay that accounted for UAV operational time, including flight speed variation. The next 
function was a data relay delay based on data rate and file size for transmission. The final 
function of the simulation was the same as the satellite version where the data is written 
to a data table and processed for analysis. This model incorporated complications for 


UAV power transmission. 


Data 
Received 








Figure 24. UAV Relay Model 


57 


b. UAV wireless receive and transmit 


For this scenario, the data was wirelessly uploaded and stored on the bolt-on 
subsystem, then wirelessly transferred to the ground station. This scenario represented a 
case where the bolt-on subsystem had the required power transmission capacity for the 
specified data sizes, as well as UAV fuel capacity that supported the required transits and 
loiters. In Figure 25, the model incorporated functionality used in the UAV relay scenario 
but also accounts for additional time required for the UAV to transit to ground station 
proximity and transfer data. This scenario had a second human factor delay to account for 
the ground station operator establishing a connection with the bolt-on subsystem when 


the UAV is in proximity. 


Deta 
Download 





Figure 25. UAV Wireless Receive and Transmit Model 


c. UAV wireless receive and land 


For the UAV wireless receive and land scenario, the data was wirelessly uploaded 
and stored on a bolt-on subsystem hard drive, then recovered by ground station personnel 
after UAV RTB. This scenario represented cases where the power required for data 
transmission cannot be achieved due to system design constraints or where it is 
unfeasible for the UAV to transit back to ground station proximity for wireless data 


transfer. As shown in Figure 26, this scenario had model behavior similar to the UAV 


58 


wireless scenario, without the added time for data download and with the second human 


factor delay accounting for hard drive retrieval. 





Figure 26. UAV Wireless Receive and Land Model 


B. ALTERNATIVES ASSESSMENT 


This section continues the AoA that is described in the Chapter I. The capstone 
team analyzed the related ExtendSim models’ output data to determine overall UAV 
effectiveness as a replacement or as an augmentation to the existing methods of data 
transfer. For that reason, the focus was on operational time required to send and receive a 
file to compare the alternatives. The assessment consisted of an analysis of variance of 
means between different sets of output runs to determine model repeatability, descriptive 
statistics of the output relay times for the four models, and the regression analysis and 


factorial design of input factors to determine influence on the relay times themselves. 


1. Statistics 


The breakdown of analysis began with testability of the models. Using the data 
collection and analysis tool, Minitab, 2-sample t-tests were used to compare two separate 
100 output runs for each model against each other, to determine if the null hypothesis 
(sample mean | = sample mean 2) could or could not be rejected. Table 6 details the t-test 
metrics, including the p-values for each model. With an alpha value of 0.05, the p-values 

59 


show to be substantially greater, and the null hypothesis of equal means for multiple 100 
output runs of the same model cannot be rejected. While the modeling methodology 
highlights relay scenarios for 15GB, 100GB and 1000GB file sizes, the respective 
comparisons for 15GB file sizes is an appropriate analysis baseline to compare the UAV 


effectiveness to the current Satellite data transfer capabilities. 


Table 6. 2-Sample t-Test Results for Satellite and UAV Models’ Testability 





























Satellite (hrs) 0.47 180 0.64 No 

UAV Relay (hrs) 0.21 197 0.84 No 

UAV Receive and Land (hrs) 0.38 197 0.70 No 
UAV Receive and Transmit (hrs) 0.38 197 0.70 No 





The average time (in hours), along with the standard deviation and range of 100 
run time outputs for each model are shown in Table 7. These outputs consider a normal 
distribution of random inputs for each of the respective input factors. A clear observation 
would show that the satellite model takes well over three hours to completely send a 
package size of 1ISGB, while each of the UAV models show significant decreases in time 
required for data transfer. The UAV wireless receive and land and the UAV wireless 
receive and transmit models show similar outputs because the UAV loiter time provides 


the main action difference in the two models, providing little difference in variation. 


Table 7. Descriptive Statistics for Satellite and UAV Models’ Output Times 











for 15GB 
Satellite (hrs) 3.66 0.44 2.96 5.47 
UAV Relay (hrs) 0.52 0.15 0.29 0.79 
UAV Receive and Land (hrs) 1.28 0.30 0.80 1.88 
UAV Receive and Transmit (hrs) 1.32 0.30 0.83 1.92 























60 


2. Multivariant Regression Modeling 


In order to analysis the significance in outputs, it was important to examine the 
decomposition of the models themselves. With the existing method simulated in the 
satellite model. All input factors- the file size, human factor delay, and data transfer rate- 
were compared against the output of satellite data relay time. For the UAV related 
models, the inputs all remain the same- the fixed transit distance of the UAV between 
ground station and ship, the human factor delay, the UAV flight speed, the file size and 
the UAV data rate- which are compared to three different outputs for the three UAV 
models- UAV relay, UAV grab and land, and UAV grab and beam. 


