(Ebook) Design of Internet of Things by Gunneswara VSSS Kalaga Rao ISBN 9781032300504, 1032300507 - Download the full ebook version right now
(Ebook) Design of Internet of Things by Gunneswara VSSS Kalaga Rao ISBN 9781032300504, 1032300507 - Download the full ebook version right now
com
https://ebooknice.com/product/design-of-internet-of-
things-46462756
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebooknice.com/product/internet-of-unmanned-things-iout-and-mission-
based-networking-internet-of-things-54844820
ebooknice.com
https://ebooknice.com/product/fundamentals-of-internet-of-things-36125516
ebooknice.com
https://ebooknice.com/product/internet-of-things-10953766
ebooknice.com
(Ebook) Internet of Things: Robotic and Drone Technology (Smart Engineering Systems:
Design and Applications) by Taylor & Francis Group ISBN 9780367754532, 0367754533
https://ebooknice.com/product/internet-of-things-robotic-and-drone-technology-
smart-engineering-systems-design-and-applications-37990148
ebooknice.com
(Ebook) Embedded System Design : Embedded Systems, Foundations of Cyber-Physical
Systems, and the Internet of Things by Marwedel, Peter ISBN 9783319560434,
9783319560458, 3319560433, 331956045X
https://ebooknice.com/product/embedded-system-design-embedded-systems-
foundations-of-cyber-physical-systems-and-the-internet-of-things-6751486
ebooknice.com
https://ebooknice.com/product/embedded-system-design-embedded-systems-
foundations-of-cyber-physical-systems-and-the-internet-of-things-23269146
ebooknice.com
(Ebook) Algorithmic Mechanism Design for Internet of Things Services Market by Jiao,
Yutao, Wang, Ping, Niyato, Dusit ISBN 9789811673535, 9789811673528, 9811673527,
9811673535
https://ebooknice.com/product/algorithmic-mechanism-design-for-internet-of-
things-services-market-36429100
ebooknice.com
ebooknice.com
https://ebooknice.com/product/learning-internet-of-things-55324464
ebooknice.com
Design of Internet
of Things
Preface xi
Acknowledgments xiii
About the Author xv
1 Introduction 1
2 Big Data 5
4 Changing Technologies 15
4.1 RFID 15
4.2 IC/Sensor Cost 16
4.3 6LoWPAN 16
4.4 M2M, IoT, and IoE Concepts 17
4.5 IoT—Internet of Things 18
5 M2M 21
5.1 M2M Architecture 24
5.2 Key Technical Requirements of M2M 25
6 Definitions of IoT 29
6.1 Communication Between “Things” 31
7 IoT Architecture 33
7.1 Conceptual Design of IoT 37
vii
viii Contents
9 IoT Middleware 51
9.1 Middleware Layer 52
Index 129
Preface
xi
xii Preface
As a next required step, Chapters 10, 11, and 12 deal with all the
basic design requirements like use cases and application scenarios. IEEE
standards-based message frames, hardware and software components, and
available possibilities that are required for the overall planning of the IoT
design approach are covered. Chapter 13 handles all the details of the design
requirements and operating systems so that the serious designer can finalize
his thought process toward the design of an IoT device. Chapter 14 deals
with all the necessary concepts, preparation steps, design models, embedded
operating system examples, required code structures, constructs, and inter-
national standards that are required for the actual implementation and
design of an IoT device. Details of the LBR (6LoWPAN Border Router)
which shall be the link between the IoT and its work application server
and design aspects are also included. Step by step each designer can imple-
ment a targeted IoT device, using and choosing his choices. Chapter 15 talks
about IoT security aspects and the future based on IEEE message frames and
security touchpoints.
The IoT design community may use the given details and can form a
team to scientifically deliver the planned targets in a stipulated time frame.
I hope to reach out to every intended designer and equip them in the right
direction. I request readers to pardon me for any discomfort.
