← All reports
PDF Excel ReqIF

Naval Combat Management System

System Requirements Specification (SyRS) — ISO/IEC/IEEE 15289 — Specification | IEEE 29148 §6.2–6.4
Generated 2026-03-27 — UHT Journal / universalhex.org

Referenced Standards

StandardTitle
ARINC 653-compliant Avionics application software standard interface
IEEE 1588 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems
STANAG 4193
STANAG 4420
STANAG 4545-compliant

Acronyms & Abbreviations

AcronymExpansion
ARC Architecture Decisions
CCCS Completeness, Consistency, Correctness, Stability
EARS Easy Approach to Requirements Syntax
IFC Interface Requirements
STK Stakeholder Requirements
SUB Subsystem Requirements
SYS System Requirements
UHT Universal Hex Taxonomy
VER Verification Plan

Stakeholder Requirements (STK)

RefRequirementV&VTags
STK-STAKEHOLDERNEEDS-001 The Naval Combat Management System SHALL provide the Commanding Officer with a comprehensive, real-time tactical picture of all detected air, surface, and subsurface contacts within sensor range to support timely engagement authorization decisions. stakeholder, command, session-187
STK-STAKEHOLDERNEEDS-002 The Naval Combat Management System SHALL enable simultaneous coordination of anti-air, anti-surface, anti-submarine, and electronic warfare operations by dedicated warfare coordinators without mutual interference between warfare domains. stakeholder, operations, session-187
STK-STAKEHOLDERNEEDS-003 The Naval Combat Management System SHALL exchange tactical data with allied naval and joint forces via NATO-standard tactical data links to enable coordinated multi-ship and joint force operations. stakeholder, interoperability, session-187
STK-STAKEHOLDERNEEDS-004 The Naval Combat Management System SHALL support engagement of close-in threats with a sensor-to-weapon reaction time sufficient to counter sea-skimming anti-ship missiles with flight times under 30 seconds from radar horizon to impact. stakeholder, reaction-time, session-187
STK-STAKEHOLDERNEEDS-005 The Naval Combat Management System SHALL maintain combat capability with degraded but operationally useful functionality following battle damage that disables up to 30 percent of system processing nodes or display consoles. stakeholder, survivability, session-187
STK-STAKEHOLDERNEEDS-006 The Naval Combat Management System SHALL provide built-in test and fault isolation to the line-replaceable unit level, enabling shipboard maintenance personnel to diagnose and repair faults without shore-based technical support. stakeholder, maintenance, session-187
STK-STAKEHOLDERNEEDS-007 The Naval Combat Management System SHALL support embedded training with synthetic scenario generation that exercises crew proficiency in all warfare domains without requiring live sensor feeds or expending ordnance. stakeholder, training, session-187
STK-STAKEHOLDERNEEDS-008 The Naval Combat Management System SHALL enforce weapon safety interlocks that prevent inadvertent weapon release, including bearing and elevation safety arcs, friendly force deconfliction, and a multi-level authorization chain requiring positive human confirmation before lethal engagement. stakeholder, safety, session-187

System Requirements (SYS)

