1 Organizational Identifiers for DoD Dr. Mike Bridgman OSD(P&R) 703-693-5584

Slides:



Advertisements
Similar presentations
12 August 2004 Strategic Alignment By Maria Rojas.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
More CMM Part Two : Details.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
W5HH Principle As applied to Software Projects
Active Directory: Final Solution to Enterprise System Integration
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Bilkent University Department of Computer Engineering
Avra Software CMPUT Process Quality and Software Assessment Case Study - slide#1©P. Sorenson and Amr Kamel Assessment Plan for Assessment Plan for.
IS 421 Information Systems Management James Nowotarski 16 September 2002.
Introduction to Databases
Chapter 13 Embedded Systems
6/24/2015B.RamamurthyPage 1 File System B. Ramamurthy.
Introduction to Databases Transparencies
Introduction to Database Management
Configuration Management
Databases and Database Management Systems
7/15/2015B.RamamurthyPage 1 File System B. Ramamurthy.
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide 1- 1.
Examine Quality Assurance/Quality Control Documentation
Configuration Management
This chapter is extracted from Sommerville’s slides. Text book chapter
Chapter 10 Architectural Design
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
1 Building and Maintaining Information Systems. 2 Opening Case: Yahoo! Store Allows small businesses to create their own online store – No programming.
Software Testing Lifecycle Practice
Module 1 Session 1.1 Visual 1 Managing the Implementation of Development Projects Course Overview and Introduction.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
UNCLASSIFIED Joint and Coalition Warfighting Mr. John Vinett March 2012 Technical Baseline Capability.
Web-Enabled Decision Support Systems
Software Configuration Management (SCM)
Introduction: Databases and Database Users
1 Lecture 5.2a: SEF Ch 8 SE Outputs Dr. John MacCarthy UMBC CMSC 615 Fall, 2006.
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Adoption of Commercial EDI Standards for DoD Logistics Business Transactions Integrated Product Team (EDI IPT) – Expanded DEFENSE LOGISTICS AGENCY Report.
File Systems CSCI What is a file? A file is information that is stored on disks or other external media.
1 Local Readiness Team Lead Kick-Off Meeting May 16, 2007.
Version Advanced User Training. Instructions This training module contains additional key concepts that are an extension to the concepts in the.
Data Structure & File Systems Hun Myoung Park, Ph.D., Public Management and Policy Analysis Program Graduate School of International Relations International.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
U NIQUE ID ENTIFICATION (UID) Unique Identification (UID) of Tangible Items.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Rupa Tiwari, CSci5980 Fall  Course Material Classification  GIS Encyclopedia Articles  Classification Diagram  Course – Encyclopedia Mapping.
MPEG 21 – An Overview MUMT 611 Elliot Sinyor January 2005.
Cmpe 589 Spring 2006 Lecture 2. Software Engineering Definition –A strategy for producing high quality software.
Presentation at HSPD-12 Workshop Ms. Jeanette Thornton May 4, 2005.
Software Configuration Management (SCM). Product Developer Disciplines One view of the world is that there are three types of activities are required.
UID Road Ahead LeAntha Sumpter December Data Roadmap Time Line FY-07 FY-06 FY-05 FY- 04/05 Enterprise Visibility AccountabilityValue OrganizationProgramLocationStatus.
ISO Geographic information Procedures for item registration.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Introduction to Active Directory
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
Summary of HEP SW workshop Ian Bird MB 15 th April 2014.
Operating Systems Files, Directory and File Systems Operating Systems Files, Directory and File Systems.
LOG204 (DL) Configuration Management Bruce Hatlem Logistics Functional IPT June 26, 2007.
Power to the Edge A Net-Centric DoD NII/DoD CIO IT Acquisition Management Transformation Rapid Improvement Team (RIT) Principals Meeting November 18, 2003.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Software Project Configuration Management
PROTECTION.
Project Management and Information Security
Routing Identifier Code (RIC) to DoD Activity Address Code (DoDAAC)
File System B. Ramamurthy B.Ramamurthy 11/27/2018.
Maintaining Information Systems (SAD- 18)
CSE451 Virtual Memory Paging Autumn 2002
Overview Multimedia: The Role of WINS in the Network Infrastructure
Software Testing Lifecycle Practice
Presentation transcript:

1 Organizational Identifiers for DoD Dr. Mike Bridgman OSD(P&R)

2 Unique Identification of DoD Organizations  Develop a DoD instruction and directive for implementation of Force Management IDs (FMID) for the force structure data in coordination with the Joint Staff that is:  Consistent with a joint hierarchal methodology for representing Service force structure  Provides guidance on maintaining the currency of the force structure relationships  Enables cross communication with existing logistics processes  Determine and assign life-cycle roles, responsibilities and operational relationships for FMIDs working with NII/CIO  Ensure the FMID implementation is consistent with the requirements of the Net-Centric Strategy

3 Unique Identification of DoD Organizations  Determine the unique identification methodology for DoD organizations in coordination with AT&L who will lead external DoD organization IDs  Define the FMID implementation, structure and process for allocating FMIDs to the DoD Components for assignment to force structure data in collaboration with the Joint Staff and DoD Components  Maintain the integrity of the CAC/EDI-PI as the unique personnel identifier  Integrate use of biometric attributes for personnel authentication

4 Course Modifications Combining the identifier and force structure efforts into one DoD directive –SD106 process is closed; responding to comments –Target issue date: end of December –Schedule series of implementation meetings to construct the instruction (Jan - Mar 2005) Identifier renamed FMID = Force Management Identifier FMID scope coordinated with AT&L-led effort to draft overarching DoD directive on identifiers

5 FSC/FMID Directive Update FSC DoD DirectiveDoD “Capstone” Identifier Directive FSC DoD Instruction FMID DoD Instruction RPIDEDIPI UID DoD Instruction Lead: OSD (AT&L) Includes FSC & FMID Guidance Lead: OSD (P&R) Instructions Directives

6 Backup Charts

7 Proposed EWID Specification An enterprise-wide identifier (EWID) is a 64-bit number used to to uniquely identify any item in any database Consists of a four byte (32 bit) “EwID Seed” (obtained through a is obtained from an EwID Seed Server) and a locally appending, four byte (32 bit) suffix EwID Seeds are free ( see: ) EwID characteristics & advantages: –Registration-based, this allows them to be compact & efficient (no waste) –Simple, fixed size – easy for software engineers to use –Easy to implement (add to legacy DBs as Alt Keys) –All data is tagged with a common structure Bit (4 Byte) EwID Seed Bit (8 Byte) EwID 32 Bits (4 Bytes) Local Sequence PrefixSuffix

8 Pros/Cons of using EWID Specification Pros They are unique and work ½ of the size of the UUID, but still accomplish the same function Simpler to use in legacy systems Able to trace EWID through registration Cons Not an ISO standard Registration based No real-time capability for obtaining an “EWID seed” Mechanism for guaranteeing uniqueness for the “EWID suffix” is required by the generating system

9 UUID Specification Universal Unique Identifier (UUID), developed in the early 1990s, is a 128-bit number guaranteed to be unique The UUID is part of ISO and costs may be incurred to implement The UUID mechanism that guarantees Uniqueness is through a combination of hardware addresses, time stamps and random seeds Very common scheme for identifiers, used by many systems (e.g., MS Windows uses it to describe essentially every object in the OS) There is an ongoing effort to have the specification published as a internet standard (i.e., which may be free)

10 Pros/Cons of using UUID Specification Pros Approved ISO Standard They are unique and work In wide use over the Internet and MS Windows operating systems Are self-generated – No remote call required and no “seed” or “index” to keep Cons Require up to 2x the bandwidth at the tactical level Currently costs up to $10 - $500 a copy Implementing the standard is not simple for legacy systems Would require policy, strict oversight, and funding to implement

11 Proposed Road Ahead Use EWIDs as the GFM identifiers –Register the EWID as a Uniform Resource Identifier (URI) –Treat EWIDS as URIs –When tactical bandwidth becomes available, convert existing EWIDs to Type 3 UUIDs –Future UUIDs per user selection Implement Policy to handle the planned conversion Find a permanent home for the EWID Seed Server