Acknowledgments
xiii
newgenprepdf
xv
Chapter 1
I ntroduction
We did not learn anything, just we were asked to play with the whole
big number of balls with different colors; I did separate one hundred
balls each one with different colors; But Ravi could separate only 35,
while Rekha did 75, and then you know, the teacher gave me star.
DOI: 10.1201/9781003303206-1 1
2 Design of Internet of Things
phenomenon as every human being on this earth will recognize the sky with
blue color only. Hence, we all see in the paints, pictures, photos, movies,
and whenever we wish to represent the sky, we always use the color BLUE
thoughts ended into a concrete useful pattern.
Another example is humidity at a particular location—the water vapor
content in the air at a particular spot/room /building/area—shall be useful
in many ways to understand the upcoming atmospheric changes or to design
useful air-conditioning equipment, etc.
There are various devices used to measure and regulate humidity. A device
used to measure humidity is called a psychrometer or hygrometer. We are
trying to identify the humidity with a unique identification pattern to utilize
the millions and billions of humidity data for certain scientific calculations
or increase human comfort and efficiency.
In this way, if we can represent or recognize each of the objects in this
world—a flower, color, location, area, and building—or other requirements
like—temperature, water pressure, humidity, etc., with one unique iden-
tifiable pattern or process for each thing or object—then one can say that
you have become master of the “Internet of Things” (IoT), the emerging
technology. All this looks easy, but a bit more complicated and we need to
learn more.
We need to remember one thing called IPv6 (Internet Protocol version
6) which provides a 128-bit address mechanism. This means we can uniquely
recognize about “340 trillion, trillion, trillion” different objects. As of now,
we are about 8 billion (2021 global population) humans, and about 20–
50 billion animals (possible Guesstimate from World Atlas 2020), about
similar birds and small insects, etc., livestock, 100 billion plant species;
maybe about another requirement of 100 billion physical objects including
the commercial institutions, etc., together with about less than 500 billion
unique present estimate and identifiable maximum objects including
humans, livestock, marine stock, etc. (refer to the Table 1.1). Note that we
are talking about 500 billion unique objects while we have as many as “340
trillion, trillion, trillion” unique addresses. Hence, if we can systematically
work, we may be able to achieve our goal of a “unique identification pattern
to all our future and present humans as well as livestock and other objects.”
We are confident that even we can plan the 256-bit addressing mechanism if
need be, but let us not be overenthusiastic, and hence let us not worry about
that 256-bit addressing for the present.
Introduction 3
Now let us talk about the next complex issue after all the livestock and
human beings, what physical objects and requirements to be identified with?
Most important after livestock in my view are health care and life-system-
related requirements. We should identify all the health and life systems
requirements with unique identification patterns. There are internationally
recognized IPv4 and IPv6 Address Allocation Agencies that are already
working on such address allocations, and let us take the support from them.
Chapter 2
B ig Data
Great that we could learn a bit of the IoT, let us see the other side of the
coin that is called Big Data. For example, about 300 petabytes of data items
are being added monthly on Facebook, and every second Picasa album is
getting more photos which are even much bigger activities than Facebook.
According to the Global Market Intelligence Firm, IDC Corporate, USA,
digital data is about eight to ten zettabytes even in 2015, which means we
are already dealing with big data volumes. Let us imagine that we shall
be getting regular inputs from all the different species, which means about
9 million data items minimum for every second though in principle we
shall be getting about 250 Kbps data from every IoT device installed which
is a few magnitudes higher. Also, there are humans, corporate, who are
already generating the present digital data universally. So, there is a definite
connection between IoT evolution and Big Data that we need to under-
stand. Big Data masters should become ready with such mechanisms, so
every day’s IoT data is instantly analyzed and useful results are separated
and stored along with respective data inputs for checking if required in the
future, and get ready for a new challenge and new day. Is this not a bit more
complicated? Let us see it in due course.