Regression modeling determines the strength of relationship between the input 
factors and the output they are compared to. This helps determine if there is a level of 
predictability with all factors when the values are manipulated. Table 8 and Table 9 show 
the multivariable linear regression statistics tables for the satellite and UAV models, 
respectively, to highlight the regression values with the 100 model run observations. As 
the randomized inputs have shown, there proves to be no relationship to the output times 


themselves. Further analysis needed to be completed to examine the influence of each 























input. 
Table 8. Multivariable Linear Regression Statistics for Satellite Model 
Multiple R 0.12 
R Square 0.01 
Standard Error 0.15 
Observations 100 
Table 9. Multivariable Linear Regression Statistics for UAV Models 














Multiple R 0.0967 0.0978 0.0980 

R Squared 0.0094 0.0096 0.0096 
Standard Error | 0.1509 0.3086 0.3085 
Observations 100 100 100 

















3. Factorial Design 


The significance of input factors to a model can be dependent of the number of 
inputs present for the model itself. The fewer factors that contribute to the model, the 
more significance they hold in relation to the output’s value. Because the satellite model 
has two controllable, non-fixed factors and the UAV models have three controllable, non- 
fixed factors (file size is a fixed input), then a creation of factorial design of experiments 
(DOE) without the requirement of a screening for influential factors is needed. The 
Factorial DOE created looks at two factors at two levels for the satellite model, and three 
levels at two levels for the UAV models. Based on previous data collected through 


research and SME discussion, the two levels “High” and “Low” are shown in Table 10. 


Table 10. Level Values for Input Factors 


High 45 150 12 860 
Low 15 80 6 800 


























The factorial design highlights the influence of each input with a high and low 
value with the other respective inputs in a randomized pattern. These sequences of 100 
run samples are compared against each model, and against the default randomization of 


the four developed models. 


62 


Table 11. Factorial Design for Satellite and UAV Models’ Output 


HF LOW, UAV Speed 
RAN, UAV Data RAN 
HF HIGH, UAV Speed 
RAN, UAV Data RAN 
HF RAN, UAV Speed 
LOW, UAV Data RAN 
HF RAN, UAV Speed 
HIGH, UAV Data RAN 
HF RAN, UAV Speed 
RAN, UAV Data LOW 
HF RAN, UAV Speed 
RAN, UAV Data HIGH 

ALL UAV RANDOM 5 

(Normal) 
HF LOW, SAT Data RAN x 
HF HIGH, SAT Data x 
RAN 

HF RAN, SAT Data LOW xX 

x 

x 


0.29 0.81 0.85 





0.79 1.81 1.85 





0.54 1.42 1.46 


0.54 1,23 1.27 


x |x| mK | x | OK 


0.52 1.26 Lat 


0.35 1.28 1.32 x 


4.20 
4.66 
6.06 
3.30 











HF RAN, SAT Data 
HIGH 
ALL SAT RANDOM 
(Normal) 

















~ | Kx TX] OM LR] 
~ | Kx TX] OM [PR] 


4.45 











Across the satellite model sequences, the data rate levels show the largest 
difference in output mean to the default mean- with a respective min and max of 3.29 and 
6.06 hours against the default average of 4.45 hours. With the UAV model sequences, the 
human factor levels show the largest difference in output means to the default mean. 


Table 11 highlights the entirety of discussed values. 


Because of the large difference in data transfer rate, it is clear that as the required 
data transfer time decreases, the influence of the human factor delay increases. A 30- 
minute human factor delay will provide a larger variance from the output relay time mean 


on the quicker UAV model than the conventional, slower satellite model. 


63 


C. ALTERNATIVES COMPARISON 

In addition to statistical analysis, a comparison was performed between 
operational time and engineering complexity for each alternative solution at file sizes 15, 
100, and 1000 Gigabytes (GB). The inputs listed in Table 12 resulted in the outputs found 
in Table 13 by utilization of a function that included UAV transit time (UAV alternatives 


only) and data transfer time. 


Table 12. Comparison Inputs 























Distance from Shore (mi) 30 
UAV Speed (mph) 80-140 
File Size (GB) 15, 100, 1000 
Satellite Data Rate Variation (Mbps) 6-12 
UAV Data Rate Variation (Mbps) 800-860 
Human Factor Delay Variation (min) 5-15 








Table 13 shows a weighted comparison of all the alternative scenarios that were 
simulated. The operational time shows the averages of 100 runs in the simulations for 
each category of file size. The fastest method correlates to the smallest number of hours. 
Each scenario was also rated in terms of design complexity low, medium, or high. The 
best combination of these two parameters describe the best way to apply the use of a 


UAV for data transfer. 


