The operational node connectivity, or NOV-2, diagram concentrates on the operational nodes, the needlines between them, and the characteristics of the information exchanged.
The Operational Node Connectivity Diagram concentrates on the operational nodes, the needlines between them and the characteristics of the information exchanged. The Information Exchanges describe what information will be needed to support the activities between the operational nodes. Information Exchange characteristics can be shown on the diagram, or in a report format, also known as the NOV-3 information exchange matrix report. The purpose of the Operational Node Connectivity diagram is to make decisions about which systems are needed to satisfy the business needs of an organization or functional area.
Operational Nodes are used along with Needlines to transfer information.
Operational Nodes - describe what type of mission or role will be performed.
▪Type - Abstract or Physical
▪Operational Activities - describes what actions are to be preformed in the node (e.g. sending orders).
▪Owning Organizations - also known as Organizational Units which describe who are involved with a particular mission.
Needlines - describe what type of information is needed to support the activities between Nodes.
▪Information Exchange - Add a definition describing what kind of information will be transferred.
Note An Information Exchange may also be seen on the definition of an ICOM Arrow on an NOV-5 Activity Model Diagram.
Tabs associated with the Information Exchange are:
Nature of Transaction
▪Referenced Data - refers to entities on the NOV-6 Concept Data Model
▪Purpose/Trigger Event - may be associated to this definition dialogue if relevant.
▪Mission/Scenario
▪Language
▪Content
▪Size/Units
▪Media
▪Collaborative or One Way
▪LISI Level Required
Performance Requirements - Frequency, Timeliness, Throughput, Other
Information Assurance Attributes - Classifications/Declassifications Restrictions, Criticality/Priority, Integrity Checks Required, Assured Authorization TO Send/Receive
Threats - Physical, Electronic and Political/Economic
Operational Environment -Weather, Terrain, and Policy/Doctrine Constraints