Earlier it was thought that Big Data is only for big corporate like
Airlines, Auto, Energy, Financial Services, and Retail. But as per our above
observations, the Big Data Spectrum is spreading like ether all over. We
should agree that Big Data is touching every aspect of our life, including
health and life systems, plant and species control aspects, business inputs for
electricity (meters), traffic control/smart city, road policing, electronic sur-
veillance, drone control, and agriculture management, etc., which anyone
can say are only a tip of the iceberg.
One of the main aims of Big Data is to deliver focused answers and
personalized Management Information System (MIS) useful for the indi-
vidual as well as the business requirements. This personalized focus gives
higher value and causes customers to become more comfortable, hence
loyal, and thus more profit to a business. With Big Data every business
has a huge opportunity to present customers with personalized service and
DOI: 10.1201/9781003303206-2 5
6 Design of Internet of Things
Big Data
7
8 Design of Internet of Things
number of 9s reliability and data loss in bytes. For example, for ten 9s reli-
ability and one Petabyte of data, the acceptable loss is 900,720 bytes.
Let us see the Data Science requirements example— there are about
23 million telephone calls happening across India every day (Max Call
Busy Second is 1200). If any government wishes to learn about a particular
issue— per se identified about 32 suspect numbers— one needs to iden-
tify the call pattern received for each of the numbers. But the incoming
call may come from anywhere, in India or outside India. Data: Every day
there are 23 million calls; therefore, monthly data is about 23 million ×
30 =690 million calls—nice Big Data.
Possible patterns, planning, and logical approach for the problem at hand:
Per se, Each Server Cluster is of 8 nodes, and hence 959 K data is
subdivided into 8 parts to be submitted to each server (959000 /8 =119.8
K data Records for each node).There are 32 server clusters of each having
8 nodes i.e. a total of 32 x 8 =256 nodes shall be working parallel on this
single problem; One can plan them as 256 threads; if each Machine has in-
built 8 processors (CPU) to handle the issue, with a 32 such Machines in
closely coupled network—or parallel computing environment—etc. can be
discussed. So, remember we got the data into a manageable format by the
way of applying our required rules and pattern matching techniques. Now
because we are talking 120 K call data on which we need to apply for the
logic and program.The whole problem is can be handled easily, provided
one has the desired environment.
Now the programming part /the “ART” —“Mat lab Version 6” has
required algorithms (more than one method can be applied) related
to Collaborative Filtering Techniques—which can be applied to pattern
matching and to suit our above problem requirements. At this moment we
shall not get into details of what specific equations or algorithms are used,
as at this moment conceptual understanding is of utmost importance.
Result: For initial working it may take about one or two months, to finalize
the Algorithms; program error correction; trial and error; debugging; etc. —
a learning curve. But once all these are finalized, it shall become routine
submission of job to the 32 Server Parallel Computing Environments, and
within a flat 7 days; one can send the results to the Government about
those specific 32 numbers.
Note: A trained and seasoned team may be able to deliver the same results
within 48 hours, provided the environment and the problem definitions are
routine to them.That is, they are used to address such problems. We may
also call them a “Designed Thinking” team. Data Science or Big Data is
a concept or Art so that one needs to understand the problem definition
and the result requirements—more often called as, Management of
Information—in a simple way.
Chapter 3
E mbedded Programming
Techniques
DOI: 10.1201/9781003303206-3 11
12 Design of Internet of Things
Processor Power: 25MIPS to 40 MIPS, (16 bits, 32 bits, 64 bits). EX: ARM7,
ARM11, etc.
Memory: ROM, RAM, FLASH (1MB to 16 MB, 32MB, 64 MB).
Expected Life Time: one Year to Five Years
Development Cost: 10,000 to 100,000 US$
one has to generate/create the source code for each of the identified
hardware elements and compile the respective Object Code files
for the same. At present, there are many frameworks (Integrated
Embedded Development Environments) for such generation of
object code files.