64 


Satellite 


UAV Relay 


Table 13. Alternative Data Transfer Methods 


Deployed on current USN 


Power to transmit needs attention 
as well as hardware increase for 
dealing with longer distances to 

track the UAV. 





UAV Receive 
and Land 


Power to receive is a lot less than 

to transmit and landing the UAV 

saves time when getting the data 
to be analyzed. 





UAV Receive 
and Transmit 


Satellite 


UAV Relay 


Medium 


Power to transmit needs attention 
as well as requirements for the 
UAV platform like loiter time and 


Starts to put pressure on event 
schedules and mission capability if 
requirements have a time window. 
Power to transmit needs attention 

as well as hardware increase for 
dealing with longer distances to 
track the UAV. 





UAV Receive 
and Land 


Power to receive is a lot less than 

to transmit and landing the UAV 

saves time when getting the data 
to be analyzed. 





UAV Receive 
and Transmit 


Satellite 


Power to transmit needs attention 
as well as requirements for the 
UAV platform like loiter time and 


Puts massive strain on scheduling 
and takes too long for Navy 
mission. 





UAV Relay 


Power to transmit needs attention 
as well as hardware increase for 
dealing with longer distances to 

track the UAV and flight time 
starts to become a factor. 





UAV Receive 
and Land 


UAV Receive 
and Transmit 














Power to receive is a lot less than 

to transmit and landing the UAV 

saves time when getting the data 
to be analyzed. 

Power to transmit needs attention 
as well as requirements for the 
UAV platform like loiter time and 
range. 





‘0 - 2.0 hours is considered favorable for operational time and is highlighted as green. 2.0 - 5.0 
hours is considered less favorable for operational time and is highlighted as yellow. 5.0+ hours 
are considered least favorable for operational time and is highlighted as red. 


Engineering complexity was categorized into three levels: low, medium, and high. 


65 


D. SUMMARY 


This chapter detailed the approach taken to simulate alternative solutions in order 
to calculate the time it takes to transfer data from ship-to-shore. The capstone team 
developed four different models representing the alternatives discussed in Chapter HI. 
From the operational simulations, the capstone team performed statistical analysis for 
alternative comparison. The data presented variations of mean output time and concluded 
that regardless of delay time, the UAV operational time outputs showed significant 


improvements over the traditional satellite model. 


66 


Vil. CONCLUSION 


A. SUMMARY 


The primary objective of this project was to conduct a feasibility study to 
understand if a UAV can be used to improve the data transfer capability for the USN. 
From the literature review and knowledge gained from SMEs, the capstone team 
determined use of a UAV in ship-to-shore data transfer could provide benefit to the USN. 
The capstone team used defined initial system requirements, available research of 
communications systems, and available UAV characteristics to develop system 
architecture with the MBSE tool Innoslate. The utilization of MBSE tools supported the 
understanding and the ability to communicate interactions and functions of the DAD 


system within itself, external users, and the environment. 


The team identified several alternatives in which a UAV platform could be used 
as part of a system to supplement existing USN communication systems for data transfer. 
One alternative considered was to use wireless communications to get the data from the 
ship to a UAV bolt-on subsystem, then have the UAV transit to ground station proximity 
for wireless transmission of the data to a ground-based subsystem. In order to do this, it is 
required that the bolt-on subsystem have sufficient power to transmit the data the 
required distance, as well as the UAV have an endurance that supports the entire mission. 
The design constraint and platform constraint will have to be considered if the DAD 
system progresses through the acquisition life cycle. A second alternative considered was 
to utilize a UAV bolt-on subsystem to wirelessly receive data and store to an onboard 
hard drive, then RTB for hard drive retrieval. This method would avoid the design 
constraint for having sufficient power within the bolt-on subsystem for data transmission. 
The third alternative considered was to utilize the UAV as a relay, such that the bolt-on 
subsystem would be used as a node, similar to the current data transfer method of using a 
satellite. This concept would include the design constraint for transmission power, as well 
as limitations on data transfer technologies available to meet the required transmission 


distance. 


67 


The capstone team used ExtendSim to incorporate aspects of CSSQT scenarios to 
be able to analyze operational time outputs that represented variations in human and 
system performance. This operational time measurement was compared for each of the 
alternatives and showed the influence of the input factors to their respective model 


operational time outputs. 


