{"id":2460,"date":"2013-06-04T22:25:19","date_gmt":"2013-06-04T22:25:19","guid":{"rendered":"https:\/\/lexingtoninstitute.org\/?p=2460"},"modified":"2013-11-12T14:32:18","modified_gmt":"2013-11-12T14:32:18","slug":"the-military-and-the-iron-law-of-bandwidth-usage","status":"publish","type":"post","link":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/","title":{"rendered":"The Military And The Iron Law Of Bandwidth Usage"},"content":{"rendered":"

We are still at the early stages of the IT revolution. The performance of sensors and computers continues to improve even as they shrink in size and morph into different shapes. Cars, household appliances, industrial machinery, farm equipment, roads and bridges are now run or monitored by computers and are connected to the global grid. There are so many devices in operation in our homes that families are experiencing a noticeable slowdown in transmission speeds. As a consequence, internet service providers are now offering optional improved speed and bandwidth.<\/p>\n

This explosion in IT is a result, in part, of improvements in the performance of sensors and computers. But it is a function also of the value that individuals, households, businesses, organizations, political parties and governments find in being connected. We are living in a world that reflects the validity of Metcalfe\u2019s Law which states that the value of a telecommunications network is proportional to the square of the number of connected users of the system. The more nodes there are on the network, the more power it has and the greater the value it generates. We have seen this in the ways that the IT revolution is not only leading to the invention of new modes of communications, it is giving birth to novel social customs and even languages. In turn, these changes lead to even greater demands for connectivity and bandwidth.<\/p>\n

It should come as no surprise that the revolution we are experiencing at home and in the workplace is also having a profound impact on the U.S. military. The IT revolution has led to an equally profound one in military operations. Precise position location has transformed navigation and target location. Where once it took hundreds of aircraft and thousands of bombs to score even a small number of hits on a target, now it is one weapon per aimpoint. Military logistics is undergoing a similar transformation as supplies can be tracked from factory to foxhole. Sensors and computers are proliferating on every type of platform not only to support combat operations but for such purposes as predictive maintenance and automated operation of routine functions.<\/p>\n

The deployment of thousands of sensors on unmanned aerial systems, fixed platforms, ground robots, manned vehicles and even individual soldiers has led to the daily production of literally terabytes of data. These nodes are also part of the network, sending and receiving information based on their function and needs. Each service is pursuing very sophisticated plans and programs to exploit the growing ability to collect, move, analyze and exploit information. The Army is pursuing a network design that will provide continuous connectivity for units and even individuals. The centerpiece of this effort is the capability to conduct \u201cmission-command on the move.\u201d The Navy\u2019s Naval Integrated Fire Control-Counter Air will network together the E-2D Advanced Hawkeye, the Aegis air and missile defense system, other Navy manned and unmanned aerial platforms and even Army and Air Force systems such as the Joint Land Attack Cruise Missile Elevated Network Sensor System, Patriot and E-3 AWACS.<\/p>\n

Just as the computer-savvy family is experiencing bandwidth problems, so too is the U.S. military. Simply put, demand is exceeding supply. One long-time observer of the struggle to deliver IT services to the warfighter formulated a military corollary to Metcalfe\u2019s Law. This Iron Law of Bandwidth Usage states that “for military formations, using bandwidth expands to consume whatever amount of bandwidth is provided.” Unlike domestic consumers of bandwidth, the military cannot just go to its internet provider and pay a little extra for a faster connection. The new IT challenge for the U.S. military is to manage the insatiable demand for bandwidth even as the proliferation of sensors, computers and devices continues.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

We are still at the early stages of the IT revolution. The performance of sensors and computers continues to improve even as they shrink in size and morph into different shapes. Cars, household appliances, industrial machinery, farm equipment, roads and bridges are now run or monitored by computers . . .<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"yoast_head":"\nThe Military And The Iron Law Of Bandwidth Usage - Lexington Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Military And The Iron Law Of Bandwidth Usage - Lexington Institute\" \/>\n<meta property=\"og:description\" content=\"We are still at the early stages of the IT revolution. The performance of sensors and computers continues to improve even as they shrink in size and morph into different shapes. Cars, household appliances, industrial machinery, farm equipment, roads and bridges are now run or monitored by computers . . .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexington Institute\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-04T22:25:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-12T14:32:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:site\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/\",\"name\":\"The Military And The Iron Law Of Bandwidth Usage - Lexington Institute\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\"},\"datePublished\":\"2013-06-04T22:25:19+00:00\",\"dateModified\":\"2013-11-12T14:32:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexingtoninstitute.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Military And The Iron Law Of Bandwidth Usage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/\",\"name\":\"Lexington Institute\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\",\"name\":\"Daniel Gour\u00e9, Ph.D.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"caption\":\"Daniel Gour\u00e9, Ph.D.\"},\"url\":\"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Military And The Iron Law Of Bandwidth Usage - Lexington Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/","og_locale":"en_US","og_type":"article","og_title":"The Military And The Iron Law Of Bandwidth Usage - Lexington Institute","og_description":"We are still at the early stages of the IT revolution. The performance of sensors and computers continues to improve even as they shrink in size and morph into different shapes. Cars, household appliances, industrial machinery, farm equipment, roads and bridges are now run or monitored by computers . . .","og_url":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/","og_site_name":"Lexington Institute","article_published_time":"2013-06-04T22:25:19+00:00","article_modified_time":"2013-11-12T14:32:18+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png","type":"image\/png"}],"author":"Daniel Gour\u00e9, Ph.D.","twitter_card":"summary_large_image","twitter_creator":"@LexNextDC","twitter_site":"@LexNextDC","twitter_misc":{"Written by":"Daniel Gour\u00e9, Ph.D.","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/","url":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/","name":"The Military And The Iron Law Of Bandwidth Usage - Lexington Institute","isPartOf":{"@id":"https:\/\/www.lexingtoninstitute.org\/#website"},"datePublished":"2013-06-04T22:25:19+00:00","dateModified":"2013-11-12T14:32:18+00:00","author":{"@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74"},"breadcrumb":{"@id":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexingtoninstitute.org\/the-military-and-the-iron-law-of-bandwidth-usage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexingtoninstitute.org\/"},{"@type":"ListItem","position":2,"name":"The Military And The Iron Law Of Bandwidth Usage"}]},{"@type":"WebSite","@id":"https:\/\/www.lexingtoninstitute.org\/#website","url":"https:\/\/www.lexingtoninstitute.org\/","name":"Lexington Institute","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74","name":"Daniel Gour\u00e9, Ph.D.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","caption":"Daniel Gour\u00e9, Ph.D."},"url":"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/2460"}],"collection":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/comments?post=2460"}],"version-history":[{"count":0,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/2460\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/media?parent=2460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/categories?post=2460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/tags?post=2460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}