Step 2: One has to link all these available object code files related to
different hardware elements and software protocols that control
the behavior of the final target system into a single, relocatable,
final target “Object Code,” using appropriate “Linker.” Integrated
Embedded Development Environments may support the generation
of object code files as well the linking of the separate object files
into a single relocatable code. One has to take care of the issue as
these Integrated Frameworks sometimes may generate additional
unnecessary memory gaps or not useful code, which may not affect
the target functionality but increase the code size.
Step 3: Note that a single relocatable object code shall appropriately
be placed into the final target FLASH/RAM/ROM parts of the
target system which shall give the required functional behavior
for the target embedded product, on activation. We need to use
the “Locator” to place the final code into the respective identi-
fied Fixed Memory addresses (target FLASH/RAM/ROM parts of
target system) in the form of fixed “binary code.” One may call
it (final binary code) as final targeted Text Section, Data Section,
Stack section, so on and so forth or Final Fixed Target Code. This
code can be easily moved into the appropriate FLASH/RAM/ROM
parts of the target embedded platform. Now let us get into the
programming or the actions part with the available components.
Target CPU-based start-up code, which may also be known as
Power on Self-Test Code (POST), should contain the following
(Table 3.2):
Embedded Programming Techniques 13
The Memory Map and Input and Output (I/O) Map have to be drawn for
the target. This shall be the lifeline of Embedded Programmer. The Control
Register Addresses, Interrupt Levels, In-built Memory blocks of each part
(if any), should be very thorough. Based on the above information one can
start writing small diagnostic programs for the target hardware to check
each of the identified chips/MCU of this platform is functioning correctly
and ready to take runtime software to get the target behavior.
Avoid the use of complete code related to Standard Library Routines, but
use only the required part of the code out of their source, whenever possible.
Always recognize and remember the native word size of the MCU should be
used for “integer declaration” frequently to save many more bytes of code
generation.
C/C++keyword “volatile” should be used to declare any of the Device
Registers. Then at the optimization phase, the compiler treats that vari-
able as though its behavior cannot be predicted at compile time. Embedded
programmers can divide each part of the code into different possible tasks
and manage them through RTOS. (task states—Running, Ready, Waiting,
etc.). Take care of the “critical section” of each “task”. Interrupts, if any,
are to be disabled and enabled properly.
C/C++keyword “register” may be used for declaring local variables that
enable the compiler to place them in a general-purpose register rather than
in a stack. Use “Global variables” to pass a parameter to a function. But
Global variables may have some negative effects. Yet at times one has to
choose between Interrupt and Polling. Sometimes polling may prove better.
Note: Never make the mistake of assuming that optimized code shall
behave the same way as the earlier unoptimized code. One has to test the
new code again. Figure 3.1 shows the software architecture of the embedded
target system.
14 Design of Internet of Things
C hanging Technologies
The technology trend is shifting toward providing faster data rates and lower
latency connectivity (see the Figure 4.1), the Third Generation Partnership
Project (3GPP) “standards body” has developed a series of enhancements
to create the “High-Speed Packet Access [HSPA] Evolution,” also referred
to as “HSPA+ .” The HSPA Evolution represents a logical development
of the Wideband Code Division Multiple Access (WCDMA) approach and
is the stepping stone to an entirely new 3GPP radio platform called 3GPP
Long-Term Evolution (LTE). LTE offers several distinct advantages such as
increased performance attribute(s), high peak data rates, low latency, and
greater efficiencies in using the wireless spectrum.
Low latency makes it possible for IoT applications to query or receive
quicker updates from sensor devices. LTE networks have latencies on the
order of 50–75 msec, which will open up new types of programming pos-
sibilities for application developers. For example, wearable computers that
require interactive and real-time feedback will require moving large chunks
of data to be analyzed in the cloud or back-end systems to create a seamless
user experience.
