Naval Combat Management System — ten-subsystem scaffold with TEWA cross-domain parallels

System

The {{entity:Naval Combat Management System}} is a new decomposition target selected for the defence domain. This session scaffolded the full project: AIRGen project se-naval-cms with 6 standard documents, 5 trace linksets, 2 diagrams, 8 stakeholder requirements, and 14 system-level requirements. The system classified as {{hex:51FD7959}} — 19 active traits including Powered, Active, Intentionally Designed, Processes Signals/Logic, State-Transforming, Human-Interactive, System-integrated, System-Essential, Signalling, Rule-governed, Compositional, Normative, Digital/Virtual, Institutionally Defined, Regulated, Economically Significant, and Ethically Significant. The {{trait:Ethically Significant}} trait reflects the weapon release authority chain and lethal engagement decision-making inherent to a combat management system. Status: scaffolded, ready for subsystem-level decomposition.

Decomposition

Ten subsystems identified from the real architecture of modern surface combatant CMS platforms:

  1. {{entity:Sensor Management Subsystem}} ({{hex:51B77A18}}) — radar, sonar, EO/IR, ESM control and scheduling
  2. {{entity:Track Management Subsystem}} ({{hex:41B73308}}) — multi-sensor data fusion and track correlation
  3. {{entity:Threat Evaluation and Weapon Assignment Subsystem}} ({{hex:51B73B19}}) — automated threat ranking and weapon-target pairing
  4. {{entity:Weapon Control Subsystem}} ({{hex:51B73B19}}) — fire-control, VLS sequencing, safety interlocks
  5. {{entity:Electronic Warfare Subsystem}} ({{hex:51F77219}}) — ESM, ECM, decoy coordination
  6. {{entity:Communications Management Subsystem}} ({{hex:50E57918}}) — Link 16, SATCOM, COMSEC
  7. {{entity:Tactical Display and Operator Interface Subsystem}} ({{hex:50EDF079}}) — multi-function consoles, MIL-STD-2525D symbology
  8. {{entity:Navigation and Platform Interface Subsystem}} ({{hex:41B77810}}) — GPS/INS, ship data, damage control interface
  9. {{entity:Data Processing Infrastructure Subsystem}} ({{hex:50B73019}}) — redundant servers, deterministic networking, cybersecurity
  10. {{entity:Training and Simulation Subsystem}} ({{hex:40F57B58}}) — synthetic scenarios, train/operate interlock
flowchart TB
  CMS["Naval Combat Management System"]
  SM["Sensor Management"]
  TM["Track Management"]
  TEWA["Threat Evaluation and Weapon Assignment"]
  WC["Weapon Control"]
  EW["Electronic Warfare"]
  CM["Communications Management"]
  TD["Tactical Display and Operator Interface"]
  NP["Navigation and Platform Interface"]
  DP["Data Processing Infrastructure"]
  TS["Training and Simulation"]
  SM -->|Sensor reports| TM
  TM -->|Correlated tracks| TEWA
  TEWA -->|Engagement orders| WC
  EW -->|ESM bearings| TM
  CM -->|Data link tracks| TM
  TM -->|Tactical picture| TD
  NP -->|Own-ship data| TM
  TS -->|Simulated sensor data| SM

The TEWA and Weapon Control subsystems share hex code {{hex:51B73B19}}, which is notable — both are active, rule-governed, signal-processing systems that output effects, but TEWA produces decision recommendations while Weapon Control produces physical engagement commands. This shared classification suggests the ontological boundary between decision-support and actuation is thinner than the functional architecture implies.

Analysis

Cross-domain search for entities similar to the {{entity:Threat Evaluation and Weapon Assignment Subsystem}} surfaced the autonomous vehicle domain’s {{entity:Risk Assessor}} ({{hex:41B73B09}}) and {{entity:Motion Planner}} ({{hex:41F73B19}}) as the closest structural analogs. Both perform rapid threat/risk evaluation under hard real-time constraints with safety-critical outputs — the AV Risk Assessor evaluates collision risk and triggers evasive maneuvers on a similar timeline to TEWA’s threat evaluation of incoming anti-ship missiles. The hospital monitoring domain’s {{entity:Alarm Management Subsystem}} ({{hex:51F77B19}}) also appears, sharing the pattern of time-critical threat detection and prioritised alerting to human operators. These cross-domain parallels suggest that the TEWA decomposition should explicitly address alarm fatigue and operator cognitive overload — requirements that are well-understood in medical monitoring but sometimes overlooked in military CMS design.

Lint identified two findings. The high-severity finding flagged {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-012}} (environmental constraints) as imposing physical requirements on an entity classified without the {{trait:Physical Object}} trait. This was addressed by adding {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-013}} defining the physical embodiment (19-inch rack LRUs, MIL-S-901D shock, MIL-STD-167 vibration). The medium finding on {{stk:STK-STAKEHOLDERNEEDS-005}} (degraded mode without performance criteria) was addressed by {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-014}} specifying 500-track minimum, 500ms latency, and single-domain engagement in degraded mode. Zero orphan requirements after trace linking.

Requirements

Eight stakeholder requirements covering command situational awareness ({{stk:STK-STAKEHOLDERNEEDS-001}}), multi-warfare coordination ({{stk:STK-STAKEHOLDERNEEDS-002}}), interoperability ({{stk:STK-STAKEHOLDERNEEDS-003}}), reaction time ({{stk:STK-STAKEHOLDERNEEDS-004}}), survivability ({{stk:STK-STAKEHOLDERNEEDS-005}}), maintainability ({{stk:STK-STAKEHOLDERNEEDS-006}}), training ({{stk:STK-STAKEHOLDERNEEDS-007}}), and weapon safety ({{stk:STK-STAKEHOLDERNEEDS-008}}). Fourteen system-level requirements derived and traced: track capacity of 1000 tracks at 1 Hz ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-001}}), 200ms sensor-to-display latency ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-002}}), concurrent multi-warfare processing ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-003}}), Link 16 interoperability with 3-second latency ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-004}}), 2-second TEWA reaction time for close-in threats ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-005}}), 500ms failover ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-006}}), BIT fault isolation in 60 seconds ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-007}}), hardware train/operate interlock ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-008}}), three-level weapon authorization chain ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-009}}), 500ms EMCON compliance ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-010}}), network intrusion detection ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-011}}), environmental operating envelope ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-012}}), physical rack mounting ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-013}}), and degraded mode performance criteria ({{sys:SYS-SYSTEM-LEVELREQUIREMENTS-014}}). All 15 trace links verified, zero orphans.

Next

The TEWA subsystem should be decomposed first — it has the most interfaces (sensor management, track management, weapon control, display, comms), the tightest real-time constraints, and the highest safety criticality due to its role in the weapon release decision chain. The cross-domain insight from the AV Risk Assessor and hospital Alarm Management suggests adding operator cognitive load requirements during TEWA decomposition. After TEWA, the Track Management subsystem is the next priority as the central data hub through which all other subsystems interact.

← all entries