RefRequirementV&VTags
SYS-SYSTEM-LEVELREQUIREMENTS-001 The Naval Combat Management System SHALL simultaneously maintain at least 1000 correlated tracks across all sensor domains with a track update rate of not less than 1 Hz for threat-class contacts. system, performance, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-002 The Naval Combat Management System SHALL present new sensor detections on the tactical display within 200 milliseconds of sensor report receipt under maximum track load conditions. system, latency, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-003 The Naval Combat Management System SHALL process anti-air, anti-surface, anti-submarine, and electronic warfare engagements concurrently without degradation to any single warfare domain's track update rate or engagement timeline. system, concurrent, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-004 The Naval Combat Management System SHALL transmit and receive tactical data via Link 16 (MIL-STD-6016) with message latency not exceeding 3 seconds for J3.2 track messages under normal network loading. system, datalink, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-005 When a close-in threat is detected within 15 nautical miles, the Naval Combat Management System SHALL complete threat evaluation and present a weapon assignment recommendation to the operator within 2 seconds of initial track correlation. system, reaction-time, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-006 The Naval Combat Management System SHALL automatically fail over from a primary processing node to a hot-standby backup node within 500 milliseconds without loss of track state or engagement timeline data. system, redundancy, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-007 The Naval Combat Management System SHALL detect and isolate hardware faults to the line-replaceable unit level within 60 seconds of fault occurrence and report the fault to the operator console with a recommended corrective action. system, bit, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-008 While in training mode, the Naval Combat Management System SHALL prevent all simulated engagement commands from reaching weapon control circuits through a hardware-enforced train/operate interlock that cannot be overridden by software. system, safety, training, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-009 The Naval Combat Management System SHALL enforce a minimum three-level authorization chain for weapon release consisting of operator designation, warfare coordinator approval, and commanding officer confirmation, with no single point of failure capable of bypassing this chain. system, safety, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-010 When EMCON condition is set, the Naval Combat Management System SHALL suppress all active sensor emissions and data link transmissions within 500 milliseconds of EMCON command receipt while maintaining passive sensor processing and track management. system, emcon, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-011 The Naval Combat Management System SHALL implement network intrusion detection and cross-domain security guards to prevent unauthorized access to classified track data and weapon control functions across all internal and external network interfaces. system, cybersecurity, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-012 The Naval Combat Management System SHALL operate continuously in a maritime electromagnetic environment with ambient temperatures of 0 to 55 degrees Celsius, relative humidity up to 95 percent, and ship motion up to Sea State 6 without performance degradation. system, environmental, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-013 The Naval Combat Management System equipment SHALL be housed in standard 19-inch equipment racks with shock-mounted line-replaceable units conforming to MIL-S-901D Grade A shock requirements and MIL-STD-167 vibration limits for shipboard installation in the combat information center and adjacent electronics spaces. system, physical, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-014 While operating in degraded mode following loss of up to 30 percent of processing capacity, the Naval Combat Management System SHALL maintain a minimum track capacity of 500 tracks, sensor-to-display latency of not more than 500 milliseconds, and single-warfare-domain engagement capability. system, degraded-mode, session-187
SYS-SYSTEM-LEVELREQUIREMENTS-015 The Naval Combat Management System equipment SHALL be distributed across no fewer than two physically separated compartments on the ship, with sufficient equipment in each compartment to maintain degraded-mode combat operations following loss of one compartment due to battle damage or flooding. system, survivability, physical, session-197, validation
SYS-SYSTEM-LEVELREQUIREMENTS-016 While operating in degraded mode following loss of up to 30 percent of processing capacity, the Naval Combat Management System SHALL maintain a minimum of 500 simultaneous correlated tracks, a sensor-to-display latency not exceeding 500 milliseconds, a COP refresh rate of at least 10 Hz, and single-warfare-area engagement capability. system, degraded-mode, session-197, validation

Requirements by Category (IEEE 29148)

3
Functional Requirements
13
Performance Requirements
1
Interface Requirements
1
Safety Requirements
3
Environmental Requirements
4
Reliability & Availability
3
Compliance & Regulatory
1
Other

Traceability Matrix — STK to SYS

SourceTargetTypeDescription
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-016 derives
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-015 derives
STK-STAKEHOLDERNEEDS-007 SYS-SYSTEM-LEVELREQUIREMENTS-008 derives
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-014 derives
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-013 derives
STK-STAKEHOLDERNEEDS-001 SYS-SYSTEM-LEVELREQUIREMENTS-012 derives
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-011 derives
STK-STAKEHOLDERNEEDS-002 SYS-SYSTEM-LEVELREQUIREMENTS-010 derives
STK-STAKEHOLDERNEEDS-008 SYS-SYSTEM-LEVELREQUIREMENTS-009 derives
STK-STAKEHOLDERNEEDS-008 SYS-SYSTEM-LEVELREQUIREMENTS-008 derives
STK-STAKEHOLDERNEEDS-007 SYS-SYSTEM-LEVELREQUIREMENTS-008 derives
STK-STAKEHOLDERNEEDS-006 SYS-SYSTEM-LEVELREQUIREMENTS-007 derives
STK-STAKEHOLDERNEEDS-005 SYS-SYSTEM-LEVELREQUIREMENTS-006 derives
STK-STAKEHOLDERNEEDS-004 SYS-SYSTEM-LEVELREQUIREMENTS-005 derives
STK-STAKEHOLDERNEEDS-003 SYS-SYSTEM-LEVELREQUIREMENTS-004 derives
STK-STAKEHOLDERNEEDS-002 SYS-SYSTEM-LEVELREQUIREMENTS-003 derives
STK-STAKEHOLDERNEEDS-001 SYS-SYSTEM-LEVELREQUIREMENTS-002 derives
STK-STAKEHOLDERNEEDS-001 SYS-SYSTEM-LEVELREQUIREMENTS-001 derives