Higher peak data rates can support applications such as Voice over
Internet Protocol (VoIP) and digital video that require better quality of ser-
vice (QoS). With further advancements in communication technologies such
as Software Defined Radio (SDR) and “Long-Term Evolution –Advanced”
(LTE-A), devices will be able to communicate with better QoS and support
better access to new services with more efficient use of the radio frequency
spectrum.
4.1 RFID
Radio Frequency Identification (RFID) technology is of particular import-
ance to IoT as one of the first industrial realizations of IoT is in the use of
RFID technology to track and monitor goods (i.e., things) in the logistics
and supply chain sector. RFID frequency bands range from 125 kHz (low
DOI: 10.1201/9781003303206-4 15
16 Design of Internet of Things
frequency [LF]) up to 5.8 GHz (super high frequency [SHF]) and the tags
have at least three basic components:
4.3 6LoWPAN
6LoWPAN is an acronym for “IPv6 over Low power Wireless Personal Area
Networks.” It is a communication standard that allows low-power devices
Changing Technologies 17
to communicate and exchange data via IPv6. There are many benefits of
using IP-based connectivity to form the sensor access network:
M 2M
DOI: 10.1201/9781003303206-5 21
22 Design of Internet of Things
we will be networking even more elements with one another, soon. These
intelligent solutions will help us to simplify our lives further.
The European Telecommunications Standards Institute (ETSI) defines
M2M communication as follows: “Machine to Machine (M2M) commu-
nication is the communication between two or more entities that do not
necessarily need any direct human intervention. M2M services intend to
automate decision and communication processes.”—Remember this is one
of the many definitions that are floating around us, from different bodies.
To take advantage of the opportunities M2M presents, entrepreneurs are
looking into the big picture to find novel solutions to mass usage business
environments. In the current environment, M2M can be used in almost all
aspects of life. If we look at government setup across various ministries and
departments, more than 70% of them are either using M2M or planning to
use M2M technologies in one way or other. With better sensors, wireless
networks, and increased computing capability, deploying an M2M makes
sense for many sectors. “M2M” has opened up many such opportunities
in technology and business, that its myriad applications extend beyond the
corporate world into our daily lives and have transformed the way we live,
work, and play. Let’s have a look at just a few of the possible market oppor-
tunities from M2M technology in three different industries:
• M2M applications benefit from R&D and the scale of the mobile
handset industry.
• Technical advances in air interface standards are enabling new
telecom M2M market segments.
• Mobile Network Operators (MNOs) are seeking to expand their
data service offerings.
• Government mandates are increasingly requiring the use of
telemetries and related functionality.
application provider, but they might be offered by the operator via the oper-
ator platform itself.
M2M features include the following:
• Low Mobility: M2M devices are supposed to be very small and they
need not move. People may move with them (Roaming facility).
• Time Controlled: Possible to send or receive data only at certain
predefined periods.
• Packet Switched: Network operator to provide packet- switched
service.
• Small Data Transmissions: M2M devices send or receive small
amounts of data.
• Monitoring: Provide functionality to monitor the events.
• Low Power: Use very low power to improve the system and effi-
ciency of service.
with any other Connected Object. The M2M system should abstract the
underlying network structure including any network addressing mechanism
used; for example, in the case of an IP-based network, the session establish-
ment shall be possible when IP static or dynamic addressing is used.
Message delivery for sleeping devices: The M2M system shall be able
to manage communication toward a sleeping device. (One of the
methods is—the message is delivered whenever the device is live.)
Delivery modes: The M2M system shall support anycast, unicast, multi-
cast, and broadcast communication modes. Whenever possible a
global broadcast should be replaced by multicast or anycast to min-
imize the load on the communication network.
Message transmission scheduling: The M2M system shall be able to
manage the scheduling of network access and of messaging. It shall
be aware of the scheduling delay tolerance of the M2M application.
Figure 5.3 presents the M2M protocol stack as viewed by many CSPs and
application vendors.