B. FINDINGS 


This influence, identified through a factorial DOEs, showed the variation of mean 
output time by controlling different valued levels of their inputs, as well as identifying 
different influential factors for the satellite model versus the three alternative UAV 
models. As a final point of data analysis, in the factorial DOE the influence of the human 
factor delay showed that, regardless of the delay time, the UAV operational time outputs 
showed significant improvements over the satellite model. Table 14 through Table 16 
illustrate the percentage improvement of hours for each UAV model against the satellite 
model. All sequence columns relate to the factor level sequences in Value Modeling in 


Table 13. 


Table 14. Percentage Improvement (Time) UAV Relay vs. Satellite Relay 





























pe a 1446% | 531% 774% | 783% | 803% | 798% 
sara a 1605% | 589% phere eee | 892% | 886% 
ies 2089% | 767% ree e|ieeeee| 1161% | 1153% 
pao cee 1137% | 418% | 608% | 616% | 632% | 628% 


68 


Table 15. Percentage Improvement (Time) UAV Receive and Land vs. 
Satellite Relay 











en a 517% | 232% | 296% | 341% | 332% | 328% 
eee 574% | 257% | 328% | 378% | 368% | 364% 
a 747% | 335% | 427% | 492% | 480% | 473% 
eee 407% 182% | 232% | 268% | 261% | 258% 





























Table 16. Percentage Improvement (Time) UAV Receive and Transmit vs. 
Satellite Relay 











grey a 493% | 227% | 287% | 330% | 321% | 314% 
ages cag 547% | 252% | 319% | 366% | 357% | 348% 
poy a 712% | 328% | 415% | 477% | 464% | 453% 
pee ae 387% 178% | 226% | 259% | 253% | 247% 





























While all UAV alternatives with different input conditions provide significant 
improvements in data transfer capabilities by decreasing total operational time, there are 
a number of considerations for which options are both feasible and effective for the USN 
to consider implementing for future test events. These considerations include the 
engineering complexities and justifications listed in Table 13. While the alternative of 
using an UAV as a relay yields the shortest operational times, the engineering complexity 
with respect to transmit power and UAV loiter time have potential issues that have not 
been researched within the scope of this project. The alternative of using a UAV for 
receiving and landing yields significant improvements in operational time while the 
engineering complexity is low, as the transmit power issues do not exist. The receiving 


and landing alternative can permit the use of existing UAV platforms without extensive 


69 


research and developmental testing on transmitting power requirements. Additionally, a 
business case analysis can show the cost of suitable UAV platforms for this alternative- 
which increase when additional power requirements are not considered- the labor costs 
for UAV operational personnel and ship-based personnel, and any cybersecurity/ 
information assurance requirements for successfully conducted the data transfer 


scenarios. 


As shown in Tables 13 through 16, implementing any of the UAV alternatives 
would provide additional benefit with regards to data availability in a CSSQT 
application. The capability to provide larger amounts of data with reduced transfer times 
is invaluable in an operational environment, as it enables the ISEA to provide a faster 
turnaround for system analysis to support system reliability, maintainability, and 


availability. 


C. RECOMMENDATIONS 


There are several opportunities to improve the DAD system concept to close the 
data transfer gap and increase availability of data for the USN. For future effort, the 
capstone team recommends selecting an alternative from the proposed solutions (relay, 
receive and transmit, receive and land, or receive and transmit + land) for continued 
development. Selection of an alternative will enable identification of subsystem 


requirements, specific design constraints, and detailed design of the DAD system. 


The following list provides areas associated with this capstone that require further 
research and development, and potentially could serve as a topic for other capstones at 


NPS or command Naval Innovate Science and Engineering (NISE) projects: 


Application of the DAD system concept for other unmanned vehicle 
platforms (unmanned surface vehicle (USV) and/or extra-large unmanned 


underwater vehicle (XLUUV)) 


Application of microwave technology that can meet the range and future 


data rate needs of the USN 


70 


Integration into ship and/or unmanned vehicle platforms, with special 


regards to cybersecurity compliance 


Bolt-on subsystem design that fits the design constraints of a majority of 


UAV platforms 


71 


THIS PAGE INTENTIONALLY LEFT BLANK 


72 


APPENDIX: RESEARCH NOT INCLUDED 
IN THE LITERATURE REVIEW 


Wang proposed a patent to augment wireless communication and satellite 
positioning for machines at a worksite including one or more unmanned aerial vehicles 
(UAV) configured to be remotely operated above an area encompassing the worksite 


(Wang and Rybski 2017). 


Li, Zhou and Lamont introduce four communication architectures for networking 
UAVs and review some military communication standards applicable to UAV 


communications (Li, Lamont, and Zhou 2013). 


