Survivability and the Design of Modern Naval Warships

Survivability and the Design of Modern Naval Warships

Survivability and the Design of Modern Naval Warships ArsenalArsenal ShipShip ConceptConcept –– 1996 1996 Presented By: Russell Kupferer CSC Survivability Senior Engineer 202-675-8531, [email protected] 29 June 2010 EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 1 Introduction • The primary difference between a Naval ship and a Commercial ship is SURVIVABILITY – Navy Ships are expected to be exposed to and survive enemy attack. – Safety ≠ Survivability, i.e. Design for safety does not ensure survivability. • Modern Naval Ships must balance a number of factors including weights, arrangements, missions, powering, propulsion, life cycle, cost, crewing, and survivability. • Survivability itself is a balance between expected threats, doctrine/tactics, susceptibility reduction, vulnerability reduction, damage control, and recoverability. EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 2 Topics •Who am I? •An exceptionally brief review of warship evolution. •The Ship Design Spiral •The Kill Chain •Threat Weapon Types and Effects •Survivability Design –Susceptibility Reduction –Vulnerability Reduction –Damage Control Recoverability •Trends in Naval Ship/Survivability design •Conclusion/Questions EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 3 CSC Advanced Marine Center Survivability Department •The CSC Advanced Marine Center Survivability department supports the NAVSEA design community, program offices, and technical warrant holders •Expertise in two main areas of survivability –Design and Assessment –Live Fire Test and Evaluation (LFT&E) •CSC AMC supports multiple programs: –CVN 78, DDG 1000, JHSV, LCC(R), LCS, LHA 6, LPD 17, and MPF(F) EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 4 Evolution of Warship Design Greek Galley (~600 BC) Korean Turtle Ship (~1600 AD) Dutch Ship of the Line (~1800 AD) HMS Warrior (1861) SMS Von der Tann (1910) IJN Yamato (1941) USS Monterey (1990) EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 5 Ship Design in Brief • Ship design occurs in a spiral development, during which Analysis of design requirements are revised and finalized to create Alternatives an optimal final design. Requirements Concept Arrangements Hull Design Design Preliminary Structures Hydrostatics Design Detail Stability Weights Design Powering Construction • Survivability is just one of many design considerations Change of Difficulty/Cost that are considered as the ship proceeds through the design spiral. Tests and – Survivability design requirements will often drive key aspects Trials of the ship’s design. – Survivability design support facilitates intelligent trade-offs and Follow-on design decisions during the design process. Flights EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 6 The Kill Chain Detection – Can occur through a variety of Susceptibility means, from satellite reconnaissance to the Mark I eyeball Identification/Localization – To shoot at a target you need to know where it is, where it is going, and most importantly, who it belongs to Engagement – Weapons that are fired have to successfully acquire and track the target, find their way to the engagement zone, and evade the target’s defenses Vulnerability Primary Damage – Weapons that strike the target must do enough damage to the ship to render it mission incapable, i.e. eliminate its contribution in the fight Recoverability Secondary Damage – Weapons are also designed to cause progressive damage, including fire, smoke, and flooding, which must be combatted by damage control crews EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 7 Threats Types • Conventional threats fall into two broad categories: – AIREX threats are those that are delivered and do the majority of their damage above the waterline. These threats include: • Missiles/Rockets • Ballistic Projectiles • Bombs – UNDEX threats are those that are delivered and do the majority of their damage below the waterline. These threats include: • Mines • Torpedoes • Other threats can induce weapons effects that subject the ship to adverse environments: – These threats can be quite varied, but can include: • Chemical, Biological, and Radiological (CBR) effects • Information Warfare EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 8 AIREX Weapons • Missiles/Rockets – Guidance is typically active, semi-active, or passive radar homing for longer range weapons, and infrared (IR) or electro-optical (EO) for shorter range weapons, with some remote- guidance and dual-sensor weapons. – Warheads are typically either: • Semi-Armor Piercing – Will penetrate several meters into a ship before detonating, therefore maximizing internal damage. • Fragmentation – Will detonate above the target to damage topside electronics, equipment, and personnel. • Shaped Charge – Will generate a jet of superheated metal to penetrate as deep into the ship as possible, with the intent of defeating armor and detonating internal magazines. • Ballistic Projectiles – Includes major and minor caliber bullets and shells, fired from shore or ship mounted guns and cannons. – Damage is primarily generated through the kinetic energy of the shell hitting the target, but larger shells can include explosive, fragmentation, and incendiary effects. • Bombs – Bombs can either be ‘smart’ or ‘dumb’, depending on whether they are guided or unguided as they approach the target. Targeted weapons can either be directed by onboard sensors or directed by an external illuminator. – Warheads are normally semi-armor piercing or fragmentation, though some shaped-charge, deep penetrating, and kinetic-kill bombs have also been developed. – Bombs lack the range of modern missiles, but are relatively cheap, and modern ‘glide-bombs’ can travel for miles downrange when released by high-speed, high-flying aircraft. EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 9 Video of SAP Weapon Test Ex-USS Peterson Test EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 10 UNDEX Weapons • Contact Mines – Typically are moored or floated in ‘choke points’, such as narrow straits or harbor entrances. Detonation occurs on contact. – Contact detonation will result in ‘water hammer ’ effect, in which explosive gasses from the explosion vent against the hull of the ship, penetrate, and then pull a ‘slug’ of water into the ship at very high speeds. • Underbottom Mines – Typically are laid on the seafloor in relatively shallow water (<300 ft), in fields or lines. – Use acoustic, magnetic, and pressure sensors to detect when ships are transiting above them. Sensors can include logic to prevent false or early activation. – Kill mechanisms include the following: • Underwater Shock – The explosion induces a shock wave through the water, which can break equipment, overload structure, and unseat personnel and system components. • Whipping – The induced load and follow on bubble pulse can result in high-load oscillation of hogging and sagging moments, which will can severely damage ship structure. • Torpedoes – Modern torpedoes are either acoustic or wake-homing, with some remote control capability in ‘wire-guided’ variants. Most will use magnetic fuses to determine when they are under the hull of the target. – Modern torpedoes are usually designed to combine the kill mechanisms of contact mines and underbottom mines, creating shock, whipping, and water hammer effects that may literally break a ship in two. EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 11 Video of Torpedo Test DDG 81 Shock Test Torpedo Vid EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 12 Nuclear, CBR-D, and Information Warfare Threats • Nuclear Environments – Nuclear weapons can generate shock fronts, blast overpressures, radiant heat loads, and transient electromagnetic effects. – The damage mechanisms associated with nuclear explosions tend to be less severe than conventional weapons, but occur over longer durations to the entirety of the ship. • CBR – Contamination of an environment by chemical, biological, or radiological agents require specialized equipment and design to protect the crew. – A hostile CBR environment may restrict the ship’s ability to operate by limiting the crew’s ability to go topside and access unprotected spaces. • Information Warfare – Modern combatants require continuous situational awareness and external communication. Information warfare can deny these activities through: • Jamming of Beyond Line of Sight (BLOS) radars and radio communications using high- powered land, sea, or air based jammers. • Denial of Line of Site (LOS) assets through destruction of key satellite nodes or directional jamming of communication relays. • Hacking of communications and data links between ships and the battle group and between the battle group and command centers. EVENT/CLIENT NAME or Confidentiality statement 5/28/2008 4:54 PM New Brand FMT-P2_28May086/29/2010 13 Susceptibility Reduction • Fundamental Survivability Truth #1: If they can’t hit you, they can’t hurt you. • Susceptibility reduction harnesses this truth to improve

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us