Random documents with unrelated
content Scribd suggests to you:
The Project Gutenberg eBook of The Brain of an Army:
A Popular Account of the German General Staff
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
A POPULAR ACCOUNT
OF THE
GERMAN GENERAL STAFF
BY
SPENSER WILKINSON
NEW EDITION
WESTMINSTER
ARCHIBALD CONSTABLE
& CO 1895
BY THE SAME AUTHOR
IMPERIAL DEFENCE
[Transcriber's note: the errata items below have been applied to this text.]
ERRATA.
But while the essence of the Prussian general staff lies deeply embedded
in the organization of the Prussian army, the interest of the general public
has been attracted by the fact that the great strategist to whom the victories
of 1866 and 1870 are ascribed was not the commander of the Prussian army,
but merely the chief of the general staff of a royal commander-in-chief. It
may well be doubted whether this feature of the Prussian system is suitable
for imitation elsewhere. The Germans themselves evidently regard it as
accidental rather than essential, for in organizing their navy they have, after
much experiment and deliberation, adopted a different plan. They have
appointed their chosen admiral to be, not chief of the staff to an Emperor
who in war, as he takes the field with the army, cannot undertake the
command of the navy, but to be "the commanding admiral."
I refrained in the first edition of this essay from drawing from the German
institution which it describes a moral to be applied to the British army, and
was content with a warning against overhasty imitation. At that time the
nature of the relation between Moltke and the King was still to some extent
veiled in official language, and nothing so far as I am aware had been
published which allowed the facts to rest upon well authenticated, direct
evidence as distinguished from inference. Since then the posthumous
publication of Moltke's private correspondence,[1] and of the first instalment
of his military correspondence,[2] has thrown a flood of light upon the
whole subject. I had the good fortune to be furnished with an earlier clue. As
soon as my essay was ready for the press I ventured to send a proof to Count
Moltke, with a request that he would allow me in a dedication to couple his
name with studies of which his work had been the subject. He was good
enough to reply in a letter of which the following is a translation:—
DEAR SIR,—
I have read your essay on the German general staff with great interest.
If the commander after consultation with his authorized adviser feels the
need of asking others what he ought to do, the command is in weak hands.
If King William I. ever really used the expression attributed to him on p.
58, he did himself a great injustice. The king judged the perpetually
changing military situation with an uncommonly clear eye. He was much
more than "a great strategist." It was he who took upon himself an
immeasurable responsibility, and for the conduct of an army character
weighs more than knowledge and science. I think your excellent work would
lose nothing if that passage were omitted.
You touch on p. 112[3] upon the relation between the commander and the
statesman. Neither of the two can set up for himself in advance a goal to be
certainly reached. The plan of campaign modifies itself after the first great
collision with the enemy. Success or failure in a battle occasions operations
originally not intended. On the other hand the final claims of the statesman
will be very different according as he has to reckon with defeats or with a
series of uninterrupted victories. In the course of the campaign the balance
between the military will and the considerations of diplomacy can be held
only by the supreme authority.
Great is the advantage if the head of the State is also the leader in war. He
knows his general staff and his troops, and is known by them. In such armies
there are no pronunciamentoes.
The constitution, however, does not in every country admit of placing the
head of the State at the head of the army. If the Government will and can
select in advance the most qualified general for the post, that officer must
also be given during peace the authority to influence the troops and their
leaders and to create an understanding between himself and his general staff.
This chosen general will seldom be the minister of war, who during the
whole war is indispensable at home, where all the threads of administration
come together.
You have expressed the kind intention of dedicating your interesting
essay to me, but I suggest that you should consider whether without such a
dedication it would not still better preserve the character of perfectly
independent judgment.
It was hardly possible for Moltke, bound as he was by his own high
position, to have expressed more plainly his opinion of the kind of reform
needed in the British army, nor to have better illustrated than by that opinion
the precise nature of his own work.[4]
With Moltke's view that the peculiar position which he held was not
necessarily the model best suited for the circumstances of the British army it
is interesting to compare the judgment expressed quite independently by
Lord Roberts, who kindly allows me to publish the following letter:—
SIMLA,
11th September, 1891.