Howard describes the development of a stand-alone unattended ground sensor 
used to process signals or data. The data collected is provided to a digital signal 
processing computer and then it’s sent to an UAV. He then states that UAVs make 


significant contributions to warfighting capability of operational forces and how they are 


The naval studies board conducted a high-level assessment with the goal of 
advising the Department of Navy on how to achieve Naval Command and Information 
Infrastructure (NCII) functional capabilities. This study defines multiple technical needs 
to transition to be a network centric force. The naval studies board explains that being 


network centric is a key element in the Navy’s transformation effort (Council 2000). 


In the Design for Maintaining Maritime Superiority, Admiral Gilday, defines key 
actions on how the United States Navy is going to be trying to grow. He states that the 
Navy will be tremendously challenged to match the changing threat landscape in this 


period of great power rivalry and rapid technical transition (CNO 2018). 


Kuleshov, Zaytseva, and Aksenov also considered using UAV routing algorithms 
as an implementation method for autonomous UAV interaction to search for best node 
positioning for uninterruptable transmission. The method, which involved an autonomous 
network of multiple UAVs, included using Active Data (AD) structure which could alter 
the data transmission process by controlling the network node’s hardware. An AD 


structure on a repeater UAV network allowed for an extensive transmission distance for 


oF) 


data transfer between RN nodes and applicable sinks (Kuleshov, A. Zaytseva, and 


Aksenov 2018). 


Zwerger, Pirker et al., introduced an alternative of quantum repeater for long- 
range quantum communication with improved scaling with the distance. The quantum 
repeater improved long scale quantum communication that handles channel errors and 


losses, as well as operational and memory errors (Zwerger et al. 2018). 


In Kam’s thesis, an autopilot guidance and control algorithm were developed 
which allowed relay vehicles to reposition themselves autonomously in order to maintain 
an optimal loitering flight path. This maximized the quality of the communication link 


between the command station and survey vehicle (Kam 2008). 


74 


LIST OF REFERENCES 


“AAI RQ-2 Pioneer.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php?title=AAI_RQ-2_Pioneer&oldid=973496196. 


“AAI RQ-7 Shadow.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php?title=AAI_RQ-7_Shadow&oldid=985532920. 


AcqNotes. 2018a. “Acquisition Process - Engineering & Manufacturing Development 
(EMD) Phase.” AcqNotes. May 22, 2018. http://acqnotes.com/acqnote/ 
acquisitions/emd-phase. 





. 2018b. “Analysis of Alternatives (AoA).” AcqNotes. May 22, 2018. 
http://acqnotes.com/acqnote/acquisitions/analysis-of-alternatives. 





. 2018c. “Acquisition Process Overview.” AcqNotes. May 30, 2018. 
http://acqnotes.com/acqnote/acquisitions/acquisition-process-overview. 





. 2018d. “Acquisition Phases.” AcqNotes. June 7, 2018. http://acqnotes.com/ 
acqnote/acquisitions/acquisition-phases. 


Blanchard, Benjamin S., and W. J. Fabrycky. 2011. Systems Engineering and Analysis. 
5th ed. Prentice Hall International Series in Industrial and Systems Engineering. 
Boston: Prentice Hall. 


“Boeing Insitu RQ-21 Blackjack.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php?title=Boeing_Insitu_RQ-21_Blackjack&oldid=976436485. 





“Boeing Insitu ScanEagle.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php?title=Boeing_Insitu_ScanEagle&oldid=985322475. 


Burdakov, Oleg, Patrick Doherty, Kaj Holmberg, Jonas Kvarnstrom, and Per-Magnus 
Olsson. 2009. “Positioning Unmanned Aerial Vehicles as Communication Relays 
for Surveillance Tasks.” London, England: SAGE Publications 29 (8): 1069-87. 
https://doi.org/10.1177/02783649 10369463. 


Commander Naval Sea Systems Command. 2020a. “NSWC Port Hueneme Division.” 
Naval Sea Systems Command. May 22, 2020. https://www.navsea.navy.mil/ 
Home/Warfare-Centers/NSWC-Port-Hueneme/What-We-Do/. 





. 2020b. “PEO Ships.” Naval Sea Systems Command. May 22, 2020. 
https://www.navsea.navy.mil/Home/Team-Ships/PEO-Ships/. 


oe 


Defense Acquisition University. 2001. System Engineering Fundamentals. Defense 
Acquisition University Press. https://ocw.mit.edu/courses/aeronautics-and- 
astronautics/16-885j-aircraft-systems-engineering-fall-2005/readings/ 
sefguide_0O1_01.pdf. 


Defense Technical Information Center. 2012. “Distribution Statements and Their 
Corresponding Reasons for Use.” August 23, 2012. https://discover.dtic.mil/wp- 
content/uploads/2018/09/distribution_statements_and_reasonsSept2018.pdf. 