The idea of a Chief of the Staff who is to regulate the preparations for and
the operations during a campaign, and who is to possess a predominant
influence in determining the military policy of a nation, is quite opposed to
the views of some of the ablest commanders and strategists, as summarized
at pages 17 and 18 of Home's Précis of Modern Tactics, Edition 1882; and I
doubt whether any really competent general or Commander-in-Chief would
contentedly acquiesce in the dissociation of command and responsibility
which the German procedure necessarily entails. That Von Moltke was the
virtual Commander-in-Chief of the German forces during the wars in
question, and that the nominal commanders had really very little to say to the
movements they were called upon to execute, seems to be clearly proved by
the third volume of the Field Marshal's writings, reviewed in The Times of
the 21st August last. Von Moltke was a soldier of extraordinary ability, he
acted in the Emperor's name, the orders he initiated were implicitly obeyed,
and the military machine worked smoothly. But had the orders not been
uniformly judicious, had a check or reverse been experienced, and had one
or more of the subordinate commanders possessed greater capacity and
resolution than the Chief of the Staff, the result might have been very
different.
In military nations a Chief of the Staff of the German type may perhaps
be essential, more especially when, as in Germany, the Emperor is the head
of the Army and its titular Commander-in-Chief. The reasons for this are
that, in the first place, he may not possess the qualities required in a
Commander-in-Chief who has to lead the Army in war; and in the second
place, even if he does possess those qualities, there are so many other
matters connected with the civil administration of his own country, and with
its political relations towards other countries, that the time of a King or
Emperor may be too fully occupied to admit of his devoting that exclusive
attention to military matters which is so necessary in a Commander-in-Chief,
if he desires to have an efficient Army. A Chief of the Staff then becomes
essential; he is indeed the Commander-in-Chief.
I think, too, that an Emperor or King would be more likely than a man of
inferior social standing to take the advice of a Chief of the Staff. The former
would be so immeasurably above all those about him that he could afford to
listen to advice—as the Emperor of Germany undoubtedly did to that of Von
Moltke on the occasion mentioned in the note at page 14 [64]. But the
Commander of about much the same standing socially as his Chief of the
Staff, and possibly not much the latter's senior in the Army, would be apt to
resent what he might consider uncalled-for interference; and this would be
specially the case if he were of a narrow-minded, obstinate disposition.
Indeed, I think that such a feeling would be almost sure to arise, unless the
Commander-in-Chief were one of those easy-going, soft natures which
ought never to be placed in such a high position.
I have been referring hitherto more to war than peace, but even in peace
time I doubt if a Chief of the Staff of the German type is suitable to our
organization, and to the comparative smallness of our army. In war time it
might easily lead to disaster. The less capacity possessed by the nominal
Commander-in-Chief the greater might be his obstinacy, and the more
capacity he possessed the more he would resent anything which might
savour of interference. Altogether I think that the office of Chief of the Staff,
as understood in Germany, might easily be made impossible under the
conditions of our service. My opinion is that the Army Head-Quarters Staff
are capable of doing exactly the same work as the Grand General Staff of the
German Army perform, and that there is no need to upset our present system.
We have only to bring the Intelligence and Mobilization Departments more
closely into communication with, and into subordination to, the Adjutant-
General and Quarter-Master-General, as is now being done in India with the
best results.
You will understand that the foregoing remarks are based on the
assumption that in the British Service the office of Commander-in-Chief is
held by the soldier who, from his abilities and experience, has commended
himself to the Government as being best qualified to organize the Army for
war, and if requisite to take command in the field. If, however, for reasons of
State it is thought desirable to approximate our system to the German system
in the selection of the head of the Army, it might become necessary to
appoint a Chief of the Staff of the German type to act as the responsible
military adviser of the Commander-in-Chief and the Cabinet. But in this case
the responsibility of the Officer in question should be fully recognised and
clearly defined.
Believe me,
Yours very truly,
FRED ROBERTS.
The work of generalship can rarely be given to any one but the
commander of an army. When the commander owes his position to other
than military considerations, as is the case in Prussia, where the king is born
to be commander-in-chief as he is born to be king, he is wise to select a good
professional general to do the work. But where a government is free to
choose its commander, that officer will wish to do his own work himself,
and will resent the suggestion that an assistant should prompt and guide him.
The Hartington Commission proposed at the same time to abolish the office
of commander-in-chief, and to create that of a "chief of the staff." This new
officer was to advise the Secretary of State—that is, the Government—upon
all the most important military questions. He was to discuss the strength and
distribution of the army, and the defence of the Empire; to plan the general
arrangements for defence, and to shape the estimates according to his plan.
In a word, he was to perform many of the most important duties of a
commander-in-chief. But he was to be the adviser or assistant, not of a
military commander, but of a civilian governor-general of the army.
Mr. Balfour's first point is that the burden thrown upon a single
Commander-in-Chief is too great for one man to bear. Marlborough,
Wellington or Napoleon would, perhaps, hardly have accepted this view. But
supposing it were true, the remedy proposed is infinitely worse than the
disease. In 1887 the Royal Commission, over which the late Sir James
Stephen presided, examined with judicial impartiality the duties of the
Secretary of State for War. That Commission in its report wrote as follows:
—
"It is morally and physically impossible that any one man should
discharge all these functions in a satisfactory manner. No one man could
possess either the time or the strength or the knowledge which would be
indispensable for that purpose; but even if such a physical and intellectual
prodigy were to be found, he would have to do his duty under disadvantages
which would reduce him practically to impotence."
Mr. Balfour's objection to this arrangement is, however, not that it sins
against the principles of good organization, but that it practically abolishes
the Secretary of State. It leaves the decision of questions which arise within
the War Office and the army in the hands of a person who is outside the
Cabinet. In this way it diminishes the power of the Cabinet, which rests
partly upon the solidarity of that body, and partly upon the practice by which
every branch of Government business is under the control of one or other of
its members.
There are many important matters which cannot be confined either to the
department of command or to that of supply. Under this head fall the terms
of service for soldiers, the conditions of recruiting, the regulations for the
appointment and promotion of officers. These are properly the subjects of
deliberation in which not only military, but civil opinions and interests must
be represented; for their definition the Secretary of State will do well to refer
to a general council of his assistants, and the ultimate settlement will require
the judgment of the Cabinet, and sometimes also the sanction of Parliament.
In time of war it is generally necessary quickly to levy extra men, and to
drain into the army a large part of the resources of the country. Such
measures must be thought out and arranged in advance during peace, for the
greatest care is required in all decisions which involve the appropriation by
the State of more than the usual share of the energies, the time and the
money of its citizens. Regulations of this kind can seldom be framed except
as the result of the deliberations of a council of military and civil officers of
experience. These, then, are the rational sub-divisions of army business.
There is the department of command, embracing the discipline and training
of the troops, their organization as combatant bodies, the arrangement of
their movements and distribution in peace and war, and all that belongs to
the functions of generalship. These matters form the proper domain of a
Commander-in-Chief. Side by side with them is the department of supply,
which procures for the commander the materials out of which his fighting
machine is put together and kept in condition. Harmony between them is
secured by the authority of the Government, wielded by the Secretary of
State, who regulates according to the state of the national policy and of the
exchequer the amount to be spent by each department, and who presides
over the great council which lays down the conditions under which the
services of the citizens in money, in property, or in person are to be claimed
by the State for its defence.
3, MADEIRA ROAD,
STREATHAM, S.W.
September 3rd, 1895.
[1] See in particular the passage in Moltke, Gesammelte Schriften, V. 298-9, which
I have translated in an essay entitled "The Brain of the Navy," p. 28.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com