Department of Defense. 2015. DOD Program Manager’s Guidebook for Integrating the 
Cybersecurity Risk Management Framework (RMF) into the System Acquisition 
Life cycle Version 1.0. Government Guidebook. Washington, D.C., 20301-3140. 
https://www.dau.edu/cop/test/DAU%20S ponsored%20Documents/ 
PM%20Cybersecurity %20Guidebook%20v 1 %200%20with%20publication%20n 
otice.pdf. 





. 2019. DOD Digital Modernization Strategy. June 5, 2019. 
https://media.defense.gov/2019/Jul/12/2002 156622/-1/-1/1/DOD-DIGITAL- 
MODERNIZATION-STRATEGY-2019.PDF. 


Duren, Bernard G., and James R. Pollard. 1991. Combat Systems Vision 2030 Combat 
System Architecture: Design Principles and Methodology. Fort Belvoir, VA: 
Defense Technical Information Center. https://doi.org/10.21236/ADA252668. 


Fairley, Dick, Kevin Forsberg, and Ray Madachy. 2020. “System Life Cycle Process 
Models: Vee — SEBoK.” SEBoK Guide to the Systems Engineering Body of 
Knowledge. May 15, 2020. https://www.sebokwiki.org/wiki/ 
System_Life_Cycle_Process_Models:_Vee. 


Frink, Bentley D. 2005. Unmanned aerial vehicle apparatus, system and method for 
retrieving data. United States US6868314B1, filed June 27, 2002, and issued 
March 15, 2005. https://patents.google.com/patent/US6868314B I/en. 


“General Atomics ALTUS.” 2019. In Wikipedia. https://en.wikipedia.org/w/ 
index.php ?title=General_Atomics_ALTUS &oldid=932379819. 


“General Atomics MQ-1! Predator.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php ?title=General_Atomics_MQ-1_Predator&oldid=984 168394. 


“General Atomics MQ-9 Reaper.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php ?title=General_Atomics_MQ-9_Reaper&oldid=985312163. 


Gibbs, Yvonne. 2017. “NASA Dryden Fact Sheet - ALTUS IL” NASA. Brian Dunbar. 


August 7, 2017. http://www.nasa.gov/centers/armstrong/news/FactSheets/FS-058- 
DFRC.html. 


76 


“Griffon Aerospace.” 2020. In Wikipedia. https://en.wikipedia.org/w/ 
index.php ?title=Griffon_Aerospace&oldid=97769 1076. 


Howard, Donald Benton. 1994. Remote sensing, processing and transmission of data for 
an unmanned aerial vehicle. Calhoun: The NPS Institutional Archive. June. 
Accessed April 2020. https://calhoun.nps.edu/bitstream/handle/10945/28501/ 
remotesensingproOOhowa.pdf?sequence=1 &isAllowed=y. 


INCOSE, and Wiley. 2015a. INCOSE Systems Engineering Handbook: A Guide for 
System Life Cycle Processes and Activities. New York, UNITED STATES: John 
Wiley & Sons, Incorporated. http://ebookcentral.proquest.com/lib/ebook-nps/ 
detail.action?docID=4040424. 





. 2015b. INCOSE Systems Engineering Handbook: A Guide for System Life Cycle 
Processes and Activities. New York, UNITED STATES: John Wiley & Sons, 
Incorporated. http://ebookcentral.proquest.com/lib/ebook-nps/ 
detail.action?docID=4040424. 


Insitu Inc. 2017. “RQ-21A Blackjack.” Bingen, WA. https://www.insitu.com/images/ 
uploads/pdfs/RQ-21 ABlackjack_SubFolder_Digital_DU051217.pdf. 


Jackson, Paul, Lindsay T Peacock, and Kenneth Munson. 2003. Jane’s All the World’s 
Aircraft, 2003-2004. Coulsdon, Surrey, UK; Alexandria, VA: Jane’s Information 
Group. 


Jawhar, Imad Hussein, Nader Mohamed, Zouheir Trabelsi, and Jameela Al-Jaroodi. 2016. 
Architectures and Strategies for Efficient Communication in Wireless Sensor 
Networks Using Unmanned Aerial Vehicles. Unmanned Systems 04 (04): 289— 
305. https://doi.org/10.1142/S2301385016500126. 


Johansen, Tor A., Artur Zolich, Torkel Hansen, and Asgeir J. Sorensen. 2014. 
“Unmanned Aerial Vehicle as Communication Relay for Autonomous 
Underwater Vehicle — Field Tests.” In 20/4 IEEE Globecom Workshops (GC 
Wkshps), 1469-74. Austin, TX: IEEE. https://doi.org/10.1109/ 
GLOCOMW.2014.7063641. 


Kam, Khim Yee. 2008. “High Bandwidth Communications Links between 
Heterogeneous Autonomous Vehicles Using Sensor Network Modeling and 
Extremum Control Approaches.” Monterey, California: Naval Postgraduate 
School. http://hdl.handle.net/10945/3833. 


Kossiakoff, Alexander, ed. 2011. Systems Engineering: Principles and Practice. 2. ed. 
Wiley Series in Systems Engineering and Management 67. Hoboken, NJ: Wiley. 


ad 


Kuleshov, Sergey V., Alexandra A. Zaytseva, and Alexey Y. Aksenov. 2018. “The 
Conceptual View of Unmanned Aerial Vehicle Implementation as a Mobile 
Communication Node of Active Data Transmission Network.” International 
Journal of Intelligent Unmanned Systems 6 (4): 174-83. https://doi.org/10.1108/ 
IJIUS-04-2018-0010. 


Li, Jun, L. Lamont, and Yifang Zhou. 2013. “Communication architectures and protocols 
for networking unmanned aerial vehicles.” 20/3 IEEE Globecom Workshops. 7. 


Li, Long, Runzhou Zhang, Zhe Zhao, Guodong Xie, Peicheng Liao, Kai Pang, Haoqian 
Song et al. 2017. High-Capacity Free-Space Optical Communications Between a 
Ground Transmitter and a Ground Receiver via a UAV Using Multiplexing of 
Multiple Orbital-Angular-Momentum Beams. Scientific Reports 7 (1): 17427. 
https://doi.org/10.1038/s41598-017-17580-y. 


Maria, Anu. 1997. Introduction to Modeling and Simulation. Atlanta, Georgia: Winter 
Simulation Conference. http://acqnotes.com/Attachments/ 
White%20Paper% 20Introduction%20to%20Modeling %20and%20Simulation%20 
by%20Anu%20Maria.pdf. 


Military. 2020. “RQ-2A Pioneer | Military.Com.” Military. 2020. 
https://www.military.com/equipment/rq-2a-pioneer. 


NASC. 2020. “The NASC TigerShark XP.” Navmar Applied Sciences Corporation. 
2020. https://www.nasc.com/nasc-tigershark-xp/. 


National Research Council. 2000. Network-Centric Naval Forces: A Transition Strategy 
for Enhancing Operational Capabilites, Chapter 6: Realizing Naval Command 
and Information Infrastructure Capabilities. Washington, D.C.: The National 
Academy Press. https://doi.org/10.17226/9864. 


Naval Sea Systems Command. 2019. “NAVSEA Campaign Plan to Expand the 
Advantage 2.0.” January 2019. https://www.navy.mil/navydata/people/cno/ 
Richardson/Resource/Design_2.0.pdf. 


No Magic, Inc. 2020. “SysML Block Definition Diagram.” 2020. 
https://docs.nomagic.com/display/S YSMLP190/ 
SysML+Block+Definition+Diagram. 


Office of the Chief Information Officer. 2000. Department of the Navy (DON) Data 
Management and Interoperability (DMI) Strategic Plan. Homeland Security 
Digital Library. United States. Department of the Navy. November 1, 2000. 
https://www.hsdl.org/?abstract&did=. 





. 2020. “Department of the Navy Information Superiority Vision.” February 2020. 
https://www.documentcloud.org/documents/678 195 1-DON-Information- 
Superiority-2020.html. 


78 


Office of the Chief of Naval Operations. 2003. Operational Availbility Handbook. 
Department of the Navy. https://www.secnav.navy.mil/doni/Directives/ 
03000%20Naval%20Operations%20and%20Readiness/03- 
00%20General%20Operations %20and %20Readiness %20S upport/3000.12A.pdf. 





. 2018. “A design for maintaining maritime superiority.” Department of Navy. 
December. Accessed March 2020. https://www.navy.mil/navydata/people/cno/ 
Richardson/Resource/Design_2.0.pdf. 


Office of the Deputy Chief Information Officer. 2020. Architecture Development - 
DODAF - DOD Architecture Framework Version 2.02 - DOD Deputy Chief 
Information Officer. Chief Information Officer U.S. Department of Defense. 
2020. https://dodcio.defense.gov/Library/DOD-Architecture-Framework/ 
dodaf20_arch_development/. 


O’Rourke, Ronald. 2020. Navy Force Structure and Shipbuilding Plans: Background and 
Issues for Congress. Washington, D.C.: Congressional Research Service. 
https://www.dau.edu/cop/test/DAU%20S ponsored%20Documents/ 
PM%20Cybersecurity %20Guidebook%20v 1 %200%20with%20publication%20n 
otice.pdf. 


QinetiQ. 2017. “Vindicator.” https://www.qinetiq.com/en/what-we-do/services-and- 
products/vindicator. 


QRA Team. 2019. “Functional vs Non-Functional Requirements: The Definitive Guide.” 
QRA Corp. September 30, 2019. https://qracorp.com/functional-vs-non- 
functional-requirements/. 


SysML.org. 2020a. “SysML FAQ: What Is a Package Diagram (PKG)?” SysML.Org. 
2020. https://sysml.org/sysml-faq//sysml-faq//sysml-faq/what-is-package- 
diagram.html. 





. 2020b. “SysML FAQ: What Is a Requirement Diagram (REQ)?” SysML.Org. 
2020. https://sysml.org/sysml-faq//sysml-faq//sysml-faq/what-is-requirement- 
diagram.html. 





. 2020c. “SysML FAQ: What Is a Sequence Diagram (SD)?” SysML.Org. 2020. 
https://sysml.org/sysml-faq//sysml-faq//sysml-faq/what-is-sequence- 
diagram.html. 





. 2020d. “SysML FAQ: What Is a Use Case Diagram (UC)?” SysML.Org. 2020. 
https://sysml.org/sysml-faq//sysml-faq//sysml-faq/what-is-use-case-diagram. html. 





. 2020e. “SysML FAQ: What Is an Activity Diagram (ACT)?” SysML.Org. 2020. 
https://sysml.org/sysml-faq//sysml-faq//sysml-faq/what-is-activity-diagram.html. 


79 


The MITRE Corporation. 2013a. “System Architecture.” MITRE. July 18, 2013. 
https://www.mitre.org/publications/systems-engineering-guide/se-life cycle- 
building-blocks/system-architecture. 





. 2013b. “Analyses of Alternatives.” Systems Engineering Guide. August 28, 
2013. https://www.mitre.org/publications/systems-engineering-guide/acquisition- 
systems-engineering/acquisition-program-planning/performing-analyses-of- 
alternatives. 


Tierney, Brian, Ezra Kissel, Martin Swany, and Eric Pouyoul. 2012. “Efficient Data 
Transfer Protocols for Big Data.” In 20/2 IEEE Sth International Conference on 
E-Science, 1-9. Chicago, IL, USA: IEEE. https://doi.org/10.1109/ 
eScience.2012.6404462. 


United States Air Force. 2015a. “MQ-1B Predator.” U.S. Air Force. September 2015. 
https://www.af.mil/About-Us/Fact-Sheets/Display/Article/104469/mq-1b- 
predator/. 





. 2015b. “MQ-9 Reaper.” U.S. Air Force. September 2015. https://www.af.mil/ 
About-Us/Fact-Sheets/Display/Article/104470/mq-9-reaper/. 


United States Chief of Naval Operations. 2018. “A Design for Maintaining Maritime 
Superiority, Version 2.0.” December 2018. https://www.navy.mil/navydata/ 
people/cno/Richardson/Resource/Design_2.0.pdf. 


Wang, Qi, and Edmund Rybski. 2017. Augmented Communication and positioning using 
unmanned aerial vehicle. United States of America Patent 20170146990A1. May 
25. 


Wells, Jonathan. 2010. Multi-Gigabit Microwave and Millimeter-Wave Wireless 
Communications. Mobile Communication Series. Boston: Artech House. 


Whitcomb, Clifford. 2000. “Functional and Physical Decomposition for Ship Design,” 
March, 15. 


Xiao, Zhenyu, Pengfei Xia, and Xiang-gen Xia. 2016. “Enabling UAV Cellular with 
Millimeter-Wave Communication: Potentials and Approaches.” JEEE 
Communications Magazine 54 (5): 66-73. https://doi.org/10.1109/ 
MCOM.2016.7470937. 


Yang, Hyun. 2018. “A Cost-Effective Ship Safety Data Transfer in Coastal Areas.” 
Journal of Coastal Research 85 (May): 1206—10. https://doi.org/10.2112/SI85- 
242.1. 


Zwerger, M., A. Pirker, V. Dunjko, H. J. Briegel, and W. Diir. 2018. “Long-Range Big 
Quantum-Data Transmission.” Physical Review Letters 120 (3): 030503. 
https://doi.org/10.1103/PhysRevLett. 120.030503. 


80 


INITIAL DISTRIBUTION LIST 


Defense Technical Information Center 
Ft. Belvoir, Virginia 


Dudley Knox Library 


Naval Postgraduate School 
Monterey, California 


81